Sample records for hideous strains attacks

  1. Conway Morris: Extraterrestrials: Aliens like us?

    NASA Astrophysics Data System (ADS)

    Morris, Simon Conway

    2005-08-01

    So what are they going to be like, those long-expected extraterrestrials? Hideous hydrocarbon arachnoids, waving laser cannons as they chase screaming humans, repulsively surveying the scene through empathy-free compound eyes? Or maybe laughing bipeds, chatting away, holding a glass of wine, a bit like us?

  2. Misuse the Power, Miss the Point

    ERIC Educational Resources Information Center

    Lonergan, David

    2011-01-01

    In this article, the author addresses a problem that plagues virtually all academics, as well as most people in business, K-12 education, and many other walks of life. At one time or another most members of post-millennial western society have suffered through that most hideous of well-intentioned experiences, the botched PowerPoint presentation.…

  3. The Views of Turkish Teachers on the Use of Humor in Secondary Schools

    ERIC Educational Resources Information Center

    Kilic, Yasin

    2016-01-01

    Humor is the type of expression and writing representing the humorous aspect of life by adorning with jokes and wit. The main objective of humor is to criticize, ironize, and correct the flaws and hideousness in life. Humor develops the sensitivity, the empathizing ability and social facts' multidimensional perception of individuals. Humor…

  4. Teaching Students to Show, Not Tell

    ERIC Educational Resources Information Center

    Spitzer, Mark

    2012-01-01

    In his epic poem "A Season in Hell," the surly French poet Arthur Rimbaud proposes that the Devil likes writing that lacks "descriptive" qualities. Rimbaud then makes a stand in favor of descriptive writing by offering "these hideous pages from [his] notes of the damned." The author would not go so far as to say that nondescriptive writing is evil…

  5. "Happier than Ever to Be Exactly What He Was": Reflections on, "Shrek," Fiona and the Magic Mirrors of Commodity Culture,

    ERIC Educational Resources Information Center

    Roberts, Lewis

    2014-01-01

    This article compares the models of subjectivity and identity in William Steig's 1990 picture book "Shrek!" and in DreamWorks' "Shrek" films. Steig presented his ogre hero as a model of the crises of subjectivity all children must face, and then reassured readers by showing how even a hideous figure such as…

  6. Act No. 8.072 of 25 July 1990 relating to hideous crimes in terms of Article 5, Clause 43, of the Federal Constitution, and determining other things.

    PubMed

    1989-01-01

    Among other things, this Brazilian Act increases the punishment for the crimes of rape and violent indecent assault to 6 to 10 years' imprisonment. If the crime results in serious bodily injury, the punishment is 8 to 12 years' imprisonment, and, if death results, 12 to 25 years' imprisonment.

  7. Sea lamprey mark type, wounding rate, and parasite-host preference and abundance relationships for lake trout and other species in Lake Ontario

    USGS Publications Warehouse

    Lantry, Brian F.; Adams, Jean; Christie, Gavin; Schaner, Teodore; Bowlby, James; Keir, Michael; Lantry, Jana; Sullivan, Paul; Bishop, Daniel; Treska, Ted; Morrison, Bruce

    2015-01-01

    We examined how attack frequency by sea lampreys on fishes in Lake Ontario varied in response to sea lamprey abundance and preferred host abundance (lake trout > 433 mm). For this analysis we used two gill net assessment surveys, one angler creel survey, three salmonid spawning run datasets, one adult sea lamprey assessment, and a bottom trawl assessment of dead lake trout. The frequency of fresh sea lamprey marks observed on lake trout from assessment surveys was strongly related to the frequency of sea lamprey attacks observed on salmon and trout from the creel survey and spawning migrations. Attack frequencies on all salmonids examined were related to the ratio between the abundances of adult sea lampreys and lake trout. Reanalysis of the susceptibility to sea lamprey attack for lake trout strains stocked into Lake Ontario reaffirmed that Lake Superior strain lake trout were among the most and Seneca Lake strain among the least susceptible and that Lewis Lake strain lake trout were even more susceptible than the Superior strain. Seasonal attack frequencies indicated that as the number of observed sea lamprey attacks decreased during June–September, the ratio of healing to fresh marks also decreased. Simulation of the ratios of healing to fresh marks indicated that increased lethality of attacks by growing sea lampreys contributed to the decline in the ratios and supported laboratory studies about wound healing duration.

  8. Sea lamprey mark type, marking rate, and parasite-host relationships for lake trout and other species in Lake Ontario

    USGS Publications Warehouse

    Lantry, Brian F.; Adams, Jean V.; Christie, Gavin; Schaner, Teodore; Bowlby, James; Keir, Michael; Lantry, Jana; Sullivan, Paul; Bishop, Daniel; Treska, Ted; Morrison, Bruce

    2015-01-01

    We examined how attack frequency by sea lampreys on fishes in Lake Ontario varied in response to sea lamprey abundance and preferred host abundance (lake trout > 433 mm). For this analysis we used two gill net assessment surveys, one angler creel survey, three salmonid spawning run datasets, one adult sea lamprey assessment, and a bottom trawl assessment of dead lake trout. The frequency of fresh sea lamprey marks observed on lake trout from assessment surveys was strongly related to the frequency of sea lamprey attacks observed on salmon and trout from the creel survey and spawning migrations. Attack frequencies on all salmonids examined were related to the ratio between the abundances of adult sea lampreys and lake trout. Reanalysis of the susceptibility to sea lamprey attack for lake trout strains stocked into Lake Ontario reaffirmed that Lake Superior strain lake trout were among the most and Seneca Lake strain among the least susceptible and that Lewis Lake strain lake trout were even more susceptible than the Superior strain. Seasonal attack frequencies indicated that as the number of observed sea lamprey attacks decreased during June–September, the ratio of healing to fresh marks also decreased. Simulation of the ratios of healing to fresh marks indicated that increased lethality of attacks by growing sea lampreys contributed to the decline in the ratios and supported laboratory studies about wound healing duration.

  9. Physical and thermal strain of firefighters according to the firefighting tactics used to suppress wildfires.

    PubMed

    Rodríguez-Marroyo, J A; Villa, J G; López-Satue, J; Pernía, R; Carballo, B; García-López, J; Foster, C

    2011-11-01

    The aim of this study was to analyse the physiological strain of firefighters, using heart rate (HR) and core temperature, during real wildfire suppression according to the type of attack performed (direct, indirect or mixed). Three intensity zones were established according to the HR corresponding to the ventilatory threshold (VT) and respiratory compensation threshold (RCT): zone 1, RCT. The exercise workload (training impulse (TRIMP)), the physiological strain index (PSI) and the cumulative heat strain index(CHSI) were calculated using the time spent in each zone, and the HR and core temperature, respectively. Significantly higher mean HR, time spent in Z2 and Z3 and TRIMP h(-1) were found in direct and mixed versus indirect attacks. The highest PSI and CHSI were observed in the direct attack. In conclusion, exercise strain and combined thermal strain, but not core temperature during wildfire suppression, are related to the type of attack performed. STATEMENT OF RELEVANCE: Our findings demonstrated that wildfire firefighting is associated with high physiological demands, which vary significantly depending on the tactics chosen for performing the task. These results should be kept in mind when planning programmes to improve wildland firefighters' physical fitness, which will allow improvement in their performance.

  10. Comparative efficacy of Rubini, Jeryl-Lynn and Urabe mumps vaccine in an Asian population.

    PubMed

    Ong, Gary; Goh, Kee Tai; Ma, Stefan; Chew, Suok Kai

    2005-11-01

    The comparative efficacy of the three mumps vaccine strains (Jeryl-Lynn, Urabe and Rubini) was conducted in an Asian population from data arising from an epidemiological investigation of seven institutional outbreaks of mumps in Singapore. Demographic information (gender, age, ethnic group), clinical presentation and vaccination history (date and place of mumps vaccination, type of mumps vaccine received) of all children who attended the six childcare centres and one primary school where outbreaks of 20 or more cases of mumps occurred in 1999 were collected. The attack rate of the unvaccinated group and the attack rates of the vaccine groups (for each vaccine strain) were determined and the vaccine efficacy of the three vaccines calculated. The vaccine efficacy of the Jeryl-Lynn strain, Urabe strain and Rubini strain mumps vaccine were 80.7, 54.4 and -55.3%, respectively. Rubini strain mumps vaccine conferred no protection and has since been deregistered in Singapore.

  11. Mathematical modeling of Avian Influenza epidemic with bird vaccination in constant population

    NASA Astrophysics Data System (ADS)

    Kharis, M.; Amidi

    2018-03-01

    The development of the industrial world and human life is increasingly modern and less attention to environmental sustainability causes the virus causes the epidemic has a high tendency to mutate so that the virus that initially only attack animals, is also found to have the ability to attack humans. The epidemics that lasted some time were bird flu epidemics and swine flu epidemics. The flu epidemic led to several deaths and many people admitted to the hospital. Strain (derivatives) of H5N1 virus was identified as the cause of the bird flu epidemic while the H1N1 strain of the virus was identified as the cause of the swine flu epidemic. The symptoms are similar to seasonal flu caused by H3N2 strain of the virus. Outbreaks of bird flu and swine flu initially only attacked animals, but over time some people were found to be infected with the virus.

  12. "IN ALL ITS HIDEOUS AND APPALLING NAKEDNESS AND TRUTH": THE RECEPTION OF SOME ANATOMICAL COLLECTIONS IN GEORGIAN AND VICTORIAN ENGLAND.

    PubMed

    Talairach-Vielmas, Laurence

    2015-01-01

    This article explores the reception of some anatomical collections in Georgian and Victorian England. Both private medical museums and public anatomical museums reflected the central role played by anatomy in medical knowledge and education in the eighteenth and nineteenth centuries. However, because they were associated with death and sexuality, anatomical museums were both products of enlightenment science and potentially immoral loci likely to corrupt young and innocent women. But, as this article shows, the reasons behind the hostile receptions of some collections varied throughout the centuries, revealing in so doing the gradual professionalization of the medical field and growing monopoly of medical professionals over medical knowledge.

  13. A Mycobacterium Strain with Extended Capacities for Degradation of Gasoline Hydrocarbons

    PubMed Central

    Solano-Serena, Floriane; Marchal, Rémy; Casarégola, Serge; Vasnier, Christelle; Lebeault, Jean-Michel; Vandecasteele, Jean-Paul

    2000-01-01

    A bacterial strain (strain IFP 2173) was selected from a gasoline-polluted aquifer on the basis of its capacity to use 2,2,4-trimethylpentane (isooctane) as a sole carbon and energy source. This isolate, the first isolate with this capacity to be characterized, was identified by 16S ribosomal DNA analysis, and 100% sequence identity with a reference strain of Mycobacterium austroafricanum was found. Mycobacterium sp. strain IFP 2173 used an unusually wide spectrum of hydrocarbons as growth substrates, including n-alkanes and multimethyl-substituted isoalkanes with chains ranging from 5 to 16 carbon atoms long, as well as substituted monoaromatic hydrocarbons. It also attacked ethers, such as methyl t-butyl ether. During growth on gasoline, it degraded 86% of the substrate. Our results indicated that strain IFP 2173 was capable of degrading 3-methyl groups, possibly by a carboxylation and deacetylation mechanism. Evidence that it attacked the quaternary carbon atom structure by an as-yet-undefined mechanism during growth on 2,2,4-trimethylpentane and 2,2-dimethylpentane was also obtained. PMID:10831416

  14. The effects of diaphenylsulfone (DDS) against chloroquine-resistant Plasmodium falciparum*

    PubMed Central

    Degowin, Richard L.; Eppes, R. Bennett; Carson, Paul E.; Powell, Robin D.

    1966-01-01

    In view of the problems caused by the chloroquine-resistance of some strains of Plasmodium falciparum, the authors have investigated the effectiveness of diaphenylsulfone against two such resistant strains, from Malaya and Viet-Nam. They found that diaphenylsulfone given during acute attacks of malaria had a blood schizontocidal activity against the Malayan resistant strain but was not rapidly effective in terminating acute attacks in non-immune persons, and that, when the drug was given prophylactically in relatively small doses, it was substantially effective in preventing patency of mosquito-induced infection with the same strain. The protective effect of diaphenylsulfone is that of a clinical prophylactic or suppressive drug; it does not appear to be a true causal prophylactic. It was also found that the protective effect is vitiated by the concurrent administration of paraaminobenzoic acid. These studies indicate a need for further assessment of the antimalarial value of sulfones and sulfonamides, both alone and in combination with other drugs, for prevention and cure. PMID:5328901

  15. Genome Sequencing of Ralstonia solanacearum Race 4, Biovar 4, and Phylotype I, Strain YC45, Isolated from Rhizoma kaempferiae in Southern China

    PubMed Central

    She, Xiaoman; Tang, Yafei; Lan, Guobing

    2015-01-01

    Ralstonia solanacearum is an important phytopathogen that attacks over 400 plant species, including Zingiberaceae plants. Here, we report the complete genome sequence of strain YC45, which was isolated from Rhizoma kaempferiae in southern China. PMID:26430032

  16. [Meningococcus profilaxis (author's transl)].

    PubMed

    Pérez Trallero, E; Pérez-Yarza, E; Ruíz Benito, C; Muñóz Baroja, I

    1979-11-25

    In a General Hospital in San Sebastian, 96 cases of Neisseria meningitidis infections were detected in a two years period. By the use of the disk diffusion method, we found that all causative meningococcal strains but 4 were resistant to sulfonamide (with a 300 microgram sulfadiazine disk, all isolates with a zone diameter of less than 20 mm were considered to be resistant of sulfadiazine, whereas those with zone diameters of greater than 30 mm were considered susceptible). No rifampin nor minocycline-resistant meningococci were isolated. All strains had a disk zone diameter (30 micrograms rifampin and 30 micrograms tetracycline) of greater than 20 mm. The serogroups of meningococcal strains were as follows: group A, 1; group B, 67; group C, 5 and 23 were no typed. Children less than four years of age were most frequently attacked (67,7%). The attack rate was only slightly higher in males than in females (52 and 44).

  17. Substrate Preferences in Biodesulfurization of Diesel Range Fuels by Rhodococcus sp. Strain ECRD-1

    PubMed Central

    Prince, Roger C.; Grossman, Matthew J.

    2003-01-01

    The range of sulfur compounds in fuel oil and the substrate range and preference of the biocatalytic system determine the maximum extent to which sulfur can be removed by biodesulfurization. We show that the biodesulfurization apparatus in Rhodococcus sp. strain ECRD-1 is able to attack all isomers of dibenzothiophene including those with at least four pendant carbons, with a slight preference for those substituted in the α-position. With somewhat less avidity, this apparatus is also able to attack substituted benzothiophenes with between two and seven pendant carbons. Some compounds containing sulfidic sulfur are also susceptible to desulfurization, although we have not yet been able to determine their molecular identities. PMID:14532032

  18. Conversion of chlorobiphenyls into phenylhexadienoates and benzoates by the enzymes of the upper pathway for polychlorobiphenyl degradation encoded by the bph locus of Pseudomonas sp. strain LB400.

    PubMed Central

    Seeger, M; Timmis, K N; Hofer, B

    1995-01-01

    Metabolism of 21 chlorobiphenyls by the enzymes of the upper biphenyl catabolic pathway encoded by the bph locus of Pseudomonas sp. strain LB400 was investigated by using recombinant strains harboring gene cassettes containing bphABC or bphABCD. The enzymes of the upper pathway were generally able to metabolize mono- and dichlorinated biphenyls but only partially transform most trichlorinated congeners investigated: 14 of 15 mono- and dichlorinated and 2 of 6 trichlorinated congeners were converted into benzoates. All mono- and at least 8 of 12 dichlorinated congeners were attacked by the bphA-encoded biphenyl dioxygenase virtually exclusively at ortho and meta carbons. This enzyme exhibited a high degree of selectivity for the aromatic ring to be attacked, with the order of ring preference being non- > ortho- > meta- > para-substituted for mono- and dichlorinated congeners. The influence of the chlorine substitution pattern of the metabolized ring on benzoate formation resembled its influence on the reactivity of initial dioxygenation, suggesting that the rate of benzoate formation may frequently be determined by the rate of initial attack. The absorption spectra of phenylhexadienoates formed correlated with the presence or absence of a chlorine substituent at an ortho position. PMID:7618878

  19. Prey Range and Genome Evolution of Halobacteriovorax marinus Predatory Bacteria from an Estuary

    PubMed Central

    Enos, Brett G.; Anthony, Molly K.; DeGiorgis, Joseph A.

    2018-01-01

    ABSTRACT Halobacteriovorax strains are saltwater-adapted predatory bacteria that attack Gram-negative bacteria and may play an important role in shaping microbial communities. To understand how Halobacteriovorax strains impact ecosystems and develop them as biocontrol agents, it is important to characterize variation in predation phenotypes and investigate Halobacteriovorax genome evolution. We isolated Halobacteriovorax marinus BE01 from an estuary in Rhode Island using Vibrio from the same site as prey. Small, fast-moving, attack-phase BE01 cells attach to and invade prey cells, consistent with the intraperiplasmic predation strategy of the H. marinus type strain, SJ. BE01 is a prey generalist, forming plaques on Vibrio strains from the estuary, Pseudomonas from soil, and Escherichia coli. Genome analysis revealed extremely high conservation of gene order and amino acid sequences between BE01 and SJ, suggesting strong selective pressure to maintain the genome in this H. marinus lineage. Despite this, we identified two regions of gene content difference that likely resulted from horizontal gene transfer. Analysis of modal codon usage frequencies supports the hypothesis that these regions were acquired from bacteria with different codon usage biases than H. marinus. In one of these regions, BE01 and SJ carry different genes associated with mobile genetic elements. Acquired functions in BE01 include the dnd operon, which encodes a pathway for DNA modification, and a suite of genes involved in membrane synthesis and regulation of gene expression that was likely acquired from another Halobacteriovorax lineage. This analysis provides further evidence that horizontal gene transfer plays an important role in genome evolution in predatory bacteria. IMPORTANCE Predatory bacteria attack and digest other bacteria and therefore may play a role in shaping microbial communities. To investigate phenotypic and genotypic variation in saltwater-adapted predatory bacteria, we isolated Halobacteriovorax marinus BE01 from an estuary in Rhode Island, assayed whether it could attack different prey bacteria, and sequenced and analyzed its genome. We found that BE01 is a prey generalist, attacking bacteria from different phylogenetic groups and environments. Gene order and amino acid sequences are highly conserved between BE01 and the H. marinus type strain, SJ. By comparative genomics, we detected two regions of gene content difference that likely occurred via horizontal gene transfer events. Acquired genes encode functions such as modification of DNA, membrane synthesis and regulation of gene expression. Understanding genome evolution and variation in predation phenotypes among predatory bacteria will inform their development as biocontrol agents and clarify how they impact microbial communities. PMID:29359184

  20. Genome Sequencing of Ralstonia solanacearum Race 4, Biovar 4, and Phylotype I, Strain YC45, Isolated from Rhizoma kaempferiae in Southern China.

    PubMed

    She, Xiaoman; Tang, Yafei; He, Zifu; Lan, Guobing

    2015-10-01

    Ralstonia solanacearum is an important phytopathogen that attacks over 400 plant species, including Zingiberaceae plants. Here, we report the complete genome sequence of strain YC45, which was isolated from Rhizoma kaempferiae in southern China. Copyright © 2015 She et al.

  1. Biodegradation of Nitriles in Shale Oil

    PubMed Central

    Aislabie, Jackie; Atlas, Ronald M.

    1988-01-01

    Enrichment cultures were obtained, after prolonged incubation on a shale oil as the sole source of nitrogen, that selectively degraded nitriles. Capillary gas chromatographic analyses showed that the mixed microbial populations in the enrichments degraded the homologous series of aliphatic nitriles but not the aliphatic hydrocarbons, aromatic hydrocarbons, or heterocyclic-nitrogen compounds found in this oil. Time course studies showed that lighter nitriles were removed more rapidly than higher-molecular-weight nitriles. A Pseudomonas fluorescens strain isolated from an enrichment, which was able to completely utilize the individual nitriles undecyl cyanide and undecanenitrile as sole sources of carbon and nitrogen, was unable to attack stearonitrile when provided alone as the growth substrate. A P. aeruginosa strain, also isolated from one of the enrichments, used nitriles but not aliphatic or aromatic hydrocarbons when the oil was used as a sole nitrogen source. However, when the shale oil was used as the sole source of carbon, aliphatic hydrocarbons in addition to nitriles were degraded but aromatic hydrocarbons were still not attacked by this P. aeruginosa strain. PMID:16347731

  2. Effects of Military Development on Economic Growth in North and South Korea, 1945-1980.

    DTIC Science & Technology

    1981-12-01

    Khruschev’s de -Stalinization campaign and peaceful coexistence policy, coupled with China’s increasing economic and military strength, influenced North Korea...Soviet-North Korean relations. Khruschev’s de -Stalinization policy was considered an attack against any personality cult--which put Kim and Mao under...attack. Kim II-sung’s refusal to accept de -Stalinization, and his pursuit of an independent political course severely strained Soviet- lorth Korean

  3. Digital Archives - Thomas M. Bown's Bighorn Basin Maps: The Suite of Forty-Four Office Master Copies

    USGS Publications Warehouse

    McKinney, Kevin C.

    2001-01-01

    This CD-ROM is a digitally scanned suite of master 'locality' maps produced by Dr. Thomas M. Bown. The maps are archived in the US Geological Survey Field Records. The maps feature annual compilations of newly established fossil (nineteen 7.5 degree maps) of central basin data collections. This master suite of forty-four maps represents a considerably broader geographic range within the basin. Additionally, three field seasons of data were compiled into the master suite of maps after the final editing of the Professional Paper. These maps are the culmination of Dr. Bown's Bighorn Basin research as a vertebrate paleontologist for the USGS. Data include Yale, Wyoming, Duke, Michigan and USGS localities. Practical topographic features are also indicated, such as jeep=trail access, new reservoirs, rerouted roadbeds, measured sections, fossil reconnaissance evaluations (G=good, NG=no good and H=hideous), faults, palcosol stages, and occasionally 'camp' vernacular for locality names.

  4. Social behaviors and acoustic vocalizations in different strains of mice.

    PubMed

    Faure, Alexis; Pittaras, Elsa; Nosjean, Anne; Chabout, Jonathan; Cressant, Arnaud; Granon, Sylvie

    2017-03-01

    Proposing a framework for the study of core functions is valuable for understanding how they are altered in multiple mental disorders involving prefrontal dysfunction, for understanding genetic influences and for testing therapeutic compounds. Social and communication disabilities are reported in several major psychiatric disorders, and social communication disorders also can occur independently. Being able to study social communication involving interactions and associated acoustic vocalizations in animal models is thus important. All rodents display extensive social behaviors, including interactions and acoustic vocalizations. It is therefore important to pinpoint potential genetic-related strain differences -and similarities- in social behavior and vocalization. One approach is to compare different mouse strains, and this may be useful in choosing which strains may be best suitable in modeling psychiatric disorders where social and communication deficits are core symptoms. We compared social behavior and ultrasonic acoustic vocalization profiles in males of four mouse strains (129S2/Sv, C57BL/6J, DBA/2, and CD-1) using a social interaction task that we previously showed to rely on prefrontal network activity. Our social interaction task promotes a high level of ultrasonic vocalization with both social and acoustic parameters, and further allows other measures of social behaviors. The duration of social contact, dominance and aggressiveness varied with the mouse strains. Only C57BL/6J mice showed no attacks, with social contact being highly affiliative, whereas others strains emitted aggressive attacks. C57BL/6J mice also exhibited a significantly higher rate of ultrasonic vocalizations (USV), especially during social interaction. Copyright © 2016 Elsevier B.V. All rights reserved.

  5. When a Parent Has MS: A Teenager's Guide

    MedlinePlus

    ... synonymous with attack, relapse, flare-up or worsening. Money Strains There’s no question that MS can put ... on a family. There may not be enough money for extras like music lessons or sports, new ...

  6. Anaerobic Dehalogenation of Chloroanilines by Dehalococcoides mccartyi Strain CBDB1 and Dehalobacter Strain 14DCB1 via Different Pathways as Related to Molecular Electronic Structure.

    PubMed

    Zhang, Shangwei; Wondrousch, Dominik; Cooper, Myriel; Zinder, Stephen H; Schüürmann, Gerrit; Adrian, Lorenz

    2017-04-04

    Dehalococcoides mccartyi strain CBDB1 and Dehalobacter strain 14DCB1 are organohalide-respiring microbes of the phyla Chloroflexi and Firmicutes, respectively. Here, we report the transformation of chloroanilines by these two bacterial strains via dissimilar dehalogenation pathways and discuss the underlying mechanism with quantum chemically calculated net atomic charges of the substrate Cl, H, and C atoms. Strain CBDB1 preferentially removed Cl doubly flanked by two Cl or by one Cl and NH 2 , whereas strain 14DCB1 preferentially dechlorinated Cl that has an ortho H. For the CBDB1-mediated dechlorination, comparative analysis with Hirshfeld charges shows that the least-negative Cl discriminates active from nonactive substrates in 14 out of 15 cases and may represent the preferred site of primary attack through cob(I)alamin. For the latter trend, three of seven active substrates provide strong evidence, with partial support from three of the remaining four substrates. Regarding strain 14DCB1, the most positive carbon-attached H atom discriminates active from nonactive chloroanilines in again 14 out of 15 cases. Here, regioselectivity is governed for 10 of the 11 active substrates by the most positive H attached to the highest-charge (most positive or least negative) aromatic C carrying the Cl to be removed. These findings suggest the aromatic ring H as primary site of attack through the supernucleophile Co(I), converting an initial H bond to a full electron transfer as start of the reductive dehalogenation. For both mechanisms, one- and two-electron transfer to Cl (strain CBDB1) or H (strain 14DCB1) are compatible with the presently available data. Computational chemistry research into reaction intermediates and pathways may further aid in understanding the bacterial reductive dehalogenation at the molecular level.

  7. Comparison of concurrent strain gage- and pressure transducer-measured flight loads on a lifting reentry vehicle and correlation with wind tunnel predictions

    NASA Technical Reports Server (NTRS)

    Tang, M. H.; Sefic, W. J.; Sheldon, R. G.

    1978-01-01

    Concurrent strain gage and pressure transducer measured flight loads on a lifting reentry vehicle are compared and correlated with wind tunnel-predicted loads. Subsonic, transonic, and supersonic aerodynamic loads are presented for the left fin and control surfaces of the X-24B lifting reentry vehicle. Typical left fin pressure distributions are shown. The effects of variations in angle of attack, angle of sideslip, and Mach number on the left fin loads and rudder hinge moments are presented in coefficient form. Also presented are the effects of variations in angle of attack and Mach number on the upper flap, lower flap, and aileron hinge-moment coefficients. The effects of variations in lower flap hinge moments due to changes in lower flap deflection and Mach number are presented in terms of coefficient slopes.

  8. Development of an Aotus nancymaae Model for Shigella Vaccine Immunogenicity and Efficacy Studies

    PubMed Central

    Gregory, Michael; Lugo-Roman, Luis A.; Galvez Carrillo, Hugo; Tilley, Drake Hamilton; Baldeviano, Christian; Simons, Mark P.; Reynolds, Nathanael D.; Ranallo, Ryan T.; Suvarnapunya, Akamol E.; Venkatesan, Malabi M.; Oaks, Edwin V.

    2014-01-01

    Several animal models exist to evaluate the immunogenicity and protective efficacy of candidate Shigella vaccines. The two most widely used nonprimate models for vaccine development include a murine pulmonary challenge model and a guinea pig keratoconjunctivitis model. Nonhuman primate models exhibit clinical features and gross and microscopic colonic lesions that mimic those induced in human shigellosis. Challenge models for enterotoxigenic Escherichia coli (ETEC) and Campylobacter spp. have been successfully developed with Aotus nancymaae, and the addition of a Shigella-Aotus challenge model would facilitate the testing of combination vaccines. A series of experiments were designed to identify the dose of Shigella flexneri 2a strain 2457T that induces an attack rate of 75% in the Aotus monkey. After primary challenge, the dose required to induce an attack rate of 75% was calculated to be 1 × 1011 CFU. Shigella-specific immune responses were low after primary challenge and subsequently boosted upon rechallenge. However, preexisting immunity derived from the primary challenge was insufficient to protect against the homologous Shigella serotype. A successive study in A. nancymaae evaluated the ability of multiple oral immunizations with live-attenuated Shigella vaccine strain SC602 to protect against challenge. After three oral immunizations, animals were challenged with S. flexneri 2a 2457T. A 70% attack rate was demonstrated in control animals, whereas animals immunized with vaccine strain SC602 were protected from challenge (efficacy of 80%; P = 0.05). The overall study results indicate that the Shigella-Aotus nancymaae challenge model may be a valuable tool for evaluating vaccine efficacy and investigating immune correlates of protection. PMID:24595138

  9. Summary Report of the First International Symposium on Strain Gauge Balances and Workshop on AoA/Model Deformation Measurement Techniques

    NASA Technical Reports Server (NTRS)

    Tripp, John S.; Tcheng, Ping; Burner, Alpheus W.; Finley, Tom D.

    1999-01-01

    The first International Symposium on Strain Gauge Balances was sponsored under the auspices of the NASA Langley Research Center (LaRC), Hampton, Virginia during October 22-25, 1996. Held at the LaRC Reid Conference Center, the Symposium provided an open international forum for presentation, discussion, and exchange of technical information among wind tunnel test technique specialists and strain gauge balance designers. The Symposium also served to initiate organized professional activities among the participating and relevant international technical communities. The program included a panel discussion, technical paper sessions, tours of local facilities, and vendor exhibits. Over 130 delegates were in attendance from 15 countries. A steering committee was formed to plan a second international balance symposium tentatively scheduled to be hosted in the United Kingdom in 1998 or 1999. The Balance Symposium was followed by the half-day Workshop on Angle of Attack and Model Deformation on the afternoon of October 25. The thrust of the Workshop was to assess the state of the art in angle of attack (AoA) and model deformation measurement techniques and to discuss future developments.

  10. Enzyme activities and substrate degradation during white rot fungi growth on sugar-cane straw in a solid state fermentation.

    PubMed

    Ortega, G M; Martinez, E O; González, P C; Betancourt, D; Otero, M A

    1993-03-01

    Two strains of Pleurotus spp., grown in solid state fermentation on sugar-cane straw, degraded the dry matter by 50% after 60 days. The rate of substrate consumption and the dry weight of fruiting bodies decreased in consecutive flushings. Both strains vigorously attacked hemicellulose (80% of total degradation) and lignin (70%). Fruiting bodies were rich in protein and lipids, and had a low content of carbohydrates and ash.

  11. Mumps outbreak in vaccinated children in Gipuzkoa (Basque Country), Spain.

    PubMed Central

    Montes, M.; Cilla, G.; Artieda, J.; Vicente, D.; Basterretxea, M.

    2002-01-01

    A mumps outbreak occurred in a group of vaccinated children aged 3-4 years in San Sebastián (Gipuzkoa, Basque Country, Spain) in 2000 during the same period as a revaccination campaign against measles-mumps-rubella (MMR) was performed. The clinical cases were confirmed by viral culture, detection of viral RNA and/or specific IgM. Eighty-eight percent of the children had been vaccinated with the Rubini strain and the remainder with the Jeryl-Lynn strain. The attack rate was 47.9% (35 cases in 73 school-attending children of this age). The outbreak was caused by an H genotype strain of mumps virus which was circulating at the same time as a D genotype strain that caused sporadic cases. By sequencing the small hydrophobic (SH) gene, the strains of the clinical cases were identified as wild-type mumps virus with heterologous genotypes in comparison to the vaccine strains used in our area. PMID:12558338

  12. The Shigella human challenge model.

    PubMed

    Porter, C K; Thura, N; Ranallo, R T; Riddle, M S

    2013-02-01

    Shigella is an important bacterial cause of infectious diarrhoea globally. The Shigella human challenge model has been used since 1946 for a variety of objectives including understanding disease pathogenesis, human immune responses and allowing for an early assessment of vaccine efficacy. A systematic review of the literature regarding experimental shigellosis in human subjects was conducted. Summative estimates were calculated by strain and dose. While a total of 19 studies evaluating nine strains at doses ranging from 10 to 1 × 1010 colony-forming units were identified, most studies utilized the S. sonnei strain 53G and the S. flexneri strain 2457T. Inoculum solution and pre-inoculation buffering has varied over time although diarrhoea attack rates do not appear to increase above 75-80%, and dysentery rates remain fairly constant, highlighting the need for additional dose-ranging studies. Expansion of the model to include additional strains from different serotypes will elucidate serotype and strain-specific outcome variability.

  13. Biosynthesis of Pyocyanine by a Paraffin Hydrocarbon-oxidizing Strain of Pseudomonas aeruginosa

    PubMed Central

    Lee, E. G.-H.; Walden, C. C.

    1969-01-01

    A paraffin-oxidizing bacterium, designated as Pseudomonas aeruginosa ATS-14, was isolated from soil samples obtained from the Athabasca “tar sands.” This strain utilized kerosene as the only carbon source of energy and produced a high concentration of pyocyanine in the culture medium. Aromatic carbons were not attacked, but C10 to C17n-alkanes were readily oxidized by the pseudomonad and formed pyocyanine. The highest yield of the pigment was obtained from hexadecane and heptadecane. PMID:4977219

  14. Norovirus outbreaks: a systematic review of commonly implicated transmission routes and vehicles

    PubMed Central

    Bitler, E. J.; Matthews, J. E.; Dickey, B. W.; Eisenberg, J. N. S.; Leon, J. S.

    2013-01-01

    Summary Causal mechanisms of norovirus outbreaks are often not revealed. Understanding the transmission route (e.g., foodborne, waterborne, or environmental) and vehicle (e.g., shellfish or recreational water) of a norovirus outbreak, however, is of great public health importance; this information can facilitate interventions for an ongoing outbreak and regulatory action to limit future outbreaks. Towards this goal, we conducted a systematic review to examine whether published outbreak information was associated with the implicated transmission route or vehicle. Genogroup distribution was associated with transmission route and food vehicle, but attack rate and the presence of GII.4 strain were not associated with transmission route, food vehicle, or water vehicle. Attack rate, genogroup distribution, and GII.4 strain distribution also varied by other outbreak characteristics (e.g. setting, season, and hemisphere). These relationships suggest that different genogroups exploit different environmental conditions and thereby can be used to predict the likelihood of various transmission routes or vehicles. PMID:23433247

  15. Evaluation of Gritting Strategies for High Angle of Attack Using Wind Tunnel and Flight Test Data for the F/A-18

    NASA Technical Reports Server (NTRS)

    Hall, Robert M.; Erickson, Gary E.; Fox, Charles H., Jr.; Banks, Daniel W.; Fisher, David F.

    1998-01-01

    A subsonic study of high-angle-of-attack gritting strategies was undertaken with a 0.06-scale model of the F/A-18, which was assumed to be typical of airplanes with smooth-sided forebodies. This study was conducted in the Langley 7- by 10-Foot High-Speed Tunnel and was intended to more accurately simulate flight boundary layer characteristics on the model in the wind tunnel than would be possible by using classical, low-angle-of-attack gritting on the fuselage. Six-component force and moment data were taken with an internally mounted strain-gauge balance, while pressure data were acquired by using electronically scanned pressure transducers. Data were taken at zero sideslip over an angle-of-attack range from 0 deg to 40 deg and, at selected angles of attack, over sideslip angles from -10 deg to 10 deg. Free-stream Mach number was fixed at 0.30, which resulted in a Reynolds number, based on mean aerodynamic chord, of 1.4 x 10(exp 6). Pressure data measured over the forebody and leading-edge extensions are compared to similar pressure data taken by a related NASA flight research program by using a specially instrumented F/A-18, the High-Alpha Research Vehicle (HARV). Preliminary guidelines for high-angle-of-attack gritting strategies are given.

  16. Whole-cell biosensor of cellobiose and application to wood decay detection.

    PubMed

    Toussaint, Maxime; Bontemps, Cyril; Besserer, Arnaud; Hotel, Laurence; Gérardin, Philippe; Leblond, Pierre

    2016-12-10

    Fungal biodegradation of wood is one of the main threats regarding its use as a material. So far, the detection of this decaying process is empirically assessed by loss of mass, when the fungal attack is advanced and woody structure already damaged. Being able to detect fungal attack on wood in earlier steps is thus of special interest for the wood economy. In this aim, we designed here a new diagnostic tool for wood degradation detection based on the bacterial whole-cell biosensor technology. It was designed in diverting the soil bacteria Streptomyces CebR sensor system devoted to cellobiose detection, a cellulolytic degradation by-product emitted by lignolytic fungi since the onset of wood decaying process. The conserved regulation scheme of the CebR system among Streptomyces allowed constructing a molecular tool easily transferable in different strains or species and enabling the screen for optimal host strains for cellobiose detection. Assays are performed in microplates using one-day culture lysates. Diagnostic is performed within one hour by a spectrophotometric measuring of the cathecol deshydrogenase activity. The selected biosensor was able to detect specifically cellobiose at concentrations similar to those measured in decaying wood and in a spruce leachate attacked by a lignolytic fungus, indicating a high potential of applicability to detect ongoing wood decay process. Copyright © 2016 Elsevier B.V. All rights reserved.

  17. Immune Response of Mormon Crickets that Survived Infection by Beauveria Bassiana

    USDA-ARS?s Scientific Manuscript database

    Beauveria bassiana is an entomopathogenic Ascomycete fungus that serves as a biological control agent of Mormon crickets (Anabrus simplex Haldeman) and other grasshopper pests. To measure the dose dependent response of Mormon crickets to fungal attack, we applied B. bassiana strain GHA topically to...

  18. Scopulariopsis sp. and Fusarium sp. in the Documentary Heritage: Evaluation of Their Biodeterioration Ability and Antifungal Effect of Two Essential Oils.

    PubMed

    Lavin, Paola; de Saravia, Sandra Gómez; Guiamet, Patricia

    2016-04-01

    Fungi produce pigments and acids, generating particular local conditions which modify the physicochemical properties of materials. The aims of this work are (i) to investigate bioadhesion, foxing production and biofilm formation by Scopulariopsis sp. and Fusarium sp. isolated from document collections under laboratory conditions; (ii) to verify attack on cellulose fibres and (iii) to study the possibility of reducing fungal growth using natural products. Biofilm formation and extracellular polymeric substance (EPS) production by fungi were demonstrated in laboratory assays and by scanning electron microscopy (SEM) observations. The biocidal activity of two essential oils of Origanum vulgare L. and Thymus vulgaris L. was evaluated using the microatmosphere method. SEM observations showed that these strains were able to attach to paper and form biofilms, causing damage on them, which demonstrates the biodeterioration ability of these microorganisms. Scopulariopsis sp. and Fusarium sp. isolated from paper books showed the formation of fox-like reddish-brown colour spots, attack to the paper structure and pigment production on aged paper samples. The strains tested produced a decrease in the pH of one unit. This would substantiate the effect of the strains in paper biodeterioration. The microatmosphere method showed that volatile compounds of the essential oils have antifungal activity.

  19. Space shuttle: Aerodynamic characteristics of cone-cylinder-flare-fin configurations at Mach numbers of 1.96, 2.74, and 4.96 and angles of attack from 50 to 90 degrees

    NASA Technical Reports Server (NTRS)

    Bradley, D.; Ellis, R. R.

    1972-01-01

    A 0.00227-scale parametric model of an LMSC/MSFC water recoverable booster was tested in the MSFC 14 x 14-inch trisonic wind tunnel. The purpose of the test was to obtain high angle of attack force and static stability data which could be used by MSFC in preliminary design and aerodynamic trade studies. These data were obtained using six-component internal strain gauge balances. One hundred forty-four different geometrical combinations were possible as all model parts were interchangeable (three nose cones, three cylinder lengths, four flare sections and three sets of fins, plus a no-fin case in combination with the other components). However, due to tunnel occupancy limitations, only the most representative combinations were tested. All configurations investigated were tested at Mach 1.96, 2.74 and 4.96 with data obtained at angles of attack from 50 degrees to 90 degrees and at angles of sideslip from -10 degrees to +10 degrees (at an angle of attack of 60 degrees).

  20. Estimating the Attack Ratio of Dengue Epidemics under Time-varying Force of Infection using Aggregated Notification Data

    NASA Astrophysics Data System (ADS)

    Coelho, Flavio Codeço; Carvalho, Luiz Max De

    2015-12-01

    Quantifying the attack ratio of disease is key to epidemiological inference and public health planning. For multi-serotype pathogens, however, different levels of serotype-specific immunity make it difficult to assess the population at risk. In this paper we propose a Bayesian method for estimation of the attack ratio of an epidemic and the initial fraction of susceptibles using aggregated incidence data. We derive the probability distribution of the effective reproductive number, Rt, and use MCMC to obtain posterior distributions of the parameters of a single-strain SIR transmission model with time-varying force of infection. Our method is showcased in a data set consisting of 18 years of dengue incidence in the city of Rio de Janeiro, Brazil. We demonstrate that it is possible to learn about the initial fraction of susceptibles and the attack ratio even in the absence of serotype specific data. On the other hand, the information provided by this approach is limited, stressing the need for detailed serological surveys to characterise the distribution of serotype-specific immunity in the population.

  1. It could have been me: vicarious victims and disaster-focused distress.

    PubMed

    Wayment, Heidi A

    2004-04-01

    College students who had experienced no personal bereavement in the September 11 terrorist attacks completed questionnaires between 3 and 5 weeks after the attacks and 5 months later. Cross-sectional and longitudinal structural equation model (SEM) analyses revealed that general distress and disaster-focused distress are discernable reactions following a collective loss. Both types of distress were higher among women and by those reporting social strain. General distress was associated with previous stressful events and mental health issues. Perceived similarity to the victims predicted disaster-focused distress and mediated the relationship between attending to media accounts of victims and disaster-focused distress. Only the disaster-focused distress reactions of survivor guilt and grief were associated with collective helping behaviors after the attacks and, for women, these behaviors were associated with greater reductions in these distress reactions over time. Discussion focuses on the importance of examining disaster-focused distress reactions following collective loss.

  2. The Y Chromosome Effect on Intermale Aggression in Mice Depends on the Maternal Environment

    PubMed Central

    Carlier, M.; Roubertoux, P. L.; Pastoret, C.

    1991-01-01

    Two parental strains of laboratory mice, NZB and CBA/H, were chosen for their differences in attack behavior. NZB have higher scores than CBA/H. An effect of the Y chromosome on attack behavior was determined for two maternal environments. Each male was tested once in a dyadic encounter with an A/J male as a standard opponent. The two reciprocal F(1)s and the four reciprocal backcrosses were used. In each group, the proportion of attacking males was used as the dependent variable. In the first experiment, the ovarian graft method was used to test for an effect of variation of the overall maternal environment: parental vs. F(1). The results demonstrated an interaction between the Y chromosome and the maternal environment. By use of the adoption method, it was shown in the second experiment that this maternal effect was probably postnatal (and not prenatal). PMID:1936960

  3. Analyses of battle casualties by weapon type aboard U.S. Navy warships.

    PubMed

    Blood, C G

    1992-03-01

    The number of casualties was determined for 513 incidents involving U.S. Navy warships sunk or damaged during World War II. Ship type and weapon were significant factors in determining the numbers of wounded and killed. Multiple weapon attacks and kamikazes yielded more wounded in action than other weapon types. Multiple weapons and torpedos resulted in a higher incidence of killed in action than other weapons. Penetrating wounds and burns were the most prominent injury types. Kamikaze attacks yielded significantly more burns than incidents involving bombs, gunfire, torpedos, mines, and multiple weapons. Mine explosions were responsible for more strains, sprains, and dislocations than the other weapon types.

  4. Effects of morning and night application of Beauveria bassiana strains NI8 and GHA against the tarnished plant bug in cotton

    USDA-ARS?s Scientific Manuscript database

    The tarnished plant bug, (TPB), Lygus lineolaris (Palisot de Beauvois), (Hemiptera: Miridae) an important pest of cotton (Gosssypium hirsutum L.) found in the Mississippi Delta is naturally attacked by the entomopathogenic fungus Beauveria bassiana (Balsamo) Vueillemin. In this study, two isolates o...

  5. An outbreak of influenza in a residential drug-rehabilitation community.

    PubMed

    Boschini, Antonio; Longo, Benedetta; Caselli, Francesca; Begnini, Marco; De Maria, Cesare; Ansaldi, Filippo; Durando, Paolo; Icardi, Giancarlo; Rezza, Giovanni

    2006-09-01

    Influenza outbreaks can be difficult to control in confined settings where high-risk individuals are concentrated. Following the occurrence of a large number of cases of influenza-like illness in a rehabilitation community for drug users, between February and March 2004, surveillance activities were implemented. Attack rates of influenza-like illness were calculated, and risk factors for the development of disease and complications were evaluated through the use of relative risks (RR) with 95% confidence intervals (CI). Nasal-pharyngeal samples were collected for virological studies. Of 1,310 persons who were living in the community, 209 were diagnosed with influenza-like illness: the attack rate (15.9% overall) was higher for HIV-infected persons (RR: 1.77, 95% CI: 1.32-2.37), older individuals, and dormitory residents. HIV-infected participants were also more likely to develop complications compared with HIV-uninfected persons diagnosed with influenza-like illness (RR: 5.13, 95% CI: 2.52-10.20). The outbreak was attributable to Christchurch-like influenza A strains. Vaccination was ineffective because of the mismatch between wild and vaccine strains.

  6. Active Vertical Tail Buffeting Alleviation on an F/A-18 Model in a Wind Tunnel

    NASA Technical Reports Server (NTRS)

    Moses, Robert W.

    1999-01-01

    A 1/6-scale F-18 wind-tunnel model was tested in the Transonic Dynamics Tunnel at the NASA Langley Research Center as part of the Actively Controlled Response Of Buffet-Affected Tails (ACROBAT) program to assess the use of active controls in reducing vertical tail buffeting. The starboard vertical tail was equipped with an active rudder and other aerodynamic devices, and the port vertical tail was equipped with piezoelectric actuators. The tunnel conditions were atmospheric air at a dynamic pressure of 14 psf. By using single-input-single-output control laws at gains well below the physical limits of the control effectors, the power spectral density of the root strains at the frequency of the first bending mode of the vertical tail was reduced by as much as 60 percent up to angles of attack of 37 degrees. Root mean square (RMS) values of root strain were reduced by as much as 19 percent. Stability margins indicate that a constant gain setting in the control law may be used throughout the range of angle of attack tested.

  7. Role of Bacillus subtilis Error Prevention Oxidized Guanine System in Counteracting Hexavalent Chromium-Promoted Oxidative DNA Damage

    PubMed Central

    Santos-Escobar, Fernando; Gutiérrez-Corona, J. Félix

    2014-01-01

    Chromium pollution is potentially detrimental to bacterial soil communities, compromising carbon and nitrogen cycles that are essential for life on earth. It has been proposed that intracellular reduction of hexavalent chromium [Cr(VI)] to trivalent chromium [Cr(III)] may cause bacterial death by a mechanism that involves reactive oxygen species (ROS)-induced DNA damage; the molecular basis of the phenomenon was investigated in this work. Here, we report that Bacillus subtilis cells lacking a functional error prevention oxidized guanine (GO) system were significantly more sensitive to Cr(VI) treatment than cells of the wild-type (WT) strain, suggesting that oxidative damage to DNA is involved in the deleterious effects of the oxyanion. In agreement with this suggestion, Cr(VI) dramatically increased the ROS concentration and induced mutagenesis in a GO-deficient B. subtilis strain. Alkaline gel electrophoresis (AGE) analysis of chromosomal DNA of WT and ΔGO mutant strains subjected to Cr(VI) treatment revealed that the DNA of the ΔGO strain was more susceptible to DNA glycosylase Fpg attack, suggesting that chromium genotoxicity is associated with 7,8-dihydro-8-oxodeoxyguanosine (8-oxo-G) lesions. In support of this notion, specific monoclonal antibodies detected the accumulation of 8-oxo-G lesions in the chromosomes of B. subtilis cells subjected to Cr(VI) treatment. We conclude that Cr(VI) promotes mutagenesis and cell death in B. subtilis by a mechanism that involves radical oxygen attack of DNA, generating 8-oxo-G, and that such effects are counteracted by the prevention and repair GO system. PMID:24973075

  8. Major phytopathogens and strains from cocoa (Theobroma cacao L.) are differentiated by MALDI-MS lipid and/or peptide/protein profiles.

    PubMed

    Dos Santos, Fábio Neves; Tata, Alessandra; Belaz, Kátia Roberta Anacleto; Magalhães, Dilze Maria Argôlo; Luz, Edna Dora Martins Newman; Eberlin, Marcos Nogueira

    2017-03-01

    Phytopathogens are the main disease agents that promote attack of cocoa plantations in all tropical countries. The similarity of the symptoms caused by different phytopathogens makes the reliable identification of the diverse species a challenge. Correct identification is important in the monitoring and management of these pests. Here we show that matrix-assisted laser desorption ionization mass spectrometry (MALDI-MS) in combination with multivariate data analysis is able to rapidly and reliably differentiate cocoa phytopathogens, namely Moniliophthora perniciosa, Phytophthora palmivora, P. capsici, P. citrophthora, P. heveae, Ceratocystis cacaofunesta, C. paradoxa, and C. fimbriata. MALDI-MS reveals unique peptide/protein and lipid profiles which differentiate these phytopathogens at the level of genus, species, and single strain coming from different hosts or cocoa tissues collected in several plantations/places. This fast methodology based on molecular biomarkers is also shown to be sufficiently reproducible and selective and therefore seems to offer a suitable tool to guide the correct application of sanitary defense approaches for infected cocoa plantations. International trading of cocoa plants and products could also be efficiently monitored by MALDI-MS. It could, for instance, prevent the entry of new phytopathogens into a country, e.g., as in the case of Moniliophthora roreri fungus that is present in all cocoa plantations of countries bordering Brazil, but that has not yet attacked Brazilian plantations. Graphical Abstract Secure identification of phytopathogens attacking cocoa plantations has been demonstrated via typical chemical profiles provided by mass spectrometric screening.

  9. Human symbionts inject and neutralize antibacterial toxins to persist in the gut.

    PubMed

    Wexler, Aaron G; Bao, Yiqiao; Whitney, John C; Bobay, Louis-Marie; Xavier, Joao B; Schofield, Whitman B; Barry, Natasha A; Russell, Alistair B; Tran, Bao Q; Goo, Young Ah; Goodlett, David R; Ochman, Howard; Mougous, Joseph D; Goodman, Andrew L

    2016-03-29

    The human gut microbiome is a dynamic and densely populated microbial community that can provide important benefits to its host. Cooperation and competition for nutrients among its constituents only partially explain community composition and interpersonal variation. Notably, certain human-associated Bacteroidetes--one of two major phyla in the gut--also encode machinery for contact-dependent interbacterial antagonism, but its impact within gut microbial communities remains unknown. Here we report that prominent human gut symbionts persist in the gut through continuous attack on their immediate neighbors. Our analysis of just one of the hundreds of species in these communities reveals 12 candidate antibacterial effector loci that can exist in 32 combinations. Through the use of secretome studies, in vitro bacterial interaction assays and multiple mouse models, we uncover strain-specific effector/immunity repertoires that can predict interbacterial interactions in vitro and in vivo, and find that some of these strains avoid contact-dependent killing by accumulating immunity genes to effectors that they do not encode. Effector transmission rates in live animals can exceed 1 billion events per minute per gram of colonic contents, and multiphylum communities of human gut commensals can partially protect sensitive strains from these attacks. Together, these results suggest that gut microbes can determine their interactions through direct contact. An understanding of the strategies human gut symbionts have evolved to target other members of this community may provide new approaches for microbiome manipulation.

  10. Host selection and lethality of attacks by sea lampreys (Petromyzon marinus) in laboratory studies

    USGS Publications Warehouse

    Swink, William D.

    2003-01-01

    Parasitic-phase sea lampreys (Petromyzon marinus) are difficult to study in the wild. A series of laboratory studies (1984-1995) of single attacks on lake trout (Salvelinus namaycush), rainbow trout (Oncorhynchus mykiss), and burbot (Lota lota) examined host size selection; determined the effects of host size, host species, host strain, and temperature on host mortality; and estimated the weight of hosts killed per lamprey. Rainbow trout were more able and burbot less able to survive attacks than lake trout. Small sea lampreys actively selected the larger of two small hosts; larger sea lampreys attacked larger hosts in proportion to the hosts' body sizes, but actively avoided shorter hosts (a?? 600 mm) when larger were available. Host mortality was significantly less for larger (43-44%) than for smaller hosts (64%). However, the yearly loss of hosts per sea lamprey was less for small hosts (range, 6.8-14.2 kg per sea lamprey) than larger hosts (range, 11.4-19.3 kg per sea lamprey). Attacks at the lower of two temperature ranges (6.1-11.8A?C and 11.1-15.0A?C) did not significantly reduce the percentage of hosts killed (54% vs. 69%, p > 0.21), but longer attachment times at lower temperatures reduced the number of hosts attacked (33 vs. 45), and produced the lowest loss of hosts (6.6 kg per sea lamprey). Low temperature appeared to offset other factors that increase host mortality. Reanalysis of 789 attacks pooled from these studies, using forward stepwise logistic regression, also identified mean daily temperature as the dominant factor affecting host mortality. Observations in Lakes Superior, Huron, and Ontario support most laboratory results.

  11. Vestibular syncope: A disorder associated with drop attack in Ménière's disease.

    PubMed

    Pyykkö, Ilmari; Manchaiah, Vinaya; Zou, Jing; Levo, Hilla; Kentala, Erna

    2018-04-01

    Experiments in humans and animals indicate that vestibular influx through vestibular sympathetic reflex is an important and vital part of the regulatory system of circulation. The otolith organ adjusts the circulatory responses through the vestibular sympathetic reflex during an upright stance and may trigger a vasovagal attack of syncope. The aim of the present study was to evaluate the prevalence and association of syncope attacks among patients with Ménière's disease (MD). Vestibular syncope was defined as a sudden and transient loss of consciousness, which subsides spontaneously in people with vestibular disorders and without localizing neurological deficit. During clinical interactions, we encountered 5 patients with syncope during a Tumarkin attack of MD. Thereafter we evaluated data from 952 patients collected with a questionnaire from the Finnish Ménière Association (FMA). The data contained case histories with special attention to Tumarkin attacks, participation restriction, migraines, and syncope attacks. The mean age of the subjects participating in the study was 60.6 years (range 25-75 years). The duration of the disease was on average 9.8 years (range 0.5-35 years). In the current study sample, attacks of syncope were reported by 38 patients (4%) in association with the vertigo attack. Syncope was associated with Tumarkin attacks (X 2 =16.7, p<0.001), migraine (X 2 =7.4, p<0.011), history of ischemic heart disease (X 2 =6.0, p<0.025), and history of cerebrovascular disease (X 2 =11.7, p<0.004). Duration of MD was correlated with syncope. Syncope was provoked by physical strain and environmental pressure, and was associated with impairment of the visual field (i.e., visual blurring). In logistic regression analysis, syncope was significantly associated with Tumarkin attacks (odds ratio 3.2), migraines (odds ratio 2.3) and nausea (odds ratio 1.3). The attack of syncope was experienced as frightening, and general health related quality of life (HRQoL) was significantly worsened. Also, the patients suffered more from fatigue. The current study indicates that patients with MD who suffer from Tumarkin attacks can suffer from syncope. It confirms the role of the otolith organ in controlling the circulatory homeostasis of the body. The actions are mediated through the vestibular sympathetic reflex. Copyright © 2017 Elsevier B.V. All rights reserved.

  12. "A hideous torture on himself": madness and self-mutilation in Victorian literature.

    PubMed

    Chaney, Sarah

    2011-12-01

    This paper suggests that late nineteenth-century definitions of self-mutilation, a new category of psychiatric symptomatology, were heavily influenced by the use of self-injury as a rhetorical device in the novel, for the literary text held a high status in Victorian psychology. In exploring Dimmesdale's "self-mutilation" in The Scarlet Letter in conjunction with psychiatric case histories, the paper indicates a number of common techniques and themes in literary and psychiatric texts. As well as illuminating key elements of nineteenth-century conceptions of the self, and the relation of mind and body through ideas of madness, this exploration also serves to highlight the social commentary implicit in many Victorian medical texts. Late nineteenth-century England, like mid-century New England, required the individual to help himself and, simultaneously, others; personal charity and individual philanthropy were encouraged, while state intervention was often presented as dubious. In both novel and psychiatric text, self-mutilation is thus presented as the ultimate act of selfish preoccupation, particularly in cases on the "borderlands" of insanity.

  13. Risk factors for Clostridium difficile infection in a hepatology ward.

    PubMed

    Vanjak, Dominique; Girault, Guillaume; Branger, Catherine; Rufat, Pierre; Valla, Dominique-Charles; Fantin, Bruno

    2007-02-01

    During 2001, Clostridium difficile infection was observed in 23 patients hospitalized in a hepatology ward (attack rate, 0.9%). Since strain typing ruled out a clonal dissemination, we performed a case-control study. In addition to antibiotic use as a risk factor, the C. difficile infection rate was higher among patients with autoimmune hepatitis (P<.01).

  14. WEAPONS-GRADE ANTHRAX: DETERMINING THE ID-50 (INHALATION) IN RHESUS MONKEYS USING A BIOLOGICALLY-BASED MODEL FOR USE IN HUMAN RISK ASSESSMENT

    EPA Science Inventory

    One of the significant discoveries following the bioterrorist attacks of October 2001 was that a modified form of Bacillus anthracis (Ames strain) was the causative agent. Physical alteration of the inoculum had occurred; the electrostatic charge had been altered and the resultin...

  15. Pathological and Molecular Characterization of Xanthomonas campestris Strains Causing Diseases of Cassava (Manihot esculenta)

    PubMed Central

    Verdier, Valérie; Boher, Bernard; Maraite, Henri; Geiger, Jean-Paul

    1994-01-01

    Fifty-one strains representing Xanthomonas campestris pv. manihotis and cassavae and different pathovars occurring on plants of the family Euphorbiaceae were characterized by ribotyping with a 16S+23S rRNA probe of Escherichia coli and by restriction fragment length polymorphism analysis with a plasmid probe from X. campestris pv. manihotis. Pathogenicity tests were performed on cassava (Manihot esculenta). Histological comparative studies were conducted on strains of two pathovars of X. campestris (vascular and mesophyllic) that attack cassava. Our results indicated that X. campestris pv. manihotis and cassavae have different modes of action in the host and supplemented the taxonomic data on restriction fragment length polymorphism that clearly separate the two pathovars. The plasmid probe could detect multiple restriction fragment length polymorphisms among strains of the pathovar studied. Ribotyping provides a useful tool for rapid identification of X. campestris pathovars on cassava. Images PMID:16349463

  16. Cysteine proteinase from Streptococcus pyogenes enables evasion of innate immunity via degradation of complement factors.

    PubMed

    Honda-Ogawa, Mariko; Ogawa, Taiji; Terao, Yutaka; Sumitomo, Tomoko; Nakata, Masanobu; Ikebe, Kazunori; Maeda, Yoshinobu; Kawabata, Shigetada

    2013-05-31

    Streptococcus pyogenes is an important human pathogen that causes invasive diseases such as necrotizing fasciitis, sepsis, and streptococcal toxic shock syndrome. We investigated the function of a major cysteine protease from S. pyogenes that affects the amount of C1-esterase inhibitor (C1-INH) and other complement factors and aimed to elucidate the mechanism involved in occurrence of streptococcal toxic shock syndrome from the aspect of the complement system. First, we revealed that culture supernatant of a given S. pyogenes strain and recombinant SpeB degraded the C1-INH. Then, we determined the N-terminal sequence of the C1-INH fragment degraded by recombinant SpeB. Interestingly, the region containing one of the identified cleavage sites is not present in patients with C1-INH deficiency. Scanning electron microscopy of the speB mutant incubated in human serum showed the abnormal superficial architecture and irregular oval structure. Furthermore, unlike the wild-type strain, that mutant strain showed lower survival capacity than normal as compared with heat-inactivated serum, whereas it had a significantly higher survival rate in serum without the C1-INH than in normal serum. Also, SpeB degraded multiple complement factors and the membrane attack complex. Flow cytometric analyses revealed deposition of C9, one of the components of membrane the attack complex, in greater amounts on the surface of the speB mutant, whereas lower amounts of C9 were bound to the wild-type strain surface. These results suggest that SpeB can interrupt the human complement system via degrading the C1-INH, thus enabling S. pyogenes to evade eradication in a hostile environment.

  17. Ancient, recurrent phage attacks and recombination shaped dynamic sequence-variable mosaics at the root of phytoplasma genome evolution.

    PubMed

    Wei, Wei; Davis, Robert E; Jomantiene, Rasa; Zhao, Yan

    2008-08-19

    Mobile genetic elements have impacted biological evolution across all studied organisms, but evidence for a role in evolutionary emergence of an entire phylogenetic clade has not been forthcoming. We suggest that mobile element predation played a formative role in emergence of the phytoplasma clade. Phytoplasmas are cell wall-less bacteria that cause numerous diseases in plants. Phylogenetic analyses indicate that these transkingdom parasites descended from Gram-positive walled bacteria, but events giving rise to the first phytoplasma have remained unknown. Previously we discovered a unique feature of phytoplasmal genome architecture, genes clustered in sequence-variable mosaics (SVMs), and suggested that such structures formed through recurrent, targeted attacks by mobile elements. In the present study, we discovered that cryptic prophage remnants, originating from phages in the order Caudovirales, formed SVMs and comprised exceptionally large percentages of the chromosomes of 'Candidatus Phytoplasma asteris'-related strains OYM and AYWB, occupying nearly all major nonsyntenic sections, and accounting for most of the size difference between the two genomes. The clustered phage remnants formed genomic islands exhibiting distinct DNA physical signatures, such as dinucleotide relative abundance and codon position GC values. Phytoplasma strain-specific genes identified as phage morons were located in hypervariable regions within individual SVMs, indicating that prophage remnants played important roles in generating phytoplasma genetic diversity. Because no SVM-like structures could be identified in genomes of ancestral relatives including Acholeplasma spp., we hypothesize that ancient phage attacks leading to SVM formation occurred after divergence of phytoplasmas from acholeplasmas, triggering evolution of the phytoplasma clade.

  18. Mortality and reduced brood production in walnut twig beetles, Pityophthorus juglandis (Coleoptera: Curculionidae), following exposure to commercial strains of Beauveria bassiana and Metarhizium brunneum

    USDA-ARS?s Scientific Manuscript database

    Thousand cankers disease (TCD), caused by the walnut twig beetle (WTB), Pityophthorus juglandis, and its associated fungal symbiont, Geosmithia morbida, is a disease of economic and ecological concern on eastern black walnut, Juglans nigra. Numerous attacks and gallery formation by the WTB and subse...

  19. Vertical Tail Buffeting Alleviation Using Piezoelectric Actuators: Some Results of the Actively Controlled Response of Buffet-Affected Tails (ACROBAT) Program

    NASA Technical Reports Server (NTRS)

    Moses, Robert W.

    1997-01-01

    A 1/6-scale F-18 wind-tunnel model was tested in the Transonic Dynamics Tunnel at the NASA Langley Research Center as part of the Actively Controlled Response Of Buffet Affected Tails (ACROBAT) program to assess the use of active controls in reducing vertical tail buffeting. The starboard vertical tail was equipped with an active rudder and the port vertical tail was equipped with piezoelectric actuators. The tunnel conditions were atmospheric air at a dynamic pressure of 14 psf. By using single-input-single-output control laws at gains well below the physical limits of the actuators, the power spectral density of the root strains at the frequency of the first bending mode of the vertical tail was reduced by as much as 60 percent up to angles of attack of 37 degrees. Root mean square (RMS) values of root strain were reduced by as much as 19 percent. Buffeting alleviation results when using the rudder are presented for comparison. Stability margins indicate that a constant gain setting in the control law may be used throughout the range of angle of attack tested.

  20. Rifle bullet penetration into ballistic gelatin.

    PubMed

    Wen, Yaoke; Xu, Cheng; Jin, Yongxi; Batra, R C

    2017-03-01

    The penetration of a rifle bullet into a block of ballistic gelatin is experimentally and computationally studied for enhancing our understanding of the damage caused to human soft tissues. The gelatin is modeled as an isotropic and homogeneous elastic-plastic linearly strain-hardening material that obeys a polynomial equation of state. Effects of numerical uncertainties on penetration characteristics are found by repeating simulations with minute variations in the impact speed and the angle of attack. The temporary cavity formed in the gelatin and seen in pictures taken by two high speed cameras is found to compare well with the computed one. The computed time histories of the hydrostatic pressure at points situated 60 mm above the line of impact are found to have "two peaks", one due to the bullet impact and the other due to the bullet tumbling. Contours of the von Mises stress and of the effective plastic strain in the gelatin block imply that a very small region adjacent to the cavity surface is plastically deformed. The angle of attack is found to noticeably affect the penetration depth at the instant of the bullet tumbling through 90°. Copyright © 2016 Elsevier Ltd. All rights reserved.

  1. Metabolism of tetralin (1,2,3,4-tetrahydronaphthalene) in Corynebacterium sp. strain C125

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sikkema, J.; Bont, J.A.M. de

    1993-02-01

    Tetralin, widely used as a solvent in the petrochemical industry and in paints and waxes, degrades slowly in mixed cultures of microorganisms or in the presence of cosubstrates. This study reports on the metabolism of tetralin in the o-xylene-isolated Corynebacterium sp. strain C125. The researchers found that this organism attacks tetralin by an initial oxidation of the aromatic nucleus at positions C-5 and C-6 and they propose a four step inducible degradation pathway for tetralin starting at that point. The presence of the pathway makes this bacteria an excellent catalyst for the specific production of special cis-dihydro diols.

  2. Importance of exfoliatin toxin A production by Staphylococcus aureus strains isolated from clustered epidemics of neonatal pustulosis.

    PubMed Central

    Kaplan, M H; Chmel, H; Hsieh, H C; Stephens, A; Brinsko, V

    1986-01-01

    Clustered epidemics of pustulosis due to Staphylococcus aureus occurred in two geographically distant newborn nurseries. In nurseries A and B an attack rate of pustulosis of 0.8 and 2.0 cases per 100 live births occurred, respectively. Experimental phage type 1046/1116 belonging to phage group II dominated clustered epidemics in nursery A, while group II phage type 3A/3C/55/71 and 3A/3C/55 occurred in nursery B. Other group II strains also occasionally produced clustered epidemics. These epidemic strains were found to be making heat-stable dermal exfoliatin toxin A (ETA) which had a pI of 6.8 and a molecular weight of 32,000 and 33,000. ETA-bearing strains did not make bacteriocin. Children infected with ETA-producing strains developed extensive bullous pustulosis. Surveillance cultures of personnel revealed an ETA-bearing strain in only one person. This strain was not the same phage type as the epidemic cluster. In contrast, ETA-bearing epidemic strains were found in the inanimate environment of both nurseries. ETA protein acts as an important virulence factor in the production of neonatal pustulosis infection and appears to be linked with the ability of S. aureus organisms to stick to the inanimate environment. Images PMID:3700612

  3. Yeasts associated with the curculionid beetle Xyloterinus politus: Candida xyloterini sp. nov., Candida palmyrensis sp. nov. and three common ambrosia yeasts.

    PubMed

    Suh, Sung-Oui; Zhou, Jianlong

    2010-07-01

    Seven yeast strains were isolated from the body surface and galleries of Xyloterinus politus, the ambrosia beetle that attacks black oak trees. Based on rDNA sequence comparisons and other taxonomic characteristics, five of the strains were identified as members of the species Saccharomycopsis microspora, Wickerhamomyces hampshirensis and Candida mycetangii, which have been reported previously as being associated with insects. The remaining two yeast strains were proposed as representatives of two novel species, Candida xyloterini sp. nov. (type strain ATCC 62898(T)=CBS 11547(T)) and Candida palmyrensis sp. nov. (type strain ATCC 62899(T)=CBS 11546(T)). C. xyloterini sp. nov. is a close sister taxon to Ogataea dorogensis and assimilates methanol as a sole carbon source but lacks ascospores. On the other hand, C. palmyrensis sp. nov. is phylogenetically distinct from any other ambrosia yeast reported so far. The species was placed near Candida sophiae-reginae and Candida beechii based on DNA sequence analyses, but neither of these were close sister taxa to C. palmyrensis sp. nov.

  4. Method: a single nucleotide polymorphism genotyping method for Wheat streak mosaic virus.

    PubMed

    Rogers, Stephanie M; Payton, Mark; Allen, Robert W; Melcher, Ulrich; Carver, Jesse; Fletcher, Jacqueline

    2012-05-17

    The September 11, 2001 attacks on the World Trade Center and the Pentagon increased the concern about the potential for terrorist attacks on many vulnerable sectors of the US, including agriculture. The concentrated nature of crops, easily obtainable biological agents, and highly detrimental impacts make agroterrorism a potential threat. Although procedures for an effective criminal investigation and attribution following such an attack are available, important enhancements are still needed, one of which is the capability for fine discrimination among pathogen strains. The purpose of this study was to develop a molecular typing assay for use in a forensic investigation, using Wheat streak mosaic virus (WSMV) as a model plant virus. This genotyping technique utilizes single base primer extension to generate a genetic fingerprint. Fifteen single nucleotide polymorphisms (SNPs) within the coat protein and helper component-protease genes were selected as the genetic markers for this assay. Assay optimization and sensitivity testing was conducted using synthetic targets. WSMV strains and field isolates were collected from regions around the world and used to evaluate the assay for discrimination. The assay specificity was tested against a panel of near-neighbors consisting of genetic and environmental near-neighbors. Each WSMV strain or field isolate tested produced a unique SNP fingerprint, with the exception of three isolates collected within the same geographic location that produced indistinguishable fingerprints. The results were consistent among replicates, demonstrating the reproducibility of the assay. No SNP fingerprints were generated from organisms included in the near-neighbor panel, suggesting the assay is specific for WSMV. Using synthetic targets, a complete profile could be generated from as low as 7.15 fmoles of cDNA. The molecular typing method presented is one tool that could be incorporated into the forensic science tool box after a thorough validation study. This method incorporates molecular biology techniques that are already well established in research and diagnostic laboratories, allowing for an easy introduction of this method into existing laboratories. single nucleotide polymorphisms, genotyping, plant pathology, viruses, microbial forensics, Single base primer extension, SNaPshot Multiplex Kit.

  5. Method: a single nucleotide polymorphism genotyping method for Wheat streak mosaic virus

    PubMed Central

    2012-01-01

    Background The September 11, 2001 attacks on the World Trade Center and the Pentagon increased the concern about the potential for terrorist attacks on many vulnerable sectors of the US, including agriculture. The concentrated nature of crops, easily obtainable biological agents, and highly detrimental impacts make agroterrorism a potential threat. Although procedures for an effective criminal investigation and attribution following such an attack are available, important enhancements are still needed, one of which is the capability for fine discrimination among pathogen strains. The purpose of this study was to develop a molecular typing assay for use in a forensic investigation, using Wheat streak mosaic virus (WSMV) as a model plant virus. Method This genotyping technique utilizes single base primer extension to generate a genetic fingerprint. Fifteen single nucleotide polymorphisms (SNPs) within the coat protein and helper component-protease genes were selected as the genetic markers for this assay. Assay optimization and sensitivity testing was conducted using synthetic targets. WSMV strains and field isolates were collected from regions around the world and used to evaluate the assay for discrimination. The assay specificity was tested against a panel of near-neighbors consisting of genetic and environmental near-neighbors. Result Each WSMV strain or field isolate tested produced a unique SNP fingerprint, with the exception of three isolates collected within the same geographic location that produced indistinguishable fingerprints. The results were consistent among replicates, demonstrating the reproducibility of the assay. No SNP fingerprints were generated from organisms included in the near-neighbor panel, suggesting the assay is specific for WSMV. Using synthetic targets, a complete profile could be generated from as low as 7.15 fmoles of cDNA. Conclusion The molecular typing method presented is one tool that could be incorporated into the forensic science tool box after a thorough validation study. This method incorporates molecular biology techniques that are already well established in research and diagnostic laboratories, allowing for an easy introduction of this method into existing laboratories. Keywords: single nucleotide polymorphisms, genotyping, plant pathology, viruses, microbial forensics, Single base primer extension, SNaPshot Multiplex Kit PMID:22594601

  6. Vertical Tail Buffeting Alleviation Using Piezoelectric Actuators-Some Results of the Actively Controlled Response of Buffet-Affected Tails (ACROBAT) Program

    NASA Technical Reports Server (NTRS)

    Moses, Robert W.

    1997-01-01

    Buffet is an aeroelastic phenomenon associated with high performance aircraft especially those with twin vertical tails. In particular, for the F/A-18 aircraft at high angles of attack, vortices emanating from wing/fuselage leading edge extensions burst, immersing the vertical tails in their wake. The resulting buffet loads on the vertical tails are a concern from fatigue and inspection points of view. Recently, a 1/6-scale F-18 wind-tunnel model was tested in the Transonic Dynamics Tunnel at the NASA Langley Research Center as part of the Actively Controlled Response Of Buffet Affected Tails (ACROBAT) Program to assess the use of active controls in reducing vertical tail buffeting. The starboard vertical tail was equipped with an active rudder and the port vertical tail was equipped with piezoelectric actuators. The tunnel conditions were atmospheric air at Mach 0.10. By using single-input-single-output control laws at gains well below the physical limits of the actuators, the power spectral density of the root strains at the frequency of the first bending mode of the vertical tail was reduced by as much as 60 percent up to angles of attack of 37 degrees. Root mean square (RMS) values of root strain were reduced by as much as 19 percent. The results herein illustrate that buffet alleviation of vertical tails can be accomplished using simple active control of the rudder or piezoelectric actuators. In fact, as demonstrated herein, a fixed gain single input single output control law that commands piezoelectric actuators may be active throughout the high angle-of-attack maneuver without requiring any changes during the maneuver. Future tests are mentioned for accentuating the international interest in this area of research.

  7. Male killing Spiroplasma protects Drosophila melanogaster against two parasitoid wasps

    PubMed Central

    Xie, J; Butler, S; Sanchez, G; Mateos, M

    2014-01-01

    Maternally transmitted associations between endosymbiotic bacteria and insects are diverse and widespread in nature. Owing to imperfect vertical transmission, many heritable microbes have evolved compensational mechanisms to enhance their persistence in host lineages, such as manipulating host reproduction and conferring fitness benefits to host. Symbiont-mediated defense against natural enemies of hosts is increasingly recognized as an important mechanism by which endosymbionts enhance host fitness. Members of the genus Spiroplasma associated with distantly related Drosophila hosts are known to engage in either reproductive parasitism (i.e., male killing) or defense against natural enemies (the parasitic wasp Leptopilina heterotoma and a nematode). A male-killing strain of Spiroplasma (strain Melanogaster Sex Ratio Organism (MSRO)) co-occurs with Wolbachia (strain wMel) in certain wild populations of the model organism Drosophila melanogaster. We examined the effects of Spiroplasma MSRO and Wolbachia wMel on Drosophila survival against parasitism by two common wasps, Leptopilina heterotoma and Leptopilina boulardi, that differ in their host ranges and host evasion strategies. The results indicate that Spiroplasma MSRO prevents successful development of both wasps, and confers a small, albeit significant, increase in larva-to-adult survival of flies subjected to wasp attacks. We modeled the conditions under which defense can contribute to Spiroplasma persistence. Wolbachia also confers a weak, but significant, survival advantage to flies attacked by L. heterotoma. The host protective effects exhibited by Spiroplasma and Wolbachia are additive and may provide the conditions for such cotransmitted symbionts to become mutualists. Occurrence of Spiroplasma-mediated protection against distinct parasitoids in divergent Drosophila hosts suggests a general protection mechanism. PMID:24281548

  8. Bacterial virulence effectors and their activities.

    PubMed

    Hann, Dagmar R; Gimenez-Ibanez, Selena; Rathjen, John P

    2010-08-01

    The major virulence strategy for plant pathogenic bacteria is deployment of effector molecules within the host cytoplasm. Each bacterial strain possesses a set of 20-30 effectors which have overlapping activities, are functionally interchangeable, and diverge in composition between strains. Effectors target host molecules to suppress immunity. Two main strategies are apparent. Effectors that target host proteins seem to attack conserved structural domains but otherwise lack specificity. On the other hand, those that influence host gene transcription directly do so with extreme specificity. In both cases, examples are known where the host has exploited effector-target affinities to establish immune recognition of effectors. The molecular activity of each effector links virulence and immune outcomes. Copyright 2010 Elsevier Ltd. All rights reserved.

  9. Phylogeny and immune evasion: a putative correlation for cerebral Pseudallescheria/Scedosporium infections.

    PubMed

    Rainer, Johannes; Rambach, Günter; Kaltseis, Josef; Hagleitner, Magdalena; Heiss, Silvia; Speth, Cornelia

    2011-10-01

    Representatives of the genus Pseudallescheria (anamorph: Scedosporium) are saprobes and the aetiologic agent of invasive mycosis in humans. After dissemination, the central nervous system (CNS) is one of the most affected organs. Prerequisites for the survival of Pseudallescheria/Scedosporium in the host are the ability to acquire nutrients and to evade the immune attack. The cleavage of complement compounds via the secretion of fungal proteases might meet both challenges since proteolytic degradation of proteins can provide nutrients and destroy the complement factors, a fast and effective immune weapon in the CNS. Therefore, we studied the capacity of different Pseudallescheria/Scedosporium species to degrade key elements of the complement cascade in the cerebrospinal fluid and investigated a correlation with the phylogenetic background. The majority of the Pseudallescheria apiosperma isolates tested were demonstrated to efficiently eliminate proteins like complement factors C3 and C1q, thus affecting two main components of a functional complement cascade, presumably by proteolytic degradation, and using them as nutrient source. In contrast, the tested strains of Pseudallescheria boydii have no or only weak capacity to eliminate these complement proteins. We hypothesise that the ability of Pseudallescheria/Scedosporium strains to acquire nutrients and to undermine the complement attack is at least partly phylogenetically determined. © 2011 Blackwell Verlag GmbH.

  10. Inactivation of SAM-Methyltransferase is the Mechanism of Attenuation of a Historic Louse Borne Typhus Vaccine Strain

    PubMed Central

    Liu, Yan; Wu, Bin; Weinstock, George; Walker, David H.; Yu, Xue-jie

    2014-01-01

    Louse borne typhus (also called epidemic typhus) was one of man's major scourges, and epidemics of the disease can be reignited when social, economic, or political systems are disrupted. The fear of a bioterrorist attack using the etiologic agent of typhus, Rickettsia prowazekii, was a reality. An attenuated typhus vaccine, R. prowazekii Madrid E strain, was observed to revert to virulence as demonstrated by isolation of the virulent revertant Evir strain from animals which were inoculated with Madrid E strain. The mechanism of the mutation in R. prowazekii that affects the virulence of the vaccine was not known. We sequenced the genome of the virulent revertant Evir strain and compared its genome sequence with the genome sequences of its parental strain, Madrid E. We found that only a single nucleotide in the entire genome was different between the vaccine strain Madrid E and its virulent revertant strain Evir. The mutation is a single nucleotide insertion in the methyltransferase gene (also known as PR028) in the vaccine strain that inactivated the gene. We also confirmed that the vaccine strain E did not cause fever in guinea pigs and the virulent revertant strain Evir caused fever in guinea pigs. We concluded that a single nucleotide insertion in the methyltransferase gene of R. prowazekii attenuated the R. prowazekii vaccine strain E. This suggested that an irreversible insertion or deletion mutation in the methyl transferase gene of R. prowazekii is required for Madrid E to be considered a safe vaccine. PMID:25412248

  11. Inactivation of SAM-methyltransferase is the mechanism of attenuation of a historic louse borne typhus vaccine strain.

    PubMed

    Liu, Yan; Wu, Bin; Weinstock, George; Walker, David H; Yu, Xue-Jie

    2014-01-01

    Louse borne typhus (also called epidemic typhus) was one of man's major scourges, and epidemics of the disease can be reignited when social, economic, or political systems are disrupted. The fear of a bioterrorist attack using the etiologic agent of typhus, Rickettsia prowazekii, was a reality. An attenuated typhus vaccine, R. prowazekii Madrid E strain, was observed to revert to virulence as demonstrated by isolation of the virulent revertant Evir strain from animals which were inoculated with Madrid E strain. The mechanism of the mutation in R. prowazekii that affects the virulence of the vaccine was not known. We sequenced the genome of the virulent revertant Evir strain and compared its genome sequence with the genome sequences of its parental strain, Madrid E. We found that only a single nucleotide in the entire genome was different between the vaccine strain Madrid E and its virulent revertant strain Evir. The mutation is a single nucleotide insertion in the methyltransferase gene (also known as PR028) in the vaccine strain that inactivated the gene. We also confirmed that the vaccine strain E did not cause fever in guinea pigs and the virulent revertant strain Evir caused fever in guinea pigs. We concluded that a single nucleotide insertion in the methyltransferase gene of R. prowazekii attenuated the R. prowazekii vaccine strain E. This suggested that an irreversible insertion or deletion mutation in the methyl transferase gene of R. prowazekii is required for Madrid E to be considered a safe vaccine.

  12. Ribosomal Alterations Controlling Alkaline Phosphatase Isozymes in Escherichia coli

    PubMed Central

    Piggot, P. J.; Sklar, M. D.; Gorini, L.

    1972-01-01

    Different patterns of isozymes were obtained by starch-gel electrophoresis of alkaline phosphatase from Escherichia coli strains differing only by strA or ram mutations, or both, in the 30S ribosomal subunit. The isozyme spread was reduced in strA and increased in ram strains; this strictly parallels the restriction and enhancement of translational ambiguity produced by these mutations. Streptomycin present during growth had an effect similar to ram on both isozymes and ambiguity. The three isozymes analyzed have different N-terminal residues: aspartic acid, valine, and threonine. Different patterns of isozymes were also obtained in a wild-type strain through the specific action of exogenous arginine. A link between the mechanism of the effect of arginine and that of the ribosome is not obvious. The possibility is discussed that in both cases, although by different mechanisms, N-terminals are formed with different sensitivity to limited degradative attack. Images PMID:4552993

  13. Lactococcus lactis Diversity in Undefined Mixed Dairy Starter Cultures as Revealed by Comparative Genome Analyses and Targeted Amplicon Sequencing of epsD.

    PubMed

    Frantzen, Cyril A; Kleppen, Hans Petter; Holo, Helge

    2018-02-01

    Undefined mesophilic mixed (DL) starter cultures are used in the production of continental cheeses and contain unknown strain mixtures of Lactococcus lactis and leuconostocs. The choice of starter culture affects the taste, aroma, and quality of the final product. To gain insight into the diversity of Lactococcus lactis strains in starter cultures, we whole-genome sequenced 95 isolates from three different starter cultures. Pan-genomic analyses, which included 30 publically available complete genomes, grouped the strains into 21 L. lactis subsp . lactis and 28 L. lactis subsp. cremoris lineages. Only one of the 95 isolates grouped with previously sequenced strains, and the three starter cultures showed no overlap in lineage distributions. The culture diversity was assessed by targeted amplicon sequencing using purR , a core gene, and epsD , present in 93 of the 95 starter culture isolates but absent in most of the reference strains. This enabled an unprecedented discrimination of starter culture Lactococcus lactis and revealed substantial differences between the three starter cultures and compositional shifts during the cultivation of cultures in milk. IMPORTANCE In contemporary cheese production, standardized frozen seed stock starter cultures are used to ensure production stability, reproducibility, and quality control of the product. The dairy industry experiences significant disruptions of cheese production due to phage attacks, and one commonly used countermeasure to phage attack is to employ a starter rotation strategy, in which two or more starters with minimal overlap in phage sensitivity are used alternately. A culture-independent analysis of the lactococcal diversity in complex undefined starter cultures revealed large differences between the three starter cultures and temporal shifts in lactococcal composition during the production of bulk starters. A better understanding of the lactococcal diversity in starter cultures will enable the development of more robust starter cultures and assist in maintaining the efficiency and stability of the production process by ensuring the presence of key bacteria that are important to the characteristics of the product. Copyright © 2018 American Society for Microbiology.

  14. Transcriptomics of the rice blast fungus Magnaporthe oryzae in response to the bacterial antagonist Lysobacter enzymogenes reveals candidate fungal defense response genes.

    PubMed

    Mathioni, Sandra M; Patel, Nrupali; Riddick, Bianca; Sweigard, James A; Czymmek, Kirk J; Caplan, Jeffrey L; Kunjeti, Sridhara G; Kunjeti, Saritha; Raman, Vidhyavathi; Hillman, Bradley I; Kobayashi, Donald Y; Donofrio, Nicole M

    2013-01-01

    Plants and animals have evolved a first line of defense response to pathogens called innate or basal immunity. While basal defenses in these organisms are well studied, there is almost a complete lack of understanding of such systems in fungal species, and more specifically, how they are able to detect and mount a defense response upon pathogen attack. Hence, the goal of the present study was to understand how fungi respond to biotic stress by assessing the transcriptional profile of the rice blast pathogen, Magnaporthe oryzae, when challenged with the bacterial antagonist Lysobacter enzymogenes. Based on microscopic observations of interactions between M. oryzae and wild-type L. enzymogenes strain C3, we selected early and intermediate stages represented by time-points of 3 and 9 hours post-inoculation, respectively, to evaluate the fungal transcriptome using RNA-seq. For comparative purposes, we also challenged the fungus with L. enzymogenes mutant strain DCA, previously demonstrated to be devoid of antifungal activity. A comparison of transcriptional data from fungal interactions with the wild-type bacterial strain C3 and the mutant strain DCA revealed 463 fungal genes that were down-regulated during attack by C3; of these genes, 100 were also found to be up-regulated during the interaction with DCA. Functional categorization of genes in this suite included those with roles in carbohydrate metabolism, cellular transport and stress response. One gene in this suite belongs to the CFEM-domain class of fungal proteins. Another CFEM class protein called PTH11 has been previously characterized, and we found that a deletion in this gene caused advanced lesion development by C3 compared to its growth on the wild-type fungus. We discuss the characterization of this suite of 100 genes with respect to their role in the fungal defense response.

  15. Molecular signatures in Arabidopsis thaliana in response to insect attack and bacterial infection.

    PubMed

    Barah, Pankaj; Winge, Per; Kusnierczyk, Anna; Tran, Diem Hong; Bones, Atle M

    2013-01-01

    Under the threat of global climatic change and food shortages, it is essential to take the initiative to obtain a comprehensive understanding of common and specific defence mechanisms existing in plant systems for protection against different types of biotic invaders. We have implemented an integrated approach to analyse the overall transcriptomic reprogramming and systems-level defence responses in the model plant species Arabidopsis thaliana (A. thaliana henceforth) during insect Brevicoryne brassicae (B. brassicae henceforth) and bacterial Pseudomonas syringae pv. tomato strain DC3000 (P. syringae henceforth) attacks. The main aim of this study was to identify the attacker-specific and general defence response signatures in A. thaliana when attacked by phloem-feeding aphids or pathogenic bacteria. The obtained annotated networks of differentially expressed transcripts indicated that members of transcription factor families, such as WRKY, MYB, ERF, BHLH and bZIP, could be crucial for stress-specific defence regulation in Arabidopsis during aphid and P. syringae attack. The defence response pathways, signalling pathways and metabolic processes associated with aphid attack and P. syringae infection partially overlapped. Components of several important biosynthesis and signalling pathways, such as salicylic acid (SA), jasmonic acid (JA), ethylene (ET) and glucosinolates, were differentially affected during the two the treatments. Several stress-regulated transcription factors were known to be associated with stress-inducible microRNAs. The differentially regulated gene sets included many signature transcription factors, and our co-expression analysis showed that they were also strongly co-expressed during 69 other biotic stress experiments. Defence responses and functional networks that were unique and specific to aphid or P. syringae stresses were identified. Furthermore, our analysis revealed a probable link between biotic stress and microRNAs in Arabidopsis and, thus gives indicates a new direction for conducting large-scale targeted experiments to explore the detailed regulatory links between them. The presented results provide a comparative understanding of Arabidopsis - B. brassicae and Arabidopsis - P. syringae interactions at the transcriptomic level.

  16. Reactive Molecular Dynamics Simulations to Understand Mechanical Response of Thaumasite under Temperature and Strain Rate Effects.

    PubMed

    Hajilar, Shahin; Shafei, Behrouz; Cheng, Tao; Jaramillo-Botero, Andres

    2017-06-22

    Understanding the structural, thermal, and mechanical properties of thaumasite is of great interest to the cement industry, mainly because it is the phase responsible for the aging and deterioration of civil infrastructures made of cementitious materials attacked by external sources of sulfate. Despite the importance, effects of temperature and strain rate on the mechanical response of thaumasite had remained unexplored prior to the current study, in which the mechanical properties of thaumasite are fully characterized using the reactive molecular dynamics (RMD) method. With employing a first-principles based reactive force field, the RMD simulations enable the description of bond dissociation and formation under realistic conditions. From the stress-strain curves of thaumasite generated in the x, y, and z directions, the tensile strength, Young's modulus, and fracture strain are determined for the three orthogonal directions. During the course of each simulation, the chemical bonds undergoing tensile deformations are monitored to reveal the bonds responsible for the mechanical strength of thaumasite. The temperature increase is found to accelerate the bond breaking rate and consequently the degradation of mechanical properties of thaumasite, while the strain rate only leads to a slight enhancement of them for the ranges considered in this study.

  17. Perspective and prospective of pretreatment of corn straw for butanol production.

    PubMed

    Baral, Nawa Raj; Li, Jiangzheng; Jha, Ajay Kumar

    2014-01-01

    Corn straw, lignocellulosic biomass, is a potential substrate for microbial production of bio-butanol. Bio-butanol is a superior second generation biofuel among its kinds. Present researches are focused on the selection of butanol tolerant clostridium strain(s) to optimize butanol yield in the fermentation broth because of toxicity of bio-butanol to the clostridium strain(s) itself. However, whatever the type of the strain(s) used, pretreatment process always affects not only the total sugar yield before fermentation but also the performance and growth of microbes during fermentation due to the formation of hydroxyl-methyl furfural, furfural and phenolic compounds. In addition, the lignocellulosic biomasses also resist physical and biological attacks. Thus, selection of best pretreatment process and its parameters is crucial. In this context, worldwide research efforts are increased in past 12 years and researchers are tried to identify the best pretreatment method, pretreatment conditions for the actual biomass. In this review, effect of particle size, status of most common pretreatment method and enzymatic hydrolysis particularly for corn straw as a substrate is presented. This paper also highlights crucial parameters necessary to consider during most common pretreatment processes such as hydrothermal, steam explosion, ammonia explosion, sulfuric acid, and sodium hydroxide pretreatment. Moreover, the prospective of pretreatment methods and challenges is discussed.

  18. Proteomic researches for lignocellulose-degrading enzymes: A mini-review.

    PubMed

    Guo, Hongliang; Wang, Xiao-Dong; Lee, Duu-Jong

    2018-05-31

    Protective action of lignin/hemicellulose networks and crystalline structures of embedded cellulose render lignocellulose material resistant to external enzymatic attack. To eliminate this bottleneck, research has been conducted in which advanced proteomic techniques are applied to identify effective commercial hydrolytic enzymes. This mini-review summarizes researches on lignocellulose-degrading enzymes, the mechanisms of the responses of various lignocellulose-degrading strains and microbial communities to various carbon sources and various biomass substrates, post-translational modifications of lignocellulose-degrading enzymes, new lignocellulose-degrading strains, new lignocellulose-degrading enzymes and a new method of secretome analysis. The challenges in the practical use of enzymatic hydrolysis process to realize lignocellulose biorefineries are discussed, along with the prospects for the same. Copyright © 2018 Elsevier Ltd. All rights reserved.

  19. Stable-isotope fingerprints of biological agents as forensic tools.

    PubMed

    Horita, Juske; Vass, Arpad A

    2003-01-01

    Naturally occurring stable isotopes of light elements in chemical and biological agents may possess unique "stable-isotope fingerprints" depending on their sources and manufacturing processes. To test this hypothesis, two strains of bacteria (Bacillus globigii and Erwinia agglomerans) were grown under controlled laboratory conditions. We observed that cultured bacteria cells faithfully inherited the isotopic composition (hydrogen, carbon, and nitrogen) of media waters and substrates in predictable manners in terms of bacterial metabolism and that even bacterial cells of the same strain, which grew in media water and substrates of different isotopic compositions, have readily distinguishable isotopic signatures. These "stable-isotopic fingerprints" of chemical and biological agents can be used as forensic tools in the event of biochemical terrorist attacks.

  20. Mesophilic Aeromonas sp. serogroup O:11 resistance to complement-mediated killing.

    PubMed Central

    Merino, S; Rubires, X; Aguilar, A; Albertí, S; Hernandez-Allés, S; Benedí, V J; Tomas, J M

    1996-01-01

    The complement activation by and resistance to complement-mediated killing of Aeromonas sp. strains from serogroup O:11 were investigated by using different wild-type strains (with an S-layer characteristic of this serogroup) and their isogenic mutants characterized for their surface components (S-layer and lipopolysaccharide [LPS]). All of the Aeromonas sp. serogroup O:11 wild-type strains are unable to activate complement, which suggested that the S-layer completely covered the LPS molecules. We found that the classical complement pathway is involved in serum killing of susceptible Aeromonas sp. mutant strains of serogroup O11, while the alternative complement pathway seems not to be involved, and that the complement activation seems to be independent of antibody. The smooth mutant strains devoid of the S-layer (S-layer isogenic mutants) or isogenic LPS mutant strains with a complete or rather complete LPS core (also without the S-layer) are able to activate complement but are resistant to complement-mediated killing. The reasons for this resistance are that C3b is rapidly degraded, and therefore the lytic membrane attack complex (C5b-9) is not formed. Isogenic LPS rough mutants with an incomplete LPS core are serum sensitive because they bind more C3b than the resistant strains, the C3b is not completely degraded, and therefore the lytic complex (C5b-9) is formed. PMID:8945581

  1. Demonstration of toxicity to fish and to mammalian cells by Pfiesteria species: Comparison of assay methods and strains

    PubMed Central

    Burkholder, JoAnn M.; Gordon, Andrew S.; Moeller, Peter D.; Law, J. Mac; Coyne, Kathryn J.; Lewitus, Alan J.; Ramsdell, John S.; Marshall, Harold G.; Deamer, Nora J.; Cary, S. Craig; Kempton, Jason W.; Morton, Steven L.; Rublee, Parke A.

    2005-01-01

    Toxicity and its detection in the dinoflagellate fish predators Pfiesteria piscicida and Pfiesteria shumwayae depend on the strain and the use of reliable assays. Two assays, standardized fish bioassays (SFBs) with juvenile fish and fish microassays (FMAs) with larval fish, were compared for their utility to detect toxic Pfiesteria. The comparison included strains with confirmed toxicity, negative controls (noninducible Pfiesteria strains and a related nontoxic cryptoperidiniopsoid dinoflagellate), and P. shumwayae strain CCMP2089, which previously had been reported as nontoxic. SFBs, standardized by using toxic Pfiesteria (coupled with tests confirming Pfiesteria toxin) and conditions conducive to toxicity expression, reliably detected actively toxic Pfiesteria, but FMAs did not. Pfiesteria toxin was found in fish- and algae-fed clonal Pfiesteria cultures, including CCMP2089, but not in controls. In contrast, noninducible Pfiesteria and cryptoperidiniopsoids caused no juvenile fish mortality in SFBs even at high densities, and low larval fish mortality by physical attack in FMAs. Filtrate from toxic strains of Pfiesteria spp. in bacteria-free media was cytotoxic. Toxicity was enhanced by bacteria and other prey, especially live fish. Purified Pfiesteria toxin extract adversely affected mammalian cells as well as fish, and it caused fish death at environmentally relevant cell densities. These data show the importance of testing multiple strains when assessing the potential for toxicity at the genus or species level, using appropriate culturing techniques and assays. PMID:15728353

  2. What difference does it make if viruses are strain-, rather than species-specific?

    PubMed Central

    Thingstad, T. Frede; Pree, Bernadette; Giske, Jarl; Våge, Selina

    2015-01-01

    Theoretical work has suggested an important role of lytic viruses in controlling the diversity of their prokaryotic hosts. Yet, providing strong experimental or observational support (or refutation) for this has proven evasive. Such models have usually assumed “host groups” to correspond to the “species” level, typically delimited by 16S rRNA gene sequence data. Recent model developments take into account the resolution of species into strains with differences in their susceptibility to viral attack. With strains as the host groups, the models will have explicit viral control of abundance at strain level, combined with explicit predator or resource control at community level, but the direct viral control at species level then disappears. Abundance of a species therefore emerges as the combination of how many strains, and at what abundance, this species can establish in competition with other species from a seeding community. We here discuss how species diversification and strain diversification may introduce competitors and defenders, respectively, and that the balance between the two may be a factor in the control of species diversity in mature natural communities. These models can also give a dominance of individuals from strains with high cost of resistance; suggesting that the high proportion of “dormant“ cells among pelagic heterotrophic prokaryotes may reflect their need for expensive defense rather than the lack of suitable growth substrates in their environment. PMID:25941522

  3. Prevention and cure of systemic Escherichia coli K1 infection by modification of the bacterial phenotype.

    PubMed

    Mushtaq, Naseem; Redpath, Maria B; Luzio, J Paul; Taylor, Peter W

    2004-05-01

    Escherichia coli is a common cause of meningitis and sepsis in the newborn infant, and the large majority of isolates from these infections produce a polysialic acid (PSA) capsular polysaccharide, the K1 antigen, that protects the bacterial cell from immune attack. We determined whether a capsule-depolymerizing enzyme, by removing this protective barrier, could alter the outcome of systemic infection in an animal model. Bacteriophage-derived endosialidase E (endoE) selectively degrades the PSA capsule on the surface of E. coli K1 strains. Intraperitoneal administration of small quantities of recombinant endoE (20 micro g) to 3-day-old rats, colonized with a virulent strain of K1, prevented bacteremia and death from systemic infection. The enzyme had no effect on the viability of E. coli strains but sensitized strains expressing PSA to killing by the complement system. This study demonstrates the potential therapeutic efficacy of agents that cure infections by modification of the bacterial phenotype rather than by killing or inhibition of growth of the pathogen.

  4. Outbreaks of Invasive Kingella kingae Infections in Closed Communities.

    PubMed

    Yagupsky, Pablo; Ben-Ami, Yael; Trefler, Ronit; Porat, Nurith

    2016-02-01

    To describe the results of the epidemiologic investigation of outbreaks of invasive Kingella kingae infections among attendees at daycare facilities located in 4 closed communities in Israel. The preschool-aged population of communities with clusters of Kingella cases had oropharyngeal cultures performed. K kingae isolates from infected patients and healthy contacts were genotyped by pulsed field gel electrophoresis to determine the spread of outbreak strains. The affected closed communities (3 military bases and 1 "kibbutz" commune) were characterized by tight social and family networks and intensive mingling. The outbreaks affected 9 of 51 attendees (attack rate: 17.6%) age 8-19 months (median: 12 months), within a 21-day period. Cases included skeletal system infections (n = 8) and bacteremia (n = 1); K kingae isolates were confirmed by the use of blood culture vials and selective media. Clinical presentation was mild and acute-phase reactants were usually normal or only moderately elevated. Thirty out of 55 (54.5%) asymptomatic children carried the outbreak strains. Analysis of the 3 clusters in which the entire preschool-aged population was cultured revealed that 31 of 71 (43.7%) children younger than 24 months of age were colonized with K kingae organisms compared with 8 of 105 (7.6%) older children (P < .001). Clusters of invasive K kingae infections characterized by sudden onset, high attack rate, and wide dissemination of the outbreak strain can occur in daycare facilities and closed communities. Because the mild clinical presentation of invasive K kingae infections and the fastidious nature of the organism, a high index of suspicion and use of sensitive detection methods are recommended. Copyright © 2016 Elsevier Inc. All rights reserved.

  5. Association of Job Stressors With Panic Attack and Panic Disorder in a Working Population in Japan: A Cross-Sectional Study.

    PubMed

    Asai, Yumi; Imamura, Kotaro; Kawakami, Norito

    2017-06-01

    This study aimed to investigate associations of job stressors with panic attack (PA) and panic disorder (PD) among Japanese workers. A cross-sectional online questionnaire survey was conducted of 2060 workers. Job strain, effort/reward imbalance, and workplace social support were measured by the job content questionnaire and effort/reward imbalance questionnaire. These variables were classified into tertiles. PA/PD were measured by self-report based on the mini international neuropsychiatric interview (MINI). Multiple logistic regression was conducted, adjusting for demographic, lifestyle, and health-related covariates. Data from 1965 participants were analyzed. Adjusted odds ratio (OR) of PA/PD was significantly greater for the group with high effort/reward imbalance compared with the group with low effort/reward imbalance (ORs, 2.64 and 2.94, respectively, both P < 0.05). This study found effort/reward imbalance was associated with having PA/PD among Japanese workers.

  6. Wind-tunnel investigation of effects of wing-leading-edge modifications on the high angle-of-attack characteristics of a T-tail low-wing general-aviation aircraft

    NASA Technical Reports Server (NTRS)

    White, E. R.

    1982-01-01

    Exploratory tests have been conducted in the NASA-Langley Research Center's 12-Foot Low-Speed wind Tunnel to evaluate the application of wing-leading-edge devices on the stall-departure and spin resistance characteristics of a 1/6-scale model of a T-tail general-aviation aircraft. The model was force tested with an internal strain-gauge balance to obtain aerodynamic data on the complete configuration and with a separate wing balance to obtain aerodynamic data on the outer portion of the wing. The addition of the outboard leading-edge droop eliminated the abrupt stall of the windtip and maintained or increased the resultant-force coefficient up to about alpha = 32 degrees. This change in slope of the resultant-force coefficient curve with angle of attack has been shown to be important for eliminating autorotation and for providing spin resistance.

  7. Unsteady Computational Tests of a Non-Equilibrium

    NASA Astrophysics Data System (ADS)

    Jirasek, Adam; Hamlington, Peter; Lofthouse, Andrew; Usafa Collaboration; Cu Boulder Collaboration

    2017-11-01

    A non-equilibrium turbulence model is assessed on simulations of three practically-relevant unsteady test cases; oscillating channel flow, transonic flow around an oscillating airfoil, and transonic flow around the Benchmark Super-Critical Wing. The first case is related to piston-driven flows while the remaining cases are relevant to unsteady aerodynamics at high angles of attack and transonic speeds. Non-equilibrium turbulence effects arise in each of these cases in the form of a lag between the mean strain rate and Reynolds stresses, resulting in reduced kinetic energy production compared to classical equilibrium turbulence models that are based on the gradient transport (or Boussinesq) hypothesis. As a result of the improved representation of unsteady flow effects, the non-equilibrium model provides substantially better agreement with available experimental data than do classical equilibrium turbulence models. This suggests that the non-equilibrium model may be ideally suited for simulations of modern high-speed, high angle of attack aerodynamics problems.

  8. Outbreak of influenza in highly vaccinated crew of U.S. Navy ship.

    PubMed Central

    Earhart, K. C.; Beadle, C.; Miller, L. K.; Pruss, M. W.; Gray, G. C.; Ledbetter, E. K.; Wallace, M. R.

    2001-01-01

    An outbreak of influenza A (H3N2) occurred aboard a U.S. Navy ship in February 1996, despite 95% of the crew's having been appropriately vaccinated. Virus isolated from ill crew members was antigenically distinct from the vaccination strain. With an attack rate of 42%, this outbreak demonstrates the potential for rapid spread of influenza in a confined population and the impact subsequent illness may have upon the workplace. PMID:11384530

  9. The Political Economy of the United States Military Market: 1963-2005

    DTIC Science & Technology

    2006-06-01

    military’s core activity is combat, the traditional military culture can be described in terms of a combat, masculine warrior (CMW) paradigm . Since...Contribution Although the American military’s sophisticated weapons technologies have changed the nature of battle to a large degree, the role of the foot...States that occurred on September 116’, 2001. The strains on active duty units following the attacks resulted in an increasing use of Guard forces

  10. Modeling the effects of indoor passive smoking at home, work, or other households on adult cardiovascular and mental health: the Scottish Health Survey, 2008-2011.

    PubMed

    Shiue, Ivy

    2014-03-13

    Passive smoking has contributed increased risks of cardiovascular disease, mental health, and mortality, but the cumulative effects from work or other households were less studied. Therefore, it was aimed to model the effects of indoor passive smoking from own home, work, and other households in a country-wide, population-based setting. Data in the Scottish Health Survey between 2008 and 2011 after the law banning smoking in public places were analyzed. Information including demographics, lifestyle factors, and self-reported cardiovascular disease and mental health was obtained by household interview. Analyses included chi-square test and survey-weighted logistic regression modeling. After full adjustment, it was observed that being exposed to indoor passive smoking, in particular in more than two places of exposure, was significantly associated with risks of stroke, angina, heart attack, abnormal heart rhythms, and GHQ ≥ 12. The significance remained for angina, GHQ ≥ 12 and probably heart attack in never smokers. The cumulative risks also impacted on sleep problems, self-recognition, making decisions, self-confidence, under strain constantly, depressed, happiness and self-worth. The significance remained for sleep problems, self-confidence, under strain constantly, depressed, and happiness in never smokers. Elimination of indoor passive smoking from different sources should still be a focus in future public health programs.

  11. Nucleic Acid-Based Detection and Identification of Bacterial and Fungal Plant Pathogens - Final Report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kingsley, Mark T.

    2001-03-13

    The threat to American interests from terrorists is not limited to attacks against humans. Terrorists might seek to inflict damage to the U.S. economy by attacking our agricultural sector. Infection of commodity crops by bacterial or fungal crop pathogens could adversely impact U.S. agriculture, either directly from damage to crops or indirectly from damage to our ability to export crops suspected of contamination. Recognizing a terrorist attack against U.S. agriculture, to be able to prosecute the terrorists, is among the responsibilities of the members of Hazardous Material Response Unit (HMRU) of the Federal Bureau of Investigation (FBI). Nucleic acid analysismore » of plant pathogen strains by the use of polymerase chain reaction (PCR) amplification techniques is a powerful method for determining the exact identity of pathogens, as well as their possible region of origin. This type of analysis, however, requires that PCR assays be developed specific to each particular pathogen strain, and analysis protocols developed that are specific to the particular instrument used for detection. The objectives of the work described here were threefold: 1) to assess the potential terrorist threat to U.S. agricultural crops, 2) to determine whether suitable assays exist to monitor that threat, and 3) where assays are needed for priority plant pathogen threats, to modify or develop those assays for use by specialists at the HMRU. The assessment of potential threat to U.S. commodity crops and the availability of assays for those threats were described in detail in the Technical Requirements Document (9) and will be summarized in this report. This report addresses development of specific assays identified in the Technical Requirements Document, and offers recommendations for future development to ensure that HMRU specialists will be prepared with the PCR assays they need to protect against the threat of economic terrorism.« less

  12. Nucleic Acid-Based Detection and Identification of Bacterial and Fungal Plant Pathogens - Final Report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kingsley, Mark T

    2001-03-13

    The threat to American interests from terrorists is not limited to attacks against humans. Terrorists might seek to inflict damage to the U.S. economy by attacking our agricultural sector. Infection of commodity crops by bacterial or fungal crop pathogens could adversely impact U.S. agriculture, either directly from damage to crops or indirectly from damage to our ability to export crops suspected of contamination. Recognizing a terrorist attack against U.S. agriculture, to be able to prosecute the terrorists, is among the responsibilities of the members of Hazardous Material Response Unit (HMRU) of the Federal Bureau of Investigation (FBI). Nucleic acid analysismore » of plant pathogen strains by the use of polymerase chain reaction (PCR) amplification techniques is a powerful method for determining the exact identity of pathogens, as well as their possible region of origin. This type of analysis, however, requires that PCR assays be developed specific to each particular pathogen strain, an d analysis protocols developed that are specific to the particular instrument used for detection. The objectives of the work described here were threefold: (1) to assess the potential terrorist threat to U.S. agricultural crops, (2) to determine whether suitable assays exist to monitor that threat, and (3) where assays are needed for priority plant pathogen threats, to modify or develop those assays for use by specialists at the HMRU. The assessment of potential threat to U.S. commodity crops and the availability of assays for those threats were described in detail in the Technical Requirements Document (9) and will be summarized in this report. This report addresses development of specific assays identified in the Technical Requirements Document, and offers recommendations for future development to ensure that HMRU specialists will be prepared with the PCR assays they need to protect against the threat of economic terrorism.« less

  13. Actinomycetes inhibit filamentous fungi from the cuticle of Acromyrmex leafcutter ants.

    PubMed

    Dângelo, Rômulo Augusto Cotta; de Souza, Danival José; Mendes, Thais Demarchi; Couceiro, Joel da Cruz; Lucia, Terezinha Maria Castro Della

    2016-03-01

    Actinomycetes bacteria associated with leafcutter ants produce secondary metabolites with antimicrobial properties against Escovopsis, a fungus specialized in attacking the gardens of fungus-growing ants, which denies the ants their food source. Because previous studies have used fungi isolated from fungus gardens but not from ant integument, the aims of the present study were to isolate actinomycetes associated with the cuticle of the Acromyrmex spp. and to quantify their inhibition abilities against the filamentous fungal species carried by these ants. The results demonstrated that actinomycetes had varied strain-dependent effects on several filamentous fungal species in addition to antagonistic activity against Escovopsis. The strain isolated from Acromyrmex balzani was identified as a Streptomyces species, whereas the remaining isolates were identified as different strains belonging to the genus Pseudonocardia. These findings corroborate the hypothesis that actinomycetes do not act specifically against Escovopsis mycoparasites and may have the ability to inhibit other species of pathogenic fungi. © 2016 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  14. Post-harvest proteomics of grapes infected by Penicillium during withering to produce Amarone wine.

    PubMed

    Lorenzini, Marilinda; Mainente, Federica; Zapparoli, Giacomo; Cecconi, Daniela; Simonato, Barbara

    2016-05-15

    The study of withered grape infection by Penicillium, a potentially toxigenic fungus, is relevant to preserve grape quality during the post-harvest dehydration process. This report describes the first proteomic analysis of Amarone wine grapes, infected by two strains of Penicillium expansum (Pe1) and Penicillium crustosum (Pc4). Protein identification by MS analysis allowed a better understanding of physiological mechanisms underlying the pathogen attack. The Pe1 strain had a major impact on Vitis vinifera protein expression inducing pathogenesis-related proteins and other protein species involved in energy metabolism. A greater expression of new Penicillium proteins involved in energy metabolism and some protein species related to redox homeostasis has been observed on grapes infected by Pc4 strain. Moreover, the new induced proteins in infected grapes could represent potential markers in withered grapes, thus creating the chance to develop case-sensitive prevention strategies to inhibit fungal growth. Copyright © 2015 Elsevier Ltd. All rights reserved.

  15. Thermophilic Carbon-Sulfur-Bond-Targeted Biodesulfurization

    PubMed Central

    Konishi, J.; Ishii, Y.; Onaka, T.; Okumura, K.; Suzuki, M.

    1997-01-01

    Petroleum contains many heterocyclic organosulfur compounds refractory to conventional hydrodesulfurization carried out with chemical catalysts. Among these, dibenzothiophene (DBT) and DBTs bearing alkyl substitutions are representative compounds. Two bacterial strains, which have been identified as Paenibacillus strains and which are capable of efficiently cleaving carbon-sulfur (C--S) bonds in DBT at high temperatures, have been isolated for the first time. Upon attacking DBT and its various methylated derivatives at temperatures up to 60(deg)C, both growing and resting cells of these bacteria can release sulfur atoms as sulfate ions and leave the monohydroxylated hydrocarbon moieties intact. Moreover, when either of these paenibacilli was incubated at 50(deg)C with light gas oil previously processed through hydrodesulfurization, the total sulfur content in the oil phase clearly decreased. PMID:16535672

  16. Proximity vs. strain in intramolecular ring-closing reactions

    NASA Astrophysics Data System (ADS)

    Karaman, Rafik

    2010-07-01

    The DFT and ab initio calculation results for ring-closing reactions of eight different ω-bromoalkanecarboxylate anions (1-8) reveal that the activation energy (ΔG ‡) for the intramolecular cyclization process is strongly correlated with both (i) the experimental intramolecular cyclization rate (log k intra) and (ii) the distance between the two reactive centres, whereas the slope values of the change in enthalpy (ΔH) vs. the attack angle (α) and the distance between the two reacting centres (r) were found to correlate strongly with the experimental strain energy of the cycle being formed (E s Exp). These results assist in designing pro-prodrug systems that can be utilized to improve the overall biopharmaceutical profile of current medications in order to enhance their effectiveness and ease their utility.

  17. Characterization of the Upper Pathway Genes for Fluorene Metabolism in Terrabacter sp. Strain DBF63

    PubMed Central

    Habe, Hiroshi; Chung, Jin-Sung; Kato, Hiroyuki; Ayabe, Yuko; Kasuga, Kano; Yoshida, Takako; Nojiri, Hideaki; Yamane, Hisakazu; Omori, Toshio

    2004-01-01

    Genes involved in the degradation of fluorene to phthalate were characterized in the fluorene degrader Terrabacter sp. strain DBF63. The initial attack on both fluorene and 9-fluorenone was catalyzed by DbfA to yield 9-fluorenol and 1,1a-dihydroxy-1-hydro-9-fluorenone, respectively. The FlnB protein exhibited activities against both 9-fluorenol and 1,1a-dihydroxy-1-hydro-9-fluorenone to produce 9-fluorenone and 2′-carboxy-2,3-dihydroxybiphenyl, respectively. FlnD is a heteromeric protein encoded by flnD1 and ORF16, being a member of the class III two-subunit extradiol dioxygenase. FlnE was identified as a serine hydrolase for the meta-cleavage products that yield phthalate. PMID:15317800

  18. Aviation Maintenance Safety Articles, January/February 1990

    DTIC Science & Technology

    1990-02-01

    actually looked at the fast that you don’t know you’re response of the crew kept the deck-edge fire stations? Do tired or hurt. It wasn’t until fire...connector. Approx- tenance supervisors are caught up in administrative imately 2 inches of wire was added to the harness, tasks, and they fail to excercise ... fast -acting strain of dry rot attacked ear -ly preventable, the container within seven days prior to the accep- The proper routing for the arming cable

  19. Effective Antimicrobial Regimens for Use in Humans for Therapy of Bacillus anthracis Infections and Postexposure Prophylaxis

    DTIC Science & Technology

    2005-12-01

    bioterrorism that occurred during the 20th century (23) ultimately led to modest preparations for such an attack against American military personnel and...investigators ( 21 ) used our information to design an Ames strain challenge study with rhesus monkeys, which was successful and led to the granting by the...powder was obtained from Sigma-Aldrich, St . Louis, MO. The mutation frequency of the B. anthracis isolate to 3 the MICs of levofloxacin and

  20. Dynamic analysis using superelements for a large helicopter model

    NASA Technical Reports Server (NTRS)

    Patel, M. P.; Shah, L. C.

    1978-01-01

    Using superelements (substructures), modal and frequency response analysis was performed for a large model of the Advanced Attack Helicopter developed for the U.S. Army. Whiffletree concept was employed so that the residual structure along with the various superelements could be represented as beam-like structures for economical and accurate dynamic analysis. A very large DMAP alter to the rigid format was developed so that the modal analysis, the frequency response, and the strain energy in each component could be computed in the same run.

  1. Media participation and mental health in terrorist attack survivors.

    PubMed

    Thoresen, Siri; Jensen, Tine K; Dyb, Grete

    2014-12-01

    Terrorism and disasters receive massive media attention, and victims are often approached by reporters. Not much is known about how terror and disaster victims perceive the contact with media and whether such experiences influence mental health. In this study, we describe how positive and negative experiences with media relate to posttraumatic stress (PTS) reactions among survivors of the 2011 Utøya Island terrorist attack in Norway. Face-to-face interviews were conducted with 285 survivors (47.0% female and 53.0% male) 14-15 months after the terrorist attack. Most survivors were approached by reporters (94%), and participated in media interviews (88%). The majority of survivors evaluated their media contact and participation as positive, and media participation was unrelated to PTS reactions. Survivors who found media participation distressing had more PTS reactions (quite distressing: B = 0.440, extremely distressing: B = 0.611, p = .004 in adjusted model). Perceiving media participation as distressing was slightly associated with lower levels of social support (r = -.16, p = .013), and regretting media participation was slightly associated with feeling let down (r = .18, p = .004). Reporters should take care when interviewing victims, and clinicians should be aware of media exposure as a potential additional strain on victims. Copyright © 2014 International Society for Traumatic Stress Studies.

  2. Emergence of norovirus GI.2 outbreaks in military camps in Singapore.

    PubMed

    Ho, Zheng Jie Marc; Vithia, Gunalan; Ng, Ching Ging; Maurer-Stroh, Sebastian; Tan, Clive M; Loh, Jimmy; Lin, Tzer Pin Raymond; Lee, Jian Ming Vernon

    2015-02-01

    Simultaneous acute gastroenteritis (AGE) outbreaks occurred at two military camps. This study details the epidemiological findings, explores possible origins, and discusses preventive measures. Investigations included attack rate surveys, symptom surveys, hygiene inspections, and the testing of water, food, and stool samples. DNA/RNA was extracted from stool samples and amplified via real-time reverse transcription PCR (RT-PCR). Partial and full-length capsid nucleotide sequences were obtained, phylogenetic relationships inferred, and homology modelling of antigenic sites performed. The military outbreaks involved 775 persons and were preceded by two AGE outbreaks at restaurants in the local community. The outbreak was longer and larger in the bigger camp (21 days, attack rate 15.0%) than the smaller camp (6 days, attack rate 8.3%). Of 198 stool samples, norovirus GI.2 was detected in 32.5% (larger camp) and 28.6% (smaller camp). These were essentially identical to preceding community outbreaks. Antigenic site homology modelling also showed differences between identified and more common AGE outbreak strains (norovirus GII.4). Differences observed highlight difficulties in controlling person-to-person outbreaks among large groups in close proximity (e.g., military trainees). Distinct differences in antigenic sites may have contributed to increased immunological susceptibility of the soldiers to infection. Copyright © 2014 The Authors. Published by Elsevier Ltd.. All rights reserved.

  3. Enhanced neuroinvasion by smaller, soluble prions.

    PubMed

    Bett, Cyrus; Lawrence, Jessica; Kurt, Timothy D; Orru, Christina; Aguilar-Calvo, Patricia; Kincaid, Anthony E; Surewicz, Witold K; Caughey, Byron; Wu, Chengbiao; Sigurdson, Christina J

    2017-04-21

    Infectious prion aggregates can propagate from extraneural sites into the brain with remarkable efficiency, likely transported via peripheral nerves. Yet not all prions spread into the brain, and the physical properties of a prion that is capable of transit within neurons remain unclear. We hypothesized that small, diffusible aggregates spread into the CNS via peripheral nerves. Here we used a structurally diverse panel of prion strains to analyze how the prion conformation impacts transit into the brain. Two prion strains form fibrils visible ultrastructurally in the brain in situ, whereas three strains form diffuse, subfibrillar prion deposits and no visible fibrils. The subfibrillar strains had significantly higher levels of soluble prion aggregates than the fibrillar strains. Primary neurons internalized both the subfibrillar and fibril-forming prion strains by macropinocytosis, and both strain types were transported from the axon terminal to the cell body in vitro. However in mice, only the predominantly soluble, subfibrillar prions, and not the fibrillar prions, were efficiently transported from the tongue to the brain. Sonicating a fibrillar prion strain increased the solubility and enabled prions to spread into the brain in mice, as evident by a 40% increase in the attack rate, indicating that an increase in smaller particles enhances prion neuroinvasion. Our data suggest that the small, highly soluble prion particles have a higher capacity for transport via nerves. These findings help explain how prions that predominantly assemble into subfibrillar states can more effectively traverse into and out of the CNS, and suggest that promoting fibril assembly may slow the neuron-to-neuron spread of protein aggregates.

  4. Strain-related differences after experimental traumatic brain injury in rats.

    PubMed

    Reid, Wendy Murdock; Rolfe, Andrew; Register, David; Levasseur, Joseph E; Churn, Severn B; Sun, Dong

    2010-07-01

    The present study directly compares the effects of experimental brain injury in two commonly used rat strains: Fisher 344 and Sprague-Dawley. We previously found that Fisher rats have a higher mortality rate and more frequent seizure attacks at the same injury level than Sprague-Dawley rats. Although strain differences in rats are commonly accepted as contributing to variability among studies, there is a paucity of literature addressing strain influence in experimental neurotrauma. Therefore this study compares outcome measures in two rat strains following lateral fluid percussion injury. Fisher 344 and Sprague-Dawley rats were monitored for changes in physiological measurements, intracranial pressure, and electroencephalographic activity. We further analyzed neuronal degeneration and cell death in the injured brain using Fluoro-Jade-B (FJB) histochemistry and caspase-3 immunostaining. Behavioral studies using the beam walk and Morris water maze were conducted to characterize strain differences in both motor and cognitive functional recovery following injury. We found that Fisher rats had significantly higher intracranial pressure, prolonged seizure activity, increased FJB-positive staining in the injured cortex and thalamus, and increased caspase-3 expression than Sprague-Dawley rats. On average, Fisher rats displayed a greater amount of total recording time in seizure activity and had longer ictal durations. The Fisher rats also had increased motor deficits, correlating with the above results. In spite of these results, Fisher rats performed better on cognitive tests following injury. The results demonstrate that different rat strains respond to injury differently, and thus in preclinical neurotrauma studies strain influence is an important consideration when evaluating outcomes.

  5. Strain-Related Differences after Experimental Traumatic Brain Injury in Rats

    PubMed Central

    Rolfe, Andrew; Register, David; Levasseur, Joseph E.; Churn, Severn B.; Sun, Dong

    2010-01-01

    Abstract The present study directly compares the effects of experimental brain injury in two commonly used rat strains: Fisher 344 and Sprague-Dawley. We previously found that Fisher rats have a higher mortality rate and more frequent seizure attacks at the same injury level than Sprague-Dawley rats. Although strain differences in rats are commonly accepted as contributing to variability among studies, there is a paucity of literature addressing strain influence in experimental neurotrauma. Therefore this study compares outcome measures in two rat strains following lateral fluid percussion injury. Fisher 344 and Sprague-Dawley rats were monitored for changes in physiological measurements, intracranial pressure, and electroencephalographic activity. We further analyzed neuronal degeneration and cell death in the injured brain using Fluoro-Jade-B (FJB) histochemistry and caspase-3 immunostaining. Behavioral studies using the beam walk and Morris water maze were conducted to characterize strain differences in both motor and cognitive functional recovery following injury. We found that Fisher rats had significantly higher intracranial pressure, prolonged seizure activity, increased FJB-positive staining in the injured cortex and thalamus, and increased caspase-3 expression than Sprague-Dawley rats. On average, Fisher rats displayed a greater amount of total recording time in seizure activity and had longer ictal durations. The Fisher rats also had increased motor deficits, correlating with the above results. In spite of these results, Fisher rats performed better on cognitive tests following injury. The results demonstrate that different rat strains respond to injury differently, and thus in preclinical neurotrauma studies strain influence is an important consideration when evaluating outcomes. PMID:20392137

  6. Unearthing the Antibacterial Mechanism of Medicinal Clay: A Geochemical Approach to Combating Antibiotic Resistance

    DOE PAGES

    Morrison, Keith D.; Misra, Rajeev; Williams, Lynda B.

    2016-01-08

    Natural antibacterial clays, when hydrated and applied topically, kill human pathogens including antibiotic resistant strains proliferating worldwide. Only certain clays are bactericidal; those containing soluble reduced metals and expandable clay minerals that absorb cations, providing a capacity for extended metal release and production of toxic hydroxyl radicals. Here we show the critical antibacterial components are soluble Fe 2+ and Al 3+ that synergistically attack multiple cellular systems in pathogens normally growth-limited by Fe supply. This geochemical process is more effective than metal solutions alone and provides an alternative antibacterial strategy to traditional antibiotics. Advanced bioimaging methods and genetic show thatmore » Al 3+ misfolds cell membrane proteins, while Fe 2+ evokes membrane oxidation and enters the cytoplasm inflicting hydroxyl radical attack on intracellular proteins and DNA. The lethal reaction precipitates Fe 3+-oxides as biomolecular damage proceeds. In conclusion, discovery of this bactericidal mechanism demonstrated by natural clays should guide designs of new mineral-based antibacterial agents.« less

  7. Unearthing the Antibacterial Mechanism of Medicinal Clay: A Geochemical Approach to Combating Antibiotic Resistance

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Morrison, Keith D.; Misra, Rajeev; Williams, Lynda B.

    Natural antibacterial clays, when hydrated and applied topically, kill human pathogens including antibiotic resistant strains proliferating worldwide. Only certain clays are bactericidal; those containing soluble reduced metals and expandable clay minerals that absorb cations, providing a capacity for extended metal release and production of toxic hydroxyl radicals. Here we show the critical antibacterial components are soluble Fe 2+ and Al 3+ that synergistically attack multiple cellular systems in pathogens normally growth-limited by Fe supply. This geochemical process is more effective than metal solutions alone and provides an alternative antibacterial strategy to traditional antibiotics. Advanced bioimaging methods and genetic show thatmore » Al 3+ misfolds cell membrane proteins, while Fe 2+ evokes membrane oxidation and enters the cytoplasm inflicting hydroxyl radical attack on intracellular proteins and DNA. The lethal reaction precipitates Fe 3+-oxides as biomolecular damage proceeds. In conclusion, discovery of this bactericidal mechanism demonstrated by natural clays should guide designs of new mineral-based antibacterial agents.« less

  8. Epidemic hecatomb in the New World.

    PubMed

    Naranjo, P

    1992-01-01

    The American population developed, during thousands of years, free of epidemics that had been attacking Europe, Asia and Africa. The European and African migrations, after Columbus's first trip, produced an epidemic invasion of influenza, smallpox, measles, yellow fever, malaria, diphtheria, typhus, and other diseases that attacked the immunologically virgin populations and produced a very high mortality, with a diminution of the indigenous population of more than 90% in many places. According to historical evidence, the first epidemic was influenza, produced by swine strain of virus, immediately followed by smallpox. The Spaniards mated freely with the Indians producing a mixed race called the Mestizo, who were immunologically more capable of defending themselves against various viruses, bacteria, and parasites brought over from the Old World. Marriage between the races also was sanctioned by Queen Isabella (1503) and Fernando I (1515). With these new genetic immunologic defenses against infections, the Mestizo eventually made up the majority of the population of Indians in the New World.

  9. Unearthing the Antibacterial Mechanism of Medicinal Clay: A Geochemical Approach to Combating Antibiotic Resistance

    PubMed Central

    Morrison, Keith D.; Misra, Rajeev; Williams, Lynda B.

    2016-01-01

    Natural antibacterial clays, when hydrated and applied topically, kill human pathogens including antibiotic resistant strains proliferating worldwide. Only certain clays are bactericidal; those containing soluble reduced metals and expandable clay minerals that absorb cations, providing a capacity for extended metal release and production of toxic hydroxyl radicals. Here we show the critical antibacterial components are soluble Fe2+ and Al3+ that synergistically attack multiple cellular systems in pathogens normally growth-limited by Fe supply. This geochemical process is more effective than metal solutions alone and provides an alternative antibacterial strategy to traditional antibiotics. Advanced bioimaging methods and genetic show that Al3+ misfolds cell membrane proteins, while Fe2+ evokes membrane oxidation and enters the cytoplasm inflicting hydroxyl radical attack on intracellular proteins and DNA. The lethal reaction precipitates Fe3+-oxides as biomolecular damage proceeds. Discovery of this bactericidal mechanism demonstrated by natural clays should guide designs of new mineral-based antibacterial agents. PMID:26743034

  10. Strain Rate and Anisotropic Microstructure Dependent Mechanical Behaviors of Silkworm Cocoon Shells

    PubMed Central

    Xu, Jun; Zhang, Wen; Gao, Xiang; Meng, Wanlin; Guan, Juan

    2016-01-01

    Silkworm cocoons are multi-layered composite structures comprised of high strength silk fiber and sericin, and their mechanical properties have been naturally selected to protect pupas during metamorphosis from various types of external attacks. The present study attempts to gain a comprehensive understanding of the mechanical properties of cocoon shell materials from wild silkworm species Antheraea pernyi under dynamic loading rates. Five dynamic strain rates from 0.00625 s-1 to 12.5 s-1 are tested to show the strain rate sensitivity of the cocoon shell material. In the meantime, the anisotropy of the cocoon shell is considered and the cocoon shell specimens are cut along 0°, 45° and 90° orientation to the short axis of cocoons. Typical mechanical properties including Young’s modulus, yield strength, ultimate strength and ultimate strain are extracted and analyzed from the stress-strain curves. Furthermore, the fracture morphologies of the cocoon shell specimens are observed under scanning electron microscopy to help understand the relationship between the mechanical properties and the microstructures of the cocoon material. A discussion on the dynamic strain rate effect on the mechanical properties of cocoon shell material is followed by fitting our experimental results to two previous models, and the effect could be well explained. We also compare natural and dried cocoon materials for the dynamic strain rate effect and interestingly the dried cocoon shells show better overall mechanical properties. This study provides a different perspective on the mechanical properties of cocoon material as a composite material, and provides some insight for bio-inspired engineering materials. PMID:26939063

  11. Comparative Genomic Analysis and Benzene, Toluene, Ethylbenzene, and o-, m-, and p-Xylene (BTEX) Degradation Pathways of Pseudoxanthomonas spadix BD-a59

    PubMed Central

    Choi, Eun Jin; Jin, Hyun Mi; Lee, Seung Hyeon; Math, Renukaradhya K.; Madsen, Eugene L.

    2013-01-01

    Pseudoxanthomonas spadix BD-a59, isolated from gasoline-contaminated soil, has the ability to degrade all six BTEX (benzene, toluene, ethylbenzene, and o-, m-, and p-xylene) compounds. The genomic features of strain BD-a59 were analyzed bioinformatically and compared with those of another fully sequenced Pseudoxanthomonas strain, P. suwonensis 11-1, which was isolated from cotton waste compost. The genome of strain BD-a59 differed from that of strain 11-1 in many characteristics, including the number of rRNA operons, dioxygenases, monooxygenases, genomic islands (GIs), and heavy metal resistance genes. A high abundance of phage integrases and GIs and the patterns in several other genetic measures (e.g., GC content, GC skew, Karlin signature, and clustered regularly interspaced short palindromic repeat [CRISPR] gene homology) indicated that strain BD-a59's genomic architecture may have been altered through horizontal gene transfers (HGT), phage attack, and genetic reshuffling during its evolutionary history. The genes for benzene/toluene, ethylbenzene, and xylene degradations were encoded on GI-9, -13, and -21, respectively, which suggests that they may have been acquired by HGT. We used bioinformatics to predict the biodegradation pathways of the six BTEX compounds, and these pathways were proved experimentally through the analysis of the intermediates of each BTEX compound using a gas chromatograph and mass spectrometry (GC-MS). The elevated abundances of dioxygenases, monooxygenases, and rRNA operons in strain BD-a59 (relative to strain 11-1), as well as other genomic characteristics, likely confer traits that enhance ecological fitness by enabling strain BD-a59 to degrade hydrocarbons in the soil environment. PMID:23160122

  12. Comparison of Proteomics Profiles of Campylobacter jejuni Strain Bf under Microaerobic and Aerobic Conditions

    PubMed Central

    Rodrigues, Ramila C.; Haddad, Nabila; Chevret, Didier; Cappelier, Jean-Michel; Tresse, Odile

    2016-01-01

    Campylobacter jejuni accounts for one of the leading causes of foodborne bacterial enteritis in humans. Despite being considered an obligate microaerobic microorganism, C. jejuni is regularly exposed to oxidative stress. However, its adaptive strategies to survive the atmospheric oxygen level during transmission to humans remain unclear. Recently, the clinical C. jejuni strain Bf was singled out for its unexpected ability to grow under ambient atmosphere. Here, we aimed to understand better the biological mechanisms underlying its atypical aerotolerance trait using two-dimensional protein electrophoresis, gene expression, and enzymatic activities. Forty-seven proteins were identified with a significantly different abundance between cultivation under microaerobic and aerobic conditions. The over-expressed proteins in aerobiosis belonged mainly to the oxidative stress response, enzymes of the tricarboxylic acid cycle, iron uptake, and regulation, and amino acid uptake when compared to microaerobic conditions. The higher abundance of proteins related to oxidative stress was correlated to dramatically higher transcript levels of the corresponding encoding genes in aerobic conditions compared to microaerobic conditions. In addition, a higher catalase-equivalent activity in strain Bf was observed. Despite the restricted catabolic capacities of C. jejuni, this study reveals that strain Bf is equipped to withstand oxidative stress. This ability could contribute to emergence and persistence of particular strains of C. jejuni throughout food processing or macrophage attack during human infection. PMID:27790195

  13. Fate and distribution of brevetoxin (PbTx) following lysis of Karenia brevis by algicidal bacteria, including analysis of open A-ring derivatives.

    PubMed

    Roth, Patricia B; Twiner, Michael J; Wang, Zhihong; Bottein Dechraoui, Marie-Yasmine; Doucette, Gregory J

    2007-12-15

    Flavobacteriaceae (strain S03) and Cytophaga sp. (strain 41-DBG2) are algicidal bacteria active against the brevetoxin (PbTx)-producing, red tide dinoflagellate, Karenia brevis. Little is known about the fate of PbTx associated with K. brevis cells following attack by such bacteria. The fate and distribution of PbTx in K. brevis cultures exposed to these algicidal strains were thus examined by receptor binding assay and liquid chromatography/mass spectrometry (LC/MS) in three size fractions (>5, 0.22-5, <0.22microm) over a 2-week time course. In control cultures, brevetoxin concentrations in the >5microm particulate size fraction correlated with changes in cell density, whereas significant increases in dissolved (i.e., <0.22microm) toxin were observed in the later stages of culture growth. Exposure of K. brevis to either of the two algicidal bacteria tested caused cell lysis, coinciding with a rapid decline in the >5microm PbTX size fraction and a simultaneous release of dissolved toxin into the growth medium. Upon cell lysis, dissolved brevetoxin accounted for ca. 60% of total toxin and consisted of 51-82% open A-ring derivatives. Open A-ring PbTx-2 and PbTx-3 derivatives bound with lower affinity (approximately 22- and 57-fold, respectively) to voltage-gated sodium channels and were considerably less cytotoxic (86- and 142-fold, respectively) to N2A cells than their individual parent toxins (i.e., PbTx-2 and PbTx-3). These novel findings of changes in PbTx size-fractioned distribution and overall reduction in K. brevis toxicity following attack by algicidal bacteria improve our understanding of potential trophic transfer routes and the fate of PbTx during red tide events. Moreover, this information will be important to consider when evaluating the potential role of algicidal bacteria in harmful algal bloom (HAB) management strategies involving control of bloom populations.

  14. Biodegradation and bioconversion of coals by fungi. Quarterly progress report No. 1, October 1-December 31, 1985. [Candida sp. and T. versicolor

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ward, B.

    1985-01-01

    Following a month-long start-up period during which the principal investigator traveled to several sites of lignite outcrops to collect samples, efforts were begun to isolate new strains of coal-bioconverting fungal strains. Out of about thirty different organisms isolated from weathered samples of three different types of lignite, three isolates exhibited biosolubilization of the one lignite tested to date. These organisms have not yet been identified but they appear to be new strains of lignite-degrading fungi. We have observed that degree of biosolubilization varies among apparently similar samples of the same lignite. Weathered lignite is more readily solubilized than is previouslymore » unexposed lignite, but even tests on weathered coal have not been consistently repeatable. We have begun experiments designed to identify one or more factors of weathering which render coal more readily attacked by fungi. We hope to establish methods whereby consistently repeatable assays can be performed on bioconversion of coals. 2 refs., 1 fig., 1 tab.« less

  15. Characterization of the Salmonella enterica Serotype Isangi Isolated from Patients for the First Time in China.

    PubMed

    Li, Xin-Peng; Gao, Ri-Hong; Hou, Pei-Bin; Ren, Yan-Yan; Zhang, Hua-Ning; Jiang, Kui-Ying; Chen, Yu-Zhen; Qi, Zi-Gang; Xu, Min; Bi, Zhen-Wang

    2017-08-01

    No studies have reported the isolation of serotype Salmonella Isangi from cases of salmonellosis in mainland China. We investigated an outbreak of foodborne disease with salmonella and collected the samples from the patients and surplus foods. Salmonella strains were isolated and the serotype was identified according to the Kauffmann-White scheme. The relatedness of the isolates was determined using pulsed-field gel electrophoresis (PFGE) and whole genome sequencing (WGS). Antimicrobial susceptibility was conducted by the broth microdilution method. There were 74 diners in the case, 33 of which got ill, with an attack rate of 44.6% (33/74). A total of 24 samples were collected from the outbreak cases, six Salmonella Isangi strains were isolated and susceptible to all tested drugs. PFGE and WGS analysis suggested that the pathogen dissemination through a single or limited vector(s), the steamed fish and mixed food (fry spicy chicken, braised pork ribs, and goose leg), may be the source of infection or be cross-contaminated. We first report the characteristics of an outbreak and molecular strain relatedness of Salmonella Isangi in mainland China.

  16. Preparing for a Nightmare: USNORTHCOM’S Homeland Defense Mission Against Chemical and Biological Attack

    DTIC Science & Technology

    2014-05-15

    demonstrates the ability of lethal viruses to spread naturally. 21 New influenza strains surface annually, and many such as H7N9 , are different from...22. H7N9 surfaced in China in 2013, and has a mortality rate of 20 percent. Centers for Disease Control and...Prevention, “ H7N9 : Is This Flu Something to Worry About?,” May 13, 2014, accessed 7 May 2014, http://www.cdc.gov/features/h7n9flu/index.html. 23. MERS has

  17. Low Dimensional Tools for Flow-Structure Interaction Problems: Application to Micro Air Vehicles

    NASA Technical Reports Server (NTRS)

    Schmit, Ryan F.; Glauser, Mark N.; Gorton, Susan A.

    2003-01-01

    A low dimensional tool for flow-structure interaction problems based on Proper Orthogonal Decomposition (POD) and modified Linear Stochastic Estimation (mLSE) has been proposed and was applied to a Micro Air Vehicle (MAV) wing. The method utilizes the dynamic strain measurements from the wing to estimate the POD expansion coefficients from which an estimation of the velocity in the wake can be obtained. For this experiment the MAV wing was set at five different angles of attack, from 0 deg to 20 deg. The tunnel velocities varied from 44 to 58 ft/sec with corresponding Reynolds numbers of 46,000 to 70,000. A stereo Particle Image Velocimetry (PIV) system was used to measure the wake of the MAV wing simultaneously with the signals from the twelve dynamic strain gauges mounted on the wing. With 20 out of 2400 POD modes, a reasonable estimation of the flow flow was observed. By increasing the number of POD modes, a better estimation of the flow field will occur. Utilizing the simultaneously sampled strain gauges and flow field measurements in conjunction with mLSE, an estimation of the flow field with lower energy modes is reasonable. With these results, the methodology for estimating the wake flow field from just dynamic strain gauges is validated.

  18. Induction of lcc2 expression and activity by Agaricus bisporus provides defence against Trichoderma aggressivum toxic extracts

    PubMed Central

    Sjaarda, Calvin P; Abubaker, Kamal S; Castle, Alan J

    2015-01-01

    Laccases are used by fungi for several functions including defence responses to stresses associated with attack by other fungi. Laccase activity changes and the induction of two laccase genes, lcc1 and lcc2, in Agaricus bisporus were measured in response to toxic extracts of medium in which Trichoderma aggressivum, the cause of green mould disease, was grown. A strain of A. bisporus that shows resistance to the extracts showed higher basal levels and greater enzymatic activity after extract exposure than did a sensitive strain. Furthermore, pre-incubation of T. aggressivum extract with laccases reduced toxicity. Faster induction and greater numbers of lcc2 transcripts in response to the extract were noted in the resistant strain than in the sensitive strain. The timing and increase in lcc2 transcript abundance mirrored changes in total laccase activity. No correlation between resistance and lcc1 transcription was apparent. Transcript abundance in transformants with a siRNA construct homologous to both genes varied widely. A strong negative correlation between transcript abundance and sensitivity of the transformant to toxic extract was observed in plate assays. These results indicated that laccase activity and in particular that encoded by lcc2 contributes to toxin metabolism and by extension green mould disease resistance. PMID:25824278

  19. Linearized finite-element method solution of the ion-exchange nonlinear diffusion model

    NASA Astrophysics Data System (ADS)

    Badr, Mohamed M.; Swillam, Mohamed A.

    2017-04-01

    Ion-exchange process is one of the most common techniques used in glass waveguide fabrication. This has many advantages, such as low cost, ease of implementation, and simple equipment requirements. The technology is based on the substitution of some of the host ions in the glass (typically Na+) with other ions that possess different characteristics in terms of size and polarizability. The newly diffused ions produce a region with a relatively higher refractive index in which the light could be guided. A critical issue arises when it comes to designing such waveguides, which is carefully and precisely determining the resultant index profile. This task has been proven to be hideous as the process is generally governed by a nonlinear diffusion model with no direct general analytical solution. Furthermore, numerical solutions become unreliable-in terms of stability and mean squared error-in some cases, especially the K+-Na+ ion-exchanged waveguide, which is the best candidate to produce waveguides with refractive index differences compatible with those of the commercially available optical fibers. Linearized finite-element method formulations were used to provide a reliable tool that could solve the nonlinear diffusion model of the ion-exchange in both one- and two-dimensional spaces. Additionally, the annealed channel waveguide case has been studied. In all cases, unprecedented stability and minimum mean squared error could be achieved.

  20. Ecotoxicology of Amphibians and Reptiles

    USGS Publications Warehouse

    2000-01-01

    For many years, ecological research on amphibians and reptiles has lagged behind that of other vertebrates such as fishes, birds, and mammals, despite the known importance of these animals in their environments. The lack of study has been particularly acute in the he area of ecotoxicology where the number of published scientific papers is a fraction of that found for the other vertebrate classes. Recently, scientists have become aware of severe crises among amphibian populations, including unexplained and sudden extinctions, worldwide declines, and hideous malformations. In many of these instances, contaminants have been listed as probable contributors. Data on the effects of contaminants on reptiles are so depauperate that even the most elementary interpretations are difficult. This state-of-the-science review and synthesis of amphibian and reptile ecotoxicology demonstrates the inter-relationships among distribution, ecology, physiology, and contaminant exposure, and interprets these topics as they pertain to comparative toxicity, population declines, malformations, and risk assessment . In this way, the book identifies and serves as a basis for the most pressing research needs in the coming years. The editors have invited 27 other internationally respected experts to examine the state of existing data in specific areas, interpret it in light of current problems, and identify research gaps and needs. Through its emphasis on recent research, extensive reviews and synthesis, Ecotoxicology of Amphibians and Reptiles will remain a definitive reference work well into the new century.

  1. Multiple neural network approaches to clinical expert systems

    NASA Astrophysics Data System (ADS)

    Stubbs, Derek F.

    1990-08-01

    We briefly review the concept of computer aided medical diagnosis and more extensively review the the existing literature on neural network applications in the field. Neural networks can function as simple expert systems for diagnosis or prognosis. Using a public database we develop a neural network for the diagnosis of a major presenting symptom while discussing the development process and possible approaches. MEDICAL EXPERTS SYSTEMS COMPUTER AIDED DIAGNOSIS Biomedicine is an incredibly diverse and multidisciplinary field and it is not surprising that neural networks with their many applications are finding more and more applications in the highly non-linear field of biomedicine. I want to concentrate on neural networks as medical expert systems for clinical diagnosis or prognosis. Expert Systems started out as a set of computerized " ifthen" rules. Everything was reduced to boolean logic and the promised land of computer experts was said to be in sight. It never came. Why? First the computer code explodes as the number of " ifs" increases. All the " ifs" have to interact. Second experts are not very good at reducing expertise to language. It turns out that experts recognize patterns and have non-verbal left-brain intuition decision processes. Third learning by example rather than learning by rule is the way natural brains works and making computers work by rule-learning is hideously labor intensive. Neural networks can learn from example. They learn the results

  2. Elastomer Reinforced with Carbon Nanotubes

    NASA Technical Reports Server (NTRS)

    Hudson, Jared L.; Krishnamoorti, Ramanan

    2009-01-01

    Elastomers are reinforced with functionalized, single-walled carbon nanotubes (SWNTs) giving them high-breaking strain levels and low densities. Cross-linked elastomers are prepared using amine-terminated, poly(dimethylsiloxane) (PDMS), with an average molecular weight of 5,000 daltons, and a functionalized SWNT. Cross-link densities, estimated on the basis of swelling data in toluene (a dispersing solvent) indicated that the polymer underwent cross-linking at the ends of the chains. This thermally initiated cross-linking was found to occur only in the presence of the aryl alcohol functionalized SWNTs. The cross-link could have been via a hydrogen-bonding mechanism between the amine and the free hydroxyl group, or via attack of the amine on the ester linage to form an amide. Tensile properties examined at room temperature indicate a three-fold increase in the tensile modulus of the elastomer, with rupture and failure of the elastomer occurring at a strain of 6.5.

  3. Dynamic response characteristics of two transport models tested in the National Transonic Facility

    NASA Technical Reports Server (NTRS)

    Young, Clarence P., Jr.

    1993-01-01

    This paper documents recent experiences with measuring the dynamic response characteristics of a commercial transport and a military transport model during full scale Reynolds number tests in the National Transonic Facility. Both models were limited in angle of attack while testing at full scale Reynolds number and cruise Mach number due to pitch or stall buffet response. Roll buffet (wing buzz) was observed for both models at certain Mach numbers while testing at high Reynolds number. Roll buffet was more severe and more repeatable for the military transport model at cruise Mach number. Miniature strain-gage type accelerometers were used for the first time for obtaining dynamic data as a part of the continuing development of miniature dynamic measurements instrumentation for cryogenic applications. This paper presents the results of vibration measurements obtained for both the commercial and military transport models and documents the experience gained in the use of miniature strain gage type accelerometers.

  4. Plasmid and surface antigen markers of endemic and epidemic Legionella pneumophila strains.

    PubMed Central

    Brown, A; Vickers, R M; Elder, E M; Lema, M; Garrity, G M

    1982-01-01

    Environmental and clinical isolates of Legionella pneumophila obtained from the Pittsburgh Veterans Administration Medical Center were studied for the presence of plasmids and for unique surface antigens. The majority of environmental isolates contained a single 80-megadalton plasmid. After an epidemic of nosocomial Legionnaires disease subsided in the Spring of 1981, plasmid-bearing environmental isolates persisted in the environment. Whereas L. pneumophila could not be reisolated from most sites with plasmidless isolates. During this epidemic the attack rate was highest on wards with plasmidless isolates. All clinical isolates were plasmidless. Strains were serotyped by the indirect immunofluorescence method with serum from a single immunized rat which was used both without absorption and after absorption with various plasmid-bearing and plasmidless isolates. These studies suggested that a plasmid-associated surface antigen was present and that the most common plasmidless environmental serotype was similar to the epidemic clinical serotype. Images PMID:7119096

  5. Mapping influenza transmission in the ferret model to transmission in humans

    PubMed Central

    Buhnerkempe, Michael G; Gostic, Katelyn; Park, Miran; Ahsan, Prianna; Belser, Jessica A; Lloyd-Smith, James O

    2015-01-01

    The controversy surrounding 'gain-of-function' experiments on high-consequence avian influenza viruses has highlighted the role of ferret transmission experiments in studying the transmission potential of novel influenza strains. However, the mapping between influenza transmission in ferrets and in humans is unsubstantiated. We address this gap by compiling and analyzing 240 estimates of influenza transmission in ferrets and humans. We demonstrate that estimates of ferret secondary attack rate (SAR) explain 66% of the variation in human SAR estimates at the subtype level. Further analysis shows that ferret transmission experiments have potential to identify influenza viruses of concern for epidemic spread in humans, though small sample sizes and biological uncertainties prevent definitive classification of human transmissibility. Thus, ferret transmission experiments provide valid predictions of pandemic potential of novel influenza strains, though results should continue to be corroborated by targeted virological and epidemiological research. DOI: http://dx.doi.org/10.7554/eLife.07969.001 PMID:26329460

  6. Differential behavioral sensitivity to carbon dioxide (CO2) inhalation in rats

    PubMed Central

    Winter, Andrew; Ahlbrand, Rebecca; Naik, Devanshi; Sah, Renu

    2017-01-01

    Inhalation of carbon dioxide (CO2) is frequently employed as a biological challenge to evoke intense fear and anxiety. In individuals with panic disorder, CO2 reliably evokes panic attacks. Sensitivity to CO2 is highly heterogeneous among individuals, and although a genetic component is implicated, underlying mechanisms are not clear. Preclinical models that can simulate differential responsivity to CO2 are therefore relevant. In the current study we investigated CO2-evoked behavioral responses in four different rat strains: Sprague-Dawley (SD), Wistar (W), Long Evans (LE) and Wistar-Kyoto, (WK) rats. We also assessed tryptophan hydroxylase 2 (TPH-2)-positive serotonergic neurons in anxiety/panic regulatory subdivisions of the dorsal raphe nucleus (DR), as well as dopamine β hydroxylase (DβH)-positive noradrenergic neurons in the locus coeruleus, implicated in central CO2-chemosensitivity. Behavioral responsivity to CO2 inhalation varied between strains. CO2-evoked immobility was significantly higher in LE and WK rats as compared with W and SD cohorts. Differences were also observed in CO2-evoked rearing and grooming behaviors. Exposure to CO2 did not produce conditioned behavioral responses upon re-exposure to CO2 context in any strain. Reduced TPH-2 positive cell counts were observed specifically in the panic-regulatory dorsal raphe ventrolateral (DRVL)-ventrolateral periaqueductal grey (VLPAG) subdivision in CO2-sensitive strains. Conversely, DβH positive cell counts within the LC were significantly higher in CO2-sensitive strains. Collectively, our data provide evidence for strain dependent, differential CO2-sensitivity and potential differences in monoaminergic systems regulating panic and anxiety. Comparative studies between CO2-vulnerable and resistant strains may facilitate the mechanistic understanding of differential CO2-sensitivity in the development of panic and anxiety disorders. PMID:28087339

  7. Identification and characterization of a new Bacillus atrophaeus strain B5 as biocontrol agent of postharvest anthracnose disease in soursop (Annona muricata) and avocado (Persea americana).

    PubMed

    Guardado-Valdivia, Lizeth; Tovar-Pérez, Erik; Chacón-López, Alejandra; López-García, Ulises; Gutiérrez-Martínez, Porfirio; Stoll, Alexandra; Aguilera, Selene

    2018-05-01

    Anthracnose is a fungal disease caused by Colletotrichum species that is detrimental to numerous fruit, including soursop and avocado. The use of fungicides to maintain the high quality of fruit creates a potential health risk. One alternative to this problem is the biological control, which has been applied successfully during postharvest. The Bacillus species are one of the most studied biological agents against postharvest pathogens because accomplish their biocontrol performance by producing a variety of metabolites. In this study, we evaluated the activity of metabolites contained in the cell free supernatant, obtained from Bacillus strain B5 culture, against micelial growth and spore germination of two virulent strains of C. gloeosporioides isolated from soursop and avocado. On the basis of 16S rDNA gene sequence analysis, this strain was identified as Bacillus atrophaeus. A preventive treatment using cell free supernatant, reduced severity and incidence of anthracnose disease on harvested soursop and avocado fruit. B. atrophaeus strain B5 harbors genes involved in the production of antibiotics such as surfactin, bacillomycin and iturin, which could be contributing to the efficiency of the preventive treatment during postharvest. The antagonistic role of metabolites contained in the cell free supernatant against anthracnose disease, provide a new approach by which to attack this problem and can help reduce the use of chemical pesticides, environmental pollution, leading to the safer fruit preservation. Copyright © 2018 Elsevier GmbH. All rights reserved.

  8. Design and Flight Evaluation of a New Force-Based Flow Angle Probe

    NASA Technical Reports Server (NTRS)

    Corda, Stephen; Vachon, Michael Jacob

    2006-01-01

    A novel force-based flow angle probe was designed and flight tested on the NASA F-15B Research Testbed aircraft at NASA Dryden Flight Research Center. The prototype flow angle probe is a small, aerodynamic fin that has no moving parts. Forces on the prototype flow angle probe are measured with strain gages and correlated with the local flow angle. The flow angle probe may provide greater simplicity, greater robustness, and better access to flow measurements in confined areas relative to conventional moving vane-type flow angle probes. Flight test data were obtained at subsonic, transonic, and supersonic Mach numbers to a maximum of Mach 1.70. Flight conditions included takeoff, landing, straight and level flight, flight at higher aircraft angles of attack, and flight at elevated g-loadings. Flight test maneuvers included angle-of-attack and angle-of-sideslip sweeps. The flow angle probe-derived flow angles are compared with those obtained with a conventional moving vane probe. The flight tests validated the feasibility of a force-based flow angle measurement system.

  9. Full-scale wind-tunnel investigation of the effects of wing leading-edge modifications on the high angle-of-attack aerodynamic characteristics of a low-wing general aviation airplane

    NASA Technical Reports Server (NTRS)

    Johnson, J. L., Jr.; Newsom, W. A.; Satran, D. R.

    1980-01-01

    The paper presents the results of a recent investigation to determine the effects of wing leading-edge modifications on the high angle-of-attack aerodynamic characteristics of a low-wing general aviation airplane in the Langley Full-Scale Wind Tunnel. The investigation was conducted to provide aerodynamic information for correlation and analysis of flight-test results obtained for the configuration. The wind-tunnel investigation consisted of force and moment measurements, wing pressure measurements, flow surveys, and flow visualization studies utilizing a tuft grid, smoke and nonintrusive mini-tufts which were illuminated by ultra-violet light. In addition to the tunnel scale system which measured overall forces and moments, the model was equipped with an auxiliary strain-gage balance within the left wing panel to measure lift and drag forces on the outer wing panel independent of the tunnel scale system. The leading-edge modifications studied included partial- and full-span leading-edge droop arrangements as well as leading-edge slats.

  10. Static aeroelastic deformation of flexible skin for continuous variable trailing-edge camber wing

    NASA Astrophysics Data System (ADS)

    Liu, Libo; Yin, Weilong; Dai, Fuhong; Liu, Yanju; Leng, Jinsong

    2011-03-01

    The method for analyzing the static aeroelastic deformation of flexible skin under the air loads was developed. The effect of static aeroelastic deformation of flexible skin on the aerodynamic characteristics of aerofoil and the design parameters of skin was discussed. Numerical results show that the flexible skin on the upper surface of trailing-edge will bubble under the air loads and the bubble has a powerful effect on the aerodynamic pressure near the surface of local deformation. The static aeroelastic deformation of flexible skin significantly affects the aerodynamic characteristics of aerofoil. At small angle of attack, the drag coefficient increases and the lift coefficient decreases. With the increasing angle of attack, the effect of flexible skin on the aerodynamic characteristics of aerofoil is smaller and smaller. The deformation of flexible skin becomes larger and larger with the free-stream velocity increasing. When the free-stream velocity is greater than a value, both of the deformation of flexible skin and the drag coefficient of aerofoil increase rapidly. The maximum tensile strain of flexible skin is increased with consideration of the static aeroelastic deformation.

  11. Marine Transducing Bacteriophage Attacking a Luminous Bacterium

    PubMed Central

    Keynan, Alex; Nealson, Kenneth; Sideropoulos, Henry; Hastings, J. W.

    1974-01-01

    The isolation and partial characterization of a marine bacteriophage attacking a strain of luminous bacteria is described, including some physical, biological, and genetic properties. It is a DNA phage of density of 1.52 with a long flexible tail and an apparently icosohedral head. With respect to stability in suspension, it has a rather specific requirement for the sodium ion in high concentration; it is further stabilized by the addition of calcium and magnesium ions. These same ions are likewise all required for both good plating efficiency and plaque uniformity. Although it goes through a typical lytic growth cycle (about 45 min), with a burst size of 100, and no stable lysogens have been isolated, it is nevertheless a transducing phage specifically for the tryptophan region, transducing several, but not all, independently isolated Trp− auxotrophs to protrophy. No other auxotrophs of a variety of amino acids were transduced by this phage to prototrophy. Phage infection does not change the normal expression of the luminescent system, and light remains at near normal levels until cell lysis occurs. Images PMID:16789143

  12. Rhizobial galactoglucan determines the predatory pattern of Myxococcus xanthus and protects Sinorhizobium meliloti from predation

    PubMed Central

    Pérez, Juana; Jiménez-Zurdo, José I.; Martínez-Abarca, Francisco; Millán, Vicenta; Shimkets, Lawrence J.; Muñoz-Dorado, José

    2014-01-01

    Summary Myxococcus xanthus is a social bacterium that preys on prokaryotic and eukaryotic microorganisms. Co-culture of M. xanthus with reference laboratory strains and field isolates of the legume symbiont Sinorhizobium meliloti revealed two different predatory patterns that resemble frontal and wolfpack attacks. Use of mutants impaired in the two types of M. xanthus surface motility (A or adventurous and S or social motility) and a csgA mutant, which is unable to form macroscopic travelling waves known as ripples, has demonstrated that both motility systems but not rippling are required for efficient predation. To avoid frontal attack and reduce killing rates, rhizobial cells require a functional expR gene. ExpR regulates expression of genes involved in a variety of functions. The use of S. meliloti mutants impaired in several of these functions revealed that the exopolysaccharide galactoglucan (EPS II) is the major determinant of the M. xanthus predatory pattern. The data also suggest that this biopolymer confers an ecological advantage to rhizobial survival in soil, which may have broad environmental implications. PMID:24707988

  13. Norovirus GII.17 Outbreak Linked to an Infected Post-Symptomatic Food Worker in a French Military Unit Located in France.

    PubMed

    Sanchez, Marc-Antoine; Corcostégui, Simon-Pierre; De Broucker, Charles-Arnaud; Cabre, Olivier; Watier-Grillot, Stéphanie; Perelle, Sylvie; Ambert-Balay, Katia; Pommier de Santi, Vincent

    2017-06-01

    In February 2016, an outbreak of gastroenteritis occurred in a French military unit located in Poitiers, France. Attack rate was of 34% (103/300). A case-control study identified association between illness and cake consumption. Stool samples were tested positive for Norovirus GII.17 for one patient and one post-symptomatic food worker (FW). The FW presented vomiting one day before cake preparation. The NoV strain was probably spread through food worker hand contact. Prevention of Norovirus foodborne outbreaks implies new guidelines for FWs management in France and Europe.

  14. MATI, a Novel Protein Involved in the Regulation of Herbivore-Associated Signaling Pathways

    PubMed Central

    Santamaría, M. Estrella; Martinez, Manuel; Arnaiz, Ana; Ortego, Félix; Grbic, Vojislava; Diaz, Isabel

    2017-01-01

    The defense response of the plants against herbivores relies on a complex network of interconnected signaling pathways. In this work, we characterized a new key player in the response of Arabidopsis against the two-spotted spider mite Tetranychus urticae, the MATI (Mite Attack Triggered Immunity) gene. This gene was differentially induced in resistant Bla-2 strain relative to susceptible Kon Arabidopsis accessions after mite attack, suggesting a potential role in the control of spider mites. To study the MATI gene function, it has been performed a deep molecular characterization of the gene combined with feeding bioassays using modified Arabidopsis lines and phytophagous arthropods. The MATI gene belongs to a new gene family that had not been previously characterized. Biotic assays showed that it confers a high tolerance not only to T. urticae, but also to the chewing lepidopteran Spodoptera exigua. Biochemical analyses suggest that MATI encodes a protein involved in the accumulation of reducing agents upon herbivore attack to control plant redox homeostasis avoiding oxidative damage and cell death. Besides, molecular analyses demonstrated that MATI is involved in the modulation of different hormonal signaling pathways, affecting the expression of genes involved in biosynthesis and signaling of the jasmonic acid and salicylic acid hormones. The fact that MATI is also involved in defense through the modulation of the levels of photosynthetic pigments highlights the potential of MATI proteins to be exploited as biotechnological tools for pest control. PMID:28649257

  15. Electron Microscopy Characterizations and Atom Probe Tomography of Intergranular Attack in Alloy 600 Exposed to PWR Primary Water

    NASA Astrophysics Data System (ADS)

    Olszta, Matthew J.; Schreiber, Daniel K.; Thomas, Larry E.; Bruemmer, Stephen M.

    Detailed examinations of intergranular attack (IGA) in alloy 600 were performed after exposure to simulated PWR primary water at 325°C for 500 h. High-resolution analyses of IGA characteristics were conducted on specimens with either a 1 µm diamond or 1200-grit SiC surface finish using scanning electron microscopy, transmission electron microscopy and atom probe tomography techniques. The diamond-polish finish with very little preexisting subsurface damage revealed attack of high-energy grain boundaries that intersected the exposed surface to depths approaching 2 µm. In all cases, IGA from the surface is localized oxidation consisting of porous, nanocrystalline MO-structure and spinel particles along with regions of faceted wall oxidation. Surprisingly, this continuous IG oxidation transitions to discontinuous, discrete Cr-rich sulfide particles up to 50 nm in diameter. In the vicinity of the sulfides, the grain boundaries were severely Cr depleted (to <1 at%) and enriched in S. The 1200 grit SiC finish surface exhibited a preexisting highly strained recrystallized layer of elongated nanocrystalline matrix grains. Similar IG oxidation and leading sulfide particles were found, but the IGA depth was typically confined to the near-surface ( 400 nm) recrystallized region. Difference in IGA for the two surface finishes indicates that the formation of grain boundary sulfides occurs during the exposure to PWR primary water. The source of S remains unclear, however it is not present as sulfides in the bulk alloy nor is it segregated to bulk grain boundaries.

  16. Normobaric hyperoxia markedly reduces brain damage and sensorimotor deficits following brief focal ischaemia.

    PubMed

    Ejaz, Sohail; Emmrich, Julius V; Sitnikov, Sergey L; Hong, Young T; Sawiak, Stephen J; Fryer, Tim D; Aigbirhio, Franklin I; Williamson, David J; Baron, Jean-Claude

    2016-03-01

    'True' transient ischaemic attacks are characterized not only clinically, but also radiologically by a lack of corresponding changes on magnetic resonance imaging. During a transient ischaemic attack it is assumed that the affected tissue is penumbral but rescued by early spontaneous reperfusion. There is, however, evidence from rodent studies that even brief focal ischaemia not resulting in tissue infarction can cause extensive selective neuronal loss associated with long-lasting sensorimotor impairment but normal magnetic resonance imaging. Selective neuronal loss might therefore contribute to the increasingly recognized cognitive impairment occurring in patients with transient ischaemic attacks. It is therefore relevant to consider treatments to reduce brain damage occurring with transient ischaemic attacks. As penumbral neurons are threatened by markedly constrained oxygen delivery, improving the latter by increasing arterial O2 content would seem logical. Despite only small increases in arterial O2 content, normobaric oxygen therapy experimentally induces significant increases in penumbral O2 pressure and by such may maintain the penumbra alive until reperfusion. Nevertheless, the effects of normobaric oxygen therapy on infarct volume in rodent models have been conflicting, although duration of occlusion appeared an important factor. Likewise, in the single randomized trial published to date, early-administered normobaric oxygen therapy had no significant effect on clinical outcome despite reduced diffusion-weighted imaging lesion growth during therapy. Here we tested the hypothesis that normobaric oxygen therapy prevents both selective neuronal loss and sensorimotor deficits in a rodent model mimicking true transient ischaemic attack. Normobaric oxygen therapy was applied from the onset and until completion of 15 min distal middle cerebral artery occlusion in spontaneously hypertensive rats, a strain representative of the transient ischaemic attack-prone population. Whereas normoxic controls showed normal magnetic resonance imaging but extensive cortical selective neuronal loss associated with microglial activation (present both at Day 14 in vivo and at Day 28 post-mortem) and marked and long-lasting sensorimotor deficits, normobaric oxygen therapy completely prevented sensorimotor deficit (P < 0.02) and near-completely Day 28 selective neuronal loss (P < 0.005). Microglial activation was substantially reduced at Day 14 and completely prevented at Day 28 (P = 0.002). Our findings document that normobaric oxygen therapy administered during ischaemia nearly completely prevents the neuronal death, microglial inflammation and sensorimotor impairment that characterize this rodent true transient ischaemic attack model. Taken together with the available literature, normobaric oxygen therapy appears a promising therapy for short-lasting ischaemia, and is attractive clinically as it could be started at home in at-risk patients or in the ambulance in subjects suspected of transient ischaemic attack/early stroke. It may also be a straightforward adjunct to reperfusion therapies, and help prevent subtle brain damage potentially contributing to long-term cognitive and sensorimotor impairment in at-risk populations. © The Author (2016). Published by Oxford University Press on behalf of the Guarantors of Brain. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  17. The extracellular phage-host interactions involved in the bacteriophage LL-H infection of Lactobacillus delbrueckii ssp. lactis ATCC 15808

    PubMed Central

    Munsch-Alatossava, Patricia; Alatossava, Tapani

    2013-01-01

    The complete genome sequence of Lactobacillus bacteriophage LL-H was determined in 1996. Accordingly, LL-H has been used as a model phage for the infection of dairy Lactobacillus, specifically for thermophilic Lactobacillus delbrueckii ssp. lactis host strains, such as ATCC 15808. One of the major goals of phage LL-H research consisted of the characterization of the first phage-host interactions at the level of phage adsorption and phage DNA injection steps to determine effective and practical methods to minimize the risks associated with the appearance and attack of phages in the manufacture of yogurt, and Swiss or Italian hard type cheeses, which typically use thermophilic lactic acid bacteria starter cultures containing L. delbrueckii strains among others. This mini review article summarizes the present data concerning (i) the special features, particle structure, and components of phage LL-H and (ii) the structure and properties of lipoteichoic acids (LTAs), which are the phage LL-H receptor components of L. delbrueckii ssp. lactis host strains. Moreover, a model of the first, extracellular, phage-host interactions for the infection of L. delbrueckii ssp. lactis ATCC 15808 by phage LL-H is presented and further discussed. PMID:24400001

  18. Metabolism of dibenzo-p-dioxin by Sphingomonas sp. strain RW1

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wittich, R.M.; Wilkes, H.; Sinnwell, V.

    In the course of screening for dibenzo-p-dioxin-utilizing bacteria, a Sphingomonas sp. strain was isolated from enrichment cultures inoculated with water samples from the river Elbe. The isolate grew with both the biaryl ethers dibenzo-p-dioxin and dibenzofuran (DF) as the sole sources of carbon and energy, showing doubling times of about 8 and 5 h, respectively. Biodegradation of the two aromatic compounds initially proceeded after an oxygenolytic attack at the angular position adjacent to the ether bridge, producing 2,2{prime},3-trihydroxydiphenyl ether or 2,2{prime},3-trihydroxybiphenyl from the initially formed dihydrodiols, which represent extremely unstable hemiacetals. Results obtained from determinations of enzyme activities and oxygenmore » consumption suggest meta cleavage of the trihydroxy compounds. During dibenzofuran degradation, hydrolysis of 2-hydroxy-6-oxo-6-(2-hydroxyphenyl)-hexa-2,4-dienoate yielded salicylate, which was branched into the catechol meta cleavage pathway and the gentisate pathway. Catechol obtained from the product of meta ring fission of 2,2{prime},3-trihydroxydiphenyl ether was both ortho and meta cleaved by Sphingomonas sp. strain RW1 when this organism was grown with dibenzo-p-dioxin.« less

  19. The extracellular phage-host interactions involved in the bacteriophage LL-H infection of Lactobacillus delbrueckii ssp. lactis ATCC 15808.

    PubMed

    Munsch-Alatossava, Patricia; Alatossava, Tapani

    2013-12-24

    The complete genome sequence of Lactobacillus bacteriophage LL-H was determined in 1996. Accordingly, LL-H has been used as a model phage for the infection of dairy Lactobacillus, specifically for thermophilic Lactobacillus delbrueckii ssp. lactis host strains, such as ATCC 15808. One of the major goals of phage LL-H research consisted of the characterization of the first phage-host interactions at the level of phage adsorption and phage DNA injection steps to determine effective and practical methods to minimize the risks associated with the appearance and attack of phages in the manufacture of yogurt, and Swiss or Italian hard type cheeses, which typically use thermophilic lactic acid bacteria starter cultures containing L. delbrueckii strains among others. This mini review article summarizes the present data concerning (i) the special features, particle structure, and components of phage LL-H and (ii) the structure and properties of lipoteichoic acids (LTAs), which are the phage LL-H receptor components of L. delbrueckii ssp. lactis host strains. Moreover, a model of the first, extracellular, phage-host interactions for the infection of L. delbrueckii ssp. lactis ATCC 15808 by phage LL-H is presented and further discussed.

  20. Biodegradation of cis-1,4-Polyisoprene Rubbers by Distinct Actinomycetes: Microbial Strategies and Detailed Surface Analysis

    PubMed Central

    Linos, Alexandros; Berekaa, Mahmoud M.; Reichelt, Rudolf; Keller, Ulrike; Schmitt, Jürgen; Flemming, Hans-Curt; Kroppenstedt, Reiner M.; Steinbüchel, Alexander

    2000-01-01

    Several actinomycetes isolated from nature were able to use both natural rubber (NR) and synthetic cis-1,4-polyisoprene rubber (IR) as a sole source of carbon. According to their degradation behavior, they were divided into two groups. Representatives of the first group grew only in direct contact to the rubber substrate and led to considerable disintegration of the material during cultivation. The second group consisted of weaker rubber decomposers that did not grow adhesively, as indicated by the formation of clear zones (translucent halos) around bacterial colonies after cultivation on NR dispersed in mineral agar. Taxonomic analysis of four selected strains based on 16S rRNA similarity examinations revealed two Gordonia sp. strains, VH2 and Kb2, and one Mycobacterium fortuitum strain, NF4, belonging to the first group as well as one Micromonospora aurantiaca strain, W2b, belonging to the second group. Schiff's reagent staining tests performed for each of the strains indicated colonization of the rubber surface, formation of a bacterial biofilm, and occurrence of compounds containing aldehyde groups during cultivation with NR latex gloves. Detailed analysis by means of scanning electron microscopy yielded further evidence for the two different microbial strategies and clarified the colonization efficiency. Thereby, strains VH2, Kb2, and NF4 directly adhered to and merged into the rubber material, while strain W2b produced mycelial corridors, especially on the surface of IR. Fourier transform infrared spectroscopy comprising the attenuated total reflectance technique was applied on NR latex gloves overgrown by cells of the Gordonia strains, which were the strongest rubber decomposers. Spectra demonstrated the decrease in number of cis-1,4 double bonds, the formation of carbonyl groups, and the change of the overall chemical environment, indicating that an oxidative attack at the double bond is the first metabolic step of the biodegradation process. PMID:10742254

  1. Addition of genes for cellobiase and pectinolytic activity in Escherichia coli for fuel ethanol production from pectin-rich lignocellulosic biomass.

    PubMed

    Edwards, Meredith C; Henriksen, Emily Decrescenzo; Yomano, Lorraine P; Gardner, Brian C; Sharma, Lekh N; Ingram, Lonnie O; Doran Peterson, Joy

    2011-08-01

    Ethanologenic Escherichia coli strain KO11 was sequentially engineered to contain the Klebsiella oxytoca cellobiose phosphotransferase genes (casAB) as well as a pectate lyase (pelE) from Erwinia chrysanthemi, yielding strains LY40A (casAB) and JP07 (casAB pelE), respectively. To obtain an effective secretion of PelE, the Sec-dependent pathway out genes from E. chrysanthemi were provided on a cosmid to strain JP07 to construct strain JP07C. Finally, oligogalacturonide lyase (ogl) from E. chrysanthemi was added to produce strain JP08C. E. coli strains LY40A, JP07, JP07C, and JP08C possessed significant cellobiase activity in cell lysates, while only strains JP07C and JP08C demonstrated extracellular pectate lyase activity. Fermentations conducted by using a mixture of pure sugars representative of the composition of sugar beet pulp (SBP) showed that strains LY40A, JP07, JP07C, and JP08C were able to ferment cellobiose, resulting in increased ethanol production from 15 to 45% in comparison to that of KO11. Fermentations with SBP at very low fungal enzyme loads during saccharification revealed significantly higher levels of ethanol production for LY40A, JP07C, and JP08C than for KO11. JP07C ethanol yields were not considerably higher than those of LY40A; however, oligogalacturonide polymerization studies showed an increased breakdown of biomass to small-chain (degree of polymerization, ≤6) oligogalacturonides. JP08C achieved a further breakdown of polygalacturonate to monomeric sugars, resulting in a 164% increase in ethanol yields compared to those of KO11. The addition of commercial pectin methylesterase (PME) further increased JP08C ethanol production compared to that of LY40A by demethylating the pectin for enzymatic attack by pectin-degrading enzymes.

  2. Addition of Genes for Cellobiase and Pectinolytic Activity in Escherichia coli for Fuel Ethanol Production from Pectin-Rich Lignocellulosic Biomass▿

    PubMed Central

    Edwards, Meredith C.; Henriksen, Emily DeCrescenzo; Yomano, Lorraine P.; Gardner, Brian C.; Sharma, Lekh N.; Ingram, Lonnie O.; Doran Peterson, Joy

    2011-01-01

    Ethanologenic Escherichia coli strain KO11 was sequentially engineered to contain the Klebsiella oxytoca cellobiose phosphotransferase genes (casAB) as well as a pectate lyase (pelE) from Erwinia chrysanthemi, yielding strains LY40A (casAB) and JP07 (casAB pelE), respectively. To obtain an effective secretion of PelE, the Sec-dependent pathway out genes from E. chrysanthemi were provided on a cosmid to strain JP07 to construct strain JP07C. Finally, oligogalacturonide lyase (ogl) from E. chrysanthemi was added to produce strain JP08C. E. coli strains LY40A, JP07, JP07C, and JP08C possessed significant cellobiase activity in cell lysates, while only strains JP07C and JP08C demonstrated extracellular pectate lyase activity. Fermentations conducted by using a mixture of pure sugars representative of the composition of sugar beet pulp (SBP) showed that strains LY40A, JP07, JP07C, and JP08C were able to ferment cellobiose, resulting in increased ethanol production from 15 to 45% in comparison to that of KO11. Fermentations with SBP at very low fungal enzyme loads during saccharification revealed significantly higher levels of ethanol production for LY40A, JP07C, and JP08C than for KO11. JP07C ethanol yields were not considerably higher than those of LY40A; however, oligogalacturonide polymerization studies showed an increased breakdown of biomass to small-chain (degree of polymerization, ≤6) oligogalacturonides. JP08C achieved a further breakdown of polygalacturonate to monomeric sugars, resulting in a 164% increase in ethanol yields compared to those of KO11. The addition of commercial pectin methylesterase (PME) further increased JP08C ethanol production compared to that of LY40A by demethylating the pectin for enzymatic attack by pectin-degrading enzymes. PMID:21666025

  3. Cellulolytic Streptomyces Strains Associated with Herbivorous Insects Share a Phylogenetically Linked Capacity To Degrade Lignocellulose

    PubMed Central

    Book, Adam J.; Lewin, Gina R.; McDonald, Bradon R.; Takasuka, Taichi E.; Doering, Drew T.; Adams, Aaron S.; Blodgett, Joshua A. V.; Clardy, Jon; Raffa, Kenneth F.; Fox, Brian G.

    2014-01-01

    Actinobacteria in the genus Streptomyces are critical players in microbial communities that decompose complex carbohydrates in the soil, and these bacteria have recently been implicated in the deconstruction of plant polysaccharides for some herbivorous insects. Despite the importance of Streptomyces to carbon cycling, the extent of their plant biomass-degrading ability remains largely unknown. In this study, we compared four strains of Streptomyces isolated from insect herbivores that attack pine trees: DpondAA-B6 (SDPB6) from the mountain pine beetle, SPB74 from the southern pine beetle, and SirexAA-E (SACTE) and SirexAA-G from the woodwasp, Sirex noctilio. Biochemical analysis of secreted enzymes demonstrated that only two of these strains, SACTE and SDPB6, were efficient at degrading plant biomass. Genomic analyses indicated that SACTE and SDPB6 are closely related and that they share similar compositions of carbohydrate-active enzymes. Genome-wide proteomic and transcriptomic analyses revealed that the major exocellulases (GH6 and GH48), lytic polysaccharide monooxygenases (AA10), and mannanases (GH5) were conserved and secreted by both organisms, while the secreted endocellulases (GH5 and GH9 versus GH9 and GH12) were from diverged enzyme families. Together, these data identify two phylogenetically related insect-associated Streptomyces strains with high biomass-degrading activity and characterize key enzymatic similarities and differences used by these organisms to deconstruct plant biomass. PMID:24837391

  4. Physiological and molecular characterization of Phytophthora infestans isolates from the Central Colombian Andean Region.

    PubMed

    Céspedes, María C; Cárdenas, Martha E; Vargas, Angela M; Rojas, Alejandro; Morales, Juan G; Jiménez, Pedro; Bernal, Adriana J; Restrepo, Silvia

    2013-01-01

    Late blight, caused by Phytophthora infestans, is one of the most devastating diseases found in potato and tomato crops worldwide. In Colombia it also attacks other important crops: cape gooseberry and tree tomato. The knowledge of the pathogen population is determinant to effectively design control strategies. To determine the physiological and molecular characteristics of a set of Colombian P. infestans isolates. Strains isolated from Cundinamarca and Boyacá were examined for the level of resistance to mefenoxam and cymoxanil. Virulence was tested for all strains and crosses between A1 mating type, from different hosts, and the Colombian A2 mating type were tested for the production and viability of oospores in different substrates. Additionally, the molecular diversity of the avirulence gene Avr3a, the β-tubulin gene, and two single copy genes showing RxLR motif, was assessed. We found all levels of mefenoxam sensitivity, with 48% of the strains resistant. A high diversity of races was detected and the population was genetically clonal. Colombian strains had the possibility of sexual reproduction. These results will help in optimizing the use of fungicides and deployment of resistance as control strategies and will contribute to broader studies on diversity of this pathogen. Copyright © 2012 Revista Iberoamericana de Micología. Published by Elsevier Espana. All rights reserved.

  5. Understanding Virulence in the Brucellae and Francisellae: Towards Efficacious Treatments for Two Potential Biothreat Agents

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Rasley, A; Parsons, D A; El-Etr, S

    2009-12-30

    Francisella tularensis, Yersinia pestis and Brucellae species are highly infectious pathogens classified as select agents by the Centers for Disease Control and Prevention (CDC) with the potential for use in bioterrorism attacks. These organisms are known to be facultative intracellular pathogens that preferentially infect human monocytes. As such, understanding how the host responds to infection with these organisms is paramount in detecting and combating human disease. We have compared the ability of fully virulent strains of each pathogen and their non-pathogenic near neighbors to enter and survive inside the human monocytic cell line THP-1 and have quantified the cellular responsemore » to infection with the goal of identifying both unique and common host response patterns. We expanded the scope of these studies to include experiments with pathogenic and non-pathogenic strains of Y. pestis, the causative agent of plague. Nonpathogenic strains of each organism were impaired in their ability to survive intracellularly compared with their pathogenic counterparts. Furthermore, infection of THP-1 cells with pathogenic strains of Y. pestis and F. tularensis resulted in marked increases in the secretion of the inflammatory chemokines IL-8, RANTES, and MIP-1{beta}. In contrast, B. melitensis infection failed to elicit any significant increases in a panel of cytokines tested. These differences may underscore distinct strategies in pathogenic mechanisms employed by these pathogens.« less

  6. Crack tip field and fatigue crack growth in general yielding and low cycle fatigue

    NASA Technical Reports Server (NTRS)

    Minzhong, Z.; Liu, H. W.

    1984-01-01

    Fatigue life consists of crack nucleation and crack propagation periods. Fatigue crack nucleation period is shorter relative to the propagation period at higher stresses. Crack nucleation period of low cycle fatigue might even be shortened by material and fabrication defects and by environmental attack. In these cases, fatigue life is largely crack propagation period. The characteristic crack tip field was studied by the finite element method, and the crack tip field is related to the far field parameters: the deformation work density, and the product of applied stress and applied strain. The cyclic carck growth rates in specimens in general yielding as measured by Solomon are analyzed in terms of J-integral. A generalized crack behavior in terms of delta is developed. The relations between J and the far field parameters and the relation for the general cyclic crack growth behavior are used to analyze fatigue lives of specimens under general-yielding cyclic-load. Fatigue life is related to the applied stress and strain ranges, the deformation work density, crack nucleus size, fracture toughness, fatigue crack growth threshold, Young's modulus, and the cyclic yield stress and strain. The fatigue lives of two aluminum alloys correlate well with the deformation work density as depicted by the derived theory. The general relation is reduced to Coffin-Manson low cycle fatigue law in the high strain region.

  7. Effectiveness of Rubella vaccine in a rubella outbreak in Guangzhou city, China, 2014.

    PubMed

    Chang, Caiyun; Mo, Xianghuan; Hu, Pei; Liang, Wenjia; Ma, Huilai; An, Zhijie; Liu, Jun; Zheng, Huizhen

    2015-06-22

    WHO recommends the use of rubella-containing vaccine (RCVs) to prevent rubella and congenital rubella syndrome (CRS). Most licensed rubella vaccines in use globally are based on RA27/3 strains and have estimated vaccine effectiveness (VE) rates of 95-100%. In contrast, China uses a BRD-II strain-based rubella vaccine. Few field studies have been conducted that estimate VE of China's RCV. On March 17, 2014, a rubella outbreak was reported in a middle school in Guangzhou city, China. We conducted an investigation to understand reasons for the outbreak, and we used that investigation to estimate vaccine effectiveness of China's rubella vaccine. To identify cases, investigators reviewed records kept by the school doctor and absentee records kept by teachers. Self-administered questionnaires were sent to parents of all students to collect information about the students' symptoms, the results of any physician consultation, and disease history. We obtained demographic information and illness information for all students in the school; vaccination status was determined by inspection of official, parent-held vaccination records. A retrospective cohort study was conducted in 13 classes that had secondary cases of rubella. Using the secondary attack rates, we evaluated VE by the number of RCV doses received and age at vaccination. During the period February 17-May 23, 2014, 162 students (50 suspected cases, 88 probable cases, 24 confirmed cases) were diagnosed with rubella, yielding an overall attack rate of 10% (162/1621). Cases occurred in 27 classes (73%) of 37 classrooms. Secondary cases occurred in 13 classes (35%) of 37 classrooms. A total of 1130 students (69.7%) have vaccination certificates; 419 (37%) students were record-confirmed to have received RCV. For those vaccinated using BRD-II strain vaccine, vaccine effectiveness (VE) was 94% (95%CI: 75-98). VE for measles, mumps, and rubella (MMR) vaccine which is based on either BRD-II or RA27/3 strain was 89% (95%CI: 56-97). VE of a single dose of domestic monovalent rubella vaccine that used BRD-II strain vaccine was 93% (95%CI: 73-98). VE for those who received the vaccine between 1 and 2 years of age was 95% (95% CI: 67-99) while the VE was 100% for those vaccinated after 2 years of age. VE among those who received RCV <12 years ago was 100% while VE among those who received RCV ≥12 years ago was 92% (95%CI: 70-98). The rubella vaccines used in China that are based on the BRD-II rubella vaccine strain have VE of 94%, which is similar to the more commonly used RA27/3-based RCVs. Low vaccination coverage contributed to this outbreak; early reporting of an outbreak is necessary for effective outbreak response immunization. Copyright © 2015 Elsevier Ltd. All rights reserved.

  8. [Food poisoning outbreak due to the consumption of spaghetti a la carbonara caused by Salmonella enteritidis].

    PubMed

    Godoy, P; Artigues, A; Usera, M A; González, J L; Pablo, N; Agustí, M

    2000-01-01

    This paper reports a clinico-epidemiological and microbiological investigation conducted into an outbreak of gastrointestinal infection due to Salmonella enteritidis, where the most likely food vehicle was spaghetti a la carbonara. An historic cohort study was conducted out among persons exposed to menus at a school canteen. Data were gathered on age, sex, foods consumed and clinical symptoms. School premises and menus were inspected, food samples obtained (spaghetti and meat balls), and stool samples taken from 30 affected subjects and 8 food handlers. Isolated strains were studied using pulsed-field electrophoresis. Attack rates were computed, and the odds ratio adjusted for the remaining foodstuffs (ORa) used to calculate the independent contribution made by the respective foods to risk of infection. Study coverage was 75.7% (140/185). The overall attack rate was 72.1% (101/140), with 12.9% of those affected requiring hospitalisation. The multivariate analysis showed that, while the spaghetti maintained its association (ORa = 8.4; 95% CI 1.4-51.8), the meat balls registered a reduction in risk (ORa = 1.8; 95% CI 0.4-7.5). S. enteritidis was isolated in stool cultures from 28 affected subjects, and in 2 blood and 6 stool cultures from food handlers (5 of whom were classed as cases). Moreover, S. enteritidis was also isolated in the food samples. On pulsed-field electrophoresis, the strains registered the same electrophoresis pattern. This outbreak serves to underscore the gravity of Salmonella spp. food poisoning, the danger of using inadequately cooked eggs, and the importance of interviewing food handlers to ensure proper classification (i.e., as patients or carriers). Existing recommendations as to the use of pasteurised egg products ought to be extended in scope.

  9. Identification of a Novel Dioxygenase Involved in Metabolism of o-Xylene, Toluene, and Ethylbenzene by Rhodococcus sp. Strain DK17

    PubMed Central

    Kim, Dockyu; Chae, Jong-Chan; Zylstra, Gerben J.; Kim, Young-Soo; Kim, Seong-Ki; Nam, Myung Hee; Kim, Young Min; Kim, Eungbin

    2004-01-01

    Rhodococcus sp. strain DK17 is able to grow on o-xylene, benzene, toluene, and ethylbenzene. DK17 harbors at least two megaplasmids, and the genes encoding the initial steps in alkylbenzene metabolism are present on the 330-kb pDK2. The genes encoding alkylbenzene degradation were cloned in a cosmid clone and sequenced completely to reveal 35 open reading frames (ORFs). Among the ORFs, we identified two nearly exact copies (one base difference) of genes encoding large and small subunits of an iron sulfur protein terminal oxygenase that are 6 kb apart from each other. Immediately downstream of one copy of the dioxygenase genes (akbA1a and akbA2a) is a gene encoding a dioxygenase ferredoxin component (akbA3), and downstream of the other copy (akbA1b and akbA2b) are genes putatively encoding a meta-cleavage pathway. RT-PCR experiments show that the two copies of the dioxygenase genes are operonic with the downstream putative catabolic genes and that both operons are induced by o-xylene. When expressed in Escherichia coli, AkbA1a-AkbA2a-AkbA3 transformed o-xylene into 2,3- and 3,4-dimethylphenol. These were apparently derived from an unstable o-xylene cis-3,4-dihydrodiol, which readily dehydrates. This indicates a single point of attack of the dioxygenase on the aromatic ring. In contrast, attack of AkbA1a-AkbA2a-AkbA3 on ethylbenzene resulted in the formation of two different cis-dihydrodiols resulting from an oxidation at the 2,3 and the 3,4 positions on the aromatic ring, respectively. PMID:15574904

  10. Impact of lower challenge doses of enterotoxigenic Escherichia coli on clinical outcome, intestinal colonization and immune responses in adult volunteers.

    PubMed

    Chakraborty, Subhra; Harro, Clayton; DeNearing, Barbara; Brubaker, Jessica; Connor, Sean; Maier, Nicole; Dally, Len; Flores, Jorge; Bourgeois, A Louis; Walker, Richard; Sack, David A

    2018-04-01

    A reliable and effective human challenge model is needed to help down-select the most promising ETEC vaccines currently under development. Such a model would need to reliably induce diarrhea in a high proportion of volunteers using the lowest possible inoculum to maximize safety and sensitivity. Previously we validated a challenge model that utilized a dose of 2x107 CFU of ETEC strain H10407 (LT+, ST+, CFA/I+ and O78+) to induce attack rates for moderate to severe diarrhea (MSD) of ~60-70%. Here we detail efforts to further refine the model in an attempt to determine if a lower challenge dose of H10407 can be used. Thirty subjects were randomized 1:1 to receive an oral administration of H10407 at doses of 106 or 105 CFU in bicarbonate buffer. After challenge, subjects were monitored for signs and symptoms of enteric illness and stool samples were collected to detect shedding of the challenge strain. Systemic and mucosal immune responses were measured using serum, antibody in lymphocyte supernatant and fecal samples. The attack rate was 13.3% (2/15) and 26.7% (4/15) for MSD in the 105 and 106 groups, respectively. Four MSD cases met criteria for early antibiotic treatment. All subjects but one shed the challenge strain in fecal samples. The frequency and magnitude of anti-LT toxin, CFA/I and LPS O78 immune responses were antigen, dose, severity of diarrhea and shedding levels dependent. Notably, although of lower magnitude, there were considerable immune responses in the subjects with no diarrhea. This may indicate that immune responses to asymptomatic infections of ETEC in children in the endemic countries may contribute to protection. Based on this and our prior studies, we conclude that a dose of 2x107 H10407 remains the lowest practical dose for use in future volunteer studies evaluating candidate vaccines and other preventive or therapeutic ETEC interventions. ClinicalTrials.gov NCT00844493.

  11. Impact of lower challenge doses of enterotoxigenic Escherichia coli on clinical outcome, intestinal colonization and immune responses in adult volunteers

    PubMed Central

    DeNearing, Barbara; Brubaker, Jessica; Connor, Sean; Maier, Nicole; Dally, Len; Flores, Jorge; Bourgeois, A. Louis; Walker, Richard; Sack, David A.

    2018-01-01

    A reliable and effective human challenge model is needed to help down-select the most promising ETEC vaccines currently under development. Such a model would need to reliably induce diarrhea in a high proportion of volunteers using the lowest possible inoculum to maximize safety and sensitivity. Previously we validated a challenge model that utilized a dose of 2x107 CFU of ETEC strain H10407 (LT+, ST+, CFA/I+ and O78+) to induce attack rates for moderate to severe diarrhea (MSD) of ~60–70%. Here we detail efforts to further refine the model in an attempt to determine if a lower challenge dose of H10407 can be used. Thirty subjects were randomized 1:1 to receive an oral administration of H10407 at doses of 106 or 105 CFU in bicarbonate buffer. After challenge, subjects were monitored for signs and symptoms of enteric illness and stool samples were collected to detect shedding of the challenge strain. Systemic and mucosal immune responses were measured using serum, antibody in lymphocyte supernatant and fecal samples. The attack rate was 13.3% (2/15) and 26.7% (4/15) for MSD in the 105 and 106 groups, respectively. Four MSD cases met criteria for early antibiotic treatment. All subjects but one shed the challenge strain in fecal samples. The frequency and magnitude of anti-LT toxin, CFA/I and LPS O78 immune responses were antigen, dose, severity of diarrhea and shedding levels dependent. Notably, although of lower magnitude, there were considerable immune responses in the subjects with no diarrhea. This may indicate that immune responses to asymptomatic infections of ETEC in children in the endemic countries may contribute to protection. Based on this and our prior studies, we conclude that a dose of 2x107 H10407 remains the lowest practical dose for use in future volunteer studies evaluating candidate vaccines and other preventive or therapeutic ETEC interventions. Trial registration: ClinicalTrials.gov NCT00844493. PMID:29702652

  12. Preliminary Findings of a Randomized Trial of Non-Pharmaceutical Interventions to Prevent Influenza Transmission in Households

    PubMed Central

    Cowling, Benjamin J.; Fung, Rita O. P.; Cheng, Calvin K. Y.; Fang, Vicky J.; Chan, Kwok Hung; Seto, Wing Hong; Yung, Raymond; Chiu, Billy; Lee, Paco; Uyeki, Timothy M.; Houck, Peter M.; Peiris, J. S. Malik; Leung, Gabriel M.

    2008-01-01

    Background There are sparse data on whether non-pharmaceutical interventions can reduce the spread of influenza. We implemented a study of the feasibility and efficacy of face masks and hand hygiene to reduce influenza transmission among Hong Kong household members. Methodology/Principal Findings We conducted a cluster randomized controlled trial of households (composed of at least 3 members) where an index subject presented with influenza-like-illness of <48 hours duration. After influenza was confirmed in an index case by the QuickVue Influenza A+B rapid test, the household of the index subject was randomized to 1) control or 2) surgical face masks or 3) hand hygiene. Households were visited within 36 hours, and 3, 6 and 9 days later. Nose and throat swabs were collected from index subjects and all household contacts at each home visit and tested by viral culture. The primary outcome measure was laboratory culture confirmed influenza in a household contact; the secondary outcome was clinically diagnosed influenza (by self-reported symptoms). We randomized 198 households and completed follow up home visits in 128; the index cases in 122 of those households had laboratory-confirmed influenza. There were 21 household contacts with laboratory confirmed influenza corresponding to a secondary attack ratio of 6%. Clinical secondary attack ratios varied from 5% to 18% depending on case definitions. The laboratory-based or clinical secondary attack ratios did not significantly differ across the intervention arms. Adherence to interventions was variable. Conclusions/Significance The secondary attack ratios were lower than anticipated, and lower than reported in other countries, perhaps due to differing patterns of susceptibility, lack of significant antigenic drift in circulating influenza virus strains recently, and/or issues related to the symptomatic recruitment design. Lessons learnt from this pilot have informed changes for the main study in 2008. Trial Registration ClinicalTrials.gov NCT00425893 HKClinicalTrials.com HKCTR-365 PMID:18461182

  13. Molecular analysis of HIV strains from a cluster of worker infections in the adult film industry, Los Angeles 2004.

    PubMed

    Brooks, John T; Robbins, Kenneth E; Youngpairoj, Ae S; Rotblatt, Harlan; Kerndt, Peter R; Taylor, Melanie M; Daar, Eric S; Kalish, Marcia L

    2006-04-04

    In April 2004, 13 susceptible women were exposed to a single acutely HIV-1-infected man while employed to perform various sex acts for the production of adult films; three women were subsequently found to have acquired HIV infection (23% attack rate). As part of the investigation of this infection cluster, we evaluated whether viral strains collected from infected individuals were significantly related. We determined nucleotide sequences from the C2V3C3 and gp41 region of env and the p17 region of gag in viruses from the three infected individuals from whom specimens were available. We then compared these sequences phylogenetically to comparable sequences from available reference strains. Genotypic and phenotypic antiretroviral drug resistance was determined for plasma virus from the male index case and one female contact at a separate commercial laboratory. The env and gag sequences of the HIV strains from the male index case and two of the infected women were 100% similar. Genotyping of the male index case's virus identified 12 mutations, which represented known naturally occurring polymorphisms in the subtype B consensus sequence that are not associated with antiretroviral drug resistance. Genotyping of the virus from the female contact identified 10 mutations, all of which were shared by the virus from the male index case. Phenotyping demonstrated that both viruses were susceptible to all antiretroviral drugs tested. Molecular and virological data strongly support the epidemiological conclusion that these women were infected with an identical strain of HIV through occupational exposure to an individual with an acute HIV infection.

  14. The G428A Nonsense Mutation in FUT2 Provides Strong but Not Absolute Protection against Symptomatic GII.4 Norovirus Infection

    PubMed Central

    Buesa, Javier; Rydell, Gustaf E.; Lidón, Marta Fos; Montava, Rebeca; Mallouh, Reem Abu; Grahn, Ammi; Rodríguez-Díaz, Jesús; Bellido, Juan; Arnedo, Alberto; Larson, Göran; Svensson, Lennart

    2009-01-01

    In November 2004, 116 individuals in an elderly nursing home in El Grao de Castellón, Spain were symptomatically infected with genogroup II.4 (GII.4) norovirus. The global attack rate was 54.2%. Genotyping of 34 symptomatic individuals regarding the FUT2 gene revealed that one patient was, surprisingly, a non-secretor, hence indicating secretor-independent infection. Lewis genotyping revealed that Lewis-positive and negative individuals were susceptible to symptomatic norovirus infection indicating that Lewis status did not predict susceptibility. Saliva based ELISA assays were used to determine binding of the outbreak virus to saliva samples. Saliva from a secretor-negative individual bound the authentic outbreak GII.4 Valencia/2004/Es virus, but did not in contrast to secretor-positive saliva bind VLP of other strains including the GII.4 Dijon strain. Amino acid comparison of antigenic A and B sites located on the external loops of the P2 domain revealed distinct differences between the Valencia/2004/Es and Dijon strains. All three aa in each antigenic site as well as 10/11 recently identified evolutionary hot spots, were unique in the Valencia/2004/Es strain compared to the Dijon strain. To the best of our knowledge, this is the first example of symptomatic GII.4 norovirus infection of a Lea+b− individual homozygous for the G428A nonsense mutation in FUT2. Taken together, our study provides new insights into the host genetic susceptibility to norovirus infections and evolution of the globally dominating GII.4 viruses. PMID:19440360

  15. Imidacloprid affects the functional response of predator Podisus nigrispinus (Dallas) (Heteroptera: Pentatomidae) to strains of Spodoptera frugiperda (J.E. Smith) on Bt cotton.

    PubMed

    Malaquias, J B; Ramalho, F S; Omoto, C; Godoy, W A C; Silveira, R F

    2014-03-01

    Podisus nigrispinus (Dallas) (Heteroptera: Pentatomidae) is one of the most common asopine species in the neotropical region and its occurrence was reported in several countries of South and Central America, as an important biological control agent for many crops. This study was carried out to identify the imidacloprid impacts on the functional response of predator P. nigrispinus fed on Spodoptera frugiperda (J.E. Smith) (Lepidoptera: Noctuidae) strain resistant to lambda-cyhalothrin, on Bt cotton expressing Cry1Ac (Bollgard(®)). Spodoptera frugiperda larvae were used in the following conditions: resistant (1) and susceptible (2) strains to lambda-cyhalothrin fed on Bollgard(®) cotton leaves (DP 404 BG); and resistant (3) and susceptible (4) strains to lambda-cyhalothrin fed on non-genetically modified cotton leaves (cultivar DP4049). The predatory behavior of P. nigrispinus was affected by imidacloprid and the type II asymptotic curve was the one that best described the functional response data. Handling time (T h ) of predator females did not differ among treatments in the presence of imidacloprid. The attack rate did decrease, however, due to an increase in the density of larvae offered. Regardless of the treatment (S. frugiperda strain or cotton cultivar), the predation of P. nigrispinus females on S. frugiperda larvae was significantly lower when exposed to imidacloprid, especially at a density of 16 larvae/predator. The predation behavior of P. nigrispinus on S. frugiperda larvae is affected by the insecticide imidacloprid showing that its applications should be used in cotton crop with caution.

  16. Evaluation of autochthonous micrococcus strains as starter cultures for the production of Kedong sufu.

    PubMed

    Feng, Z; Huang, S; Ai, Z W; Zhang, M; Zhai, S; Chen, X

    2016-03-01

    The technological properties of 22 micrococcus strains from traditional fermented Kedong sufu were evaluated in order to develop autochthonous starter cultures. The proteolytic, autolytic and lipolytic activity, salt tolerance, production and degradation of the biogenic amines of six Micrococcus luteus, nine Kocuria kristinae and seven Kocuria rosea were evaluated. The results indicated that these micrococcus strains exhibited a certain technological diversity, and the results also indicated the best properties to be used in mixed starter cultures. Based on the above findings, two sets of autochthonous starters were formulated. Considering the physicochemical properties and sensory characteristics of sufu, the maturation period of sufu was shortened by 30 days. The profiles of free amino acids and peptides partly revealed the mechanism of sensory quality and shorter ripening time of sufu manufactured using autochthonous mixed starters. Compared to back-slopping fermentation, sufu manufactured with selected autochthonous starter cultures exhibited lower levels of total biogenic amines. The selected strains could be used as starter to avoid the accumulation of high concentrations of biogenic amines while also maintaining typical sensory characteristics and preserving the autochthonous strains of the traditional Kedong sufu. The maturation times of Kedong sufu were shortened by 30 days with application of the autochthonous starter. Autochthonous mixed starters can reduce the generation of biogenic amines, speed up the sufu maturation process and preserve typical sensory quality. Furthermore, the rotation of two sets of mixed starter cultures can effectively resist phage attack during the production of sufu. © 2015 The Society for Applied Microbiology.

  17. Bioconversion of sugar cane crop residues with white-rot fungiPleurotus sp.

    PubMed

    Ortega, G M; Martínez, E O; Betancourt, D; González, A E; Otero, M A

    1992-07-01

    Four mushroom strains ofPleurotus spp. were cultivated on sugar cane crop residues for 30 days at 26°C. Biochemical changes affected the substrate as a result of fungal growth, in terms of nitrogen, lignin, cellulose and hemicellulose contents. All strains showed a strong ligninolytic activity together with variable cellulolytic and xylanolytic action.Pleurotus sajor-caju attacked lignin and cellulose at the same rate, showing a degradation of 47% and 55%, respectively. A better balance was shown by theP. ostreatus-P. pulmonarius hybrid, which exhibited the poorest cellulolytic action (39%) and the highest ligninolytic activity (67%). The average composition of mushroom fruit bodies, in terms of nitrogen, carbohydrates, fats and amino acid profiles, was determined. Crude protein and total carbohydrate varied from 23% to 33% and 36% to 68% of dry matter, respectively. Fat ranged from 3.3% to 4.7% and amino acid content from 12.2% to 22.2%. Slight evidence for a nitrogen fixing capability was encountered in the substrate to fruit body balance.

  18. Results of tests CS4 and CS5 to investigate dynamic loads and pressures on 0.03-scale models (Ax1319-3/4 and 45-0) of mated 747 cam and space shuttle orbiter in the Boeing transonic wind tunnel

    NASA Technical Reports Server (NTRS)

    1976-01-01

    A 0.03-scale model of the 747 CAM/Orbiter was tested in an 8 x 12 foot transonic wind tunnel. Dynamic loads, pressure, and empennage flow field data were obtained using pressure transducers, strain gages, and a split film anemometer. The test variables included Mach number, angle of attack, sideslip angle, orbiter tailcone on and off, orbiter partial tailcone, orbiter nozzle air scoops, orbiter body flap angle, and orbiter elevon angle.

  19. Quantifying Cyber-Resilience Against Resource-Exhaustion Attacks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Fink, Glenn A.; Griswold, Richard L.; Beech, Zachary W.

    2014-07-11

    Resilience in the information sciences is notoriously difficult to define much less to measure. But in mechanical engi- neering, the resilience of a substance is mathematically defined as the area under the stress vs. strain curve. We took inspiration from mechanics in an attempt to define resilience precisely for information systems. We first examine the meaning of resilience in language and engineering terms and then translate these definitions to information sciences. Then we tested our definitions of resilience for a very simple problem in networked queuing systems. We discuss lessons learned and make recommendations for using this approach in futuremore » work.« less

  20. On the mechanism of penetration of ovicidal fungi through egg-shells of parasitic nematodes. Decomposition of chitinous and ascaroside layers.

    PubMed

    Kunert, J

    1992-01-01

    The decomposition of egg-shells of Ascaris lumbricoides L. was studied microscopically using topochemical methods in a set of 32 strains of soil ovicidal fungi. It was found that even fungi displaying minimal chitinolytic activity in tests on purified chitin in vitro are able to dissolve chitin of egg-shells during the attack on live eggs. Fungi without any chitinolytic activity penetrate probably only the mechanically damaged eggs. None of the studied fungi was capable of degrading enzymatically the glycolipid (ascaroside) layer of the egg-shell which remained intact after digestion of all other components of the egg.

  1. Protoplast formation and yeast cell-wall structure. The action of the enzymes of the snail, Helix pomatia

    PubMed Central

    Anderson, F. B.; Millbank, J. W.

    1966-01-01

    1. The digestive juice of the snail Helix pomatia was used in the study of the degradation of isolated cell-wall preparations from a strain of Saccharomyces carlsbergensis. 2. The crude enzyme system was fractionated by gel filtration and the activities of the more specific fractions thus obtained were examined. 3. Results are discussed with respect to (a) the nature of various factors that are essential for protoplast formation and cell-wall dissolution and (b) structures envisaged in yeast cell walls that are responsible for the observed variations in susceptibility to attack by snail juice. PMID:5964965

  2. Legionnaires' disease case-finding algorithm, attack rates, and risk factors during a residential outbreak among older adults: an environmental and cohort study.

    PubMed

    Silk, Benjamin J; Foltz, Jennifer L; Ngamsnga, Kompan; Brown, Ellen; Muñoz, Mary Grace; Hampton, Lee M; Jacobs-Slifka, Kara; Kozak, Natalia A; Underwood, J Michael; Krick, John; Travis, Tatiana; Farrow, Olivia; Fields, Barry S; Blythe, David; Hicks, Lauri A

    2013-06-27

    During a Legionnaires' disease (LD) outbreak, combined epidemiological and environmental investigations were conducted to identify prevention recommendations for facilities where elderly residents live independently but have an increased risk of legionellosis. Survey responses (n = 143) were used to calculate attack rates and describe transmission routes by estimating relative risk (RR) and 95% confidence intervals (95% CI). Potable water collected from five apartments of LD patients and three randomly-selected apartments of residents without LD (n = 103 samples) was cultured for Legionella. Eight confirmed LD cases occurred among 171 residents (attack rate = 4.7%); two visitors also developed LD. One case was fatal. The average age of patients was 70 years (range: 62-77). LD risk was lower among residents who reported tub bathing instead of showering (RR = 0.13, 95% CI: 0.02-1.09, P = 0.03). Two respiratory cultures were characterized as L. pneumophila serogroup 1, monoclonal antibody type Knoxville (1,2,3), sequence type 222. An indistinguishable strain was detected in 31 (74%) of 42 potable water samples. Managers of elderly-housing facilities and local public health officials should consider developing a Legionella prevention plan. When Legionella colonization of potable water is detected in these facilities, remediation is indicated to protect residents at higher risk. If LD occurs among residents, exposure reduction, heightened awareness, and clinical surveillance activities should be coordinated among stakeholders. For prompt diagnosis and effective treatment, clinicians should recognize the increased risk and atypical presentation of LD in older adults.

  3. A pharmacological evidence of positive association between mouse intermale aggression and brain serotonin metabolism.

    PubMed

    Kulikov, A V; Osipova, D V; Naumenko, V S; Terenina, E; Mormède, P; Popova, N K

    2012-07-15

    The neurotransmitter serotonin (5-HT) is involved in the regulation of mouse intermale aggression. Previously, it was shown that intensity of mouse intermale aggression was positively associated with activity of the key enzyme of 5-HT synthesis - tryptophan hydroxylase 2 (TPH2) in mouse brain. The aim of the present study was to investigate the effect of pharmacological activation or inhibition of 5-HT synthesis in the brain on intermale aggression in two mouse strains differing in the TPH2 activity: C57BL/6J (B6, high TPH2 activity, high aggressiveness) and CC57BR/Mv (BR, low TPH2 activity, low aggressiveness). Administration of 5-HT precursor L-tryptophan (300 mg/kg, i.p.) to BR mice significantly increased the 5-HT and 5-hydroxyindoleacetic acid (5-HIAA) levels in the midbrain as well as the number of attacks and their duration in the resident-intruder test. And vice versa, administration of TPH2 inhibitor p-chlorophenylalanine (pCPA) (300 mg/kg, i.p., for 3 consecutive days) to B6 mice dramatically reduced the 5-HT and 5-HIAA contents in brain structures and attenuated the frequency and the duration of aggressive attacks. At the same time, L-tryptophan or pCPA did not influence the percentage of aggressive mice and the attack latency reflecting the threshold of aggressive reaction. This result indicated that the intensity of intermale aggression, but not the threshold of aggressive reaction is positively dependent on 5-HT metabolism in mouse brain. Copyright © 2012 Elsevier B.V. All rights reserved.

  4. Normal-Force and Hinge-Moment Characteristics at Transonic Speeds of Flap-Type Ailerons at Three Spanwise Locations on a 4-Percent-Thick Sweptback-Wing-Body Model and Pressure-Distribution Measurements on an Inboard Aileron

    NASA Technical Reports Server (NTRS)

    Runckel, Jack F.; Hieser, Gerald

    1961-01-01

    An investigation has been conducted at the Langley 16-foot transonic tunnel to determine the loading characteristics of flap-type ailerons located at inboard, midspan, and outboard positions on a 45 deg. sweptback-wing-body combination. Aileron normal-force and hinge-moment data have been obtained at Mach numbers from 0.80 t o 1.03, at angles of attack up to about 27 deg., and at aileron deflections between approximately -15 deg. and 15 deg. Results of the investigation indicate that the loading over the ailerons was established by the wing-flow characteristics, and the loading shapes were irregular in the transonic speed range. The spanwise location of the aileron had little effect on the values of the slope of the curves of hinge-moment coefficient against aileron deflection, but the inboard aileron had the greatest value of the slope of the curves of hinge-moment coefficient against angle of attack and the outboard aileron had the least. Hinge-moment and aileron normal-force data taken with strain-gage instrumentation are compared with data obtained with pressure measurements.

  5. Effects of the air breathing propulsion system on space shuttle orbiter subsonic stability and control characteristics (OA71A)

    NASA Technical Reports Server (NTRS)

    Mennell, R. C.

    1973-01-01

    Experimental aerodynamic investigations were conducted on an 0.0405 scale representation of the -89B (2A) Space Shuttle Orbiter in a 7.75 x 11.00 ft low speed wind tunnel during the time period from July 27, 1973 to August 3, 1973. The primary test objective was to investigate the aerodynamic effects of engine nacelle grouping and location on the orbiter ferry mission configuration. Five nacelles were tested, both individually mounted as well as mounted in a podded configuration, at the baseline position and moved 45.0 in. aft (full scale). Orbiter control effectiveness, both with and without nacelles, was recorded at elevon deflections of 0 deg, 5 deg, 10 deg, -10 deg and -20 deg and aileron deflections, about 0 deg elevon, of 0 deg, 5 deg, 10 deg, and 15 deg. The model was sting mounted on a 2.5 inch diameter internal strain gage balance entering through the base region. The nominal angle of attack range was -4 deg or = alpha or = 30 deg. Yaw polars were recorded over the beta range of -10 deg or = beta or = at fixed angles of attack of 0 deg and 10 deg.

  6. The extracellular matrix Component Psl provides fast-acting antibiotic defense in Pseudomonas aeruginosa biofilms.

    PubMed

    Billings, Nicole; Millan, MariaRamirez; Caldara, Marina; Rusconi, Roberto; Tarasova, Yekaterina; Stocker, Roman; Ribbeck, Katharina

    2013-01-01

    Bacteria within biofilms secrete and surround themselves with an extracellular matrix, which serves as a first line of defense against antibiotic attack. Polysaccharides constitute major elements of the biofilm matrix and are implied in surface adhesion and biofilm organization, but their contributions to the resistance properties of biofilms remain largely elusive. Using a combination of static and continuous-flow biofilm experiments we show that Psl, one major polysaccharide in the Pseudomonas aeruginosa biofilm matrix, provides a generic first line of defense toward antibiotics with diverse biochemical properties during the initial stages of biofilm development. Furthermore, we show with mixed-strain experiments that antibiotic-sensitive "non-producing" cells lacking Psl can gain tolerance by integrating into Psl-containing biofilms. However, non-producers dilute the protective capacity of the matrix and hence, excessive incorporation can result in the collapse of resistance of the entire community. Our data also reveal that Psl mediated protection is extendible to E. coli and S. aureus in co-culture biofilms. Together, our study shows that Psl represents a critical first bottleneck to the antibiotic attack of a biofilm community early in biofilm development.

  7. Application of a bacteriophage lysin to disrupt biofilms formed by the animal pathogen Streptococcus suis.

    PubMed

    Meng, Xiangpeng; Shi, Yibo; Ji, Wenhui; Meng, Xueling; Zhang, Jing; Wang, Hengan; Lu, Chengping; Sun, Jianhe; Yan, Yaxian

    2011-12-01

    Bacterial biofilms are crucial to the pathogenesis of many important infections and are difficult to eradicate. Streptococcus suis is an important pathogen of pigs, and here the biofilm-forming ability of 32 strains of this species was determined. Significant biofilms were completely formed by 10 of the strains after 60 h of incubation, with exopolysaccharide production in the biofilm significantly higher than that in the corresponding planktonic cultures. S. suis strain SS2-4 formed a dense biofilm, as revealed by scanning electron microscopy, and in this state exhibited increased resistance to a number of antibiotics (ampicillin, amoxicillin, ciprofloxacin, kanamycin, and rifampin) compared to that of planktonic cultures. A bacteriophage lysin, designated LySMP, was used to attack biofilms alone and in combination with antibiotics and bacteriophage. The results demonstrated that the biofilms formed by S. suis, especially strains SS2-4 and SS2-H, could be dispersed by LySMP and with >80% removal compared to a biofilm reduction by treatment with either antibiotics or bacteriophage alone of less than 20%; in addition to disruption of the biofilm structure, the S. suis cells themselves were inactivated by LySMP. The efficacy of LySMP was not dose dependent, and in combination with antibiotics, it acted synergistically to maximize dispersal of the S. suis biofilm and inactivate the released cells. These data suggest that bacteriophage lysin could form part of an effective strategy to treat S. suis infections and represents a new class of antibiofilm agents.

  8. Humans identify negative (but not positive) arousal in silver fox vocalizations: implications for the adaptive value of interspecific eavesdropping.

    PubMed

    Filippi, Piera; Gogoleva, Svetlana S; Volodina, Elena V; Volodin, Ilya A; de Boer, Bart

    2017-08-01

    The ability to identify emotional arousal in heterospecific vocalizations may facilitate behaviors that increase survival opportunities. Crucially, this ability may orient inter-species interactions, particularly between humans and other species. Research shows that humans identify emotional arousal in vocalizations across multiple species, such as cats, dogs, and piglets. However, no previous study has addressed humans' ability to identify emotional arousal in silver foxes. Here, we adopted low- and high-arousal calls emitted by three strains of silver fox-Tame, Aggressive, and Unselected-in response to human approach. Tame and Aggressive foxes are genetically selected for friendly and attacking behaviors toward humans, respectively. Unselected foxes show aggressive and fearful behaviors toward humans. These three strains show similar levels of emotional arousal, but different levels of emotional valence in relation to humans. This emotional information is reflected in the acoustic features of the calls. Our data suggest that humans can identify high-arousal calls of Aggressive and Unselected foxes, but not of Tame foxes. Further analyses revealed that, although within each strain different acoustic parameters affect human accuracy in identifying high-arousal calls, spectral center of gravity, harmonic-to-noise ratio, and F0 best predict humans' ability to discriminate high-arousal calls across all strains. Furthermore, we identified in spectral center of gravity and F0 the best predictors for humans' absolute ratings of arousal in each call. Implications for research on the adaptive value of inter-specific eavesdropping are discussed.

  9. Transmission and adaptation of chronic wasting disease to hamsters and transgenic mice: evidence for strains.

    PubMed

    Raymond, Gregory J; Raymond, Lynne D; Meade-White, Kimberly D; Hughson, Andrew G; Favara, Cynthia; Gardner, Donald; Williams, Elizabeth S; Miller, Michael W; Race, Richard E; Caughey, Byron

    2007-04-01

    In vitro screening using the cell-free prion protein conversion system indicated that certain rodents may be susceptible to chronic wasting disease (CWD). Therefore, CWD isolates from mule deer, white-tailed deer, and elk were inoculated intracerebrally into various rodent species to assess the rodents' susceptibility and to develop new rodent models of CWD. The species inoculated were Syrian golden, Djungarian, Chinese, Siberian, and Armenian hamsters, transgenic mice expressing the Syrian golden hamster prion protein, and RML Swiss and C57BL10 wild-type mice. The transgenic mice and the Syrian golden, Chinese, Siberian, and Armenian hamsters had limited susceptibility to certain of the CWD inocula, as evidenced by incomplete attack rates and long incubation periods. For serial passages of CWD isolates in Syrian golden hamsters, incubation periods rapidly stabilized, with isolates having either short (85 to 89 days) or long (408 to 544 days) mean incubation periods and distinct neuropathological patterns. In contrast, wild-type mouse strains and Djungarian hamsters were not susceptible to CWD. These results show that CWD can be transmitted and adapted to some species of rodents and suggest that the cervid-derived CWD inocula may have contained or diverged into at least two distinct transmissible spongiform encephalopathy strains.

  10. The plant nitrogen mobilization promoted by Colletotrichum lindemuthianum in Phaseolus leaves depends on fungus pathogenicity.

    PubMed

    Tavernier, Virginie; Cadiou, Sandrine; Pageau, Karine; Laugé, Richard; Reisdorf-Cren, Michèle; Langin, Thierry; Masclaux-Daubresse, Céline

    2007-01-01

    Nitrogen plays an essential role in the nutrient relationship between plants and pathogens. Some studies report that the nitrogen-mobilizing plant metabolism that occurs during abiotic and biotic stress could be a 'slash-and-burn' defence strategy. In order to study nitrogen recycling and mobilization in host plants during pathogen attack and invasion, the Colletotrichum lindemuthianum/Phaseolus vulgaris interaction was used as a model. C. lindemuthianum is a hemibiotroph that causes anthracnose disease on P. vulgaris. Non-pathogenic mutants and the pathogenic wild-type strain were used to compare their effects on plant metabolism. The deleterious effects of infection were monitored by measuring changes in chlorophyll, protein, and amino acid concentrations. It was shown that amino acid composition changed depending on the plant-fungus interaction and that glutamine accumulated mainly in the leaves infected by the pathogenic strain. Glutamine accumulation correlated with the accumulation of cytosolic glutamine synthetase (GS1 alpha) mRNA. The most striking result was that the GS1 alpha gene was induced in all the fungus-infected leaves, independent of the strain used for inoculation, and that GS1 alpha expression paralleled the PAL3 and CHS defence gene expression. It is concluded that a role of GS1 alpha in plant defence has to be considered.

  11. Use of multiple molecular subtyping techniques to investigate a Legionnaires' disease outbreak due to identical strains at two tourist lodges.

    PubMed Central

    Mamolen, M; Breiman, R F; Barbaree, J M; Gunn, R A; Stone, K M; Spika, J S; Dennis, D T; Mao, S H; Vogt, R L

    1993-01-01

    A multistate outbreak of Legionnaires' disease occurred among nine tour groups of senior citizens returning from stays at one of two lodges in a Vermont resort in October 1987. Interviews and serologic studies of 383 (85%) of the tour members revealed 17 individuals (attack rate, 4.4%) with radiologically documented pneumonia and laboratory evidence of legionellosis. A survey of tour groups staying at four nearby lodges and of Vermont-area medical facilities revealed no additional cases. Environmental investigation of common tour stops revealed no likely aerosol source of Legionella infection outside the lodges. Legionella pneumophila serogroup 1 was isolated from water sources at both implicated lodges, and the monoclonal antibody subtype matched those of the isolates from six patients from whom clinical isolates were obtained. The cultures reacted with monoclonal antibodies MAB1, MAB2, 33G2, and 144C2 to yield a 1,2,5,7 or a Benidorm 030E pattern. The strains were also identical by alloenzyme electrophoresis and DNA ribotyping techniques. The epidemiologic and laboratory data suggest that concurrent outbreaks occurred following exposures to the same L. pneumophila serogroup 1 strain at two separate lodges. Multiple molecular subtyping techniques can provide essential information for epidemiologic investigations of Legionnaires' disease. PMID:8253953

  12. Use of multiple molecular subtyping techniques to investigate a Legionnaires' disease outbreak due to identical strains at two tourist lodges.

    PubMed

    Mamolen, M; Breiman, R F; Barbaree, J M; Gunn, R A; Stone, K M; Spika, J S; Dennis, D T; Mao, S H; Vogt, R L

    1993-10-01

    A multistate outbreak of Legionnaires' disease occurred among nine tour groups of senior citizens returning from stays at one of two lodges in a Vermont resort in October 1987. Interviews and serologic studies of 383 (85%) of the tour members revealed 17 individuals (attack rate, 4.4%) with radiologically documented pneumonia and laboratory evidence of legionellosis. A survey of tour groups staying at four nearby lodges and of Vermont-area medical facilities revealed no additional cases. Environmental investigation of common tour stops revealed no likely aerosol source of Legionella infection outside the lodges. Legionella pneumophila serogroup 1 was isolated from water sources at both implicated lodges, and the monoclonal antibody subtype matched those of the isolates from six patients from whom clinical isolates were obtained. The cultures reacted with monoclonal antibodies MAB1, MAB2, 33G2, and 144C2 to yield a 1,2,5,7 or a Benidorm 030E pattern. The strains were also identical by alloenzyme electrophoresis and DNA ribotyping techniques. The epidemiologic and laboratory data suggest that concurrent outbreaks occurred following exposures to the same L. pneumophila serogroup 1 strain at two separate lodges. Multiple molecular subtyping techniques can provide essential information for epidemiologic investigations of Legionnaires' disease.

  13. The stress-corrosion behavior of Al-Li-Cu alloys: A comparison of test methods

    NASA Technical Reports Server (NTRS)

    Rizzo, P. P.; Galvin, R. P.; Nelson, H. G.

    1982-01-01

    Two powder metallurgy processed (Al-Li-Cu) alloys with and without Mg addition were studied in aqueous 3.5% NaCl solution during the alternate immersion testing of tuning fork specimens, slow crack growth tests using fracture mechanics specimens, and the slow strain rate testing of straining electrode specimens. Scanning electron microscopy and optical metallography were used to demonstrate the character of the interaction between the Al-Li-Cu alloys and the selected environment. Both alloys are susceptible to SC in an aqueous 3.5% NaCl solution under the right electrochemical and microstructural conditions. Each test method yields important information on the character of the SC behavior. Under all conditions investigated, second phase particles strung out in rows along the extrusion direction in the alloys were rapidly attacked, and played principal role in the SC process. With time, larger pits developed from these rows of smaller pits and under certain electrochemical conditions surface cracks initiated from the larger pits and contributed directly to the fracture process. Evidence to support slow crack growth was observed in both the slow strain rate tests and the sustained immersion tests of precracked fracture mechanics specimens. The possible role of H2 in the stress corrosion cracking process is suggested.

  14. Strain Interactions as a Mechanism for Dominant Strain Alternation and Incidence Oscillation in Infectious Diseases: Seasonal Influenza as a Case Study

    PubMed Central

    Zhang, Xu-Sheng

    2015-01-01

    Background Many human infectious diseases are caused by pathogens that have multiple strains and show oscillation in infection incidence and alternation of dominant strains which together are referred to as epidemic cycling. Understanding the underlying mechanisms of epidemic cycling is essential for forecasting outbreaks of epidemics and therefore important for public health planning. Current theoretical effort is mainly focused on the factors that are extrinsic to the pathogens themselves (“extrinsic factors”) such as environmental variation and seasonal change in human behaviours and susceptibility. Nevertheless, co-circulation of different strains of a pathogen was usually observed and thus strains interact with one another within concurrent infection and during sequential infection. The existence of these intrinsic factors is common and may be involved in the generation of epidemic cycling of multi-strain pathogens. Methods and Findings To explore the mechanisms that are intrinsic to the pathogens themselves (“intrinsic factors”) for epidemic cycling, we consider a multi-strain SIRS model including cross-immunity and infectivity enhancement and use seasonal influenza as an example to parameterize the model. The Kullback-Leibler information distance was calculated to measure the match between the model outputs and the typical features of seasonal flu (an outbreak duration of 11 weeks and an annual attack rate of 15%). Results show that interactions among strains can generate seasonal influenza with these characteristic features, provided that: the infectivity of a single strain within concurrent infection is enhanced 2−7 times that within a single infection; cross-immunity as a result of past infection is 0.5–0.8 and lasts 2–9 years; while other parameters are within their widely accepted ranges (such as a 2–3 day infectious period and the basic reproductive number of 1.8–3.0). Moreover, the observed alternation of the dominant strain among epidemics emerges naturally from the best fit model. Alternative modelling that also includes seasonal forcing in transmissibility shows that both external mechanisms (i.e. seasonal forcing) and the intrinsic mechanisms (i.e., strain interactions) are equally able to generate the observed time-series in seasonal flu. Conclusions The intrinsic mechanism of strain interactions alone can generate the observed patterns of seasonal flu epidemics, but according to Kullback-Leibler information distance the importance of extrinsic mechanisms cannot be excluded. The intrinsic mechanism illustrated here to explain seasonal flu may also apply to other infectious diseases caused by polymorphic pathogens. PMID:26562668

  15. Novel mechanisms of biotransformation of p-tert-amylphenol by bacteria and fungi with special degradation abilities and simultaneous detoxification of the disinfectant.

    PubMed

    Schlueter, Rabea; Röder, Anja; Czekalski, Nadine; Gliesche, Daniel; Mikolasch, Annett; Schauer, Frieder

    2014-01-01

    The compound p-tert-amylphenol (p-(1,1-dimethylpropyl)phenol) is a widely used disinfectant belonging to the group of short branched-chain alkylphenols. It is produced in or imported into the USA with more than one million pounds per year and can be found in the environment in surface water, sediments, and soil. We have investigated for the first time the biotransformation of this disinfectant and the accumulation of metabolites by five bacterial strains, three yeast strains, and three filamentous fungi, selected because of their ability to transform either aromatic or branched-chain compounds. Of the 11 microorganisms tested, one yeast strain and three bacteria could not transform the disinfectant despite of a very low concentration applied (0.005%). None of the other seven organisms was able to degrade the short branched alkyl chain of p-tert-amylphenol. However, two yeast strains, two filamentous fungi, and two bacterial strains attacked the aromatic ring system of the disinfectant via the hydroxylated intermediate 4-(1,1-dimethyl-propyl)-benzene-1,2-diol resulting in two hitherto unknown ring fission products with pyran and furan structures, 4-(1,1-dimethyl-propyl)-6-oxo-6-H-pyran-2-carboxylic acid and 2-[3-(1,1-dimethyl-propyl)-5-oxo-2H-furan-2-yl]acetic acid. While the disinfectant was toxic to the organisms applied, one of the ring cleavage products was not. Thus, a detoxification of the disinfectant was achieved by ring cleavage. Furthermore, one filamentous fungus formed sugar conjugates with p-tert-amylphenol as another mechanism of detoxification of toxic environmental pollutants. With this work, we can also contribute to the allocation of unknown chemical compounds within environmental samples to their parent compounds.

  16. Robustness of non-interdependent and interdependent networks against dependent and adaptive attacks

    NASA Astrophysics Data System (ADS)

    Tyra, Adam; Li, Jingtao; Shang, Yilun; Jiang, Shuo; Zhao, Yanjun; Xu, Shouhuai

    2017-09-01

    Robustness of complex networks has been extensively studied via the notion of site percolation, which typically models independent and non-adaptive attacks (or disruptions). However, real-life attacks are often dependent and/or adaptive. This motivates us to characterize the robustness of complex networks, including non-interdependent and interdependent ones, against dependent and adaptive attacks. For this purpose, dependent attacks are accommodated by L-hop percolation where the nodes within some L-hop (L ≥ 0) distance of a chosen node are all deleted during one attack (with L = 0 degenerating to site percolation). Whereas, adaptive attacks are launched by attackers who can make node-selection decisions based on the network state in the beginning of each attack. The resulting characterization enriches the body of knowledge with new insights, such as: (i) the Achilles' Heel phenomenon is only valid for independent attacks, but not for dependent attacks; (ii) powerful attack strategies (e.g., targeted attacks and dependent attacks, dependent attacks and adaptive attacks) are not compatible and cannot help the attacker when used collectively. Our results shed some light on the design of robust complex networks.

  17. Results of an investigation of hypersonic viscous interaction effects of the space shuttle orbiter using a 0.010 scale model (51-0) in the AEDC-VKF tunnel F (OA160)

    NASA Technical Reports Server (NTRS)

    Elder, D. J.

    1975-01-01

    An experimental aerodynamic investigation was conducted in the AEDC-VKF Hypervelocity Wind Tunnel (Tunnel F) at a nomial Mach number of 19 to determine hypersonic viscous interaction effects on the space shuttle orbiter. The tests were conducted at an angle of attack of 30 degrees over a free-stream Reynolds number (based on fuselage length) variation from 0.1 to 0.4 million. Viscous interaction parameter was varied from 0.02 to 0.06. Six component static stability force and moment data were measured by an internally compensated internal strain gage balance. Resulting data are presented.

  18. Understanding, preventing and eradicating Klebsiella pneumoniae biofilms.

    PubMed

    Ribeiro, Suzana Meira; Cardoso, Marlon Henrique; Cândido, Elizabete de Souza; Franco, Octávio Luiz

    2016-01-01

    The ability of pathogenic bacteria to aggregate and form biofilm represents a great problem for public health, since they present extracellular components that encase these micro-organisms, making them more resistant to antibiotics and host immune attack. This may become worse when antibiotic-resistant bacterial strains form biofilms. However, antibiofilm screens with different compounds may reveal potential therapies to prevent/treat biofilm infections. Here, we focused on Klebsiella pneumoniae, an opportunistic bacterium that causes different types of infections, including in the bloodstream, meninges, lungs, urinary system and at surgical sites. We also highlight aspects involved in the formation and maintenance of K. pneumoniae biofilms, as well as resistance and the emergence of new trends to combat this health challenge.

  19. Influenza at Christ's Hospital: March, 1974.

    PubMed

    Hoskins, T W; Davies, J R; Smith, A J; Allchin, A; Miller, C L; Pollock, T M

    1976-01-17

    Boys in a boarding-school given inactivated influenza-A or influenza-B vaccine have been observed during a simultaneous outbreak of influenza due to A/Port Chalmers, B/Hong Kong, and B/Intermediate strains. Influenza-B vaccine conferred substantial protection, the attack-rates in boys given B vaccine being 24% compared with 45% in a control group. A/Hong Kong vaccine, by preventing infection during the previous influenza A/England outbreak, left the boys vulnerable to influenza A/Port Chalmers. Influenza-A haemagglutination-inhibiting (H.I.) antibody acquired by natural infection was associated with more protection than H.I. antibody induced by vaccination. This difference was not seen with influenza-B H.I. antibody.

  20. Pandemic A/H1N1 influenza: transmission of the first cases in Spain.

    PubMed

    Català, Laura; Rius, Cristina; García de Olalla, Patricia; Nelson, Jeanne L; Alvarez, Josep; Minguell, Sofía; Camps, Neus; Sala, María Rosa; Arias, Carlos; Barrabeig, Irene; Carol, Mónica; Torra, Roser; Cardeñosa, Neus; Pumarola, Tomas; Caylà, Joan A

    2012-02-01

    Pandemic A/H1N1 influenza emerged in Mexico at the end of March 2009. Since then, it is still important to provide evidences that contributed to the international spread of the virus and to ascertain the attack rate of this new strain of influenza among the first cases in Spain that led to identify the first transmission in Europe. Three pandemic A/H1N1 influenza groups related to an overseas flight were studied: 71 student group, 94 remaining passengers, and 68 contacts of confirmed cases. The attack rate with their 95% confidence interval (CI) among the student group and contacts was calculated. On April 26th, when the first cases were notified, strong preventive measures were implemented among the student group and the contacts of the confirmed cases. On 27th April, the first pandemic A/H1N1 influenza cases confirmed in Spain were three students that came back from Mexico by airplane. A student generated the first native case in Spain and one of the first cases in Europe. Similar attack rates were found between the student group (14.1%; CI: 12.1-16.1) and their contacts (13.2%; CI: 4.4-22.0), but no cases among remaining passengers were detected, suggesting low transmission risk during air travel. The first cases of pandemic A/H1N1 influenza in Spain were imported by airplane from Mexico. Preventive efforts to reduce the impact of the influenza influenced that primary and secondary rates were lower than first estimations by WHO. Copyright © 2011 Elsevier España, S.L. All rights reserved.

  1. Legionnaires’ disease case-finding algorithm, attack rates, and risk factors during a residential outbreak among older adults: an environmental and cohort study

    PubMed Central

    2013-01-01

    Background During a Legionnaires’ disease (LD) outbreak, combined epidemiological and environmental investigations were conducted to identify prevention recommendations for facilities where elderly residents live independently but have an increased risk of legionellosis. Methods Survey responses (n = 143) were used to calculate attack rates and describe transmission routes by estimating relative risk (RR) and 95% confidence intervals (95% CI). Potable water collected from five apartments of LD patients and three randomly-selected apartments of residents without LD (n = 103 samples) was cultured for Legionella. Results Eight confirmed LD cases occurred among 171 residents (attack rate = 4.7%); two visitors also developed LD. One case was fatal. The average age of patients was 70 years (range: 62–77). LD risk was lower among residents who reported tub bathing instead of showering (RR = 0.13, 95% CI: 0.02–1.09, P = 0.03). Two respiratory cultures were characterized as L. pneumophila serogroup 1, monoclonal antibody type Knoxville (1,2,3), sequence type 222. An indistinguishable strain was detected in 31 (74%) of 42 potable water samples. Conclusions Managers of elderly-housing facilities and local public health officials should consider developing a Legionella prevention plan. When Legionella colonization of potable water is detected in these facilities, remediation is indicated to protect residents at higher risk. If LD occurs among residents, exposure reduction, heightened awareness, and clinical surveillance activities should be coordinated among stakeholders. For prompt diagnosis and effective treatment, clinicians should recognize the increased risk and atypical presentation of LD in older adults. PMID:23806063

  2. The contribution of collective attack tactics in differentiating handball score efficiency.

    PubMed

    Rogulj, Nenad; Srhoj, Vatromir; Srhoj, Ljerka

    2004-12-01

    The prevalence of 19 elements of collective tactics in score efficient and score inefficient teams was analyzed in 90 First Croatian Handball League--Men games during the 1998-1999 season. Prediction variables were used to describe duration, continuity, system, organization and spatial direction of attacks. Analysis of the basic descriptive and distribution statistical parameters revealed normal distribution of all variables and possibility to use multivariate methods. Canonic discrimination analysis and analysis of variance showed the use of collective tactics elements on attacks to differ statistically significantly between the winning and losing teams. Counter-attacks and uninterrupted attacks predominate in winning teams. Other types of attacks such as long position attack, multiply interrupted attack, attack with one circle runner attack player/pivot, attack based on basic principles, attack based on group cooperation, attack based on independent action, attack based on group maneuvering, rightward directed attack and leftward directed attack predominate in losing teams. Winning teams were found to be clearly characterized by quick attacks against unorganized defense, whereas prolonged, interrupted position attacks against organized defense along with frequent and diverse tactical actions were characteristic of losing teams. The choice and frequency of using a particular tactical activity in position attack do not warrant score efficiency but usually are consequential to the limited anthropologic potential and low level of individual technical-tactical skills of the players in low-quality teams.

  3. Bacterial bio-resources for remediation of hexachlorocyclohexane.

    PubMed

    Alvarez, Analía; Benimeli, Claudia S; Saez, Juliana M; Fuentes, María S; Cuozzo, Sergio A; Polti, Marta A; Amoroso, María J

    2012-11-15

    In the last few decades, highly toxic organic compounds like the organochlorine pesticide (OP) hexachlorocyclohexane (HCH) have been released into the environment. All HCH isomers are acutely toxic to mammals. Although nowadays its use is restricted or completely banned in most countries, it continues posing serious environmental and health concerns. Since HCH toxicity is well known, it is imperative to develop methods to remove it from the environment. Bioremediation technologies, which use microorganisms and/or plants to degrade toxic contaminants, have become the focus of interest. Microorganisms play a significant role in the transformation and degradation of xenobiotic compounds. Many Gram-negative bacteria have been reported to have metabolic abilities to attack HCH. For instance, several Sphingomonas strains have been reported to degrade the pesticide. On the other hand, among Gram-positive microorganisms, actinobacteria have a great potential for biodegradation of organic and inorganic toxic compounds. This review compiles and updates the information available on bacterial removal of HCH, particularly by Streptomyces strains, a prolific genus of actinobacteria. A brief account on the persistence and deleterious effects of these pollutant chemical is also given.

  4. Spanwise lift distributions and wake velocity surveys of a semi-span wing with a discontinuous twist

    NASA Technical Reports Server (NTRS)

    Kumagai, Hiroyuki

    1989-01-01

    A wind tunnel test was conducted in the NASA-Ames 7 x 10 ft wind tunnel to investigate the lift distribution on a semispan wing with a discontinuous change in spanwise twist. The semispan wing had a tip with an adjustable pitch angle independent on the inboard section pitch angle simulating the free tip rotor blade when its free tip is at a deflected position. The spanwise lift distribution over the wing and the tip were measured and three component velocity surveys behind the wing were obtained with a 3-D laser Doppler velocimeter (LV) with the wing at one angle of attack and the tip deflected at different pitch angles. A six-component internal strain gage balance was also used to measure total forces and moments on the tip. The 3-D lift was computed from the 2-D lift distributions obtained from the LV and from the strain gage balance. The results from both experimental methods are shown to be in agreement with predictions made by a steady, 3-D panel code, VSAERO.

  5. Ethanol Fermentation of Various Pretreated and Hydrolyzed Substrates at Low Initial pH

    NASA Astrophysics Data System (ADS)

    Kádár, Zsófia; Maltha, San Feng; Szengyel, Zsolt; Réczey, Kati; de Laat, Wim

    Lignocellulosic materials represent an abundant feedstock for bioethanol production. Because of their complex structure pretreatment is necessary to make it accessible for enzymatic attack. Steam pretreatment with or without acid catalysts seems to be one of the most promising techniques, which has already been applied for large variety of lignocellulosics in order to improve enzymatic digestibility. During this process a range of toxic compounds (lignin and sugar degradation products) are formed which inhibit ethanol fermentation. In this study, the toxicity of hemicellulose hydrolysates obtained in the steam pretreatment of spruce, willow, and corn stover were investigated in ethanol fermentation tests using a yeast strain, which has been previously reported to have a resistance to inhibitory compounds generated during steam pretreatment. To overcome bacterial contamination, fermentations were carried out at low initial pH. The fermentability of hemicellulose hydrolysates of pretreated lignocellulosic substrates at low pH gave promising results with the economically profitable final 5 vol% ethanol concentration corresponding to 85% of theoretical. Adaptation experiments have shown that inhibitor tolerance of yeast strain can be improved by subsequent transfer of the yeast to inhibitory medium.

  6. In vitro biodegradation of steranes

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chosson, P.; Connan, J.

    1989-03-01

    The purpose of this paper is to report reproducible results on the in vitro biodegradation of steranes in various crude oils. 73 pure strains including Pseudomonadacea (33) and Actinomycetaceae (40) have been screened in order to test their capability to degrade steranes contained in total alkanes isolated from various crudes. Biodegradation of steranes has been observed with 7 strains belonging to Nocardia and Arthrobacter genera. 5{alpha}(H), 14{alpha}(H), 17{alpha}(H) and 5{alpha}(H), 14{beta}(H), 17{beta}(H) Steranes with the 20R configuration were degraded under reproducible laboratory conditions. Biodegradation of the sterane mixtures isolated from crude oils followed W. Seiferts rules established on the basismore » of geological observations. 5{alpha}(H), 14{alpha}(H), 17{alpha}(H) C{sub 27}-Steranes with the 20R configuration are degraded first and ends with the 5{alpha}(H), 14{alpha}(H), 17{alpha}(H) C{sub 29}steranes. Then 5{alpha}9h0, 14{beta}(H), and 17{beta}(H) steranes are attacked starting with the 20R configuration. Limited alteration of Tm and Ts terpane has also been observed.« less

  7. Nuclear magnetic resonance (NMR) studies on the biosynthesis of fusaric acid from Fusarium oxysporum f. sp. vasinfectum.

    PubMed

    Stipanovic, Robert D; Wheeler, Michael H; Puckhaber, Lorraine S; Liu, Jinggao; Bell, Alois A; Williams, Howard J

    2011-05-25

    Fusarium oxysporum is a fungal pathogen that attacks many important plants. Uniquely pathogenic strains of F. oxysporum f. sp. vasinfectum were inadvertently imported into the United States on live cottonseed for dairy cattle feed. These strains produce exceptionally high concentrations of the phytotoxin fusaric acid. Thus, fusaric acid may be a critical component in the pathogenicity of these biotypes. This study investigated the biosynthesis of fusaric acid using (13)C-labeled substrates including [1,2-(13)C(2)]acetate as well as (13)C- and (15)N-labeled aspartate and [(15)N]glutamine. The incorporation of labeled substrates is consistent with the biosynthesis of fusaric acid from three acetate units at C5-C6, C7-C8, and C9-C10, with the remaining carbons being derived from aspartate via oxaloacetate and the TCA cycle; the oxaloacetate originates in part by transamination of aspartate, but most of the oxaloacetate is derived by deamination of aspartate to fumarate by aspartase. The nitrogen from glutamine is more readily incorporated into fusaric acid than that from aspartate.

  8. Bacterial Bio-Resources for Remediation of Hexachlorocyclohexane

    PubMed Central

    Alvarez, Analía; Benimeli, Claudia S.; Saez, Juliana M.; Fuentes, María S.; Cuozzo, Sergio A.; Polti, Marta A.; Amoroso, María J.

    2012-01-01

    In the last few decades, highly toxic organic compounds like the organochlorine pesticide (OP) hexachlorocyclohexane (HCH) have been released into the environment. All HCH isomers are acutely toxic to mammals. Although nowadays its use is restricted or completely banned in most countries, it continues posing serious environmental and health concerns. Since HCH toxicity is well known, it is imperative to develop methods to remove it from the environment. Bioremediation technologies, which use microorganisms and/or plants to degrade toxic contaminants, have become the focus of interest. Microorganisms play a significant role in the transformation and degradation of xenobiotic compounds. Many Gram-negative bacteria have been reported to have metabolic abilities to attack HCH. For instance, several Sphingomonas strains have been reported to degrade the pesticide. On the other hand, among Gram-positive microorganisms, actinobacteria have a great potential for biodegradation of organic and inorganic toxic compounds. This review compiles and updates the information available on bacterial removal of HCH, particularly by Streptomyces strains, a prolific genus of actinobacteria. A brief account on the persistence and deleterious effects of these pollutant chemical is also given. PMID:23203113

  9. Fractional dosing of yellow fever vaccine to extend supply: a modelling study.

    PubMed

    Wu, Joseph T; Peak, Corey M; Leung, Gabriel M; Lipsitch, Marc

    2016-12-10

    The ongoing yellow fever epidemic in Angola strains the global vaccine supply, prompting WHO to adopt dose sparing for its vaccination campaign in Kinshasa, Democratic Republic of the Congo, in July-August, 2016. Although a 5-fold fractional-dose vaccine is similar to standard-dose vaccine in safety and immunogenicity, efficacy is untested. There is an urgent need to ensure the robustness of fractional-dose vaccination by elucidation of the conditions under which dose fractionation would reduce transmission. We estimate the effective reproductive number for yellow fever in Angola using disease natural history and case report data. With simple mathematical models of yellow fever transmission, we calculate the infection attack rate (the proportion of population infected over the course of an epidemic) with various levels of transmissibility and 5-fold fractional-dose vaccine efficacy for two vaccination scenarios, ie, random vaccination in a hypothetical population that is completely susceptible, and the Kinshasa vaccination campaign in July-August, 2016, with different age cutoff for fractional-dose vaccines. We estimate the effective reproductive number early in the Angola outbreak was between 5·2 and 7·1. If vaccine action is all-or-nothing (ie, a proportion of vaccine recipients receive complete protection [VE] and the remainder receive no protection), n-fold fractionation can greatly reduce infection attack rate as long as VE exceeds 1/n. This benefit threshold becomes more stringent if vaccine action is leaky (ie, the susceptibility of each vaccine recipient is reduced by a factor that is equal to the vaccine efficacy). The age cutoff for fractional-dose vaccines chosen by WHO for the Kinshasa vaccination campaign (2 years) provides the largest reduction in infection attack rate if the efficacy of 5-fold fractional-dose vaccines exceeds 20%. Dose fractionation is an effective strategy for reduction of the infection attack rate that would be robust with a large margin for error in case fractional-dose VE is lower than expected. NIH-MIDAS, HMRF-Hong Kong. Copyright © 2016 Elsevier Ltd. All rights reserved.

  10. Predicting Factors of Zone 4 Attack in Volleyball.

    PubMed

    Costa, Gustavo C; Castro, Henrique O; Evangelista, Breno F; Malheiros, Laura M; Greco, Pablo J; Ugrinowitsch, Herbert

    2017-06-01

    This study examined 142 volleyball games of the Men's Super League 2014/2015 seasons in Brazil from which we analyzed 24-26 games of each participating team, identifying 5,267 Zone 4 attacks for further analysis. Within these Zone 4 attacks, we analyzed the association between the effect of the attack carried out and the separate effects of serve reception, tempo and type of attack. We found that the reception, tempo of attack, second tempo of attack, and power of diagonal attack were predictors of the attack effect in Zone 4. Moreover, placed attacks showed a tendency to not yield a score. In conclusion, winning points in high-level men's volleyball requires excellent receptions, a fast attack tempo and powerfully executed of attacks.

  11. Breakthrough attacks in patients with hereditary angioedema receiving long-term prophylaxis are responsive to icatibant: findings from the Icatibant Outcome Survey.

    PubMed

    Aberer, Werner; Maurer, Marcus; Bouillet, Laurence; Zanichelli, Andrea; Caballero, Teresa; Longhurst, Hilary J; Perrin, Amandine; Andresen, Irmgard

    2017-01-01

    Patients with hereditary angioedema (HAE) due to C1-inhibitor deficiency (C1-INH-HAE) experience recurrent attacks of cutaneous or submucosal edema that may be frequent and severe; prophylactic treatments can be prescribed to prevent attacks. However, despite the use of long-term prophylaxis (LTP), breakthrough attacks are known to occur. We used data from the Icatibant Outcome Survey (IOS) to evaluate the characteristics of breakthrough attacks and the effectiveness of icatibant as a treatment option. Data on LTP use, attacks, and treatments were recorded. Attack characteristics, treatment characteristics, and outcomes (time to treatment, time to resolution, and duration of attack) were compared for attacks that occurred with versus without LTP. Data on 3228 icatibant-treated attacks from 448 patients with C1-INH-HAE were analyzed; 30.1% of attacks occurred while patients were using LTP. Attack rate, attack severity, and the distribution of attack sites were similar across all types of LTP used, and were comparable to the results found in patients who did not receive LTP. Attacks were successfully treated with icatibant; 82.5% of all breakthrough attacks were treated with a single icatibant injection without C1-INH rescue medication. Treatment outcomes were comparable for breakthrough attacks across all LTP types, and for attacks without LTP. Patients who use LTP should be aware that breakthrough attacks can occur, and such attacks can be severe. Thus, patients with C1-INH-HAE using LTP should have emergency treatment readily available. Data from IOS show that icatibant is effective for the treatment of breakthrough attacks. Trial Registration NCT01034969.

  12. [Outbreak of streptococcal toxic shock syndrome in a day care center in Cantabria, Spain, 2006].

    PubMed

    Ortega-Mendi, Manuel; Martínez-Martínez, Luís; González de Aledo-Linos, Alvaro; Agüero-Balbín, Jesús; Viloria-Raymundo, Luís; Cano-García, M Eliecer; Calvo-Montes, Jorge; Mellado-Encinas, Purificación; Fernández-Rodríguez, Amparo

    2008-01-01

    Beta hemolytic group A streptococcus only exceptionally produces aggressive disease with high lethality. Even more uncommon is the occurrence of an outbreak. In Spain, no outbreak in child care center has been previously described. Descriptive study of an outbreak of streptococcal toxic shock syndrome (3 cases, one lethal) in a child care center, which motivated the health care intervention with chemoprophylaxis, the closure of the child care center and the study of contacts. We analyzed the determinants of infection in the invasive and non-invasive cases, and the results of the pharyngeal culture of contacts. We identified 3 invasive and 14 non-invasive cases between 40 children attending the child care center (attack rate 42.5%). We studied 19 possible determinants of the infection, finding only an association with being over the age of 24 months and the assistance to the handouts classroom (that of the oldest children). It was not associated with chickenpox. All children attending the child care center, its staff (4 women) and 258 contacts were microbiologically investigated. In 12 children the emm 4 strain was isolated, including 2 of 3 cases with invasive disease. In 13 of 258 contacts other strains of beta hemolytic group A streptococcus were isolated, but in none of them the strain responsible of the outbreak was found. Azytromicin chemoprophylaxis was implemented for all children and contacts, and in those with a positive isolation, the culture was repeated until negative. The invasive strain circulated only in the child care center. Azytromicin chemoprophylaxis eradicated effectively the infection.

  13. Application of a Bacteriophage Lysin To Disrupt Biofilms Formed by the Animal Pathogen Streptococcus suis ▿ †

    PubMed Central

    Meng, Xiangpeng; Shi, Yibo; Ji, Wenhui; Meng, Xueling; Zhang, Jing; Wang, Hengan; Lu, Chengping; Sun, Jianhe; Yan, Yaxian

    2011-01-01

    Bacterial biofilms are crucial to the pathogenesis of many important infections and are difficult to eradicate. Streptococcus suis is an important pathogen of pigs, and here the biofilm-forming ability of 32 strains of this species was determined. Significant biofilms were completely formed by 10 of the strains after 60 h of incubation, with exopolysaccharide production in the biofilm significantly higher than that in the corresponding planktonic cultures. S. suis strain SS2-4 formed a dense biofilm, as revealed by scanning electron microscopy, and in this state exhibited increased resistance to a number of antibiotics (ampicillin, amoxicillin, ciprofloxacin, kanamycin, and rifampin) compared to that of planktonic cultures. A bacteriophage lysin, designated LySMP, was used to attack biofilms alone and in combination with antibiotics and bacteriophage. The results demonstrated that the biofilms formed by S. suis, especially strains SS2-4 and SS2-H, could be dispersed by LySMP and with >80% removal compared to a biofilm reduction by treatment with either antibiotics or bacteriophage alone of less than 20%; in addition to disruption of the biofilm structure, the S. suis cells themselves were inactivated by LySMP. The efficacy of LySMP was not dose dependent, and in combination with antibiotics, it acted synergistically to maximize dispersal of the S. suis biofilm and inactivate the released cells. These data suggest that bacteriophage lysin could form part of an effective strategy to treat S. suis infections and represents a new class of antibiofilm agents. PMID:21984241

  14. High temperature static strain gage development

    NASA Technical Reports Server (NTRS)

    Hulse, C. O.; Bailey, R. S.; Grant, H. P.; Anderson, W. L.; Przybyszewski, J. S.

    1991-01-01

    Final results are presented from a program to develop a thin film static strain gage for use on the blades and vanes of running, test stand gas turbine engines with goals of an 3 x 3 mm gage area and total errors of less than 10 pct. of + or - 2,000 microstrain after 50 hrs at 1250 K. Pd containing 13 Wt. pct. Cr was previously identified as a new strain sensor alloy that appeared to be potentially usable to 1250 K. Subsequently, it was discovered, in contrast with its behavior in bulk, that Pd-13Cr suffered from oxidation attack when prepared as a 4.5 micron thick thin film. Continuing problems with electrical leakage to the substrate and the inability of sputtered alumina overcoats to prevent oxidation led to the discovery that sputtered alumina contains appreciable amounts of entrapped argon. After the argon has been exsolved by heating to elevated temperatures, the alumina films undergo a linear shrinkage of about 2 pct. resulting in formation of cracks. These problems can be largely overcome by sputtering the alumina with the substrate heated to 870 K. With 2 micron thick hot sputtered alumina insulation and overcoat films, total 50 hr drifts of about 100 microstrain (2 tests) and about 500 microstrain (1 test) were observed at 1000 and 1100 K, respectively. Results of tests on complete strain gage systems on constant moment bend bars with Pd temperature compensation grids revealed that oxidation of the Pd grid was a major problem even when the grid was overcoated with a hot or cold sputtered alumina overcoat.

  15. 3Halobacteriovorax isolated from marine water of the Adriatic Sea, Italy, as an effective predator of Vibrio parahaemolyticus, non-O1/O139 V.cholerae, V.vulnificus.

    PubMed

    Ottaviani, Donatella; Chierichetti, Serena; Angelico, Gabriele; Forte, Claudio; Rocchegiani, Elena; Manuali, Elisabetta; Leoni, Francesca

    2018-06-21

    To detect marine Bdellovibrio and like organisms (BALOs) able to infect V.parahaemolyticus from seawater of the Adriatic, Italy. To test, prey specificity and predation efficiency of our Halobacteriovorax isolate, named HBXCO1, towards 17 Vibrio and 7 non-Vibrio strains linked to the Adriatic sea, Italy. Double layer agar plating technique was used to enumerate BALOs and to evaluate their prey specificity and predation efficiency. Transmission electron microscopy and 16S rRNA analysis were used to identify them. Means of BALOs counts ranged from 5.0 PFU/ml (March 2017) to 98.6 PFU/ml (August 2016). HBXCO1 had the ability to attack all tested prey strains of V. parahaemolyticus, V. cholerae nonO1/O139 and V. vulnificus, but it did not prey on non-Vibrio strains and V. alginolyticus under the tested conditions. BALOs capable of infecting pathogenic vibrios are naturally present in seawater of the Adriatic, Italy. Isolate HBXCO1 shows prey specificity preferentially for the Vibrio genus and high predatory efficiency towards a wide range of pathogenic strains. The public impact of V.parahaemolyticus, non O1/O139 V.cholerae and V.vulnificus in bivalves is relevant and current decontamination processes are not always effective. We believe that the predator HBXCO1 represents a potential candidate for the development of strategies of biocontrol of pathogenic vibrios in bivalves from harvesting to trade. This article is protected by copyright. All rights reserved. This article is protected by copyright. All rights reserved.

  16. A graph-based network-vulnerability analysis system

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Swiler, L.P.; Phillips, C.; Gaylor, T.

    1998-05-03

    This paper presents a graph based approach to network vulnerability analysis. The method is flexible, allowing analysis of attacks from both outside and inside the network. It can analyze risks to a specific network asset, or examine the universe of possible consequences following a successful attack. The analysis system requires as input a database of common attacks, broken into atomic steps, specific network configuration and topology information, and an attacker profile. The attack information is matched with the network configuration information and an attacker profile to create a superset attack graph. Nodes identify a stage of attack, for example themore » class of machines the attacker has accessed and the user privilege level he or she has compromised. The arcs in the attack graph represent attacks or stages of attacks. By assigning probabilities of success on the arcs or costs representing level of effort for the attacker, various graph algorithms such as shortest path algorithms can identify the attack paths with the highest probability of success.« less

  17. A graph-based network-vulnerability analysis system

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Swiler, L.P.; Phillips, C.; Gaylor, T.

    1998-01-01

    This report presents a graph-based approach to network vulnerability analysis. The method is flexible, allowing analysis of attacks from both outside and inside the network. It can analyze risks to a specific network asset, or examine the universe of possible consequences following a successful attack. The analysis system requires as input a database of common attacks, broken into atomic steps, specific network configuration and topology information, and an attacker profile. The attack information is matched with the network configuration information and an attacker profile to create a superset attack graph. Nodes identify a stage of attack, for example the classmore » of machines the attacker has accessed and the user privilege level he or she has compromised. The arcs in the attack graph represent attacks or stages of attacks. By assigning probabilities of success on the arcs or costs representing level-of-effort for the attacker, various graph algorithms such as shortest-path algorithms can identify the attack paths with the highest probability of success.« less

  18. Method and tool for network vulnerability analysis

    DOEpatents

    Swiler, Laura Painton [Albuquerque, NM; Phillips, Cynthia A [Albuquerque, NM

    2006-03-14

    A computer system analysis tool and method that will allow for qualitative and quantitative assessment of security attributes and vulnerabilities in systems including computer networks. The invention is based on generation of attack graphs wherein each node represents a possible attack state and each edge represents a change in state caused by a single action taken by an attacker or unwitting assistant. Edges are weighted using metrics such as attacker effort, likelihood of attack success, or time to succeed. Generation of an attack graph is accomplished by matching information about attack requirements (specified in "attack templates") to information about computer system configuration (contained in a configuration file that can be updated to reflect system changes occurring during the course of an attack) and assumed attacker capabilities (reflected in "attacker profiles"). High risk attack paths, which correspond to those considered suited to application of attack countermeasures given limited resources for applying countermeasures, are identified by finding "epsilon optimal paths."

  19. About Heart Attacks

    MedlinePlus

    ... Artery Disease Venous Thromboembolism Aortic Aneurysm More About Heart Attacks Updated:Jan 11,2018 A heart attack is ... coronary artery damage leads to a heart attack . Heart Attack Questions and Answers What is a heart attack? ...

  20. Antibiosis of Trichoderma spp strains native to northeastern Mexico against the pathogenic fungus Macrophomina phaseolina

    PubMed Central

    Mendoza, José Luis Hernández; Pérez, María Isabel Sánchez; Prieto, Juan Manuel González; Velásquez, Jesús DiCarlo Quiroz; Olivares, Jesús Gerardo García; Langarica, Homar Rene Gill

    2015-01-01

    Abstract Sampling of agricultural soils from the Mexican northeastern region was performed to detect Trichoderma spp., genetically characterize it, and assess its potential use as a biologic control agent against Macrophomina phaseolina. M. phaseolina is a phytopathogen that attacks over 500 species of cultivated plants and causes heavy losses in the regional sorghum crop. Sampling was performed immediately after sorghum or corn harvest in an area that was approximately 170 km from the Mexico-USA border. Sixteen isolates were obtained in total. Using colony morphology and sequencing the internal transcribed spacers (ITS) 1 and 4 of 18S rDNA, 14 strains were identified as Trichoderma harzianum, T. koningiopsis and T. virens. Subsequently, their antagonistic activity against M. phaseolina was evaluated in vitro, and 11 isolates showed antagonism by competition and stopped M. phaseolina growth. In 4 of these isolates, the antibiosis phenomenon was observed through the formation of an intermediate band without growth between colonies. One strain, HTE808, was identified as Trichoderma koningiopsis and grew rapidly; when it came into contact with the M. phaseolina colony, it continued to grow and sporulated until it covered the entire petri dish. Microscopic examination confirmed that it has a high level of hyperparasitism and is thus considered to have high potential for use in the control of this phytopathogen. PMID:26691467

  1. The Escherichia coli phylogenetic group B2 with integrons prevails in childhood recurrent urinary tract infections.

    PubMed

    Kõljalg, Siiri; Truusalu, Kai; Stsepetova, Jelena; Pai, Kristiine; Vainumäe, Inga; Sepp, Epp; Mikelsaar, Marika

    2014-05-01

    The aim of our study was to characterize the phylogenetic groups of Escherichia coli, antibiotic resistance, and containment of class 1 integrons in the first attack of pyelonephritis and in subsequent recurrences in young children. Altogether, 89 urine E. coli isolates from 41 children with urinary tract infection (UTI) were studied for prevalence and persistence of phylogenetic groups by pulsed-field gel electrophoresis (PFGE), antibacterial resistance by minimal inhibitory concentrations (MIC) and class 1 integrons by PCR. Phylogenetic group B2 was most common (57%), followed by D (20%), A (18%) and B1 (5%). Overall resistance to betalactams was 61%, trimethoprim-sulfamethoxazole 28%, and was not associated with phylogenetic groups. According to PFGE, the same clonal strain persisted in 77% of patients. The persistence was detected most often in phylogenetic group B2 (70%). Phylogenetic group B2 more often contained class 1 integrons than group A. Integron positive strains had higher MIC values of cefuroxime, cefotaxime, and gentamicin. In conclusion, phylogenetic group B2 was the most common cause of the first episode of pyelonephritis, as well as in case of the persistence of the same strain and contained frequently class 1 integrons in childhood recurrent UTI. An overall frequent betalactam resistance was equally distributed among phylogenetic groups. © 2013 APMIS. Published by John Wiley & Sons Ltd.

  2. Antibacterial metabolites secreted under glucose-limited environment of the mimicked proximal colon model by lactobacilli abundant in infant feces.

    PubMed

    Kanjan, Pochanart; Hongpattarakere, Tipparat

    2016-09-01

    The most abundance of anti-Salmonella lactic acid bacteria (LAB) was found in feces of naturally born, exclusively breastfed Thai infants. Six strains of Lactobacillus plantarum and one strain of Lactobacillus paracasei were selected and identified. In the co-cultivation assay, L. plantarum subsp. plantarum I62 showed the strongest and broadest antibacterial activity against Escherichia coli, Shigella sonnei, Salmonella Paratyphi A, and Salmonella Typhimurium SA 2093 under the mimicked proximal colon condition, in which glucose and other nutrients were limited. According to GC-MS analysis, the major antibacterial contribution of organic acids secreted by L. plantarum I62 grown in the presence of glucose was dramatically reduced from 95.8 to 41.9 % under glucose-limited niche. The production of low-pK a acids, such as lactic, 1,2-benzenedicarboxylic, and 3-phenyllactic acids, was remarkably dropped. Surprisingly, higher-pK a acids such as 5-chlorobenzimidazole-2-carboxylic, pyroglutamic, palmitic, and oleic acids were enhanced. Moreover, cyclic dipeptides, ketones, alkanes, alcohols, and miscellaneous compounds, which were pH-independent antibacterial metabolites, became dominant. The electron microscopy strongly supported the synergistic attacks of the multiple antibacterial components targeting outer and cytoplasmic membranes leading to severe leakage and cell disruption of Salmonella Typhimurium. This strain poses to be a potential probiotic candidate for effectively controlling and treating human foodborne bacterial infection.

  3. Biomechanical and ultrastructural comparison of cryopreservation and a novel cellular extraction of porcine aortic valve leaflets.

    PubMed

    Courtman, D W; Pereira, C A; Omar, S; Langdon, S E; Lee, J M; Wilson, G J

    1995-12-01

    Heart valve substitutes of biological origin often fail by degenerative mechanisms. Many authors have hypothesized that mechanical fatigue and structural degradation are instrumental to in vivo failure. Since the properties of the structural matrix at implantation may predetermine failure, we have examined the ultrastructure, fracture, mechanics, and uniaxial high-strain-rate viscoelastic properties of: (1) fresh, (2) cryopreserved, and (3) cellular extracted porcine aortic valve leaflets. The cellular extraction process is being developed in order to reduce immunological attack and calcification. Cryopreservation causes cellular disruption and necrotic changes throughout the tissue, whereas extraction removes all cells and lipid membranes. Both processes leave an intact collagen and elastin structural matrix and preserve the high-strain-rate viscoelastic characteristics of the fresh leaflets. Extraction does cause a 20% reduction in the fracture tension and increases tissue extensibility, with the percent strain at fracture rising to 45.3 +/- 4 (mean +/- SEM) from 31.5 +/- 3 for fresh leaflets. However, extraction does preserve matrix structure and mechanics over the physiological loading range. Glutaraldehyde fixation produces increased extensibility, increased elastic behavior, and, when applied to extracted leaflets, it causes a marked drop in fracture tension, to 50% of that for fresh leaflets. The combination of extraction and fixation may lead to early degenerative failure. The cellular extraction technique alone may be a useful alternative to glutaraldehyde fixation in preparing bioprosthetic heart valves.

  4. Evaluation of an intragastric challenge model for Shigella dysenteriae 1 in rhesus monkeys (Macaca mulatta) for the pre-clinical assessment of Shigella vaccine formulations

    PubMed Central

    Islam, Dilara; Ruamsap, Nattaya; Khantapura, Patchariya; Aksomboon, Ajchara; Srijan, Apichai; Wongstitwilairoong, Boonchai; Bodhidatta, Ladaporn; Gettayacamin, Montip; Venkatesan, Malabi M; Mason, Carl J

    2014-01-01

    Shigellosis is a worldwide disease, characterized by abdominal pain, fever, vomiting, and the passage of blood- and mucus-streaked stools. Rhesus monkeys and other primates are the only animals that are naturally susceptible to shigellosis. A suitable animal model is required for the pre-clinical evaluation of vaccines candidates. In this study, the minimal dose of Shigella dysenteriae1 1617 strain required to produce dysentery in four of five (80% attack rate) monkeys using an escalating dose range for three groups [2 × 108, 2 × 109 and 2 × 1010 colony forming unit (CFU)] was determined. In addition, the monkeys were re-infected. The identified optimal challenge dose was 2 × 109 CFU; this dose elicited 60% protection in monkeys when they were re-challenged with a one log higher dose (2 × 1010 CFU). The challenge dose, 2 × 1010 CFU, produced severe dysentery in all monkeys, with one monkey dying within 24 h, elicited 100% protection when re-challenged with the same dose. All monkeys exhibited immune responses. This study concludes that the rhesus monkey model closely mimics the disease and immune response seen in humans and is a suitable animal model for the pre-clinical evaluation of Shigella vaccine candidates. Prior infection with the 1617 strain can protect monkeys against subsequent re-challenges with homologous strains. PMID:24028276

  5. Influence of para-substituents on the oxidative metabolism of o-nitrophenols by Pseudomonas putida B2.

    PubMed Central

    Zeyer, J; Kocher, H P; Timmis, K N

    1986-01-01

    Pseudomonas putida B2 is able to grow on o-nitrophenol (ONP) as the sole source of carbon and nitrogen. ONP was converted by a nitrophenol oxygenase to nitrite and catechol. Catechol was then attacked by a catechol 1,2-dioxygenase and further degraded through an ortho-cleavage pathway. ONP derivatives which were para-substituted with a methyl-, chloro-, carboxy-, formyl- or nitro-group failed to support growth of strain B2. Relevant catabolic enzymes were characterized to analyze why these derivatives were not mineralized. Nitrophenol oxygenase of strain B2 is a soluble, NADPH-dependent enzyme that is stimulated by magnesium, manganese, and calcium ions. It is active toward ONP, 4-methyl-, 4-chloro-, and to a lesser extent, 4-formyl-ONP but not toward 4-carboxy- or 4-nitro-ONP. In addition, 4-formyl-, 4-carboxy-, and 4-nitro-ONP failed to induce the formation of nitrophenol oxygenase. Catechol 1,2-dioxygenase of strain B2 is active toward catechol and 4-methyl-catechol but only poorly active toward chlorinated catechols. 4-Methyl-catechol is likely to be degraded to methyl-lactones, which are often dead-end metabolites in bacteria. Thus, of the compounds tested, only unsubstituted ONP acts as an inducer and substrate for all of the enzymes of a productive catabolic pathway. PMID:3752997

  6. Stress of algicidal substances from a bacterium Exiguobacterium sp. h10 on Microcystis aeruginosa.

    PubMed

    Li, Y; Liu, L; Xu, Y; Li, P; Zhang, K; Jiang, X; Zheng, T; Wang, H

    2017-01-01

    Microcystis aeruginosa is a cyanobacterial bloom-causing species and is considered a serious threat to human health and biological safety. In this study, the algicidal bacterium h10 showed high algicidal effects on M. aeruginosa 7820, and strain h10 was confirmed to belong to the genus Exiguobacterium, for which the name Exiguobacterium sp. h10 is proposed. Algicidal activity and mode analysis revealed that the supernatant, rather than the bacterial cells, was responsible for the algicidal activity, indicating that the algicidal mode of strain h10 is by indirect attack through the production of algicidal substances. Analysis of the algicidal substance characteristics showed a molecular weight of <1000 Da and that algicidal substances exhibit high thermal stability and pH instability, and the characteristic functional groups of the algicidal substance mainly included carbonyl, amino and hydroxyl groups. Under the effects of the algicidal substance, the cellular pigment content was significantly decreased, and the algal cell structure and morphology were seriously damaged. The results indicate that the algicidal bacterium Exiguobacterium sp. h10 could be a potential bio-agent for controlling cyanobacterial blooms of M. aeruginosa. In this study, the effects of algicidal substances from an algicidal bacterium Exiguobacterium sp. h10 on the toxic cyanobacterium, Microcystis aeruginosa 7820, were first investigated. The algicidal mode of action was confirmed as an indirect attack through the production of algicidal substances. The characteristics of the algicidal substance were determined, especially the functional groups analysis that confirmed the algicidal substances were glycolipid mixtures. With the stress of algicidal substances, the algal chlorophyll a synthesis, cell structure and morphology were seriously damaged. This study proved that algicidal bacteria are promising sources of potential cyanobacterial bloom-control, and provided good procedures for the identification and analysis of an algicidal bacterium and substances. Letters in Applied Microbiology © 2016 The Society for Applied Microbiology.

  7. Programmed Protection of Foreign DNA from Restriction Allows Pathogenicity Island Exchange during Pneumococcal Transformation

    PubMed Central

    Johnston, Calum; Martin, Bernard; Granadel, Chantal; Polard, Patrice; Claverys, Jean-Pierre

    2013-01-01

    In bacteria, transformation and restriction-modification (R-M) systems play potentially antagonistic roles. While the former, proposed as a form of sexuality, relies on internalized foreign DNA to create genetic diversity, the latter degrade foreign DNA to protect from bacteriophage attack. The human pathogen Streptococcus pneumoniae is transformable and possesses either of two R-M systems, DpnI and DpnII, which respectively restrict methylated or unmethylated double-stranded (ds) DNA. S. pneumoniae DpnII strains possess DpnM, which methylates dsDNA to protect it from DpnII restriction, and a second methylase, DpnA, which is induced during competence for genetic transformation and is unusual in that it methylates single-stranded (ss) DNA. DpnA was tentatively ascribed the role of protecting internalized plasmids from DpnII restriction, but this seems unlikely in light of recent results establishing that pneumococcal transformation was not evolved to favor plasmid exchange. Here we validate an alternative hypothesis, showing that DpnA plays a crucial role in the protection of internalized foreign DNA, enabling exchange of pathogenicity islands and more generally of variable regions between pneumococcal isolates. We show that transformation of a 21.7 kb heterologous region is reduced by more than 4 logs in dpnA mutant cells and provide evidence that the specific induction of dpnA during competence is critical for full protection. We suggest that the integration of a restrictase/ssDNA-methylase couplet into the competence regulon maintains protection from bacteriophage attack whilst simultaneously enabling exchange of pathogenicicy islands. This protective role of DpnA is likely to be of particular importance for pneumococcal virulence by allowing free variation of capsule serotype in DpnII strains via integration of DpnI capsule loci, contributing to the documented escape of pneumococci from capsule-based vaccines. Generally, this finding is the first evidence for a mechanism that actively promotes genetic diversity of S. pneumoniae through programmed protection and incorporation of foreign DNA. PMID:23459610

  8. Opc expression, LPS immunotype switch and pilin conversion contribute to serum resistance of unencapsulated meningococci.

    PubMed

    Hubert, Kerstin; Pawlik, Marie-Christin; Claus, Heike; Jarva, Hanna; Meri, Seppo; Vogel, Ulrich

    2012-01-01

    Neisseria meningitidis employs polysaccharides and outer membrane proteins to cope with human serum complement attack. To screen for factors influencing serum resistance, an assay was developed based on a colorimetric serum bactericidal assay. The screening used a genetically modified sequence type (ST)-41/44 clonal complex (cc) strain lacking LPS sialylation, polysaccharide capsule, the factor H binding protein (fHbp) and MutS, a protein of the DNA repair mechanism. After killing of >99.9% of the bacterial cells by serum treatment, the colorimetric assay was used to screen 1000 colonies, of which 35 showed enhanced serum resistance. Three mutant classes were identified. In the first class of mutants, enhanced expression of Opc was identified. Opc expression was associated with vitronectin binding and reduced membrane attack complex deposition confirming recent observations. Lipopolysaccharide (LPS) immunotype switch from immunotype L3 to L8/L1 by lgtA and lgtC phase variation represented the second class. Isogenic mutant analysis demonstrated that in ST-41/44 cc strains the L8/L1 immunotype was more serum resistant than the L3 immunotype. Consecutive analysis revealed that the immunotypes L8 and L1 were frequently observed in ST-41/44 cc isolates from both carriage and disease. Immunotype switch to L8/L1 is therefore suggested to contribute to the adaptive capacity of this meningococcal lineage. The third mutant class displayed a pilE allelic exchange associated with enhanced autoaggregation. The mutation of the C terminal hypervariable region D of PilE included a residue previously associated with increased pilus bundle formation. We suggest that autoaggregation reduced the surface area accessible to serum complement and protected from killing. The study highlights the ability of meningococci to adapt to environmental stress by phase variation and intrachromosomal recombination affecting subcapsular antigens.

  9. Opc Expression, LPS Immunotype Switch and Pilin Conversion Contribute to Serum Resistance of Unencapsulated Meningococci

    PubMed Central

    Hubert, Kerstin; Pawlik, Marie-Christin; Claus, Heike; Jarva, Hanna; Meri, Seppo; Vogel, Ulrich

    2012-01-01

    Neisseria meningitidis employs polysaccharides and outer membrane proteins to cope with human serum complement attack. To screen for factors influencing serum resistance, an assay was developed based on a colorimetric serum bactericidal assay. The screening used a genetically modified sequence type (ST)-41/44 clonal complex (cc) strain lacking LPS sialylation, polysaccharide capsule, the factor H binding protein (fHbp) and MutS, a protein of the DNA repair mechanism. After killing of >99.9% of the bacterial cells by serum treatment, the colorimetric assay was used to screen 1000 colonies, of which 35 showed enhanced serum resistance. Three mutant classes were identified. In the first class of mutants, enhanced expression of Opc was identified. Opc expression was associated with vitronectin binding and reduced membrane attack complex deposition confirming recent observations. Lipopolysaccharide (LPS) immunotype switch from immunotype L3 to L8/L1 by lgtA and lgtC phase variation represented the second class. Isogenic mutant analysis demonstrated that in ST-41/44 cc strains the L8/L1 immunotype was more serum resistant than the L3 immunotype. Consecutive analysis revealed that the immunotypes L8 and L1 were frequently observed in ST-41/44 cc isolates from both carriage and disease. Immunotype switch to L8/L1 is therefore suggested to contribute to the adaptive capacity of this meningococcal lineage. The third mutant class displayed a pilE allelic exchange associated with enhanced autoaggregation. The mutation of the C terminal hypervariable region D of PilE included a residue previously associated with increased pilus bundle formation. We suggest that autoaggregation reduced the surface area accessible to serum complement and protected from killing. The study highlights the ability of meningococci to adapt to environmental stress by phase variation and intrachromosomal recombination affecting subcapsular antigens. PMID:23028802

  10. A graph-based system for network-vulnerability analysis

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Swiler, L.P.; Phillips, C.

    1998-06-01

    This paper presents a graph-based approach to network vulnerability analysis. The method is flexible, allowing analysis of attacks from both outside and inside the network. It can analyze risks to a specific network asset, or examine the universe of possible consequences following a successful attack. The graph-based tool can identify the set of attack paths that have a high probability of success (or a low effort cost) for the attacker. The system could be used to test the effectiveness of making configuration changes, implementing an intrusion detection system, etc. The analysis system requires as input a database of common attacks,more » broken into atomic steps, specific network configuration and topology information, and an attacker profile. The attack information is matched with the network configuration information and an attacker profile to create a superset attack graph. Nodes identify a stage of attack, for example the class of machines the attacker has accessed and the user privilege level he or she has compromised. The arcs in the attack graph represent attacks or stages of attacks. By assigning probabilities of success on the arcs or costs representing level-of-effort for the attacker, various graph algorithms such as shortest-path algorithms can identify the attack paths with the highest probability of success.« less

  11. Explaining rapid reinfections in multiple-wave influenza outbreaks: Tristan da Cunha 1971 epidemic as a case study

    PubMed Central

    Camacho, Anton; Ballesteros, Sébastien; Graham, Andrea L.; Carrat, Fabrice; Ratmann, Oliver; Cazelles, Bernard

    2011-01-01

    Influenza usually spreads through the human population in multiple-wave outbreaks. Successive reinfection of individuals over a short time interval has been explicitly reported during past pandemics. However, the causes of rapid reinfection and the role of reinfection in driving multiple-wave outbreaks remain poorly understood. To investigate these issues, we focus on a two-wave influenza A/H3N2 epidemic that occurred on the remote island of Tristan da Cunha in 1971. Over 59 days, 273 (96%) of 284 islanders experienced at least one attack and 92 (32%) experienced two attacks. We formulate six mathematical models invoking a variety of antigenic and immunological reinfection mechanisms. Using a maximum-likelihood analysis to confront model predictions with the reported incidence time series, we demonstrate that only two mechanisms can be retained: some hosts with either a delayed or deficient humoral immune response to the primary influenza infection were reinfected by the same strain, thus initiating the second epidemic wave. Both mechanisms are supported by previous empirical studies and may arise from a combination of genetic and ecological causes. We advocate that a better understanding and account of heterogeneity in the human immune response are essential to analysis of multiple-wave influenza outbreaks and pandemic planning. PMID:21525058

  12. Tests of Aerodynamically Heated Multiweb Wing Structures in a Free Jet at Mach Number 2: Five Aluminum-Alloy Models of 20-Inch Chord with 0.064-Inch-Thick Skin, 0.025-Inch-Thick Webs, and Various Chordwise Stiffening at 2 deg Angle of Attack

    NASA Technical Reports Server (NTRS)

    Trussell, Donald H.; Thomson, Robert G.

    1960-01-01

    An experimental study was made on five 2024-T3 aluminum-alloy multiweb wing structures (MW-2-(4), MW-4-(3), mw-16, MW-17, and MW-18), at a Mach number of 2 and an angle of attack of 2 deg under simulated supersonic flight conditions. These models, of 20-inch chord and semi-span and 5-percent-thick circular-arc airfoil section, were identical except for the type and amount of chordwise stiffening. One model with no chordwise ribs between root and tip bulkhead fluttered and failed dynamically partway through its test. Another model with no chordwise ribs (and a thinner tip bulkhead) experienced a static bending type of failure while undergoing flutter. The three remaining models with one, two, or three chordwise ribs survived their tests. The test results indicate that the chordwise shear rigidity imparted to the models by the addition of even one chordwise rib precludes flutter and subsequent failure under the imposed test conditions. This paper presents temperature and strain data obtained from the tests and discusses the behavior of the models.

  13. Application of Cellular Automata to Detection of Malicious Network Packets

    ERIC Educational Resources Information Center

    Brown, Robert L.

    2014-01-01

    A problem in computer security is identification of attack signatures in network packets. An attack signature is a pattern of bits that characterizes a particular attack. Because there are many kinds of attacks, there are potentially many attack signatures. Furthermore, attackers may seek to avoid detection by altering the attack mechanism so that…

  14. Cooperating attackers in neural cryptography.

    PubMed

    Shacham, Lanir N; Klein, Einat; Mislovaty, Rachel; Kanter, Ido; Kinzel, Wolfgang

    2004-06-01

    A successful attack strategy in neural cryptography is presented. The neural cryptosystem, based on synchronization of neural networks by mutual learning, has been recently shown to be secure under different attack strategies. The success of the advanced attacker presented here, called the "majority-flipping attacker," does not decay with the parameters of the model. This attacker's outstanding success is due to its using a group of attackers which cooperate throughout the synchronization process, unlike any other attack strategy known. An analytical description of this attack is also presented, and fits the results of simulations.

  15. Terrorist Attacks Escalate in Frequency and Fatalities Preceding Highly Lethal Attacks

    PubMed Central

    Martens, Andy; Sainudiin, Raazesh; Sibley, Chris G.; Schimel, Jeff; Webber, David

    2014-01-01

    Highly lethal terrorist attacks, which we define as those killing 21 or more people, account for 50% of the total number of people killed in all terrorist attacks combined, yet comprise only 3.5% of terrorist attacks. Given the disproportionate influence of these incidents, uncovering systematic patterns in attacks that precede and anticipate these highly lethal attacks may be of value for understanding attacks that exact a heavy toll on life. Here we examined whether the activity of terrorist groups escalates–both in the number of people killed per attack and in the frequency of attacks–leading up to highly lethal attacks. Analyses of terrorist attacks drawn from a state-of-the-art international terrorism database (The Global Terrorism Database) showed evidence for both types of escalation leading up to highly lethal attacks, though complexities to the patterns emerged as well. These patterns of escalation do not emerge among terrorist groups that never commit a highly lethal attack. PMID:24755753

  16. Causal Attribution, Perceived Benefits, and Morbidity After a Heart Attack: An 8-Year Study.

    ERIC Educational Resources Information Center

    Affleck, Glenn; And Others

    1987-01-01

    Interviewed heart attack victims (N=287) seven weeks and eight years after their attack. Explored interrelations among causal attributions for the attack, survivor morbidity, and heart attack recurrence. Found that patients who cited benefits from their misfortune seven weeks after the first attack were less likely to have another attack and had…

  17. On Patarin's Attack against the lIC Scheme

    NASA Astrophysics Data System (ADS)

    Ogura, Naoki; Uchiyama, Shigenori

    In 2007, Ding et al. proposed an attractive scheme, which is called the l-Invertible Cycles (lIC) scheme. lIC is one of the most efficient multivariate public-key cryptosystems (MPKC); these schemes would be suitable for using under limited computational resources. In 2008, an efficient attack against lIC using Gröbner basis algorithms was proposed by Fouque et al. However, they only estimated the complexity of their attack based on their experimental results. On the other hand, Patarin had proposed an efficient attack against some multivariate public-key cryptosystems. We call this attack Patarin's attack. The complexity of Patarin's attack can be estimated by finding relations corresponding to each scheme. In this paper, we propose an another practical attack against the lIC encryption/signature scheme. We estimate the complexity of our attack (not experimentally) by adapting Patarin's attack. The attack can be also applied to the lIC- scheme. Moreover, we show some experimental results of a practical attack against the lIC/lIC- schemes. This is the first implementation of both our proposed attack and an attack based on Gröbner basis algorithm for the even case, that is, a parameter l is even.

  18. Machine Learning Methods for Attack Detection in the Smart Grid.

    PubMed

    Ozay, Mete; Esnaola, Inaki; Yarman Vural, Fatos Tunay; Kulkarni, Sanjeev R; Poor, H Vincent

    2016-08-01

    Attack detection problems in the smart grid are posed as statistical learning problems for different attack scenarios in which the measurements are observed in batch or online settings. In this approach, machine learning algorithms are used to classify measurements as being either secure or attacked. An attack detection framework is provided to exploit any available prior knowledge about the system and surmount constraints arising from the sparse structure of the problem in the proposed approach. Well-known batch and online learning algorithms (supervised and semisupervised) are employed with decision- and feature-level fusion to model the attack detection problem. The relationships between statistical and geometric properties of attack vectors employed in the attack scenarios and learning algorithms are analyzed to detect unobservable attacks using statistical learning methods. The proposed algorithms are examined on various IEEE test systems. Experimental analyses show that machine learning algorithms can detect attacks with performances higher than attack detection algorithms that employ state vector estimation methods in the proposed attack detection framework.

  19. Split-second escape decisions in blue tits (Parus caeruleus)

    NASA Astrophysics Data System (ADS)

    Lind, Johan; Kaby, Ulrika; Jakobsson, Sven

    2002-07-01

    Bird mortality is heavily affected by birds of prey. Under attack, take-off is crucial for survival and even minor mistakes in initial escape response can have devastating consequences. Birds may respond differently depending on the character of the predator's attack and these split-second decisions were studied using a model merlin (Falco columbarius) that attacked feeding blue tits (Parus caeruleus) from two different attack angles in two different speeds. When attacked from a low attack angle they took off more steeply than when attacked from a high angle. This is the first study to show that escape behaviour also depends on predator attack speed. The blue tits responded to a high-speed attack by dodging sideways more often than when attacked at a low speed. Escape speed was not significantly affected by the different treatments. Although they have only a split-second before escaping an attack, blue tits do adjust their escape strategy to the prevailing attack conditions.

  20. Hybrid attacks on model-based social recommender systems

    NASA Astrophysics Data System (ADS)

    Yu, Junliang; Gao, Min; Rong, Wenge; Li, Wentao; Xiong, Qingyu; Wen, Junhao

    2017-10-01

    With the growing popularity of the online social platform, the social network based approaches to recommendation emerged. However, because of the open nature of rating systems and social networks, the social recommender systems are susceptible to malicious attacks. In this paper, we present a certain novel attack, which inherits characteristics of the rating attack and the relation attack, and term it hybrid attack. Furtherly, we explore the impact of the hybrid attack on model-based social recommender systems in multiple aspects. The experimental results show that, the hybrid attack is more destructive than the rating attack in most cases. In addition, users and items with fewer ratings will be influenced more when attacked. Last but not the least, the findings suggest that spammers do not depend on the feedback links from normal users to become more powerful, the unilateral links can make the hybrid attack effective enough. Since unilateral links are much cheaper, the hybrid attack will be a great threat to model-based social recommender systems.

  1. Detecting Pulsing Denial-of-Service Attacks with Nondeterministic Attack Intervals

    NASA Astrophysics Data System (ADS)

    Luo, Xiapu; Chan, Edmond W. W.; Chang, Rocky K. C.

    2009-12-01

    This paper addresses the important problem of detecting pulsing denial of service (PDoS) attacks which send a sequence of attack pulses to reduce TCP throughput. Unlike previous works which focused on a restricted form of attacks, we consider a very broad class of attacks. In particular, our attack model admits any attack interval between two adjacent pulses, whether deterministic or not. It also includes the traditional flooding-based attacks as a limiting case (i.e., zero attack interval). Our main contribution is Vanguard, a new anomaly-based detection scheme for this class of PDoS attacks. The Vanguard detection is based on three traffic anomalies induced by the attacks, and it detects them using a CUSUM algorithm. We have prototyped Vanguard and evaluated it on a testbed. The experiment results show that Vanguard is more effective than the previous methods that are based on other traffic anomalies (after a transformation using wavelet transform, Fourier transform, and autocorrelation) and detection algorithms (e.g., dynamic time warping).

  2. Cyber-Physical Attacks With Control Objectives

    DOE PAGES

    Chen, Yuan; Kar, Soummya; Moura, Jose M. F.

    2017-08-18

    This study studies attackers with control objectives against cyber-physical systems (CPSs). The goal of the attacker is to counteract the CPS's controller and move the system to a target state while evading detection. We formulate a cost function that reflects the attacker's goals, and, using dynamic programming, we show that the optimal attack strategy reduces to a linear feedback of the attacker's state estimate. By changing the parameters of the cost function, we show how an attacker can design optimal attacks to balance the control objective and the detection avoidance objective. In conclusion, we provide a numerical illustration based onmore » a remotely controlled helicopter under attack.« less

  3. Cyber-Physical Attacks With Control Objectives

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chen, Yuan; Kar, Soummya; Moura, Jose M. F.

    This study studies attackers with control objectives against cyber-physical systems (CPSs). The goal of the attacker is to counteract the CPS's controller and move the system to a target state while evading detection. We formulate a cost function that reflects the attacker's goals, and, using dynamic programming, we show that the optimal attack strategy reduces to a linear feedback of the attacker's state estimate. By changing the parameters of the cost function, we show how an attacker can design optimal attacks to balance the control objective and the detection avoidance objective. In conclusion, we provide a numerical illustration based onmore » a remotely controlled helicopter under attack.« less

  4. Fiber Grating Environmental Sensing System

    DOEpatents

    Schulz, Whitten L.; Udd, Eric

    2003-07-29

    Fiber grating environmental measurement systems are comprised of sensors that are configured to respond to changes in moisture or chemical content of the surrounding medium through the action of coatings and plates inducing strain that is measured. These sensors can also be used to monitor the interior of bonds for degradation due to aging, cracking, or chemical attack. Means to multiplex these sensors at high speed and with high sensitivity can be accomplished by using spectral filters placed to correspond to each fiber grating environmental sensor. By forming networks of spectral elements and using wavelength division multiplexing arrays of fiber grating sensors may be processed in a single fiber line allowing distributed high sensitivity, high bandwidth fiber optic grating environmental sensor systems to be realized.

  5. An experimental investigation of the low Reynolds number performance of the Lissaman 7769 airfoil

    NASA Technical Reports Server (NTRS)

    Conigliaro, P. E.

    1983-01-01

    A Lissaman 7769 airfoil, used on the Gossamer Condor and Gossamer Albatross human-powered aircraft, was tested in a low turbulence subsonic wind tunnel. Lift and drag data were collected at chord Reynolds numbers of 100,000, 150,000, 200,000, 250,000, and 300,000; at angles of attack from -10 to +20 deg by using an external strain gage force balance. Lift curves, drag curves, and drag polars were generated from both uncorrected data and data corrected for wind tunnel blockage effects. A flow visualization study was performed to correlate with the force data. The results of the investigation have shown that the airfoil exhibits a significant degradation in performance for chord Reynolds numbers below 150,000.

  6. Inhibition of Escherichia coli viability by external guide sequences complementary to two essential genes

    PubMed Central

    McKinney, Jeffrey; Guerrier-Takada, Cecilia; Wesolowski, Donna; Altman, Sidney

    2001-01-01

    Narrow spectrum antimicrobial activity has been designed to reduce the expression of two essential genes, one coding for the protein subunit of RNase P (C5 protein) and one for gyrase (gyrase A). In both cases, external guide sequences (EGS) have been designed to complex with either mRNA. Using the EGS technology, the level of microbial viability is reduced to less than 10% of the wild-type strain. The EGSs are additive when used together and depend on the number of nucleotides paired when attacking gyrase A mRNA. In the case of gyrase A, three nucleotides unpaired out of a 15-mer EGS still favor complete inhibition by the EGS but five unpaired nucleotides do not. PMID:11381134

  7. Dummheit

    PubMed Central

    Evans, Robert G.

    2015-01-01

    Immunizing against influenza is tricky; against measles is not. Influenza comes in many constantly evolving strains, but one measles shot in childhood confers lifelong immunity. Unlike the flu, measles was wiped out. Its return represents an outbreak not of disease, but of stupidity. The matrix of stupidity is, however, reinforced by strong strands of malice, as when Andrew Wakefield's fraudulent 1998 paper linked the MMR vaccine to autism. The fraud was unmasked and the vaccine–autism link disproven, but the evil influence continues. Measles offers an illustration of Virchow's insights that medicine is a social science and that politics is medicine writ large. It is this “inconvenient truth” that is being suppressed by muzzling the Chief Public Health Officer (CPHO) and attacking public health for addressing “social determinants.” PMID:25947030

  8. Performance Improvement of Power Analysis Attacks on AES with Encryption-Related Signals

    NASA Astrophysics Data System (ADS)

    Lee, You-Seok; Lee, Young-Jun; Han, Dong-Guk; Kim, Ho-Won; Kim, Hyoung-Nam

    A power analysis attack is a well-known side-channel attack but the efficiency of the attack is frequently degraded by the existence of power components, irrelative to the encryption included in signals used for the attack. To enhance the performance of the power analysis attack, we propose a preprocessing method based on extracting encryption-related parts from the measured power signals. Experimental results show that the attacks with the preprocessed signals detect correct keys with much fewer signals, compared to the conventional power analysis attacks.

  9. Attacks on public telephone networks: technologies and challenges

    NASA Astrophysics Data System (ADS)

    Kosloff, T.; Moore, Tyler; Keller, J.; Manes, Gavin W.; Shenoi, Sujeet

    2003-09-01

    Signaling System 7 (SS7) is vital to signaling and control in America's public telephone networks. This paper describes a class of attacks on SS7 networks involving the insertion of malicious signaling messages via compromised SS7 network components. Three attacks are discussed in detail: IAM flood attacks, redirection attacks and point code spoofing attacks. Depending on their scale of execution, these attacks can produce effects ranging from network congestion to service disruption. Methods for detecting these denial-of-service attacks and mitigating their effects are also presented.

  10. Novel mechanism of network protection against the new generation of cyber attacks

    NASA Astrophysics Data System (ADS)

    Milovanov, Alexander; Bukshpun, Leonid; Pradhan, Ranjit

    2012-06-01

    A new intelligent mechanism is presented to protect networks against the new generation of cyber attacks. This mechanism integrates TCP/UDP/IP protocol stack protection and attacker/intruder deception to eliminate existing TCP/UDP/IP protocol stack vulnerabilities. It allows to detect currently undetectable, highly distributed, low-frequency attacks such as distributed denial-of-service (DDoS) attacks, coordinated attacks, botnet, and stealth network reconnaissance. The mechanism also allows insulating attacker/intruder from the network and redirecting the attack to a simulated network acting as a decoy. As a result, network security personnel gain sufficient time to defend the network and collect the attack information. The presented approach can be incorporated into wireless or wired networks that require protection against known and the new generation of cyber attacks.

  11. Fast WEP-Key Recovery Attack Using Only Encrypted IP Packets

    NASA Astrophysics Data System (ADS)

    Teramura, Ryoichi; Asakura, Yasuo; Ohigashi, Toshihiro; Kuwakado, Hidenori; Morii, Masakatu

    Conventional efficient key recovery attacks against Wired Equivalent Privacy (WEP) require specific initialization vectors or specific packets. Since it takes much time to collect the packets sufficiently, any active attack should be performed. An Intrusion Detection System (IDS), however, will be able to prevent the attack. Since the attack logs are stored at the servers, it is possible to prevent such an attack. This paper proposes an algorithm for recovering a 104-bit WEP key from any IP packets in a realistic environment. This attack needs about 36, 500 packets with a success probability 0.5, and the complexity of our attack is equivalent to about 220 computations of the RC4 key setups. Since our attack is passive, it is difficult for both WEP users and administrators to detect our attack.

  12. Robustness of coevolution in resolving prisoner's dilemma games on interdependent networks subject to attack

    NASA Astrophysics Data System (ADS)

    Liu, Penghui; Liu, Jing

    2017-08-01

    Recently, coevolution between strategy and network structure has been established as a rule to resolve social dilemmas and reach optimal situations for cooperation. Many follow-up researches have focused on studying how coevolution helps networks reorganize to deter the defectors and many coevolution methods have been proposed. However, the robustness of the coevolution rules against attacks have not been studied much. Since attacks may directly influence the original evolutionary process of cooperation, the robustness should be an important index while evaluating the quality of a coevolution method. In this paper, we focus on investigating the robustness of an elementary coevolution method in resolving the prisoner's dilemma game upon the interdependent networks. Three different types of time-independent attacks, named as edge attacks, instigation attacks and node attacks have been employed to test its robustness. Through analyzing the simulation results obtained, we find this coevolution method is relatively robust against the edge attack and the node attack as it successfully maintains cooperation in the population over the entire attack range. However, when the instigation probability of the attacked individuals is large or the attack range of instigation attack is wide enough, coevolutionary rule finally fails in maintaining cooperation in the population.

  13. Security under Uncertainty: Adaptive Attackers Are More Challenging to Human Defenders than Random Attackers

    PubMed Central

    Moisan, Frédéric; Gonzalez, Cleotilde

    2017-01-01

    Game Theory is a common approach used to understand attacker and defender motives, strategies, and allocation of limited security resources. For example, many defense algorithms are based on game-theoretic solutions that conclude that randomization of defense actions assures unpredictability, creating difficulties for a human attacker. However, many game-theoretic solutions often rely on idealized assumptions of decision making that underplay the role of human cognition and information uncertainty. The consequence is that we know little about how effective these algorithms are against human players. Using a simplified security game, we study the type of attack strategy and the uncertainty about an attacker's strategy in a laboratory experiment where participants play the role of defenders against a simulated attacker. Our goal is to compare a human defender's behavior in three levels of uncertainty (Information Level: Certain, Risky, Uncertain) and three types of attacker's strategy (Attacker's strategy: Minimax, Random, Adaptive) in a between-subjects experimental design. Best defense performance is achieved when defenders play against a minimax and a random attack strategy compared to an adaptive strategy. Furthermore, when payoffs are certain, defenders are as efficient against random attack strategy as they are against an adaptive strategy, but when payoffs are uncertain, defenders have most difficulties defending against an adaptive attacker compared to a random attacker. We conclude that given conditions of uncertainty in many security problems, defense algorithms would be more efficient if they are adaptive to the attacker actions, taking advantage of the attacker's human inefficiencies. PMID:28690557

  14. Presence of noroviruses and other enteric viruses in sewage and surface waters in The Netherlands.

    PubMed

    Lodder, W J; de Roda Husman, A M

    2005-03-01

    Since virus concentrations in drinking waters are generally below the detection limit, the infectious risk from drinking water consumption requires assessment from the virus concentrations in source waters and removal efficiency of treatment processes. In this study, we estimated from reverse transcription-PCR on 10-fold serially diluted RNA that noroviruses, the most prevalent waterborne gastroenteritis agents, were present at 4 (0.2 to 38) to 4,900 (303 to 4.6 x 10(4)) PCR-detectable units (PDU) per liter of river water (ranges are given in parentheses). These virus concentrations are still high compared with 896 to 7,499 PDU/liter of treated sewage and 5,111 to 850,000 PDU/liter in raw sewage. Sequencing analyses designated human norovirus GGII.4 Lordsdale as the most prevalent strain in the sampling period 1998 to 1999 in both sewage and surface waters. Other GGII strains were also very abundant, indicating that the majority of the virus contamination was derived from urban sewage, although very divergent strains and one animal strain were also detected in the surface and sewage waters. Rotaviruses were also detected in two large rivers (the Maas and the Waal) at 57 to 5,386 PDU/liter. The high virus concentrations determined by PCR may in part be explained by the detection of virus RNA instead of infectious particles. Indeed, reoviruses and enteroviruses that can be cultured were present at much lower levels, of 0.3 to 1 and 2 to 10 PFU/liter, respectively. Assuming 1% of the noroviruses and rotaviruses to be infectious, a much higher disease burden than for other viruses can be expected, not only because of the higher levels but also because of these viruses' higher infectivity and attack rates.

  15. Random insertion and gene disruption via transposon mutagenesis of Ureaplasma parvum using a mini-transposon plasmid

    PubMed Central

    Aboklaish, Ali F.; Dordet-Frisoni, Emilie; Citti, Christine; Toleman, Mark A; Glass, John I.; Spiller, O. Brad

    2015-01-01

    While transposon mutagenesis has been successfully used for Mycoplasma spp. to disrupt and determine non-essential genes, previous attempts with Ureaplasma spp. have been unsuccessful. Using a polyethylene glycol-transformation enhancing protocol, we were able to transform three separate serovars of Ureaplasma parvum with a Tn4001-based mini-transposon plasmid containing a gentamicin resistance selection marker. Despite the large degree of homology between Ureaplasma parvum and Ureaplasma urealyticum, all attempts to transform the latter in parallel failed, with the exception of a single clinical U. urealyticum isolate. PCR probing and sequencing were used to confirm transposon insertion into the bacterial genome and identify disrupted genes. Transformation of prototype serovar 3 consistently resulted in transfer only of sequence between the mini-transposon inverted repeats, but some strains showed additional sequence transfer. Transposon insertion occurred randomly in the genome resulting in unique disruption of genes UU047, UU390, UU440, UU450, UU520, UU526, UU582 for single clones from a panel of screened clones. An intergenic insertion between genes UU187 and UU188 was also characterised. Two phenotypic alterations were observed in the mutated strains: Disruption of a DEAD-box RNA helicase (UU582) altered growth kinetics, while the U. urealyticum strain lost resistance to serum attack coincident with disruption of gene UUR10_137 and loss of expression of a 41 kDa protein. Transposon mutagenesis was used successfully to insert single copies of a mini-transposon into the genome and disrupt genes leading to phenotypic changes in Ureaplasma parvum strains. This method can now be used to deliver exogenous genes for expression and determine essential genes for Ureaplasma parvum replication in culture and experimental models. PMID:25444567

  16. Random insertion and gene disruption via transposon mutagenesis of Ureaplasma parvum using a mini-transposon plasmid.

    PubMed

    Aboklaish, Ali F; Dordet-Frisoni, Emilie; Citti, Christine; Toleman, Mark A; Glass, John I; Spiller, O Brad

    2014-11-01

    While transposon mutagenesis has been successfully used for Mycoplasma spp. to disrupt and determine non-essential genes, previous attempts with Ureaplasma spp. have been unsuccessful. Using a polyethylene glycol-transformation enhancing protocol, we were able to transform three separate serovars of Ureaplasma parvum with a Tn4001-based mini-transposon plasmid containing a gentamicin resistance selection marker. Despite the large degree of homology between Ureaplasma parvum and Ureaplasma urealyticum, all attempts to transform the latter in parallel failed, with the exception of a single clinical U. urealyticum isolate. PCR probing and sequencing were used to confirm transposon insertion into the bacterial genome and identify disrupted genes. Transformation of prototype serovar 3 consistently resulted in transfer only of sequence between the mini-transposon inverted repeats, but some strains showed additional sequence transfer. Transposon insertion occurred randomly in the genome resulting in unique disruption of genes UU047, UU390, UU440, UU450, UU520, UU526, UU582 for single clones from a panel of screened clones. An intergenic insertion between genes UU187 and UU188 was also characterised. Two phenotypic alterations were observed in the mutated strains: Disruption of a DEAD-box RNA helicase (UU582) altered growth kinetics, while the U. urealyticum strain lost resistance to serum attack coincident with disruption of gene UUR10_137 and loss of expression of a 41 kDa protein. Transposon mutagenesis was used successfully to insert single copies of a mini-transposon into the genome and disrupt genes leading to phenotypic changes in Ureaplasma parvum strains. This method can now be used to deliver exogenous genes for expression and determine essential genes for Ureaplasma parvum replication in culture and experimental models. Copyright © 2014 Elsevier GmbH. All rights reserved.

  17. Sequence variations and protein expression levels of the two immune evasion proteins Gpm1 and Pra1 influence virulence of clinical Candida albicans isolates.

    PubMed

    Luo, Shanshan; Hipler, Uta-Christina; Münzberg, Christin; Skerka, Christine; Zipfel, Peter F

    2015-01-01

    Candida albicans, the important human fungal pathogen uses multiple evasion strategies to control, modulate and inhibit host complement and innate immune attack. Clinical C. albicans strains vary in pathogenicity and in serum resistance, in this work we analyzed sequence polymorphisms and variations in the expression levels of two central fungal complement evasion proteins, Gpm1 (phosphoglycerate mutase 1) and Pra1 (pH-regulated antigen 1) in thirteen clinical C. albicans isolates. Four nucleotide (nt) exchanges, all representing synonymous exchanges, were identified within the 747-nt long GPM1 gene. For the 900-nt long PRA1 gene, sixteen nucleotide exchanges were identified, which represented synonymous, as well as non-synonymous exchanges. All thirteen clinical isolates had a homozygous exchange (A to G) at position 73 of the PRA1 gene. Surface levels of Gpm1 varied by 8.2, and Pra1 levels by 3.3 fold in thirteen tested isolates and these differences influenced fungal immune fitness. The high Gpm1/Pra1 expressing candida strains bound the three human immune regulators more efficiently, than the low expression strains. The difference was 44% for Factor H binding, 51% for C4BP binding and 23% for plasminogen binding. This higher Gpm1/Pra1 expressing strains result in enhanced survival upon challenge with complement active, Factor H depleted human serum (difference 40%). In addition adhesion to and infection of human endothelial cells was increased (difference 60%), and C3b surface deposition was less effective (difference 27%). Thus, variable expression levels of central immune evasion protein influences immune fitness of the human fungal pathogen C. albicans and thus contribute to fungal virulence.

  18. Presence of Noroviruses and Other Enteric Viruses in Sewage and Surface Waters in The Netherlands

    PubMed Central

    Lodder, W. J.; de Roda Husman, A. M.

    2005-01-01

    Since virus concentrations in drinking waters are generally below the detection limit, the infectious risk from drinking water consumption requires assessment from the virus concentrations in source waters and removal efficiency of treatment processes. In this study, we estimated from reverse transcription-PCR on 10-fold serially diluted RNA that noroviruses, the most prevalent waterborne gastroenteritis agents, were present at 4 (0.2 to 38) to 4,900 (303 to 4.6 × 104) PCR-detectable units (PDU) per liter of river water (ranges are given in parentheses). These virus concentrations are still high compared with 896 to 7,499 PDU/liter of treated sewage and 5,111 to 850,000 PDU/liter in raw sewage. Sequencing analyses designated human norovirus GGII.4 Lordsdale as the most prevalent strain in the sampling period 1998 to 1999 in both sewage and surface waters. Other GGII strains were also very abundant, indicating that the majority of the virus contamination was derived from urban sewage, although very divergent strains and one animal strain were also detected in the surface and sewage waters. Rotaviruses were also detected in two large rivers (the Maas and the Waal) at 57 to 5,386 PDU/liter. The high virus concentrations determined by PCR may in part be explained by the detection of virus RNA instead of infectious particles. Indeed, reoviruses and enteroviruses that can be cultured were present at much lower levels, of 0.3 to 1 and 2 to 10 PFU/liter, respectively. Assuming 1% of the noroviruses and rotaviruses to be infectious, a much higher disease burden than for other viruses can be expected, not only because of the higher levels but also because of these viruses' higher infectivity and attack rates. PMID:15746348

  19. The LOV Protein of Xanthomonas citri subsp. citri Plays a Significant Role in the Counteraction of Plant Immune Responses during Citrus Canker

    PubMed Central

    Kraiselburd, Ivana; Daurelio, Lucas D.; Tondo, María Laura; Merelo, Paz; Cortadi, Adriana A.; Talón, Manuel; Tadeo, Francisco R.; Orellano, Elena G.

    2013-01-01

    Pathogens interaction with a host plant starts a set of immune responses that result in complex changes in gene expression and plant physiology. Light is an important modulator of plant defense response and recent studies have evidenced the novel influence of this environmental stimulus in the virulence of several bacterial pathogens. Xanthomonas citri subsp. citri is the bacterium responsible for citrus canker disease, which affects most citrus cultivars. The ability of this bacterium to colonize host plants is influenced by bacterial blue-light sensing through a LOV-domain protein and disease symptoms are considerably altered upon deletion of this protein. In this work we aimed to unravel the role of this photoreceptor during the bacterial counteraction of plant immune responses leading to citrus canker development. We performed a transcriptomic analysis in Citrus sinensis leaves inoculated with the wild type X. citri subsp. citri and with a mutant strain lacking the LOV protein by a cDNA microarray and evaluated the differentially regulated genes corresponding to specific biological processes. A down-regulation of photosynthesis-related genes (together with a corresponding decrease in photosynthesis rates) was observed upon bacterial infection, this effect being more pronounced in plants infected with the lov-mutant bacterial strain. Infection with this strain was also accompanied with the up-regulation of several secondary metabolism- and defense response-related genes. Moreover, we found that relevant plant physiological alterations triggered by pathogen attack such as cell wall fortification and tissue disruption were amplified during the lov-mutant strain infection. These results suggest the participation of the LOV-domain protein from X. citri subsp. citri in the bacterial counteraction of host plant defense response, contributing in this way to disease development. PMID:24260514

  20. Numerical simulation of the optimal two-mode attacks for two-way continuous-variable quantum cryptography in reverse reconciliation

    NASA Astrophysics Data System (ADS)

    Zhang, Yichen; Li, Zhengyu; Zhao, Yijia; Yu, Song; Guo, Hong

    2017-02-01

    We analyze the security of the two-way continuous-variable quantum key distribution protocol in reverse reconciliation against general two-mode attacks, which represent all accessible attacks at fixed channel parameters. Rather than against one specific attack model, the expression of secret key rates of the two-way protocol are derived against all accessible attack models. It is found that there is an optimal two-mode attack to minimize the performance of the protocol in terms of both secret key rates and maximal transmission distances. We identify the optimal two-mode attack, give the specific attack model of the optimal two-mode attack and show the performance of the two-way protocol against the optimal two-mode attack. Even under the optimal two-mode attack, the performances of two-way protocol are still better than the corresponding one-way protocol, which shows the advantage of making double use of the quantum channel and the potential of long-distance secure communication using a two-way protocol.

  1. Comparative Transcriptome Analysis Reveals Cool Virulence Factors of Ralstonia solanacearum Race 3 Biovar 2.

    PubMed

    Meng, Fanhong; Babujee, Lavanya; Jacobs, Jonathan M; Allen, Caitilyn

    2015-01-01

    While most strains of the plant pathogenic bacterium Ralstonia solanacearum are tropical, the race 3 biovar 2 (R3bv2) subgroup attacks plants in cooler climates. To identify mechanisms underlying this trait, we compared the transcriptional profiles of R. solanacearum R3bv2 strain UW551 and tropical strain GMI1000 at 20°C and 28°C, both in culture and during tomato pathogenesis. 4.2% of the ORFs in the UW551 genome and 7.9% of the GMI1000 ORFs were differentially expressed by temperature in planta. The two strains had distinct transcriptional responses to temperature change. GMI1000 up-regulated several stress response genes at 20°C, apparently struggling to cope with plant defenses. At the cooler temperature, R3bv2 strain UW551 up-regulated a cluster encoding a mannose-fucose binding lectin, LecM; a quorum sensing-dependent protein, AidA; and a related hypothetical protein, AidC. The last two genes are absent from the GMI1000 genome. In UW551, all three genes were positively regulated by the adjacent SolI/R quorum sensing system. These temperature-responsive genes were required for full virulence in R3bv2. Mutants lacking lecM, aidA, or aidC were each significantly more reduced in virulence on tomato at 20°C than at 28°C in both a naturalistic soil soak inoculation assay and when they were inoculated directly into tomato stems. The lecM and aidC mutants also survived poorly in potato tubers at the seed tuber storage temperature of 4°C, and the lecM mutant was defective in biofilm formation in vitro. Together, these results suggest novel mechanisms, including a lectin, are involved in the unique temperate epidemiology of R3bv2.

  2. Blind Data Attack on BGP Routers

    DTIC Science & Technology

    2017-03-01

    implement blind attack protection, leaving long -standing connections, such as Border Gateway Protocol (BGP) sessions, vulnerable to exploitation. This...protection measures should a discovered vulnerability reduce attack complexity. 14. SUBJECT TERMS BGP, TCP, blind attack, blind data attack 15. NUMBER OF...implementations may not properly implement blind attack protection, leaving long -standing connections, such as BorderGateway Protocol (BGP) sessions

  3. Research on high power intra-channel crosstalk attack in optical networks

    NASA Astrophysics Data System (ADS)

    Ren, Shuai; Zhang, Yinfa; Wang, Jingyu; Zhang, Jumei; Rao, Xuejun; Fang, Yuanyuan

    2017-02-01

    The mechanism of high power intra-channel crosstalk attack is analyzed theoretically and the conclusion that power of attack signal and crosstalk coefficient of optical switch are the main factors for which high power intra-channel have destructive effect on quality of legitimate signals is drawn. Effects of high power intra-channel crosstalk attack on quality of legitimate signals and its capability of attack propagation are investigated quantitatively by building the simulation system in VPI software. The results show that legitimate signals through the first and the second stage optical switch are affected by attack and legitimate signal through the third stage optical switch is almost unaffected by attack when power of original attack signal (OAS) is above 20dB more than that of legitimate signals and crosstalk coefficient of optical switch is -20dB at optical cross connect 1 (OXC1). High power intra-channel crosstalk attack has a certain capability of attack propagation. Attack capability of OAS can be propagated to OXC3 when power of OAS is 27dB more than that of legitimate signals and crosstalk coefficient of optical switch is -20dB. We also find that the secondary attack signal (SAS) does not have capability of attack propagation.

  4. Warning Signs of Heart Attack, Stroke and Cardiac Arrest

    MedlinePlus

    ... a Heart Attack WARNING SIGNS OF HEART ATTACK, STROKE & CARDIAC ARREST HEART ATTACK WARNING SIGNS CHEST DISCOMFORT ... nausea or lightheadedness. Learn more about heart attack STROKE WARNING SIGNS Spot a stroke F.A.S.T.: - ...

  5. The role of mental disorder in attacks on European politicians 1990-2004.

    PubMed

    James, D V; Mullen, P E; Meloy, J R; Pathé, M T; Farnham, F R; Preston, L; Darnley, B

    2007-11-01

    The only systematic studies of attacks on public figures come from the USA. These studies de-emphasize the role of mental illness and suggest threats are of no predictive value. This study re-examines these questions through a study of attacks on European politicians. All non-terrorist attacks on elected politicians in Western Europe between 1990 and 2004 were analysed. Twenty-four attacks were identified, including five involving fatalities, and eight serious injuries. Ten attackers were psychotic, four drunk, nine politically motivated and one unclassifiable. Eleven attackers evidenced warning behaviours. The mentally disordered, most of whom gave warnings, were responsible for most of the fatal and seriously injurious attacks. A greater awareness of the link between delusional fixations on public figures and subsequent attacks could aid prevention. Equally importantly, recognition would encourage earlier intervention in people who, irrespective of whether they eventually attack, have delusional preoccupations which ruin their lives.

  6. An Exploration of Hypotheses that Explain Herbivore and Pathogen Attack in Restored Plant Communities

    PubMed Central

    Blaisdell, G. Kai; Roy, Bitty A.; Pfeifer-Meister, Laurel; Bridgham, Scott D.

    2015-01-01

    Many hypotheses address the associations of plant community composition with natural enemies, including: (i) plant species diversity may reduce enemy attack, (ii) attack may increase as host abundance increases, (iii) enemy spillover may lead to increased attack on one host species due to transmission from another host species, or enemy dilution may lead to reduced attack on a host that would otherwise have more attack, (iv) physical characteristics of the plant community may influence attack, and (v) plant vigor may affect attack. Restoration experiments with replicated plant communities provide an exceptional opportunity to explore these hypotheses. To explore the relative predictive strengths of these related hypotheses and to investigate the potential effect of several restoration site preparation techniques, we surveyed arthropod herbivore and fungal pathogen attack on the six most common native plant species in a restoration experiment. Multi-model inference revealed a weak but consistent negative correlation with pathogen attack and host diversity across the plant community, and no correlation between herbivory and host diversity. Our analyses also revealed host species-specific relationships between attack and abundance of the target host species, other native plant species, introduced plant species, and physical community characteristics. We found no relationship between enemy attack and plant vigor. We found minimal differences in plant community composition among several diverse site preparation techniques, and limited effects of site preparation techniques on attack. The strongest associations of community characteristics with attack varied among plant species with no community-wide patterns, suggesting that no single hypothesis successfully predicts the dominant community-wide trends in enemy attack. PMID:25699672

  7. Cyber attack analysis on cyber-physical systems: Detectability, severity, and attenuation strategy

    NASA Astrophysics Data System (ADS)

    Kwon, Cheolhyeon

    Security of Cyber-Physical Systems (CPS) against malicious cyber attacks is an important yet challenging problem. Since most cyber attacks happen in erratic ways, it is usually intractable to describe and diagnose them systematically. Motivated by such difficulties, this thesis presents a set of theories and algorithms for a cyber-secure architecture of the CPS within the control theoretic perspective. Here, instead of identifying a specific cyber attack model, we are focused on analyzing the system's response during cyber attacks. Firstly, we investigate the detectability of the cyber attacks from the system's behavior under cyber attacks. Specifically, we conduct a study on the vulnerabilities in the CPS's monitoring system against the stealthy cyber attack that is carefully designed to avoid being detected by its detection scheme. After classifying three kinds of cyber attacks according to the attacker's ability to compromise the system, we derive the necessary and sufficient conditions under which such stealthy cyber attacks can be designed to cause the unbounded estimation error while not being detected. Then, the analytical design method of the optimal stealthy cyber attack that maximizes the estimation error is developed. The proposed stealthy cyber attack analysis is demonstrated with illustrative examples on Air Traffic Control (ATC) system and Unmanned Aerial Vehicle (UAV) navigation system applications. Secondly, in an attempt to study the CPSs' vulnerabilities in more detail, we further discuss a methodology to identify potential cyber threats inherent in the given CPSs and quantify the attack severity accordingly. We then develop an analytical algorithm to test the behavior of the CPS under various cyber attack combinations. Compared to a numerical approach, the analytical algorithm enables the prediction of the most effective cyber attack combinations without computing the severity of all possible attack combinations, thereby greatly reducing the computational cost. The proposed algorithm is validated through a linearized longitudinal motion of a UAV example. Finally, we propose an attack attenuation strategy via the controller design for CPSs that are robust to various types of cyber attacks. While the previous studies have investigated a secure control by assuming a specific attack strategy, in this research we propose a hybrid robust control scheme that contains multiple sub-controllers, each matched to a specific type of cyber attacks. Then the system can be adapted to various cyber attacks (including those that are not assumed for sub-controller design) by switching its sub-controllers to achieve the best performance. Then, a method for designing a secure switching logic to counter all possible cyber attacks is proposed and it verifies mathematically the system's performance and stability as well. The performance of the proposed control scheme is demonstrated by an example with the hybrid H2 - H-infinity controller applied to a UAV example.

  8. Method for Integrated Simulation (MINTSIM)

    DTIC Science & Technology

    1976-01-01

    sorties allocated to attack SAMs. FAPA = fraction of striking aircraft attacking air bases which attack parked aircraft in the open. TAAB...each striking aircraft. FAS = fraction of striking aircraft attacking air bases which attack sheltered aircraft. (NOTE: FAPA + FAS = 1.0

  9. Finite Energy and Bounded Actuator Attacks on Cyber-Physical Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Djouadi, Seddik M; Melin, Alexander M; Ferragut, Erik M

    As control system networks are being connected to enterprise level networks for remote monitoring, operation, and system-wide performance optimization, these same connections are providing vulnerabilities that can be exploited by malicious actors for attack, financial gain, and theft of intellectual property. Much effort in cyber-physical system (CPS) protection has focused on protecting the borders of the system through traditional information security techniques. Less effort has been applied to the protection of cyber-physical systems from intelligent attacks launched after an attacker has defeated the information security protections to gain access to the control system. In this paper, attacks on actuator signalsmore » are analyzed from a system theoretic context. The threat surface is classified into finite energy and bounded attacks. These two broad classes encompass a large range of potential attacks. The effect of theses attacks on a linear quadratic (LQ) control are analyzed, and the optimal actuator attacks for both finite and infinite horizon LQ control are derived, therefore the worst case attack signals are obtained. The closed-loop system under the optimal attack signals is given and a numerical example illustrating the effect of an optimal bounded attack is provided.« less

  10. Web Forms and Untraceable DDoS Attacks

    NASA Astrophysics Data System (ADS)

    Jakobsson, Markus; Menczer, Filippo

    We analyze a Web vulnerability that allows an attacker to perform an email-based attack on selected victims, using standard scripts and agents. What differentiates the attack we describe from other, already known forms of distributed denial of service (DDoS) attacks is that an attacker does not need to infiltrate the network in any manner - as is normally required to launch a DDoS attack. Thus, we see this type of attack as a poor man's DDoS. Not only is the attack easy to mount, but it is also almost impossible to trace back to the perpetrator. Along with descriptions of our attack, we demonstrate its destructive potential with (limited and contained) experimental results. We illustrate the potential impact of our attack by describing how an attacker can disable an email account by flooding its inbox; block competition during on-line auctions; harm competitors with an on-line presence; disrupt phone service to a given victim; disconnect mobile corporate leaders from their networks; and disrupt electronic elections. Finally, we propose a set of countermeasures that are light-weight, do not require modifications to the infrastructure, and can be deployed in a gradual manner.

  11. Replacement Attack: A New Zero Text Watermarking Attack

    NASA Astrophysics Data System (ADS)

    Bashardoost, Morteza; Mohd Rahim, Mohd Shafry; Saba, Tanzila; Rehman, Amjad

    2017-03-01

    The main objective of zero watermarking methods that are suggested for the authentication of textual properties is to increase the fragility of produced watermarks against tampering attacks. On the other hand, zero watermarking attacks intend to alter the contents of document without changing the watermark. In this paper, the Replacement attack is proposed, which focuses on maintaining the location of the words in the document. The proposed text watermarking attack is specifically effective on watermarking approaches that exploit words' transition in the document. The evaluation outcomes prove that tested word-based method are unable to detect the existence of replacement attack in the document. Moreover, the comparison results show that the size of Replacement attack is estimated less accurate than other common types of zero text watermarking attacks.

  12. Design and Analysis of an Enhanced Patient-Server Mutual Authentication Protocol for Telecare Medical Information System.

    PubMed

    Amin, Ruhul; Islam, S K Hafizul; Biswas, G P; Khan, Muhammad Khurram; Obaidat, Mohammad S

    2015-11-01

    In order to access remote medical server, generally the patients utilize smart card to login to the server. It has been observed that most of the user (patient) authentication protocols suffer from smart card stolen attack that means the attacker can mount several common attacks after extracting smart card information. Recently, Lu et al.'s proposes a session key agreement protocol between the patient and remote medical server and claims that the same protocol is secure against relevant security attacks. However, this paper presents several security attacks on Lu et al.'s protocol such as identity trace attack, new smart card issue attack, patient impersonation attack and medical server impersonation attack. In order to fix the mentioned security pitfalls including smart card stolen attack, this paper proposes an efficient remote mutual authentication protocol using smart card. We have then simulated the proposed protocol using widely-accepted AVISPA simulation tool whose results make certain that the same protocol is secure against active and passive attacks including replay and man-in-the-middle attacks. Moreover, the rigorous security analysis proves that the proposed protocol provides strong security protection on the relevant security attacks including smart card stolen attack. We compare the proposed scheme with several related schemes in terms of computation cost and communication cost as well as security functionalities. It has been observed that the proposed scheme is comparatively better than related existing schemes.

  13. Simulation of Attacks for Security in Wireless Sensor Network.

    PubMed

    Diaz, Alvaro; Sanchez, Pablo

    2016-11-18

    The increasing complexity and low-power constraints of current Wireless Sensor Networks (WSN) require efficient methodologies for network simulation and embedded software performance analysis of nodes. In addition, security is also a very important feature that has to be addressed in most WSNs, since they may work with sensitive data and operate in hostile unattended environments. In this paper, a methodology for security analysis of Wireless Sensor Networks is presented. The methodology allows designing attack-aware embedded software/firmware or attack countermeasures to provide security in WSNs. The proposed methodology includes attacker modeling and attack simulation with performance analysis (node's software execution time and power consumption estimation). After an analysis of different WSN attack types, an attacker model is proposed. This model defines three different types of attackers that can emulate most WSN attacks. In addition, this paper presents a virtual platform that is able to model the node hardware, embedded software and basic wireless channel features. This virtual simulation analyzes the embedded software behavior and node power consumption while it takes into account the network deployment and topology. Additionally, this simulator integrates the previously mentioned attacker model. Thus, the impact of attacks on power consumption and software behavior/execution-time can be analyzed. This provides developers with essential information about the effects that one or multiple attacks could have on the network, helping them to develop more secure WSN systems. This WSN attack simulator is an essential element of the attack-aware embedded software development methodology that is also introduced in this work.

  14. In vitro bioassay for reactive toxicity towards proteins implemented for water quality monitoring.

    PubMed

    Tang, Janet Y M; Glenn, Eva; Thoen, Hanne; Escher, Beate I

    2012-03-01

    Reactive organic chemicals comprise a large number of compounds with a variety of reactive moieties. While most assays for reactive toxicity focus on DNA damage, reactivity towards proteins can also lead to irreparable damage, but reactivity towards proteins is typically not included in any test battery for water quality assessment. Glutathione (GSH) is a small tripeptide whose cysteine moiety can serve as a model for nucleophilic sites on proteins. GSH is also an important indicator of detoxification processes and the redox status of cells and due to its protective role, depletion of GSH ultimately leads to adverse effects. A bioassay based on genetically modified Escherichia coli strains was used to quantify the specific reactivity towards the protein-like biological nucelophile GSH. The significance of GSH for detoxification was assessed by comparing the growth inhibition induced by reference chemicals or water samples in a GSH-deficient strain to its fully functional parent strain. The GSH deficient strain showed the same sensitivity as the GSH proficient strain to non-reactive and DNA damaging chemicals, but was more sensitive to chemicals that attack cysteine in proteins. The difference in effect concentrations for 50% inhibition of growth assessed as biomass increase (EC(50)) between the two strains indicates the relevance of GSH conjugation as a detoxification step as well as direct reactivity with cysteine-containing proteins. Seven reference compounds serving as positive and negative controls were investigated. The E. coli strain that lacks GSH was four times more sensitive towards the positive control Sea-Nine, while negative controls benzo[a]pyrene, 2-aminoanthracene, phenol, t-butylhydroquinone, methyl methane sulfonate and 4-nitroquinoline oxide showed equal effect concentrations in both strains. Water samples collected across an indirect potable reuse scheme representing the complete water cycle from sewage to drinking water in South East Queensland, Australia were used to evaluate the applicability of the E. coli assay for reactive toxicity in water samples. While the EC(50) values of the GSH+ strain showed similar trends as in other biological endpoints over the various treatment chains, the specific response indicative of protein damage was only observed in samples that had undergone chlorination as a disinfection process. High natural organic matter or other matrix components disturbed the bioassay so much that we recommend it for future routine testing only in tertiary treated water or drinking water. This journal is © The Royal Society of Chemistry 2012

  15. Heartburn or Chest Pain: When Is It Heart Attack?

    MedlinePlus

    Heartburn or heart attack: When to worry Severe heartburn and heart attack can be hard to tell apart. Understand how they typically ... flow to your heart (angina) or an actual heart attack. Heartburn, angina and heart attack may feel very ...

  16. Know the Warning Signs of a Heart Attack

    MedlinePlus

    ... No. 22 Know the Warning Signs of a Heart Attack What is a heart attack? Aheart attack happens when the blood vessels that ... hurting your heart muscle. Another name for a heart attack is myocardial infarction, or MI. If you have ...

  17. Percolation of localized attack on isolated and interdependent random networks

    NASA Astrophysics Data System (ADS)

    Shao, Shuai; Huang, Xuqing; Stanley, H. Eugene; Havlin, Shlomo

    2014-03-01

    Percolation properties of isolated and interdependent random networks have been investigated extensively. The focus of these studies has been on random attacks where each node in network is attacked with the same probability or targeted attack where each node is attacked with a probability being a function of its centrality, such as degree. Here we discuss a new type of realistic attacks which we call a localized attack where a group of neighboring nodes in the networks are attacked. We attack a randomly chosen node, its neighbors, and its neighbor of neighbors and so on, until removing a fraction (1 - p) of the network. This type of attack reflects damages due to localized disasters, such as earthquakes, floods and war zones in real-world networks. We study, both analytically and by simulations the impact of localized attack on percolation properties of random networks with arbitrary degree distributions and discuss in detail random regular (RR) networks, Erdős-Rényi (ER) networks and scale-free (SF) networks. We extend and generalize our theoretical and simulation results of single isolated networks to networks formed of interdependent networks.

  18. Stealthy false data injection attacks using matrix recovery and independent component analysis in smart grid

    NASA Astrophysics Data System (ADS)

    JiWei, Tian; BuHong, Wang; FuTe, Shang; Shuaiqi, Liu

    2017-05-01

    Exact state estimation is vital important to maintain common operations of smart grids. Existing researches demonstrate that state estimation output could be compromised by malicious attacks. However, to construct the attack vectors, a usual presumption in most works is that the attacker has perfect information regarding the topology and so on even such information is difficult to acquire in practice. Recent research shows that Independent Component Analysis (ICA) can be used for inferring topology information which can be used to originate undetectable attacks and even to alter the price of electricity for the profits of attackers. However, we found that the above ICA-based blind attack tactics is merely feasible in the environment with Gaussian noises. If there are outliers (device malfunction and communication errors), the Bad Data Detector will easily detect the attack. Hence, we propose a robust ICA based blind attack strategy that one can use matrix recovery to circumvent the outlier problem and construct stealthy attack vectors. The proposed attack strategies are tested with IEEE representative 14-bus system. Simulations verify the feasibility of the proposed method.

  19. Shilling Attacks Detection in Recommender Systems Based on Target Item Analysis

    PubMed Central

    Zhou, Wei; Wen, Junhao; Koh, Yun Sing; Xiong, Qingyu; Gao, Min; Dobbie, Gillian; Alam, Shafiq

    2015-01-01

    Recommender systems are highly vulnerable to shilling attacks, both by individuals and groups. Attackers who introduce biased ratings in order to affect recommendations, have been shown to negatively affect collaborative filtering (CF) algorithms. Previous research focuses only on the differences between genuine profiles and attack profiles, ignoring the group characteristics in attack profiles. In this paper, we study the use of statistical metrics to detect rating patterns of attackers and group characteristics in attack profiles. Another question is that most existing detecting methods are model specific. Two metrics, Rating Deviation from Mean Agreement (RDMA) and Degree of Similarity with Top Neighbors (DegSim), are used for analyzing rating patterns between malicious profiles and genuine profiles in attack models. Building upon this, we also propose and evaluate a detection structure called RD-TIA for detecting shilling attacks in recommender systems using a statistical approach. In order to detect more complicated attack models, we propose a novel metric called DegSim’ based on DegSim. The experimental results show that our detection model based on target item analysis is an effective approach for detecting shilling attacks. PMID:26222882

  20. TANDI: threat assessment of network data and information

    NASA Astrophysics Data System (ADS)

    Holsopple, Jared; Yang, Shanchieh Jay; Sudit, Moises

    2006-04-01

    Current practice for combating cyber attacks typically use Intrusion Detection Sensors (IDSs) to passively detect and block multi-stage attacks. This work leverages Level-2 fusion that correlates IDS alerts belonging to the same attacker, and proposes a threat assessment algorithm to predict potential future attacker actions. The algorithm, TANDI, reduces the problem complexity by separating the models of the attacker's capability and opportunity, and fuse the two to determine the attacker's intent. Unlike traditional Bayesian-based approaches, which require assigning a large number of edge probabilities, the proposed Level-3 fusion procedure uses only 4 parameters. TANDI has been implemented and tested with randomly created attack sequences. The results demonstrate that TANDI predicts future attack actions accurately as long as the attack is not part of a coordinated attack and contains no insider threats. In the presence of abnormal attack events, TANDI will alarm the network analyst for further analysis. The attempt to evaluate a threat assessment algorithm via simulation is the first in the literature, and shall open up a new avenue in the area of high level fusion.

  1. Investigation of a free-tip rotor configuration for research on spanwise life distributions and wake velocity surveys of a semi-span wing with a discontinuous twist

    NASA Technical Reports Server (NTRS)

    Fortin, Paul; Kumagai, Hiroyuki

    1989-01-01

    A wind tunnel test was conducted in the NASA Ames 7 x 10 Foot Wind Tunnel to investigate the lift distribution on a semi-span wing with a discontinuous change in spanwise twist. The semi-span wing had a tip with an adjustable pitch angle independent on the inboard section pitch angle simulating the free-tip rotor blade when its free-tip is at a deflected position. The spanwise lift distribution over the wing and the tip were measured and three component velocity surveys behind the wing were obtained with a three dimensional laser Doppler velocimeter (LV) with the wing at one angle of attack and the tip deflected at different pitch angles. A six component internal strain gage balance was also used to measure total forces and moments on the tip. The three dimensional lift was computed from the two dimensional life distributions obtained from the LV and from the strain gage balance. The results from both experimental methods are shown to be in agreement with predictions made by a steady, three dimensional panel code, VSAERO.

  2. Study of the Corrosion Resistance of Austenitic Stainless Steels during Conversion of Waste to Biofuel

    PubMed Central

    Cabrini, Marina; Lorenzi, Sergio; Pastore, Tommaso; Pellegrini, Simone; Burattini, Mauro; Miglio, Roberta

    2017-01-01

    The paper deals with the corrosion behavior of stainless steels as candidate materials for biofuel production plants by liquefaction process of the sorted organic fraction of municipal solid waste. Corrosion tests were carried out on AISI 316L and AISI 304L stainless steels at 250 °C in a batch reactor during conversion of raw material to bio-oil (biofuel precursor), by exposing specimens either to water/oil phase or humid gas phase. General corrosion rate was measured by weight loss tests. The susceptibility to stress corrosion cracking was evaluated by means of U-bend specimens and slow stress rate tests at 10−6 or 10−5 s−1 strain rate. After tests, scanning electron microscope analysis was carried out to detect cracks and localized attacks. The results are discussed in relation with exposure conditions. They show very low corrosion rates strictly dependent upon time and temperature. No stress corrosion cracking was observed on U-bend specimens, under constant loading. Small cracks confined in the necking cone of specimens prove that stress corrosion cracking only occurred during slow strain rate tests at stresses exceeding the yield strength. PMID:28772682

  3. ReacKnock: Identifying Reaction Deletion Strategies for Microbial Strain Optimization Based on Genome-Scale Metabolic Network

    PubMed Central

    Xu, Zixiang; Zheng, Ping; Sun, Jibin; Ma, Yanhe

    2013-01-01

    Gene knockout has been used as a common strategy to improve microbial strains for producing chemicals. Several algorithms are available to predict the target reactions to be deleted. Most of them apply mixed integer bi-level linear programming (MIBLP) based on metabolic networks, and use duality theory to transform bi-level optimization problem of large-scale MIBLP to single-level programming. However, the validity of the transformation was not proved. Solution of MIBLP depends on the structure of inner problem. If the inner problem is continuous, Karush-Kuhn-Tucker (KKT) method can be used to reformulate the MIBLP to a single-level one. We adopt KKT technique in our algorithm ReacKnock to attack the intractable problem of the solution of MIBLP, demonstrated with the genome-scale metabolic network model of E. coli for producing various chemicals such as succinate, ethanol, threonine and etc. Compared to the previous methods, our algorithm is fast, stable and reliable to find the optimal solutions for all the chemical products tested, and able to provide all the alternative deletion strategies which lead to the same industrial objective. PMID:24348984

  4. 'Watching an artist at work': aesthetic leadership in clinical nursing workplaces.

    PubMed

    Mannix, Judy; Wilkes, Lesley; Daly, John

    2015-12-01

    To explore how clinical leaders enact aesthetic leadership in clinical nursing workplaces. Clinical leadership is heralded as vital for safe and effective nursing. Different leadership styles have been applied to the clinical nursing workplace over recent years. Many of these styles lack an explicit moral dimension, instead focusing on leader qualities and developing leader competence around team building, quality and safety. Aesthetic leadership, with its explicit moral dimension, could enhance clinical leadership effectiveness and improve nursing workplaces. How aesthetic leadership is enacted in clinical nursing settings requires exploration. A qualitative design, employing conversation-style interviews with experienced registered nurses and written responses gathered from an online descriptive survey. Narrative data were gathered from interviews with 12 registered nurses and written accounts from 31 nurses who responded to an online survey. Together, transcribed interview data and the written accounts were subject to thematic analysis. Three main themes emerged: Leading by example: 'be seen in the clinical area'; Leading with composure: 'a sense of calm in a hideous shift'; and Leading through nursing values: 'create an environment just by your being'. Aesthetic leadership was shown to enhance clinical leadership activities in the nursing workplace. The capacity for clinical leaders to be self-reflective can positively influence the nursing workplace. It was apparent that clinical leader effectiveness can be enhanced with nursing values underpinning leadership activities and by being a visible, composed role model in the clinical workplace. Aesthetic leadership can enhance clinical nursing workplaces with its explicit moral purpose and strong link to nursing values. Clinical leaders who incorporate these attributes with being a visible, composed role model have the capacity to improve the working lives of nurses across a range of clinical settings. © 2015 John Wiley & Sons Ltd.

  5. Identifying and tracking attacks on networks: C3I displays and related technologies

    NASA Astrophysics Data System (ADS)

    Manes, Gavin W.; Dawkins, J.; Shenoi, Sujeet; Hale, John C.

    2003-09-01

    Converged network security is extremely challenging for several reasons; expanded system and technology perimeters, unexpected feature interaction, and complex interfaces all conspire to provide hackers with greater opportunities for compromising large networks. Preventive security services and architectures are essential, but in and of themselves do not eliminate all threat of compromise. Attack management systems mitigate this residual risk by facilitating incident detection, analysis and response. There are a wealth of attack detection and response tools for IP networks, but a dearth of such tools for wireless and public telephone networks. Moreover, methodologies and formalisms have yet to be identified that can yield a common model for vulnerabilities and attacks in converged networks. A comprehensive attack management system must coordinate detection tools for converged networks, derive fully-integrated attack and network models, perform vulnerability and multi-stage attack analysis, support large-scale attack visualization, and orchestrate strategic responses to cyber attacks that cross network boundaries. We present an architecture that embodies these principles for attack management. The attack management system described engages a suite of detection tools for various networking domains, feeding real-time attack data to a comprehensive modeling, analysis and visualization subsystem. The resulting early warning system not only provides network administrators with a heads-up cockpit display of their entire network, it also supports guided response and predictive capabilities for multi-stage attacks in converged networks.

  6. Liquid Metal Embrittlement in Resistance Spot Welding and Hot Tensile Tests of Surface-refined TWIP Steels

    NASA Astrophysics Data System (ADS)

    Barthelmie, J.; Schram, A.; Wesling, V.

    2016-03-01

    Automotive industry strives to reduce vehicle weight and therefore fuel consumption and carbon dioxide emissions. Especially in the auto body, material light weight construction is practiced, but the occupant safety must be ensured. These requirements demand high-strength steels with good forming and crash characteristics. Such an approach is the use of high- manganese-content TWIP steels, which achieve strengths of around 1,000 MPa and fracture strains of more than 60%. Welding surface-refined TWIP steels reduces their elongation at break and produces cracks due to the contact with liquid metal and the subsequent liquid metal embrittlement (LME). The results of resistance spot welds of mixed joints of high-manganese- content steel in combination with micro-alloyed ferritic steel and hot tensile tests are presented. The influence of different welding parameters on the sensitivity to liquid metal embrittlement is investigated by means of spot welding. In a high temperature tensile testing machine, the influence of different parameters is determined regardless of the welding process. Defined strains just below or above the yield point, and at 25% of elongation at break, show the correlation between the applied strain and liquid metal crack initiation. Due to the possibility to carry out tensile tests on a wide range of temperatures, dependencies of different temperatures of the zinc coating to the steel can be identified. Furthermore, the attack time of the zinc on the base material is investigated by defined heating periods.

  7. The Surface-Exposed Protein SntA Contributes to Complement Evasion in Zoonotic Streptococcus suis.

    PubMed

    Deng, Simin; Xu, Tong; Fang, Qiong; Yu, Lei; Zhu, Jiaqi; Chen, Long; Liu, Jiahui; Zhou, Rui

    2018-01-01

    Streptococcus suis is an emerging zoonotic pathogen causing streptococcal toxic shock like syndrome (STSLS), meningitis, septicemia, and even sudden death in human and pigs. Serious septicemia indicates this bacterium can evade the host complement surveillance. In our previous study, a functionally unknown protein SntA of S. suis has been identified as a heme-binding protein, and contributes to virulence in pigs. SntA can interact with the host antioxidant protein AOP2 and consequently inhibit its antioxidant activity. In the present study, SntA is identified as a cell wall anchored protein that functions as an important player in S. suis complement evasion. The C3 deposition and membrane attack complex (MAC) formation on the surface of sntA -deleted mutant strain Δ sntA are demonstrated to be significantly higher than the parental strain SC-19 and the complementary strain CΔ sntA . The abilities of anti-phagocytosis, survival in blood, and in vivo colonization of Δ sntA are obviously reduced. SntA can interact with C1q and inhibit hemolytic activity via the classical pathway. Complement activation assays reveal that SntA can also directly activate classical and lectin pathways, resulting in complement consumption. These two complement evasion strategies may be crucial for the pathogenesis of this zoonotic pathogen. Concerning that SntA is a bifunctional 2',3'-cyclic nucleotide 2'-phosphodiesterase/3'-nucleotidase in many species of Gram-positive bacteria, these complement evasion strategies may have common biological significance.

  8. Evaluation of an intragastric challenge model for Shigella dysenteriae 1 in rhesus monkeys (Macaca mulatta) for the pre-clinical assessment of Shigella vaccine formulations.

    PubMed

    Islam, Dilara; Ruamsap, Nattaya; Khantapura, Patchariya; Aksomboon, Ajchara; Srijan, Apichai; Wongstitwilairoong, Boonchai; Bodhidatta, Ladaporn; Gettayacamin, Montip; Venkatesan, Malabi M; Mason, Carl J

    2014-06-01

    Shigellosis is a worldwide disease, characterized by abdominal pain, fever, vomiting, and the passage of blood- and mucus-streaked stools. Rhesus monkeys and other primates are the only animals that are naturally susceptible to shigellosis. A suitable animal model is required for the pre-clinical evaluation of vaccines candidates. In this study, the minimal dose of Shigella dysenteriae1 1617 strain required to produce dysentery in four of five (80% attack rate) monkeys using an escalating dose range for three groups [2 × 10(8) , 2 × 10(9) and 2 × 10(10) colony forming unit (CFU)] was determined. In addition, the monkeys were re-infected. The identified optimal challenge dose was 2 × 10(9) CFU; this dose elicited 60% protection in monkeys when they were re-challenged with a one log higher dose (2 × 10(10) CFU). The challenge dose, 2 × 10(10) CFU, produced severe dysentery in all monkeys, with one monkey dying within 24 h, elicited 100% protection when re-challenged with the same dose. All monkeys exhibited immune responses. This study concludes that the rhesus monkey model closely mimics the disease and immune response seen in humans and is a suitable animal model for the pre-clinical evaluation of Shigella vaccine candidates. Prior infection with the 1617 strain can protect monkeys against subsequent re-challenges with homologous strains. © 2013 The Authors. APMIS published by John Wiley & Sons Ltd.

  9. Pre-attack signs and symptoms in cluster headache: Characteristics and time profile.

    PubMed

    Snoer, Agneta; Lund, Nunu; Beske, Rasmus; Jensen, Rigmor; Barloese, Mads

    2018-05-01

    Introduction In contrast to the premonitory phase of migraine, little is known about the pre-attack (prodromal) phase of a cluster headache. We aimed to describe the nature, prevalence, and duration of pre-attack symptoms in cluster headache. Methods Eighty patients with episodic cluster headache or chronic cluster headache, according to ICHD-3 beta criteria, were invited to participate. In this observational study, patients underwent a semi-structured interview where they were asked about the presence of 31 symptoms/signs in relation to a typical cluster headache attack. Symptoms included previously reported cluster headache pre-attack symptoms, premonitory migraine symptoms and accompanying symptoms of migraine and cluster headache. Results Pre-attack symptoms were reported by 83.3% of patients, with an average of 4.25 (SD 3.9) per patient. Local and painful symptoms, occurring with a median of 10 minutes before attack, were reported by 70%. Local and painless symptoms and signs, occurring with a median of 10 minutes before attack, were reported by 43.8% and general symptoms, occurring with a median of 20 minutes before attack, were reported by 62.5% of patients. Apart from a dull/aching sensation in the attack area being significantly ( p < 0.05) more frequent among men and episodic patients, compared with women and chronic patients respectively, no other differences in the prevalence of pre-attack symptoms were identified between groups. Conclusion Pre-attack symptoms are frequent in cluster headache. Since the origin of cluster headache attacks is still unresolved, studies of pre-attack symptoms could contribute to the understanding of cluster headache pathophysiology. Furthermore, identification and recognition of pre-attack symptoms could potentially allow earlier abortive treatment.

  10. Shark attack-related injuries: Epidemiology and implications for plastic surgeons.

    PubMed

    Ricci, Joseph A; Vargas, Christina R; Singhal, Dhruv; Lee, Bernard T

    2016-01-01

    The increased media attention to shark attacks has led to a heightened fear and public awareness. Although few sharks are considered dangerous, attacks on humans can result in large soft tissue defects necessitating the intervention of reconstructive surgeons. This study aims to evaluate and describe the characteristics of shark-related injuries in order to improve treatment. The Global Shark Accident File, maintained by the Shark Research Institute (Princeton, NJ, USA), is a compilation of all known worldwide shark attacks. Database records since the 1900s were reviewed to identify differences between fatal and nonfatal attacks, including: geography, injury pattern, shark species, and victim activity. Since the 1900s, there have been 5034 reported shark attacks, of which 1205 (22.7%) were fatal. Although the incidence of attacks per decade has increased, the percentage of fatalities has decreased. Characteristics of fatal attacks included swimming (p = 0.001), boating (p = 0.001), three or more bite sites (p = 0.03), limb loss (p = 0.001), or tiger shark attack (p = 0.002). The most common attacks were bites to the legs (41.8%) or arms (18.4%), with limb loss occurring in 7% of attacks. Geographically, the majority of attacks occurred in North America (36.7%) and Australia (26.5%). Most attacks in the USA occurred in Florida (49.1%) and California (13.6%). Although rare, shark attacks result in devastating injuries to patients. As these injuries often involve multiple sites and limb loss, this creates a significant challenge for reconstructive surgeons. Proper identification of the characteristics of the attack can aid in providing optimal care for those affected. Copyright © 2015 British Association of Plastic, Reconstructive and Aesthetic Surgeons. Published by Elsevier Ltd. All rights reserved.

  11. Hereditary Angioedema Attacks Resolve Faster and Are Shorter after Early Icatibant Treatment

    PubMed Central

    Maurer, Marcus; Kaplan, Allen; Investigators, on behalf of I. O. S.

    2013-01-01

    Background Attacks of hereditary angioedema (HAE) are unpredictable and, if affecting the upper airway, can be lethal. Icatibant is used for physician- or patient self-administered symptomatic treatment of HAE attacks in adults. Its mode of action includes disruption of the bradykinin pathway via blockade of the bradykinin B2 receptor. Early treatment is believed to shorten attack duration and prevent severe outcomes; however, evidence to support these benefits is lacking. Objective To examine the impact of timing of icatibant administration on the duration and resolution of HAE type I and II attacks. Methods The Icatibant Outcome Survey is an international, prospective, observational study for patients treated with icatibant. Data on timings and outcomes of icatibant treatment for HAE attacks were collected between July 2009–February 2012. A mixed-model of repeated measures was performed for 426 attacks in 136 HAE type I and II patients. Results Attack duration was significantly shorter in patients treated <1 hour of attack onset compared with those treated ≥1 hour (6.1 hours versus 16.8 hours [p<0.001]). Similar significant effects were observed for <2 hours versus ≥2 hours (7.2 hours versus 20.2 hours [p<0.001]) and <5 hours versus ≥5 hours (8.0 hours versus 23.5 hours [p<0.001]). Treatment within 1 hour of attack onset also significantly reduced time to attack resolution (5.8 hours versus 8.8 hours [p<0.05]). Self-administrators were more likely to treat early and experience shorter attacks than those treated by a healthcare professional. Conclusion Early blockade of the bradykinin B2 receptor with icatibant, particularly within the first hour of attack onset, significantly reduced attack duration and time to attack resolution. PMID:23390491

  12. Adaptive optimisation-offline cyber attack on remote state estimator

    NASA Astrophysics Data System (ADS)

    Huang, Xin; Dong, Jiuxiang

    2017-10-01

    Security issues of cyber-physical systems have received increasing attentions in recent years. In this paper, deception attacks on the remote state estimator equipped with the chi-squared failure detector are considered, and it is assumed that the attacker can monitor and modify all the sensor data. A novel adaptive optimisation-offline cyber attack strategy is proposed, where using the current and previous sensor data, the attack can yield the largest estimation error covariance while ensuring to be undetected by the chi-squared monitor. From the attacker's perspective, the attack is better than the existing linear deception attacks to degrade the system performance. Finally, some numerical examples are provided to demonstrate theoretical results.

  13. Public knowledge of heart attack symptoms in Beijing residents.

    PubMed

    Zhang, Qing-Tan; Hu, Da-Yi; Yang, Jin-Gang; Zhang, Shou-Yan; Zhang, Xin-Quan; Liu, Shu-Shan

    2007-09-20

    Definitive treatment for heart attack is early reperfusion with either angioplasty or thrombolytic therapy, and the benefit is strictly time-dependent. Patient outcomes are improved with either therapy when initiated as soon as possible. Recognition of heart attack symptoms is logically tied to taking action to receive prompt emergency care. Inadequate knowledge of heart attack symptoms may prolong delay. The purpose of this study was to document knowledge about heart attack symptoms in Beijing residents and to identify the characteristics associated with increased knowledge of heart attack. A structured survey was conducted in 18 communities in Beijing from March 1 through June 10 in 2006. Addresses and participants were selected randomly following a stratification. The survey was designed to collect knowledge of heart attack symptoms from sampled adults in each community. A total of 4627 respondents completed the questionnaires correctly, and 50.29% of them were female. Totally 64.15% of the respondents reported chest pain or discomfort (common symptoms) as a symptom of heart attack; 75.38% reported at least one of the following eight symptoms as a symptom of heart attack: back pain, shortness of breath, arm pain or numbness, nausea or vomiting, neck, jaw or shoulder pain, epigastric pain, sweating, weakness (less common symptoms); 20.36% correctly reported four or more heart attack symptoms, only 7.4% knew all the correct heart attack symptoms, and 28.94% knew about reperfusion therapy for heart attack; 31.7% reported to call 120 or 999 while having a heart attack themselves; however 89.6% reported to call 120 or 999 when someone else is suffering from a heart attack. Very old persons and those with health insurance coverage, high education level, high household income, longer living in Beijing and previous experience with heart disease had greater knowledge of heart attack symptoms. Public knowledge of common heart attack symptoms as well as less common heart attack symptoms is deficient in Beijing residents. But their knowledge of calling emergency medical services when someone is having a heart attack is relatively adequate. Public health efforts are needed to increase the recognition of the major heart attack symptoms in both the general public and groups at high risk for an acute cardiac event, especially in socioeconomically disadvantaged subgroups, including persons with low education level, low household income, and no health insurance coverage.

  14. Application distribution model and related security attacks in VANET

    NASA Astrophysics Data System (ADS)

    Nikaein, Navid; Kanti Datta, Soumya; Marecar, Irshad; Bonnet, Christian

    2013-03-01

    In this paper, we present a model for application distribution and related security attacks in dense vehicular ad hoc networks (VANET) and sparse VANET which forms a delay tolerant network (DTN). We study the vulnerabilities of VANET to evaluate the attack scenarios and introduce a new attacker`s model as an extension to the work done in [6]. Then a VANET model has been proposed that supports the application distribution through proxy app stores on top of mobile platforms installed in vehicles. The steps of application distribution have been studied in detail. We have identified key attacks (e.g. malware, spamming and phishing, software attack and threat to location privacy) for dense VANET and two attack scenarios for sparse VANET. It has been shown that attacks can be launched by distributing malicious applications and injecting malicious codes to On Board Unit (OBU) by exploiting OBU software security holes. Consequences of such security attacks have been described. Finally, countermeasures including the concepts of sandbox have also been presented in depth.

  15. An Approach for Assessing Consequences of Potential Supply Chain and Insider Contributed Cyber Attacks on Nuclear Power Plants

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chu, Tsong L.

    The Stuxnet attack at the Natanz facility is an example of a targeted and successful cyber attack on a nuclear facility. Snowden's release of National Security Agency documents demonstrated the consequences of the insider threat. More recently, the United States tried to attack North Korea but failed, South Korea was attempting to attack North Korea, and both applied Stuxnet-like approaches. These sophisticated targeted attacks differ from web-site hacking events that are reported almost daily in the news mainly because targeted attacks require detailed design and operation information of the systems attacked and/or are often carried out by insiders. For instance,more » in order to minimize disruption of facilities around the world, Stuxnet remained idle until it recognized the specific configuration of the Natanz facility, demonstrating that the attackers possessed extremely detailed information about the facility. Such targeted cyber attacks could become a national-level military weapon and be used in coercion of hostile countries.« less

  16. Improving the Rainbow Attack by Reusing Colours

    NASA Astrophysics Data System (ADS)

    Ågren, Martin; Johansson, Thomas; Hell, Martin

    Hashing or encrypting a key or a password is a vital part in most network security protocols. The most practical generic attack on such schemes is a time memory trade-off attack. Such an attack inverts any one-way function using a trade-off between memory and execution time. Existing techniques include the Hellman attack and the rainbow attack, where the latter uses different reduction functions ("colours") within a table.

  17. Simulation of Attacks for Security in Wireless Sensor Network

    PubMed Central

    Diaz, Alvaro; Sanchez, Pablo

    2016-01-01

    The increasing complexity and low-power constraints of current Wireless Sensor Networks (WSN) require efficient methodologies for network simulation and embedded software performance analysis of nodes. In addition, security is also a very important feature that has to be addressed in most WSNs, since they may work with sensitive data and operate in hostile unattended environments. In this paper, a methodology for security analysis of Wireless Sensor Networks is presented. The methodology allows designing attack-aware embedded software/firmware or attack countermeasures to provide security in WSNs. The proposed methodology includes attacker modeling and attack simulation with performance analysis (node’s software execution time and power consumption estimation). After an analysis of different WSN attack types, an attacker model is proposed. This model defines three different types of attackers that can emulate most WSN attacks. In addition, this paper presents a virtual platform that is able to model the node hardware, embedded software and basic wireless channel features. This virtual simulation analyzes the embedded software behavior and node power consumption while it takes into account the network deployment and topology. Additionally, this simulator integrates the previously mentioned attacker model. Thus, the impact of attacks on power consumption and software behavior/execution-time can be analyzed. This provides developers with essential information about the effects that one or multiple attacks could have on the network, helping them to develop more secure WSN systems. This WSN attack simulator is an essential element of the attack-aware embedded software development methodology that is also introduced in this work. PMID:27869710

  18. Analytical Characterization of Internet Security Attacks

    ERIC Educational Resources Information Center

    Sellke, Sarah H.

    2010-01-01

    Internet security attacks have drawn significant attention due to their enormously adverse impact. These attacks includes Malware (Viruses, Worms, Trojan Horse), Denial of Service, Packet Sniffer, and Password Attacks. There is an increasing need to provide adequate defense mechanisms against these attacks. My thesis proposal deals with analytical…

  19. Functional genomics of the evolution of increased resistance to parasitism in Drosophila.

    PubMed

    Wertheim, Bregje; Kraaijeveld, Alex R; Hopkins, Meirion G; Walther Boer, Mark; Godfray, H Charles J

    2011-03-01

    Individual hosts normally respond to parasite attack by launching an acute immune response (a phenotypic plastic response), while host populations can respond in the longer term by evolving higher level of defence against parasites. Little is known about the genetics of the evolved response: the identity and number of genes involved and whether it involves a pre-activation of the regulatory systems governing the plastic response. We explored these questions by surveying transcriptional changes in a Drosophila melanogaster strain artificially selected for resistance against the hymenopteran endoparasitoid Asobara tabida. Using micro-arrays, we profiled gene expression at seven time points during development (from the egg to the second instar larva) and found a large number of genes (almost 900) with altered expression levels. Bioinformatic analysis showed that some were involved in immunity or defence-associated functions but many were not. Previously, we had defined a set of genes whose level of expression changed after parasitoid attack and a comparison with the present set showed a significant though comparatively small overlap. This suggests that the evolutionary response to parasitism is not a simple pre-activation of the plastic, acute response. We also found overlap in the genes involved in the evolutionary response to parasitism and to other biotic and abiotic stressors, perhaps suggesting a 'module' of genes involved in a generalized stress response as has been found in other organisms. © 2010 Blackwell Publishing Ltd.

  20. Experimental analysis of transonic buffet on a 3D swept wing using fast-response pressure-sensitive paint

    NASA Astrophysics Data System (ADS)

    Sugioka, Yosuke; Koike, Shunsuke; Nakakita, Kazuyuki; Numata, Daiju; Nonomura, Taku; Asai, Keisuke

    2018-06-01

    Transonic buffeting phenomena on a three-dimensional swept wing were experimentally analyzed using a fast-response pressure-sensitive paint (PSP). The experiment was conducted using an 80%-scaled NASA Common Research Model in the Japan Aerospace Exploration Agency (JAXA) 2 m × 2 m Transonic Wind Tunnel at a Mach number of 0.85 and a chord Reynolds number of 1.54 × 106. The angle of attack was varied between 2.82° and 6.52°. The calculation of root-mean-square (RMS) pressure fluctuations and spectral analysis were performed on measured unsteady PSP images to analyze the phenomena under off-design buffet conditions. We found that two types of shock behavior exist. The first is a shock oscillation characterized by the presence of "buffet cells" formed at a bump Strouhal number St of 0.3-0.5, which is observed under all off-design conditions. This phenomenon arises at the mid-span wing and is propagated spanwise from inboard to outboard. The other is a large spatial amplitude shock oscillation characterized by low-frequency broadband components at St < 0.1, which appears at higher angles of attack ( α ≥ 6.0°) and behaves more like two-dimensional buffet. The transition between these two shock behaviors correlates well with the rapid increase of the wing-root strain fluctuation RMS.

  1. Recovery and screening for antibiotic susceptibility of potential bacterial pathogens from the oral cavity of shark species involved in attacks on humans in Recife, Brazil.

    PubMed

    Interaminense, J A; Nascimento, D C O; Ventura, R F; Batista, J E C; Souza, M M C; Hazin, F H V; Pontes-Filho, N T; Lima-Filho, J V

    2010-08-01

    The number of incidents involving sharks and humans at beaches in Recife, on the north-eastern Brazilian coast, is among the highest worldwide. In addition, wound infections in survivors are common; but the nature and risk of the aetiological agents is unknown. In the present study, 81 potential bacterial pathogens were identified in the oral cavity of sharks involved in attacks in Recife, and were subjected to antibiotic susceptibility tests using the standardized disc-diffusion method. The majority were enterobacteria such as Enterobacter spp., Citrobacter spp., Proteus spp., Providencia alcalifaciens, Escherichia coli, Moellerella wisconcensis and Leclercia adecarboxylata. Other Gram-negative bacteria included Vibrio spp., Burkholderia cepacia, Acinetobacter spp. and Pseudomonas spp. In addition, coagulase-positive and coagulase-negative Staphylococcus spp., Enterococcus spp. and Micrococcus spp. were identified, besides Streptococcus spp. from the viridans group. Resistance was especially found in the Proteus mirabilis and Citrobacter freundii, and ranged from 4 to 6 antibiotics out of the 13 tested. Gentamicin and vancomycin were the most effective against Gram-positive cocci strains, whereas levofloxacin was fully inhibitory against Gram-positive and Gram-negative bacteria. These data are discussed in light of a retrospective evaluation of the medical records of three shark victims treated at Restauração Hospital in Recife.

  2. Epidemiological and laboratory characterization of a yellow fever outbreak in northern Uganda, October 2010-January 2011.

    PubMed

    Wamala, Joseph F; Malimbo, Mugagga; Okot, Charles L; Atai-Omoruto, Ann D; Tenywa, Emmanuel; Miller, Jeffrey R; Balinandi, Stephen; Shoemaker, Trevor; Oyoo, Charles; Omony, Emmanuel O; Kagirita, Atek; Musenero, Monica M; Makumbi, Issa; Nanyunja, Miriam; Lutwama, Julius J; Downing, Robert; Mbonye, Anthony K

    2012-07-01

    In November 2010, following reports of an outbreak of a fatal, febrile, hemorrhagic illness in northern Uganda, the Uganda Ministry of Health established multisector teams to respond to the outbreak. This was a case-series investigation in which the response teams conducted epidemiological and laboratory investigations on suspect cases. The cases identified were line-listed and a data analysis was undertaken regularly to guide the outbreak response. Overall, 181 cases met the yellow fever (YF) suspected case definition; there were 45 deaths (case fatality rate 24.9%). Only 13 (7.5%) of the suspected YF cases were laboratory confirmed, and molecular sequencing revealed 92% homology to the YF virus strain Couma (Ethiopia), East African genotype. Suspected YF cases had fever (100%) and unexplained bleeding (97.8%), but jaundice was rare (11.6%). The overall attack rate was 13 cases/100000 population, and the attack rate was higher for males than females and increased with age. The index clusters were linked to economic activities undertaken by males around forests. This was the largest YF outbreak ever reported in Uganda. The wide geographical case dispersion as well as the male and older age preponderance suggests transmission during the outbreak was largely sylvatic and related to occupational activities around forests. Copyright © 2012 International Society for Infectious Diseases. Published by Elsevier Ltd. All rights reserved.

  3. Chemical and genetic defenses against disease in insect societies.

    PubMed

    Stow, Adam; Beattie, Andrew

    2008-10-01

    The colonies of ants, bees, wasps and termites, the social insects, consist of large numbers of closely related individuals; circumstances ideal for contagious diseases. Antimicrobial assays of these animals have demonstrated a wide variety of chemical defenses against both bacteria and fungi that can be broadly classified as either external antiseptic compounds or internal immune molecules. Reducing the disease risks inherent in colonies of social insects is also achieved by behaviors, such as multiple mating or dispersal, that lower genetic relatedness both within- and among colonies. The interactions between social insects and their pathogens are complex, as illustrated by some ants that require antimicrobial and behavioral defenses against highly specialized fungi, such as those in the genus Cordyceps that attack larvae and adults and species in the genus Escovopsis that attack their food supplies. Studies of these defenses, especially in ants, have revealed remarkably sophisticated immune systems, including peptides induced by, and specific to, individual bacterial strains. The latter may be the result of the recruitment by the ants of antibiotic-producing bacteria but the extent of such three-way interactions remains unknown. There is strong experimental evidence that the evolution of sociality required dramatic increases in antimicrobial defenses and that microbes have been powerful selective agents. The antimicrobial chemicals and the insect-killing fungi may be useful in medicine and agriculture, respectively.

  4. The influence of heat treatment and plastic deformation on the bio-degradation of a Mg-Y-RE alloy.

    PubMed

    Gunde, Petra; Furrer, Angela; Hänzi, Anja C; Schmutz, Patrik; Uggowitzer, Peter J

    2010-02-01

    In this study the bio-degradation behavior of a Mg-Y-RE alloy in different heat treatment states with respect to the alloy's potential application as biodegradable implant material was investigated by electrochemical impedance spectroscopy in two body-similar fluids. The heat treatments increase the degradation resistance of the alloy and lead to the formation of a thermal oxide layer on the sample surface and to a change in microstructure such as the distribution of yttrium. The varying Y distribution in the alloy does not significantly influence the degradation behavior, and all samples show a similar low polarization resistance. However, samples with a thermal oxide layer, which consists mainly of Y(2)O(3), degrade much more slowly and feature remarkably high polarization resistance. Nevertheless, in some cases localized corrosion attack occurs and drastically impairs performance. Cracks in the oxide layer, intentionally induced by straining of the samples and which in practice could originate from the implantation process, reduce the corrosion resistance. However, these samples perform still better than polished specimens and show a macroscopically homogeneous degradation behavior without localized corrosion. Microscopically, corrosion attacks start at the cracks and undermining of the oxide layer occurs with time. For all the material conditions a remarkable dependence of the degradation rate on the electrolyte is noted. (c) 2009 Wiley Periodicals, Inc.

  5. The anatomy of a shark attack: a case report and review of the literature.

    PubMed

    Caldicott, D G; Mahajani, R; Kuhn, M

    2001-07-01

    Shark attacks are rare but are associated with a high morbidity and significant mortality. We report the case of a patient's survival from a shark attack and their subsequent emergency medical and surgical management. Using data from the International Shark Attack File, we review the worldwide distribution and incidence of shark attack. A review of the world literature examines the features which make shark attacks unique pathological processes. We offer suggestions for strategies of management of shark attack, and techniques for avoiding adverse outcomes in human encounters with these endangered creatures.

  6. Distinguishing attack and second-preimage attack on encrypted message authentication codes (EMAC)

    NASA Astrophysics Data System (ADS)

    Ariwibowo, Sigit; Windarta, Susila

    2016-02-01

    In this paper we show that distinguisher on CBC-MAC can be applied to Encrypted Message Authentication Code (EMAC) scheme. EMAC scheme in general is vulnerable to distinguishing attack and second preimage attack. Distinguishing attack simulation on AES-EMAC using 225 message modifications, no collision have been found. According to second preimage attack simulation on AES-EMAC no collision found between EMAC value of S1 and S2, i.e. no second preimage found for messages that have been tested. Based on distinguishing attack simulation on truncated AES-EMAC we found collision in every message therefore we cannot distinguish truncated AES-EMAC with random function. Second-preimage attack is successfully performed on truncated AES-EMAC.

  7. Novel Method For Low-Rate Ddos Attack Detection

    NASA Astrophysics Data System (ADS)

    Chistokhodova, A. A.; Sidorov, I. D.

    2018-05-01

    The relevance of the work is associated with an increasing number of advanced types of DDoS attacks, in particular, low-rate HTTP-flood. Last year, the power and complexity of such attacks increased significantly. The article is devoted to the analysis of DDoS attacks detecting methods and their modifications with the purpose of increasing the accuracy of DDoS attack detection. The article details low-rate attacks features in comparison with conventional DDoS attacks. During the analysis, significant shortcomings of the available method for detecting low-rate DDoS attacks were found. Thus, the result of the study is an informal description of a new method for detecting low-rate denial-of-service attacks. The architecture of the stand for approbation of the method is developed. At the current stage of the study, it is possible to improve the efficiency of an already existing method by using a classifier with memory, as well as additional information.

  8. Heavy-tailed distribution of the SSH Brute-force attack duration in a multi-user environment

    NASA Astrophysics Data System (ADS)

    Lee, Jae-Kook; Kim, Sung-Jun; Park, Chan Yeol; Hong, Taeyoung; Chae, Huiseung

    2016-07-01

    Quite a number of cyber-attacks to be place against supercomputers that provide highperformance computing (HPC) services to public researcher. Particularly, although the secure shell protocol (SSH) brute-force attack is one of the traditional attack methods, it is still being used. Because stealth attacks that feign regular access may occur, they are even harder to detect. In this paper, we introduce methods to detect SSH brute-force attacks by analyzing the server's unsuccessful access logs and the firewall's drop events in a multi-user environment. Then, we analyze the durations of the SSH brute-force attacks that are detected by applying these methods. The results of an analysis of about 10 thousands attack source IP addresses show that the behaviors of abnormal users using SSH brute-force attacks are based on human dynamic characteristics of a typical heavy-tailed distribution.

  9. An entangling-probe attack on Shor's algorithm for factorization

    NASA Astrophysics Data System (ADS)

    Azuma, Hiroo

    2018-02-01

    We investigate how to attack Shor's quantum algorithm for factorization with an entangling probe. We show that an attacker can steal an exact solution of Shor's algorithm outside an institute where the quantum computer is installed if he replaces its initialized quantum register with entangled qubits, namely the entangling probe. He can apply arbitrary local operations to his own probe. Moreover, we assume that there is an unauthorized person who helps the attacker to commit a crime inside the institute. He tells garbage data obtained from measurements of the quantum register to the attacker secretly behind a legitimate user's back. If the attacker succeeds in cracking Shor's algorithm, the legitimate user obtains a random answer and does not notice the attacker's illegal acts. We discuss how to detect the attacker. Finally, we estimate a probability that the quantum algorithm inevitably makes an error, of which the attacker can take advantage.

  10. Use of the Panic Attack Questionnaire-IV to assess non-clinical panic attacks and limited symptom panic attacks in student and community samples.

    PubMed

    Norton, Peter J; Zvolensky, Michael J; Bonn-Miller, Marcel O; Cox, Brian J; Norton, G Ron

    2008-10-01

    Since its development in the mid-1980s, the Panic Attack Questionnaire (PAQ) has been one of the more, if not the most, commonly used self-report tools for assessing panic attacks. The usage of the instrument, however, has come amid potential concerns that instructions and descriptions may lead to an over-estimate of the prevalence of panic attacks. Furthermore, the instrument has not been revised since 1992, despite changes in DSM-IV criteria and more recent developments in the understanding of panic attacks. As a result, this paper describes a revision of the PAQ to improve the instruction and descriptive set, and to fully assess features of panic derived from recent conceptualizations. Students meeting DSM-IV panic attack criteria and those endorsing panic attacks, but not meeting criteria, showed few differences with the exception that those not meeting DSM-IV criteria typically reported a longer onset-to-peak intensity time than did Panickers. Results were cross-validated and extended using an independent Community Sample. A full descriptive phenomenology of panic attacks is described, and future directions for studying panic attacks using the PAQ are presented.

  11. Command Disaggregation Attack and Mitigation in Industrial Internet of Things

    PubMed Central

    Zhu, Pei-Dong; Hu, Yi-Fan; Cui, Peng-Shuai; Zhang, Yan

    2017-01-01

    A cyber-physical attack in the industrial Internet of Things can cause severe damage to physical system. In this paper, we focus on the command disaggregation attack, wherein attackers modify disaggregated commands by intruding command aggregators like programmable logic controllers, and then maliciously manipulate the physical process. It is necessary to investigate these attacks, analyze their impact on the physical process, and seek effective detection mechanisms. We depict two different types of command disaggregation attack modes: (1) the command sequence is disordered and (2) disaggregated sub-commands are allocated to wrong actuators. We describe three attack models to implement these modes with going undetected by existing detection methods. A novel and effective framework is provided to detect command disaggregation attacks. The framework utilizes the correlations among two-tier command sequences, including commands from the output of central controller and sub-commands from the input of actuators, to detect attacks before disruptions occur. We have designed components of the framework and explain how to mine and use these correlations to detect attacks. We present two case studies to validate different levels of impact from various attack models and the effectiveness of the detection framework. Finally, we discuss how to enhance the detection framework. PMID:29065461

  12. Command Disaggregation Attack and Mitigation in Industrial Internet of Things.

    PubMed

    Xun, Peng; Zhu, Pei-Dong; Hu, Yi-Fan; Cui, Peng-Shuai; Zhang, Yan

    2017-10-21

    A cyber-physical attack in the industrial Internet of Things can cause severe damage to physical system. In this paper, we focus on the command disaggregation attack, wherein attackers modify disaggregated commands by intruding command aggregators like programmable logic controllers, and then maliciously manipulate the physical process. It is necessary to investigate these attacks, analyze their impact on the physical process, and seek effective detection mechanisms. We depict two different types of command disaggregation attack modes: (1) the command sequence is disordered and (2) disaggregated sub-commands are allocated to wrong actuators. We describe three attack models to implement these modes with going undetected by existing detection methods. A novel and effective framework is provided to detect command disaggregation attacks. The framework utilizes the correlations among two-tier command sequences, including commands from the output of central controller and sub-commands from the input of actuators, to detect attacks before disruptions occur. We have designed components of the framework and explain how to mine and use these correlations to detect attacks. We present two case studies to validate different levels of impact from various attack models and the effectiveness of the detection framework. Finally, we discuss how to enhance the detection framework.

  13. Lethality of sea lamprey attacks on lake trout in relation to location on the body surface

    USGS Publications Warehouse

    Bergstedt, Roger A.; Schneider, Clifford P.; O'Gorman, Robert

    2001-01-01

    We compared the locations of healed attack marks of the sea lamprey Petromyzon marinus on live lake trout Salvelinus namaycush with those of unhealed attack marks on dead lake trout to determine if the lethality of a sea lamprey attack was related to attack location. Lake trout were collected from Lake Ontario, live fish with gill nets in September 1985 and dead fish with trawls in October 1983−1986. Attack location was characterized by the percent distances from snout to tail and from the ventral to the dorsal midline. Kolmogorov−Smirnov two-sample tests did not detect significant differences in the distribution of attack location along either the anteroposterior axis or the dorsoventral axis. When attack locations were grouped into six anatomical regions historically used to record sea lamprey attacks, dead fish did not exhibit a significantly higher proportion of attacks in the more anterior regions. Even if the differences in attack location on live and dead fish were significant, they were too small to imply substantial spatial differences in attack lethality that should be accounted for when modeling the effects of sea lampreys feeding on lake trout. We suggest that the tendency for sea lamprey attacks to occur on the anterior half of the fish is related to the lower amplitude of lateral body movement there during swimming and thus the lower likelihood of being dislodged.

  14. Serial agonistic attacks by greylag goose families, Anser anser, against the same opponent

    PubMed Central

    Scheiber, Isabella B.R.; Kotrschal, Kurt; Weiß, Brigitte M.

    2011-01-01

    It is known from primates that alliance partners may support each other’s interests in competition with others, for example, through repeated agonistic attacks against a particular individual. We examined serial aggressive interactions between greylag goose families and other flock members. We found that repeated attacks towards the same individual were common and that up to five serial attacks by family members followed an initial attack. Family size did not affect the frequency of such serial attacks. Juvenile geese evidently benefited most from active social support through serial attacks. About 60% of the juveniles’ lost primary interactions were subsequently reversed by another family member. This may be one of the reasons why juveniles rank higher in the social hierarchy than would be expected from their age and size alone. Losses in serial attacks predominantly occurred against other, presumably higher-ranking, family geese and ganders. We propose three major functions/consequences of serial attacks. Analogous to primates, serial attacks in greylag geese may serve to reinforce a losing experience of an opponent defeated in a preceding attack. On the side of the winning family, serial attacks may reinforce the experience of winning. Both winning and losing experiences are linked with physiological consequences in higher vertebrates, affecting the future social performance of winners or losers. Finally, serial attacks may signal the agonistic potential of a family to other flock members. This is supported by heart rate data, which indicate that greylags are competent to interpret third-party relationships. PMID:21984838

  15. Khyâl attacks: a key idiom of distress among traumatized cambodia refugees.

    PubMed

    Hinton, Devon E; Pich, Vuth; Marques, Luana; Nickerson, Angela; Pollack, Mark H

    2010-06-01

    Traumatized Cambodian refugees with PTSD often complain of khyâl attacks. The current study investigates khyâl attacks from multiple perspectives and examines the validity of a model of how khyâl attacks are generated. The study found that khyâl attacks had commonly been experienced in the previous 4 weeks and that their severity was strongly correlated with the severity of PTSD (PTSD Checklist). It was found that khyâl attacks were triggered by various processes--such as worry, trauma recall, standing up, going to a mall--and that khyâl attacks almost always met panic attack criteria. It was also found that during a khyâl attack there was great fear that death might occur from bodily dysfunction. It was likewise found that a complex nosology of khyâl attacks exists that rates the attacks on a scale of severity, that the severity determines how the khyâl attacks should be treated and that those treatments are often complex. As illustrated by the article, khyâl attacks constitute a key aspect of trauma ontology in this group, a culturally specific experiencing of anxiety and trauma-related disorder. The article also contributes to the study of trauma somatics, that is, to the study of how trauma results in specific symptoms in a specific cultural context, showing that a key part of the trauma-somatic reticulum is often a cultural syndrome.

  16. Cyber attacks against state estimation in power systems: Vulnerability analysis and protection strategies

    NASA Astrophysics Data System (ADS)

    Liu, Xuan

    Power grid is one of the most critical infrastructures in a nation and could suffer a variety of cyber attacks. With the development of Smart Grid, false data injection attack has recently attracted wide research interest. This thesis proposes a false data attack model with incomplete network information and develops optimal attack strategies for attacking load measurements and the real-time topology of a power grid. The impacts of false data on the economic and reliable operations of power systems are quantitatively analyzed in this thesis. To mitigate the risk of cyber attacks, a distributed protection strategies are also developed. It has been shown that an attacker can design false data to avoid being detected by the control center if the network information of a power grid is known to the attacker. In practice, however, it is very hard or even impossible for an attacker to obtain all network information of a power grid. In this thesis, we propose a local load redistribution attacking model based on incomplete network information and show that an attacker only needs to obtain the network information of the local attacking region to inject false data into smart meters in the local region without being detected by the state estimator. A heuristic algorithm is developed to determine a feasible attacking region by obtaining reduced network information. This thesis investigates the impacts of false data on the operations of power systems. It has been shown that false data can be designed by an attacker to: 1) mask the real-time topology of a power grid; 2) overload a transmission line; 3) disturb the line outage detection based on PMU data. To mitigate the risk of cyber attacks, this thesis proposes a new protection strategy, which intends to mitigate the damage effects of false data injection attacks by protecting a small set of critical measurements. To further reduce the computation complexity, a mixed integer linear programming approach is also proposed to separate the power grid into several subnetworks, then distributed protection strategy is applied to each subnetwork.

  17. Public knowledge of heart attack in a Nepalese population survey.

    PubMed

    Limbu, Yuba R; Malla, Rabi; Regmi, Shyam R; Dahal, Ramesh; Nakarmi, Hari L; Yonzan, Ganesh; Gartaula, Ritu P

    2006-01-01

    Limited knowledge of heart attack symptoms may prevent patients from seeking time-dependent thrombolytic therapy, an intervention that offers impressive survival benefit. Previous studies carried out in developed countries demonstrated a deficit of knowledge about a wide range of heart attack symptoms. The aim of this study was to describe knowledge of heart attack, knowledge of heart attack symptoms, and anticipated first response to symptoms among the lay public in Nepal. A total of 1192 participants (657 men and 535 women age 16 to 88 years old) were interviewed in a cross-sectional manner. Those <16 years of age, all health professionals, and individuals with a history of heart attack were excluded. A total of 862 (72.3%) participants had heard of heart attack. Significantly more male than female participants had heard of heart attack (P <.001). Of the respondents, 91.7% with >or=10 years of education (ED-2) had heard of heart of attack, whereas only 54% respondents with <10 years of education or who were illiterate (unable to read and write) (ED-1) had heard of heart attack, and in both the male and female populations, a higher percentage of the ED-2 group had heard of heart attack than the ED-1 group (92.6% vs. 60% and 85.6% vs. 49.6%, respectively). A significantly higher number of respondents from 31 to 50 years of age (AGE-2) had heard of heart attack than those 16 to 30 years of age (AGE-1) and those >50 years of age (AGE-3) (P <.001). Among 862 respondents who had heard of heart attack, 21.3% could not name any heart attack symptoms. A total of 16 different heart attack symptoms were named. Fainting or collapsing (48%), chest pain (22.4%), shortness of breath (9%), dizziness (8.4%), palpitations (7.4%), and sweating (7.4%) were the leading symptoms named by respondents. Fainting or collapsing and chest pain and shortness of breath were named more frequently among the ED-2 group respondents and the AGE-3 group men. Only 3.7% could name >or=2 typical heart attack symptoms. A significantly larger number of the ED-2 group named >or=2 typical symptoms than their counterparts (P <0.001). A large number (77.6%) of respondents preferred immediate hospital referral and/or doctor consultation after a heart attack. In Nepal, better-educated men are more aware of heart attack. Fainting or collapsing and chest pain and shortness of breath were leading heart attack symptoms named by the general population. Public heart attack awareness is not adequate and knowledge of wide range of heart attack symptoms is deficient in the Nepalese general population.

  18. Lift distribution and velocity field measurements for a three-dimensional, steady blade/vortex interaction

    NASA Technical Reports Server (NTRS)

    Dunagan, Stephen E.; Norman, Thomas R.

    1987-01-01

    A wind tunnel experiment simulating a steady three-dimensional helicopter rotor blade/vortex interaction is reported. The experimental configuration consisted of a vertical semispan vortex-generating wing, mounted upstream of a horizontal semispan rotor blade airfoil. A three-dimensional laser velocimeter was used to measure the velocity field in the region of the blade. Sectional lift coefficients were calculated by integrating the velocity field to obtain the bound vorticity. Total lift values, obtained by using an internal strain-gauge balance, verified the laser velocimeter data. Parametric variations of vortex strength, rotor blade angle of attack, and vortex position relative to the rotor blade were explored. These data are reported (with attention to experimental limitations) to provide a dataset for the validation of analytical work.

  19. Effect of ELEVON gap configurations on the longitudinal stability and control effectiveness of the 43-0 space shuttle orbiter (OA118)

    NASA Technical Reports Server (NTRS)

    Hughes, T.; Mennell, R.

    1974-01-01

    Experimental aerodynamic investigations were conducted on a stingmounted 0.0405-scale representation of the 140A/B space shuttle orbiter in a 7.75 by 11-Foot low speed wind tunnel from April 24 to April 26, 1974. Differential inboard/outboard elevon panel deflections with the 6-inch gap were investigated to determine outboard panel aileron effectiveness. The elevons were deflected from +20 degrees to -40 degrees in various combinations. Aerodynamic force and moment data for the orbiter were measured in the body axis system by an internally mounted, six-component strain gage balance. The model was sting mounted with the center of rotation located at F.S. 60.172. The angle of attack range was from -10 degrees to +24 degrees.

  20. Vaccines against biologic agents: uses and developments.

    PubMed

    Ales, Noel C; Katial, Rohit K

    2004-03-01

    Although the Geneva protocol that prohibits the use of chemical and biologic weapons was ratified in 1925, many countries failed to accept this protocol: others stipulated retaliation, and some, like the United States, did not ratify the protocol for decades. This delay allowed the continued development of chemical and biologic agents. Members of the health care community are responsible for determining the best way to protect society from the potentially devastating effects of these biologic agents. Ideally,these diseases would be prevented from ever developing into systemic illnesses. In the past, vaccination has been a successful means of eradicating disease. Vaccines remain a hopeful therapy for the future, but time is short,and there are many obstacles.Information regarding bioterrorism agents and their treatments comes mainly from dated data or from in vitro or animal studies that may not apply to human treatment and disease. Additionally, the current threat of bioterrorism does not allow enough time for accurate, well-designed,controlled studies in humans before the release of investigational vaccines. Furthermore, some human studies would not be safe or ethical. Finally,many members of society suffer from illnesses that would put them at high risk to receive prophylactic vaccination. It is therefore naive to believe that vaccines would be the ultimate protection from these agents. In addition to vaccine development, there must be concurrent investigations into disease management and treatment. Even in instances in which vaccination is known to be an effective means of disease protection. biologic agents may be presented in a manner that renders vaccines ineffective. Virulent strains of organisms may be used, more than one organism may be used in tandem to increase virulence, and strains may be selected for antibiotic and vaccine resistance. Genetically engineered strains may use virulence factors other than those targeted in vaccines, and high concentrations of organisms may overcome vaccine protection. Finally,exposure may not be immediately noted until it is too late to vaccinate, as was the case with anthrax. Even in a case, such as smallpox, in which postexposure vaccination is possible, patients will still develop disease, and the health care system may be overwhelmed. The United States government has been defensively planning and researching the use of vaccines and chemoprophylaxis against any potential biologic agents since at least 1953, and resources are still lacking. There are inadequate stockpiles of vaccine to protect the entire population. The pharmaceutical industry also lacks a means of mass producing vaccines ina short timeframe. There is no policy in place for the use of vaccines that are yet unlicensed and experimental but may be the only therapy in the event ofa terrorist attack. Investigations into these solutions have been instituted only after the September 11, 2001, attacks heightened the awareness of terrorism. Although vaccination is an effective means of prophylaxis and a means of terminating epidemics or treating active disease, there is also resistance from the general public. In some instances there is a lack of acceptance of vaccines, or the risk of side effects is too great. In other cases, a questionable benefit does not justify the expense of mass vaccination. Because of this uncertainty, mass vaccination is deemed an impractical solution to the threat of bioterrorism. Extending vaccination with most vaccines to include all members of society who may be first responders in the event of an attack should be considered. In all instances, the benefit-to-risk must be weighed ratio when deciding how and when to offer preemptive prophylaxis to protect society from a real but unknown threat.

  1. A Field Investigation of Bacillus anthracis Contamination of U.S. Department of Agriculture and Other Washington, D.C., Buildings during the Anthrax Attack of October 2001

    PubMed Central

    Higgins, James A.; Cooper, Mary; Schroeder-Tucker, Linda; Black, Scott; Miller, David; Karns, Jeffrey S.; Manthey, Erlynn; Breeze, Roger; Perdue, Michael L.

    2003-01-01

    In response to a bioterrorism attack in the Washington, D.C., area in October 2001, a mobile laboratory (ML) was set up in the city to conduct rapid molecular tests on environmental samples for the presence of Bacillus anthracis spores and to route samples for further culture analysis. The ML contained class I laminar-flow hoods, a portable autoclave, two portable real-time PCR devices (Ruggedized Advanced Pathogen Identification Device [RAPID]), and miscellaneous supplies and equipment to process samples. Envelopes and swab and air samples collected from 30 locations in the metropolitan area once every three days were subjected to visual examination and DNA extraction, followed by real-time PCR using freeze-dried, fluorescent-probe-based reagents. Surface swabs and air samples were also cultured for B. anthracis at the National Veterinary Service Laboratory (NVSL) in Ames, Iowa. From 24 October 2001 to 15 September 2002, 2,092 pieces of mail were examined, 405 real-time PCR assays were performed (comprising 4,639 samples), and at the NVSL 6,275 samples were subjected to over 18,000 platings. None of the PCR assays on DNA extracted from swab and air samples were positive, but viable spores were cultured from surface swabs taken from six locations in the metropolitan area in October, November, and December 2001 and February, March, and May 2002. DNA extracted from these suspected B. anthracis colonies was positive by real-time and conventional PCRs for the lethal factor, pXO1, and for capA and vrr genes; sequence analysis of the latter amplicons indicated >99% homology with the Ames, vollum, B6273-93, C93022281, and W-21 strains of B. anthracis, suggesting they arose from cross-contamination during the attack through the mail. The RAPID-based PCR analysis provided fast confirmation of suspect colonies from an overnight incubation on agar plates. PMID:12514046

  2. Heart attack

    MedlinePlus

    ... infarction; Non-ST - elevation myocardial infarction; NSTEMI; CAD - heart attack; Coronary artery disease - heart attack ... made up of cholesterol and other cells. A heart attack may occur when: A tear in the ...

  3. The effect of climate variability on urinary stone attacks: increased incidence associated with temperature over 18 °C: a population-based study.

    PubMed

    Park, Hyoung Keun; Bae, Sang Rak; Kim, Satbyul E; Choi, Woo Suk; Paick, Sung Hyun; Ho, Kim; Kim, Hyeong Gon; Lho, Yong Soo

    2015-02-01

    The aim of this study was to evaluate the effect of seasonal variation and climate parameters on urinary tract stone attack and investigate whether stone attack is increased sharply at a specific point. Nationwide data of total urinary tract stone attack numbers per month between January 2006 and December 2010 were obtained from the Korean Health Insurance Review and Assessment Service. The effects of climatic factors on monthly urinary stone attack were assessed using auto-regressive integrated moving average (ARIMA) regression method. A total of 1,702,913 stone attack cases were identified. Mean monthly and monthly average daily urinary stone attack cases were 28,382 ± 2,760 and 933 ± 85, respectively. The stone attack showed seasonal trends of sharp incline in June, a peak plateau from July to September, and a sharp decline after September. The correlation analysis showed that ambient temperature (r = 0.557, p < 0.001) and relative humidity (r = 0.513, p < 0.001) were significantly associated with urinary stone attack cases. However, after adjustment for trends and seasonality, ambient temperature was the only climate factor associated with the stone attack cases in ARIMA regression test (p = 0.04). Threshold temperature was estimated as 18.4 °C. Risk of urinary stone attack significantly increases 1.71% (1.02-2.41 %, 95% confidence intervals) with a 1 °C increase of ambient temperature above the threshold point. In conclusion, monthly urinary stone attack cases were changed according to seasonal variation. Among the climates variables, only temperature had consistent association with stone attack and when the temperature is over 18.4 °C, urinary stone attack would be increased sharply.

  4. Reexperiencing symptoms, dissociation, and avoidance behaviors in daily life of patients with PTSD and patients with panic disorder with agoraphobia.

    PubMed

    Pfaltz, Monique C; Michael, Tanja; Meyer, Andrea H; Wilhelm, Frank H

    2013-08-01

    Panic attacks are frequently perceived as life threatening. Panic disorder (PD) patients may therefore experience symptoms of posttraumatic stress disorder (PTSD). The authors explored this in 28 healthy controls, 17 PTSD patients, and 24 PD patients with agoraphobia who completed electronic diaries 36 times during 1 week. Patient groups frequently reported dissociation as well as thoughts, memories, and reliving of their trauma or panic attacks. PTSD patients reported more trauma/panic attack thoughts (incidence rate ratio [IRR] = 2.9) and memories (IRR = 2.8) than PD patients. Patient groups relived their trauma or panic attacks equally frequently, and reported comparable bodily reactions and distress associated with trauma or panic attack memories. Clinical groups avoided trauma or panic attack reminders more often than healthy controls (avoidance of trauma- or panic attack-related thoughts (IRR = 8.0); avoidance of things associated with the trauma or panic attack (IRR = 40.7). PD patients avoided trauma or panic attack reminders less often than PTSD patients (avoidance of trauma- or panic attack-related thoughts [IRR = 2.5]; avoidance of things associated with the trauma or panic attack [IRR = 4.1]), yet these differences were nonsignificant when controlling for functional impairment. In conclusion, trauma-like symptoms are common in PD with agoraphobia and panic attacks may be processed similarly as trauma in PTSD. Copyright © 2013 International Society for Traumatic Stress Studies.

  5. False Positive and False Negative Effects on Network Attacks

    NASA Astrophysics Data System (ADS)

    Shang, Yilun

    2018-01-01

    Robustness against attacks serves as evidence for complex network structures and failure mechanisms that lie behind them. Most often, due to detection capability limitation or good disguises, attacks on networks are subject to false positives and false negatives, meaning that functional nodes may be falsely regarded as compromised by the attacker and vice versa. In this work, we initiate a study of false positive/negative effects on network robustness against three fundamental types of attack strategies, namely, random attacks (RA), localized attacks (LA), and targeted attack (TA). By developing a general mathematical framework based upon the percolation model, we investigate analytically and by numerical simulations of attack robustness with false positive/negative rate (FPR/FNR) on three benchmark models including Erdős-Rényi (ER) networks, random regular (RR) networks, and scale-free (SF) networks. We show that ER networks are equivalently robust against RA and LA only when FPR equals zero or the initial network is intact. We find several interesting crossovers in RR and SF networks when FPR is taken into consideration. By defining the cost of attack, we observe diminishing marginal attack efficiency for RA, LA, and TA. Our finding highlights the potential risk of underestimating or ignoring FPR in understanding attack robustness. The results may provide insights into ways of enhancing robustness of network architecture and improve the level of protection of critical infrastructures.

  6. The non-trusty clown attack on model-based speaker recognition systems

    NASA Astrophysics Data System (ADS)

    Farrokh Baroughi, Alireza; Craver, Scott

    2015-03-01

    Biometric detectors for speaker identification commonly employ a statistical model for a subject's voice, such as a Gaussian Mixture Model, that combines multiple means to improve detector performance. This allows a malicious insider to amend or append a component of a subject's statistical model so that a detector behaves normally except under a carefully engineered circumstance. This allows an attacker to force a misclassification of his or her voice only when desired, by smuggling data into a database far in advance of an attack. Note that the attack is possible if attacker has access to database even for a limited time to modify victim's model. We exhibit such an attack on a speaker identification, in which an attacker can force a misclassification by speaking in an unusual voice, and replacing the least weighted component of victim's model by the most weighted competent of the unusual voice of the attacker's model. The reason attacker make his or her voice unusual during the attack is because his or her normal voice model can be in database, and by attacking with unusual voice, the attacker has the option to be recognized as himself or herself when talking normally or as the victim when talking in the unusual manner. By attaching an appropriately weighted vector to a victim's model, we can impersonate all users in our simulations, while avoiding unwanted false rejections.

  7. 44 CFR 312.2 - Definitions.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... meaning of the listed terms are as follows: (a) The term attack means any attack or series of attacks by... population caused, or which would be caused, by an attack upon the United States, or by natural disaster, (2) to deal with the immediate emergency conditions which would be created by any such attack, or natural...

  8. 44 CFR 312.2 - Definitions.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... meaning of the listed terms are as follows: (a) The term attack means any attack or series of attacks by... population caused, or which would be caused, by an attack upon the United States, or by natural disaster, (2) to deal with the immediate emergency conditions which would be created by any such attack, or natural...

  9. 44 CFR 312.2 - Definitions.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... meaning of the listed terms are as follows: (a) The term attack means any attack or series of attacks by... population caused, or which would be caused, by an attack upon the United States, or by natural disaster, (2) to deal with the immediate emergency conditions which would be created by any such attack, or natural...

  10. [Comparative analysis of phenomenology of paroxysms of atrial fibrillation and panic attacks].

    PubMed

    San'kova, T A; Solov'eva, A D; Nedostup, A V

    2004-01-01

    To study phenomenology of attacks of atrial fibrillation (AF) and to compare it with phenomenology of panic attacks for elucidation of pathogenesis of atrial fibrillation and for elaboration of rational therapeutic intervention including those aimed at correction of psychovegetative abnormalities. Patients with nonrheumatic paroxysmal AF (n=105) and 100 patients with panic attacks (n=100). Clinical, cardiological and neurological examination, analysis of patients complaints during attacks of AF, and comparison them with diagnostic criteria for panic attack. It was found that clinical picture of attacks of AF comprised vegetative, emotional and functional neurological phenomena similar to those characteristic for panic attacks. This similarity as well as positive therapeutic effect of clonazepam allowed to propose a novel pathogenic mechanism of AF attacks. Severity of psychovegetative disorders during paroxysm of AF could be evaluated by calculation of psychovegetative iudex: Psychovegetative index should be used for detection of panic attack-like component in clinical picture of AF paroxysm and thus for determination of indications for inclusion of vegetotropic drugs, e. g. clonazepam, in complex preventive therapy.

  11. Security Assessment of Cyberphysical Digital Microfluidic Biochips.

    PubMed

    Ali, Sk Subidh; Ibrahim, Mohamed; Sinanoglu, Ozgur; Chakrabarty, Krishnendu; Karri, Ramesh

    2016-01-01

    A digital microfluidic biochip (DMFB) is an emerging technology that enables miniaturized analysis systems for point-of-care clinical diagnostics, DNA sequencing, and environmental monitoring. A DMFB reduces the rate of sample and reagent consumption, and automates the analysis of assays. In this paper, we provide the first assessment of the security vulnerabilities of DMFBs. We identify result-manipulation attacks on a DMFB that maliciously alter the assay outcomes. Two practical result-manipulation attacks are shown on a DMFB platform performing enzymatic glucose assay on serum. In the first attack, the attacker adjusts the concentration of the glucose sample and thereby modifies the final result. In the second attack, the attacker tampers with the calibration curve of the assay operation. We then identify denial-of-service attacks, where the attacker can disrupt the assay operation by tampering either with the droplet-routing algorithm or with the actuation sequence. We demonstrate these attacks using a digital microfluidic synthesis simulator. The results show that the attacks are easy to implement and hard to detect. Therefore, this work highlights the need for effective protections against malicious modifications in DMFBs.

  12. Managing burn victims of suicide bombing attacks: outcomes, lessons learnt, and changes made from three attacks in Indonesia.

    PubMed

    Chim, Harvey; Yew, Woon Si; Song, Colin

    2007-01-01

    Terror attacks in Southeast Asia were almost nonexistent until the 2002 Bali bomb blast, considered the deadliest attack in Indonesian history. Further attacks in 2003 (Jakarta), 2004 (Jakarta), and 2005 (Bali) have turned terrorist attacks into an ever-present reality. The authors reviewed medical charts of victims evacuated to the Singapore General Hospital (SGH) Burns Centre during three suicide attacks involving Bali (2002 and 2005) and the Jakarta Marriott hotel (2003). Problems faced, lessons learnt, and costs incurred are discussed. A burns disaster plan drawing on lessons learnt from these attacks is presented. Thirty-one patients were treated at the SGH Burns Centre in three attacks (2002 Bali attack [n = 15], 2003 Jakarta attack [n = 14], and 2005 Bali attack [n = 2]). For the 2002 Bali attack, median age was 29 years (range 20 to 50 years), median percentage of total burn surface area (TBSA) was 29% (range 5% to 55%), and median abbreviated burn severity index (ABSI) was 6 (range 3 to 10). Eight of 15 patients were admitted to the intensive care unit. For the 2003 Jakarta attack, median age was 35 years (range 24 to 56 years), median percentage of TBSA was 10% (range 2% to 46%), and median ABSI was 4 (range 3 to 9). A large number of patients had other injuries. Problems faced included manpower issues, lack of bed space, shortage of blood products, and lack of cadaver skin. The changing nature of terror attacks mandates continued vigilance and disaster preparedness. The multidimensional burns patient, complicated by other injuries, is likely to become increasingly common. A burns disaster plan with emphasis on effective command, control, and communication as well as organisation of health care personnel following a 'team concept' will do much to ensure that the sudden onset of a crisis situation at an unexpected time does not overwhelm hospital manpower and resources.

  13. Managing burn victims of suicide bombing attacks: outcomes, lessons learnt, and changes made from three attacks in Indonesia

    PubMed Central

    Chim, Harvey; Yew, Woon Si; Song, Colin

    2007-01-01

    Introduction Terror attacks in Southeast Asia were almost nonexistent until the 2002 Bali bomb blast, considered the deadliest attack in Indonesian history. Further attacks in 2003 (Jakarta), 2004 (Jakarta), and 2005 (Bali) have turned terrorist attacks into an ever-present reality. Methods The authors reviewed medical charts of victims evacuated to the Singapore General Hospital (SGH) Burns Centre during three suicide attacks involving Bali (2002 and 2005) and the Jakarta Marriott hotel (2003). Problems faced, lessons learnt, and costs incurred are discussed. A burns disaster plan drawing on lessons learnt from these attacks is presented. Results Thirty-one patients were treated at the SGH Burns Centre in three attacks (2002 Bali attack [n = 15], 2003 Jakarta attack [n = 14], and 2005 Bali attack [n = 2]). For the 2002 Bali attack, median age was 29 years (range 20 to 50 years), median percentage of total burn surface area (TBSA) was 29% (range 5% to 55%), and median abbreviated burn severity index (ABSI) was 6 (range 3 to 10). Eight of 15 patients were admitted to the intensive care unit. For the 2003 Jakarta attack, median age was 35 years (range 24 to 56 years), median percentage of TBSA was 10% (range 2% to 46%), and median ABSI was 4 (range 3 to 9). A large number of patients had other injuries. Problems faced included manpower issues, lack of bed space, shortage of blood products, and lack of cadaver skin. Conclusion The changing nature of terror attacks mandates continued vigilance and disaster preparedness. The multidimensional burns patient, complicated by other injuries, is likely to become increasingly common. A burns disaster plan with emphasis on effective command, control, and communication as well as organisation of health care personnel following a 'team concept' will do much to ensure that the sudden onset of a crisis situation at an unexpected time does not overwhelm hospital manpower and resources. PMID:17274813

  14. Robustness analysis of interdependent networks under multiple-attacking strategies

    NASA Astrophysics Data System (ADS)

    Gao, Yan-Li; Chen, Shi-Ming; Nie, Sen; Ma, Fei; Guan, Jun-Jie

    2018-04-01

    The robustness of complex networks under attacks largely depends on the structure of a network and the nature of the attacks. Previous research on interdependent networks has focused on two types of initial attack: random attack and degree-based targeted attack. In this paper, a deliberate attack function is proposed, where six kinds of deliberate attacking strategies can be derived by adjusting the tunable parameters. Moreover, the robustness of four types of interdependent networks (BA-BA, ER-ER, BA-ER and ER-BA) with different coupling modes (random, positive and negative correlation) is evaluated under different attacking strategies. Interesting conclusions could be obtained. It can be found that the positive coupling mode can make the vulnerability of the interdependent network to be absolutely dependent on the most vulnerable sub-network under deliberate attacks, whereas random and negative coupling modes make the vulnerability of interdependent network to be mainly dependent on the being attacked sub-network. The robustness of interdependent network will be enhanced with the degree-degree correlation coefficient varying from positive to negative. Therefore, The negative coupling mode is relatively more optimal than others, which can substantially improve the robustness of the ER-ER network and ER-BA network. In terms of the attacking strategies on interdependent networks, the degree information of node is more valuable than the betweenness. In addition, we found a more efficient attacking strategy for each coupled interdependent network and proposed the corresponding protection strategy for suppressing cascading failure. Our results can be very useful for safety design and protection of interdependent networks.

  15. Continuous-variable quantum cryptography is secure against non-Gaussian attacks.

    PubMed

    Grosshans, Frédéric; Cerf, Nicolas J

    2004-01-30

    A general study of arbitrary finite-size coherent attacks against continuous-variable quantum cryptographic schemes is presented. It is shown that, if the size of the blocks that can be coherently attacked by an eavesdropper is fixed and much smaller than the key size, then the optimal attack for a given signal-to-noise ratio in the transmission line is an individual Gaussian attack. Consequently, non-Gaussian coherent attacks do not need to be considered in the security analysis of such quantum cryptosystems.

  16. ETIOLOGY OF YELLOW FEVER : X. COMPARATIVE IMMUNOLOGICAL STUDIES ON LEPTOSPIRA ICTEROIDES AND LEPTOSPIRA ICTEROHAEMOORRHAGIAE.

    PubMed

    Noguchi, H

    1920-01-31

    It has been previously reported that a filterable microorganism belonging to the genus Leptospira has been recovered from the blood or organs of human beings suffering from the disease known as yellow fever in Guayaquil, and that the organism, which has been termed Leptospira icteroides, induces in certain experimental animals the characteristic symptoms and lesions observed in the patients from whom it was isolated. It has also been previously shown that the serum from patients recovering from an attack of yellow fever in Guayaquil had the power to agglutinate and dissolve the organism when introduced into the peritoneal cavity of a normal guinea pig (Pfeiffer phenomenon). Moreover, the guinea pigs which had once been inoculated with the blood of yellow fever patients without succumbing to the infection, notwithstanding the fact that they had shown a definite febrile reaction after 4 to 5 days, were found to be refractory to a subsequent inoculation of a culture of Leptospira icteroides All these observations pointed to the possible relation of this organism to the disease known as yellow fever in Guayaquil. The demonstration of the filterability of the organism and the transmission of the infection with the same organism by Stegomyia calopus have further strengthened the probable etiological significance of the organism in yellow fever. It was by no means a simple problem to determine the relation existing between Leptospira icteroides and Leptospira icterohaemorrhagiae. An experiment reported in a previous paper seemed to justify the view that the two leptospiras are closely related but not identical, yet it was necessary to exhaust various other modes of differentiation before the distinction between them was firmly established. The present paper continues this phase of the inquiry in further detail. There have been taken up here the phenomena of agglutination, the reaction of Pfeiffer, complement fixation, the protective properties of various monovalent and polyvalent immune sera, and active immunity. As the result of experiments in connection with these immunity phenomena the following data are presented. Monovalent immune sera prepared by several successive injections in an animal naturally refractory to Leptospira icteroides possess the power to agglutinate in vitro not only the homologous strains, but also all other strains of icteroides tested. On the other hand, a slight effect, or none at all, has been observed when these immune sera have been mixed in vitro with various strains of Leptospira icterohaemorrhagiae. A similar relation exists between the monovalent anti-icterohaemorrhagiae sera and the various strains of Leptospira icteroides; that is, there is a slight agglutinating effect in some instances upon the icteroides strains, but it is never so strong as that occurring in tests against the icterohaehagiae strains. The Pfeiffer reaction gave a sharper differentiation between the two groups, for in most instances the phenomenon was specific for the group. There were occasional doubtful reactions, but not enough to warrant a confusion of the two groups. Polyvalent immune sera, one specific for icteroides, and the other for icterohaemorrhagiae, showed a high titer of neutralizing power for the cultures of the homologous groups. It was found, however, that the action of the sera is by no means absolutely specific, because the injection of a sufficient amount of the anti-icteroides serum apparently prevented a fatal outcome in a guinea pig inoculated with multiple minimum lethal doses of a culture of Leptospira icterohaemorrhagiae, and vice versa. The specificity of the serum was demonstrated only when it was used in smaller quantities. More or less specificity was shown by the complement fixation reaction, but it was not absolute. Weak fixation occurred when the anti-icteroides serum was mixed with one or the other of the icterohaemorrhagiae strains and vice versa, and strong fixation occurred only when the antiserum was mixed with one of the icteroides strains. The question naturally arises whether or not this apparent specificity is due to the homology of the serum and not altogether to a difference in genus of the strains. In other words, it is justifiable to question whether all these variations in the degree of intensity of the reaction are not due to strain variations of the same genus. This question is not finally settled by the present investigation, in which only four icteroides and nine icterohaemorrhagiae strains have been carefully studied. Nevertheless, on the basis of the findings with these thirteen strains, it seems probable that Leptospira icteroides and Leptospira icterohaemorrhagiae are closely allied but are nevertheless distinct in their immunological reactions. Perhaps the difference between the two may amount to that between subspecies or races. It has been pointed out earlier that the pathogenicity of the two is also distinct, inasmuch as icteroides produces chiefly icterus and nephritis and icterohaemorrhagiae hemorrhage and nephritis, the icterus being less and the hemorrhage more prominent in the evolution of the latter infection. In the study of active immunity-exclusive of vaccination-difficulty has been experienced in the evaluation of the results, owing to the existence of natural resistance to infection among guinea pigs. A guinea pig may recover from the inoculation of Leptospira icteroides and then resist a subsequent inoculation with a virulent strain of Leptospira icterohaemorrhagiae, a condition simulating that brought about by the identity of the two organisms. However, the refractoriness of such an animal to icterohaemorrhagiae may be due to its natural immunity to it. In the present study, therefore, only those guinea pigs were selected which had reacted typically-though in mild degree -to the icteroides infection, in order to determine whether they were subsequently immune to the inoculation of icterohaemorrhagiae. Indeed, by this mode of experimentation it was found that the guinea pigs which had once passed through an attack of the icteroides infection were absolutely immune to a second infection with the same organism but reacted severely and sometimes fatally to a later inoculation of icterohaemorrhagiae. Although there were a number of instances in which a previous infection with icteroides did not confer any perceptible immunity upon the guinea pigs against icterohaemorrhagiae, another group of guinea pigs showed a considerable resistance to the icterohaemorrhagiae infection as compared with those which had never been inoculated with icteroides. There is not much doubt, therefore, that an icteroides attack brings about, in some instances at least, a certain degree of resistance to the icterohaemorrhagiae infection. Hence the study of the phenomena of active immunity strongly indicates that icteroides is closely related immunologically to icterohaemorrhagiae.

  17. A comparison of the nature and correlates of panic attacks in the context of Panic Disorder and Social Anxiety Disorder.

    PubMed

    Brown, Lily A; LeBeau, Richard; Liao, Betty; Niles, Andrea N; Glenn, Daniel; Craske, Michelle G

    2016-01-30

    Panic attacks occurring outside of Panic Disorder are not well-understood despite their inclusion as a diagnostic specifier in the Diagnostic and Statistical Manual for Mental Disorders (DSM-5). This study compares panic attacks in the context of Panic Disorder compared to social anxiety in terms of their symptom frequency, severity, and clinical correlates. Participants (n=404) were interviewed using the Anxiety Disorders Interview Schedule (ADIS-IV-L; Brown et al., 1994), from which we analyzed interviewer ratings of panic attacks and panic attack symptoms, as well as other demographic and clinical characteristics. Panic attacks in the context of Panic Disorder were characterized by a greater number and severity of symptoms compared to panic attacks in the context of Social Anxiety Disorder, and were associated with a history of traumatization, inpatient psychiatric treatment, and benzodiazepine use. Social anxiety panic attacks were associated with reduced physical health concerns. Cognitive panic attack symptoms were more prevalent in Panic Disorder and were associated with a variety of poor clinical correlates. Panic attacks in the context of Panic Disorder are more severe than those in social anxiety, and this may be driven by cognitive disturbances during those attacks. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.

  18. Heart Attack Recovery FAQs

    MedlinePlus

    ... recommendations to make a full recovery. View an animation of a heart attack . Heart Attack Recovery Questions ... Support Network Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...

  19. Detecting Distributed SQL Injection Attacks in a Eucalyptus Cloud Environment

    NASA Technical Reports Server (NTRS)

    Kebert, Alan; Barnejee, Bikramjit; Solano, Juan; Solano, Wanda

    2013-01-01

    The cloud computing environment offers malicious users the ability to spawn multiple instances of cloud nodes that are similar to virtual machines, except that they can have separate external IP addresses. In this paper we demonstrate how this ability can be exploited by an attacker to distribute his/her attack, in particular SQL injection attacks, in such a way that an intrusion detection system (IDS) could fail to identify this attack. To demonstrate this, we set up a small private cloud, established a vulnerable website in one instance, and placed an IDS within the cloud to monitor the network traffic. We found that an attacker could quite easily defeat the IDS by periodically altering its IP address. To detect such an attacker, we propose to use multi-agent plan recognition, where the multiple source IPs are considered as different agents who are mounting a collaborative attack. We show that such a formulation of this problem yields a more sophisticated approach to detecting SQL injection attacks within a cloud computing environment.

  20. Sensitivity to carbon dioxide in subjects with a single lifetime panic attack: possible clinical "bedside" predictive test for panic disorder after a first attack.

    PubMed

    Berzak, Elina; Reznik, Mila; Narsia, Oxana; Benjamin, Jonathan

    2004-01-01

    There is currently no way of knowing whether a patient who has recently had a single panic attack has incipient panic disorder. Sensitivity to carbon dioxide (CO2) is lower in healthy volunteers than in panic disorder patients. If this is also true of people who experience a single lifetime panic attack, it could be used as a prognostic test. Subjects with a single lifetime panic attack and subjects with panic disorder received an inhalation of 35% CO2. Subjects completed the panic symptoms scale (PSS), and also stated whether they considered that they had experienced an attack. None of 14 subjects with a single lifetime panic attack, compared to 7 of 17 subjects with panic disorder (P=.009), had an attack. The PSS also distinguished between the groups. The 35% CO2 challenge warrants further investigation as a predictive test after a first panic attack.

  1. Exploiting Small Leakages in Masks to Turn a Second-Order Attack into a First-Order Attack and Improved Rotating Substitution Box Masking with Linear Code Cosets.

    PubMed

    DeTrano, Alexander; Karimi, Naghmeh; Karri, Ramesh; Guo, Xiaofei; Carlet, Claude; Guilley, Sylvain

    2015-01-01

    Masking countermeasures, used to thwart side-channel attacks, have been shown to be vulnerable to mask-extraction attacks. State-of-the-art mask-extraction attacks on the Advanced Encryption Standard (AES) algorithm target S-Box recomputation schemes but have not been applied to scenarios where S-Boxes are precomputed offline. We propose an attack targeting precomputed S-Boxes stored in nonvolatile memory. Our attack targets AES implemented in software protected by a low entropy masking scheme and recovers the masks with 91% success rate. Recovering the secret key requires fewer power traces (in fact, by at least two orders of magnitude) compared to a classical second-order attack. Moreover, we show that this attack remains viable in a noisy environment or with a reduced number of leakage points. Eventually, we specify a method to enhance the countermeasure by selecting a suitable coset of the masks set.

  2. The effect of nursing professional pay structures and pay levels on hospitals' heart attack outcomes.

    PubMed

    Brown, Mark P

    2006-01-01

    The effect of nursing professionals (i.e., nurse aid/orderly, licensed practical nurse, registered nurse) pay structures and pay levels on hospitals risk-adjusted heart attack outcomes was determined. Operationalizing hospitals' heart attack outcomes as their thirty-day risk-adjusted mortality rates, a positive curvilinear relation is hypothesized between pay dispersion and hospitals' heart attack outcomes, whereas a direct relation is hypothesized between pay level and hospitals' heart attack outcomes. Pay level is also hypothesized as a moderator of the relation between pay dispersion and hospitals' heart attack outcomes. Using a sample of 138 California hospitals, support is not found for either the curvilinear relation between hospitals' nursing professionals pay dispersion and hospitals' heart attack outcomes, or the direct relation between nursing professionals' pay level and hospitals' heart attack outcomes. Support is found for the moderation hypothesis in which nursing professionals' pay level moderates the relation between hospitals' nursing professionals pay dispersion and hospitals' heart attack outcomes. Implications for practice are discussed in light of the study's results.

  3. Exploiting Small Leakages in Masks to Turn a Second-Order Attack into a First-Order Attack and Improved Rotating Substitution Box Masking with Linear Code Cosets

    PubMed Central

    DeTrano, Alexander; Karimi, Naghmeh; Karri, Ramesh; Guo, Xiaofei; Carlet, Claude; Guilley, Sylvain

    2015-01-01

    Masking countermeasures, used to thwart side-channel attacks, have been shown to be vulnerable to mask-extraction attacks. State-of-the-art mask-extraction attacks on the Advanced Encryption Standard (AES) algorithm target S-Box recomputation schemes but have not been applied to scenarios where S-Boxes are precomputed offline. We propose an attack targeting precomputed S-Boxes stored in nonvolatile memory. Our attack targets AES implemented in software protected by a low entropy masking scheme and recovers the masks with 91% success rate. Recovering the secret key requires fewer power traces (in fact, by at least two orders of magnitude) compared to a classical second-order attack. Moreover, we show that this attack remains viable in a noisy environment or with a reduced number of leakage points. Eventually, we specify a method to enhance the countermeasure by selecting a suitable coset of the masks set. PMID:26491717

  4. The Icatibant Outcome Survey: treatment of laryngeal angioedema attacks

    PubMed Central

    Aberer, Werner; Bouillet, Laurence; Caballero, Teresa; Maurer, Marcus; Fabien, Vincent; Zanichelli, Andrea

    2016-01-01

    Objective To characterize the management and outcomes of life-threatening laryngeal attacks of hereditary angioedema (HAE) treated with icatibant in the observational Icatibant Outcome Survey (NCT01034969) registry. Methods This retrospective analysis was based on data from patients with HAE type I/II who received healthcare professional-administered or self-administered icatibant to treat laryngeal attacks between September 2008 and May 2013. Results Twenty centers in seven countries contributed data. Overall, 42 patients with HAE experienced 67 icatibant-treated laryngeal attacks. Icatibant was self-administered for 62.3% of attacks (healthcare professional-administered, 37.7%). One icatibant injection was used for 87.9% of attacks, with rescue or concomitant medication used for 9.0%. The median time to treatment was 2.0 h (n=31 attacks) and the median time to resolution was 6.0 h (n=35 attacks). Conclusions This analysis describes successful use of icatibant for the treatment of laryngeal HAE attacks in a real-world setting. PMID:27116379

  5. Heart Attack

    MedlinePlus

    Each year almost 800,000 Americans have a heart attack. A heart attack happens when blood flow to the heart suddenly ... it's important to know the symptoms of a heart attack and call 9-1-1 if you or ...

  6. Microvascular Angina

    MedlinePlus

    ... to the Terms and Conditions and Privacy Policy Heart Attack Tools & Resources My Cardiac Coach What Is a ... Heart Attack Warning Signs: Patient sheet | Infographic | Quiz Heart Attack • Home • About Heart Attacks Acute Coronary Syndrome (ACS) ...

  7. Using the Domain Name System to Thwart Automated Client-Based Attacks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Taylor, Curtis R; Shue, Craig A

    2011-09-01

    On the Internet, attackers can compromise systems owned by other people and then use these systems to launch attacks automatically. When attacks such as phishing or SQL injections are successful, they can have negative consequences including server downtime and the loss of sensitive information. Current methods to prevent such attacks are limited in that they are application-specific, or fail to block attackers. Phishing attempts can be stopped with email filters, but if the attacker manages to successfully bypass these filters, then the user must determine if the email is legitimate or not. Unfortunately, they often are unable to do so.more » Since attackers have a low success rate, they attempt to compensate for it in volume. In order to have this high throughput, attackers take shortcuts and break protocols. We use this knowledge to address these issues by implementing a system that can detect malicious activity and use it to block attacks. If the client fails to follow proper procedure, they can be classified as an attacker. Once an attacker has been discovered, they will be isolated and monitored. This can be accomplished using existing software in Ubuntu Linux applications, along with our custom wrapper application. After running the system and seeing its performance on three popular Web browsers Chromium, Firefox and Internet Explorer as well as two popular email clients, Thunderbird and Evolution, we found that not only is this system conceivable, it is effective and has low overhead.« less

  8. Incidence and impact of dog attacks on guide dogs in the UK.

    PubMed

    Brooks, A; Moxon, R; England, G C W

    2010-06-19

    In a retrospective survey, researchers identified 100 incidents of attacks on guide dogs by other dogs. These were reviewed in order to determine the number, severity and impact on the handler and dog, and the characteristics of the aggressors and victims. During the study period there were more than three attacks reported each month, with 61 per cent of the attacks being upon dogs that were in harness and working with an owner or trainer. The majority of the dogs that were attacked were male (62 per cent), and the breeds that were over-represented (relative to their prevalence in the general guide dog population) were the labrador and the golden retriever x flat-coated retriever crossbreed. Most of the attacks occurred in public places between 09.00 and 15.00 and the majority (61 per cent) of the attacking dogs were off the lead at the time of the attack. Thirty-eight per cent of the attacking dogs were of bull breeds, which were over-represented among attackers compared with the proportion of this breed type in the general dog population. Veterinary attention was sought after 41 per cent of the attacks, and in 19 per cent of instances there was injury to the handler or to a member of the public. The attacks were reported to have affected the working performance and behaviour of the victim dog in 45 per cent of the instances, and two dogs had to be subsequently withdrawn from working as guide dogs.

  9. Environmental factors affect the activity of biocontrol agents against ochratoxigenic Aspergillus carbonarius on wine grape.

    PubMed

    De Curtis, F; de Felice, D V; Ianiri, G; De Cicco, V; Castoria, R

    2012-09-17

    The influence of temperature and relative humidity (RH) on the activity of three biocontrol agents-the yeast Metschnikowia pulcherrima LS16 and two strains of the yeast-like fungus Aureobasidium pullulans LS30 and AU34-2-against infection by A. carbonarius and ochratoxin A (OTA) accumulation in wine grape berries was investigated in lab-scale experiments. The presence of wounds on grape skin dramatically favored infection of berries by A. carbonarius strain A1102, since unwounded berries showed very low levels of infection at all conditions of RH and temperature tested. Artificially wounded berries pre-treated with the biocontrol agents were inoculated with the ochratoxigenic A. carbonarius strain A1102 and were incubated for 5 days at two levels of RH (60% and 100%) and three different temperatures (20, 25 and 30 °C). The three biocontrol agents were able to prevent infections at 60% RH and 20 °C. At 60% RH and 25 °C only strain AU34-2 achieved some protection on day 5, whereas at 30 °C a limited biocontrol efficacy was evident only up to day 2. At 100% RH, LS16, LS30 and AU34-2 showed effective protection of grape berries at 20 °C until the 5th day of incubation. The three biocontrol agents achieved significant protection at higher temperatures only until the 2nd day after the beginning of the experiment: all three strains at 25 °C, and only strain LS16 at 30 °C. After 5 days, the three biocontrol agents were able to significantly reduce the level of OTA in berries at all the conditions tested. This occurred even when protection from infection was not significant, except at 30 °C and 100% of RH for all the three strains, and at 25 °C and 100% of RH for strain LS16. The biocontrol agents displayed a higher rate of colonization on grape berries at 20 and 25 °C than at 30 °C. The higher value of RH (100%) appeared to increase the rate of colonization, in particular at 20 and 25 °C. Taken together, our results emphasize the significant influence of environmental factors on the effectiveness of biocontrol against A. carbonarius as well as on OTA contamination in wine grape berries, and the need for biocontrol agents that can cope with the environmental conditions that are conducive to attack by A. carbonarius. Copyright © 2012 Elsevier B.V. All rights reserved.

  10. Robustness and structure of complex networks

    NASA Astrophysics Data System (ADS)

    Shao, Shuai

    This dissertation covers the two major parts of my PhD research on statistical physics and complex networks: i) modeling a new type of attack -- localized attack, and investigating robustness of complex networks under this type of attack; ii) discovering the clustering structure in complex networks and its influence on the robustness of coupled networks. Complex networks appear in every aspect of our daily life and are widely studied in Physics, Mathematics, Biology, and Computer Science. One important property of complex networks is their robustness under attacks, which depends crucially on the nature of attacks and the structure of the networks themselves. Previous studies have focused on two types of attack: random attack and targeted attack, which, however, are insufficient to describe many real-world damages. Here we propose a new type of attack -- localized attack, and study the robustness of complex networks under this type of attack, both analytically and via simulation. On the other hand, we also study the clustering structure in the network, and its influence on the robustness of a complex network system. In the first part, we propose a theoretical framework to study the robustness of complex networks under localized attack based on percolation theory and generating function method. We investigate the percolation properties, including the critical threshold of the phase transition pc and the size of the giant component Pinfinity. We compare localized attack with random attack and find that while random regular (RR) networks are more robust against localized attack, Erdoḧs-Renyi (ER) networks are equally robust under both types of attacks. As for scale-free (SF) networks, their robustness depends crucially on the degree exponent lambda. The simulation results show perfect agreement with theoretical predictions. We also test our model on two real-world networks: a peer-to-peer computer network and an airline network, and find that the real-world networks are much more vulnerable to localized attack compared with random attack. In the second part, we extend the tree-like generating function method to incorporating clustering structure in complex networks. We study the robustness of a complex network system, especially a network of networks (NON) with clustering structure in each network. We find that the system becomes less robust as we increase the clustering coefficient of each network. For a partially dependent network system, we also find that the influence of the clustering coefficient on network robustness decreases as we decrease the coupling strength, and the critical coupling strength qc, at which the first-order phase transition changes to second-order, increases as we increase the clustering coefficient.

  11. Phenomenology of panic attacks: a descriptive study of panic disorder patients' self-reports.

    PubMed

    Aronson, T A; Logue, C M

    1988-01-01

    The phenomenology of panic disorder and panic attacks was systematically assessed in 46 consecutive patients. The results suggest that DSM-III criteria include several symptoms that are not frequently present during a panic attack and that DSM-III's characterization of a panic attack is imprecise and misleading. Panic attacks were found to vary in intensity, frequency, spontaneity, and associated symptoms. A panic attack typically presents as a unified symptom complex of psychic anxiety and multiple somatic symptoms in multiple body systems. It occurs in a crescendolike pattern, is self-limited, and often leaves the subject weak or shaken. The temporal course as much as the symptomatic presentation defines a panic attack.

  12. Finite Energy and Bounded Attacks on Control System Sensor Signals

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Djouadi, Seddik M; Melin, Alexander M; Ferragut, Erik M

    Control system networks are increasingly being connected to enterprise level networks. These connections leave critical industrial controls systems vulnerable to cyber-attacks. Most of the effort in protecting these cyber-physical systems (CPS) has been in securing the networks using information security techniques and protection and reliability concerns at the control system level against random hardware and software failures. However, besides these failures the inability of information security techniques to protect against all intrusions means that the control system must be resilient to various signal attacks for which new analysis and detection methods need to be developed. In this paper, sensor signalmore » attacks are analyzed for observer-based controlled systems. The threat surface for sensor signal attacks is subdivided into denial of service, finite energy, and bounded attacks. In particular, the error signals between states of attack free systems and systems subject to these attacks are quantified. Optimal sensor and actuator signal attacks for the finite and infinite horizon linear quadratic (LQ) control in terms of maximizing the corresponding cost functions are computed. The closed-loop system under optimal signal attacks are provided. Illustrative numerical examples are provided together with an application to a power network with distributed LQ controllers.« less

  13. Multi-Layer Approach for the Detection of Selective Forwarding Attacks

    PubMed Central

    Alajmi, Naser; Elleithy, Khaled

    2015-01-01

    Security breaches are a major threat in wireless sensor networks (WSNs). WSNs are increasingly used due to their broad range of important applications in both military and civilian domains. WSNs are prone to several types of security attacks. Sensor nodes have limited capacities and are often deployed in dangerous locations; therefore, they are vulnerable to different types of attacks, including wormhole, sinkhole, and selective forwarding attacks. Security attacks are classified as data traffic and routing attacks. These security attacks could affect the most significant applications of WSNs, namely, military surveillance, traffic monitoring, and healthcare. Therefore, there are different approaches to detecting security attacks on the network layer in WSNs. Reliability, energy efficiency, and scalability are strong constraints on sensor nodes that affect the security of WSNs. Because sensor nodes have limited capabilities in most of these areas, selective forwarding attacks cannot be easily detected in networks. In this paper, we propose an approach to selective forwarding detection (SFD). The approach has three layers: MAC pool IDs, rule-based processing, and anomaly detection. It maintains the safety of data transmission between a source node and base station while detecting selective forwarding attacks. Furthermore, the approach is reliable, energy efficient, and scalable. PMID:26610499

  14. Cougar attacks on children: injury patterns and treatment.

    PubMed

    Kadesky, K M; Manarey, C; Blair, G K; Murphy, J J; Verchere, C; Atkinson, K

    1998-06-01

    Cougar attacks on humans appear to be on the rise. A review of all attacks on children was performed to determine the method of attack and injury patterns so that a treatment regimen as well as possible preventative measures could be determined. A review of all attacks, including attacks on children, was performed, including three recent attacks treated at our institution. Situation, adult supervision, patient age, injuries recorded, survival, and mode of attack, if known, were reviewed. There were 50 documented attacks on children with a 25% fatality rate. Most children were not alone at the time of the attack (92%), and in many instances adult supervision was present or nearby. Severe head and neck lacerations along with puncture wounds were the most common injury. Examples of typical cervical injuries include a nonfatal vertebral artery injury, phrenic nerve injury, a fatal internal carotid artery injury, and a fatal cervical spine injury. The cougar was rabid in two cases. Pasteurella resulted in late infections in two patients. Based on the pattern of injuries, the authors recommend aggressive evaluation for occult cervical injuries as well as surgical debridement. Antibiotics should cover oropharyngeal flora including Pasteurella multocida. Rabies prophylaxis is indicated. Adult supervision in wilderness areas is not necessarily protective.

  15. Multi-Layer Approach for the Detection of Selective Forwarding Attacks.

    PubMed

    Alajmi, Naser; Elleithy, Khaled

    2015-11-19

    Security breaches are a major threat in wireless sensor networks (WSNs). WSNs are increasingly used due to their broad range of important applications in both military and civilian domains. WSNs are prone to several types of security attacks. Sensor nodes have limited capacities and are often deployed in dangerous locations; therefore, they are vulnerable to different types of attacks, including wormhole, sinkhole, and selective forwarding attacks. Security attacks are classified as data traffic and routing attacks. These security attacks could affect the most significant applications of WSNs, namely, military surveillance, traffic monitoring, and healthcare. Therefore, there are different approaches to detecting security attacks on the network layer in WSNs. Reliability, energy efficiency, and scalability are strong constraints on sensor nodes that affect the security of WSNs. Because sensor nodes have limited capabilities in most of these areas, selective forwarding attacks cannot be easily detected in networks. In this paper, we propose an approach to selective forwarding detection (SFD). The approach has three layers: MAC pool IDs, rule-based processing, and anomaly detection. It maintains the safety of data transmission between a source node and base station while detecting selective forwarding attacks. Furthermore, the approach is reliable, energy efficient, and scalable.

  16. Incidence and impact of dog attacks on guide dogs in the UK: an update.

    PubMed

    Moxon, R; Whiteside, H; England, G C W

    2016-04-09

    Data on dog attacks on Guide Dogs' stock were reviewed to investigate the characteristics of the attacks. An average of 11.2 attacks occurred each month. Nearly all of the attacks occurred in public areas, 68.4 per cent of victim dogs were qualified guide dogs and 55.5 per cent of victim dogs were working in harness when they were attacked. Guide Dogs' stock were injured in 43.2 per cent of attacks and veterinary costs for attacks were estimated at £34,514.30. Over 40 per cent of qualified guide dogs' working ability was affected and >20 per cent of qualified guide dogs required some time off from working after a dog attack. Twenty dogs were permanently withdrawn from the Guide Dogs' programme as a result of dog attacks, 13 of which were qualified and working with guide dog owners at the time of the withdrawal; this resulted in a financial cost of >£600,000 to the charity. More importantly perhaps, temporary and permanent withdrawals have a significant impact upon the mobility and independence of guide dog owners and in many cases significantly impacted their emotional well-being. British Veterinary Association.

  17. Childhood internalizing and externalizing problems predict the onset of clinical panic attacks over adolescence: the TRAILS study.

    PubMed

    Mathyssek, Christina M; Olino, Thomas M; Verhulst, Frank C; van Oort, Floor V A

    2012-01-01

    Panic attacks are a source of individual suffering and are an independent risk factor for later psychopathology. However, much less is known about risk factors for the development of panic attacks, particularly during adolescence when the incidence of panic attacks increases dramatically. We examined whether internalizing and externalizing problems in childhood predict the onset of panic attacks in adolescence. This study is part of the TRacking Adolescents' Individual Lives Survey (TRAILS), a Dutch longitudinal population cohort study (N = 1,584). Internalizing and Externalizing Problems were collected using the Youth Self-Report (YSR) and the parent-report Child Behavior Checklist (CBCL) at baseline (age 10-12). At age 18-20, DSM-IV defined panic attacks since baseline were assessed with the Composite International Diagnostic Interview (CIDI). We investigated whether early adolescent Internalizing and Externalizing Problems predicted panic attacks between ages 10-20 years, using survival analysis in univariate and multivariate models. There were N = 314 (19.8%) cases who experienced at least one DSM-IV defined panic attack during adolescence and N = 18 (1.2%) who developed panic disorder during adolescence. In univariate analyses, CBCL Total Problems, Internalizing Problems and three of the eight syndrome scales predicted panic attack onset, while on the YSR all broad-band problem scales and each narrow-band syndrome scale predicted panic attack onset. In multivariate analyses, CBCL Social Problems (HR 1.19, p<.05), and YSR Thought Problems (HR 1.15, p<.05) and Social Problems (HR 1.26, p<.01) predicted panic attack onset. Risk indicators of panic attack include the wide range of internalizing and externalizing problems. Yet, when adjusted for co-occurring problem behaviors, Social Problems were the most consistent risk factor for panic attack onsets in adolescence.

  18. Countermeasures for unintentional and intentional video watermarking attacks

    NASA Astrophysics Data System (ADS)

    Deguillaume, Frederic; Csurka, Gabriela; Pun, Thierry

    2000-05-01

    These last years, the rapidly growing digital multimedia market has revealed an urgent need for effective copyright protection mechanisms. Therefore, digital audio, image and video watermarking has recently become a very active area of research, as a solution to this problem. Many important issues have been pointed out, one of them being the robustness to non-intentional and intentional attacks. This paper studies some attacks and proposes countermeasures applied to videos. General attacks are lossy copying/transcoding such as MPEG compression and digital/analog (D/A) conversion, changes of frame-rate, changes of display format, and geometrical distortions. More specific attacks are sequence edition, and statistical attacks such as averaging or collusion. Averaging attack consists of averaging locally consecutive frames to cancel the watermark. This attack works well for schemes which embed random independent marks into frames. In the collusion attack the watermark is estimated from single frames (based on image denoising), and averaged over different scenes for better accuracy. The estimated watermark is then subtracted from each frame. Collusion requires that the same mark is embedded into all frames. The proposed countermeasures first ensures robustness to general attacks by spread spectrum encoding in the frequency domain and by the use of an additional template. Secondly, a Bayesian criterion, evaluating the probability of a correctly decoded watermark, is used for rejection of outliers, and to implement an algorithm against statistical attacks. The idea is to embed randomly chosen marks among a finite set of marks, into subsequences of videos which are long enough to resist averaging attacks, but short enough to avoid collusion attacks. The Bayesian criterion is needed to select the correct mark at the decoding step. Finally, the paper presents experimental results showing the robustness of the proposed method.

  19. Unstable Angina

    MedlinePlus

    ... Women This content was last reviewed July 2015. Heart Attack • Home • About Heart Attacks Acute Coronary Syndrome (ACS) ... Recovery FAQs • Heart Attack Tools & Resources • Support Network Heart Attack Tools & Resources My Cardiac Coach What Is a ...

  20. Acute Coronary Syndrome

    MedlinePlus

    ... angina? This content was last reviewed July 2015. Heart Attack • Home • About Heart Attacks Acute Coronary Syndrome (ACS) ... Recovery FAQs • Heart Attack Tools & Resources • Support Network Heart Attack Tools & Resources My Cardiac Coach What Is a ...

  1. Analysis of characteristics associated with reinjection of icatibant: Results from the icatibant outcome survey.

    PubMed

    Longhurst, Hilary J; Aberer, Werner; Bouillet, Laurence; Caballero, Teresa; Fabien, Vincent; Zanichelli, Andrea; Maurer, Marcus

    2015-01-01

    Phase 3 icatibant trials showed that most hereditary angioedema (HAE) (C1 inhibitor deficiency) acute attacks were treated successfully with one injection of icatibant, a selective bradykinin B2 receptor antagonist. We conducted a post hoc analysis of icatibant reinjection for HAE type I and II attacks in a real-world setting by using data from the Icatibant Outcome Survey, an ongoing observational study that monitors the safety and effectiveness of icatibant treatment. Descriptive retrospective analyses of icatibant reinjection were performed on Icatibant Outcome Survey data (February 2008 to December 2012). New attacks were defined as the onset of new symptoms after full resolution of the previous attack. Potential associations between the patient and attack characteristics and reinjection were explored by using logistic regression analysis. Icatibant was administered for 652 attacks in 170 patients with HAE type I or II. Most attacks (89.1%) were treated with a single icatibant injection. For attacks that required two or three injections, the second injection was given a median of 11.0 hours after the first injection, with 90.4% of second injections administered ≥6 hours after the first injection. Time to resolution and attack duration were significantly longer for two or three injections versus one icatibant injection (p < 0.0001 and p < 0.05, respectively). Multivariate logistic regression analysis identified sex, attack severity, and laryngeal attacks as significantly correlated with reinjection (all p ≤ 0.05). These factors did not remain predictors for reinjection when two outlier patients with distinct patterns of icatibant use were excluded. In this real-world setting, most HAE attacks resolved with one icatibant injection. There was no distinct profile for patients or attacks that required reinjection when outliers with substantially different patterns of use were excluded. Because new attacks were not distinguished from the recurrence of symptoms, reinjection rates may be slightly higher than shown here. Clinical trial identifier: NCT01034969.

  2. Enhanced diffie-hellman algorithm for reliable key exchange

    NASA Astrophysics Data System (ADS)

    Aryan; Kumar, Chaithanya; Vincent, P. M. Durai Raj

    2017-11-01

    The Diffie -Hellman is one of the first public-key procedure and is a certain way of exchanging the cryptographic keys securely. This concept was introduced by Ralph Markel and it is named after Whitfield Diffie and Martin Hellman. Sender and Receiver make a common secret key in Diffie-Hellman algorithm and then they start communicating with each other over the public channel which is known to everyone. A number of internet services are secured by Diffie -Hellman. In Public key cryptosystem, the sender has to trust while receiving the public key of the receiver and vice-versa and this is the challenge of public key cryptosystem. Man-in-the-Middle attack is very much possible on the existing Diffie-Hellman algorithm. In man-in-the-middle attack, the attacker exists in the public channel, the attacker receives the public key of both sender and receiver and sends public keys to sender and receiver which is generated by his own. This is how man-in-the-middle attack is possible on Diffie-Hellman algorithm. Denial of service attack is another attack which is found common on Diffie-Hellman. In this attack, the attacker tries to stop the communication happening between sender and receiver and attacker can do this by deleting messages or by confusing the parties with miscommunication. Some more attacks like Insider attack, Outsider attack, etc are possible on Diffie-Hellman. To reduce the possibility of attacks on Diffie-Hellman algorithm, we have enhanced the Diffie-Hellman algorithm to a next level. In this paper, we are extending the Diffie -Hellman algorithm by using the concept of the Diffie -Hellman algorithm to get a stronger secret key and that secret key is further exchanged between the sender and the receiver so that for each message, a new secret shared key would be generated. The second secret key will be generated by taking primitive root of the first secret key.

  3. The panic attack-posttraumatic stress disorder model: applicability to orthostatic panic among Cambodian refugees.

    PubMed

    Hinton, Devon E; Hofmann, Stefan G; Pitman, Roger K; Pollack, Mark H; Barlow, David H

    2008-01-01

    This article examines the ability of the panic attack-posttraumatic stress disorder (PTSD) model to predict how panic attacks are generated and how panic attacks worsen PTSD. The article does so by determining the validity of the panic attack-PTSD model in respect to one type of panic attack among traumatized Cambodian refugees: orthostatic panic (OP) attacks (i.e. panic attacks generated by moving from lying or sitting to standing). Among Cambodian refugees attending a psychiatric clinic, the authors conducted two studies to explore the validity of the panic attack-PTSD model as applied to OP patients (i.e. patients with at least one episode of OP in the previous month). In Study 1, the panic attack-PTSD model accurately indicated how OP is seemingly generated: among OP patients (N = 58), orthostasis-associated flashbacks and catastrophic cognitions predicted OP severity beyond a measure of anxious-depressive distress (Symptom Checklist-90-R subscales), and OP severity significantly mediated the effect of anxious-depressive distress on Clinician-Administered PTSD Scale severity. In Study 2, as predicted by the panic attack-PTSD model, OP had a mediational role in respect to the effect of treatment on PTSD severity: among Cambodian refugees with PTSD and comorbid OP who participated in a cognitive behavioural therapy study (N = 56), improvement in PTSD severity was partially mediated by improvement in OP severity.

  4. Epileptic negative drop attacks in atypical benign partial epilepsy: a neurophysiological study.

    PubMed

    Hirano, Yoshiko; Oguni, Hirokazu; Osawa, Makiko

    2009-03-01

    We conducted a computer-assisted polygraphic analysis of drop attacks in a child with atypical benign partial epilepsy (ABPE) to investigate neurophysiological characteristics. The patient was a six-year two-month-old girl, who had started to have focal motor seizures, later combined with daily epileptic negative myoclonus (ENM) and drop attacks, causing multiple injuries. We studied episodes of ENM and drop attacks using video-polygraphic and computer-assisted back-averaging analysis. A total of 12 ENM episodes, seven involving the left arm (ENMlt) and five involving both arms (ENMbil), and five drop attacks were captured for analysis. All episodes were time-locked to spike-and-wave complexes (SWC) arising from both centro-temporo-parietal (CTP) areas. The latency between the onset of SWC and ENMlt, ENMbil, and drop attacks reached 68 ms, 42 ms, and 8 ms, respectively. The height of the spike as well as the slow-wave component of SWC for drop attacks were significantly larger than that for both ENMlt and ENMbil (p < 0.05). Drop attacks were considered to be epileptic negative myoclonus involving not only upper proximal but also axial muscles, causing the body to fall. Thus, drop attacks in ABPE are considered to be epileptic negative drop attacks arising from bilateral CTP foci and differ from drop attacks of a generalized origin seen in Lennox-Gastaut syndrome and myoclonic-astatic epilepsy.

  5. Seven Deadliest Network Attacks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Prowell, Stacy J; Borkin, Michael; Kraus, Robert

    2010-05-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you need "Seven Deadliest Network Attacks". This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Denial of Service; War Dialing; Penetration 'Testing'; Protocol Tunneling; Spanning Tree Attacks; Man-in-the-Middle; and, Password Replay. Knowledge is power, findmore » out about the most dominant attacks currently waging war on computers and networks globally. Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how. Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable.« less

  6. Dynamic defense and network randomization for computer systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chavez, Adrian R.; Stout, William M. S.; Hamlet, Jason R.

    The various technologies presented herein relate to determining a network attack is taking place, and further to adjust one or more network parameters such that the network becomes dynamically configured. A plurality of machine learning algorithms are configured to recognize an active attack pattern. Notification of the attack can be generated, and knowledge gained from the detected attack pattern can be utilized to improve the knowledge of the algorithms to detect a subsequent attack vector(s). Further, network settings and application communications can be dynamically randomized, wherein artificial diversity converts control systems into moving targets that help mitigate the early reconnaissancemore » stages of an attack. An attack(s) based upon a known static address(es) of a critical infrastructure network device(s) can be mitigated by the dynamic randomization. Network parameters that can be randomized include IP addresses, application port numbers, paths data packets navigate through the network, application randomization, etc.« less

  7. Automatic Inference of Cryptographic Key Length Based on Analysis of Proof Tightness

    DTIC Science & Technology

    2016-06-01

    within an attack tree structure, then expand attack tree methodology to include cryptographic reductions. We then provide the algorithms for...maintaining and automatically reasoning about these expanded attack trees . We provide a software tool that utilizes machine-readable proof and attack metadata...and the attack tree methodology to provide rapid and precise answers regarding security parameters and effective security. This eliminates the need

  8. Cyber Signal/Noise Characteristics and Sensor Models for Early Cyber Indications and Warning

    DTIC Science & Technology

    2005-09-01

    investigating and simulating attack scenarios. The sensors are, in effect , mathematical functions. These functions range from simple functions of...172 8.1.2 Examine each attack scenario or case to derive the cause- effect network for the attack scenario...threat profiles............................ 174 8.1.4 Develop attack profiles by enlarging the cause- effect network of each attack scenario with

  9. Attack Coverage in High-Level Men’s Volleyball: Organization on the Edge of Chaos?

    PubMed Central

    Laporta, Lorenzo; Nikolaidis, Pantelis; Thomas, Luke; Afonso, José

    2015-01-01

    Change is pervasive, but emerging patterns are occasionally detectable through analysis of systemic behaviors. Match analysis uses these patterns in order to reduce the degree of improvisation and to optimize the training process. However, it is possible that certain game phases elude systematic patterning. In this vein, our aim was to analyze the case of attack coverage in men’s volleyball, as we suspected it would elude systematic patterning and has received negligible attention in scientific research. We analyzed the occurrence of attack coverage in 4544 plays of the 2011 Volleyball World League. A Chi-square test with residual adjusted values was applied to explore significant associations between variables. A Monte Carlo correction was applied, as some cells had n<5. Effect sizes were determined using Cramer’s V. Overall, attack coverage occurred in 3.89% of ball possessions, and 23 distinct structures emerged. These structures lacked significant associations with the game complex, setting zone, and effect of attack coverage. Conversely, attack coverage structures showed significant associations with the attack zone and tempo, with very strong effect sizes (V=0.472 and V=0.521, respectively). As certain attack zones are deeply associated with attack tempo, it is apparent that quicker attack plays affect attack coverage structuring, promoting the formation of less complex structures. Ultimately, attack coverage structures seem to depend on momentary constraints, thereby rendering rigid systematization impracticable. Still, we contended that a principle-based approach might be suitable. This invites researchers to rethink how to interpret game regularities. PMID:26557208

  10. Cued Panic Attacks in Body Dysmorphic Disorder

    PubMed Central

    Phillips, Katharine A.; Menard, William; Bjornsson, Andri S.

    2013-01-01

    Background Body dysmorphic disorder (BDD) is a common and often severe disorder. Clinical observations suggest that panic attacks triggered by BDD symptoms may be common. However, to our knowledge, no study has examined such panic attacks in BDD. We investigated the prevalence, clinical features, and correlates of BDD-triggered panic attacks in individuals with this disorder. Methods Panic attacks and other variables were assessed using reliable and valid measures in 76 individuals with lifetime DSM-IV BDD. Results 28.9% (95% CI, 18.5%–39.4%) of participants reported lifetime panic attacks triggered by BDD symptoms. The most common triggers of such attacks were feeling that others were looking at or scrutinizing the perceived appearance defects (61.9%), looking in the mirror at perceived defects (38.1%), and being in bright light where perceived defects would be more visible (23.8%). The most common panic attack symptoms were palpitations (86.4%), sweating (66.7%), shortness of breath (63.6%), trembling or shaking (63.6%), and fear of losing control or going crazy (63.6%). Compared to participants without such panic attacks, those with BDD-triggered panic attacks had more severe lifetime BDD, social anxiety, and depressive symptoms, as well as poorer functioning and quality of life on a number of measures. They were also less likely to be employed and more likely to have been psychiatrically hospitalized and to have had suicidal ideation due to BDD. Conclusions Panic attacks triggered by BDD-related situations appear common in individuals with this disorder. BDD-triggered panic attacks were associated with greater symptom severity and morbidity. PMID:23653076

  11. Randomness determines practical security of BB84 quantum key distribution.

    PubMed

    Li, Hong-Wei; Yin, Zhen-Qiang; Wang, Shuang; Qian, Yong-Jun; Chen, Wei; Guo, Guang-Can; Han, Zheng-Fu

    2015-11-10

    Unconditional security of the BB84 quantum key distribution protocol has been proved by exploiting the fundamental laws of quantum mechanics, but the practical quantum key distribution system maybe hacked by considering the imperfect state preparation and measurement respectively. Until now, different attacking schemes have been proposed by utilizing imperfect devices, but the general security analysis model against all of the practical attacking schemes has not been proposed. Here, we demonstrate that the general practical attacking schemes can be divided into the Trojan horse attack, strong randomness attack and weak randomness attack respectively. We prove security of BB84 protocol under randomness attacking models, and these results can be applied to guarantee the security of the practical quantum key distribution system.

  12. Attacks by jaguars (Panthera onca) on humans in central Brazil: report of three cases, with observation of a death.

    PubMed

    Neto, Manoel Francisco Campos; Garrone Neto, Domingos; Haddad, Vidal

    2011-06-01

    Conflicts between humans and big cats have been known for centuries throughout the world, but have intensified in recent decades. Recently, attacks by Panthera onca on humans in Brazil have been brought to the forefront through exposure in the press and because of the severity of the attacks. We report 3 cases of patients attacked by jaguars in provoked and predatory situations. Two patients survived the attacks and one died. Attack mechanisms and lesions in victims are discussed. The attacks demonstrate a real risk of accidents from jaguars in certain regions, such as the Pantanal and the Amazon. Copyright © 2011 Wilderness Medical Society. Published by Elsevier Inc. All rights reserved.

  13. Randomness determines practical security of BB84 quantum key distribution

    PubMed Central

    Li, Hong-Wei; Yin, Zhen-Qiang; Wang, Shuang; Qian, Yong-Jun; Chen, Wei; Guo, Guang-Can; Han, Zheng-Fu

    2015-01-01

    Unconditional security of the BB84 quantum key distribution protocol has been proved by exploiting the fundamental laws of quantum mechanics, but the practical quantum key distribution system maybe hacked by considering the imperfect state preparation and measurement respectively. Until now, different attacking schemes have been proposed by utilizing imperfect devices, but the general security analysis model against all of the practical attacking schemes has not been proposed. Here, we demonstrate that the general practical attacking schemes can be divided into the Trojan horse attack, strong randomness attack and weak randomness attack respectively. We prove security of BB84 protocol under randomness attacking models, and these results can be applied to guarantee the security of the practical quantum key distribution system. PMID:26552359

  14. Randomness determines practical security of BB84 quantum key distribution

    NASA Astrophysics Data System (ADS)

    Li, Hong-Wei; Yin, Zhen-Qiang; Wang, Shuang; Qian, Yong-Jun; Chen, Wei; Guo, Guang-Can; Han, Zheng-Fu

    2015-11-01

    Unconditional security of the BB84 quantum key distribution protocol has been proved by exploiting the fundamental laws of quantum mechanics, but the practical quantum key distribution system maybe hacked by considering the imperfect state preparation and measurement respectively. Until now, different attacking schemes have been proposed by utilizing imperfect devices, but the general security analysis model against all of the practical attacking schemes has not been proposed. Here, we demonstrate that the general practical attacking schemes can be divided into the Trojan horse attack, strong randomness attack and weak randomness attack respectively. We prove security of BB84 protocol under randomness attacking models, and these results can be applied to guarantee the security of the practical quantum key distribution system.

  15. A Novel Network Attack Audit System based on Multi-Agent Technology

    NASA Astrophysics Data System (ADS)

    Jianping, Wang; Min, Chen; Xianwen, Wu

    A network attack audit system which includes network attack audit Agent, host audit Agent and management control center audit Agent is proposed. And the improved multi-agent technology is carried out in the network attack audit Agent which has achieved satisfactory audit results. The audit system in terms of network attack is just in-depth, and with the function improvement of network attack audit Agent, different attack will be better analyzed and audit. In addition, the management control center Agent should manage and analyze audit results from AA (or HA) and audit data on time. And the history files of network packets and host log data should also be audit to find deeper violations that cannot be found in real time.

  16. Extended Password Recovery Attacks against APOP, SIP, and Digest Authentication

    NASA Astrophysics Data System (ADS)

    Sasaki, Yu; Wang, Lei; Ohta, Kazuo; Kunihiro, Noboru

    In this paper, we propose password recovery attacks against challenge-response authentication protocols. Our attacks use a message difference for a MD5 collision attack proposed in IEICE 2008. First, we show how to efficiently find a message pair that collides with the above message difference. Second, we show that a password used in authenticated post office protocol (APOP) can be recovered practically. We also show that the password recovery attack can be applied to a session initiation protocol (SIP) and digest authentication. Our attack can recover up to the first 31 password characters in a short time and up to the first 60 characters faster than the naive search method. We have implemented our attack and confirmed that 31 characters can be successfully recovered.

  17. Percolation of localized attack on complex networks

    NASA Astrophysics Data System (ADS)

    Shao, Shuai; Huang, Xuqing; Stanley, H. Eugene; Havlin, Shlomo

    2015-02-01

    The robustness of complex networks against node failure and malicious attack has been of interest for decades, while most of the research has focused on random attack or hub-targeted attack. In many real-world scenarios, however, attacks are neither random nor hub-targeted, but localized, where a group of neighboring nodes in a network are attacked and fail. In this paper we develop a percolation framework to analytically and numerically study the robustness of complex networks against such localized attack. In particular, we investigate this robustness in Erdős-Rényi networks, random-regular networks, and scale-free networks. Our results provide insight into how to better protect networks, enhance cybersecurity, and facilitate the design of more robust infrastructures.

  18. Face liveness detection for face recognition based on cardiac features of skin color image

    NASA Astrophysics Data System (ADS)

    Suh, Kun Ha; Lee, Eui Chul

    2016-07-01

    With the growth of biometric technology, spoofing attacks have been emerged a threat to the security of the system. Main spoofing scenarios in the face recognition system include the printing attack, replay attack, and 3D mask attack. To prevent such attacks, techniques that evaluating liveness of the biometric data can be considered as a solution. In this paper, a novel face liveness detection method based on cardiac signal extracted from face is presented. The key point of proposed method is that the cardiac characteristic is detected in live faces but not detected in non-live faces. Experimental results showed that the proposed method can be effective way for determining printing attack or 3D mask attack.

  19. Hereditary Angioedema Attacks: Local Swelling at Multiple Sites.

    PubMed

    Hofman, Zonne L M; Relan, Anurag; Hack, C Erik

    2016-02-01

    Hereditary angioedema (HAE) patients experience recurrent local swelling in various parts of the body including painful swelling of the intestine and life-threatening laryngeal oedema. Most HAE literature is about attacks located in one anatomical site, though it is mentioned that HAE attacks may also involve multiple anatomical sites simultaneously. A detailed description of such multi-location attacks is currently lacking. This study investigated the occurrence, severity and clinical course of HAE attacks with multiple anatomical locations. HAE patients included in a clinical database of recombinant human C1-inhibitor (rhC1INH) studies were evaluated. Visual analog scale scores filled out by the patients for various symptoms at various locations and investigator symptoms scores during the attack were analysed. Data of 219 eligible attacks in 119 patients was analysed. Thirty-three patients (28%) had symptoms at multiple locations in anatomically unrelated regions at the same time during their first attack. Up to five simultaneously affected locations were reported. The observation that severe HAE attacks often affect multiple sites in the body suggests that HAE symptoms result from a systemic rather than from a local process as is currently believed.

  20. Heart Attack or Sudden Cardiac Arrest: How Are They Different?

    MedlinePlus

    ... Peripheral Artery Disease Venous Thromboembolism Aortic Aneurysm More Heart Attack or Sudden Cardiac Arrest: How Are They Different? ... and procedures related to heart disease and stroke. Heart Attack • Home • About Heart Attacks Acute Coronary Syndrome (ACS) ...

  1. Risk Management

    DTIC Science & Technology

    2011-06-02

    actively attack the risks, they will actively attack you.” -Tom Gib Why do Risk Management? 8 “The first step in the risk management process is to...opportunities to manage and improve our chances of success. - Roger Vanscoy “If you do not actively attack the risks, they will actively attack ...our risks provides opportunities to manage and improve our chances of success. - Roger Vanscoy “If you do not actively attack the risks, they will

  2. Experimental implementation of non-Gaussian attacks on a continuous-variable quantum-key-distribution system.

    PubMed

    Lodewyck, Jérôme; Debuisschert, Thierry; García-Patrón, Raúl; Tualle-Brouri, Rosa; Cerf, Nicolas J; Grangier, Philippe

    2007-01-19

    An intercept-resend attack on a continuous-variable quantum-key-distribution protocol is investigated experimentally. By varying the interception fraction, one can implement a family of attacks where the eavesdropper totally controls the channel parameters. In general, such attacks add excess noise in the channel, and may also result in non-Gaussian output distributions. We implement and characterize the measurements needed to detect these attacks, and evaluate experimentally the information rates available to the legitimate users and the eavesdropper. The results are consistent with the optimality of Gaussian attacks resulting from the security proofs.

  3. DOE Office of Scientific and Technical Information (OSTI.GOV)

    John Homer; Ashok Varikuti; Xinming Ou

    Various tools exist to analyze enterprise network systems and to produce attack graphs detailing how attackers might penetrate into the system. These attack graphs, however, are often complex and difficult to comprehend fully, and a human user may find it problematic to reach appropriate configuration decisions. This paper presents methodologies that can 1) automatically identify portions of an attack graph that do not help a user to understand the core security problems and so can be trimmed, and 2) automatically group similar attack steps as virtual nodes in a model of the network topology, to immediately increase the understandability ofmore » the data. We believe both methods are important steps toward improving visualization of attack graphs to make them more useful in configuration management for large enterprise networks. We implemented our methods using one of the existing attack-graph toolkits. Initial experimentation shows that the proposed approaches can 1) significantly reduce the complexity of attack graphs by trimming a large portion of the graph that is not needed for a user to understand the security problem, and 2) significantly increase the accessibility and understandability of the data presented in the attack graph by clearly showing, within a generated visualization of the network topology, the number and type of potential attacks to which each host is exposed.« less

  4. On resilience studies of system detection and recovery techniques against stealthy insider attacks

    NASA Astrophysics Data System (ADS)

    Wei, Sixiao; Zhang, Hanlin; Chen, Genshe; Shen, Dan; Yu, Wei; Pham, Khanh D.; Blasch, Erik P.; Cruz, Jose B.

    2016-05-01

    With the explosive growth of network technologies, insider attacks have become a major concern to business operations that largely rely on computer networks. To better detect insider attacks that marginally manipulate network traffic over time, and to recover the system from attacks, in this paper we implement a temporal-based detection scheme using the sequential hypothesis testing technique. Two hypothetical states are considered: the null hypothesis that the collected information is from benign historical traffic and the alternative hypothesis that the network is under attack. The objective of such a detection scheme is to recognize the change within the shortest time by comparing the two defined hypotheses. In addition, once the attack is detected, a server migration-based system recovery scheme can be triggered to recover the system to the state prior to the attack. To understand mitigation of insider attacks, a multi-functional web display of the detection analysis was developed for real-time analytic. Experiments using real-world traffic traces evaluate the effectiveness of Detection System and Recovery (DeSyAR) scheme. The evaluation data validates the detection scheme based on sequential hypothesis testing and the server migration-based system recovery scheme can perform well in effectively detecting insider attacks and recovering the system under attack.

  5. Influence of endogenous and exogenous electron donors and trichloroethylene oxidation toxicity on trichloroethylene oxidation by methanotrophic cultures from a groundwater aquifer.

    PubMed Central

    Henry, S M; Grbić-Galić, D

    1991-01-01

    Trichloroethylene (TCE)-transforming aquifer methanotrophs were evaluated for the influence of TCE oxidation toxicity and the effect of reductant availability on TCE transformation rates during methane starvation. TCE oxidation at relatively low (6 mg liter-1) TCE concentrations significantly reduced subsequent methane utilization in mixed and pure cultures tested and reduced the number of viable cells in the pure culture Methylomonas sp. strain MM2 by an order of magnitude. Perchloroethylene, tested at the same concentration, had no effect on the cultures. Neither the TCE itself nor the aqueous intermediates were responsible for the toxic effect, and it is suggested that TCE oxidation toxicity may have resulted from reactive intermediates that attacked cellular macromolecules. During starvation, all methanotrophs tested exhibited a decline in TCE transformation rates, and this decline followed exponential decay. Formate, provided as an exogenous electron donor, increased TCE transformation rates in Methylomonas sp. strain MM2, but not in mixed culture MM1 or unidentified isolate, CSC-1. Mixed culture MM2 did not transform TCE after 15 h of starvation, but mixed cultures MM1 and MM3 did. The methanotrophs in mixed cultures MM1 and MM3, and the unidentified isolate CSC-1 that was isolated from mixed culture MM1 contained lipid inclusions, whereas the methanotrophs of mixed culture MM2 and Methylomonas sp. strain MM2 did not. It is proposed that lipid storage granules serve as an endogenous source of electrons for TCE oxidation during methane starvation. Images PMID:2036010

  6. Impact of Tumarkin attacks on complaints and work ability in Ménière's disease.

    PubMed

    Pyykkö, Ilmari; Manchaiah, Vinaya; Zou, Jing; Levo, Hilla; Kentala, Erna

    2018-05-22

    The purpose of the present study was to characterize the occurrence of Tumarkin attacks in patients with Ménière'sdisease (MD), and to study its association with reported complaints, severity of consequences, and also self-reported work ability. The study used a cross-sectional design. Data obtained from the Finnish Ménière Federation using an electronic survey was analyzed. 602 people with MD responded to the survey (62% response rate) with a mean age of 56.7 years and a mean duration of the disease 12.4 years. 49% of the respondents experienced Tumarkin attacks, which lasted for a few seconds to a few minutes. There were significant differences in complaints reported by MD patients with and without Tumarkin attacks. Respondents with Tumarkin attacks experienced various consequences, including tripping, falls, fear, anxiety, problems in dyadic life, and even transient loss of consciousness. Respondents with Tumarkin attacks had more frequently applied for pension than those not having Tumarkin attacks. On an average, respondents with Tumarkin attacks had less self-reported working ability when compared to those without Tumarkin attacks. The current study results suggest various differences in terms of complaints reported, severity of consequences, and the self-reported working ability in MD patients with and without Tumarkin attacks. Hearing healthcare professionals must examine Tumarkin attacks and their consequences in patients with MD during clinical examinations. In addition, the therapy should focus on alleviating the consequences and improving work ability.

  7. Netwar

    NASA Astrophysics Data System (ADS)

    Keen, Arthur A.

    2006-04-01

    This paper describes technology being developed at 21st Century Technologies to automate Computer Network Operations (CNO). CNO refers to DoD activities related to Attacking and Defending Computer Networks (CNA & CND). Next generation cyber threats are emerging in the form of powerful Internet services and tools that automate intelligence gathering, planning, testing, and surveillance. We will focus on "Search-Engine Hacks", queries that can retrieve lists of router/switch/server passwords, control panels, accessible cameras, software keys, VPN connection files, and vulnerable web applications. Examples include "Titan Rain" attacks against DoD facilities and the Santy worm, which identifies vulnerable sites by searching Google for URLs containing application-specific strings. This trend will result in increasingly sophisticated and automated intelligence-driven cyber attacks coordinated across multiple domains that are difficult to defeat or even understand with current technology. One traditional method of CNO relies on surveillance detection as an attack predictor. Unfortunately, surveillance detection is difficult because attackers can perform search engine-driven surveillance such as with Google Hacks, and avoid touching the target site. Therefore, attack observables represent only about 5% of the attacker's total attack time, and are inadequate to provide warning. In order to predict attacks and defend against them, CNO must also employ more sophisticated techniques and work to understand the attacker's Motives, Means and Opportunities (MMO). CNO must use automated reconnaissance tools, such as Google, to identify information vulnerabilities, and then utilize Internet tools to observe the intelligence gathering, planning, testing, and collaboration activities that represent 95% of the attacker's effort.

  8. Securing internet by eliminating DDOS attacks

    NASA Astrophysics Data System (ADS)

    Niranchana, R.; Gayathri Devi, N.; Santhi, H.; Gayathri, P.

    2017-11-01

    The major threat caused to the authorised usage of Internet is Distributed Denial of Service attack. The mechanisms used to prevent the DDoS attacks are said to overcome the attack’s ability in spoofing the IP packets source addresses. By utilising Internet Protocol spoofing, the attackers cause a consequential load over the networks destination for policing attack packets. To overcome the IP Spoofing level on the Internet, We propose an Inter domain Packet Filter (IPF) architecture. The proposed scheme is not based on global routing information. The packets with reliable source addresses are not rejected, the IPF frame work works in such a manner. The spoofing capability of attackers is confined by IPF, and also the filter identifies the source of an attack packet by minimal number of candidate network.

  9. Monitoring the Attack Incidences and Damage Caused by the Almond Bark Beetle, Scolytus amygdali, in Almond Orchards

    PubMed Central

    Cuthbertson, Andrew G. S.; Braham, Mohamed

    2018-01-01

    The almond bark beetle, Scolytus amygdali Geurin-Meneville, is responsible for significant loss of fruit production in almond orchards throughout the world. Here, we studied the damage and the incidences of S. amygdali attack on two different scales: (1) at the level of a single tree; and (2) in an entire orchard. Our results revealed no differences in attack level among four orientations (east, west, south and north sides) for the whole tree. However, the bark that was facing west side in the direction of the prevailing wind was found to be the most suitable for females to initiate attack in Stratum S2. Attack distribution remains the same among different strata (strata is vertical divisions of the tree from the ground to the uppermost twigs with ~40 cm intervals). More than 50% of attack was observed in the trunk of the tree and upper strata. However, multiplication rate (number of emerged adults/maternal gallery) varies significantly between strata. In addition, we studied attack intensity (holes produced by beetle per tree) comparing it to tree morphology (flowers, leaves and circumferences) and gum deposit. Our results revealed a positive correlation between attack intensity and gum deposits, and a negative correlation between attack intensity and tree morphology. This revealed that gum on the tree was an indicator for attack intensity. A positive correlation between attack intensity and the circumference of the tree revealed that older trees were more susceptible to S. amygdali attack. These results, while preliminary, aim to help in the monitoring of S. amygdali populations before deciding to apply any control measures. PMID:29301271

  10. On the IDAGAM I Combat Model.

    DTIC Science & Technology

    1977-06-01

    defense missions in locations between the FEBA and the attackers’ targets; b) AAA can attack only aircraft attacking the guns them- selves or the targets...the guns are defending; c) SAM weapon systems can attack not only aircraft attack- ing them and the targets they defend but also, although possibly...Corporation), P.E. Louer (Department of the Army) and B.R. McEnany (Joint Chiefs of Staff/Studies, Analysis and Gaming Agency) for their help- ful

  11. Terror attacks influence driving behavior in Israel

    PubMed Central

    Stecklov, Guy; Goldstein, Joshua R.

    2004-01-01

    Terror attacks in Israel produce a temporary lull in light accidents followed by a 35% spike in fatal accidents on Israeli roads 3 days after the attack. Our results are based on time-series analysis of Israeli traffic flows, accidents, and terror attacks from January 2001 through June 2002. Whereas prior studies have focused on subjective reports of posttraumatic stress, our study shows a population-level behavioral response to violent terror attacks. PMID:15448203

  12. Childhood Internalizing and Externalizing Problems Predict the Onset of Clinical Panic Attacks over Adolescence: The TRAILS Study

    PubMed Central

    Mathyssek, Christina M.; Olino, Thomas M.; Verhulst, Frank C.; van Oort, Floor V. A.

    2012-01-01

    Background Panic attacks are a source of individual suffering and are an independent risk factor for later psychopathology. However, much less is known about risk factors for the development of panic attacks, particularly during adolescence when the incidence of panic attacks increases dramatically. We examined whether internalizing and externalizing problems in childhood predict the onset of panic attacks in adolescence. Method This study is part of the TRacking Adolescents’ Individual Lives Survey (TRAILS), a Dutch longitudinal population cohort study (N = 1,584). Internalizing and Externalizing Problems were collected using the Youth Self-Report (YSR) and the parent-report Child Behavior Checklist (CBCL) at baseline (age 10–12). At age 18–20, DSM-IV defined panic attacks since baseline were assessed with the Composite International Diagnostic Interview (CIDI). We investigated whether early adolescent Internalizing and Externalizing Problems predicted panic attacks between ages 10–20 years, using survival analysis in univariate and multivariate models. Results There were N = 314 (19.8%) cases who experienced at least one DSM-IV defined panic attack during adolescence and N = 18 (1.2%) who developed panic disorder during adolescence. In univariate analyses, CBCL Total Problems, Internalizing Problems and three of the eight syndrome scales predicted panic attack onset, while on the YSR all broad-band problem scales and each narrow-band syndrome scale predicted panic attack onset. In multivariate analyses, CBCL Social Problems (HR 1.19, p<.05), and YSR Thought Problems (HR 1.15, p<.05) and Social Problems (HR 1.26, p<.01) predicted panic attack onset. Conclusion Risk indicators of panic attack include the wide range of internalizing and externalizing problems. Yet, when adjusted for co-occurring problem behaviors, Social Problems were the most consistent risk factor for panic attack onsets in adolescence. PMID:23251576

  13. Effectiveness of icatibant for treatment of hereditary angioedema attacks is not affected by body weight: findings from the Icatibant Outcome Survey, a cohort observational study.

    PubMed

    Caballero, Teresa; Zanichelli, Andrea; Aberer, Werner; Maurer, Marcus; Longhurst, Hilary J; Bouillet, Laurence; Andresen, Irmgard

    2018-01-01

    Icatibant is a bradykinin B2-receptor antagonist used for the treatment of hereditary angioedema attacks resulting from C1-inhibitor deficiency. Treatment is not adjusted by body weight however the impact of body mass index (BMI) on the effectiveness of icatibant is not documented in the literature. We examined disease characteristics and icatibant treatment effectiveness in patients stratified by BMI in the Icatibant Outcome Survey, an ongoing, international, observational study monitoring the real-world safety and effectiveness of icatibant. Attack and treatment characteristics as well as outcomes following treatment with icatibant were compared among patients with underweight, normal, overweight, and obese BMI. Data from 2697 icatibant-treated attacks in 342 patients (3.5, 44.7, 34.8, and 17.0% patients of underweight, normal, overweight, and obese BMI, respectively) were analyzed. There was no significant difference in the frequency and severity of attacks across BMI groups, although obese patients tended to have more attacks of high severity. There was no impact of BMI on the frequency of laryngeal attacks, but patients with normal BMI had fewer cutaneous attacks and more abdominal attacks. Most attacks (71.9-83.8%) were treated with a single icatibant injection without the need for rescue with plasma-derived C1-inhibitor (pdC1-INH), regardless of BMI. Patients with obese BMI used pdC1-INH as rescue treatment more often (P < 0.0001; P = 0.0232 excluding 2 outliers) and treated attacks earlier than patients with normal BMI (P = 0.007). Furthermore, time to resolution and duration of attack were shorter for patients with high BMI (P < 0.001 for overweight and P < 0.05 for obese versus normal). Overall, icatibant was comparatively effective in treating attacks in patients across all BMI groups. Trial registration NCT01034969.

  14. Somatic panic-attack equivalents in a community sample of Rwandan widows who survived the 1994 genocide

    PubMed Central

    Hagengimana, Athanase; Hinton, Devon; Bird, Bruce; Pollack, Mark; Pitman, Roger K.

    2009-01-01

    The present study is the first to attempt to determine rates of panic attacks, especially ‘somatically focused’ panic attacks, panic disorder, symptoms of post-traumatic stress disorder (PTSD), and depression levels in a population of Rwandans traumatized by the 1994 genocide. The following measures were utilized: the Rwandan Panic-Disorder Survey (RPDS); the Beck Depression Inventory (BDI); the Harvard Trauma Questionnaire (HTQ); and the PTSD Checklist (PCL). Forty of 100 Rwandan widows suffered somatically focused panic attacks during the previous 4 weeks. Thirty-five (87%) of those having panic attacks suffered panic disorder, making the rate of panic disorder for the entire sample 35%. Rwandan widows with panic attacks had greater psychopathology on all measures. Somatically focused panic-attack subtypes seem to constitute a key response to trauma in the Rwandan population. Future studies of traumatized non-Western populations should carefully assess not only somatoform disorder but also somatically focused panic attacks. PMID:12581815

  15. Sub-threshold panic attacks and agoraphobic avoidance increase comorbidity of mental disorders: results from an adult general population sample.

    PubMed

    Pané-Farré, Christiane A; Fenske, Kristin; Stender, Jan P; Meyer, Christian; John, Ulrich; Rumpf, Hans-Jürgen; Hapke, Ulfert; Hamm, Alfons O

    2013-06-01

    Full-blown panic attacks are frequently associated with other mental disorders. Most comorbidity analyses did not discriminate between isolated panic attacks vs. panic attacks that occurred in the context of a panic disorder and rarely evaluated the impact of comorbid agoraphobia. Moreover, there are no larger scale epidemiological studies regarding the influence of sub-threshold panic attacks. 4075 German-speaking respondents aged 18-64 were interviewed using the fully structured Munich Composite International Diagnostic Interview. Limited symptom attacks, isolated panic attacks, and panic disorder were associated with other lifetime DSM-IV disorders with monotonically increasing odds and increasing tendency for multiple comorbidities across the three groups. The presence of agoraphobia was associated with more frequent comorbidity in all panic subgroups and also in persons who never experienced panic attacks. The present study suggests that populations with isolated or limited symptom should be carefully attended to in clinical practice, especially if agoraphobia is present. Copyright © 2013 Elsevier Ltd. All rights reserved.

  16. Entrapment of anaerobic thermophilic and hyperthermophilic marine micro-organisms in a gellan/xanthan matrix.

    PubMed

    Landreau, M; Duthoit, F; Claeys-Bruno, M; Vandenabeele-Trambouze, O; Aubry, T; Godfroy, A; Le Blay, G

    2016-06-01

    The aims of this study were (i) to develop a protocol for the entrapment of anaerobic (hyper)thermophilic marine micro-organisms; (ii) to test the use of the chosen polymers in a range of physical and chemical conditions and (iii) to validate the method with batch cultures. The best conditions for immobilization were obtained at 80°C with gellan and xanthan gums. After 5-week incubation, beads showed a good resistance to all tested conditions except those simultaneously including high temperature (100°C), low NaCl (<0∙5 mol l(-1) ) and extreme pH (4/8). To confirm the method efficiency, batch cultures with immobilized Thermosipho sp. strain AT1272 and Thermococcus kodakarensis strain KOD1 showed an absence of detrimental effect on cell viability and a good growth within and outside the beads. This suggests that entrapment in a gellan-xanthan matrix could be employed for the culture of anaerobic (hyper)thermophilic marine micro-organisms. (Hyper)thermophilic marine micro-organisms possess a high biotechnological potential. Generally microbial cells are grown as free-cell cultures. The use of immobilized cells may offer several advantages such as protection against phage attack, high cell biomass and better production rate of desired metabolites. © 2016 The Society for Applied Microbiology.

  17. Biodegradation of thermally treated low density polyethylene by fungus Rhizopus oryzae NS 5.

    PubMed

    Awasthi, Shraddha; Srivastava, Neha; Singh, Tripti; Tiwary, D; Mishra, Pradeep Kumar

    2017-05-01

    Polythene is considered as one of the important object used in daily life. Being versatile in nature and resistant to microbial attack, they effectively cause environmental pollution. In the present study, biodegradation of low-density polyethylene (LDPE) have been performed using fungal lab isolate Rhizopus oryzae NS5. Lab isolate fungal strain capable of adhering to LDPE surface was used for the biodegradation of LDPE. This strain was identified as Rhizopus oryzae NS5 (Accession No. KT160362). Fungal growth was observed on the surface of the polyethylene when cultured in potato dextrose broth at 30 °C and 120 rpm, for 1 month. LDPE film was characterized before and after incubation by Fourier transform infrared spectroscopy, scanning electron microscopy, atomic force microscopy and universal tensile machine. About 8.4 ± 3% decrease (gravimetrically) in weight and 60% reduction in tensile strength of polyethylene was observed. Scanning electron microscope analysis showed hyphal penetration and degradation on the surface of polyethylene. Atomic force microscope analysis showed increased surface roughness after treatment with fungal isolate. A thick network of fungal hyphae forming a biofilm was also observed on the surface of the polyethylene pieces. Present study shows the potential of Rhizopus oryzae NS5 in polyethylene degradation in eco friendly and sustainable manner.

  18. Synthesis, in vitro and in silico antimalarial activity of 7-chloroquinoline and 4H-chromene conjugates.

    PubMed

    Parthiban, A; Muthukumaran, J; Manhas, Ashan; Srivastava, Kumkum; Krishna, R; Rao, H Surya Prakash

    2015-10-15

    A new series of chloroquinoline-4H-chromene conjugates incorporating piperizine or azipane tethers were synthesized and their anti-malarial activity were evaluated against two Plasmodium falciparum strains namely 3D7 chloroquine sensitive (CQS) and K1 chloroquine resistant (CQR). Chloroquine was used as the standard and also reference for comparison. The conjugates exhibit intense UV absorption with λmax located at 342 nm (log ε=4.0), 254 nm (log ε=4.2), 223 nm (log ε=4.4) which can be used to spectrometrically track the molecules even in trace amounts. Among all the synthetic compounds, two molecules namely 6-nitro and N-piperazine groups incorporated 7d and 6-chloro and N-azapane incorporated 15b chloroquinoline-4H-chromene conjugates showed significant anti-malarial activity against two strains (3D7 and K1) of P. falciparum. These values are lesser than the values of standard antimalarial compound. Molecular docking results suggested that these two compounds showing strong binding affinity with P. falciparum lactate dehydrogenase (PfLDH) and also they occupy the co-factor position which indicated that they could be the potent inhibitors for dreadful disease malaria and specifically attack the glycolytic pathway in parasite for energy production. Copyright © 2015 Elsevier Ltd. All rights reserved.

  19. Seasonal and geographic distribution of luminous bacteria in the eastern mediterranean sea and the gulf of elat.

    PubMed

    Yetinson, T; Shilo, M

    1979-06-01

    Luminous bacteria in the Mediterranean Sea and the Gulf of Aqaba-Elat have different distribution patterns. In the Mediterranean Sea, Beneckea harveyi is present all year round, with different subtypes alternating in summer and winter; Photobacterium fischeri was only present during the winter. In the Gulf of Elat, P. leiognathi is present throughout the water column in similar densities during the entire year. This constancy in distribution is presumably due to the near-constancy in water temperature. In summer, Photobacterium leiognathi is replaced by B. harveyi in coastal surface waters. In the hypersaline Bardawil lagoon, only B. harveyi types are present. P. fischeri, a major component of the Mediterranean Sea winter communities, is absent from the lagoon. Luminous Beneckea strains show a great diversity in properties, e.g. temperature range for growth, sensitivity to infection by phages, sensitivity to attack by Bdellovibrio strains, and differences in tolerance to high-salinity shock. Therefore, subdivision of the taxonomic cluster of B. harveyi into subtypes is indicated. The composition of the luminous bacteria communities may serve as indicators of different marine water bodies. The symbiotic luminous bacteria of the light organ of the common Gulf of Elat fish, Photoblepharon palbebratus steinitzi, is different from any of the types described.

  20. Seasonal and Geographic Distribution of Luminous Bacteria in the Eastern Mediterranean Sea and the Gulf of Elat

    PubMed Central

    Yetinson, T.; Shilo, M.

    1979-01-01

    Luminous bacteria in the Mediterranean Sea and the Gulf of Aqaba-Elat have different distribution patterns. In the Mediterranean Sea, Beneckea harveyi is present all year round, with different subtypes alternating in summer and winter; Photobacterium fischeri was only present during the winter. In the Gulf of Elat, P. leiognathi is present throughout the water column in similar densities during the entire year. This constancy in distribution is presumably due to the near-constancy in water temperature. In summer, Photobacterium leiognathi is replaced by B. harveyi in coastal surface waters. In the hypersaline Bardawil lagoon, only B. harveyi types are present. P. fischeri, a major component of the Mediterranean Sea winter communities, is absent from the lagoon. Luminous Beneckea strains show a great diversity in properties, e.g. temperature range for growth, sensitivity to infection by phages, sensitivity to attack by Bdellovibrio strains, and differences in tolerance to high-salinity shock. Therefore, subdivision of the taxonomic cluster of B. harveyi into subtypes is indicated. The composition of the luminous bacteria communities may serve as indicators of different marine water bodies. The symbiotic luminous bacteria of the light organ of the common Gulf of Elat fish, Photoblepharon palbebratus steinitzi, is different from any of the types described. Images PMID:16345404

  1. A Game Theoretical Approach to Hacktivism: Is Attack Likelihood a Product of Risks and Payoffs?

    PubMed

    Bodford, Jessica E; Kwan, Virginia S Y

    2018-02-01

    The current study examines hacktivism (i.e., hacking to convey a moral, ethical, or social justice message) through a general game theoretic framework-that is, as a product of costs and benefits. Given the inherent risk of carrying out a hacktivist attack (e.g., legal action, imprisonment), it would be rational for the user to weigh these risks against perceived benefits of carrying out the attack. As such, we examined computer science students' estimations of risks, payoffs, and attack likelihood through a game theoretic design. Furthermore, this study aims at constructing a descriptive profile of potential hacktivists, exploring two predicted covariates of attack decision making, namely, peer prevalence of hacking and sex differences. Contrary to expectations, results suggest that participants' estimations of attack likelihood stemmed solely from expected payoffs, rather than subjective risks. Peer prevalence significantly predicted increased payoffs and attack likelihood, suggesting an underlying descriptive norm in social networks. Notably, we observed no sex differences in the decision to attack, nor in the factors predicting attack likelihood. Implications for policymakers and the understanding and prevention of hacktivism are discussed, as are the possible ramifications of widely communicated payoffs over potential risks in hacking communities.

  2. Sequential defense against random and intentional attacks in complex networks.

    PubMed

    Chen, Pin-Yu; Cheng, Shin-Ming

    2015-02-01

    Network robustness against attacks is one of the most fundamental researches in network science as it is closely associated with the reliability and functionality of various networking paradigms. However, despite the study on intrinsic topological vulnerabilities to node removals, little is known on the network robustness when network defense mechanisms are implemented, especially for networked engineering systems equipped with detection capabilities. In this paper, a sequential defense mechanism is first proposed in complex networks for attack inference and vulnerability assessment, where the data fusion center sequentially infers the presence of an attack based on the binary attack status reported from the nodes in the network. The network robustness is evaluated in terms of the ability to identify the attack prior to network disruption under two major attack schemes, i.e., random and intentional attacks. We provide a parametric plug-in model for performance evaluation on the proposed mechanism and validate its effectiveness and reliability via canonical complex network models and real-world large-scale network topology. The results show that the sequential defense mechanism greatly improves the network robustness and mitigates the possibility of network disruption by acquiring limited attack status information from a small subset of nodes in the network.

  3. Induction of panic attack by stimulation of the ventromedial hypothalamus.

    PubMed

    Wilent, W Bryan; Oh, Michael Y; Buetefisch, Cathrin M; Bailes, Julian E; Cantella, Diane; Angle, Cindy; Whiting, Donald M

    2010-06-01

    Panic attacks are sudden debilitating attacks of intense distress often accompanied by physical symptoms such as shortness of breath and heart palpitations. Numerous brain regions, hormones, and neurotransmitter systems are putatively involved, but the etiology and neurocircuitry of panic attacks is far from established. One particular brain region of interest is the ventromedial hypothalamus (VMH). In cats and rats, electrical stimulation delivered to the VMH has been shown to evoke an emotional "panic attack-like" escape behavior, and in humans, stimulation targeting nuclei just posterior or anterior to the VMH has reportedly induced panic attacks. The authors report findings obtained in an awake patient undergoing bilateral implantation of deep brain stimulation electrodes into the hypothalamus that strongly implicates the VMH as being critically involved in the genesis of panic attacks. First, as the stimulating electrode progressed deeper into the VMH, the intensity of stimulation required to evoke an attack systematically decreased; second, while stimulation of the VMH in either hemisphere evoked panic, stimulation that appeared to be in the center of the VMH was more potent. Thus, this evidence supports the role of the VMH in the induction of panic attacks purported by animal studies.

  4. Random Visitor: Defense against Identity Attacks in P2P Networks

    NASA Astrophysics Data System (ADS)

    Gu, Jabeom; Nah, Jaehoon; Kwon, Hyeokchan; Jang, Jonsoo; Park, Sehyun

    Various advantages of cooperative peer-to-peer networks are strongly counterbalanced by the open nature of a distributed, serverless network. In such networks, it is relatively easy for an attacker to launch various attacks such as misrouting, corrupting, or dropping messages as a result of a successful identifier forgery. The impact of an identifier forgery is particularly severe because the whole network can be compromised by attacks such as Sybil or Eclipse. In this paper, we present an identifier authentication mechanism called random visitor, which uses one or more randomly selected peers as delegates of identity proof. Our scheme uses identity-based cryptography and identity ownership proof mechanisms collectively to create multiple, cryptographically protected indirect bindings between two peers, instantly when needed, through the delegates. Because of these bindings, an attacker cannot achieve an identifier forgery related attack against interacting peers without breaking the bindings. Therefore, our mechanism limits the possibility of identifier forgery attacks efficiently by disabling an attacker's ability to break the binding. The design rationale and framework details are presented. A security analysis shows that our scheme is strong enough against identifier related attacks and that the strength increases if there are many peers (more than several thousand) in the network.

  5. Detecting and Preventing Sybil Attacks in Wireless Sensor Networks Using Message Authentication and Passing Method.

    PubMed

    Dhamodharan, Udaya Suriya Raj Kumar; Vayanaperumal, Rajamani

    2015-01-01

    Wireless sensor networks are highly indispensable for securing network protection. Highly critical attacks of various kinds have been documented in wireless sensor network till now by many researchers. The Sybil attack is a massive destructive attack against the sensor network where numerous genuine identities with forged identities are used for getting an illegal entry into a network. Discerning the Sybil attack, sinkhole, and wormhole attack while multicasting is a tremendous job in wireless sensor network. Basically a Sybil attack means a node which pretends its identity to other nodes. Communication to an illegal node results in data loss and becomes dangerous in the network. The existing method Random Password Comparison has only a scheme which just verifies the node identities by analyzing the neighbors. A survey was done on a Sybil attack with the objective of resolving this problem. The survey has proposed a combined CAM-PVM (compare and match-position verification method) with MAP (message authentication and passing) for detecting, eliminating, and eventually preventing the entry of Sybil nodes in the network. We propose a scheme of assuring security for wireless sensor network, to deal with attacks of these kinds in unicasting and multicasting.

  6. Detecting and Preventing Sybil Attacks in Wireless Sensor Networks Using Message Authentication and Passing Method

    PubMed Central

    Dhamodharan, Udaya Suriya Raj Kumar; Vayanaperumal, Rajamani

    2015-01-01

    Wireless sensor networks are highly indispensable for securing network protection. Highly critical attacks of various kinds have been documented in wireless sensor network till now by many researchers. The Sybil attack is a massive destructive attack against the sensor network where numerous genuine identities with forged identities are used for getting an illegal entry into a network. Discerning the Sybil attack, sinkhole, and wormhole attack while multicasting is a tremendous job in wireless sensor network. Basically a Sybil attack means a node which pretends its identity to other nodes. Communication to an illegal node results in data loss and becomes dangerous in the network. The existing method Random Password Comparison has only a scheme which just verifies the node identities by analyzing the neighbors. A survey was done on a Sybil attack with the objective of resolving this problem. The survey has proposed a combined CAM-PVM (compare and match-position verification method) with MAP (message authentication and passing) for detecting, eliminating, and eventually preventing the entry of Sybil nodes in the network. We propose a scheme of assuring security for wireless sensor network, to deal with attacks of these kinds in unicasting and multicasting. PMID:26236773

  7. Attack Detection in Sensor Network Target Localization Systems With Quantized Data

    NASA Astrophysics Data System (ADS)

    Zhang, Jiangfan; Wang, Xiaodong; Blum, Rick S.; Kaplan, Lance M.

    2018-04-01

    We consider a sensor network focused on target localization, where sensors measure the signal strength emitted from the target. Each measurement is quantized to one bit and sent to the fusion center. A general attack is considered at some sensors that attempts to cause the fusion center to produce an inaccurate estimation of the target location with a large mean-square-error. The attack is a combination of man-in-the-middle, hacking, and spoofing attacks that can effectively change both signals going into and coming out of the sensor nodes in a realistic manner. We show that the essential effect of attacks is to alter the estimated distance between the target and each attacked sensor to a different extent, giving rise to a geometric inconsistency among the attacked and unattacked sensors. Hence, with the help of two secure sensors, a class of detectors are proposed to detect the attacked sensors by scrutinizing the existence of the geometric inconsistency. We show that the false alarm and miss probabilities of the proposed detectors decrease exponentially as the number of measurement samples increases, which implies that for sufficiently large number of samples, the proposed detectors can identify the attacked and unattacked sensors with any required accuracy.

  8. SEA domain autoproteolysis accelerated by conformational strain: energetic aspects.

    PubMed

    Sandberg, Anders; Johansson, Denny G A; Macao, Bertil; Härd, Torleif

    2008-04-04

    A subclass of proteins with the SEA (sea urchin sperm protein, enterokinase, and agrin) domain fold exists as heterodimers generated by autoproteolytic cleavage within a characteristic G(-1)S+1VVV sequence. Autoproteolysis occurs by a nucleophilic attack of the serine hydroxyl on the vicinal glycine carbonyl followed by an N-->O acyl shift and hydrolysis of the resulting ester. The reaction has been suggested to be accelerated by the straining of the scissile peptide bond upon protein folding. In an accompanying article, we report the mechanism; in this article, we provide further key evidence and account for the energetics of coupled protein folding and autoproteolysis. Cleavage of the GPR116 domain and that of the MUC1 SEA domain occur with half-life (t((1/2))) values of 12 and 18 min, respectively, with lowering of the free energy of the activation barrier by approximately 10 kcal mol(-1) compared with uncatalyzed hydrolysis. The free energies of unfolding of the GPR116 and MUC1 SEA domains were measured to approximately 11 and approximately 15 kcal mol(-1), respectively, but approximately 7 kcal mol(-1) of conformational energy is partitioned as strain over the scissile peptide bond in the precursor to catalyze autoproteolysis by substrate destabilization. A straining energy of approximately 7 kcal mol(-1) was measured by using both a pre-equilibrium model to analyze stability and cleavage kinetics data obtained with the GPR116 SEA domain destabilized by core mutations or urea addition, as well as the difference in thermodynamic stabilities of the MUC1 SEA precursor mutant S1098A (with a G(-1)A+1VVV motif) and the wild-type protein. The results imply that cleavage by N-->O acyl shift alone would proceed with a t((1/2)) of approximately 2.3 years, which is too slow to be biochemically effective. A subsequent review of structural data on other self-cleaving proteins suggests that conformational strain of the scissile peptide bond may be a common mechanism of autoproteolysis.

  9. 39 CFR 501.11 - Reporting Postage Evidencing System security weaknesses.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... any repeatable deviation from normal Postage Evidencing System performance. (3) Cyber attacks that... misappropriating assets or sensitive information, corrupting data, or causing operational disruption. Cyber attacks... causing denial-of-service attacks on Web sites. Cyber attacks may be carried out by third parties or...

  10. 39 CFR 501.11 - Reporting Postage Evidencing System security weaknesses.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... any repeatable deviation from normal Postage Evidencing System performance. (3) Cyber attacks that... misappropriating assets or sensitive information, corrupting data, or causing operational disruption. Cyber attacks... causing denial-of-service attacks on Web sites. Cyber attacks may be carried out by third parties or...

  11. 39 CFR 501.11 - Reporting Postage Evidencing System security weaknesses.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... any repeatable deviation from normal Postage Evidencing System performance. (3) Cyber attacks that... misappropriating assets or sensitive information, corrupting data, or causing operational disruption. Cyber attacks... causing denial-of-service attacks on Web sites. Cyber attacks may be carried out by third parties or...

  12. Sustaining U.S. Nuclear Submarine Design Capabilities

    DTIC Science & Technology

    2007-01-01

    lost learning because there is an inherent novelty to each succeeding design effort, but on the other hand, higher 2 Note there is a unique “do...Nautilus 1 1954 Attack Seawolf 1 1957 Attack Skate 4 1958–1959 Attack Skipjack 6 1959–1961 Attack Triton 1 1959 Attack George Washington 5 1960–1962...development, electric motors and controls development, or equipment acoustic analysis (listed to the right of the pyramid). All of these skills have some

  13. National Counterterrorism Center: 2007 Report on Terrorism

    DTIC Science & Technology

    2008-04-30

    Approximately one half of the attacks in the NCTC database involve no loss of life. An attack that damages a pipeline and a car bomb attack that kills 100...rose by about 30 percent and 20 percent, respectively. Overall, suicide bombing attacks rose by about 50 percent and suicide car bombings about 40...January 2007, in Nukhaib, Al Anbar, Iraq, armed assailants in three cars attacked two buses transporting Shiite pilgrims back from the Hajj in Mecca to Al

  14. Combating Paramilitary Terrorism on the Homefront: An Examination of Capabilities and Limitations of U.S. Response Forces

    DTIC Science & Technology

    2015-12-01

    paramilitary methods with devastating results. This thesis examines the paramilitary terrorist attacks that occurred in Beslan in 2004 and in Mumbai in...paramilitary attack to be established. 14. SUBJECT TERMS paramilitary terrorism, North Hollywood shootout, Mumbai attack, Beslan school attack, posse...paramilitary terrorist attacks that occurred in Beslan in 2004 and in Mumbai in 2008 in an attempt to understand the threat and to establish the criteria for

  15. US Army Attack Aviation in a Decisive Action Environment: History, Doctrine, and a Need for Doctrinal Refinement

    DTIC Science & Technology

    2015-05-23

    flight. The design used the engine, transmission, and rotor system of the UH-1 design. In doing so, Bell helicopters publicly declared that the Cobra...Public Release; Distribution is Unlimited 13. SUPPLEMENTARY NOTES 14. ABSTRACT The attack helicopter airframe and role evolved slowly, over time, to...attack helicopter doctrine, heavily influenced by the Global War on Terror and the 11th Attack Helicopter Regiment’s disastrous deep attack during

  16. Attack rates of Sirex noctilio and patterns of pine tree defenses and mortality in northern Patagonia.

    PubMed

    Martinson, S J; Fernádez Ajó, A A; Martínez, A S; Krivak-Tetley, F E; Villacide, J M; Ayres, M P; Corley, J C

    2018-04-18

    Accidental and intentional global movement of species has increased the frequency of novel plant-insect interactions. In Patagonia, the European woodwasp, Sirex noctilio, has invaded commercial plantations of North American pines. We compared the patterns of resin defenses and S. noctilio-caused mortality at two mixed-species forests near San Carlos de Bariloche, Argentina. We observed lower levels of resin flow and higher levels of mortality in Pinus contorta compared with Pinus ponderosa. In general, S. noctilio attacked trees with lower resin compared with neighboring trees. Resin production in P. ponderosa was not related to growth rates, but for P. contorta, slower growing trees produced less resin than faster growing conspecifics. For all infested trees, attack density and number of drills (ovipositor probes) per attack did not vary with resin production. Most attacks resulted in one or two drills. Attack rates and drills/attack were basically uniform across the bole of the tree except for a decrease in both drills/attack and attack density in the upper portion of the crown, and an increase in the attack density for the bottom 10% of the tree. Planted pines in Patagonia grow faster than their counterparts in North America, and produce less resin, consistent with the growth-differentiation balance hypothesis. Limited resin defenses may help to explain the high susceptibility of P. contorta to woodwasps in Patagonia.

  17. Management of children and young people (CYP) with asthma: a clinical audit report.

    PubMed

    Levy, Mark L; Ward, Angela; Nelson, Sara

    2018-05-21

    An asthma attack or exacerbation signals treatment failure. Most attacks are preventable and failure to recognize risk of asthma attacks are well recognized as risk factors for future attacks and even death. Of the 19 recommendations made by the United Kingdom National Review of Asthma Deaths (NRAD) (1) only one has been partially implemented-a National Asthma Audit; however, this hasn't reported yet. The Harrow Clinical Commissioning Group (CCG) in London implemented a clinical asthma audit on 291 children and young people aged under 19 years (CYP) who had been treated for asthma attacks in 2016. This was funded as a Local Incentive Scheme (LIS) aimed at improving quality health care delivery. Two years after the publication of the NRAD report it is surprising that risks for future attacks were not recognized, that few patients were assessed objectively during attacks and only 10% of attacks were followed up within 2 days. However, it is encouraging that CYP hospital admissions following the audit were reduced by 16%, with clear benefit for patients, their families and the local health economy. This audit has provided an example of how clinicians can focus learning on patients who have had asthma attacks and utilize these events as a catalyst for active reflection in particular on modifiable risk factors. Through identification of these risks and active optimization of management, preventable asthma attacks could become 'never events'.

  18. Genes and gene networks implicated in aggression related behaviour.

    PubMed

    Malki, Karim; Pain, Oliver; Du Rietz, Ebba; Tosto, Maria Grazia; Paya-Cano, Jose; Sandnabba, Kenneth N; de Boer, Sietse; Schalkwyk, Leonard C; Sluyter, Frans

    2014-10-01

    Aggressive behaviour is a major cause of mortality and morbidity. Despite of moderate heritability estimates, progress in identifying the genetic factors underlying aggressive behaviour has been limited. There are currently three genetic mouse models of high and low aggression created using selective breeding. This is the first study to offer a global transcriptomic characterization of the prefrontal cortex across all three genetic mouse models of aggression. A systems biology approach has been applied to transcriptomic data across the three pairs of selected inbred mouse strains (Turku Aggressive (TA) and Turku Non-Aggressive (TNA), Short Attack Latency (SAL) and Long Attack Latency (LAL) mice and North Carolina Aggressive (NC900) and North Carolina Non-Aggressive (NC100)), providing novel insight into the neurobiological mechanisms and genetics underlying aggression. First, weighted gene co-expression network analysis (WGCNA) was performed to identify modules of highly correlated genes associated with aggression. Probe sets belonging to gene modules uncovered by WGCNA were carried forward for network analysis using ingenuity pathway analysis (IPA). The RankProd non-parametric algorithm was then used to statistically evaluate expression differences across the genes belonging to modules significantly associated with aggression. IPA uncovered two pathways, involving NF-kB and MAPKs. The secondary RankProd analysis yielded 14 differentially expressed genes, some of which have previously been implicated in pathways associated with aggressive behaviour, such as Adrbk2. The results highlighted plausible candidate genes and gene networks implicated in aggression-related behaviour.

  19. Bacteriophage Ecology in a Commercial Cucumber Fermentation

    PubMed Central

    Pérez-Díaz, I. M.; Hayes, J. S.; Breidt, F.

    2012-01-01

    To reduce high-salt waste from cucumber fermentations, low-salt fermentations are under development. These fermentations may require the use of starter cultures to ensure normal fermentations. Because potential phage infection can cause starter culture failure, it is important to understand phage ecology in the fermentations. This study investigated the phage ecology in a commercial cucumber fermentation. Brine samples taken from a fermentation tank over a 90-day period were plated onto deMan-Rogosa-Sharpe agar plates. A total of 576 lactic acid bacterial isolates were randomly selected to serve as potential hosts for phage isolation. Filtered brine served as a phage source. Fifty-seven independent phage isolates were obtained, indicating that 10% of the bacterial isolates were sensitive to phage attack. Phage hosts include Lactobacillus brevis (67% of all hosts), Lactobacillus plantarum (21%), Weissella paramesenteroides, Weissella cibaria, and Pediococcus ethanolidurans. Nearly 50% of phages were isolated on day 14, and the majority of them attacked L. brevis. Some phages had a broad host range and were capable of infecting multiple hosts in two genera. Other phages were species specific or strain specific. About 30% of phage isolates produced turbid pinpoint plaques or only caused reduced cell growth on the bacterial lawns. Six phages with distinct host ranges were characterized. The data from this study showed that abundant and diverse phages were present in the commercial cucumber fermentation, which could cause significant mortality to the lactic acid bacteria population. Therefore, a phage control strategy may be needed in low-salt cucumber fermentations. PMID:23023756

  20. Alligator attacks in southwest Florida.

    PubMed

    Harding, Brett E; Wolf, Barbara C

    2006-05-01

    The American alligator inhabits bodies of fresh water in Florida and other southeastern states. Although attacks on pets are frequent, alligator attacks on humans are relatively rare because of the animal's natural fear of man. Because of the rarity of attacks on humans, the pathologic findings and pathophysiology of death in such cases have not been well characterized in the literature. We report three cases of fatal alligator attacks that occurred in southwest Florida, each with different pathologic findings and mechanisms of death. Although the cause of death in each case was attributed to the alligator attack, the mechanisms of death differed and included exsanguination because of amputation of an extremity, overwhelming sepsis, and drowning. These cases illustrate the varied pathophysiologies associated with deaths due to alligator attacks on humans and the features that distinguish alligator bites from those of other aquatic predators.

  1. A closer look at the relationships between panic attacks, emergency department visits and non-cardiac chest pain.

    PubMed

    Foldes-Busque, Guillaume; Denis, Isabelle; Poitras, Julien; Fleet, Richard P; Archambault, Patrick; Dionne, Clermont E

    2017-01-01

    This study examined the prevalence of emergency department visits prompted by panic attacks in patients with non-cardiac chest pain. A validated structured telephone interview was used to assess panic attacks and their association with the emergency department consultation in 1327 emergency department patients with non-cardiac chest pain. Patients reported at least one panic attack in the past 6 months in 34.5 per cent (95% confidence interval: 32.0%-37.1%) of cases, and 77.1 per cent (95% confidence interval: 73.0%-80.7%) of patients who reported panic attacks had visited the emergency department with non-cardiac chest pain following a panic attack. These results indicate that panic attacks may explain a significant proportion of emergency department visits for non-cardiac chest pain.

  2. Develop a solution for protecting and securing enterprise networks from malicious attacks

    NASA Astrophysics Data System (ADS)

    Kamuru, Harshitha; Nijim, Mais

    2014-05-01

    In the world of computer and network security, there are myriad ways to launch an attack, which, from the perspective of a network, can usually be defined as "traffic that has huge malicious intent." Firewall acts as one of the measure in order to secure the device from incoming unauthorized data. There are infinite number of computer attacks that no firewall can prevent, such as those executed locally on the machine by a malicious user. From the network's perspective, there are numerous types of attack. All the attacks that degrade the effectiveness of data can be grouped into two types: brute force and precision. The Firewall that belongs to Juniper has the capability to protect against both types of attack. Denial of Service (DoS) attacks are one of the most well-known network security threats under brute force attacks, which is largely due to the high-profile way in which they can affect networks. Over the years, some of the largest, most respected Internet sites have been effectively taken offline by Denial of Service (DOS) attacks. A DoS attack typically has a singular focus, namely, to cause the services running on a particular host or network to become unavailable. Some DoS attacks exploit vulnerabilities in an operating system and cause it to crash, such as the infamous Win nuke attack. Others submerge a network or device with traffic so that there are no more resources to handle legitimate traffic. Precision attacks typically involve multiple phases and often involves a bit more thought than brute force attacks, all the way from reconnaissance to machine ownership. Before a precision attack is launched, information about the victim needs to be gathered. This information gathering typically takes the form of various types of scans to determine available hosts, networks, and ports. The hosts available on a network can be determined by ping sweeps. The available ports on a machine can be located by port scans. Screens cover a wide variety of attack traffic as they are configured on a per-zone basis. Depending on the type of screen being configured, there may be additional settings beyond simply blocking the traffic. Attack prevention is also a native function of any firewall. Juniper Firewall handles traffic on a per-flow basis. We can use flows or sessions as a way to determine whether traffic attempting to traverse the firewall is legitimate. We control the state-checking components resident in Juniper Firewall by configuring "flow" settings. These settings allow you to configure state checking for various conditions on the device. You can use flow settings to protect against TCP hijacking, and to generally ensure that the fire-wall is performing full state processing when desired. We take a case study of attack on a network and perform study of the detection of the malicious packets on a Net screen Firewall. A new solution for securing enterprise networks will be developed here.

  3. Percolation Features on Climate Network under Attacks of El Niño Events

    NASA Astrophysics Data System (ADS)

    Lu, Z.

    2015-12-01

    Percolation theory under different attacks is one of the main research areas in complex networks but never be applied to investigate climate network. In this study, for the first time we construct a climate network of surface air temperature field to analyze its percolation features. Here, we regard El Niño event as a kind of naturally attacks generated from Pacific Ocean to attack its upper climate network. We find that El Niño event leads an abrupt percolation phase transition to the climate network which makes it splitting and unstable suddenly. Comparing the results of the climate network under three different forms of attacks, including most connected attack (MA), localized attack (LA) and random attack (RA) respectively, it is found that both MA and LA lead first-order transition and RA leads second-order transition to the climate network. Furthermore, we find that most real attacks consist of all these three forms of attacks. With El Niño event emerging, the ratios of LA and MA increase and dominate the style of attack while RA decreasing. It means the percolation phase transition due to El Niño events is close to first-order transition mostly affected by LA and MA. Our research may help us further understand two questions from perspective of percolation on network: (1) Why not all warming in Pacific Ocean but El Niño events could affect the climate. (2) Why the climate affected by El Niño events changes abruptly.

  4. Symptom Induction and De-escalation in the Treatment of Panic Attacks.

    ERIC Educational Resources Information Center

    Dattilio, Frank M.

    1990-01-01

    Describes technique known as symptom induction and de-escalation for panic attacks in which goal is to reproduce the type of situation that may precipitate an attack and then to show the client how the attacks can be "turned on" as well as "turned off." (ABL)

  5. Don't Take a Chance with a Heart Attack: Know the Facts and Act Fast

    MedlinePlus

    heart attack Know the symptoms. Take action. call Don’t Take a Chance With a Heart Attack: Know the Facts and Act Fast “ One evening ... didn’t think I could be having a heart attack. I didn’t expect it to happen to ...

  6. Learn What a Heart Attack Feels Like--It Could Save Your Life

    MedlinePlus

    Learn What a Heart Attack Feels Like— It Could Save Your Life. This fact sheet tells you about heart attack signs. It also tells you what to ... heart attack warning signs. Your chest hurts or feels squeezed. One or both arms, your back, shoulders, ...

  7. Practical Challenges of Current Video Rate OCT Elastography: Accounting for Dynamic and Static Tissue Properties

    PubMed Central

    Brezinski, Mark E

    2017-01-01

    Optical coherence tomography (OCT) elastography (OCTE) has the potential to be an important diagnostic tool for pathologies including coronary artery disease, osteoarthritis, malignancies, and even dental caries. Many groups have performed OCTE, including our own, using a wide range of approaches. However, we will demonstrate current OCTE approaches are not scalable to real-time, in vivo imaging. As will be discussed, among the most important reasons is current designs focus on the system and not the target. Specifically, tissue dynamic responses are not accounted, with examples being the tissue strain response time, preload variability, and conditioning variability. Tissue dynamic responses, and to a lesser degree static tissue properties, prevent accurate video rate modulus assessments for current embodiments. Accounting for them is the focus of this paper. A top-down approach will be presented to overcome these challenges to real time in vivo tissue characterization. Discussed first is an example clinical scenario where OTCE would be of substantial relevance, the prevention of acute myocardial infarction or heart attacks. Then the principles behind OCTE are examined. Next, constrains on in vivo application of current OCTE are evaluated, focusing on dynamic tissue responses. An example is the tissue strain response, where it takes about 20 msec after a stress is applied to reach plateau. This response delay is not an issue at slow acquisition rates, as most current OCTE approaches are preformed, but it is for video rate OCTE. Since at video rate each frame is only 30 msec, for essentially all current approaches this means the strain for a given stress is changing constantly during the B-scan. Therefore the modulus can’t be accurately assessed. This serious issue is an even greater problem for pulsed techniques as it means the strain/modulus for a given stress (at a location) is unpredictably changing over a B-scan. The paper concludes by introducing a novel video rate approach to overcome these challenges. PMID:29286052

  8. Practical Challenges of Current Video Rate OCT Elastography: Accounting for Dynamic and Static Tissue Properties.

    PubMed

    Brezinski, Mark E

    2014-12-01

    Optical coherence tomography (OCT) elastography (OCTE) has the potential to be an important diagnostic tool for pathologies including coronary artery disease, osteoarthritis, malignancies, and even dental caries. Many groups have performed OCTE, including our own, using a wide range of approaches. However, we will demonstrate current OCTE approaches are not scalable to real-time, in vivo imaging. As will be discussed, among the most important reasons is current designs focus on the system and not the target. Specifically, tissue dynamic responses are not accounted, with examples being the tissue strain response time, preload variability, and conditioning variability. Tissue dynamic responses, and to a lesser degree static tissue properties, prevent accurate video rate modulus assessments for current embodiments. Accounting for them is the focus of this paper. A top-down approach will be presented to overcome these challenges to real time in vivo tissue characterization. Discussed first is an example clinical scenario where OTCE would be of substantial relevance, the prevention of acute myocardial infarction or heart attacks. Then the principles behind OCTE are examined. Next, constrains on in vivo application of current OCTE are evaluated, focusing on dynamic tissue responses. An example is the tissue strain response, where it takes about 20 msec after a stress is applied to reach plateau. This response delay is not an issue at slow acquisition rates, as most current OCTE approaches are preformed, but it is for video rate OCTE. Since at video rate each frame is only 30 msec, for essentially all current approaches this means the strain for a given stress is changing constantly during the B-scan. Therefore the modulus can't be accurately assessed. This serious issue is an even greater problem for pulsed techniques as it means the strain/modulus for a given stress (at a location) is unpredictably changing over a B-scan. The paper concludes by introducing a novel video rate approach to overcome these challenges.

  9. The Lectin Complement Pathway Is Involved in Protection Against Enteroaggregative Escherichia coli Infection.

    PubMed

    Adler Sørensen, Camilla; Rosbjerg, Anne; Hebbelstrup Jensen, Betina; Krogfelt, Karen Angeliki; Garred, Peter

    2018-01-01

    Enteroaggregative Escherichia coli (EAEC) causes acute and persistent diarrhea worldwide. Still, the involvement of host factors in EAEC infections is unresolved. Binding of recognition molecules from the lectin pathway of complement to EAEC strains have been observed, but the importance is not known. Our aim was to uncover the involvement of these molecules in innate complement dependent immune protection toward EAEC. Binding of mannose-binding lectin, ficolin-1, -2, and -3 to four prototypic EAEC strains, and ficolin-2 binding to 56 clinical EAEC isolates were screened by a consumption-based ELISA method. Flow cytometry was used to determine deposition of C4b, C3b, and the bactericidal C5b-9 membrane attack complex (MAC) on the bacteria in combination with different complement inhibitors. In addition, the direct serum bactericidal effect was assessed. Screening of the prototypic EAEC strains revealed that ficolin-2 was the major binder among the lectin pathway recognition molecules. However, among the clinical EAEC isolates only a restricted number ( n  = 5) of the isolates bound ficolin-2. Using the ficolin-2 binding isolate C322-17 as a model, we found that incubation with normal human serum led to deposition of C4b, C3b, and to MAC formation. No inhibition of complement deposition was observed when a C1q inhibitor was added, while partial inhibition was observed when ficolin-2 or factor D inhibitors were used separately. Combining the inhibitors against ficolin-2 and factor D led to virtually complete inhibition of complement deposition and protection against direct bacterial killing. These results demonstrate that ficolin-2 may play an important role in innate immune protection against EAEC when an appropriate ligand is exposed, but many EAEC strains evade lectin pathway recognition and may, therefore, circumvent this strategy of innate host immune protection.

  10. Case report: Pig attack with successful postexposure prophylaxis management.

    PubMed

    Hall, A Brad; Smith, David; Palmer, Jillian

    2014-05-01

    The domesticated pig or boar is ubiquitous to agriculture around the world and is an important food product in most countries. The males that are able to grow tusks that can approach 5 in are the primary contributor to morbidity and mortality from boar attacks. Literature surrounding domesticated boar attacks is sparse. There are no published cases of domesticated boar attacks that describe successful bacterial postexposure prophylaxis. We present a case report of an attack on an adult female by a domesticated boar.

  11. Cougar attacks on humans: a case report.

    PubMed

    McKee, Denise

    2003-01-01

    Cougar attacks on humans are increasing. Presented is a case report of a nonfatal 2-year-old male cougar attack on an 8-year-old girl in British Columbia. Discussions of wound management, rabies postexposure prophylaxis (RPEP), and the possible psychologic ramifications of such an attack are presented. Also reviewed are recommendations on actions that may be helpful in preventing an attack following a sudden encounter with a cougar. Humans must learn to coexist with cougars, which present a small but real threat to people.

  12. Epidemics of panic during a bioterrorist attack--a mathematical model.

    PubMed

    Radosavljevic, Vladan; Radunovic, Desanka; Belojevic, Goran

    2009-09-01

    A bioterrorist attacks usually cause epidemics of panic in a targeted population. We have presented epidemiologic aspect of this phenomenon as a three-component model--host, information on an attack and social network. We have proposed a mathematical model of panic and counter-measures as the function of time in a population exposed to a bioterrorist attack. The model comprises ordinary differential equations and graphically presented combinations of the equations parameters. Clinically, we have presented a model through a sequence of psychic conditions and disorders initiated by an act of bioterrorism. This model might be helpful for an attacked community to timely and properly apply counter-measures and to minimize human mental suffering during a bioterrorist attack.

  13. Metabolic Pathway Involved in 6-Chloro-2-Benzoxazolinone Degradation by Pigmentiphaga sp. Strain DL-8 and Identification of the Novel Metal-Dependent Hydrolase CbaA

    PubMed Central

    Dong, Weiliang; Wang, Fei; Huang, Fei; Wang, Yicheng; Zhou, Jie; Ye, Xianfeng; Li, Zhoukun; Hou, Ying; Huang, Yan; Ma, Jiangfeng; Jiang, Min

    2016-01-01

    ABSTRACT 6-Chloro-2-benzoxazolinone (CDHB) is a precursor of herbicide, insecticide, and fungicide synthesis and has a broad spectrum of biological activity. Pigmentiphaga sp. strain DL-8 can transform CDHB into 2-amino-5-chlorophenol (2A5CP), which it then utilizes as a carbon source for growth. The CDHB hydrolase (CbaA) was purified from strain DL-8, which can also hydrolyze 2-benzoxazolinone (BOA), 5-chloro-2-BOA, and benzamide. The specific activity of purified CbaA was 5,900 U · mg protein−1 for CDHB, with Km and kcat values of 0.29 mM and 8,500 s−1, respectively. The optimal pH for purified CbaA was 9.0, the highest activity was observed at 55°C, and the inactive metal-free enzyme could be reactivated by Mg2+, Ni2+, Ca2+, or Zn2+. Based on the results obtained for the CbaA peptide mass fingerprinting and draft genome sequence of strain DL-8, cbaA (encoding 339 amino acids) was cloned and expressed in Escherichia coli BL21(DE3). CbaA shared 18 to 21% identity with some metal-dependent hydrolases of the PF01499 family and contained the signature metal-binding motif Q127XXXQ131XD133XXXH137. The conserved amino acid residues His288 and Glu301 served as the proton donor and acceptor. E. coli BL21(DE3-pET-cbaA) resting cells could transform 0.2 mM CDHB into 2A5CP. The mutant strain DL-8ΔcbaA lost the ability to degrade CDHB but retained the ability to degrade 2A5CP, consistent with strain DL-8. These results indicated that cbaA was the key gene responsible for CDHB degradation by strain DL-8. IMPORTANCE 2-Benzoxazolinone (BOA) derivatives are widely used as synthetic intermediates and are also an important group of allelochemicals acting in response to tissue damage or pathogen attack in gramineous plants. However, the degradation mechanism of BOA derivatives by microorganisms is not clear. In the present study, we reported the identification of CbaA and metabolic pathway responsible for the degradation of CDHB in Pigmentiphaga sp. DL-8. This will provide microorganism and gene resources for the bioremediation of the environmental pollution caused by BOA derivatives. PMID:27208123

  14. Framework and methodology for supply chain lifecycle analytics

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hamlet, Jason; Eames, Brandon K.; Kao, Gio K.

    The various technologies presented herein relate to pertaining to identifying and mitigating risks and attacks on a supply chain. A computer-implemented representation of a supply chain is generated comprising nodes (locations) and edges (objects, information). Risk to attack and different attack vectors can be defined for the various nodes and edges, and further, based upon the risks and attacks, (difficulty, consequence) pairs can be determined. One or more mitigations can be generated to increase a difficulty of attack and/or reduce consequence of an attack. The one or more mitigations can be constrained, e.g., by cost, time, etc., to facilitate determinationmore » of how feasible a respective mitigation is to implement with regard to finances available, duration to implement, etc. A context-free grammar can be utilized to identify one or more attacks in the supply chain. Further, the risks can undergo a ranking to enable mitigation priority to be determined.« less

  15. Wind-tunnel investigation of the flow correction for a model-mounted angle of attack sensor at angles of attack from -10 deg to 110 deg. [Langley 12-foot low speed wind tunnel test

    NASA Technical Reports Server (NTRS)

    Moul, T. M.

    1979-01-01

    A preliminary wind tunnel investigation was undertaken to determine the flow correction for a vane angle of attack sensor over an angle of attack range from -10 deg to 110 deg. The sensor was mounted ahead of the wing on a 1/5 scale model of a general aviation airplane. It was shown that the flow correction was substantial, reaching about 15 deg at an angle of attack of 90 deg. The flow correction was found to increase as the sensor was moved closer to the wing or closer to the fuselage. The experimentally determined slope of the flow correction versus the measured angle of attack below the stall angle of attack agreed closely with the slope of flight data from a similar full scale airplane.

  16. Modeling and Managing Risk in Billing Infrastructures

    NASA Astrophysics Data System (ADS)

    Baiardi, Fabrizio; Telmon, Claudio; Sgandurra, Daniele

    This paper discusses risk modeling and risk management in information and communications technology (ICT) systems for which the attack impact distribution is heavy tailed (e.g., power law distribution) and the average risk is unbounded. Systems with these properties include billing infrastructures used to charge customers for services they access. Attacks against billing infrastructures can be classified as peripheral attacks and backbone attacks. The goal of a peripheral attack is to tamper with user bills; a backbone attack seeks to seize control of the billing infrastructure. The probability distribution of the overall impact of an attack on a billing infrastructure also has a heavy-tailed curve. This implies that the probability of a massive impact cannot be ignored and that the average impact may be unbounded - thus, even the most expensive countermeasures would be cost effective. Consequently, the only strategy for managing risk is to increase the resilience of the infrastructure by employing redundant components.

  17. Attack-tolerant networked control system: an approach for detection the controller stealthy hijacking attack

    NASA Astrophysics Data System (ADS)

    Atta Yaseen, Amer; Bayart, Mireille

    2017-01-01

    In this work, a new approach will be introduced as a development for the attack-tolerant scheme in the Networked Control System (NCS). The objective is to be able to detect an attack such as the Stuxnet case where the controller is reprogrammed and hijacked. Besides the ability to detect the stealthy controller hijacking attack, the advantage of this approach is that there is no need for a priori mathematical model of the controller. In order to implement the proposed scheme, a specific detector for the controller hijacking attack is designed. The performance of this scheme is evaluated be connected the detector to NCS with basic security elements such as Data Encryption Standard (DES), Message Digest (MD5), and timestamp. The detector is tested along with networked PI controller under stealthy hijacking attack. The test results of the proposed method show that the hijacked controller can be significantly detected and recovered.

  18. Mental health service use among American Red Cross disaster workers responding to the September 11, 2001 U.S. terrorist attacks.

    PubMed

    Elhai, Jon D; Jacobs, Gerard A; Kashdan, Todd B; DeJong, Gary L; Meyer, David L; Frueh, B Christopher

    2006-06-30

    In this article, we explored 1) the extent of mental health (MH) service use by American Red Cross disaster relief workers, both before (lifetime) and 1 year after the September 11, 2001 terrorist attacks, and 2) demographic, disaster and MH variables predicting (1-year) post-September 11 MH service use in this population. A sample of 3015 Red Cross disaster workers was surveyed 1 year after the attacks, regarding demographic characteristics, MH service use before and since the attacks, and posttraumatic stress disorder (PTSD) symptoms. Findings revealed that while 13.5% used MH services before the attacks, 10.7% used services after. Variables increasing the likelihood of MH service use after the attacks included the following: no previous MH treatment, younger age, being divorced/widowed, and higher PTSD intrusion or hyperarousal symptoms. Findings support other recent research on MH service use after the September 11 attacks.

  19. Monitoring of continuous-variable quantum key distribution system in real environment.

    PubMed

    Liu, Weiqi; Peng, Jinye; Huang, Peng; Huang, Duan; Zeng, Guihua

    2017-08-07

    How to guarantee the practical security of continuous-variable quantum key distribution (CVQKD) system has been an important issue in the quantum cryptography applications. In contrast to the previous practical security strategies, which focus on the intercept-resend attack or the Gaussian attack, we investigate the practical security strategy based on a general attack, i.e., an arbitrated individual attack or collective attack on the system by Eve in this paper. The low bound of intensity disturbance of the local oscillator signal for eavesdropper successfully concealing herself is obtained, considering all noises can be used by Eve in the practical environment. Furthermore, we obtain an optimal monitoring condition for the practical CVQKD system so that legitimate communicators can monitor the general attack in real-time. As examples, practical security of two special systems, i.e., the Gaussian modulated coherent state CVQKD system and the middle-based CVQKD system, are investigated under the intercept-resend attacks.

  20. An analysis of influenza outbreaks in institutions and enclosed societies.

    PubMed

    Finnie, T J R; Copley, V R; Hall, I M; Leach, S

    2014-01-01

    This paper considers the reported attack ratio arising from outbreaks of influenza in enclosed societies. These societies are isolated from the wider community and have greater opportunities for contact between members which would aid the spread of disease. While the particular kind of society (prison, care home, school, barracks, etc.) was not a significant factor in an adjusted model of attack ratio, a person's occupation within the society was. In particular, children and military personnel suffer a greater attack ratio than other occupational types (staff, prisoners, etc.). There was no temporal trend in final attack ratio nor, with the exception of 1918, do pandemic years show abnormal attack ratios. We also observed that as community size increases, the attack ratio undergoes steep nonlinear decline. This statistical analysis draws attention to how the organization of such societies, their size and the occupations of individuals within them affect the final attack ratio.

  1. Analysis of Network Vulnerability Under Joint Node and Link Attacks

    NASA Astrophysics Data System (ADS)

    Li, Yongcheng; Liu, Shumei; Yu, Yao; Cao, Ting

    2018-03-01

    The security problem of computer network system is becoming more and more serious. The fundamental reason is that there are security vulnerabilities in the network system. Therefore, it’s very important to identify and reduce or eliminate these vulnerabilities before they are attacked. In this paper, we are interested in joint node and link attacks and propose a vulnerability evaluation method based on the overall connectivity of the network to defense this attack. Especially, we analyze the attack cost problem from the attackers’ perspective. The purpose is to find the set of least costs for joint links and nodes, and their deletion will lead to serious network connection damage. The simulation results show that the vulnerable elements obtained from the proposed method are more suitable for the attacking idea of the malicious persons in joint node and link attack. It is easy to find that the proposed method has more realistic protection significance.

  2. On Mitigating Distributed Denial of Service Attacks

    ERIC Educational Resources Information Center

    Gao, Zhiqiang

    2006-01-01

    Denial of service (DoS) attacks and distributed denial of service (DDoS) attacks are probably the most ferocious threats in the Internet, resulting in tremendous economic and social implications/impacts on our daily lives that are increasingly depending on the well-being of the Internet. How to mitigate these attacks effectively and efficiently…

  3. Cyberprints: Identifying Cyber Attackers by Feature Analysis

    ERIC Educational Resources Information Center

    Blakely, Benjamin A.

    2012-01-01

    The problem of attributing cyber attacks is one of increasing importance. Without a solid method of demonstrating the origin of a cyber attack, any attempts to deter would-be cyber attackers are wasted. Existing methods of attribution make unfounded assumptions about the environment in which they will operate: omniscience (the ability to gather,…

  4. 77 FR 61433 - Applications and Amendments to Facility Operating Licenses and Combined Licenses Involving...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-09

    ... attacks up to and including the design basis cyber attack threat, thereby achieving high assurance that... provide assurance that safety-related SSCs are protected from cyber attacks. Implementation of 10 CFR 73... of ``high assurance of adequate protection against cyber attacks.'' The proposed revision would not...

  5. Do attacks by jaguars Panthera onca and pumas Puma concolor (Carnivora: Felidae) on livestock correlate with species richness and relative abundance of wild prey?

    PubMed

    Burgas, Albert; Amit, Ronit; Lopez, Bernat C

    2014-12-01

    Abstract: Attacks by big cats on livestock are one of the major causes of human-felid conflicts and, therefore, an important factor in the conservation of these species. It has been argued that a reduction in natural prey abundance promotes attacks on domestic species, but few studies have tested this statement, and some have delivered contradictory results. We investigated whether the occurrence of attacks to livestock by jaguar and puma relates to the abundance and richness of their natural prey. In the rainy season 2009, we tracked potential prey species counting signs of presence along linear transects in 14 non-attacked cattle farms (control) and in 14 attacked cattle farms in NW Costa Rica. There was a negative relationship between the occurrence of attacks and both species richness (p = 0.0014) and abundance (p = 0.0012) of natural prey. Our results support the establishment of actions to promote support and recovery of natural prey, in order to diminish attacks on livestock, while maintaining jaguar and puma populations.

  6. Optimal Attack Strategies Subject to Detection Constraints Against Cyber-Physical Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chen, Yuan; Kar, Soummya; Moura, Jose M. F.

    This paper studies an attacker against a cyberphysical system (CPS) whose goal is to move the state of a CPS to a target state while ensuring that his or her probability of being detected does not exceed a given bound. The attacker’s probability of being detected is related to the nonnegative bias induced by his or her attack on the CPS’s detection statistic. We formulate a linear quadratic cost function that captures the attacker’s control goal and establish constraints on the induced bias that reflect the attacker’s detection-avoidance objectives. When the attacker is constrained to be detected at the false-alarmmore » rate of the detector, we show that the optimal attack strategy reduces to a linear feedback of the attacker’s state estimate. In the case that the attacker’s bias is upper bounded by a positive constant, we provide two algorithms – an optimal algorithm and a sub-optimal, less computationally intensive algorithm – to find suitable attack sequences. Lastly, we illustrate our attack strategies in numerical examples based on a remotely-controlled helicopter under attack.« less

  7. Application of the PageRank Algorithm to Alarm Graphs

    NASA Astrophysics Data System (ADS)

    Treinen, James J.; Thurimella, Ramakrishna

    The task of separating genuine attacks from false alarms in large intrusion detection infrastructures is extremely difficult. The number of alarms received in such environments can easily enter into the millions of alerts per day. The overwhelming noise created by these alarms can cause genuine attacks to go unnoticed. As means of highlighting these attacks, we introduce a host ranking technique utilizing Alarm Graphs. Rather than enumerate all potential attack paths as in Attack Graphs, we build and analyze graphs based on the alarms generated by the intrusion detection sensors installed on a network. Given that the alarms are predominantly false positives, the challenge is to identify, separate, and ideally predict future attacks. In this paper, we propose a novel approach to tackle this problem based on the PageRank algorithm. By elevating the rank of known attackers and victims we are able to observe the effect that these hosts have on the other nodes in the Alarm Graph. Using this information we are able to discover previously overlooked attacks, as well as defend against future intrusions.

  8. Localized attacks on spatially embedded networks with dependencies.

    PubMed

    Berezin, Yehiel; Bashan, Amir; Danziger, Michael M; Li, Daqing; Havlin, Shlomo

    2015-03-11

    Many real world complex systems such as critical infrastructure networks are embedded in space and their components may depend on one another to function. They are also susceptible to geographically localized damage caused by malicious attacks or natural disasters. Here, we study a general model of spatially embedded networks with dependencies under localized attacks. We develop a theoretical and numerical approach to describe and predict the effects of localized attacks on spatially embedded systems with dependencies. Surprisingly, we find that a localized attack can cause substantially more damage than an equivalent random attack. Furthermore, we find that for a broad range of parameters, systems which appear stable are in fact metastable. Though robust to random failures-even of finite fraction-if subjected to a localized attack larger than a critical size which is independent of the system size (i.e., a zero fraction), a cascading failure emerges which leads to complete system collapse. Our results demonstrate the potential high risk of localized attacks on spatially embedded network systems with dependencies and may be useful for designing more resilient systems.

  9. Optimal Attack Strategies Subject to Detection Constraints Against Cyber-Physical Systems

    DOE PAGES

    Chen, Yuan; Kar, Soummya; Moura, Jose M. F.

    2017-03-31

    This paper studies an attacker against a cyberphysical system (CPS) whose goal is to move the state of a CPS to a target state while ensuring that his or her probability of being detected does not exceed a given bound. The attacker’s probability of being detected is related to the nonnegative bias induced by his or her attack on the CPS’s detection statistic. We formulate a linear quadratic cost function that captures the attacker’s control goal and establish constraints on the induced bias that reflect the attacker’s detection-avoidance objectives. When the attacker is constrained to be detected at the false-alarmmore » rate of the detector, we show that the optimal attack strategy reduces to a linear feedback of the attacker’s state estimate. In the case that the attacker’s bias is upper bounded by a positive constant, we provide two algorithms – an optimal algorithm and a sub-optimal, less computationally intensive algorithm – to find suitable attack sequences. Lastly, we illustrate our attack strategies in numerical examples based on a remotely-controlled helicopter under attack.« less

  10. Migraine attack treatment : a tailor-made suit, not one size fits all.

    PubMed

    Belvis, Robert; Mas, Natalia; Aceituno, Azahara

    2014-04-01

    About 15% of people in the world suffer migraine attacks. Migraine can induce a great impact in the quality of life, and the costs of medical care and loss of productivity can be also high. Non-steroidal anti-inflammatory drugs (NSAIDs) are the best treatment in mild-to-moderate migraine attacks and triptans are the first line option in the acute treatment of moderate-to-severe migraine attacks. At present, there are seven marketed triptans: sumatriptan, rizatriptan, zolmitriptan, eletriptan, naratriptan, almotriptan and frovatriptan. Obviously, every drug presents different pharmacokinetic and pharmacodynamics properties and, moreover, some triptans have several formulations. The prescription of one of these seven triptans for a specified patient is based in the drug profile: efficacy, safety, pharmacokinetics and pharmacodynamics. Other data to take account in the final prescription are clinical characteristics of the migraine attack (speed of onset, intensity of pain, lasting of the attack) and patient characteristics as working habits, life style or medical history. It is therefore mandatory to perform an individualization of the treatment of migraine attack. In recent years, several new patents of drugs have been registered in the treatment of migraine attack, although most of these are already known drugs that only provide new routes of administration. We present an update on the treatment of the migraine attack.

  11. Robust ECC-based authenticated key agreement scheme with privacy protection for Telecare medicine information systems.

    PubMed

    Zhang, Liping; Zhu, Shaohui

    2015-05-01

    To protect the transmission of the sensitive medical data, a secure and efficient authenticated key agreement scheme should be deployed when the healthcare delivery session is established via Telecare Medicine Information Systems (TMIS) over the unsecure public network. Recently, Islam and Khan proposed an authenticated key agreement scheme using elliptic curve cryptography for TMIS. They claimed that their proposed scheme is provably secure against various attacks in random oracle model and enjoys some good properties such as user anonymity. In this paper, however, we point out that any legal but malicious patient can reveal other user's identity. Consequently, their scheme suffers from server spoofing attack and off-line password guessing attack. Moreover, if the malicious patient performs the same time of the registration as other users, she can further launch the impersonation attack, man-in-the-middle attack, modification attack, replay attack, and strong replay attack successfully. To eliminate these weaknesses, we propose an improved ECC-based authenticated key agreement scheme. Security analysis demonstrates that the proposed scheme can resist various attacks and enables the patient to enjoy the remote healthcare services with privacy protection. Through the performance evaluation, we show that the proposed scheme achieves a desired balance between security and performance in comparisons with other related schemes.

  12. Public Figure Attacks in the United States, 1995-2015.

    PubMed

    Meloy, J Reid; Amman, Molly

    2016-09-01

    An archival descriptive study of public figure attackers in the United States between 1995 and 2015 was undertaken. Fifty-six incidents were identified, primarily through exhaustive internet searches, composed of 58 attackers and 58 victims. A code book was developed which focused upon victims, offenders, pre-attack behaviors including direct threats, attack characteristics, post-offense and other outcomes, motivations and psychological abstracts. The average interrater agreement for coding of bivariate variables was 0.835 (intraclass correlation coefficient). The three most likely victim categories were politicians, judges, and athletes. Attackers were males, many with a psychiatric disorder, most were grandiose, and most had both a violent and nonviolent criminal history. The known motivations for the attacks were often angry and personal, the most common being dissatisfaction with a judicial or other governmental process (23%). In only one case was the primary motivation to achieve notoriety. Lethality risk during an attack was 55%. Collateral injury or death occurred in 29% of the incidents. Only 5% communicated a direct threat to the target beforehand. The term "publicly intimate figure" is introduced to describe the sociocultural blurring of public and private lives among the targets, and its possible role in some attackers' perceptions and motivations. Copyright © 2016 John Wiley & Sons, Ltd. Copyright © 2016 John Wiley & Sons, Ltd.

  13. Differential Fault Analysis on CLEFIA with 128, 192, and 256-Bit Keys

    NASA Astrophysics Data System (ADS)

    Takahashi, Junko; Fukunaga, Toshinori

    This paper describes a differential fault analysis (DFA) attack against CLEFIA. The proposed attack can be applied to CLEFIA with all supported keys: 128, 192, and 256-bit keys. DFA is a type of side-channel attack. This attack enables the recovery of secret keys by injecting faults into a secure device during its computation of the cryptographic algorithm and comparing the correct ciphertext with the faulty one. CLEFIA is a 128-bit blockcipher with 128, 192, and 256-bit keys developed by the Sony Corporation in 2007. CLEFIA employs a generalized Feistel structure with four data lines. We developed a new attack method that uses this characteristic structure of the CLEFIA algorithm. On the basis of the proposed attack, only 2 pairs of correct and faulty ciphertexts are needed to retrieve the 128-bit key, and 10.78 pairs on average are needed to retrieve the 192 and 256-bit keys. The proposed attack is more efficient than any previously reported. In order to verify the proposed attack and estimate the calculation time to recover the secret key, we conducted an attack simulation using a PC. The simulation results show that we can obtain each secret key within three minutes on average. This result shows that we can obtain the entire key within a feasible computational time.

  14. Relevance of terrorism for Italian students not directly exposed to it: The affective impact of the 2015 Paris and the 2016 Brussels attacks.

    PubMed

    Raccanello, Daniela; Burro, Roberto; Brondino, Margherita; Pasini, Margherita

    2018-04-01

    Notwithstanding the dramatically increasing frequency of acts of terrorism in Europe and the extent of their media coverage, there is lack of knowledge on people's affective reactions and associated emotion regulation strategies. We explored the affective impact on two cohorts of Italian students (n = 193) possibly exposed vicariously through the mass media to the 2015 Paris or the 2016 Brussels terrorist attacks, respectively. We accessed data from three online questionnaires: one on emotion regulation administered before each attack; one on daily affect administered just before and after each attack; and one on causes of weekly affect and life satisfaction administered at the end of the week in which each attack occurred. The attacks were perceived as relevant for influencing negative affect for 22% of the students. For them, suppression-less frequently used than reappraisal-was associated with an improvement of affect after each attack but negatively related to life satisfaction concerning the week in which the attacks occurred. Our data showed that the recent terrorist attacks occurring in Europe had an affective impact on people at some distance who were vicariously exposed and point to the protective role of emotion regulation as a key resource for individuals' well-being. Copyright © 2017 John Wiley & Sons, Ltd.

  15. Fear of Terrorism in New York After the September 11 Terrorist Attacks: Implications for Emergency Mental Health and Preparedness

    PubMed Central

    Boscarino, Joseph A.; Figley, Charles R.; Adams, Richard E.

    2009-01-01

    To examine the public’s response to future terrorist attacks, we surveyed 1,001 New Yorkers in the community one year after the September 11 attacks. Overall, New Yorkers were very concerned about future terrorist attacks and also concerned about attacks involving biological or nuclear weapons. In addition, while most New Yorkers reported that if a biological or nuclear attack occurred they would evaluate available information before evacuating, a significant number reported they would immediately evacuate, regardless of police or public health communications to the contrary. The level of public concern was significantly higher on all measures among New York City and Long Island residents (downstate) compared to the rest of the state. A model predicting higher fear of terrorism indicated that downstate residents, women, those 45 to 64 years old, African Americans and Hispanics, those with less education/income, and those more likely to flee, were more fearful of future attacks. In addition, making disaster preparations and carefully evaluating emergency information also predicted a higher level of fear as well. A second model predicting who would flee suggested that those more likely to evaluate available information were less likely to immediately evacuate, while those with a higher fear of future attacks were more likely to flee the area. Given these findings and the possibility of future attacks, mental health professionals need to be more involved in preparedness efforts, especially related to the psychological impact of attacks involving weapons of mass destruction. PMID:14730761

  16. Ethanol injection of ornamental trees facilitates testing insecticide efficacy against ambrosia beetles (Coleoptera: Curculionidae: Scolytinae).

    PubMed

    Reding, Michael E; Oliver, Jason B; Schultz, Peter B; Ranger, Christopher M; Youssef, Nadeer N

    2013-02-01

    Exotic ambrosia beetles are damaging pests in ornamental tree nurseries in North America. The species Xylosandrus crassiusculus (Motshulsky) and Xylosandrus germanus (Blandford) are especially problematic. Management of these pests relies on preventive treatments of insecticides. However, field tests of recommended materials on nursery trees have been limited because of unreliable attacks by ambrosia beetles on experimental trees. Ethanol-injection of trees was used to induce colonization by ambrosia beetles to evaluate insecticides and botanical formulations for preventing attacks by ambrosia beetles. Experiments were conducted in Ohio, Tennessee, and Virginia. Experimental trees injected with ethanol had more attacks by ambrosia beetles than uninjected control trees in all but one experiment. Xylosandrus crassiusculus and X. germanus colonized trees injected with ethanol. In most experiments, attack rates declined 8 d after ethanol-injection. Ethanol-injection induced sufficient pressure from ambrosia beetles to evaluate the efficacy of insecticides for preventing attacks. Trunk sprays of permethrin suppressed cumulative total attacks by ambrosia beetles in most tests. Trunk sprays of the botanical formulations Armorex and Veggie Pharm suppressed cumulative total attacks in Ohio. Armorex, Armorex + Permethrin, and Veggie Pharm + Permethrin suppressed attacks in Tennessee. The bifenthrin product Onyx suppressed establishment of X. germanus in one Ohio experiment, and cumulative total ambrosia beetle attacks in Virginia. Substrate drenches and trunk sprays of neonicotinoids, or trunk sprays of anthranilic diamides or tolfenpyrad were not effective. Ethanol-injection is effective for inducing attacks and ensuring pressure by ambrosia beetles for testing insecticide efficacy on ornamental trees.

  17. Do Unexpected Panic Attacks Occur Spontaneously?

    PubMed Central

    Meuret, Alicia E.; Rosenfield, David; Wilhelm, Frank H.; Zhou, Enlu; Conrad, Ansgar; Ritz, Thomas; Roth, Walton T.

    2012-01-01

    Background Spontaneous or unexpected panic attacks, per definition, occur out-of-the blue, in absence of cues or triggers. Accordingly, physiological arousal or instability should occur at the onset of or during the attack, but not preceding it. To test this hypothesisweexaminedif points of significant autonomic changes preceded the onset of spontaneous panic attacks. Methods Forty-three panic disorder patients underwent repeated 24-hour ambulatory monitoring. Thirteen naturally panic attacks were recorded during 1,960 hours of monitoring. Minute-by-minute epochs beginning 60 minutes before, and continuing to 10 minutes after, the onset of individual attacks were examined for respiration, heart rate, and skin conductance level. Measures were controlled for physical activity and vocalization, and compared to time matched control periods within the same person. Results Significant patterns of instability across a numberof autonomic and respiratory variables were detected as early as 47 minutes before panic onset. The final minutes prior to onset were dominated by respiratory changes, with significant decreases in tidal volume followed by abrupt PCO2 increases. Panic attack onset was characterized by heart rate and tidal volume increases and a drop in PCO2. Symptom report was consistent with these changes. Skin conductance levels were generally elevated in the hour before and duringthe attacks. Changes in the matched control periods were largely absent. Conclusions Significant autonomic irregularities preceded the onset of attacks that were reported as abrupt and unexpected. The findings invite reconsideration of the current diagnostic distinction betweenuncuedand cued panic attacks. PMID:21783179

  18. Insecurity of Wireless Networks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sheldon, Frederick T; Weber, John Mark; Yoo, Seong-Moo

    Wireless is a powerful core technology enabling our global digital infrastructure. Wi-Fi networks are susceptible to attacks on Wired Equivalency Privacy, Wi-Fi Protected Access (WPA), and WPA2. These attack signatures can be profiled into a system that defends against such attacks on the basis of their inherent characteristics. Wi-Fi is the standard protocol for wireless networks used extensively in US critical infrastructures. Since the Wired Equivalency Privacy (WEP) security protocol was broken, the Wi-Fi Protected Access (WPA) protocol has been considered the secure alternative compatible with hardware developed for WEP. However, in November 2008, researchers developed an attack on WPA,more » allowing forgery of Address Resolution Protocol (ARP) packets. Subsequent enhancements have enabled ARP poisoning, cryptosystem denial of service, and man-in-the-middle attacks. Open source systems and methods (OSSM) have long been used to secure networks against such attacks. This article reviews OSSMs and the results of experimental attacks on WPA. These experiments re-created current attacks in a laboratory setting, recording both wired and wireless traffic. The article discusses methods of intrusion detection and prevention in the context of cyber physical protection of critical Internet infrastructure. The basis for this research is a specialized (and undoubtedly incomplete) taxonomy of Wi-Fi attacks and their adaptations to existing countermeasures and protocol revisions. Ultimately, this article aims to provide a clearer picture of how and why wireless protection protocols and encryption must achieve a more scientific basis for detecting and preventing such attacks.« less

  19. Fear of terrorism in New York after the September 11 terrorist attacks: implications for emergency mental health and preparedness.

    PubMed

    Boscarino, Joseph A; Figley, Charles R; Adams, Richard E

    2003-01-01

    To examine the public's response to future terrorist attacks, we surveyed 1,001 New Yorkers in the community one year after the September 11 attacks. Overall, New Yorkers were very concerned about future terrorist attacks and also concerned about attacks involving biological or nuclear weapons. In addition, while most New Yorkers reported that if a biological or nuclear attack occurred they would evaluate available information before evacuating, a significant number reported they would immediately evacuate, regardless of police or public health communications to the contrary. The level of public concern was significantly higher on all measures among New York City and Long Island residents (downstate) compared to the rest of the state. A model predicting higher fear of terrorism indicated that downstate residents, women, those 45 to 64 years old, African Americans and Hispanics, those with less education/income, and those more likely to flee, were more fearful of future attacks. In addition, making disaster preparations and carefully evaluating emergency information also predicted a higher level of fear as well. A second model predicting who would flee suggested that those more likely to evaluate available information were less likely to immediately evacuate, while those with a higher fear of future attacks were more likely to flee the area. Given these findings and the possibility of future attacks, mental health professionals need to be more involved in preparedness efforts, especially related to the psychological impact of attacks involving weapons of mass destruction.

  20. Metrics for Assessment of Smart Grid Data Integrity Attacks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Annarita Giani; Miles McQueen; Russell Bent

    2012-07-01

    There is an emerging consensus that the nation’s electricity grid is vulnerable to cyber attacks. This vulnerability arises from the increasing reliance on using remote measurements, transmitting them over legacy data networks to system operators who make critical decisions based on available data. Data integrity attacks are a class of cyber attacks that involve a compromise of information that is processed by the grid operator. This information can include meter readings of injected power at remote generators, power flows on transmission lines, and relay states. These data integrity attacks have consequences only when the system operator responds to compromised datamore » by redispatching generation under normal or contingency protocols. These consequences include (a) financial losses from sub-optimal economic dispatch to service loads, (b) robustness/resiliency losses from placing the grid at operating points that are at greater risk from contingencies, and (c) systemic losses resulting from cascading failures induced by poor operational choices. This paper is focused on understanding the connections between grid operational procedures and cyber attacks. We first offer two examples to illustrate how data integrity attacks can cause economic and physical damage by misleading operators into taking inappropriate decisions. We then focus on unobservable data integrity attacks involving power meter data. These are coordinated attacks where the compromised data are consistent with the physics of power flow, and are therefore passed by any bad data detection algorithm. We develop metrics to assess the economic impact of these attacks under re-dispatch decisions using optimal power flow methods. These metrics can be use to prioritize the adoption of appropriate countermeasures including PMU placement, encryption, hardware upgrades, and advance attack detection algorithms.« less

  1. Prediction of first episode of panic attack among white-collar workers.

    PubMed

    Watanabe, Akira; Nakao, Kazuhisa; Tokuyama, Madoka; Takeda, Masatoshi

    2005-04-01

    The purpose of the present study was to elucidate a longitudinal matrix of the etiology for first-episode panic attack among white-collar workers. A path model was designed for this purpose. A 5-year, open-cohort study was carried out in a Japanese company. To evaluate the risk factors associated with the onset of a first episode of panic attack, the odds ratios of a new episode of panic attack were calculated by logistic regression. The path model contained five predictor variables: gender difference, overprotection, neuroticism, lifetime history of major depression, and recent stressful life events. The logistic regression analysis indicated that a person with a lifetime history of major depression and recent stressful life events had a fivefold and a threefold higher risk of panic attacks at follow up, respectively. The path model for the prediction of a first episode of panic attack fitted the data well. However, this model presented low accountability for the variance in the ultimate dependent variables, the first episode of panic attack. Three predictors (neuroticism, lifetime history of major depression, and recent stressful life events) had a direct effect on the risk for a first episode of panic attack, whereas gender difference and overprotection had no direct effect. The present model could not fully predict first episodes of panic attack in white-collar workers. To make a path model for the prediction of the first episode of panic attack, other strong predictor variables, which were not surveyed in the present study, are needed. It is suggested that genetic variables are among the other strong predictor variables. A new path model containing genetic variables (e.g. family history etc.) will be needed to predict the first episode of panic attack.

  2. Dopaminergic regulation of sleep and cataplexy in a murine model of narcolepsy.

    PubMed

    Burgess, Christian R; Tse, Gavin; Gillis, Lauren; Peever, John H

    2010-10-01

    To determine if the dopaminergic system modulates cataplexy, sleep attacks and sleep-wake behavior in narcoleptic mice. Hypocretin/orexin knockout (i.e., narcoleptic) and wild-type mice were administered amphetamine and specific dopamine receptor modulators to determine their effects on sleep, cataplexy and sleep attacks. Hypocretin knockout (n = 17) and wild-type mice (n = 21). Cataplexy, sleep attacks and sleep-wake behavior were identified using electroencephalogram, electromyogram and videography. These behaviors were monitored for 4 hours after an i.p. injection of saline, amphetamine and specific dopamine receptor modulators (D1- and D2-like receptor modulators). Amphetamine (2 mg/kg), which increases brain dopamine levels, decreased sleep attacks and cataplexy by 61% and 67%, suggesting that dopamine transmission modulates such behaviors. Dopamine receptor modulation also had powerful effects on sleep attacks and cataplexy. Activation (SKF 38393; 20 mg/kg) and blockade (SCH 23390; 1 mg/kg) of D1-like receptors decreased and increased sleep attacks by 77% and 88%, without affecting cataplexy. Pharmacological activation of D2-like receptors (quinpirole; 0.5 mg/kg) increased cataplectic attacks by 172% and blockade of these receptors (eticlopride; 1 mg/kg) potently suppressed them by 97%. Manipulation of D2-like receptors did not affect sleep attacks. We show that the dopaminergic system plays a role in regulating both cataplexy and sleep attacks in narcoleptic mice. We found that cataplexy is modulated by a D2-like receptor mechanism, whereas dopamine modulates sleep attacks by a D1-like receptor mechanism. These results support a role for the dopamine system in regulating sleep attacks and cataplexy in a murine model of narcolepsy.

  3. Economic burden of gouty arthritis attacks for employees with frequent and infrequent attacks.

    PubMed

    Lynch, Wendy; Chan, Wing; Kleinman, Nathan; Andrews, L M; Yadao, Anthony M

    2013-04-01

    The objective of this study was to compare episode-related and annual costs and work absence days for employees with <3 versus ≥ 3 annual gout attacks. Human Capital Management Services data (2009-2010) from adult employees with gout (International Classification of Diseases, Ninth Revision code 274.x) and ≥ 12 months of medical and pharmacy benefits were studied. Outcomes of interest included medical and drug costs, number of emergency department and urgent care visits, number of inpatient days, short- and long-term disability, sick leave, workers' compensation costs, and work absence days. An algorithm based on diagnosis code and antigout medication use identified acute gout treatment episodes. Multivariate analysis compared annual and pre-episode vs. during-episode outcomes for employees with ≥ 3 vs. <3 gout annual attacks. Of 3361 employees with gout, 76 had ≥ 3 attacks; these employees had higher short-term disability costs ($1663 vs. $643, P=0.06) and days (11.68 versus 4.61, P<0.05), more emergency room visits (0.55 vs. 0.23, P<0.0001), and urgent care visits (0.07 vs. 0.04, P<0.01), and lower pharmacy costs ($1677 vs. $1108, P<0.0001) than those with <3 attacks. Medical costs both before ($203 higher) and during attacks ($136 higher) were significantly higher for those with ≥ 3 attacks than for those with <3 attacks. Additionally, a quadratic increasing relationship was found between number of attacks and cost. Frequency of acute gout attacks (≥ 3 episodes per year) among employees with gout was associated with greater short-term disability cost, absence days, and emergency department and urgent care visits, and trends toward higher overall costs.

  4. Correlation of forebody pressures and aircraft yawing moments on the X-29A aircraft at high angles of attack

    NASA Technical Reports Server (NTRS)

    Fisher, David F.; Richwine, David M.; Landers, Stephen

    1992-01-01

    In-flight pressure distributions at four fuselage stations on the forebody of the X-29A aircraft have been reported at angles of attack from 15 to 66 deg and at Mach numbers from 0.22 to 0.60. At angles of attack of 20 deg and higher, vortices shed from the nose strake caused suction peaks in the pressure distributions that generally increased in magnitude with angle of attack. Above 30 deg-angle of attack, the forebody pressure distributions became asymmetrical at the most forward station, while they remained nearly symmetrical until 50 to 55 deg-angle of attack for the aft stations. Between 59 to 66 deg-angle of attack, the asymmetry of the pressure distributions changed direction. Yawing moments for the forebody alone were obtained by integrating the forebody pressure distributions. At 45 deg-angle of attack, the aircraft yaws to the right and at 50 deg and higher, the aircraft yaws to the left. The forebody yawing moments correlated well with the aircraft left yawing moment at an angle of attack of 50 deg or higher. At a 45 deg-angle of attack, the forebody yawing moments did not correlate well with the aircraft yawing moment, but it is suggested that this was due to asymmetric pressures on the cockpit region of the fuselage which was not instrumented. The forebody was also shown to provide a positive component of directional stability of the aircraft at angles of attack of 25 deg or higher. A Mach number effect was noted at angles of attack of 30 deg or higher at the station where the nose strake was present. At this station, the suction peaks in the pressure distributions at the highest Mach number were reduced and much more symmetrical as compared to the lower Mach number pressure distributions.

  5. EVALUATION OF THE CHANGES IN THE NASAL CAVITY DURING THE MIGRAINE ATTACK

    PubMed Central

    Arslan, H. Hüseyin; Tokgöz, Erkan; Yıldızoğlu, Üzeyir; Durmaz, Abdullah; Bek, Semai; Gerek, Mustafa

    2012-01-01

    Objectives There are some subjective symptoms involving the nasal cavity such as nasal congestion during a migraine attack. In this study, we aimed to evaluate the possible changes occuring in the nasal cavity, during headache in migraine patients. Material and Methods Subjects with migraine were studied. The control group was consisted with tension-type headache patients. The severity of the headache and accompanying complaints were assessed by visual analog scale, and nasal mucosa was assessed by anterior rhinoscopy and endoscopy. Resistance of the nasal cavity was evaluated with anterior rhinomanometry. The data obtained during the attack periods and attack free periods were compared. Results 25 migraine patients and 15 tension-type headache patients were enrolled. It was found that 19 subjects (%76) of migraine group and 5 of tension-type headache group were suffering from nasal congestion during the attack, and that the differences between the groups were statistically significant (p<0.05). The average of total nasal resistance in migraine patients was 0,57±0,60 kPa/L/sn during migraine attacks and 0,28±0,14 kPa/L/sn during attack free periods. The average of total nasal resistance in tension-type headache patients was 0,32±0,14 kPa/L/sn during attack periods and 0,31±0,20 kPa/L/sn during attack free periods. In the migraine group, the change of nasal resistance between during the attack and attack free periods was found statistically significant, while there was no statistically significant difference in the tension-type headache group. Conclusion According to the results of this study, complaining of nasal obstruction and nasal airway resistance increases during migraine attacks. Cause and effect relationship between nasal obstruction and pain is not clear and clinical trials are needed to determine the effect of nasal obstruction treatment (mucosal decongestion etc.) on the complaint of pain. PMID:25072974

  6. Dead or Alive? Factors Affecting the Survival of Victims during Attacks by Saltwater Crocodiles (Crocodylus porosus) in Australia.

    PubMed

    Fukuda, Yusuke; Manolis, Charlie; Saalfeld, Keith; Zuur, Alain

    2015-01-01

    Conflicts between humans and crocodilians are a widespread conservation challenge and the number of crocodile attacks is increasing worldwide. We identified the factors that most effectively decide whether a victim is injured or killed in a crocodile attack by fitting generalized linear models to a 42-year dataset of 87 attacks (27 fatal and 60 non-fatal) by saltwater crocodiles (Crocodylus porosus) in Australia. The models showed that the most influential factors were the difference in body mass between crocodile and victim, and the position of victim in relation to the water at the time of an attack. In-water position (for diving, swimming, and wading) had a higher risk than on-water (boating) or on-land (fishing, and hunting near the water's edge) positions. In the in-water position a 75 kg person would have a relatively high probability of survival (0.81) if attacked by a 300 cm crocodile, but the probability becomes much lower (0.17) with a 400 cm crocodile. If attacked by a crocodile larger than 450 cm, the survival probability would be extremely low (<0.05) regardless of the victim's size. These results indicate that the main cause of death during a crocodile attack is drowning and larger crocodiles can drag a victim more easily into deeper water. A higher risk associated with a larger crocodile in relation to victim's size is highlighted by children's vulnerability to fatal attacks. Since the first recently recorded fatal attack involving a child in 2006, six out of nine fatal attacks (66.7%) involved children, and the average body size of crocodiles responsible for these fatal attacks was considerably smaller (384 cm, 223 kg) than that of crocodiles that killed adults (450 cm, 324 kg) during the same period (2006-2014). These results suggest that culling programs targeting larger crocodiles may not be an effective management option to improve safety for children.

  7. Dead or Alive? Factors Affecting the Survival of Victims during Attacks by Saltwater Crocodiles (Crocodylus porosus) in Australia

    PubMed Central

    Fukuda, Yusuke

    2015-01-01

    Conflicts between humans and crocodilians are a widespread conservation challenge and the number of crocodile attacks is increasing worldwide. We identified the factors that most effectively decide whether a victim is injured or killed in a crocodile attack by fitting generalized linear models to a 42-year dataset of 87 attacks (27 fatal and 60 non-fatal) by saltwater crocodiles (Crocodylus porosus) in Australia. The models showed that the most influential factors were the difference in body mass between crocodile and victim, and the position of victim in relation to the water at the time of an attack. In-water position (for diving, swimming, and wading) had a higher risk than on-water (boating) or on-land (fishing, and hunting near the water's edge) positions. In the in-water position a 75 kg person would have a relatively high probability of survival (0.81) if attacked by a 300 cm crocodile, but the probability becomes much lower (0.17) with a 400 cm crocodile. If attacked by a crocodile larger than 450 cm, the survival probability would be extremely low (<0.05) regardless of the victim’s size. These results indicate that the main cause of death during a crocodile attack is drowning and larger crocodiles can drag a victim more easily into deeper water. A higher risk associated with a larger crocodile in relation to victim’s size is highlighted by children’s vulnerability to fatal attacks. Since the first recently recorded fatal attack involving a child in 2006, six out of nine fatal attacks (66.7%) involved children, and the average body size of crocodiles responsible for these fatal attacks was considerably smaller (384 cm, 223 kg) than that of crocodiles that killed adults (450 cm, 324 kg) during the same period (2006–2014). These results suggest that culling programs targeting larger crocodiles may not be an effective management option to improve safety for children. PMID:25961294

  8. Review of attacks on health care facilities in six conflicts of the past three decades.

    PubMed

    Briody, Carolyn; Rubenstein, Leonard; Roberts, Les; Penney, Eamon; Keenan, William; Horbar, Jeffrey

    2018-01-01

    In the ongoing conflicts of Syria and Yemen, there have been widespread reports of attacks on health care facilities and personnel. Tabulated evidence does suggest hospital bombings in Syria and Yemen are far higher than reported in other conflicts but it is unclear if this is a reporting artefact. This article examines attacks on health care facilities in conflicts in six middle- to high- income countries that have occurred over the past three decades to try and determine if attacks have become more common, and to assess the different methods used to collect data on attacks. The six conflicts reviewed are Yemen (2015-Present), Syria (2011- Present), Iraq (2003-2011), Chechnya (1999-2000), Kosovo (1998-1999), and Bosnia and Herzegovina (1992-1995). We attempted to get the highest quality source(s) with summary data of the number of facilities attacked for each of the conflicts. The only conflict that did not have summary data was the conflict in Iraq. In this case, we tallied individual reported events of attacks on health care. Physicians for Human Rights (PHR) reported attacks on 315 facilities (4.38 per month) in Syria over a 7-year period, while the Monitoring Violence against Health Care (MVH) tool launched later by the World Health Organization (WHO) Turkey Health Cluster reported attacks on 135 facilities (9.64 per month) over a 14-month period. Yemen had a reported 93 attacks (4.65 per month), Iraq 12 (0.12 per month), Chechnya > 24 (2.4 per month), Kosovo > 100 (6.67 per month), and Bosnia 21 (0.41 per month). Methodologies to collect data, and definitions of both facilities and attacks varied widely across sources. The number of reported facilities attacked is by far the greatest in Syria, suggesting that this phenomenon has increased compared to earlier conflicts. However, data on attacks of facilities was incomplete for all of the conflicts examined, methodologies varied widely, and in some cases, attacks were not defined at all. A global, standardized system that allows multiple reporting routes with different levels of confirmation, as seen in Syria, would likely allow for a more reliable and reproducible documentation system, and potentially, an increase in accountability.

  9. Wounding patterns and human performance in knife attacks: optimising the protection provided by knife-resistant body armour.

    PubMed

    Bleetman, A; Watson, C H; Horsfall, I; Champion, S M

    2003-12-01

    Stab attacks generate high loads, and to defeat them, armour needs to be of a certain thickness and stiffness. Slash attacks produce much lower loads and armour designed to defeat them can be far lighter and more flexible. Phase 1: Human performance in slash attacks: 87 randomly selected students at the Royal Military College of Science were asked to make one slash attack with an instrumented blade on a vertically mounted target. No instructions on how to slash the target were given. The direction, contact forces and velocity of each attack were recorded. Phase 2: Clinical experience with edged weapon attacks: The location and severity of all penetrating injuries in patients attending the Glasgow Royal Infirmary between 1993 and 1996 were charted on anatomical figures. Phase 1: Two types of human slash behaviour were evident: a 'chop and drag' blow and a 'sweep motion' type of attack. 'Chop and drag' attacks had higher peak forces and velocities than sweep attacks. Shoulder to waist blows (diagonal) accounted for 82% of attacks, 71% of attackers used a long diagonal slash with an average cut length of 34 cm and 11% used short diagonal attacks with an average cut length of 25 cm. Only 18% of attackers slashed across the body (short horizontal); the average measured cut length of this type was 28 cm. The maximum peak force for the total sample population was 212 N; the maximum velocity was 14.88 m s(-1). The 95 percentile force for the total sample population was 181 N and the velocity was 9.89 m s(-1). Phase 2: 431 of the 500 patients had been wounded with edged weapons. The average number of wounds sustained by victims in knife assaults was 2.4. The distribution of wounds by frequency and severity are presented. Anti-slash protection is required for the arms, neck, shoulders, and thighs. The clinical experience of knife-attack victims provides information on the relative vulnerabilities of different regions of the body. It is anticipated that designing a tunic-type of Police uniform that is inherently stab and slash resistant will eventually replace the current obvious and often bulky extra protective vest. Attempts at making a combined garment will need to be guided by ergonomic considerations and field testing. A similar anatomical regional risk model might also be appropriate in the design of anti-ballistic armour and combined anti-ballistic and knife-resistant armour.

  10. Determining the scope of attacks on health in four governorates of Syria in 2016: Results of a field surveillance program

    PubMed Central

    Risko, Casey B.; Rayes, Diana; Albaik, Ahmad; Alnajar, Mohammed; Kewara, Mazen; Baker, Elise; Rubenstein, Leonard S.

    2018-01-01

    Background Violent attacks on and interferences with hospitals, ambulances, health workers, and patients during conflict destroy vital health services during a time when they are most needed and undermine the long-term capacity of the health system. In Syria, such attacks have been frequent and intense and represent grave violations of the Geneva Conventions, but the number reported has varied considerably. A systematic mechanism to document these attacks could assist in designing more protection strategies and play a critical role in influencing policy, promoting justice, and addressing the health needs of the population. Methods and findings We developed a mobile data collection questionnaire to collect data on incidents of attacks on healthcare directly from the field. Data collectors from the Syrian American Medical Society (SAMS), using the tool or a text messaging system, recorded information on incidents across four of Syria’s northern governorates (Aleppo, Idleb, Hama, and Homs) from January 1, 2016, to December 31, 2016. SAMS recorded a total of 200 attacks on healthcare in 2016, 102 of them using the mobile data collection tool. Direct attacks on health facilities comprised the majority of attacks recorded (88.0%; n = 176). One hundred and twelve healthcare staff and 185 patients were killed in these incidents. Thirty-five percent of the facilities were attacked more than once over the data collection period; hospitals were significantly more likely to be attacked more than once compared to clinics and other types of healthcare facilities. Aerial bombs were used in the overwhelming majority of cases (91.5%). We also compared the SAMS data to a separate database developed by Physicians for Human Rights (PHR) based on media reports and matched the incidents to compare the results from the two methods (this analysis was limited to incidents at health facilities). Among 90 relevant incidents verified by PHR and 177 by SAMS, there were 60 that could be matched to each other, highlighting the differences in results from the two methods. This study is limited by the complexities of data collection in a conflict setting, only partial use of the standardized reporting tool, and the fact that limited accessibility of some health facilities and workers and may be biased towards the reporting of attacks on larger or more visible health facilities. Conclusions The use of field data collectors and use of consistent definitions can play an important role in the tracking incidents of attacks on health services. A mobile systematic data collection tool can complement other methods for tracking incidents of attacks on healthcare and ensure the collection of detailed information about each attack that may assist in better advocacy, programs, and accountability but can be practically challenging. Comparing attacks between SAMS and PHR suggests that there may have been significantly more attacks than previously captured by any one methodology. This scale of attacks suggests that targeting of healthcare in Syria is systematic and highlights the failure of condemnation by the international community and medical groups working in Syria of such attacks to stop them. PMID:29689085

  11. Douglas-fir beetle attack and tree mortality following wildfire

    Treesearch

    Sharon M. Hood; Barbara Bentz; Kevin C. Ryan

    2003-01-01

    A major concern after wildfires is the buildup of bark beetle populations in fire injured trees, and subsequent attack and population buildup in adjacent unburned areas. To examine this concern, we documented fire injury and insect attacks in Douglas-fir (Pseudotsuga menziesii) on the 2001 Green Knoll Fire, Wyoming to determine attack preferences, brood production, and...

  12. The Effects of Denial-of-Service Attacks on Secure Time-Critical Communications in the Smart Grid

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Zhang, Fengli; Li, QInghua; Mantooth, Homer Alan

    2016-04-02

    According to IEC 61850, many smart grid communications require messages to be delivered in a very short time. –Trip messages and sample values applied to the transmission level: 3 ms –Interlocking messages applied to the distribution level: 10 ms •Time-critical communications are vulnerable to denial-of-service (DoS) attacks –Flooding attack: Attacker floods many messages to the target network/machine. We conducted systematic, experimental study about how DoS attacks affect message delivery delays.

  13. The maul of the wild. Animal attacks can produce significant trauma.

    PubMed

    Conrad, L

    1994-03-01

    Wild-animal attacks are almost an anachronism in our day and age. They remind us that humans can still be food or prey. Cougar attacks, though rare, produce significant trauma. Characteristic patterns of injury and wound infection should be appropriately identified and treated. As we protect wild-animal species and acknowledge their right to share territory, interactions--and possibly attacks--are likely to increase. Awareness, education, knowledge and prevention, rather than the elimination of animal populations, may be the best way to control wild-animal attacks on humans in the future.

  14. Attacks and intrusion detection in wireless sensor networks of industrial SCADA systems

    NASA Astrophysics Data System (ADS)

    Kamaev, V. A.; Finogeev, A. G.; Finogeev, A. A.; Parygin, D. S.

    2017-01-01

    The effectiveness of automated process control systems (APCS) and supervisory control and data acquisition systems (SCADA) information security depends on the applied protection technologies of transport environment data transmission components. This article investigates the problems of detecting attacks in wireless sensor networks (WSN) of SCADA systems. As a result of analytical studies, the authors developed the detailed classification of external attacks and intrusion detection in sensor networks and brought a detailed description of attacking impacts on components of SCADA systems in accordance with the selected directions of attacks.

  15. SFTP: A Secure and Fault-Tolerant Paradigm against Blackhole Attack in MANET

    NASA Astrophysics Data System (ADS)

    KumarRout, Jitendra; Kumar Bhoi, Sourav; Kumar Panda, Sanjaya

    2013-02-01

    Security issues in MANET are a challenging task nowadays. MANETs are vulnerable to passive attacks and active attacks because of a limited number of resources and lack of centralized authority. Blackhole attack is an attack in network layer which degrade the network performance by dropping the packets. In this paper, we have proposed a Secure Fault-Tolerant Paradigm (SFTP) which checks the Blackhole attack in the network. The three phases used in SFTP algorithm are designing of coverage area to find the area of coverage, Network Connection algorithm to design a fault-tolerant model and Route Discovery algorithm to discover the route and data delivery from source to destination. SFTP gives better network performance by making the network fault free.

  16. Panic disorder, panic attacks and panic attack symptoms across race-ethnic groups: results of the collaborative psychiatric epidemiology studies.

    PubMed

    Asnaani, Anu; Gutner, Cassidy A; Hinton, Devon E; Hofmann, Stefan G

    2009-01-01

    The current study investigates race-ethnic differences in rates of panic disorder, panic attacks and certain panic attack symptoms by jointly combining three major national epidemiological databases. The compared groups were White, African American, Latino and Asian. The White group had significantly higher rates of panic disorder, and of many panic symptoms, including palpitations, as compared to the African American, Asian and Latino groups. Several expected race-ethnic differences were not found. An explanation for these findings are adduced, and suggestions are given for future studies so that possible ethnic-racial differences in panic disorder, panic attacks and panic attack symptoms can be investigated in a more rigorous manner.

  17. A Learning-Based Approach to Reactive Security

    NASA Astrophysics Data System (ADS)

    Barth, Adam; Rubinstein, Benjamin I. P.; Sundararajan, Mukund; Mitchell, John C.; Song, Dawn; Bartlett, Peter L.

    Despite the conventional wisdom that proactive security is superior to reactive security, we show that reactive security can be competitive with proactive security as long as the reactive defender learns from past attacks instead of myopically overreacting to the last attack. Our game-theoretic model follows common practice in the security literature by making worst-case assumptions about the attacker: we grant the attacker complete knowledge of the defender's strategy and do not require the attacker to act rationally. In this model, we bound the competitive ratio between a reactive defense algorithm (which is inspired by online learning theory) and the best fixed proactive defense. Additionally, we show that, unlike proactive defenses, this reactive strategy is robust to a lack of information about the attacker's incentives and knowledge.

  18. Network Security Risk Assessment System Based on Attack Graph and Markov Chain

    NASA Astrophysics Data System (ADS)

    Sun, Fuxiong; Pi, Juntao; Lv, Jin; Cao, Tian

    2017-10-01

    Network security risk assessment technology can be found in advance of the network problems and related vulnerabilities, it has become an important means to solve the problem of network security. Based on attack graph and Markov chain, this paper provides a Network Security Risk Assessment Model (NSRAM). Based on the network infiltration tests, NSRAM generates the attack graph by the breadth traversal algorithm. Combines with the international standard CVSS, the attack probability of atomic nodes are counted, and then the attack transition probabilities of ones are calculated by Markov chain. NSRAM selects the optimal attack path after comprehensive measurement to assessment network security risk. The simulation results show that NSRAM can reflect the actual situation of network security objectively.

  19. Attacks on Bluetooth Security Architecture and Its Countermeasures

    NASA Astrophysics Data System (ADS)

    Iqbal, Mian Muhammad Waseem; Kausar, Firdous; Wahla, Muhammad Arif

    WPANs compliment the traditional IEEE 802.11 wireless networks by facilitating the clients with flexibility in network topologies, higher mobility and relaxed configuration/hardware requirements. Bluetooth, a WPAN technology, is an open standard for short-range radio frequency (RF) communication. However, it is also susceptible to typical security threats found in wireless LANs. This paper discuses some of the attack scenarios against the bluetooth network such as hostile intrusion, active Man-in-the-Middle (MITM) attack using unit key and various forms of denial of service (DoS) attacks. These threats and attacks compromise the confidentiality and availability of bluetooth data and services. This paper proposes an improved security architecture for bluetooth device which provides protection against the above mentioned attacks.

  20. Design and implementation of dynamic hybrid Honeypot network

    NASA Astrophysics Data System (ADS)

    Qiao, Peili; Hu, Shan-Shan; Zhai, Ji-Qiang

    2013-05-01

    The method of constructing a dynamic and self-adaptive virtual network is suggested to puzzle adversaries, delay and divert attacks, exhaust attacker resources and collect attacking information. The concepts of Honeypot and Honeyd, which is the frame of virtual Honeypot are introduced. The techniques of network scanning including active fingerprint recognition are analyzed. Dynamic virtual network system is designed and implemented. A virtual network similar to real network topology is built according to the collected messages from real environments in this system. By doing this, the system can perplex the attackers when Hackers attack and can further analyze and research the attacks. The tests to this system prove that this design can successfully simulate real network environment and can be used in network security analysis.

  1. A Novel Protective Framework for Defeating HTTP-Based Denial of Service and Distributed Denial of Service Attacks.

    PubMed

    Saleh, Mohammed A; Abdul Manaf, Azizah

    2015-01-01

    The growth of web technology has brought convenience to our life, since it has become the most important communication channel. However, now this merit is threatened by complicated network-based attacks, such as denial of service (DoS) and distributed denial of service (DDoS) attacks. Despite many researchers' efforts, no optimal solution that addresses all sorts of HTTP DoS/DDoS attacks is on offer. Therefore, this research aims to fix this gap by designing an alternative solution called a flexible, collaborative, multilayer, DDoS prevention framework (FCMDPF). The innovative design of the FCMDPF framework handles all aspects of HTTP-based DoS/DDoS attacks through the following three subsequent framework's schemes (layers). Firstly, an outer blocking (OB) scheme blocks attacking IP source if it is listed on the black list table. Secondly, the service traceback oriented architecture (STBOA) scheme is to validate whether the incoming request is launched by a human or by an automated tool. Then, it traces back the true attacking IP source. Thirdly, the flexible advanced entropy based (FAEB) scheme is to eliminate high rate DDoS (HR-DDoS) and flash crowd (FC) attacks. Compared to the previous researches, our framework's design provides an efficient protection for web applications against all sorts of DoS/DDoS attacks.

  2. A Novel Protective Framework for Defeating HTTP-Based Denial of Service and Distributed Denial of Service Attacks

    PubMed Central

    Saleh, Mohammed A.; Abdul Manaf, Azizah

    2015-01-01

    The growth of web technology has brought convenience to our life, since it has become the most important communication channel. However, now this merit is threatened by complicated network-based attacks, such as denial of service (DoS) and distributed denial of service (DDoS) attacks. Despite many researchers' efforts, no optimal solution that addresses all sorts of HTTP DoS/DDoS attacks is on offer. Therefore, this research aims to fix this gap by designing an alternative solution called a flexible, collaborative, multilayer, DDoS prevention framework (FCMDPF). The innovative design of the FCMDPF framework handles all aspects of HTTP-based DoS/DDoS attacks through the following three subsequent framework's schemes (layers). Firstly, an outer blocking (OB) scheme blocks attacking IP source if it is listed on the black list table. Secondly, the service traceback oriented architecture (STBOA) scheme is to validate whether the incoming request is launched by a human or by an automated tool. Then, it traces back the true attacking IP source. Thirdly, the flexible advanced entropy based (FAEB) scheme is to eliminate high rate DDoS (HR-DDoS) and flash crowd (FC) attacks. Compared to the previous researches, our framework's design provides an efficient protection for web applications against all sorts of DoS/DDoS attacks. PMID:26065015

  3. Effectiveness of the call in beach volleyball attacking play.

    PubMed

    Künzell, Stefan; Schweikart, Florian; Köhn, Daniel; Schläppi-Lienhard, Olivia

    2014-12-09

    In beach volleyball the setter has the opportunity to give her or his hitter a "call". The call intends that the setter suggests to her or his partner where to place the attack in the opponent's court. The effectiveness of a call is still unknown. We investigated the women's and men's Swiss National Beach Volleyball Championships in 2011 and analyzed 2185 attacks. We found large differences between female and male players. While men called in only 38.4% of attacks, women used calls in 85.5% of attacks. If the male players followed a given call, 63% of the attacks were successful. The success rate of attacks without any call was 55.8% and 47.6% when the call was ignored. These differences were not significant (χ(2)(2) = 4.55, p = 0.103). In women's beach volleyball, the rate of successful attacks was 61.5% when a call was followed, 35% for attacks without a call, and 42.6% when a call was ignored. The differences were highly significant (χ(2)(2) = 23.42, p < 0.0005). Taking into account the findings of the present study, we suggested that the call was effective in women's beach volleyball, while its effect in men's game was unclear. Considering the quality of calls we indicate that there is a significant potential to increase the effectiveness of a call.

  4. Practical security and privacy attacks against biometric hashing using sparse recovery

    NASA Astrophysics Data System (ADS)

    Topcu, Berkay; Karabat, Cagatay; Azadmanesh, Matin; Erdogan, Hakan

    2016-12-01

    Biometric hashing is a cancelable biometric verification method that has received research interest recently. This method can be considered as a two-factor authentication method which combines a personal password (or secret key) with a biometric to obtain a secure binary template which is used for authentication. We present novel practical security and privacy attacks against biometric hashing when the attacker is assumed to know the user's password in order to quantify the additional protection due to biometrics when the password is compromised. We present four methods that can reconstruct a biometric feature and/or the image from a hash and one method which can find the closest biometric data (i.e., face image) from a database. Two of the reconstruction methods are based on 1-bit compressed sensing signal reconstruction for which the data acquisition scenario is very similar to biometric hashing. Previous literature introduced simple attack methods, but we show that we can achieve higher level of security threats using compressed sensing recovery techniques. In addition, we present privacy attacks which reconstruct a biometric image which resembles the original image. We quantify the performance of the attacks using detection error tradeoff curves and equal error rates under advanced attack scenarios. We show that conventional biometric hashing methods suffer from high security and privacy leaks under practical attacks, and we believe more advanced hash generation methods are necessary to avoid these attacks.

  5. Defense of Cyber Infrastructures Against Cyber-Physical Attacks Using Game-Theoretic Models

    DOE PAGES

    Rao, Nageswara S. V.; Poole, Stephen W.; Ma, Chris Y. T.; ...

    2015-04-06

    The operation of cyber infrastructures relies on both cyber and physical components, which are subject to incidental and intentional degradations of different kinds. Within the context of network and computing infrastructures, we study the strategic interactions between an attacker and a defender using game-theoretic models that take into account both cyber and physical components. The attacker and defender optimize their individual utilities expressed as sums of cost and system terms. First, we consider a Boolean attack-defense model, wherein the cyber and physical sub-infrastructures may be attacked and reinforced as individual units. Second, we consider a component attack-defense model wherein theirmore » components may be attacked and defended, and the infrastructure requires minimum numbers of both to function. We show that the Nash equilibrium under uniform costs in both cases is computable in polynomial time, and it provides high-level deterministic conditions for the infrastructure survival. When probabilities of successful attack and defense, and of incidental failures are incorporated into the models, the results favor the attacker but otherwise remain qualitatively similar. This approach has been motivated and validated by our experiences with UltraScience Net infrastructure, which was built to support high-performance network experiments. In conclusion, the analytical results, however, are more general, and we apply them to simplified models of cloud and high-performance computing infrastructures.« less

  6. Quantum hacking: Saturation attack on practical continuous-variable quantum key distribution

    NASA Astrophysics Data System (ADS)

    Qin, Hao; Kumar, Rupesh; Alléaume, Romain

    2016-07-01

    We identify and study a security loophole in continuous-variable quantum key distribution (CVQKD) implementations, related to the imperfect linearity of the homodyne detector. By exploiting this loophole, we propose an active side-channel attack on the Gaussian-modulated coherent-state CVQKD protocol combining an intercept-resend attack with an induced saturation of the homodyne detection on the receiver side (Bob). We show that an attacker can bias the excess noise estimation by displacing the quadratures of the coherent states received by Bob. We propose a saturation model that matches experimental measurements on the homodyne detection and use this model to study the impact of the saturation attack on parameter estimation in CVQKD. We demonstrate that this attack can bias the excess noise estimation beyond the null key threshold for any system parameter, thus leading to a full security break. If we consider an additional criterion imposing that the channel transmission estimation should not be affected by the attack, then the saturation attack can only be launched if the attenuation on the quantum channel is sufficient, corresponding to attenuations larger than approximately 6 dB. We moreover discuss the possible countermeasures against the saturation attack and propose a countermeasure based on Gaussian postselection that can be implemented by classical postprocessing and may allow one to distill the secret key when the raw measurement data are partly saturated.

  7. Securing Cooperative Spectrum Sensing Against Collusive SSDF Attack using XOR Distance Analysis in Cognitive Radio Networks

    PubMed Central

    Feng, Jingyu; Zhang, Man; Xiao, Yun; Yue, Hongzhou

    2018-01-01

    Cooperative spectrum sensing (CSS) is considered as a powerful approach to improve the utilization of scarce spectrum resources. However, if CSS assumes that all secondary users (SU) are honest, it may offer opportunities for attackers to conduct a spectrum sensing data falsification (SSDF) attack. To suppress such a threat, recent efforts have been made to develop trust mechanisms. Currently, some attackers can collude with each other to form a collusive clique, and thus not only increase the power of SSDF attack but also avoid the detection of a trust mechanism. Noting the duality of sensing data, we propose a defense scheme called XDA from the perspective of XOR distance analysis to suppress a collusive SSDF attack. In the XDA scheme, the XOR distance calculation in line with the type of “0” and “1” historical sensing data is used to measure the similarity between any two SUs. Noting that collusive SSDF attackers hold high trust value and the minimum XOR distance, the algorithm to detect collusive SSDF attackers is designed. Meanwhile, the XDA scheme can perfect the trust mechanism to correct collusive SSDF attackers’ trust value. Simulation results show that the XDA scheme can enhance the accuracy of trust evaluation, and thus successfully reduce the power of collusive SSDF attack against CSS. PMID:29382061

  8. Relation of Temperature and Humidity to the Risk of Recurrent Gout Attacks

    PubMed Central

    Neogi, Tuhina; Chen, Clara; Niu, Jingbo; Chaisson, Christine; Hunter, David J.; Choi, Hyon; Zhang, Yuqing

    2014-01-01

    Gout attack risk may be affected by weather (e.g., because of volume depletion). We therefore examined the association of temperature and humidity with the risk of recurrent gout attacks by conducting an internet-based case-crossover study in the United States (in 2003–2010) among subjects with a diagnosis of gout who had 1 or more attacks during 1 year of follow-up. We examined the association of temperature and humidity over the prior 48 hours with the risk of gout attacks using a time-stratified approach and conditional logistic regression. Among 632 subjects with gout, there was a significant dose-response relationship between mean temperature in the prior 48 hours and the risk of subsequent gout attack (P = 0.01 for linear trend). Higher temperatures were associated with approximately 40% higher risk of gout attack compared with moderate temperatures. There was a reverse J-shaped relationship between mean relative humidity and the risk of gout attacks (P = 0.03 for quadratic trend). The combination of high temperature and low humidity had the greatest association (odds ratio = 2.04, 95% confidence interval: 1.26, 3.30) compared with moderate temperature and relative humidity. Thus, high ambient temperature and possibly extremes of humidity were associated with an increased risk of gout attack, despite the likelihood that individuals are often in climate-controlled indoor environments. PMID:24993733

  9. Defense of Cyber Infrastructures Against Cyber-Physical Attacks Using Game-Theoretic Models

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Rao, Nageswara S. V.; Poole, Stephen W.; Ma, Chris Y. T.

    The operation of cyber infrastructures relies on both cyber and physical components, which are subject to incidental and intentional degradations of different kinds. Within the context of network and computing infrastructures, we study the strategic interactions between an attacker and a defender using game-theoretic models that take into account both cyber and physical components. The attacker and defender optimize their individual utilities expressed as sums of cost and system terms. First, we consider a Boolean attack-defense model, wherein the cyber and physical sub-infrastructures may be attacked and reinforced as individual units. Second, we consider a component attack-defense model wherein theirmore » components may be attacked and defended, and the infrastructure requires minimum numbers of both to function. We show that the Nash equilibrium under uniform costs in both cases is computable in polynomial time, and it provides high-level deterministic conditions for the infrastructure survival. When probabilities of successful attack and defense, and of incidental failures are incorporated into the models, the results favor the attacker but otherwise remain qualitatively similar. This approach has been motivated and validated by our experiences with UltraScience Net infrastructure, which was built to support high-performance network experiments. In conclusion, the analytical results, however, are more general, and we apply them to simplified models of cloud and high-performance computing infrastructures.« less

  10. The influence of weather on migraine – are migraine attacks predictable?

    PubMed Central

    Hoffmann, Jan; Schirra, Tonio; Lo, Hendra; Neeb, Lars; Reuter, Uwe; Martus, Peter

    2015-01-01

    Objective The study aimed at elucidating a potential correlation between specific meteorological variables and the prevalence and intensity of migraine attacks as well as exploring a potential individual predictability of a migraine attack based on meteorological variables and their changes. Methods Attack prevalence and intensity of 100 migraineurs were correlated with atmospheric pressure, relative air humidity, and ambient temperature in 4-h intervals over 12 consecutive months. For each correlation, meteorological parameters at the time of the migraine attack as well as their variation within the preceding 24 h were analyzed. For migraineurs showing a positive correlation, logistic regression analysis was used to assess the predictability of a migraine attack based on meteorological information. Results In a subgroup of migraineurs, a significant weather sensitivity could be observed. In contrast, pooled analysis of all patients did not reveal a significant association. An individual prediction of a migraine attack based on meteorological data was not possible, mainly as a result of the small prevalence of attacks. Interpretation The results suggest that only a subgroup of migraineurs is sensitive to specific weather conditions. Our findings may provide an explanation as to why previous studies, which commonly rely on a pooled analysis, show inconclusive results. The lack of individual attack predictability indicates that the use of preventive measures based on meteorological conditions is not feasible. PMID:25642431

  11. High angle of attack flying qualities criteria for longitudinal rate command systems

    NASA Technical Reports Server (NTRS)

    Wilson, David J.; Citurs, Kevin D.; Davidson, John B.

    1994-01-01

    This study was designed to investigate flying qualities requirements of alternate pitch command systems for fighter aircraft at high angle of attack. Flying qualities design guidelines have already been developed for angle of attack command systems at 30, 45, and 60 degrees angle of attack, so this research fills a similar need for rate command systems. Flying qualities tasks that require post-stall maneuvering were tested during piloted simulations in the McDonnell Douglas Aerospace Manned Air Combat Simulation facility. A generic fighter aircraft model was used to test angle of attack rate and pitch rate command systems for longitudinal gross acquisition and tracking tasks at high angle of attack. A wide range of longitudinal dynamic variations were tested at 30, 45, and 60 degrees angle of attack. Pilot comments, Cooper-Harper ratings, and pilot induced oscillation ratings were taken from five pilots from NASA, USN, CAF, and McDonnell Douglas Aerospace. This data was used to form longitudinal design guidelines for rate command systems at high angle of attack. These criteria provide control law design guidance for fighter aircraft at high angle of attack, low speed flight conditions. Additional time history analyses were conducted using the longitudinal gross acquisition data to look at potential agility measures of merit and correlate agility usage to flying qualities boundaries. This paper presents an overview of this research.

  12. Defender-Attacker Decision Tree Analysis to Combat Terrorism.

    PubMed

    Garcia, Ryan J B; von Winterfeldt, Detlof

    2016-12-01

    We propose a methodology, called defender-attacker decision tree analysis, to evaluate defensive actions against terrorist attacks in a dynamic and hostile environment. Like most game-theoretic formulations of this problem, we assume that the defenders act rationally by maximizing their expected utility or minimizing their expected costs. However, we do not assume that attackers maximize their expected utilities. Instead, we encode the defender's limited knowledge about the attacker's motivations and capabilities as a conditional probability distribution over the attacker's decisions. We apply this methodology to the problem of defending against possible terrorist attacks on commercial airplanes, using one of three weapons: infrared-guided MANPADS (man-portable air defense systems), laser-guided MANPADS, or visually targeted RPGs (rocket propelled grenades). We also evaluate three countermeasures against these weapons: DIRCMs (directional infrared countermeasures), perimeter control around the airport, and hardening airplanes. The model includes deterrence effects, the effectiveness of the countermeasures, and the substitution of weapons and targets once a specific countermeasure is selected. It also includes a second stage of defensive decisions after an attack occurs. Key findings are: (1) due to the high cost of the countermeasures, not implementing countermeasures is the preferred defensive alternative for a large range of parameters; (2) if the probability of an attack and the associated consequences are large, a combination of DIRCMs and ground perimeter control are preferred over any single countermeasure. © 2016 Society for Risk Analysis.

  13. Defense of Cyber Infrastructures Against Cyber-Physical Attacks Using Game-Theoretic Models.

    PubMed

    Rao, Nageswara S V; Poole, Stephen W; Ma, Chris Y T; He, Fei; Zhuang, Jun; Yau, David K Y

    2016-04-01

    The operation of cyber infrastructures relies on both cyber and physical components, which are subject to incidental and intentional degradations of different kinds. Within the context of network and computing infrastructures, we study the strategic interactions between an attacker and a defender using game-theoretic models that take into account both cyber and physical components. The attacker and defender optimize their individual utilities, expressed as sums of cost and system terms. First, we consider a Boolean attack-defense model, wherein the cyber and physical subinfrastructures may be attacked and reinforced as individual units. Second, we consider a component attack-defense model wherein their components may be attacked and defended, and the infrastructure requires minimum numbers of both to function. We show that the Nash equilibrium under uniform costs in both cases is computable in polynomial time, and it provides high-level deterministic conditions for the infrastructure survival. When probabilities of successful attack and defense, and of incidental failures, are incorporated into the models, the results favor the attacker but otherwise remain qualitatively similar. This approach has been motivated and validated by our experiences with UltraScience Net infrastructure, which was built to support high-performance network experiments. The analytical results, however, are more general, and we apply them to simplified models of cloud and high-performance computing infrastructures. © 2015 Society for Risk Analysis.

  14. Heart attack first aid

    MedlinePlus

    First aid - heart attack; First aid - cardiopulmonary arrest; First aid - cardiac arrest ... A heart attack occurs when the blood flow that carries oxygen to the heart is blocked. The heart muscle ...

  15. Correlated Attack Modeling (CAM)

    DTIC Science & Technology

    2003-10-01

    describing attack models to a scenario recognition engine, a prototype of such an engine was developed, using components of the EMERALD intrusion...content. Results – The attacker gains information enabling remote access to database (i.e., privileged login information, database layout to allow...engine that uses attack specifications written in CAML. The implementation integrates two advanced technologies devel- oped in the EMERALD program [27, 31

  16. Daily Stress as a Trigger of Migraine Attacks: Results of Thirteen Single-Subject Studies.

    ERIC Educational Resources Information Center

    Kohler, Thomas; Haimerl, Christianne

    1990-01-01

    Six-month longitudinal study examined whether migraine attacks were preceded by or occurred on stressful days. Every evening, 13 patients completed questionnaires assessing daily stress. Analyses on single-subject level tested when attacks occurred. Increased stress was generally not found for Days 2 and 3 before an attack, but often for Day 1 and…

  17. Pre-Attack Symptomatology and Temperament as Predictors of Children's Responses to the September 11 Terrorist Attacks

    ERIC Educational Resources Information Center

    Lengua, Liliana J.; Long, Anna C.; Smith, Kimberlee I.; Meltzoff, Andrew N.

    2005-01-01

    Background: The aims of this study were to assess the psychological response of children following the September 11, 2001 terrorist attacks in New York and Washington, DC and to examine prospective predictors of children's post-attack responses. Method: Children's responses were assessed in a community sample of children in Seattle, Washington,…

  18. Mountain pine beetle attack in ponderosa pine: Comparing methods for rating susceptibility

    Treesearch

    David C. Chojnacky; Barbara J. Bentz; Jesse A. Logan

    2000-01-01

    Two empirical methods for rating susceptibility of mountain pine beetle attack in ponderosa pine were evaluated. The methods were compared to stand data modeled to objectively rate each sampled stand for susceptibly to bark-beetle attack. Data on bark-beetle attacks, from a survey of 45 sites throughout the Colorado Plateau, were modeled using logistic regression to...

  19. The robustness of multiplex networks under layer node-based attack

    PubMed Central

    Zhao, Da-wei; Wang, Lian-hai; Zhi, Yong-feng; Zhang, Jun; Wang, Zhen

    2016-01-01

    From transportation networks to complex infrastructures, and to social and economic networks, a large variety of systems can be described in terms of multiplex networks formed by a set of nodes interacting through different network layers. Network robustness, as one of the most successful application areas of complex networks, has attracted great interest in a myriad of research realms. In this regard, how multiplex networks respond to potential attack is still an open issue. Here we study the robustness of multiplex networks under layer node-based random or targeted attack, which means that nodes just suffer attacks in a given layer yet no additional influence to their connections beyond this layer. A theoretical analysis framework is proposed to calculate the critical threshold and the size of giant component of multiplex networks when nodes are removed randomly or intentionally. Via numerous simulations, it is unveiled that the theoretical method can accurately predict the threshold and the size of giant component, irrespective of attack strategies. Moreover, we also compare the robustness of multiplex networks under multiplex node-based attack and layer node-based attack, and find that layer node-based attack makes multiplex networks more vulnerable, regardless of average degree and underlying topology. PMID:27075870

  20. The robustness of multiplex networks under layer node-based attack.

    PubMed

    Zhao, Da-wei; Wang, Lian-hai; Zhi, Yong-feng; Zhang, Jun; Wang, Zhen

    2016-04-14

    From transportation networks to complex infrastructures, and to social and economic networks, a large variety of systems can be described in terms of multiplex networks formed by a set of nodes interacting through different network layers. Network robustness, as one of the most successful application areas of complex networks, has attracted great interest in a myriad of research realms. In this regard, how multiplex networks respond to potential attack is still an open issue. Here we study the robustness of multiplex networks under layer node-based random or targeted attack, which means that nodes just suffer attacks in a given layer yet no additional influence to their connections beyond this layer. A theoretical analysis framework is proposed to calculate the critical threshold and the size of giant component of multiplex networks when nodes are removed randomly or intentionally. Via numerous simulations, it is unveiled that the theoretical method can accurately predict the threshold and the size of giant component, irrespective of attack strategies. Moreover, we also compare the robustness of multiplex networks under multiplex node-based attack and layer node-based attack, and find that layer node-based attack makes multiplex networks more vulnerable, regardless of average degree and underlying topology.

  1. Cyber-Physical Attack-Resilient Wide-Area Monitoring, Protection, and Control for the Power Grid

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ashok, Aditya; Govindarasu, Manimaran; Wang, Jianhui

    Cyber security and resiliency of Wide-Area Monitoring, Protection and Control (WAMPAC) applications is critically important to ensure secure, reliable, and economic operation of the bulk power system. WAMPAC relies heavily on the security of measurements and control commands transmitted over wide-area communication networks for real-time operational, protection, and control functions. Also, the current “N-1 security criteria” for grid operation is inadequate to address malicious cyber events and therefore it is important to fundamentally redesign WAMPAC and to enhance Energy Management System (EMS) applications to make them attack-resilient. In this paper, we propose an end-to-end defense-in-depth architecture for attack-resilient WAMPAC thatmore » addresses resilience at both the infrastructure layer and the application layers. Also, we propose an attack-resilient cyber-physical security framework that encompasses the entire security life cycle including risk assessment, attack prevention, attack detection, attack mitigation, and attack resilience. The overarching objective of this paper is to provide a broad scope that comprehensively describes most of the major research issues and potential solutions in the context of cyber-physical security of WAMPAC for the power grid.« less

  2. Accurate Sybil Attack Detection Based on Fine-Grained Physical Channel Information.

    PubMed

    Wang, Chundong; Zhu, Likun; Gong, Liangyi; Zhao, Zhentang; Yang, Lei; Liu, Zheli; Cheng, Xiaochun

    2018-03-15

    With the development of the Internet-of-Things (IoT), wireless network security has more and more attention paid to it. The Sybil attack is one of the famous wireless attacks that can forge wireless devices to steal information from clients. These forged devices may constantly attack target access points to crush the wireless network. In this paper, we propose a novel Sybil attack detection based on Channel State Information (CSI). This detection algorithm can tell whether the static devices are Sybil attackers by combining a self-adaptive multiple signal classification algorithm with the Received Signal Strength Indicator (RSSI). Moreover, we develop a novel tracing scheme to cluster the channel characteristics of mobile devices and detect dynamic attackers that change their channel characteristics in an error area. Finally, we experiment on mobile and commercial WiFi devices. Our algorithm can effectively distinguish the Sybil devices. The experimental results show that our Sybil attack detection system achieves high accuracy for both static and dynamic scenarios. Therefore, combining the phase and similarity of channel features, the multi-dimensional analysis of CSI can effectively detect Sybil nodes and improve the security of wireless networks.

  3. Accurate Sybil Attack Detection Based on Fine-Grained Physical Channel Information

    PubMed Central

    Wang, Chundong; Zhao, Zhentang; Yang, Lei; Liu, Zheli; Cheng, Xiaochun

    2018-01-01

    With the development of the Internet-of-Things (IoT), wireless network security has more and more attention paid to it. The Sybil attack is one of the famous wireless attacks that can forge wireless devices to steal information from clients. These forged devices may constantly attack target access points to crush the wireless network. In this paper, we propose a novel Sybil attack detection based on Channel State Information (CSI). This detection algorithm can tell whether the static devices are Sybil attackers by combining a self-adaptive multiple signal classification algorithm with the Received Signal Strength Indicator (RSSI). Moreover, we develop a novel tracing scheme to cluster the channel characteristics of mobile devices and detect dynamic attackers that change their channel characteristics in an error area. Finally, we experiment on mobile and commercial WiFi devices. Our algorithm can effectively distinguish the Sybil devices. The experimental results show that our Sybil attack detection system achieves high accuracy for both static and dynamic scenarios. Therefore, combining the phase and similarity of channel features, the multi-dimensional analysis of CSI can effectively detect Sybil nodes and improve the security of wireless networks. PMID:29543773

  4. The time of sunrise and the number of hours with daylight may influence the diurnal rhythm of acute heart attack mortality.

    PubMed

    Kriszbacher, Ildikó; Bódis, József; Boncz, Imre; Koppan, Agnes; Koppan, Miklós

    2010-04-01

    We investigated whether the time of sunrise and the number of daylight hours have an effect on the seasonality, or the daily rhythm of heart attack mortality. We analyzed retrospectively data of patients admitted to hospitals with the diagnosis of heart attack (n=32,329) and patients who deceased of a heart attack (n=5142) between January 1, 2004 and December 31, 2005 in Hungary. Heart attack mortality was highest during winter, while lowest number of events was recorded during summer . The daily peak of diurnality was between 6:00 am and 12:00 pm (33.77%). A positive correlation was found between the time of sunrise, time of sunset and the mortality caused by myocardial infarction (p<0,01). In the analysis of the number of daylight hours and the heart attack mortality we found a negative correlation (r=-0.105, p<0.05). No significant difference was found between sexes and different age-groups in heart attack mortality. Our data suggest, that the occurrence and the mortality of heart attack may be related to the time of sunrise and the number of daylight hours. Copyright 2008 Elsevier Ireland Ltd. All rights reserved.

  5. [Case of exploding head syndrome].

    PubMed

    Okura, Mutsumi; Taniguchi, Mitsutaka; Muraki, Hisae; Sugita, Hideko; Ohi, Motoharu

    2010-01-01

    Exploding head syndrome (EHS) attacks are characterized by the sensation of sudden loud banging noises, and are occasionally accompanied by the sensation of a flash light. Although these attacks in themselves are usually not painful, it is reported that EHS attacks may precede migraines and may be perceived as auras. A 53-year-old woman, with a 40-year history of fulgurating migraines, experienced 2 different types of EHS attacks. During most of the attacks, which were not painful, she heard sounds like someone yelling or cars passing by. Only 1 episode was accompanied with the sensation of a flash light and of sounds similar to those of an electrical short circuit. On the video-polysomnography, video-polysomnography showed 11 EHS attacks occurred during stage N1 and stage N2; these attacks were preceded by soft snoring. She also had moderate obstructive sleep apnea syndrome (Apnea Hypopnea Index: 16.7) for which an oral appliance was prescribed; the EHS attacks did not recur after this treatment. The pathophysiology of EHS is still unclear. A detailed analysis of PSG data may help in understanding the pathophysiology of this syndrome and also in the selection of therapeutic strategies.

  6. Situational awareness of a coordinated cyber attack

    NASA Astrophysics Data System (ADS)

    Sudit, Moises; Stotz, Adam; Holender, Michael

    2005-03-01

    As technology continues to advance, services and capabilities become computerized, and an ever increasing amount of business is conducted electronically the threat of cyber attacks gets compounded by the complexity of such attacks and the criticality of the information which must be secured. A new age of virtual warfare has dawned in which seconds can differentiate between the protection of vital information and/or services and a malicious attacker attaining their goal. In this paper we present a novel approach in the real-time detection of multistage coordinated cyber attacks and the promising initial testing results we have obtained. We introduce INFERD (INformation Fusion Engine for Real-time Decision-making), an adaptable information fusion engine which performs fusion at levels zero, one, and two to provide real-time situational assessment and its application to the cyber domain in the ECCARS (Event Correlation for Cyber Attack Recognition System) system. The advantages to our approach are fourfold: (1) The complexity of the attacks which we consider, (2) the level of abstraction in which the analyst interacts with the attack scenarios, (3) the speed at which the information fusion is presented and performed, and (4) our disregard for ad-hoc rules or a priori parameters.

  7. Protecting complex infrastructures against multiple strategic attackers

    NASA Astrophysics Data System (ADS)

    Hausken, Kjell

    2011-01-01

    Infrastructures are analysed subject to defence by a strategic defender and attack by multiple strategic attackers. A framework is developed where each agent determines how much to invest in defending versus attacking each of multiple targets. A target can have economic, human and symbolic values, which generally vary across agents. Investment expenditure functions for each agent can be linear in the investment effort, concave, convex, logistic, can increase incrementally, or can be subject to budget constraints. Contest success functions (e.g., ratio and difference forms) determine the probability of a successful attack on each target, dependent on the relative investments of the defender and attackers on each target, and on characteristics of the contest. Targets can be in parallel, in series, interlinked, interdependent or independent. The defender minimises the expected damage plus the defence expenditures. Each attacker maximises the expected damage minus the attack expenditures. The number of free choice variables equals the number of agents times the number of targets, or lower if there are budget constraints. Each agent is interested in how his investments vary across the targets, and the impact on his utilities. Alternative optimisation programmes are discussed, together with repeated games, dynamic games and incomplete information. An example is provided for illustration.

  8. Flight test of the X-29A at high angle of attack: Flight dynamics and controls

    NASA Technical Reports Server (NTRS)

    Bauer, Jeffrey E.; Clarke, Robert; Burken, John J.

    1995-01-01

    The NASA Dryden Flight Research Center has flight tested two X-29A aircraft at low and high angles of attack. The high-angle-of-attack tests evaluate the feasibility of integrated X-29A technologies. More specific objectives focus on evaluating the high-angle-of-attack flying qualities, defining multiaxis controllability limits, and determining the maximum pitch-pointing capability. A pilot-selectable gain system allows examination of tradeoffs in airplane stability and maneuverability. Basic fighter maneuvers provide qualitative evaluation. Bank angle captures permit qualitative data analysis. This paper discusses the design goals and approach for high-angle-of-attack control laws and provides results from the envelope expansion and handling qualities testing at intermediate angles of attack. Comparisons of the flight test results to the predictions are made where appropriate. The pitch rate command structure of the longitudinal control system is shown to be a valid design for high-angle-of-attack control laws. Flight test results show that wing rock amplitude was overpredicted and aileron and rudder effectiveness were underpredicted. Flight tests show the X-29A airplane to be a good aircraft up to 40 deg angle of attack.

  9. Fallout risk following a major nuclear attack on the United States.

    PubMed

    Harvey, T F; Shapiro, C S; Wittler, R F

    1992-01-01

    Fallout distributions are calculated for nuclear attacks on the contiguous United States. Four attack scenarios are treated, including counterforce and counterforce-countervalue attacks, for meteorological conditions associated with a typical day in summer and one in winter. The countervalue attacks contain mostly airbursts. To determine fallout effects, the population surviving the prompt effects is first calculated. For the prompt effects, a "conflagration-type" model is used. The counterforce attack produces about 8 million prompt deaths, and the counterforce-countervalue case projects 98 million prompt deaths. Partial relocation before attack to low-risk fallout areas at least 15 km from potential strategic targets would result in a decrease in projections of deaths by tens of millions. For fallout risk calculations, only the dose received in the first 48 h (the early or local fallout) is considered. Populations are assumed to be sheltered, with a shelter protection factor profile that varies for a large urban area, a small urban area, or a rural area. With these profiles, without relocation, the fallout fatalities for all four attack scenarios are calculated to be less than one million people. This can be compared to fallout fatalities of about 10 million for a hypothetical unsheltered "phantom" population.

  10. Design of Provider-Provisioned Website Protection Scheme against Malware Distribution

    NASA Astrophysics Data System (ADS)

    Yagi, Takeshi; Tanimoto, Naoto; Hariu, Takeo; Itoh, Mitsutaka

    Vulnerabilities in web applications expose computer networks to security threats, and many websites are used by attackers as hopping sites to attack other websites and user terminals. These incidents prevent service providers from constructing secure networking environments. To protect websites from attacks exploiting vulnerabilities in web applications, service providers use web application firewalls (WAFs). WAFs filter accesses from attackers by using signatures, which are generated based on the exploit codes of previous attacks. However, WAFs cannot filter unknown attacks because the signatures cannot reflect new types of attacks. In service provider environments, the number of exploit codes has recently increased rapidly because of the spread of vulnerable web applications that have been developed through cloud computing. Thus, generating signatures for all exploit codes is difficult. To solve these problems, our proposed scheme detects and filters malware downloads that are sent from websites which have already received exploit codes. In addition, to collect information for detecting malware downloads, web honeypots, which automatically extract the communication records of exploit codes, are used. According to the results of experiments using a prototype, our scheme can filter attacks automatically so that service providers can provide secure and cost-effective network environments.

  11. Brainjacking: Implant Security Issues in Invasive Neuromodulation.

    PubMed

    Pycroft, Laurie; Boccard, Sandra G; Owen, Sarah L F; Stein, John F; Fitzgerald, James J; Green, Alexander L; Aziz, Tipu Z

    2016-08-01

    The security of medical devices is critical to good patient care, especially when the devices are implanted. In light of recent developments in information security, there is reason to be concerned that medical implants are vulnerable to attack. The ability of attackers to exert malicious control over brain implants ("brainjacking") has unique challenges that we address in this review, with particular focus on deep brain stimulation implants. To illustrate the potential severity of this risk, we identify several mechanisms through which attackers could manipulate patients if unauthorized access to an implant can be achieved. These include blind attacks in which the attacker requires no patient-specific knowledge and targeted attacks that require patient-specific information. Blind attacks include cessation of stimulation, draining implant batteries, inducing tissue damage, and information theft. Targeted attacks include impairment of motor function, alteration of impulse control, modification of emotions or affect, induction of pain, and modulation of the reward system. We also discuss the limitations inherent in designing implants and the trade-offs that must be made to balance device security with battery life and practicality. We conclude that researchers, clinicians, manufacturers, and regulatory bodies should cooperate to minimize the risk posed by brainjacking. Copyright © 2016 Elsevier Inc. All rights reserved.

  12. A decision framework for managing risk to airports from terrorist attack.

    PubMed

    Shafieezadeh, Abdollah; Cha, Eun J; Ellingwood, Bruce R

    2015-02-01

    This article presents an asset-level security risk management framework to assist stakeholders of critical assets with allocating limited budgets for enhancing their safety and security against terrorist attack. The proposed framework models the security system of an asset, considers various threat scenarios, and models the sequential decision framework of attackers during the attack. Its novel contributions are the introduction of the notion of partial neutralization of attackers by defenders, estimation of total loss from successful, partially successful, and unsuccessful actions of attackers at various stages of an attack, and inclusion of the effects of these losses on the choices made by terrorists at various stages of the attack. The application of the proposed method is demonstrated in an example dealing with security risk management of a U.S. commercial airport, in which a set of plausible threat scenarios and risk mitigation options are considered. It is found that a combination of providing blast-resistant cargo containers and a video surveillance system on the airport perimeter fence is the best option based on minimum expected life-cycle cost considering a 10-year service period. © 2014 Society for Risk Analysis.

  13. Informatic analysis for hidden pulse attack exploiting spectral characteristics of optics in plug-and-play quantum key distribution system

    NASA Astrophysics Data System (ADS)

    Ko, Heasin; Lim, Kyongchun; Oh, Junsang; Rhee, June-Koo Kevin

    2016-10-01

    Quantum channel loopholes due to imperfect implementations of practical devices expose quantum key distribution (QKD) systems to potential eavesdropping attacks. Even though QKD systems are implemented with optical devices that are highly selective on spectral characteristics, information theory-based analysis about a pertinent attack strategy built with a reasonable framework exploiting it has never been clarified. This paper proposes a new type of trojan horse attack called hidden pulse attack that can be applied in a plug-and-play QKD system, using general and optimal attack strategies that can extract quantum information from phase-disturbed quantum states of eavesdropper's hidden pulses. It exploits spectral characteristics of a photodiode used in a plug-and-play QKD system in order to probe modulation states of photon qubits. We analyze the security performance of the decoy-state BB84 QKD system under the optimal hidden pulse attack model that shows enormous performance degradation in terms of both secret key rate and transmission distance.

  14. [A survey of perioperative asthmatic attack among patients with bronchial asthma underwent general anesthesia].

    PubMed

    Ie, Kenya; Yoshizawa, Atsuto; Hirano, Satoru; Izumi, Sinyuu; Hojo, Masaaki; Sugiyama, Haruhito; Kobayasi, Nobuyuki; Kudou, Kouichirou; Maehara, Yasuhiro; Kawachi, Masaharu; Miyakoshi, Kouichi

    2010-07-01

    We investigated the risk factor of perioperative asthmatic attack and effectiveness of preventing treatment for asthmatic attack before operation. We performed retrospective chart review of one hundred eleven patients with asthma underwent general anesthesia and surgical intervention from January 2006 to October 2007 in our hospital. The rate of perioperative asthmatic attack were as follows; 10.2% (5 in 49 cases) in no pretreatment group, 7.5% (3 in 40 cases) in any pretreatments except for systemic steroid, and 4.5% (1 in 22 cases) in systemic steroid pretreatment group. Neither preoperative asthma severity nor duration from the last attack had significant relevancy to perioperative attack rate. The otolaryngological surgery, especially those have nasal polyp and oral surgery had high perioperative asthma attack rate, although there was no significant difference. We recommend the systemic steroid pretreatment for asthmatic patients, especially when they have known risk factor such as administration of the systemic steroid within 6 months, or possibly new risk factor such as nasal polyp, otolaryngological and oral surgery.

  15. [Incidence of asthmatic attack during anesthesia in patients with a history of bronchial asthma].

    PubMed

    Nonaka, M; Sakanashi, Y; Sugahara, K; Terasaki, H

    1999-07-01

    We investigated retrospectively, the incidence of intraoperative asthmatic attack in patients with bronchial asthma, and compared the past 5-year period (Jan 1, 1979 to Dec 31, 1983) and the recent 5-year period (July 1, 1990 to June 30, 1994). The influence of anesthetic methods, induction agents, and intervals between the most recent attack and anesthesia were evaluated. The incidence of the attack during anesthesia in patients with asthma was similar in both period, 6.7% in the past and 7.8% in the recent period. Patients who had a history of recurrent attacks within 2 years prior to anesthesia tended to have higher incidence of intraoperative attack in both periods. Furthermore, the incidence of asthmatic attack was significantly greater in patients receiving inhalational anesthetics for induction of anesthesia than in those given intravenous anesthetics in the recent period. Although inhalational anesthetics are considered to be used safely for asthmatic patients, care should be taken when volatile anesthetics are administered to asthmatic patients during induction of anesthesia.

  16. The Weight of Cognitions in Panic: The Link between Misinterpretations and Panic Attacks

    PubMed Central

    De Cort, Klara; Hermans, Dirk; Noortman, Daphne; Arends, Wiesje; Griez, Eric J. L.; Schruers, Koen R. J.

    2013-01-01

    In cognitive theory it is hypothesized that panic attacks are provoked by catastrophic misinterpretations of bodily sensations. The aim of the present study was to investigate the ability of associated word pairs referring to catastrophic thinking (e.g. palpitations-heart attack) in producing panic attacks. Patients with PD (n = 20), patients with mixed anxiety disorders (n = 20), and a healthy control group (n = 30) participated in the present study. To enhance ecological validity we first conducted a stimulus validation experiment. Subsequently, nine suitable panic and neutral word pairs were presented in block to the participants. Anxiety levels were assessed before and after the presentation. PD patients were more anxious when reading these word pairs, compared to neutral word pairs. However, none of the participants experienced a panic attack upon reading the word pairs. From the present results it seems that catastrophic thinking is rather related to the anticipatory anxiety for panic attacks, but not necessarily with the occurrence of the panic attacks themselves. PMID:23940559

  17. Correlates of nest-defense behavior of common terns

    USGS Publications Warehouse

    Erwin, R.M.

    1988-01-01

    Nest-defense behavior was studied at seven Common Tern (Sterna hirundo) colonies in southern coastal New Jersey during June and July 1981. Data were collected weekly on numbers of adults, nests, eggs, and young in relation to the frequency and intensity of dive attacks on a human intruder by nesting terns. I explored the relationships between attack behavior and colony size/density, seasonality, and brood survival. The results provide little support for social facilitation since neither colony size (range 30-250 nests) nor density was related to mean attack frequency; however, in larger colonies, fewer birds participated in dive attacks. Although the intensity of attacks was strongly seasonal, patterns were very different among colonies and peak attack rates did not always coincide with peak hatching periods. Defense levels declined late in the season in most colonies regardless of whether brood survival was high or low. Colonies with individuals that attacked early in the season had higher overall nesting success than in colonies where individuals showed little early season aggression.

  18. The effects of stress, anxiety, and outdoor temperature on the frequency and severity of Raynaud's attacks: the Raynaud's Treatment Study.

    PubMed

    Brown, K M; Middaugh, S J; Haythornthwaite, J A; Bielory, L

    2001-04-01

    It was expected that stress and anxiety would be related to Raynaud's phenomenon (RP) attack characteristics when mild outdoor temperatures produced partial or no digital vasoconstriction. Hypotheses were that in warmer temperature categories, compared to those below 40 degrees F, higher stress or anxiety would be associated with more frequent, severe, and painful attacks. The Raynaud's Treatment Study recruited 313 participants with primary RP. Outcomes were attack rate, severity, and pain. Predictors were average daily outdoor temperature, stress, anxiety, age, gender, and a stress-by-temperature or an anxiety-by-temperature interaction. Outcomes were tested separately in multiple linear regression models. Stress and anxiety were tested in separate models. Stress was not a significant predictor of RP attack characteristics. Higher anxiety was related to more frequent attacks above 60 degrees F. It was also related to greater attack severity at all temperatures, and to greater pain above 60 degrees F and between 40 degrees and 49.9 degrees F.

  19. Wolf Attack Probability: A Theoretical Security Measure in Biometric Authentication Systems

    NASA Astrophysics Data System (ADS)

    Une, Masashi; Otsuka, Akira; Imai, Hideki

    This paper will propose a wolf attack probability (WAP) as a new measure for evaluating security of biometric authentication systems. The wolf attack is an attempt to impersonate a victim by feeding “wolves” into the system to be attacked. The “wolf” means an input value which can be falsely accepted as a match with multiple templates. WAP is defined as a maximum success probability of the wolf attack with one wolf sample. In this paper, we give a rigorous definition of the new security measure which gives strength estimation of an individual biometric authentication system against impersonation attacks. We show that if one reestimates using our WAP measure, a typical fingerprint algorithm turns out to be much weaker than theoretically estimated by Ratha et al. Moreover, we apply the wolf attack to a finger-vein-pattern based algorithm. Surprisingly, we show that there exists an extremely strong wolf which falsely matches all templates for any threshold value.

  20. Secure Data Aggregation in Wireless Sensor Network-Fujisaki Okamoto(FO) Authentication Scheme against Sybil Attack.

    PubMed

    Nirmal Raja, K; Maraline Beno, M

    2017-07-01

    In the wireless sensor network(WSN) security is a major issue. There are several network security schemes proposed in research. In the network, malicious nodes obstruct the performance of the network. The network can be vulnerable by Sybil attack. When a node illicitly assertions multiple identities or claims fake IDs, the WSN grieves from an attack named Sybil attack. This attack threatens wireless sensor network in data aggregation, synchronizing system, routing, fair resource allocation and misbehavior detection. Henceforth, the research is carried out to prevent the Sybil attack and increase the performance of the network. This paper presents the novel security mechanism and Fujisaki Okamoto algorithm and also application of the work. The Fujisaki-Okamoto (FO) algorithm is ID based cryptographic scheme and gives strong authentication against Sybil attack. By using Network simulator2 (NS2) the scheme is simulated. In this proposed scheme broadcasting key, time taken for different key sizes, energy consumption, Packet delivery ratio, Throughput were analyzed.

Top