High angle of attack flying qualities criteria for longitudinal rate command systems
NASA Technical Reports Server (NTRS)
Wilson, David J.; Citurs, Kevin D.; Davidson, John B.
1994-01-01
This study was designed to investigate flying qualities requirements of alternate pitch command systems for fighter aircraft at high angle of attack. Flying qualities design guidelines have already been developed for angle of attack command systems at 30, 45, and 60 degrees angle of attack, so this research fills a similar need for rate command systems. Flying qualities tasks that require post-stall maneuvering were tested during piloted simulations in the McDonnell Douglas Aerospace Manned Air Combat Simulation facility. A generic fighter aircraft model was used to test angle of attack rate and pitch rate command systems for longitudinal gross acquisition and tracking tasks at high angle of attack. A wide range of longitudinal dynamic variations were tested at 30, 45, and 60 degrees angle of attack. Pilot comments, Cooper-Harper ratings, and pilot induced oscillation ratings were taken from five pilots from NASA, USN, CAF, and McDonnell Douglas Aerospace. This data was used to form longitudinal design guidelines for rate command systems at high angle of attack. These criteria provide control law design guidance for fighter aircraft at high angle of attack, low speed flight conditions. Additional time history analyses were conducted using the longitudinal gross acquisition data to look at potential agility measures of merit and correlate agility usage to flying qualities boundaries. This paper presents an overview of this research.
NASA Technical Reports Server (NTRS)
Stoliker, Patrick C.; Bosworth, John T.
1996-01-01
The X-31A aircraft gross-acquisition and fine-tracking handling qualities have been evaluated using standard evaluation maneuvers developed by Wright Laboratory, Wright-Patterson Air Force Base. The emphasis of the testing is in the angle-of-attack range between 30 deg and 70 deg. Longitudinal gross-acquisition handling qualities results show borderline Level 1/Level 2 performance. Lateral gross-acquisition testing results in Level 1/Level 2 ratings below 45 deg angle of attack, degrading into Level 3 as angle of attack increases. The fine-tracking performance in both longitudinal and lateral axes also receives Level 1 ratings near 30 deg angle of attack, with the ratings tending towards Level 3 at angles of attack greater than 50 deg. These ratings do not match the expectations from the extensive close-in combat testing where the X-31A aircraft demonstrated fair to good handling qualities maneuvering for high angles of attack. This paper presents the results of the high-angle-of-attack handling qualities flight testing of the X-31A aircraft. Discussion of the preparation for the maneuvers, the pilot ratings, and selected pilot comments are included. Evaluation of the results is made in conjunction with existing Neal-Smith, bandwidth, Smith-Geddes, and military specifications.
NASA Technical Reports Server (NTRS)
Stoliker, Patrick C.; Bosworth, John T.
1997-01-01
The X-31A aircraft gross-acquisition and fine-tracking handling qualities have been evaluated using standard evaluation maneuvers developed by Wright Laboratory, Wright Patterson Air Force Base. The emphasis of the testing is in the angle-of-attack range between 30 deg. and 70 deg. Longitudinal gross-acquisition handling qualities results show borderline Level l/Level 2 performance. Lateral gross-acquisition testing results in Level l/Level 2 ratings below 45 deg. angle of attack, degrading into Level 3 as angle of attack increases. The fine tracking performance in both longitudinal and lateral axes also receives Level 1 ratings near 30 deg. angle of attack, with the ratings tending towards Level 3 at angles of attack greater than 50 deg. These ratings do not match the expectations from the extensive close-in combat testing where the X-31A aircraft demonstrated fair to good handling qualities maneuvering for high angles of attack. This paper presents the results of the high-angle-of-attack handling qualities flight testing of the X-31A aircraft. Discussion of the preparation for the maneuvers, the pilot ratings, and selected pilot comments are included. Evaluation of the results is made in conjunction with existing Neal Smith, bandwidth, Smith-Geddes, and military specifications.
Shilling Attacks Detection in Recommender Systems Based on Target Item Analysis
Zhou, Wei; Wen, Junhao; Koh, Yun Sing; Xiong, Qingyu; Gao, Min; Dobbie, Gillian; Alam, Shafiq
2015-01-01
Recommender systems are highly vulnerable to shilling attacks, both by individuals and groups. Attackers who introduce biased ratings in order to affect recommendations, have been shown to negatively affect collaborative filtering (CF) algorithms. Previous research focuses only on the differences between genuine profiles and attack profiles, ignoring the group characteristics in attack profiles. In this paper, we study the use of statistical metrics to detect rating patterns of attackers and group characteristics in attack profiles. Another question is that most existing detecting methods are model specific. Two metrics, Rating Deviation from Mean Agreement (RDMA) and Degree of Similarity with Top Neighbors (DegSim), are used for analyzing rating patterns between malicious profiles and genuine profiles in attack models. Building upon this, we also propose and evaluate a detection structure called RD-TIA for detecting shilling attacks in recommender systems using a statistical approach. In order to detect more complicated attack models, we propose a novel metric called DegSim’ based on DegSim. The experimental results show that our detection model based on target item analysis is an effective approach for detecting shilling attacks. PMID:26222882
Ie, Kenya; Yoshizawa, Atsuto; Hirano, Satoru; Izumi, Sinyuu; Hojo, Masaaki; Sugiyama, Haruhito; Kobayasi, Nobuyuki; Kudou, Kouichirou; Maehara, Yasuhiro; Kawachi, Masaharu; Miyakoshi, Kouichi
2010-07-01
We investigated the risk factor of perioperative asthmatic attack and effectiveness of preventing treatment for asthmatic attack before operation. We performed retrospective chart review of one hundred eleven patients with asthma underwent general anesthesia and surgical intervention from January 2006 to October 2007 in our hospital. The rate of perioperative asthmatic attack were as follows; 10.2% (5 in 49 cases) in no pretreatment group, 7.5% (3 in 40 cases) in any pretreatments except for systemic steroid, and 4.5% (1 in 22 cases) in systemic steroid pretreatment group. Neither preoperative asthma severity nor duration from the last attack had significant relevancy to perioperative attack rate. The otolaryngological surgery, especially those have nasal polyp and oral surgery had high perioperative asthma attack rate, although there was no significant difference. We recommend the systemic steroid pretreatment for asthmatic patients, especially when they have known risk factor such as administration of the systemic steroid within 6 months, or possibly new risk factor such as nasal polyp, otolaryngological and oral surgery.
Item Anomaly Detection Based on Dynamic Partition for Time Series in Recommender Systems
Gao, Min; Tian, Renli; Wen, Junhao; Xiong, Qingyu; Ling, Bin; Yang, Linda
2015-01-01
In recent years, recommender systems have become an effective method to process information overload. However, recommendation technology still suffers from many problems. One of the problems is shilling attacks-attackers inject spam user profiles to disturb the list of recommendation items. There are two characteristics of all types of shilling attacks: 1) Item abnormality: The rating of target items is always maximum or minimum; and 2) Attack promptness: It takes only a very short period time to inject attack profiles. Some papers have proposed item anomaly detection methods based on these two characteristics, but their detection rate, false alarm rate, and universality need to be further improved. To solve these problems, this paper proposes an item anomaly detection method based on dynamic partitioning for time series. This method first dynamically partitions item-rating time series based on important points. Then, we use chi square distribution (χ2) to detect abnormal intervals. The experimental results on MovieLens 100K and 1M indicate that this approach has a high detection rate and a low false alarm rate and is stable toward different attack models and filler sizes. PMID:26267477
Item Anomaly Detection Based on Dynamic Partition for Time Series in Recommender Systems.
Gao, Min; Tian, Renli; Wen, Junhao; Xiong, Qingyu; Ling, Bin; Yang, Linda
2015-01-01
In recent years, recommender systems have become an effective method to process information overload. However, recommendation technology still suffers from many problems. One of the problems is shilling attacks-attackers inject spam user profiles to disturb the list of recommendation items. There are two characteristics of all types of shilling attacks: 1) Item abnormality: The rating of target items is always maximum or minimum; and 2) Attack promptness: It takes only a very short period time to inject attack profiles. Some papers have proposed item anomaly detection methods based on these two characteristics, but their detection rate, false alarm rate, and universality need to be further improved. To solve these problems, this paper proposes an item anomaly detection method based on dynamic partitioning for time series. This method first dynamically partitions item-rating time series based on important points. Then, we use chi square distribution (χ2) to detect abnormal intervals. The experimental results on MovieLens 100K and 1M indicate that this approach has a high detection rate and a low false alarm rate and is stable toward different attack models and filler sizes.
Story, Tyler J; Craske, Michelle G
2008-09-01
Participants with elevated anxiety sensitivity and a history of panic attacks were compared to a low anxiety comparison group with respect to physiological and subjective reactivity to false heart-rate feedback and reactivity to a priming procedure. Whereas accurate heart-rate feedback elicited minimal responses, participants across groups showed significant physiological and subjective responses to false feedback. High risk and low risk participants did not differ in heart-rate responses to false feedback, though panic attack frequency did predict physiological and subjective reactions to false feedback in the high risk group. Self-reported nonspecific anxiety was significantly higher in high risk female participants than in low risk female participants, while males did not different in general subjective anxiety. However, high risk participants reported more panic-specific symptoms during the false feedback task than low risk participants, regardless of the sex of the participant. Therefore, although the experimental paradigm appeared to trigger nonspecific anxiety in high risk female participants, panic attack symptoms in reaction to the task were specific to risk group, not sex, and consistent with hypotheses. Surprisingly, the priming procedure did not influence physiological or subjective responses to false feedback in either group. These results raise additional questions regarding the process and impact of interception in individuals with panic attacks, and suggest that false perception of internal changes may contribute to risk for panic disorder when exposed to believable cues.
Unsupervised Anomaly Detection Based on Clustering and Multiple One-Class SVM
NASA Astrophysics Data System (ADS)
Song, Jungsuk; Takakura, Hiroki; Okabe, Yasuo; Kwon, Yongjin
Intrusion detection system (IDS) has played an important role as a device to defend our networks from cyber attacks. However, since it is unable to detect unknown attacks, i.e., 0-day attacks, the ultimate challenge in intrusion detection field is how we can exactly identify such an attack by an automated manner. Over the past few years, several studies on solving these problems have been made on anomaly detection using unsupervised learning techniques such as clustering, one-class support vector machine (SVM), etc. Although they enable one to construct intrusion detection models at low cost and effort, and have capability to detect unforeseen attacks, they still have mainly two problems in intrusion detection: a low detection rate and a high false positive rate. In this paper, we propose a new anomaly detection method based on clustering and multiple one-class SVM in order to improve the detection rate while maintaining a low false positive rate. We evaluated our method using KDD Cup 1999 data set. Evaluation results show that our approach outperforms the existing algorithms reported in the literature; especially in detection of unknown attacks.
Flight test of the X-29A at high angle of attack: Flight dynamics and controls
NASA Technical Reports Server (NTRS)
Bauer, Jeffrey E.; Clarke, Robert; Burken, John J.
1995-01-01
The NASA Dryden Flight Research Center has flight tested two X-29A aircraft at low and high angles of attack. The high-angle-of-attack tests evaluate the feasibility of integrated X-29A technologies. More specific objectives focus on evaluating the high-angle-of-attack flying qualities, defining multiaxis controllability limits, and determining the maximum pitch-pointing capability. A pilot-selectable gain system allows examination of tradeoffs in airplane stability and maneuverability. Basic fighter maneuvers provide qualitative evaluation. Bank angle captures permit qualitative data analysis. This paper discusses the design goals and approach for high-angle-of-attack control laws and provides results from the envelope expansion and handling qualities testing at intermediate angles of attack. Comparisons of the flight test results to the predictions are made where appropriate. The pitch rate command structure of the longitudinal control system is shown to be a valid design for high-angle-of-attack control laws. Flight test results show that wing rock amplitude was overpredicted and aileron and rudder effectiveness were underpredicted. Flight tests show the X-29A airplane to be a good aircraft up to 40 deg angle of attack.
The epidemiology of physical attack and rape among crack-using women.
Falck, R S; Wang, J; Carlson, R G; Siegal, H A
2001-02-01
This prospective study examines the epidemiology of physical attack and rape among a sample of 171 not-in-treatment, crack-cocaine using women. Since initiating crack use, 62% of the women reported suffering a physical attack. The annual rate of victimization by physical attack was 45%. Overall, more than half of the victims sought medical care subsequent to an attack. The prevalence of rape since crack use was initiated was 32%, and the annual rate was 11%. Among those women having been raped since they initiated crack use, 83% reported they were high on crack when the crime occurred as were an estimated 57% of the perpetrators. Logistic regression analyses showed that duration of crack use, arrest for prostitution, and some college education were predictors of having experienced a physical attack. Duration of crack use and a history of prostitution were predictors of suffering a rape. Drug abuse treatment programs must be sensitive to high levels of violence victimization experienced by crack-cocaine using women. Screening women for victimization, and treating the problems that emanate from it, may help make drug abuse treatment more effective.
NASA Technical Reports Server (NTRS)
Lackey, J.; Hadfield, C.
1992-01-01
Recent mishaps and incidents on Class IV aircraft have shown a need for establishing quantitative longitudinal high angle of attack (AOA) pitch control margin design guidelines for future aircraft. NASA Langley Research Center has conducted a series of simulation tests to define these design guidelines. Flight test results have confirmed the simulation studies in that pilot rating of high AOA nose-down recoveries were based on the short-term response interval in the forms of pitch acceleration and rate.
Martinson, S J; Fernádez Ajó, A A; Martínez, A S; Krivak-Tetley, F E; Villacide, J M; Ayres, M P; Corley, J C
2018-04-18
Accidental and intentional global movement of species has increased the frequency of novel plant-insect interactions. In Patagonia, the European woodwasp, Sirex noctilio, has invaded commercial plantations of North American pines. We compared the patterns of resin defenses and S. noctilio-caused mortality at two mixed-species forests near San Carlos de Bariloche, Argentina. We observed lower levels of resin flow and higher levels of mortality in Pinus contorta compared with Pinus ponderosa. In general, S. noctilio attacked trees with lower resin compared with neighboring trees. Resin production in P. ponderosa was not related to growth rates, but for P. contorta, slower growing trees produced less resin than faster growing conspecifics. For all infested trees, attack density and number of drills (ovipositor probes) per attack did not vary with resin production. Most attacks resulted in one or two drills. Attack rates and drills/attack were basically uniform across the bole of the tree except for a decrease in both drills/attack and attack density in the upper portion of the crown, and an increase in the attack density for the bottom 10% of the tree. Planted pines in Patagonia grow faster than their counterparts in North America, and produce less resin, consistent with the growth-differentiation balance hypothesis. Limited resin defenses may help to explain the high susceptibility of P. contorta to woodwasps in Patagonia.
High-Alpha Handling Qualities Flight Research on the NASA F/A-18 High Alpha Research Vehicle
NASA Technical Reports Server (NTRS)
Wichman, Keith D.; Pahle, Joseph W.; Bahm, Catherine; Davidson, John B.; Bacon, Barton J.; Murphy, Patrick C.; Ostroff, Aaron J.; Hoffler, Keith D.
1996-01-01
A flight research study of high-angle-of-attack handling qualities has been conducted at the NASA Dryden Flight Research Center using the F/A-18 High Alpha Research Vehicle (HARV). The objectives were to create a high-angle-of-attack handling qualities flight database, develop appropriate research evaluation maneuvers, and evaluate high-angle-of-attack handling qualities guidelines and criteria. Using linear and nonlinear simulations and flight research data, the predictions from each criterion were compared with the pilot ratings and comments. Proposed high-angle-of-attack nonlinear design guidelines and proposed handling qualities criteria and guidelines developed using piloted simulation were considered. Recently formulated time-domain Neal-Smith guidelines were also considered for application to high-angle-of-attack maneuvering. Conventional envelope criteria were evaluated for possible extension to the high-angle-of-attack regime. Additionally, the maneuvers were studied as potential evaluation techniques, including a limited validation of the proposed standard evaluation maneuver set. This paper gives an overview of these research objectives through examples and summarizes result highlights. The maneuver development is described briefly, the criteria evaluation is emphasized with example results given, and a brief discussion of the database form and content is presented.
NASA Astrophysics Data System (ADS)
Kim, Kyung-Su; Lee, Hae-Yeoun; Im, Dong-Hyuck; Lee, Heung-Kyu
Commercial markets employ digital right management (DRM) systems to protect valuable high-definition (HD) quality videos. DRM system uses watermarking to provide copyright protection and ownership authentication of multimedia contents. We propose a real-time video watermarking scheme for HD video in the uncompressed domain. Especially, our approach is in aspect of practical perspectives to satisfy perceptual quality, real-time processing, and robustness requirements. We simplify and optimize human visual system mask for real-time performance and also apply dithering technique for invisibility. Extensive experiments are performed to prove that the proposed scheme satisfies the invisibility, real-time processing, and robustness requirements against video processing attacks. We concentrate upon video processing attacks that commonly occur in HD quality videos to display on portable devices. These attacks include not only scaling and low bit-rate encoding, but also malicious attacks such as format conversion and frame rate change.
Diamond, Kelly M; Schoenfuss, Heiko L; Walker, Jeffrey A; Blob, Richard W
2016-10-01
Experimental measurements of escape performance in fishes have typically been conducted in still water; however, many fishes inhabit environments with flow that could impact escape behavior. We examined the influences of flow and predator attack direction on the escape behavior of fish, using juveniles of the amphidromous Hawaiian goby Sicyopterus stimpsoni In nature, these fish must escape ambush predation while moving through streams with high-velocity flow. We measured the escape performance of juvenile gobies while exposing them to a range of water velocities encountered in natural streams and stimulating fish from three different directions. Frequency of response across treatments indicated strong effects of flow conditions and attack direction. Juvenile S. stimpsoni had uniformly high response rates for attacks from a caudal direction (opposite flow); however, response rates for attacks from a cranial direction (matching flow) decreased dramatically as flow speed increased. Mechanical stimuli produced by predators attacking in the same direction as flow might be masked by the flow environment, impairing the ability of prey to detect attacks. Thus, the likelihood of successful escape performance in fishes can depend critically on environmental context. © 2016. Published by The Company of Biologists Ltd.
Detection of abnormal item based on time intervals for recommender systems.
Gao, Min; Yuan, Quan; Ling, Bin; Xiong, Qingyu
2014-01-01
With the rapid development of e-business, personalized recommendation has become core competence for enterprises to gain profits and improve customer satisfaction. Although collaborative filtering is the most successful approach for building a recommender system, it suffers from "shilling" attacks. In recent years, the research on shilling attacks has been greatly improved. However, the approaches suffer from serious problem in attack model dependency and high computational cost. To solve the problem, an approach for the detection of abnormal item is proposed in this paper. In the paper, two common features of all attack models are analyzed at first. A revised bottom-up discretized approach is then proposed based on time intervals and the features for the detection. The distributions of ratings in different time intervals are compared to detect anomaly based on the calculation of chi square distribution (χ(2)). We evaluated our approach on four types of items which are defined according to the life cycles of these items. The experimental results show that the proposed approach achieves a high detection rate with low computational cost when the number of attack profiles is more than 15. It improves the efficiency in shilling attacks detection by narrowing down the suspicious users.
NASA Astrophysics Data System (ADS)
Lupo, Cosmo; Ottaviani, Carlo; Papanastasiou, Panagiotis; Pirandola, Stefano
2018-05-01
We present a rigorous security analysis of continuous-variable measurement-device-independent quantum key distribution (CV MDI QKD) in a finite-size scenario. The security proof is obtained in two steps: by first assessing the security against collective Gaussian attacks, and then extending to the most general class of coherent attacks via the Gaussian de Finetti reduction. Our result combines recent state-of-the-art security proofs for CV QKD with findings about min-entropy calculus and parameter estimation. In doing so, we improve the finite-size estimate of the secret key rate. Our conclusions confirm that CV MDI protocols allow for high rates on the metropolitan scale, and may achieve a nonzero secret key rate against the most general class of coherent attacks after 107-109 quantum signal transmissions, depending on loss and noise, and on the required level of security.
Buffet induced structural/flight-control system interaction of the X-29A aircraft
NASA Technical Reports Server (NTRS)
Voracek, David F.; Clarke, Robert
1991-01-01
High angle-of-attack flight regime research is currently being conducted for modern fighter aircraft at the NASA Ames Research Center's Dryden Flight Research Facility. This flight regime provides enhanced maneuverability to fighter pilots in combat situations. Flight research data are being acquired to compare and validate advanced computational fluid dynamic solutions and wind-tunnel models. High angle-of-attack flight creates unique aerodynamic phenomena including wing rock and buffet on the airframe. These phenomena increase the level of excitation of the structural modes, especially on the vertical and horizontal stabilizers. With high gain digital flight-control systems, this structural response may result in an aeroservoelastic interaction. A structural interaction on the X-29A aircraft was observed during high angle-of-attack flight testing. The roll and yaw rate gyros sensed the aircraft's structural modes at 11, 13, and 16 Hz. The rate gyro output signals were then amplified through the flight-control laws and sent as commands to the flaperons and rudder. The flight data indicated that as the angle of attack increased, the amplitude of the buffet on the vertical stabilizer increased, which resulted in more excitation to the structural modes. The flight-control system sensors and command signals showed this increase in modal power at the structural frequencies up to a 30 degree angle-of-attack. Beyond a 30 degree angle-of-attack, the vertical stabilizer response, the feedback sensor amplitude, and control surface command signal amplitude remained relatively constant. Data are presented that show the increased modal power in the aircraft structural accelerometers, the feedback sensors, and the command signals as a function of angle of attack. This structural interaction is traced from the aerodynamic buffet to the flight-control surfaces.
NASA Technical Reports Server (NTRS)
Wurster, K. E.; Eldred, C. H.
1979-01-01
A broad parametric study which examines several critical aspects of low-heat-rate entry trajectories is performed. Low planform loadings associated with future winged earth-entry vehicles coupled with the potential application of metallic thermal protection systems (TPS) suggest that such trajectories are of particular interest. Studied are three heating conditions - reference, stagnation, and windward centerline, for both laminar and turbulent flow; configuration-related factors including planform loading and hypersonic angle of attack; and mission-related factors such as cross-range and orbit inclination. Results indicate benefits in the design of TPS to be gained by utilizing moderate angles of attack as opposed to high-lift coefficient, high angles of attack, during entry. An assessment of design and technology implications is made.
Jeerakathil, Thomas; Shuaib, Ashfaq; Majumdar, Sumit R; Demchuk, Andrew M; Butcher, Kenneth S; Watson, Tim J; Dean, Naeem; Gordon, Deb; Edmond, Cathy; Coutts, Shelagh B
2014-10-01
Stroke risk after transient ischaemic attack is high and, it is a challenge worldwide to provide urgent assessment and preventive services to entire populations. To determine whether a province-wide transient ischaemic attack Triaging algorithm and transient ischaemic attack hotline (the Alberta Stroke Prevention in transient ischaemic attacks and mild strokes intervention) can reduce the rate of stroke recurrence following transient ischaemic attack across the population of Alberta, Canada (population 3·7 million, 90-day rate of post-stroke transient ischaemic attack currently 9·5%). It also seeks to improve upon current transient ischaemic attack triaging rules by incorporating time from symptom onset as a predictive variable. The transient ischaemic attack algorithm and hotline were developed with a broad consensus of clinicians, patients, policy-makers, and researchers and based on local adaptation of the work of others and research and insights developed within the province. Because neither patient-level nor region-level randomization was possible, we conducted a quasi-experimental design examining changes in the post-transient ischaemic attack rate of stroke recurrence before and after the 15-month implementation period using an interrupted time-series regression analysis. The design controls for changes in case-mix, co-interventions, and secular trends. A prospective transient ischaemic attack cohort will also be concurrently created with telephone follow-up at seven-days and 90 days as well as passive follow-up over the longer term using linkages to provincial healthcare administrative databases. The primary outcome measure is the change in recurrence rate of stroke following transient ischaemic attack at seven-days and 90 days, comparing a period of two-years before vs. two-years after the intervention is implemented. All cases of recurrent stroke will be validated. Secondary outcomes include functional status, hospitalizations, morbidity, and mortality. We are undertaking a rigorous evaluation of a population-based approach to improving quality of transient ischaemic attack care. Whether positive or negative, our work should provide important insights for all potential stakeholders. © 2012 The Authors. International Journal of Stroke © 2012 World Stroke Organization.
Novel Method For Low-Rate Ddos Attack Detection
NASA Astrophysics Data System (ADS)
Chistokhodova, A. A.; Sidorov, I. D.
2018-05-01
The relevance of the work is associated with an increasing number of advanced types of DDoS attacks, in particular, low-rate HTTP-flood. Last year, the power and complexity of such attacks increased significantly. The article is devoted to the analysis of DDoS attacks detecting methods and their modifications with the purpose of increasing the accuracy of DDoS attack detection. The article details low-rate attacks features in comparison with conventional DDoS attacks. During the analysis, significant shortcomings of the available method for detecting low-rate DDoS attacks were found. Thus, the result of the study is an informal description of a new method for detecting low-rate denial-of-service attacks. The architecture of the stand for approbation of the method is developed. At the current stage of the study, it is possible to improve the efficiency of an already existing method by using a classifier with memory, as well as additional information.
Hybrid attacks on model-based social recommender systems
NASA Astrophysics Data System (ADS)
Yu, Junliang; Gao, Min; Rong, Wenge; Li, Wentao; Xiong, Qingyu; Wen, Junhao
2017-10-01
With the growing popularity of the online social platform, the social network based approaches to recommendation emerged. However, because of the open nature of rating systems and social networks, the social recommender systems are susceptible to malicious attacks. In this paper, we present a certain novel attack, which inherits characteristics of the rating attack and the relation attack, and term it hybrid attack. Furtherly, we explore the impact of the hybrid attack on model-based social recommender systems in multiple aspects. The experimental results show that, the hybrid attack is more destructive than the rating attack in most cases. In addition, users and items with fewer ratings will be influenced more when attacked. Last but not the least, the findings suggest that spammers do not depend on the feedback links from normal users to become more powerful, the unilateral links can make the hybrid attack effective enough. Since unilateral links are much cheaper, the hybrid attack will be a great threat to model-based social recommender systems.
Magnus effects at high angles of attack and critical Reynolds numbers
NASA Technical Reports Server (NTRS)
Seginer, A.; Ringel, M.
1983-01-01
The Magnus force and moment experienced by a yawed, spinning cylinder were studied experimentally in low speed and subsonic flows at high angles of attack and critical Reynolds numbers. Flow-field visualization aided in describing a flow model that divides the Magnus phenomenon into a subcritical region, where reverse Magnus loads are experienced, and a supercritical region where these loads are not encountered. The roles of the spin rate, angle of attack, and crossflow Reynolds number in determining the boundaries of the subcritical region and the variations of the Magnus loads were studied.
Stall induced instability of a teetered rotor
NASA Astrophysics Data System (ADS)
Glasgow, J. C.; Corrigan, R. D.
Recent tests on the 38m Mod-0 horizontal experimental wind turbine yielded quantitative information on stall induced instability of a teetered rotor. Tests were conducted on rotor blades with NACA 230 series and NACA 643-618 airfoils at low rotor speeds to produce high angles of attack at relatively low wind speeds and power levels. The behavior of the rotor shows good agreement with predicted rotor response based on blade angle of attack calculations and airfoil section properties. The untwisted blades with the 64 series airfoil sections had a slower rate of onset of rotor instability when compared with the twisted 230 series blades, but high teeter angles and teeter stop impacts were experienced with both rotors as wind speeds increased to produce high angles of attack on the outboard portion of the blade. The relative importance of blade twist and airfoil section stall characteristics on the rate of onset of rotor unstability with increasing wind speed was not established however. Blade pitch was shown to be effective in eliminating rotor instability at the expense of some loss in rotor performance near rated wind speed.
Jasmonate-induced responses are costly but benefit plants under attack in native populations
Baldwin, Ian T.
1998-01-01
Herbivore attack is widely known to reduce food quality and to increase chemical defenses and other traits responsible for herbivore resistance. Inducible defenses are commonly thought to allow plants to forgo the costs of defense when not needed; however, neither their defensive function (increasing a plant’s fitness) nor their cost-savings function have been demonstrated in nature. The root-produced toxin nicotine increases after herbivore attack in the native, postfire annual Nicotiana attenuata and is internally activated by the wound hormone, jasmonic acid. I treated the roots of plants with the methyl ester of this hormone (MeJA) to elicit a response in one member of each of 745 matched pairs of plants growing in native populations with different probabilities of attack from herbivores, and measured the lifetime production of viable seed. In populations with intermediate rates of attack, induced plants were attacked less often by herbivores and survived to produce more seed than did their uninduced counterparts. Previous induction did not significantly increase the fitness of plants suffering high rates of attack. However, if plants had not been attacked, induced plants produced less seed than did their uninduced counterparts. Jasmonate-induced responses function as defenses but are costly, and inducibility allows this species to forgo these costs when the defenses are unnecessary. PMID:9653149
Effectiveness of the call in beach volleyball attacking play.
Künzell, Stefan; Schweikart, Florian; Köhn, Daniel; Schläppi-Lienhard, Olivia
2014-12-09
In beach volleyball the setter has the opportunity to give her or his hitter a "call". The call intends that the setter suggests to her or his partner where to place the attack in the opponent's court. The effectiveness of a call is still unknown. We investigated the women's and men's Swiss National Beach Volleyball Championships in 2011 and analyzed 2185 attacks. We found large differences between female and male players. While men called in only 38.4% of attacks, women used calls in 85.5% of attacks. If the male players followed a given call, 63% of the attacks were successful. The success rate of attacks without any call was 55.8% and 47.6% when the call was ignored. These differences were not significant (χ(2)(2) = 4.55, p = 0.103). In women's beach volleyball, the rate of successful attacks was 61.5% when a call was followed, 35% for attacks without a call, and 42.6% when a call was ignored. The differences were highly significant (χ(2)(2) = 23.42, p < 0.0005). Taking into account the findings of the present study, we suggested that the call was effective in women's beach volleyball, while its effect in men's game was unclear. Considering the quality of calls we indicate that there is a significant potential to increase the effectiveness of a call.
Miller, S; Watkins, L; Matharu, M
2017-02-01
Chronic cluster headache is a rare, highly disabling primary headache condition. When medically intractable, occipital nerve stimulation can offer effective treatment. Open-label series have provided data on small cohorts only. We analyzed 51 subjects to evaluate the long-term outcomes of highly intractable chronic cluster headache with occipital nerve stimulation. Patients with intractable chronic cluster headache were implanted with occipital nerve stimulators during the period 2007-2014. The primary endpoint was improvement in daily attack frequency. Secondary endpoints included attack severity, attack duration, quality-of-life measures, headache disability scores and adverse events. We studied 51 patients [35 males; mean age at implant 47.78 (range 31-70) years; mean follow-up 39.17 (range 2-81) months]. Nineteen patients had other chronic headache types in addition in chronic cluster headache. At final follow-up, there was a 46.1% improvement in attack frequency (P < 0001) across all patients, 49.5% (P < 0.001) in those with cluster headache alone and 40.3% (P = 0.036) in those with multiple phenotypes. There were no significant differences in response in those with or without multiple headache types. The overall response rate (defined as at least a 50% improvement in attack frequency) was 52.9%. Significant reductions were also seen in attack duration and severity. Improvements were noted in headache disability scores and quality-of-life measures. Triptan use of responders dropped by 62.56%, resulting in significant cost savings. Adverse event rates were highly favorable. Occipital nerve stimulation appears to be a safe and efficacious treatment for highly intractable chronic cluster headache even after a mean follow-up of over 3 years. © 2016 EAN.
Park, Hong-Kyun; Kim, Beom Joon; Han, Moon-Ku; Park, Jong-Moo; Kang, Kyusik; Lee, Soo Joo; Kim, Jae Guk; Cha, Jae-Kwan; Kim, Dae-Hyun; Nah, Hyun-Wook; Park, Tai Hwan; Park, Sang-Soon; Lee, Kyung Bok; Lee, Jun; Hong, Keun-Sik; Cho, Yong-Jin; Lee, Byung-Chul; Yu, Kyung-Ho; Oh, Mi-Sun; Kim, Joon-Tae; Choi, Kang-Ho; Kim, Dong-Eog; Ryu, Wi-Sun; Choi, Jay Chol; Johansson, Saga; Lee, Su Jin; Lee, Won Hee; Lee, Ji Sung; Lee, Juneyoung; Bae, Hee-Joon
2017-11-01
Patients with minor ischemic stroke or transient ischemic attack are at high risk of recurrent stroke and vascular events, which are potentially disabling or fatal. This study aimed to evaluate contemporary subsequent vascular event risk after minor ischemic stroke or transient ischemic attack in Korea. Patients with minor ischemic stroke or high-risk transient ischemic attack admitted within 7 days of symptom onset were identified from a Korean multicenter stroke registry database. We estimated 3-month and 1-year event rates of the primary outcome (composite of stroke recurrence, myocardial infarction, or all-cause death), stroke recurrence, a major vascular event (composite of stroke recurrence, myocardial infarction, or vascular death), and all-cause death and explored differences in clinical characteristics and event rates according to antithrombotic strategies at discharge. Of 9506 patients enrolled in this study, 93.8% underwent angiographic assessment and 72.7% underwent cardiac evaluations; 25.1% had symptomatic stenosis or occlusion of intracranial arteries. At discharge, 95.2% of patients received antithrombotics (antiplatelet polytherapy, 37.1%; anticoagulation, 15.3%) and 86.2% received statins. The 3-month cumulative event rate was 5.9% for the primary outcome, 4.3% for stroke recurrence, 4.6% for a major vascular event, and 2.0% for all-cause death. Corresponding values at 1 year were 9.3%, 6.1%, 6.7%, and 4.1%, respectively. Patients receiving nonaspirin antithrombotic strategies or no antithrombotic agent had higher baseline risk profiles and at least 1.5× higher event rates for clinical event outcomes than those with aspirin monotherapy. Contemporary secondary stroke prevention strategies based on thorough diagnostic evaluation may contribute to the low subsequent vascular event rates observed in real-world clinical practice in Korea. © 2017 American Heart Association, Inc.
Forebody tangential blowing for control at high angles of attack
NASA Technical Reports Server (NTRS)
Kroo, I.; Rock, S.; Roberts, L.
1991-01-01
A feasibility study to determine if the use of tangential leading edge blowing over the forebody could produce effective and practical control of the F-18 HARV aircraft at high angles of attack was conducted. A simplified model of the F-18 configuration using a vortex-lattice model was developed to obtain a better understanding of basic aerodynamic coupling effects and the influence of forebody circulation on lifting surface behavior. The effect of tangential blowing was estimated using existing wind tunnel data on normal forebody blowing and analytical studies of tangential blowing over conical forebodies. Incorporation of forebody blowing into the flight control system was investigated by adding this additional yaw control and sideforce generating actuator into the existing F-18 HARV simulation model. A control law was synthesized using LQG design methods that would schedule blowing rates as a function of vehicle sideslip, angle of attack, and roll and yaw rates.
[Outbreak of whooping cough with a high attack rate in well-vaccinated children and adolescents].
Torres, Joan; Godoy, Pere; Artigues, Antoni; Codina, Gemma; Bach, Pilar; Mòdol, Irma; Duró, Maria Àngels; Trilla, Carme
2011-10-01
Whooping cough is a re-emerging disease. We describe the investigation of an outbreak of whooping cough and the measures of control adopted. The event was reconstructed through a longitudinal study of incidence. In addition to the notified cases, an active search from the list of those who attended summer camps was made through telephone calls. An epidemiological survey was applied to all cases; vaccination history was confirmed with computerised clinical history and the obtaining of samples for analytical confirmation was proposed. The description of the outbreak was made through the epidemic curve, the attack rates, the relative risk and the linear trend by ages and the vaccination coverage. Of the 30 cases that appeared, 22 (73.3%) were among the members of the summer camps. In these, the attack rate was 21.8%, 26.7% among the children and adolescents increasing linearly with the age. The large majority (86.4%) of this last group were correctly vaccinated, including the fifth dose at the age of 4-6 years. Through the meticulous study of the first cases and the telephone calls to those who attended the summer camp, 90% of the cases of the outbreak were detected. The active search of cases allowed an outbreak of whooping cough with a high attack rate to be studied in children and adolescents with a high vaccination coverage, and the application of control measures that contributed to stop the outbreak. Copyright © 2010 Elsevier España, S.L. All rights reserved.
B. J. Bentz; S. Kegley; K. Gibson; R. Their
2005-01-01
The effcacy of verbenone as a stand-level protectant against mountain pine beetle, Dendroctonus ponderosae Hopkins, attacks was tested in lodgepole and whitebark pine stands at five geographically separated sites, including three consecutive years at one site. Forty and 20 high-dose pouches, with a verbenone emission rate up to 50 mg/d per pouch, were spaced in a grid...
Trends in ethnic disparities in stroke incidence in Auckland, New Zealand, during 1981 to 2003.
Carter, Kristie; Anderson, Craig; Hacket, Maree; Feigin, Valery; Barber, P Alan; Broad, Joanna B; Bonita, Ruth
2006-01-01
Although geographical variations in stroke rates are well documented, limited data exist on temporal trends in ethnic-specific stroke incidence. We assessed trends in ethnic-specific stroke rates using standard diagnostic criteria and community-wide surveillance procedures in Auckland, New Zealand (NZ) in 1981 to 1982, 1991 to 1992, and 2002 to 2003. Indirect and direct methods were used to adjust first-ever (incident) and total (attack) rates for changes in the structure of the population and reported with 95% CIs. Ethnicity was self-defined and categorized as "NZ/European," "Maori," "Pacific peoples," and "Asian and other." Stroke attack (19%; 95% CI, 11% to 26%) and incidence rates (19%; 95% CI, 12% to 24%) declined significantly in NZ/Europeans from 1981 to 1982 to 2002 to 2003. These rates remained high or increased in other ethnic groups, particularly for Pacific peoples in whom stroke attack rates increased by 66% (95% CI; 11% to 225%) over the periods. Some favorable downward trends in vascular risk factors, such as cigarette smoking, were counterbalanced by increasing age, body mass index, and diabetes in certain ethnic groups. Divergent trends in ethnic-specific stroke incidence and attack rates, and of associated risk factors, have occurred in Auckland over recent decades. The findings provide mixed views as to the future burden of stroke in populations undergoing similar lifestyle and structural changes.
Influence of the Angle of Attack on the Aerothermodynamics of the Mars Science Laboratory
NASA Technical Reports Server (NTRS)
Dyakonov, Artem A.; Edquist, Karl T.; Schoenenberger, Mark
2006-01-01
An investigation of the effects of the incidence angle on the aerothermodynamic environments of the Mars Science Laboratory has been conducted. Flight conditions of peak heating, peak deceleration and chute deploy are selected and the effects of the angle of attack on the aerodynamics and aerothermodynamics are analyzed. The investigation found that static aerodynamics are well behaved within the considered range of incidence angles. Leeside laminar and turbulent computed heating rates decrease with incidence, despite the increase in the leeside running length. Stagnation point was found to stay on the conical flank at all angles of attack, and this is linked to the rapid flow expansion around the shoulder. Hypersonic lift to drag ratio is limited by the heating rates in the region of the windside shoulder. The effects of the high angle of incidence on the dynamic aero at low Mach remains to be determined. Influence of the angle of attack on the smooth-wall transition parameter indicates, that higher angle of attack flight may result in delayed turbulence onset, however, a coupled analysis, involving flight trajectory simulation is necessary.
Mountain pine beetle attack in ponderosa pine: Comparing methods for rating susceptibility
David C. Chojnacky; Barbara J. Bentz; Jesse A. Logan
2000-01-01
Two empirical methods for rating susceptibility of mountain pine beetle attack in ponderosa pine were evaluated. The methods were compared to stand data modeled to objectively rate each sampled stand for susceptibly to bark-beetle attack. Data on bark-beetle attacks, from a survey of 45 sites throughout the Colorado Plateau, were modeled using logistic regression to...
Claassen, Cynthia A; Carmody, Thomas; Stewart, Sunita M; Bossarte, Robert M; Larkin, Gregory L; Woodward, Wayne A; Trivedi, Madhukar H
2010-05-01
The terrorist attacks in the USA on 11 September 2001 affected suicide rates in two European countries, whereas overall US rates remained stable. The effect on attack site rates, however, has not been studied. To examine post-attack suicide rates in areas surrounding the three airline crash sites. Daily mortality rates were modelled using time series techniques. Where rate change was significant, both duration and geographic scope were analysed. Around the World Trade Center, post-attack 180-day rates dropped significantly (t = 2.4, P = 0.0046), whereas comparison condition rates remained stable. No change was observed for Pentagon or Flight 93 crash sites. The differential effect by site suggests that proximity may be less important that other event characteristics. Both temporal and geographic aspects of rate fluctuation after sentinel events appear measurable and further analyses may contribute valuable knowledge about how sociological forces affect these rates.
Polonsky, Jonathan; Ciglenecki, Iza; Bichet, Mathieu; Coldiron, Matthew; Thuambe Lwiyo, Enoch; Akonda, Innocent; Serafini, Micaela; Porten, Klaudia
2018-01-01
In 2013, a large measles epidemic occurred in the Aketi Health Zone of the Democratic Republic of Congo. We conducted a two-stage, retrospective cluster survey to estimate the attack rate, the case fatality rate, and the measles-specific mortality rate during the epidemic. 1424 households containing 7880 individuals were included. The estimated attack rate was 14.0%, (35.0% among children aged <5 years). The estimated case fatality rate was 4.2% (6.1% among children aged <5 years). Spatial analysis and linear regression showed that younger children, those who did not receive care, and those living farther away from Aketi Hospital early in the epidemic had a higher risk of measles related death. Vaccination coverage prior to the outbreak was low (76%), and a delayed reactive vaccination campaign contributed to the high attack rate. We provide evidences suggesting that a comprehensive case management approach reduced measles fatality during this epidemic in rural, inaccessible resource-poor setting. PMID:29538437
Gignoux, Etienne; Polonsky, Jonathan; Ciglenecki, Iza; Bichet, Mathieu; Coldiron, Matthew; Thuambe Lwiyo, Enoch; Akonda, Innocent; Serafini, Micaela; Porten, Klaudia
2018-01-01
In 2013, a large measles epidemic occurred in the Aketi Health Zone of the Democratic Republic of Congo. We conducted a two-stage, retrospective cluster survey to estimate the attack rate, the case fatality rate, and the measles-specific mortality rate during the epidemic. 1424 households containing 7880 individuals were included. The estimated attack rate was 14.0%, (35.0% among children aged <5 years). The estimated case fatality rate was 4.2% (6.1% among children aged <5 years). Spatial analysis and linear regression showed that younger children, those who did not receive care, and those living farther away from Aketi Hospital early in the epidemic had a higher risk of measles related death. Vaccination coverage prior to the outbreak was low (76%), and a delayed reactive vaccination campaign contributed to the high attack rate. We provide evidences suggesting that a comprehensive case management approach reduced measles fatality during this epidemic in rural, inaccessible resource-poor setting.
Meningococcal disease. Secondary attack rate and chemoprophylaxis in the United States, 1974.
1976-01-19
Three hundred twenty-six reported cases of meningococcal disease in the United States from November 1973 through March 1974 were investigated. Three household members became ill with meningococcal disease following onset of the initial case in their household. The secondary attack rate was approximately 3/1,000 household members. In 60% of the households, members were given an antimicrobial drug as chemoprophylaxis for meningococcal disease, but only 35% received minocycline hydrochloride or rifampin, the two drugs now available for the eradication of sulfonamide-resistant meningococci from the nasopharynx. Only 26% given chemoprophylaxis received the drug within 24 hours after the patient's hospital admission. Survey results indicate that the secondary attack rate of meningococcal disease may justify the use of chemoprophylaxis, but that frequently in the United States, the drugs given are likely to be ineffective, give too late, or administered to persons who are not at high risk to meningococcal disease.
F-18 HARV yaw rate expansion flight #125 with Inverted Recovery
NASA Technical Reports Server (NTRS)
1991-01-01
NASA's Dryden Flight Research Center, Edwards, CA, used an F-18 Hornet fighter aircraft as its High Angle-of-Attack (Alpha) Research Vehicle (HARV) in a three-phased flight research program lasting from April 1987 until September 1996. The aircraft completed 385 research flights and demonstrated stabilized flight at angles of attack between 65 and 70 degrees using thrust vectoring vanes, a research flight control system, and (eventually) forebody strakes (hinged structures on the forward side of the fuselage to provide control by interacting with vortices, generated at high angles of attack, to create side forces). This combination of technologies provided carefree handling of a fighter aircraft in a part of the flight regime that was otherwise very dangerous. Flight research with the HARV increased our understanding of flight at high angles of attack (angle of the wings with respect to the direction in which the aircraft was heading), enabling designers of U.S. fighter aircraft to design airplanes that will fly safely in portions of the flight envelope that pilots previously had to avoid. Flight 125 with the HARV involved yaw rate expansion up to 50 degrees per second (moving the nose to the left or right at that rate). NASA research pilot Ed Schneider was the pilot, and the purpose of the flight was to look at the spin characteristics of the HARV. The sequence in this particular video clip includes the first and second maneuvers in the flight. On the first maneuver, the pilot attempted to achieve a yaw rate of 40 degrees per second and actually went to 47 degrees. The spin was oscillatory in pitch (up and down) and roll (rotating around the longitudinal axis). Recovery was normal. On the second maneuver of the flight in which Schneider tried to achieve a yaw rate of 40 degrees per second, the aircraft overshot to 54 degrees per second during an oscillatory spin. In the course of the recovery, the aircraft rolled after a large sideslip buildup. Moderate aft stick application to attain a positive angle of attack resulted in an easy recovery.
Behavioral Strategies of Phorid Parasitoids and Responses of Their Hosts, the Leaf-Cutting Ants
Elizalde, Luciana; Folgarait, Patricia Julia
2012-01-01
Host-searching and oviposition behaviors of parasitoids, and defensive responses of the hosts, are fundamental in shaping the ecology of host-parasitoid interactions. In order to uncover key behavioral features for the little known interactions between phorid parasitoids (Diptera: Phoridae) and their leaf-cutting ant hosts (Formicidae: Attini), host-related behavioral strategies (i.e., host searching and oviposition) for 13 phorid species, and host defensive responses (i.e., hitchhikers and particular body postures) for 11 ant species, were studied. Data was collected at 14 localities, one of them characterized by its high species richness for this host-parasitoid system. Phorid species showed both great variation and specificity in attacking behaviors. Some chose their hosts using either an ambush or an actively searching strategy, while some species attacked ants on different body parts, and specialized on ants performing different tasks, such as when ants were foraging, removing wastes to refuse piles, or repairing the nest. Combining all the behaviors recorded, most phorid species differed in performance in at least one, making it possible to recognize species in the field through their behavior. Phorid species that attacked hosts with greater activity levels showed overall higher attack rates, although there was no significant correlation between attack rates by most phorid species and ant activity outside the nest while parasitoids were attacking. The presence of phorids was a significant determinant for the presence of defensive behaviors by the ants. Although ant species varied in the incidence levels of these defensive behaviors, most ant species reacted against different phorids by utilizing similar behaviors, in contrast to what parasitoids do. General features of the observed phorid-ant interactions were parasitoid specialization and corresponding high interspecific variation in their behaviors, while their hosts showed generalized responses to attacks with high intraspecific variation. Behavioral patterns as well as specific features of these ant-parasitoid interactions are described, and their ecological importance discussed. PMID:23448343
Michael I. Haverty; Patrick J. Shea; John M. Wenz
1996-01-01
The effectiveness of registered application rates of the insecticide metasystox-R applied with Mauget tree injectors (INJECT-A-CIDE) was assessed in two strategies: (1) treatment of trees before western pine beetle attack (preventive treatment), and (2) treatment of trees after attack by western pine beetle (remedial treatment) for protection of individual, high-value...
NASA Astrophysics Data System (ADS)
Ko, Heasin; Lim, Kyongchun; Oh, Junsang; Rhee, June-Koo Kevin
2016-10-01
Quantum channel loopholes due to imperfect implementations of practical devices expose quantum key distribution (QKD) systems to potential eavesdropping attacks. Even though QKD systems are implemented with optical devices that are highly selective on spectral characteristics, information theory-based analysis about a pertinent attack strategy built with a reasonable framework exploiting it has never been clarified. This paper proposes a new type of trojan horse attack called hidden pulse attack that can be applied in a plug-and-play QKD system, using general and optimal attack strategies that can extract quantum information from phase-disturbed quantum states of eavesdropper's hidden pulses. It exploits spectral characteristics of a photodiode used in a plug-and-play QKD system in order to probe modulation states of photon qubits. We analyze the security performance of the decoy-state BB84 QKD system under the optimal hidden pulse attack model that shows enormous performance degradation in terms of both secret key rate and transmission distance.
Correlates of nest-defense behavior of common terns
Erwin, R.M.
1988-01-01
Nest-defense behavior was studied at seven Common Tern (Sterna hirundo) colonies in southern coastal New Jersey during June and July 1981. Data were collected weekly on numbers of adults, nests, eggs, and young in relation to the frequency and intensity of dive attacks on a human intruder by nesting terns. I explored the relationships between attack behavior and colony size/density, seasonality, and brood survival. The results provide little support for social facilitation since neither colony size (range 30-250 nests) nor density was related to mean attack frequency; however, in larger colonies, fewer birds participated in dive attacks. Although the intensity of attacks was strongly seasonal, patterns were very different among colonies and peak attack rates did not always coincide with peak hatching periods. Defense levels declined late in the season in most colonies regardless of whether brood survival was high or low. Colonies with individuals that attacked early in the season had higher overall nesting success than in colonies where individuals showed little early season aggression.
Pandemic influenza-implications for critical care resources in Australia and New Zealand.
Anderson, Therese A; Hart, Graeme K; Kainer, Marion A
2003-09-01
To quantify resource requirements (additional beds and ventilator capacity), for critical care services in the event of pandemic influenza. Cross-sectional survey about existing and potential critical care resources. Participants comprised 156 of the 176 Australasian (Australia and New Zealand) critical care units on the database of the Australian and New Zealand Intensive Care Society (ANZICS) Research Centre for Critical Care Resources. The Meltzer, Cox and Fukuda model was adapted to map a range of influenza attack rate estimates for hospitalisation and episodes likely to require intensive care and to predict critical care admission rates and bed day requirements. Estimations of ventilation rates were based on those for community-acquired pneumonia. The estimated extra number of persons requiring hospitalisation ranged from 8,455 (10% attack rate) to 150,087 (45% attack rate). The estimated number of additional admissions to critical care units ranged from 423 (5% admission rate, 10% attack rate) to 37,522 (25% admission rate, 45% attack rate). The potential number of required intensive care bed days ranged from 846 bed days (2 day length of stay, 10% attack rate) to 375,220 bed days (10 day length of stay, 45% attack rate). The number of persons likely to require mechanical ventilation ranged from 106 (25% of projected critical care admissions, 10% attack rate) to 28,142 (75% of projected critical care admissions, 45% attack rate). An additional 1,195 emergency ventilator beds were identified in public sector and 248 in private sector hospitals. Cancellation of elective surgery could release a potential 76,402 intensive care bed days (per annum), but in the event of pandemic influenza, 31,150 bed days could be required over an 8- to 12-week period. Australasian critical care services would be overwhelmed in the event of pandemic influenza. More work is required in relation to modelling, contingency plans, and resource allocation.
DOE Office of Scientific and Technical Information (OSTI.GOV)
John Kilgo
2005-04-20
The effects of harvest-created canopy gaps in bottomland hardwood forests on arthropod abundance and, hence, the foraging ecology of birds are poorly understood. I predicted that arthropod abundance would be high near edges of group-selection harvest gaps and lower in the surrounding forest, and that male Hooded Warblers (Wilsonia citrina) foraging near gaps would find more prey per unit time than those foraging in the surrounding forest. In fact, arthropod abundance was greater >100 m from a gap edge than at 0-30 m or 30-100 m from an edge, due to their abundance on switchcane (Arundinaria gigantea); arthropods did notmore » differ in abundance among distances from gaps on oaks (Quercus spp.) or red maple (Acer rubrum). Similarly, Hooded Warbler foraging attack rates were not higher near gap edges: when foraging for fledglings, attack rate did not differ among distances from gaps, but when foraging for themselves, attack rates actually were lower 0-30 m from gap edges than 30-100 m or >100 m from a gap edge. Foraging attack rate was positively associated with arthropod abundance. Hooded Warblers apparently encountered fewer prey and presumably foraged less efficiently where arthropods were least abundant, i.e., near gaps. That attack rates among birds foraging for fledglings were not affected by distance from gap (and hence arthropod abundance) suggests that prey availability may not be limiting at any location across the forest, despite the depressing effects of gaps on arthropod abundance.« less
A Trustworthy Key Generation Prototype Based on DDR3 PUF for Wireless Sensor Networks
Liu, Wenchao; Zhang, Zhenhua; Li, Miaoxin; Liu, Zhenglin
2014-01-01
Secret key leakage in wireless sensor networks (WSNs) is a high security risk especially when sensor nodes are deployed in hostile environment and physically accessible to attackers. With nowadays semi/fully-invasive attack techniques attackers can directly derive the cryptographic key from non-volatile memory (NVM) storage. Physically Unclonable Function (PUF) is a promising technology to resist node capture attacks, and it also provides a low cost and tamper-resistant key provisioning solution. In this paper, we designed a PUF based on double-data-rate SDRAM Type 3 (DDR3) memory by exploring its memory decay characteristics. We also described a prototype of 128-bit key generation based on DDR3 PUF with integrated fuzzy extractor. Due to the wide adoption of DDR3 memory in WSN, our proposed DDR3 PUF technology with high security levels and no required hardware changes is suitable for a wide range of WSN applications. PMID:24984058
Airborne or Fomite Transmission for Norovirus? A Case Study Revisited.
Xiao, Shenglan; Tang, Julian W; Li, Yuguo
2017-12-14
Norovirus infection, a highly prevalent condition associated with a high rate of morbidity, comprises a significant health issue. Although norovirus transmission mainly occurs via the fecal-oral and vomit-oral routes, airborne transmission has been proposed in recent decades. This paper re-examines a previously described norovirus outbreak in a hotel restaurant wherein airborne transmission was originally inferred. Specifically, the original evidence that suggested airborne transmission was re-analyzed by exploring an alternative hypothesis: could this outbreak instead have occurred via fomite transmission? This re-analysis was based on whether fomite transmission could have yielded similar attack rate distribution patterns. Seven representative serving pathways used by waiters were considered, and the infection risk distributions of the alternative fomite transmission routes were predicted using a multi-agent model. These distributions were compared to the reported attack rate distribution in the original study using a least square methods approach. The results show that with some reasonable assumptions of human behavior patterns and parameter values, the attack rate distribution corresponded well with that of the infection risk via the fomite route. This finding offers an alternative interpretation of the transmission routes that underlay this particular norovirus outbreak and an important consideration in the development of infection control guidelines and the investigation of similar norovirus outbreaks in future.
A review on delayed toxic effects of sulfur mustard in Iranian veterans
2012-01-01
Iranian soldiers were attacked with chemical bombs, rockets and artillery shells 387 times during the 8-years war by Iraq (1980–1988). More than 1,000 tons of sulfur mustard gas was used in the battlefields by the Iraqis against Iranian people. A high rate of morbidities occurred as the result of these attacks. This study aimed to evaluate the delayed toxic effects of sulfur mustard gas on Iranian victims. During a systematic search, a total of 193 (109 more relevant to the main aim) articles on sulfur mustard gas were reviewed using known international and national databases. No special evaluation was conducted on the quality of the articles and their publication in accredited journals was considered sufficient. High rate of morbidities as the result of chemical attacks by sulfur mustard among Iranian people occurred. Iranian researchers found a numerous late complications among the victims which we be listed as wide range of respiratory, ocular, dermatological, psychological, hematological, immunological, gastrointestinal and endocrine complications, all influenced the quality of life of exposed victims. The mortality rate due to this agent was 3%. Although, mortality rate induced by sulfur mustard among Iranian people was low, variety and chronicity of toxic effects and complications of this chemical agent were dramatic. PMID:23351810
Preemptive Striking in Individual and Group Conflict.
Mifune, Nobuhiro; Hizen, Yoichi; Kamijo, Yoshio; Okano, Yoshitaka
2016-01-01
In this study, we conducted a laboratory experiment to assess preemptive striking by and towards individuals or groups. In the framework of a preemptive strike game, we set the following four conditions: one person faced another person, one person faced a three-person group, a three-person group faced an individual, and a three-person group faced another three-person group. Previous studies have revealed that greed is activated when participants belong to a group, while fear is activated when participants interact with a group, and further, that attacking behaviors in the preemptive strike game are driven by fear. These observations led to a hypothesis that high attack rates would be realized when participants interact with a group, regardless of whether the participants make decisions as individuals or a group. The results of our experiment, however, rejected this hypothesis. Among the four conditions, the attack rate was highest when a three-person group faced an individual. As possible reasons for our observation, we discuss the potential threat stemming from the imbalance in the effectiveness of attack between individuals and groups, and the (incorrect) belief by groups that single individuals would be more likely to attack out of fear.
Preemptive Striking in Individual and Group Conflict
Mifune, Nobuhiro; Hizen, Yoichi; Kamijo, Yoshio; Okano, Yoshitaka
2016-01-01
In this study, we conducted a laboratory experiment to assess preemptive striking by and towards individuals or groups. In the framework of a preemptive strike game, we set the following four conditions: one person faced another person, one person faced a three-person group, a three-person group faced an individual, and a three-person group faced another three-person group. Previous studies have revealed that greed is activated when participants belong to a group, while fear is activated when participants interact with a group, and further, that attacking behaviors in the preemptive strike game are driven by fear. These observations led to a hypothesis that high attack rates would be realized when participants interact with a group, regardless of whether the participants make decisions as individuals or a group. The results of our experiment, however, rejected this hypothesis. Among the four conditions, the attack rate was highest when a three-person group faced an individual. As possible reasons for our observation, we discuss the potential threat stemming from the imbalance in the effectiveness of attack between individuals and groups, and the (incorrect) belief by groups that single individuals would be more likely to attack out of fear. PMID:27148871
Johansen, J L; Jones, G P
2013-09-01
Sedimentation is a substantial threat to aquatic ecosystems and a primary cause of habitat degradation on near-shore coral reefs. Although numerous studies have demonstrated major impacts of sedimentation and turbidity on corals, virtually nothing is known of the sensitivity of reef fishes. Planktivorous fishes are an important trophic group that funnels pelagic energy sources into reef ecosystems. These fishes are visual predators whose foraging is likely to be impaired by turbidity, but the threshold for such effects and their magnitude are unknown. This study examined the effect of sediment-induced turbidity on foraging in four species of planktivorous damselfishes (Pomacentridae) of the Great Barrier Reef, including inshore and offshore species that potentially differ in tolerance for turbidity. An experimental flow tunnel was used to quantify their ability to catch mobile and immobile planktonic prey under different levels of turbidity and velocity in the range encountered on natural and disturbed reefs. Turbidity of just 4 NTU (nephelometric turbidity units) reduced average attack success by up to 56%, with higher effect sizes for species with offshore distributions. Only the inshore species (Neopomacentrus bankieri), which frequently encounters this turbidity on coastal reefs, could maintain high prey capture success. At elevated turbidity similar to that found on disturbed reefs (8 NTU), attack success was reduced in all species examined by up to 69%. These reductions in attack success led to a 21-24% decrease in foraging rates for all mid to outer-shelf species, in spite of increasing attack rates at high turbidity. Although effects of turbidity varied among species, it always depended heavily on prey mobility and ambient velocity. Attack success was up to 14 times lower on mobile prey, leaving species relatively incapable of foraging on anything but immobile prey at high turbidity. Effects of turbidity were particularly prominent at higher velocities, as attack success was overall 20-fold lower and foraging rates 3.3-fold lower at flow velocities > 30 cm/s relative to < or = 10 cm/s. Given that many planktivorous reef fishes predominantly occupy exposed, high-flow habitats, these results provide a reasonable explanation for the lack of planktivores on inshore coral reefs and warn that the performance of visual predators could be impaired at turbidity levels of only 4 NTU.
Trajectory Control for Vehicles Entering the Earth's Atmosphere at Small Flight Path Angles
NASA Technical Reports Server (NTRS)
Eggleston, John M.
1959-01-01
Methods of controlling the trajectories of high-drag-low-lift vehicles entering the earth's atmosphere at angles of attack near 90 deg and at initial entry angles up to 3 deg are studied. The trajectories are calculated for vehicles whose angle of attack can be held constant at some specified value or can be perfectly controlled as a function of some measured quantity along the trajectory. The results might be applied in the design of automatic control systems or in the design of instruments which will give the human pilot sufficient information to control his trajectory properly during an atmospheric entry. Trajectory data are compared on the basis of the deceleration, range, angle of attack, and, in some cases, the rate of descent. The aerodynamic heat-transfer rate and skin temperature of a vehicle with a simple heat-sink type of structure are calculated for trajectories made with several types of control functions. For the range of entry angles considered, it is found that the angle of attack can be controlled to restrict the deceleration down to an arbitrarily chosen level of 3g. All the control functions tried are successful in reducing the maximum deceleration to the desired level. However, in order to avoid a tendency for the deceleration to reach an initial peak decrease, and then reach a second peak, some anticipation is required in the control function so that the change in angle of attack will lead the change in deceleration. When the angle of attack is controlled in the aforementioned manner, the maximum rate of aerodynamic heat transfer to the skin is reduced, the maximum skin temperature of the vehicle is virtually unaffected, and the total heat absorbed is slightly increased. The increase in total heat can be minimized, however, by maintaining the maximum desired deceleration for as much of the trajectory as possible. From an initial angle of attack of 90 deg, the angle-of-attack requirements necessary to maintain constant values of deceleration (1g to 4g) and constant values of rate of descent (450 to 1,130 ft/sec) as long as it is aerodynamically practical are calculated and are found to be moderate in both magnitude and rate. Entry trajectories made with these types of control are presented and discussed.
Yoshikura, Hiroshi; Takeuchi, Fumihiko
2017-11-22
In norovirus and Campylobacter food poisonings, the frequencies of the number of patients per incident and that of the number of eaters per incident followed a lognormal distribution, with medians of 12-27 and 23-48 for norovirus and 5-8 and 9-21 for Campylobacter food poisonings, respectively. The lognormal frequency distribution of eaters could be simulated by assuming that people find a dish more appealing if that dish has already been found to be appealing to others. The numbers of patients and eaters per incident were not necessarily inter-correlated; the frequencies of the attack rates (number of patients/number of eaters) were distributed evenly from 0.01 to 1; that is, the attack rates of these food poisonings could not be represented by means and standard deviations. The frequency distributions of the attack rates were nevertheless not entirely disordered; plotting the attack rate against the number of patients in individual incidents produced fingerprint-like patterns that were repeatedly produced at the prefectural and national levels.
Liu, Ying; Song, Shaoxia; Wang, Wei; Geng, Xingyi; Liu, Wen; Han, Debiao; Liu, Ti; Wu, Julong; Li, Zhong; Wang, Xianjun; Bi, Zhenqiang
2015-12-01
To analyze the status of acute upper respiratory infection and influenza-like illness (ILI) among community residents in Jinan in 2015, and to make a understand of the patient's medical treatment behavior and influenza vaccination coverage status in 2014. Balloting method and convenient sampling method were used to launch a household survey. The residents who had been in Jinan for more than 3 months were selected, to investigate the residents' attack ratio of acute upper respiratory and influenza-like from Jan. 8 to Feb. 7, 2015. Totally, 1 300 persons from 410 families were involved in this survey which recovered 1 241 valid questionnaires with the efficiency of 95.5%. Based on the national age-urban demographic statistics in 2010, the attack rates of acute respiratory infections, influenza-like illness were estimated by the direct standardization method, and the influenza vaccination rates were also calculated in this study. χ(2)-test method was used to compare the different status of incidence and vaccination among residents with different features. The attack rate of acute upper respiratory infection and influenza-like illness in Jinan from January 8, 2015 to February 7, 2015 were 30.2% (375 cases), and 6.1% (76 cases), respectively, with a standardized rate of 29.1% and 5.4%. 5.3% (66 cases) of the residents have vaccinated with the influenza vaccine inoculation, with an adjusted rate of 3.8%. The attack rate difference of acute upper respiratory tract infections was statistically significant between each age group (χ(2)=17.121, P= 0.002). The 0-4 age group had a highest attack rate (45.4%) of acute respiratory infection, while the 15-24 age group got the lowest (26.5%). 38.9% (146 cases) of patients went for a treatment in hospital. Among them, 37.7% (55 cases) of them selected the county level hospitals for treatment, 37.7% (55 cases) selected the community level hospitals, and 24.6% (36 cases) selected the individual clinic. Significant differences of influenza-like illness attack rate between each age group were also found in this study (χ(2)=76.79, P<0.001). 0-4 age group had the highest attack rate (22.7%). 81.6% (62 cases) of the ILI sought treatment in the hospital, of which 53.2% (33 cases) selected county level hospital or above, and 33.9% (21 cases) selected community hospital, and 12.9% (8 cases) selected the individual clinic. The attack rate of acute upper respiratory infections among the residents of Jinan was high, whereas that of influenza-like illness was relatively low. 0-4 age group had a higher risk of ILI than other age groups. Most of the cases were likely to take the treatment in large hospitals. In general, the coverage rate of influenza vaccination was relatively low.
Forced Oscillation Wind Tunnel Testing for FASER Flight Research Aircraft
NASA Technical Reports Server (NTRS)
Hoe, Garrison; Owens, Donald B.; Denham, Casey
2012-01-01
As unmanned air vehicles (UAVs) continue to expand their flight envelopes into areas of high angular rate and high angle of attack, modeling the complex unsteady aerodynamics for simulation in these regimes has become more difficult using traditional methods. The goal of this experiment was to improve the current six degree-of-freedom aerodynamic model of a small UAV by replacing the analytically derived damping derivatives with experimentally derived values. The UAV is named the Free-flying Aircraft for Sub-scale Experimental Research, FASER, and was tested in the NASA Langley Research Center 12- Foot Low-Speed Tunnel. The forced oscillation wind tunnel test technique was used to measure damping in the roll and yaw axes. By imparting a variety of sinusoidal motions, the effects of non-dimensional angular rate and reduced frequency were examined over a large range of angle of attack and side-slip combinations. Tests were performed at angles of attack from -5 to 40 degrees, sideslip angles of -30 to 30 degrees, oscillation amplitudes from 5 to 30 degrees, and reduced frequencies from 0.010 to 0.133. Additionally, the effect of aileron or elevator deflection on the damping coefficients was examined. Comparisons are made of two different data reduction methods used to obtain the damping derivatives. The results show that the damping derivatives are mainly a function of angle of attack and have dependence on the non-dimensional rate and reduced frequency only in the stall/post-stall regime
Gaul, Charly; Magis, Delphine; Liebler, Eric; Straube, Andreas
2017-12-01
In the PREVention and Acute treatment of chronic cluster headache (PREVA) study, attack frequency reductions from baseline were significantly more pronounced with non-invasive vagus nerve stimulation plus standard of care (nVNS + SoC) than with SoC alone. Given the intensely painful and frequent nature of chronic cluster headache attacks, additional patient-centric outcomes, including the time to and level of therapeutic response, were evaluated in a post hoc analysis of the PREVA study. After a 2-week baseline phase, 97 patients with chronic cluster headache entered a 4-week randomised phase to receive nVNS + SoC (n = 48) or SoC alone (n = 49). All 92 patients who continued into a 4-week extension phase received nVNS + SoC. Compared with SoC alone, nVNS + SoC led to a significantly lower mean weekly attack frequency by week 2 of the randomised phase; the attack frequency remained significantly lower in the nVNS + SoC group through week 3 of the extension phase (P < 0.02). Attack frequencies in the nVNS + SoC group were significantly lower at all study time points than they were at baseline (P < 0.05). Response rates were significantly greater with nVNS + SoC than with SoC alone when response was defined as attack frequency reductions of ≥25%, ≥50%, and ≥75% from baseline (≥25% and ≥50%, P < 0.001; ≥75%, P = 0.009). The 100% response rate was 8% with nVNS + SoC and 0% with SoC alone. Prophylactic nVNS led to rapid, significant, and sustained reductions in chronic cluster headache attack frequency within 2 weeks after its addition to SoC and was associated with significantly higher ≥25%, ≥50%, and ≥75% response rates than SoC alone. The rapid decrease in weekly attack frequency justifies a 4-week trial period to identify responders to nVNS, with a high degree of confidence, among patients with chronic cluster headache.
Peterson, Laurel M; Helweg-Larsen, Marie; Volpp, Kevin G; Kimmel, Stephen E
2012-01-01
Risk biases such as comparative optimism (thinking one is better off than similar others) and risk inaccuracy (misestimating one's risk compared to one's calculated risk) for health outcomes are common. Little research has investigated racial or socioeconomic differences in these risk biases. Results from a survey of individuals with poorly controlled hypertension (N=813) indicated that participants showed (1) comparative optimism for heart attack risk by underestimating their heart attack risk compared to similar others, and (2) risk inaccuracy by overestimating their heart attack risk compared to their calculated heart attack risk. More highly educated participants were more comparatively optimistic because they rated their personal risk as lower; education was not related to risk inaccuracy. Neither race nor the federal poverty level was related to risk biases. Worry partially mediated the relationship between education and personal risk. Results are discussed as they relate to the existing literature on risk perception.
Baaten, Gijs G; Sonder, Gerard J B; Van Der Loeff, Maarten F Schim; Coutinho, Roel A; Van Den Hoek, Anneke
2010-01-01
To evaluate whether changes in attack rates of fecal-orally transmitted diseases among travelers are related to changes in pretravel vaccination practices or better hygienic standards at travel destination. National surveillance data on all laboratory-confirmed cases of travel-related hepatitis A, shigellosis, and typhoid fever diagnosed in the Netherlands from 1995 to 2006 were matched with the number of Dutch travelers to developing countries to calculate region-specific annual attack rates. Trends in attack rates of non-vaccine-preventable shigellosis were compared with those of vaccine-preventable hepatitis A and typhoid fever. Trends were also compared with three markers for hygienic standards of the local population at travel destinations, drawn from the United Nations Development Programme database: the human development index, the sanitation index, and the water source index. Attack rates among Dutch travelers to developing regions declined for hepatitis A, shigellosis, and typhoid fever. Region-specific trends in attack rates of shigellosis resembled trends of hepatitis A and typhoid fever. Declining attack rates of the three fecal-orally transmitted diseases correlated with improvements in socioeconomic, sanitary, and water supply conditions of the local population at travel destination. These findings suggest that improved hygienic standards at travel destination strongly contributed to the overall decline in attack rates of fecal-orally transmitted diseases among visiting travelers. © 2010 International Society of Travel Medicine.
Is stress a trigger factor for migraine?
Schoonman, G G; Evers, D J; Ballieux, B E; de Geus, E J; de Kloet, E R; Terwindt, G M; van Dijk, J G; Ferrari, M D
2007-06-01
Although mental stress is commonly considered to be an important trigger factor for migraine, experimental evidence for this belief is yet lacking. To study the temporal relationship between changes in stress-related parameters (both subjective and objective) and the onset of a migraine attack. This was a prospective, ambulatory study in 17 migraine patients. We assessed changes in perceived stress and objective biological measures for stress (saliva cortisol, heart rate average [HRA], and heart rate variability [low-frequency power and high-frequency power]) over 4 days prior to the onset of spontaneous migraine attacks. Analyses were repeated for subgroups of patients according to whether or not they felt their migraine to be triggered by stress. There were no significant temporal changes over time for the whole group in perceived stress (p=0.50), morning cortisol (p=0.73), evening cortisol (p=0.55), HRA (p=0.83), low-frequency power (p=0.99) and high-frequency power (p=0.97) prior to or during an attack. Post hoc analysis of the subgroup of nine stress-sensitive patients who felt that >2/3 of their migraine attacks were triggered by psychosocial stress, revealed an increase for perceived stress (p=0.04) but no changes in objective stress response measures. At baseline, this group also showed higher scores on the Penn State Worry Questionnaire (p=0.003) and the Cohen Perceived Stress Scale (p=0.001) compared to non-stress-sensitive patients. Although stress-sensitive patients, in contrast to non-stress-sensitive patients, may perceive more stress in the days before an impending migraine attack, we failed to detect any objective evidence for a biological stress response before or during migraine attacks.
Refractories for high alkali environments
DOE Office of Scientific and Technical Information (OSTI.GOV)
Rau, A.W.; Cloer, F.
1996-12-31
Information on refractories for high alkali environments is outlined. Information is presented on: product gallery; alkali attack; chemical reactions; basic layout of alkali cup test; criteria for rating alkali cup test samples; and basic layout of physical properties test.
A preliminary look at techniques used to obtain airdata from flight at high angles of attack
NASA Technical Reports Server (NTRS)
Moes, Timothy R.; Whitmore, Stephen A.
1990-01-01
Flight research at high angles of attack has posed new problems for airdata measurements. New sensors and techniques for measuring the standard airdata quantities of static pressure, dynamic pressure, angle of attack, and angle of sideslip were subsequently developed. The ongoing airdata research supporting NASA's F-18 high alpha research program is updated. Included are the techniques used and the preliminary results. The F-18 aircraft was flown with three research airdata systems: a standard airdata probe on the right wingtip, a self-aligning airdata probe on the left wingtip, and a flush airdata system on the nose cone. The primary research goal was to obtain steady-state calibrations for each airdata system up to an angle of attack of 50 deg. This goal was accomplished and preliminary accuracies of the three airdata systems were assessed and are presented. An effort to improve the fidelity of the airdata measurements during dynamic maneuvering is also discussed. This involved enhancement of the aerodynamic data with data obtained from linear accelerometers, rate gyros, and attitude gyros. Preliminary results of this technique are presented.
Effectiveness of previous mumps vaccination during a summer camp outbreak.
Schaffzin, Joshua K; Pollock, Lynn; Schulte, Cynthia; Henry, Kyle; Dayan, Gustavo; Blog, Debra; Smith, Perry
2007-10-01
Mumps is a vaccine-preventable disease that may cause outbreaks. In July 2005, an outbreak of mumps occurred during a children's summer camp in upstate New York. An investigation was initiated to describe the cases and evaluate vaccine effectiveness. A retrospective cohort study was conducted among 541 children from the United States and abroad who attended a 1- or 2-month overnight summer camp. Patients with mumps were interviewed; serologic analysis was conducted for 6 case patients. Vaccine effectiveness was calculated by retrospective review of immunization records for 507 attendees who were eligible for vaccination and had verified immunization history. Thirty-one camp attendees were identified as having mumps (attack rate: 5.7%); 5 (83%) of 6 patients tested had positivity for mumps immunoglobulin M. Of the 507 participants (including 29 patients) with available immunization history, 440 (including 16 [87%] patients) were 2-dose recipients of mumps vaccine (attack rate: 3.6%); 46 participants (including 4 [9%] patients) were 1-dose recipients (attack rate: 8.7%); and 21 (including 9 [4%] patients) were unvaccinated (attack rate: 42.9%). Vaccine effectiveness was 92% for 2 doses and 80% for 1 dose. Outbreaks of mumps in settings such as summer camps can occur despite high vaccination rates. Vaccine effectiveness for 2 mumps vaccinations was greater than vaccine effectiveness for 1 mumps vaccination. Therefore, recommendation of 2 mumps vaccinations for summer camp participants continues to be appropriate. Control of mumps disease relies on broad vaccination coupled with correct clinical diagnosis and strict control measures.
NASA Astrophysics Data System (ADS)
Zhang, Yichen; Li, Zhengyu; Zhao, Yijia; Yu, Song; Guo, Hong
2017-02-01
We analyze the security of the two-way continuous-variable quantum key distribution protocol in reverse reconciliation against general two-mode attacks, which represent all accessible attacks at fixed channel parameters. Rather than against one specific attack model, the expression of secret key rates of the two-way protocol are derived against all accessible attack models. It is found that there is an optimal two-mode attack to minimize the performance of the protocol in terms of both secret key rates and maximal transmission distances. We identify the optimal two-mode attack, give the specific attack model of the optimal two-mode attack and show the performance of the two-way protocol against the optimal two-mode attack. Even under the optimal two-mode attack, the performances of two-way protocol are still better than the corresponding one-way protocol, which shows the advantage of making double use of the quantum channel and the potential of long-distance secure communication using a two-way protocol.
Using the Domain Name System to Thwart Automated Client-Based Attacks
DOE Office of Scientific and Technical Information (OSTI.GOV)
Taylor, Curtis R; Shue, Craig A
2011-09-01
On the Internet, attackers can compromise systems owned by other people and then use these systems to launch attacks automatically. When attacks such as phishing or SQL injections are successful, they can have negative consequences including server downtime and the loss of sensitive information. Current methods to prevent such attacks are limited in that they are application-specific, or fail to block attackers. Phishing attempts can be stopped with email filters, but if the attacker manages to successfully bypass these filters, then the user must determine if the email is legitimate or not. Unfortunately, they often are unable to do so.more » Since attackers have a low success rate, they attempt to compensate for it in volume. In order to have this high throughput, attackers take shortcuts and break protocols. We use this knowledge to address these issues by implementing a system that can detect malicious activity and use it to block attacks. If the client fails to follow proper procedure, they can be classified as an attacker. Once an attacker has been discovered, they will be isolated and monitored. This can be accomplished using existing software in Ubuntu Linux applications, along with our custom wrapper application. After running the system and seeing its performance on three popular Web browsers Chromium, Firefox and Internet Explorer as well as two popular email clients, Thunderbird and Evolution, we found that not only is this system conceivable, it is effective and has low overhead.« less
Epidemiological and ecological determinants of Zika virus transmission in an urban setting.
Lourenço, José; Maia de Lima, Maricelia; Faria, Nuno Rodrigues; Walker, Andrew; Kraemer, Moritz Ug; Villabona-Arenas, Christian Julian; Lambert, Ben; Marques de Cerqueira, Erenilde; Pybus, Oliver G; Alcantara, Luiz Cj; Recker, Mario
2017-09-09
The Zika virus has emerged as a global public health concern. Its rapid geographic expansion is attributed to the success of Aedes mosquito vectors, but local epidemiological drivers are still poorly understood. Feira de Santana played a pivotal role in the Chikungunya epidemic in Brazil and was one of the first urban centres to report Zika infections. Using a climate-driven transmission model and notified Zika case data, we show that a low observation rate and high vectorial capacity translated into a significant attack rate during the 2015 outbreak, with a subsequent decline in 2016 and fade-out in 2017 due to herd-immunity. We find a potential Zika-related, low risk for microcephaly per pregnancy, but with significant public health impact given high attack rates. The balance between the loss of herd-immunity and viral re-importation will dictate future transmission potential of Zika in this urban setting.
Epidemiological and ecological determinants of Zika virus transmission in an urban setting
Maia de Lima, Maricelia; Faria, Nuno Rodrigues; Walker, Andrew; Kraemer, Moritz UG; Villabona-Arenas, Christian Julian; Lambert, Ben; Marques de Cerqueira, Erenilde; Pybus, Oliver G; Alcantara, Luiz CJ; Recker, Mario
2017-01-01
The Zika virus has emerged as a global public health concern. Its rapid geographic expansion is attributed to the success of Aedes mosquito vectors, but local epidemiological drivers are still poorly understood. Feira de Santana played a pivotal role in the Chikungunya epidemic in Brazil and was one of the first urban centres to report Zika infections. Using a climate-driven transmission model and notified Zika case data, we show that a low observation rate and high vectorial capacity translated into a significant attack rate during the 2015 outbreak, with a subsequent decline in 2016 and fade-out in 2017 due to herd-immunity. We find a potential Zika-related, low risk for microcephaly per pregnancy, but with significant public health impact given high attack rates. The balance between the loss of herd-immunity and viral re-importation will dictate future transmission potential of Zika in this urban setting. PMID:28887877
NASA Technical Reports Server (NTRS)
Kramer, Max
1932-01-01
Wind-tunnel tests are described, in which the angle of attack of a wing model was suddenly increased (producing the effect of a vertical gust) and the resulting forces were measured. It was found that the maximum lift coefficient increases in proportion to the rate of increase in the angle of attack. This fact is important for the determination of the gust stresses of airplanes with low wing loading. The results of the calculation of the corrective factor are given for a high-performance glider and a light sport plane of conventional type.
2008-01-01
current filovirus threats in the event of natural hemorrhagic fever outbreak or biological attack. Ebola virus (EBOV) and Marburg virus (MARV) are mem...lethal, causing severe hemorrhagic fever disease in humans and apes with high mortality rates (up to 90%). The recent description of massive gorilla...threats in the event of natural hemorrhagic fever outbreak or biological attack. 15. SUBJECT TERMS filovirus, Ebola, Marburg, adenovirus-based vaccine
A hierarchical detection method in external communication for self-driving vehicles based on TDMA.
Alheeti, Khattab M Ali; Al-Ani, Muzhir Shaban; McDonald-Maier, Klaus
2018-01-01
Security is considered a major challenge for self-driving and semi self-driving vehicles. These vehicles depend heavily on communications to predict and sense their external environment used in their motion. They use a type of ad hoc network termed Vehicular ad hoc networks (VANETs). Unfortunately, VANETs are potentially exposed to many attacks on network and application level. This paper, proposes a new intrusion detection system to protect the communication system of self-driving cars; utilising a combination of hierarchical models based on clusters and log parameters. This security system is designed to detect Sybil and Wormhole attacks in highway usage scenarios. It is based on clusters, utilising Time Division Multiple Access (TDMA) to overcome some of the obstacles of VANETs such as high density, high mobility and bandwidth limitations in exchanging messages. This makes the security system more efficient, accurate and capable of real time detection and quick in identification of malicious behaviour in VANETs. In this scheme, each vehicle log calculates and stores different parameter values after receiving the cooperative awareness messages from nearby vehicles. The vehicles exchange their log data and determine the difference between the parameters, which is utilised to detect Sybil attacks and Wormhole attacks. In order to realize efficient and effective intrusion detection system, we use the well-known network simulator (ns-2) to verify the performance of the security system. Simulation results indicate that the security system can achieve high detection rates and effectively detect anomalies with low rate of false alarms.
Attack rates of dengue fever in Swedish travellers.
Rocklöv, Joacim; Lohr, Wolfgang; Hjertqvist, Marika; Wilder-Smith, Annelies
2014-06-01
Dengue is endemic in many countries visited by Swedish travellers. We aimed to determine the attack rate of dengue in Swedish travellers and analyse the trends over time and the geographical variation. We obtained the following data from the Swedish Institute for Communicable Disease Control for the y 1995-2010: number of Swedish residents with confirmed dengue, the country and year of infection. We also obtained registers on the Swedish annual air traveller arrivals to dengue endemic areas from the United Nations World Tourist Organization for the time period. We estimated attack rates with 95% confidence intervals (CI). In total, 925 Swedish travellers with confirmed dengue were reported. We found an increasing trend over time for most destinations. The majority of the dengue cases were acquired in Thailand (492 out of 925 travellers; 53%), with an attack rate of 13.6 (95% CI 12.7, 14.4) per 100,000 travellers. However, the 2 highest attack rates per 100,000 travellers were found for Sri Lanka (45.3, 95% CI 34.3, 56.4) and Bangladesh (42.6, 95% CI 23.8, 61.5). Information on attack rates in travellers is more helpful in guiding travel medicine practitioners than reports of absolute numbers, as the latter reflect travel preferences rather than the true risk. Although the majority of dengue infections in Swedish travellers were acquired in Thailand, the attack rates for dengue in travellers to Sri Lanka and Bangladesh were much higher. These data aid in refining information on the risk of dengue in travellers.
Johnson, Eric L; Beal, James R
2013-03-01
Secondhand smoking (passive smoking) is associated with many negative health effects, primarily respiratory and cardiovascular diseases. Approximately, 46,000 deaths from cardiovascular disease are associated with secondhand smoke exposure annually in the United States, which is roughly 150 deaths in North Dakota. Studies show that passage of smoke-free laws at the community level can reduce the incidence of heart attack. We conducted a retrospective review of electronic medical records of patients admitted for heart attacks 4 months prior (April 15, 2010 through August 14, 2010) to implementation of the smoke-free ordinance and 4 months following (August 15, 2010 through December 14, 2010) implementation of the comprehensive smoke-free ordinance in Grand Forks, ND, United States. We found an association between the heart attack rate and implementation of the comprehensive smoke-free law. The heart attack rate prior to the ban was 0.5% (83/16,702) compared with 0.3% (63/18,513) after the ban (p = .023). Thus, the rate of heart attacks decreased 30.6% and number of heart attack admissions decreased 24.1%, from 83 to 63, after implementation of a comprehensive smoke-free law. We found an implementation of the comprehensive smoke-free law was associated with a decrease in the heart attack rate. The heart attack rate decreased 30.6%. Our finding was similar to previous community level smoke-free law implementation studies and notable for the change going from a partial smoke-free law to a comprehensive smoke-free law.
Estimating the annual number of strokes and the issue of imperfect data: an example from Australia.
Cadilhac, Dominique A; Vos, Theo; Thrift, Amanda G
2014-01-01
Estimates of strokes in Australia are typically obtained using 1996-1997 age-specific attack rates from the pilot North East Melbourne Stroke Incidence (NEMESIS) Study (eight postcode regions). Declining hospitalizations for stroke indicate the potential to overestimate cases. To illustrate how current methods may potentially overestimate the number of strokes in Australia. Hospital separations data (primary discharge ICD10 codes I60 to I64) and three stroke projection models were compared. Each model had age- and gender-specific attack rates from the NEMESIS study applied to the 2003 population. One model used the 2003 Burden of Disease approach where the ratio of the 1996-1997 NEMESIS study incidence to hospital separation rate in the same year was adjusted by the 2002/2003 hospital separation rate within the same geographic region using relevant ICD-primary diagnosis codes. Hospital separations data were inflated by 12·1% to account for nonhospitalized stroke, while the Burden of Disease model was inflated by 27·6% to account for recurrent stroke events in that year. The third model used 1997-1999 attack rates from the larger 22-postcode NEMESIS study region. In 2003, Australian hospitalizations for stroke (I60 to I64) were 33,022, and extrapolation to all stroke (hospitalized and nonhospitalized) was 37,568. Applying NEMESIS study attack rates to the 2003 Australian population, 50,731 strokes were projected. Fewer cases for 2003 were estimated with the Burden of Disease model (28,364) and 22-postcode NEMESIS study rates (41,332). Estimating the number of strokes in a country can be highly variable depending on the recency of data, the type of data available, and the methods used. © 2013 The Authors. International Journal of Stroke © 2013 World Stroke Organization.
[Mortality from heart attack in Belgrade population during the period 1990-2004].
Ratkov, Isidora; Sipetić, Sandra; Vlajinac, Hristina; Sekeres, Bojan
2008-01-01
In most countries, cardiovascular diseases are the leading disorders, with ischemic heart diseases being the leading cause of death. According to WHO data, every year about 17 million people die of cardiovascular diseases, which is 30% of all deaths. Ischemic heart diseases contribute from one-third to one-half of all deaths due to cardiovascular diseases. Three point eight million men and 3.4 million women in the world die every year from ischemic heart diseases, and in Europe about 2 million. The highest mortality rate from ischemic heart diseases occurs in India, China and Russia. The aim of this descriptive epidemiological study was to determine heart attack mortality in Belgrade population during the period 1990-2004. In the study, we conducted investigation of Belgrade population during the period 1990-2004. Mortality data were obtained from the city institution for statistics. The mortality rates were calculated based on the total Belgrade population obtained from the mean values for the last two register years (1991 and 2002). The mortality rates were standardized using the direct method of standardization according to the world (Segi) standard population. In the Belgrade population during the period 1990-2004, the participation of mortality rate due to heart attack among deaths from cardiovascular diseases was 17% in males and 10% in females. In Belgrade male population, mean standardized mortality rates (per 100,000 habitants) were 50.5 for heart attack, 8.3 for chronic ischemic heart diseases and 4.6 for angina pectoris, while in females the rates were 30.8, 6.7 and 4.2, respectively. Mortality from ischemic heart diseases and from heart attack was higher in males than in females. During the studied 15-year period, on average 755 males and 483 females died due to heart attack every year. Mean standardized mortality rates per 100,000 habitants were 50.0 in male and 31.1 in female population. Males died 1.6 times more frequently from heart attack than females. During the studied period, mean standardized mortality rates from heart attack, in the population aged over 30 increased with age both in male and female population. However, males tended to die from heart attack at an earlier age than females, with death rates for males approximately the same as those for women who were 10 years older. In Belgrade during the period from 1990-2004, we found that there was an increasing trend in mortality rate due to cardiovascular diseases, while the trend of mortality rate from heart attack was constant with insignificant oscillations.
Terrorist Attacks Escalate in Frequency and Fatalities Preceding Highly Lethal Attacks
Martens, Andy; Sainudiin, Raazesh; Sibley, Chris G.; Schimel, Jeff; Webber, David
2014-01-01
Highly lethal terrorist attacks, which we define as those killing 21 or more people, account for 50% of the total number of people killed in all terrorist attacks combined, yet comprise only 3.5% of terrorist attacks. Given the disproportionate influence of these incidents, uncovering systematic patterns in attacks that precede and anticipate these highly lethal attacks may be of value for understanding attacks that exact a heavy toll on life. Here we examined whether the activity of terrorist groups escalates–both in the number of people killed per attack and in the frequency of attacks–leading up to highly lethal attacks. Analyses of terrorist attacks drawn from a state-of-the-art international terrorism database (The Global Terrorism Database) showed evidence for both types of escalation leading up to highly lethal attacks, though complexities to the patterns emerged as well. These patterns of escalation do not emerge among terrorist groups that never commit a highly lethal attack. PMID:24755753
Micro air vehicle motion tracking and aerodynamic modeling
NASA Astrophysics Data System (ADS)
Uhlig, Daniel V.
Aerodynamic performance of small-scale fixed-wing flight is not well understood, and flight data are needed to gain a better understanding of the aerodynamics of micro air vehicles (MAVs) flying at Reynolds numbers between 10,000 and 30,000. Experimental studies have shown the aerodynamic effects of low Reynolds number flow on wings and airfoils, but the amount of work that has been conducted is not extensive and mostly limited to tests in wind and water tunnels. In addition to wind and water tunnel testing, flight characteristics of aircraft can be gathered through flight testing. The small size and low weight of MAVs prevent the use of conventional on-board instrumentation systems, but motion tracking systems that use off-board triangulation can capture flight trajectories (position and attitude) of MAVs with minimal onboard instrumentation. Because captured motion trajectories include minute noise that depends on the aircraft size, the trajectory results were verified in this work using repeatability tests. From the captured glide trajectories, the aerodynamic characteristics of five unpowered aircraft were determined. Test results for the five MAVs showed the forces and moments acting on the aircraft throughout the test flights. In addition, the airspeed, angle of attack, and sideslip angle were also determined from the trajectories. Results for low angles of attack (less than approximately 20 deg) showed the lift, drag, and moment coefficients during nominal gliding flight. For the lift curve, the results showed a linear curve until stall that was generally less than finite wing predictions. The drag curve was well described by a polar. The moment coefficients during the gliding flights were used to determine longitudinal and lateral stability derivatives. The neutral point, weather-vane stability and the dihedral effect showed some variation with different trim speeds (different angles of attack). In the gliding flights, the aerodynamic characteristics exhibited quasi-steady effects caused by small variations in the angle of attack. The quasi-steady effects, or small unsteady effects, caused variations in the aerodynamic characteristics (particularly incrementing the lift curve), and the magnitude of the influence depended on the angle-of-attack rate. In addition to nominal gliding flight, MAVs in general are capable of flying over a wide flight envelope including agile maneuvers such as perching, hovering, deep stall and maneuvering in confined spaces. From the captured motion trajectories, the aerodynamic characteristics during the numerous unsteady flights were gathered without the complexity required for unsteady wind tunnel tests. Experimental results for the MAVs show large flight envelopes that included high angles of attack (on the order of 90 deg) and high angular rates, and the aerodynamic coefficients had dynamic stall hysteresis loops and large values. From the large number of unsteady high angle-of-attack flights, an aerodynamic modeling method was developed and refined for unsteady MAV flight at high angles of attack. The method was based on a separation parameter that depended on the time history of the angle of attack and angle-of-attack rate. The separation parameter accounted for the time lag inherit in the longitudinal characteristics during dynamic maneuvers. The method was applied to three MAVs and showed general agreement with unsteady experimental results and with nominal gliding flight results. The flight tests with the MAVs indicate that modern motion tracking systems are capable of capturing the flight trajectories, and the captured trajectories can be used to determine the aerodynamic characteristics. From the captured trajectories, low Reynolds number MAV flight is explored in both nominal gliding flight and unsteady high angle-of-attack flight. Building on the experimental results, a modeling method for the longitudinal characteristics is developed that is applicable to the full flight envelope.
determined by a kinetic study of the reactions of m-chloro- and 3,4-dimethylbenzylamine with styrene oxide in ethanol at 3 temperatures. The results...and o-methyl-styrene oxide with benzylamine in ethanol showed that the beta-methyl group reduces the rate of attack at both positions very...considerably, while the alpha-methyl group reduces the rate of normal attack slightly and that of abnormal attack considerably, and the o-methyl group has surprisingly little effect of the rate of attack at either position. (Author)
Challenges and Opportunities for Extracting Cardiovascular Risk Biomarkers from Imaging Data
NASA Astrophysics Data System (ADS)
Kakadiaris, I. A.; Mendizabal-Ruiz, E. G.; Kurkure, U.; Naghavi, M.
Complications attributed to cardiovascular diseases (CDV) are the leading cause of death worldwide. In the United States, sudden heart attack remains the number one cause of death and accounts for the majority of the 280 billion burden of cardiovascular diseases. In spite of the advancements in cardiovascular imaging techniques, the rate of deaths due to unpredicted heart attack remains high. Thus, novel computational tools are of critical need, in order to mine quantitative parameters from the imaging data for early detection of persons with a high likelihood of developing a heart attack in the near future (vulnerable patients). In this paper, we present our progress in the research of computational methods for the extraction of cardiovascular risk biomarkers from cardiovascular imaging data. In particular, we focus on the methods developed for the analysis of intravascular ultrasound (IVUS) data.
Ferré Romeu, Pilar
2006-05-01
In this study, I investigated students' memories of the terrorist attacks of September 11, 2001, carried out by Al Qaeda terrorists against the World Trade Center in New York and the Pentagon in Washington. Participants completed on two occasions (2 weeks and 8 months after the events took place) a memory questionnaire that included an assessment of the phenomenal richness of their memories. The results showed that the participants remembered very well the circumstances in which they first heard about the terrorist attacks, that they were very confident about this information, and that these memories were characterized by a high phenomenal richness. Over time, there was a decrease in all of these variables, but people's ratings of phenomenology and confidence were still very high.
Hazin, Fábio H V; Afonso, André S; De Castilho, Pedro C; Ferreira, Luciana C; Rocha, Bruno C L M
2013-09-01
An abnormally high shark attack rate verified off Recife could be related to migratory behavior of tiger sharks. This situation started after the construction of the Suape port to the south of Recife. A previous study suggested that attacking sharks could be following northward currents and that they were being attracted shoreward by approaching vessels. In this scenario, such northward movement pattern could imply a higher probability of sharks accessing the littoral area of Recife after leaving Suape. Pop-up satellite archival tags were deployed on five tiger sharks caught off Recife to assess their movement patterns off northeastern Brazil. All tags transmitted from northward latitudes after 7-74 days of freedom. The shorter, soak distance between deployment and pop-up locations ranged between 33-209 km and implied minimum average speeds of 0.02-0.98 km.h-1. Both pop-up locations and depth data suggest that tiger shark movements were conducted mostly over the continental shelf. The smaller sharks moved to deeper waters within 24 hours after releasing, but they assumed a shallower (< 50 m) vertical distribution for most of the monitoring period. While presenting the first data on tiger shark movements in the South Atlantic, this study also adds new information for the reasoning of the high shark attack rate verified in this region.
Ventilatory control of heart rate during inhalation of 5% CO2 and types of panic attacks.
Ley, R
1991-09-01
Differences in the magnitude of increases in heart rate during prolonged inhalation of 5% CO2 range from a mean of 25 b/min for a group of eight panic-disorder patients who panicked (Woods, Charney, Goodman, & Heninger, 1988. Archives of General Psychiatry, 45, 43-52) to zero b/min for 16 patients, eight of whom panicked (Craske & Barlow, 1990. Journal of Abnormal Psychology, 99, 302-307). What accounts for this disparity? The present paper describes how heart rate can be increased by means of voluntary overbreathing during prolonged inhalation of 5% CO2 in air. This suggests that differences in the degree of overbreathing may explain differences in the magnitude of increases in heart rate during inhalation of 5% CO2. An explanation is also offered for the curious finding that some patients experience "panic attacks" with zero increase in heart rate. Evidence suggests that this is likely to happen in cognitively based panic attacks, in contrast to hyperventilatory attacks or anticipatory attacks.
Lerch, Andrew P.; Pfammatter, Jesse A.
2016-01-01
Fire injury can increase tree susceptibility to some bark beetles (Curculionidae, Scolytinae), but whether wildfires can trigger outbreaks of species such as mountain pine beetle (Dendroctonus ponderosae Hopkins) is not well understood. We monitored 1173 lodgepole (Pinus contorta var. latifolia Doug.) and 599 ponderosa (Pinus ponderosa Doug. ex Law) pines for three years post-wildfire in the Uinta Mountains of northeastern Utah in an area with locally endemic mountain pine beetle. We examined how the degree and type of fire injury influenced beetle attacks, brood production, and subsequent tree mortality, and related these to beetle population changes over time. Mountain pine beetle population levels were high the first two post-fire years in lodgepole pine, and then declined. In ponderosa pine, populations declined each year after initial post-fire sampling. Compared to trees with strip or failed attacks, mass attacks occurred on trees with greater fire injury, in both species. Overall, a higher degree of damage to crowns and boles was associated with higher attack rates in ponderosa pines, but additional injury was more likely to decrease attack rates in lodgepole pines. In lodgepole pine, attacks were initially concentrated on fire-injured trees, but during subsequent years beetles attacked substantial numbers of uninjured trees. In ponderosa pine, attacks were primarily on injured trees each year, although these stands were more heavily burned and had few uninjured trees. In total, 46% of all lodgepole and 56% of ponderosa pines underwent some degree of attack. Adult brood emergence within caged bole sections decreased with increasing bole char in lodgepole pine but increased in ponderosa pine, however these relationships did not scale to whole trees. Mountain pine beetle populations in both tree species four years post-fire were substantially lower than the year after fire, and wildfire did not result in population outbreaks. PMID:27783632
Lerch, Andrew P; Pfammatter, Jesse A; Bentz, Barbara J; Raffa, Kenneth F
2016-01-01
Fire injury can increase tree susceptibility to some bark beetles (Curculionidae, Scolytinae), but whether wildfires can trigger outbreaks of species such as mountain pine beetle (Dendroctonus ponderosae Hopkins) is not well understood. We monitored 1173 lodgepole (Pinus contorta var. latifolia Doug.) and 599 ponderosa (Pinus ponderosa Doug. ex Law) pines for three years post-wildfire in the Uinta Mountains of northeastern Utah in an area with locally endemic mountain pine beetle. We examined how the degree and type of fire injury influenced beetle attacks, brood production, and subsequent tree mortality, and related these to beetle population changes over time. Mountain pine beetle population levels were high the first two post-fire years in lodgepole pine, and then declined. In ponderosa pine, populations declined each year after initial post-fire sampling. Compared to trees with strip or failed attacks, mass attacks occurred on trees with greater fire injury, in both species. Overall, a higher degree of damage to crowns and boles was associated with higher attack rates in ponderosa pines, but additional injury was more likely to decrease attack rates in lodgepole pines. In lodgepole pine, attacks were initially concentrated on fire-injured trees, but during subsequent years beetles attacked substantial numbers of uninjured trees. In ponderosa pine, attacks were primarily on injured trees each year, although these stands were more heavily burned and had few uninjured trees. In total, 46% of all lodgepole and 56% of ponderosa pines underwent some degree of attack. Adult brood emergence within caged bole sections decreased with increasing bole char in lodgepole pine but increased in ponderosa pine, however these relationships did not scale to whole trees. Mountain pine beetle populations in both tree species four years post-fire were substantially lower than the year after fire, and wildfire did not result in population outbreaks.
Saleh, Mohammed A; Abdul Manaf, Azizah
2015-01-01
The growth of web technology has brought convenience to our life, since it has become the most important communication channel. However, now this merit is threatened by complicated network-based attacks, such as denial of service (DoS) and distributed denial of service (DDoS) attacks. Despite many researchers' efforts, no optimal solution that addresses all sorts of HTTP DoS/DDoS attacks is on offer. Therefore, this research aims to fix this gap by designing an alternative solution called a flexible, collaborative, multilayer, DDoS prevention framework (FCMDPF). The innovative design of the FCMDPF framework handles all aspects of HTTP-based DoS/DDoS attacks through the following three subsequent framework's schemes (layers). Firstly, an outer blocking (OB) scheme blocks attacking IP source if it is listed on the black list table. Secondly, the service traceback oriented architecture (STBOA) scheme is to validate whether the incoming request is launched by a human or by an automated tool. Then, it traces back the true attacking IP source. Thirdly, the flexible advanced entropy based (FAEB) scheme is to eliminate high rate DDoS (HR-DDoS) and flash crowd (FC) attacks. Compared to the previous researches, our framework's design provides an efficient protection for web applications against all sorts of DoS/DDoS attacks.
Saleh, Mohammed A.; Abdul Manaf, Azizah
2015-01-01
The growth of web technology has brought convenience to our life, since it has become the most important communication channel. However, now this merit is threatened by complicated network-based attacks, such as denial of service (DoS) and distributed denial of service (DDoS) attacks. Despite many researchers' efforts, no optimal solution that addresses all sorts of HTTP DoS/DDoS attacks is on offer. Therefore, this research aims to fix this gap by designing an alternative solution called a flexible, collaborative, multilayer, DDoS prevention framework (FCMDPF). The innovative design of the FCMDPF framework handles all aspects of HTTP-based DoS/DDoS attacks through the following three subsequent framework's schemes (layers). Firstly, an outer blocking (OB) scheme blocks attacking IP source if it is listed on the black list table. Secondly, the service traceback oriented architecture (STBOA) scheme is to validate whether the incoming request is launched by a human or by an automated tool. Then, it traces back the true attacking IP source. Thirdly, the flexible advanced entropy based (FAEB) scheme is to eliminate high rate DDoS (HR-DDoS) and flash crowd (FC) attacks. Compared to the previous researches, our framework's design provides an efficient protection for web applications against all sorts of DoS/DDoS attacks. PMID:26065015
Practical security and privacy attacks against biometric hashing using sparse recovery
NASA Astrophysics Data System (ADS)
Topcu, Berkay; Karabat, Cagatay; Azadmanesh, Matin; Erdogan, Hakan
2016-12-01
Biometric hashing is a cancelable biometric verification method that has received research interest recently. This method can be considered as a two-factor authentication method which combines a personal password (or secret key) with a biometric to obtain a secure binary template which is used for authentication. We present novel practical security and privacy attacks against biometric hashing when the attacker is assumed to know the user's password in order to quantify the additional protection due to biometrics when the password is compromised. We present four methods that can reconstruct a biometric feature and/or the image from a hash and one method which can find the closest biometric data (i.e., face image) from a database. Two of the reconstruction methods are based on 1-bit compressed sensing signal reconstruction for which the data acquisition scenario is very similar to biometric hashing. Previous literature introduced simple attack methods, but we show that we can achieve higher level of security threats using compressed sensing recovery techniques. In addition, we present privacy attacks which reconstruct a biometric image which resembles the original image. We quantify the performance of the attacks using detection error tradeoff curves and equal error rates under advanced attack scenarios. We show that conventional biometric hashing methods suffer from high security and privacy leaks under practical attacks, and we believe more advanced hash generation methods are necessary to avoid these attacks.
The incidence of plastic ingestion by fishes: from the prey's perspective.
Carson, Henry S
2013-09-15
One of the primary threats to ocean ecosystems from plastic pollution is ingestion by marine organisms. Well-documented in seabirds, turtles, and marine mammals, ingestion by fish and sharks has received less attention until recently. We suggest that fishes of a variety of sizes attack drifting plastic with high frequency, as evidenced by the apparent bite marks commonly left behind. We examined 5518 plastic items from random plots on Kamilo Point, Hawai'i Island, and found 15.8% to have obvious signs of attack. Extrapolated to the entire amount of debris removed from the 15 km area, over 1.3 tons of plastic is attacked each year. Items with a bottle shape, or those blue or yellow in color, were attacked with a higher frequency. The triangular edges or punctures left by teeth ranged from 1 to 20 mm in width suggesting a variety of species attack plastic items. More research is needed to document the specific fishes and rates of plastic ingestion. Copyright © 2013 Elsevier Ltd. All rights reserved.
[Allergology and clinical immunology].
Coattrenec, Yann; Harr, Thomas; Chizzolini, Carlo; Jandus, Peter
2018-01-10
Hereditary angioedema (HA) is a disabling and potentially fatal condition. The management of HA includes treatment of acute attacks, short-term prophylaxis to prevent an attack, and long-term prophylaxis to minimize the frequency and severity of recurrent attacks. In this article, we will present new therapeutic alternatives for long term prophylaxis. Glucocorticoids (GC) usage leads to a number of severe side-effects. In giant cell arteritis, the use of tocilizumab in conjunction with low doses of GC reduces the number of relapses. In ANCA-associated vasculitis the use of an anti-C5R (avacopan) alone or in conjunction with low doses of GC results in similar remission rates to those induced by high dose GC.
NASA Astrophysics Data System (ADS)
Azevedo, Hátylas; Moreira-Filho, Carlos Alberto
2015-11-01
Biological networks display high robustness against random failures but are vulnerable to targeted attacks on central nodes. Thus, network topology analysis represents a powerful tool for investigating network susceptibility against targeted node removal. Here, we built protein interaction networks associated with chemoresistance to temozolomide, an alkylating agent used in glioma therapy, and analyzed their modular structure and robustness against intentional attack. These networks showed functional modules related to DNA repair, immunity, apoptosis, cell stress, proliferation and migration. Subsequently, network vulnerability was assessed by means of centrality-based attacks based on the removal of node fractions in descending orders of degree, betweenness, or the product of degree and betweenness. This analysis revealed that removing nodes with high degree and high betweenness was more effective in altering networks’ robustness parameters, suggesting that their corresponding proteins may be particularly relevant to target temozolomide resistance. In silico data was used for validation and confirmed that central nodes are more relevant for altering proliferation rates in temozolomide-resistant glioma cell lines and for predicting survival in glioma patients. Altogether, these results demonstrate how the analysis of network vulnerability to topological attack facilitates target prioritization for overcoming cancer chemoresistance.
... breathing rate nausea, vomiting constipation physical agitation poor decision making abandoning responsibilities slurred speech sleeping more or less than normal mood swings euphoria (feeling high) irritability depression lowered motivation anxiety attacks. Symptoms of opioid overdose An overdose ...
NASA Technical Reports Server (NTRS)
Whitmore, Stephen A.; Moes, Timothy R.; Larson, Terry J.
1990-01-01
A nonintrusive high angle-of-attack flush airdata sensing (HI-FADS) system was installed and flight-tested on the F-18 high alpha research flight vehicle. The system is a matrix of 25 pressure orifices in concentric circles on the nose of the vehicle. The orifices determine angles of attack and sideslip, Mach number, and pressure altitude. Pressure was transmitted from the orifices to an electronically scanned pressure module by lines of pneumatic tubing. The HI-FADS system was calibrated and demonstrated using dutch roll flight maneuvers covering large Mach, angle-of-attack, and sideslip ranges. Reference airdata for system calibration were generated by a minimum variance estimation technique blending measurements from two wingtip airdata booms with inertial velocities, aircraft angular rates and attitudes, precision radar tracking, and meteorological analyses. The pressure orifice calibration was based on identifying empirical adjustments to modified Newtonian flow on a hemisphere. Calibration results are presented. Flight test results used all 25 orifices or used a subset of 9 orifices. Under moderate maneuvering conditions, the HI-FADS system gave excellent results over the entire subsonic Mach number range up to 55 deg angle of attack. The internal pneumatic frequency response of the system is accurate to beyond 10 Hz. Aerodynamic lags in the aircraft flow field caused some performance degradation during heavy maneuvering.
Spatio-temporal synchrony of influenza in cities across Israel: the "Israel is one city" hypothesis.
Barnea, Oren; Huppert, Amit; Katriel, Guy; Stone, Lewi
2014-01-01
We analysed an 11-year dataset (1998-2009) of Influenza-Like Illness (ILI) that was based on surveillance of ∽23% of Israel's population. We examined whether the level of synchrony of ILI epidemics in Israel's 12 largest cities is high enough to view Israel as a single epidemiological unit. Two methods were developed to assess the synchrony: (1) City-specific attack rates were fitted to a simple model in order to estimate the temporal differences in attack rates and spatial differences in reporting rates of ILI. The model showed good fit to the data (R2 = 0.76) and revealed considerable differences in reporting rates of ILI in different cities (up to a factor of 2.2). (2) A statistical test was developed to examine the null hypothesis (H0) that ILI incidence curves in two cities are essentially identical, and was tested using ILI data. Upon examining all possible pairs of incidence curves, 77.4% of pairs were found not to be different (H0 was not rejected). It was concluded that all cities generally have the same attack rate and follow the same epidemic curve each season, although the attack rate changes from season to season, providing strong support for the "Israel is one city" hypothesis. The cities which were the most out of synchronization were Bnei Brak, Beersheba and Haifa, the latter two being geographically remote from all other cities in the dataset and the former geographically very close to several other cities but socially separate due to being populated almost exclusively by ultra-orthodox Jews. Further evidence of assortative mixing of the ultra-orthodox population can be found in the 2001-2002 season, when ultra-orthodox cities and neighborhoods showed distinctly different incidence curves compared to the general population.
Understanding estimated worker absenteeism rates during an influenza pandemic.
Thanner, Meridith H; Links, Jonathan M; Meltzer, Martin I; Scheulen, James J; Kelen, Gabor D
2011-01-01
Published employee absenteeism estimates during an influenza pandemic range from 10 to 40 percent. The purpose of this study was to estimate daily employee absenteeism through the duration of an influenza pandemic and to determine the relative impact of key variables used to derive the estimates. Using the Centers for Disease Control and Prevention's FluWorkLoss program, the authors estimated the number of absent employees on any given day over the course of a simulated 8-week pandemic wave by using varying attack rates. Employee data from a university with a large academic health system were used. Sensitivity of the program outputs to variation in predictor (inputs) values was assessed. Finally, the authors examined and documented the algorithmic sequence of the program. Using a 35 percent attack rate, a total of 47,270 workdays (or 3.4 percent of all available workdays) would be lost over the course of an 8-week pandemic among a population of 35,026 employees. The highest (peak) daily absenteeism estimate was 5.8 percent (minimum 4.8 percent; maximum 7.4 percent). Sensitivity analysis revealed that varying days missed for nonhospitalized illness had the greatest potential effect on peak absence rate (3.1 to 17.2 percent). Peak absence with 15 and 25 percent attack rates were 2.5 percent and 4.2 percent, respectively. The impact of an influenza pandemic on employee availability may be less than originally thought, even with a high attack rate. These data are generalizable and are not specific to institutions of higher education or medical centers. Thus, these findings provide realistic and useful estimates for influenza pandemic planning for most organizations.
Pendlebury, Sarah T; Chen, Ping-Jen; Bull, Linda; Silver, Louise; Mehta, Ziyah; Rothwell, Peter M
2015-03-01
Many previous studies on dementia in stroke have restrictive inclusion criteria, which may result in underestimation of dementia rates. We undertook a large prospective population-based study of all transient ischemic attack and stroke to determine the impact of study entry criteria on measured rates of pre- and postevent dementia. All patients with acute transient ischemic attack or stroke from a defined population of 92 728 are referred from primary care or at hospital admission to the Oxford Vascular Study (2002-2007) and have baseline clinical and cognitive assessment and follow-up. We examined the impact of early death, other nonavailability, and commonly used selection criteria, on measured rates of dementia. Among 1236 patients (mean age/SD 75.2/12.1 years, 582 men, 403 transient ischemic attack), 139 died or were otherwise unavailable for baseline assessment, 319 had prior dependency, 425 had comorbidity, 512 were aged ≥80 years, 85 were dysphasic, and 502 were hospitalized. Pre-event dementia was 3-fold higher in patients dying preascertainment (10/47, 21%) and twice as high in other nonassessed (14/92, 15%) versus assessed patients (69/1097, 6%; P=0.0006 and P=0.002) and was several-fold higher in those with prior functional impairment (24% versus 3%; P<0.0001), age >80 years (13% versus 3%; P<0.0001), dysphasia (11% versus 7%; P<0.0001), and comorbidity (10% versus 6%; P=0.04). Findings for postevent dementia were similar: prior functional impairment (40% versus 13%; P<0.0001), age >80 years (28% versus 10%; P<0.0001), dysphasia (39% versus 15%; P<0.0001), and comorbidity (20% versus 15%; P=0.04). Exclusion of patients unavailable for assessment, and other widely used selection criteria, results in underestimation of the measured rate of dementia associated with transient ischemic attack and stroke. © 2015 American Heart Association, Inc.
Asnaani, Anu; Gutner, Cassidy A; Hinton, Devon E; Hofmann, Stefan G
2009-01-01
The current study investigates race-ethnic differences in rates of panic disorder, panic attacks and certain panic attack symptoms by jointly combining three major national epidemiological databases. The compared groups were White, African American, Latino and Asian. The White group had significantly higher rates of panic disorder, and of many panic symptoms, including palpitations, as compared to the African American, Asian and Latino groups. Several expected race-ethnic differences were not found. An explanation for these findings are adduced, and suggestions are given for future studies so that possible ethnic-racial differences in panic disorder, panic attacks and panic attack symptoms can be investigated in a more rigorous manner.
Comparison of pitch rate history effects on dynamic stall
NASA Technical Reports Server (NTRS)
Chandrasekhara, M. S.; Carr, Lawrence W.; Ahmed, S.
1992-01-01
Dynamic stall of an airfoil is a classic case of forced unsteady separated flow. Flow separation is brought about by large incidences introduced by the large amplitude unsteady pitching motion of an airfoil. One of the parameters that affects the dynamic stall process is the history of the unsteady motion. In addition, the problem is complicated by the effects of compressibility that rapidly appear over the airfoil even at low Mach numbers at moderately high angles of attack. Consequently, it is of interest to know the effects of pitch rate history on the dynamic stall process. This abstract compares the results of a flow visualization study of the problem with two different pitch rate histories, namely, oscillating airfoil motion and a linear change in the angle of attack due to a transient pitching motion.
A hierarchical detection method in external communication for self-driving vehicles based on TDMA
Al-ani, Muzhir Shaban; McDonald-Maier, Klaus
2018-01-01
Security is considered a major challenge for self-driving and semi self-driving vehicles. These vehicles depend heavily on communications to predict and sense their external environment used in their motion. They use a type of ad hoc network termed Vehicular ad hoc networks (VANETs). Unfortunately, VANETs are potentially exposed to many attacks on network and application level. This paper, proposes a new intrusion detection system to protect the communication system of self-driving cars; utilising a combination of hierarchical models based on clusters and log parameters. This security system is designed to detect Sybil and Wormhole attacks in highway usage scenarios. It is based on clusters, utilising Time Division Multiple Access (TDMA) to overcome some of the obstacles of VANETs such as high density, high mobility and bandwidth limitations in exchanging messages. This makes the security system more efficient, accurate and capable of real time detection and quick in identification of malicious behaviour in VANETs. In this scheme, each vehicle log calculates and stores different parameter values after receiving the cooperative awareness messages from nearby vehicles. The vehicles exchange their log data and determine the difference between the parameters, which is utilised to detect Sybil attacks and Wormhole attacks. In order to realize efficient and effective intrusion detection system, we use the well-known network simulator (ns-2) to verify the performance of the security system. Simulation results indicate that the security system can achieve high detection rates and effectively detect anomalies with low rate of false alarms. PMID:29315302
NASA Technical Reports Server (NTRS)
Coe, P. L., Jr.; Graham, A. B.; Chambers, J. R.
1975-01-01
The results presented show that the magnitudes of the aerodynamic stability derivatives due to rate of change of sideslip become quite large at high angles of attack for swept- and delta-wing configurations, and that such derivatives have large effects on the calculated dynamic stability of these configurations at high angles of attack. The wind-tunnel test techniques used to measure the beta prime derivatives and various approaches used to predict them are discussed. Both the conventional oscillating-airfoil theory and the lag-of-the-sidewash theory are shown to be inadequate for predicting the vertical-tail contribution to the acceleration-in-sideslip derivative; a flow-field-lag theory, which is discussed, appears to give qualitative agreement with experimental data for a current twin-jet fighter configuration.
NASA Technical Reports Server (NTRS)
Nowak, R. J.; Albertson, C. W.; Hunt, L. R.
1984-01-01
The effects of free-stream unit Reynolds number, angle of attack, and nose shape on the aerothermal environment of a 3-ft basediameter, 12.5 deg half-angle cone were investigated in the Langley 8-foot high temperature tunnel at Mach 6.7. The average total temperature was 3300 R, the freestream unit Reynolds number ranged from 400,000 to 1,400,000 per foot, and the angle of attack ranged from 0 deg to 10 deg. Three nose configurations were tested on the cone: a 3-in-radius tip, a 1-in-radius tip on an ogive frustum, and a sharp tip on an ogive frustum. Surface-pressure and cold-wall heating-rate distributions were obtained for laminar, transitional temperature in the shock layer were obtained. The location of the start of transition moved forward both on windward and leeward sides with increasing free-stream Reynolds numbers, increasing angle of attack, and decreasing nose bluntness.
The potential economic burden of Zika in the continental United States.
Lee, Bruce Y; Alfaro-Murillo, Jorge A; Parpia, Alyssa S; Asti, Lindsey; Wedlock, Patrick T; Hotez, Peter J; Galvani, Alison P
2017-04-01
As the Zika virus epidemic continues to spread internationally, countries such as the United States must determine how much to invest in prevention, control, and response. Fundamental to these decisions is quantifying the potential economic burden of Zika under different scenarios. To inform such decision making, our team developed a computational model to forecast the potential economic burden of Zika across six states in the US (Alabama, Florida, Georgia, Louisiana, Mississippi, and Texas) which are at greatest risk of Zika emergence, under a wide range of attack rates, scenarios and circumstances. In order to accommodate a wide range of possibilities, different scenarios explored the effects of varying the attack rate from 0.01% to 10%. Across the six states, an attack rate of 0.01% is estimated to cost $183.4 million to society ($117.1 million in direct medical costs and $66.3 million in productivity losses), 0.025% would result in $198.6 million ($119.4 million and $79.2 million), 0.10% would result in $274.6 million ($130.8 million and $143.8 million) and 1% would result in $1.2 billion ($268.0 million and $919.2 million). Our model and study show how direct medical costs, Medicaid costs, productivity losses, and total costs to society may vary with different attack rates across the six states and the circumstances at which they may exceed certain thresholds (e.g., Zika prevention and control funding allocations that are being debated by the US government). A Zika attack rate of 0.3% across the six states at greatest risk of Zika infection, would result in total costs that exceed $0.5 billion, an attack rate of 1% would exceed $1 billion, and an attack rate of 2% would exceed $2 billion.
Deterministic MDI QKD with two secret bits per shared entangled pair
NASA Astrophysics Data System (ADS)
Zebboudj, Sofia; Omar, Mawloud
2018-03-01
Although quantum key distribution schemes have been proven theoretically secure, they are based on assumptions about the devices that are not yet satisfied with today's technology. The measurement-device-independent scheme has been proposed to shorten the gap between theory and practice by removing all detector side-channel attacks. On the other hand, two-way quantum key distribution schemes have been proposed to raise the secret key generation rate. In this paper, we propose a new quantum key distribution scheme able to achieve a relatively high secret key generation rate based on two-way quantum key distribution that also inherits the robustness of the measurement-device-independent scheme against detector side-channel attacks.
Zhou, Wei; Wen, Junhao; Qu, Qiang; Zeng, Jun; Cheng, Tian
2018-01-01
Recommender systems are vulnerable to shilling attacks. Forged user-generated content data, such as user ratings and reviews, are used by attackers to manipulate recommendation rankings. Shilling attack detection in recommender systems is of great significance to maintain the fairness and sustainability of recommender systems. The current studies have problems in terms of the poor universality of algorithms, difficulty in selection of user profile attributes, and lack of an optimization mechanism. In this paper, a shilling behaviour detection structure based on abnormal group user findings and rating time series analysis is proposed. This paper adds to the current understanding in the field by studying the credibility evaluation model in-depth based on the rating prediction model to derive proximity-based predictions. A method for detecting suspicious ratings based on suspicious time windows and target item analysis is proposed. Suspicious rating time segments are determined by constructing a time series, and data streams of the rating items are examined and suspicious rating segments are checked. To analyse features of shilling attacks by a group user's credibility, an abnormal group user discovery method based on time series and time window is proposed. Standard testing datasets are used to verify the effect of the proposed method.
Wen, Junhao; Qu, Qiang; Zeng, Jun; Cheng, Tian
2018-01-01
Recommender systems are vulnerable to shilling attacks. Forged user-generated content data, such as user ratings and reviews, are used by attackers to manipulate recommendation rankings. Shilling attack detection in recommender systems is of great significance to maintain the fairness and sustainability of recommender systems. The current studies have problems in terms of the poor universality of algorithms, difficulty in selection of user profile attributes, and lack of an optimization mechanism. In this paper, a shilling behaviour detection structure based on abnormal group user findings and rating time series analysis is proposed. This paper adds to the current understanding in the field by studying the credibility evaluation model in-depth based on the rating prediction model to derive proximity-based predictions. A method for detecting suspicious ratings based on suspicious time windows and target item analysis is proposed. Suspicious rating time segments are determined by constructing a time series, and data streams of the rating items are examined and suspicious rating segments are checked. To analyse features of shilling attacks by a group user’s credibility, an abnormal group user discovery method based on time series and time window is proposed. Standard testing datasets are used to verify the effect of the proposed method. PMID:29742134
Dow, Geoffrey S; McCarthy, William F; Reid, Mark; Smith, Bryan; Tang, Douglas; Shanks, G Dennis
2014-02-06
In 2000/2001, the Australian Defense Forces (ADF), in collaboration with SmithKline Beecham and the United States Army, conducted a field trial to evaluate the safety, tolerability and efficacy of tafenoquine and mefloquine/primaquine for the prophylaxis of malaria amongst non-immune Australian soldiers deployed to East Timor (now called Timor Leste) for peacekeeping operations. The lack of a concurrent placebo control arm prevented an internal estimate of the malaria attack rate and so the protective efficacy of the study regimens was not determined at the time. In a retrospective analysis of the trial results, the all species malaria attack rate was estimated for the prophylactic phase of the study which was defined as the period between administration of the first prophylactic dose and the first dose of post-deployment medication. First, the Plasmodium vivax attack rate was estimated during the prophylactic phase of the deployment by adjusting the observed P. vivax relapse rate during post-deployment to account for the known anti-relapse efficacies (or effectiveness) of the study medications (determined from prior studies). The all species malaria attack rate (P. vivax and Plasmodium falciparum) was then determined by adjusting the P. vivax attack rate based on the ratio of P. falciparum to P. vivax observed during prior ADF deployments to Timor Leste. This estimated all species malaria attack rate was then used as the 'constant estimated attack rate' in the calculation of the protective efficacy of tafenoquine and mefloquine during the prophylactic phase of the deployment. The estimated attack rate during the prophylactic phase of the study was determined to be 7.88%. The protective efficacies of tafenoquine and mefloquine, with corresponding 95% confidence intervals (95% CI), were determined to be 100% (93%-100%) and 100% (79%-100%) respectively. The protective efficacy of tafenoquine (200 mg per day for three days, followed by weekly 200 mg maintenance doses) is similar to that of the weekly standard of care (mefloquine, 250 mg).
Romón, Pedro; Aparicio, Domitila; Palacios, Francisco; Iturrondobeitia, Juan Carlos; Hance, Thierry
2017-01-01
Abstract Concentrations of four monoterpenes were determined in needles of Pinus radiata (D.Don) (Pinales: Pinaceae) trees that were attacked or nonattacked by Tomicus piniperda (L.) (Coleoptera: Scolytinae). Compounds were identified and quantified by gas chromatography–mass spectrometry. The mean ambient temperature was obtained using climate-recording data loggers. The effect of limonene on field aggregation was also evaluated at three limonene release rates using Lindgren attractant-baited traps and trap logs. Attacked trees produced less α-pinene in March, July, and November than nonattacked trees, less β-pinene in July and November, and less limonene from May to November. Limonene reduced the attraction of T. piniperda to attractant-baited traps and trap logs. Results were linked to better responses to high temperatures, with respect to terpene contents, by the nonattacked trees after the spring attack. PMID:29117373
Navier-Stokes computations with finite-rate chemistry for LO2/LH2 rocket engine plume flow studies
NASA Technical Reports Server (NTRS)
Dougherty, N. Sam; Liu, Baw-Lin
1991-01-01
Computational fluid dynamics methods have been developed and applied to Space Shuttle Main Engine LO2/LH2 plume flow simulation/analysis of airloading and convective base heating effects on the vehicle at high flight velocities and altitudes. New methods are described which were applied to the simulation of a Return-to-Launch-Site abort where the vehicle would fly briefly at negative angles of attack into its own plume. A simplified two-perfect-gases-mixing approach is used where one gas is the plume and the other is air at 180-deg and 135-deg flight angle of attack. Related research has resulted in real gas multiple-plume interaction methods with finite-rate chemistry described herein which are applied to the same high-altitude-flight conditions of 0 deg angle of attack. Continuing research plans are to study Orbiter wake/plume flows at several Mach numbers and altitudes during ascent and then to merge this model with the Shuttle 'nose-to-tail' aerodynamic and SRB plume models for an overall 'nose-to-plume' capability. These new methods are also applicable to future launch vehicles using clustered-engine LO2/LH2 propulsion.
Hagengimana, Athanase; Hinton, Devon; Bird, Bruce; Pollack, Mark; Pitman, Roger K.
2009-01-01
The present study is the first to attempt to determine rates of panic attacks, especially ‘somatically focused’ panic attacks, panic disorder, symptoms of post-traumatic stress disorder (PTSD), and depression levels in a population of Rwandans traumatized by the 1994 genocide. The following measures were utilized: the Rwandan Panic-Disorder Survey (RPDS); the Beck Depression Inventory (BDI); the Harvard Trauma Questionnaire (HTQ); and the PTSD Checklist (PCL). Forty of 100 Rwandan widows suffered somatically focused panic attacks during the previous 4 weeks. Thirty-five (87%) of those having panic attacks suffered panic disorder, making the rate of panic disorder for the entire sample 35%. Rwandan widows with panic attacks had greater psychopathology on all measures. Somatically focused panic-attack subtypes seem to constitute a key response to trauma in the Rwandan population. Future studies of traumatized non-Western populations should carefully assess not only somatoform disorder but also somatically focused panic attacks. PMID:12581815
Analysis of various descent trajectories for a hypersonic-cruise, cold-wall research airplane
NASA Technical Reports Server (NTRS)
Lawing, P. L.
1975-01-01
The probable descent operating conditions for a hypersonic air-breathing research airplane were examined. Descents selected were cruise angle of attack, high dynamic pressure, high lift coefficient, turns, and descents with drag brakes. The descents were parametrically exercised and compared from the standpoint of cold-wall (367 K) aircraft heat load. The descent parameters compared were total heat load, peak heating rate, time to landing, time to end of heat pulse, and range. Trends in total heat load as a function of cruise Mach number, cruise dynamic pressure, angle-of-attack limitation, pull-up g-load, heading angle, and drag-brake size are presented.
Misra, Sudip; Singh, Ranjit; Rohith Mohan, S. V.
2010-01-01
The proposed mechanism for jamming attack detection for wireless sensor networks is novel in three respects: firstly, it upgrades the jammer to include versatile military jammers; secondly, it graduates from the existing node-centric detection system to the network-centric system making it robust and economical at the nodes, and thirdly, it tackles the problem through fuzzy inference system, as the decision regarding intensity of jamming is seldom crisp. The system with its high robustness, ability to grade nodes with jamming indices, and its true-detection rate as high as 99.8%, is worthy of consideration for information warfare defense purposes. PMID:22319307
Geographic Wormhole Detection in Wireless Sensor Networks
Sookhak, Mehdi; Akhundzada, Adnan; Sookhak, Alireza; Eslaminejad, Mohammadreza; Gani, Abdullah; Khurram Khan, Muhammad; Li, Xiong; Wang, Xiaomin
2015-01-01
Wireless sensor networks (WSNs) are ubiquitous and pervasive, and therefore; highly susceptible to a number of security attacks. Denial of Service (DoS) attack is considered the most dominant and a major threat to WSNs. Moreover, the wormhole attack represents one of the potential forms of the Denial of Service (DoS) attack. Besides, crafting the wormhole attack is comparatively simple; though, its detection is nontrivial. On the contrary, the extant wormhole defense methods need both specialized hardware and strong assumptions to defend against static and dynamic wormhole attack. The ensuing paper introduces a novel scheme to detect wormhole attacks in a geographic routing protocol (DWGRP). The main contribution of this paper is to detect malicious nodes and select the best and the most reliable neighbors based on pairwise key pre-distribution technique and the beacon packet. Moreover, this novel technique is not subject to any specific assumption, requirement, or specialized hardware, such as a precise synchronized clock. The proposed detection method is validated by comparisons with several related techniques in the literature, such as Received Signal Strength (RSS), Authentication of Nodes Scheme (ANS), Wormhole Detection uses Hound Packet (WHOP), and Wormhole Detection with Neighborhood Information (WDI) using the NS-2 simulator. The analysis of the simulations shows promising results with low False Detection Rate (FDR) in the geographic routing protocols. PMID:25602616
Corrosion Performance of High Damping Alloys in 3.5% Sodium Chloride Environment.
1987-09-01
Electrochemical Technique, Sea Exposure, Scanning Electron Microscopy. 9 .,5MAZT (Continue on rvre of necessary ad 4*er.#y by boock numbver# -The... electrochemical nature of corrosion provides a means of determining an almost instantaneous corrosion rate. Corrosion rate and the nature of corrosion attack were... electrochemical nature of corrosion provides a means of determining an almost instantaneous corrosion rate. Corrosion rate and the nature of
A systematic review of re-identification attacks on health data.
El Emam, Khaled; Jonker, Elizabeth; Arbuckle, Luk; Malin, Bradley
2011-01-01
Privacy legislation in most jurisdictions allows the disclosure of health data for secondary purposes without patient consent if it is de-identified. Some recent articles in the medical, legal, and computer science literature have argued that de-identification methods do not provide sufficient protection because they are easy to reverse. Should this be the case, it would have significant and important implications on how health information is disclosed, including: (a) potentially limiting its availability for secondary purposes such as research, and (b) resulting in more identifiable health information being disclosed. Our objectives in this systematic review were to: (a) characterize known re-identification attacks on health data and contrast that to re-identification attacks on other kinds of data, (b) compute the overall proportion of records that have been correctly re-identified in these attacks, and (c) assess whether these demonstrate weaknesses in current de-identification methods. Searches were conducted in IEEE Xplore, ACM Digital Library, and PubMed. After screening, fourteen eligible articles representing distinct attacks were identified. On average, approximately a quarter of the records were re-identified across all studies (0.26 with 95% CI 0.046-0.478) and 0.34 for attacks on health data (95% CI 0-0.744). There was considerable uncertainty around the proportions as evidenced by the wide confidence intervals, and the mean proportion of records re-identified was sensitive to unpublished studies. Two of fourteen attacks were performed with data that was de-identified using existing standards. Only one of these attacks was on health data, which resulted in a success rate of 0.00013. The current evidence shows a high re-identification rate but is dominated by small-scale studies on data that was not de-identified according to existing standards. This evidence is insufficient to draw conclusions about the efficacy of de-identification methods.
A Systematic Review of Re-Identification Attacks on Health Data
El Emam, Khaled; Jonker, Elizabeth; Arbuckle, Luk; Malin, Bradley
2011-01-01
Background Privacy legislation in most jurisdictions allows the disclosure of health data for secondary purposes without patient consent if it is de-identified. Some recent articles in the medical, legal, and computer science literature have argued that de-identification methods do not provide sufficient protection because they are easy to reverse. Should this be the case, it would have significant and important implications on how health information is disclosed, including: (a) potentially limiting its availability for secondary purposes such as research, and (b) resulting in more identifiable health information being disclosed. Our objectives in this systematic review were to: (a) characterize known re-identification attacks on health data and contrast that to re-identification attacks on other kinds of data, (b) compute the overall proportion of records that have been correctly re-identified in these attacks, and (c) assess whether these demonstrate weaknesses in current de-identification methods. Methods and Findings Searches were conducted in IEEE Xplore, ACM Digital Library, and PubMed. After screening, fourteen eligible articles representing distinct attacks were identified. On average, approximately a quarter of the records were re-identified across all studies (0.26 with 95% CI 0.046–0.478) and 0.34 for attacks on health data (95% CI 0–0.744). There was considerable uncertainty around the proportions as evidenced by the wide confidence intervals, and the mean proportion of records re-identified was sensitive to unpublished studies. Two of fourteen attacks were performed with data that was de-identified using existing standards. Only one of these attacks was on health data, which resulted in a success rate of 0.00013. Conclusions The current evidence shows a high re-identification rate but is dominated by small-scale studies on data that was not de-identified according to existing standards. This evidence is insufficient to draw conclusions about the efficacy of de-identification methods. PMID:22164229
Turbulent flow and heat transfer of Water/Al2O3 nanofluid inside a rectangular ribbed channel
NASA Astrophysics Data System (ADS)
Parsaiemehr, Mohammad; Pourfattah, Farzad; Akbari, Omid Ali; Toghraie, Davood; Sheikhzadeh, Ghanbarali
2018-02-01
In present study, the turbulent flow and heat transfer of Water/Al2O3 nanofluid inside a rectangular channel have been numerically simulated. The main purpose of present study is investigating the effect of attack angle of inclined rectangular rib, Reynolds number and volume fraction of nanoparticles on heat transfer enhancement. For this reason, the turbulent flow of nanofluid has been simulated at Reynolds numbers ranging from 15000 to 30000 and volume fractions of nanoparticles from 0 to 4%. The changes attack angle of ribs have been investigated ranging from 0 to 180°. The results show that, the changes of attack angle of ribs, due to the changes of flow pattern and created vortexes inside the channel, have significant effect on fluid mixing. Also, the maximum rate of heat transfer enhancement accomplishes in attack angle of 60°. In Reynolds numbers of 15000, 20000 and 30000 and attack angle of 60°, comparing to the attack angle of 0°, the amount of Nusselt number enhances to 2.37, 1.96 and 2 times, respectively. Also, it can be concluded that, in high Reynolds numbers, by using ribs and nanofluid, the performance evaluation criterion improves.
Results from flight and simulator studies of a Mach 3 cruise longitudinal autopilot
NASA Technical Reports Server (NTRS)
Gilyard, G. B.; Smith, J. W.
1978-01-01
At Mach numbers of approximately 3.0 and altitudes greater than 21,300 meters, the original altitude and Mach hold modes of the YF-12 autopilot produced aircraft excursions that were erratic or divergent, or both. Flight data analysis and simulator studies showed that the sensitivity of the static pressure port to angle of attack had a detrimental effect on the performance of the altitude and Mach hold modes. Good altitude hold performance was obtained when a high passed pitch rate feedback was added to compensate for angle of attack sensitivity and the altitude error and integral altitude gains were reduced. Good Mach hold performance was obtained when the angle of attack sensitivity was removed; however, the ride qualities remained poor.
2014-01-01
Background In 2000/2001, the Australian Defense Forces (ADF), in collaboration with SmithKline Beecham and the United States Army, conducted a field trial to evaluate the safety, tolerability and efficacy of tafenoquine and mefloquine/primaquine for the prophylaxis of malaria amongst non-immune Australian soldiers deployed to East Timor (now called Timor Leste) for peacekeeping operations. The lack of a concurrent placebo control arm prevented an internal estimate of the malaria attack rate and so the protective efficacy of the study regimens was not determined at the time. Methods In a retrospective analysis of the trial results, the all species malaria attack rate was estimated for the prophylactic phase of the study which was defined as the period between administration of the first prophylactic dose and the first dose of post-deployment medication. First, the Plasmodium vivax attack rate was estimated during the prophylactic phase of the deployment by adjusting the observed P. vivax relapse rate during post-deployment to account for the known anti-relapse efficacies (or effectiveness) of the study medications (determined from prior studies). The all species malaria attack rate (P. vivax and Plasmodium falciparum) was then determined by adjusting the P. vivax attack rate based on the ratio of P. falciparum to P. vivax observed during prior ADF deployments to Timor Leste. This estimated all species malaria attack rate was then used as the ‘constant estimated attack rate’ in the calculation of the protective efficacy of tafenoquine and mefloquine during the prophylactic phase of the deployment. Results The estimated attack rate during the prophylactic phase of the study was determined to be 7.88%. The protective efficacies of tafenoquine and mefloquine, with corresponding 95% confidence intervals (95% CI), were determined to be 100% (93%-100%) and 100% (79%-100%) respectively. Conclusions The protective efficacy of tafenoquine (200 mg per day for three days, followed by weekly 200 mg maintenance doses) is similar to that of the weekly standard of care (mefloquine, 250 mg). PMID:24502679
Palmieri, L.; Barchielli, A.; Cesana, G.; de Campora, E.; Goldoni, C.A.; Spolaore, P.; Uguccioni, M.; Vancheri, F.; Vanuzzo, D.; Ciccarelli, P.; Giampaoli, S.
2007-01-01
Background The Italian register of cardiovascular diseases is a surveillance system of fatal and nonfatal cardiovascular events in the general population aged 35–74 years. It was launched in Italy at the end of the 1990s with the aim of estimating periodically the occurrence and case fatality rate of coronary and cerebrovascular events in the different geographical areas of the country. This paper presents data for cerebrovascular events. Methods Currentevents were assessed through record linkage between two sources of information: death certificates and hospital discharge diagnosis records. Events were identified through the ICD codes and duration. To calculate the number of estimated events, current events were multiplied by the positive predictive value of each specific mortality or discharge code derived from the validation of a sample of suspected events. Attack rates were calculated by dividing estimatedevents by resident population, and case fatality rate at 28 days was determined from the ratio of estimated fatal to total events. Results Attack rates were found to be higher in men than in women: mean age-standardized attack rate was 21.9/10,000 in men and 12.5/10,000 in women; age-standardized 28-day case fatality rate was higher in women (17.1%) than in men (14.5%). Significant geographical differences were found in attack rates of both men and women. Case fatality was significantly heterogeneous in both men and women. Conclusions Differences still exist in the geographical distribution of attack and case fatality rates of cerebrovascular events, regardless of the north-south gradient. These data show the feasibility of implementing a population-based register using a validated routine database, necessary for monitoring cardiovascular diseases. PMID:17971632
Fusion of Heterogeneous Intrusion Detection Systems for Network Attack Detection
Kaliappan, Jayakumar; Thiagarajan, Revathi; Sundararajan, Karpagam
2015-01-01
An intrusion detection system (IDS) helps to identify different types of attacks in general, and the detection rate will be higher for some specific category of attacks. This paper is designed on the idea that each IDS is efficient in detecting a specific type of attack. In proposed Multiple IDS Unit (MIU), there are five IDS units, and each IDS follows a unique algorithm to detect attacks. The feature selection is done with the help of genetic algorithm. The selected features of the input traffic are passed on to the MIU for processing. The decision from each IDS is termed as local decision. The fusion unit inside the MIU processes all the local decisions with the help of majority voting rule and makes the final decision. The proposed system shows a very good improvement in detection rate and reduces the false alarm rate. PMID:26295058
Fusion of Heterogeneous Intrusion Detection Systems for Network Attack Detection.
Kaliappan, Jayakumar; Thiagarajan, Revathi; Sundararajan, Karpagam
2015-01-01
An intrusion detection system (IDS) helps to identify different types of attacks in general, and the detection rate will be higher for some specific category of attacks. This paper is designed on the idea that each IDS is efficient in detecting a specific type of attack. In proposed Multiple IDS Unit (MIU), there are five IDS units, and each IDS follows a unique algorithm to detect attacks. The feature selection is done with the help of genetic algorithm. The selected features of the input traffic are passed on to the MIU for processing. The decision from each IDS is termed as local decision. The fusion unit inside the MIU processes all the local decisions with the help of majority voting rule and makes the final decision. The proposed system shows a very good improvement in detection rate and reduces the false alarm rate.
Vilella, Anna; Serrano, Beatriz; Marcos, Maria A; Serradesanferm, Anna; Mensa, Josep; Hayes, Edward; Anton, Andres; Rios, Jose; Pumarola, Tomas; Trilla, Antoni
2012-01-01
From the beginning of the influenza pandemic until the time the outbreak described here was detected, 77,201 cases of pandemic influenza A(H1N1) with 332 deaths had been reported worldwide, mostly in the United States and Mexico. All of the cases reported in Spain until then had a recent history of travel to Mexico, the Dominican Republic, or Chile. We describe an outbreak of influenza among medical students who traveled from Spain to the Dominican Republic in June 2009. We collected diagnostic samples and clinical histories from consenting medical students who had traveled to the Dominican Republic and from their household contacts after their return to Spain. Of 113 students on the trip, 62 (55%) developed symptoms; 39 (45%) of 86 students tested had laboratory evidence of influenza A(H1N1) infection. Most students developed symptoms either just before departure from the Dominican Republic or within days of returning to Spain. The estimated secondary attack rate of influenza-like illness among residential contacts of ill students after return to Spain was 2.1%. The attack rate of influenza A(H1N1) can vary widely depending on the circumstances of exposure. We report a high attack rate among a group of traveling medical students but a much lower secondary attack rate among their contacts after return from the trip. These findings may aid the development of recommendations to prevent influenza. © 2011 International Society of Travel Medicine.
Quantum key distribution without detector vulnerabilities using optically seeded lasers
NASA Astrophysics Data System (ADS)
Comandar, L. C.; Lucamarini, M.; Fröhlich, B.; Dynes, J. F.; Sharpe, A. W.; Tam, S. W.-B.; Yuan, Z. L.; Penty, R. V.; Shields, A. J.
2016-05-01
Security in quantum cryptography is continuously challenged by inventive attacks targeting the real components of a cryptographic set-up, and duly restored by new countermeasures to foil them. Owing to their high sensitivity and complex design, detectors are the most frequently attacked components. It was recently shown that two-photon interference from independent light sources can be used to remove any vulnerability from detectors. This new form of detection-safe quantum key distribution (QKD), termed measurement-device-independent (MDI), has been experimentally demonstrated but with modest key rates. Here, we introduce a new pulsed laser seeding technique to obtain high-visibility interference from gain-switched lasers and thereby perform MDI-QKD with unprecedented key rates in excess of 1 megabit per second in the finite-size regime. This represents a two to six orders of magnitude improvement over existing implementations and supports the new scheme as a practical resource for secure quantum communications.
Bonanno, George A; Rennicke, Courtney; Dekel, Sharon
2005-06-01
The authors examined self-enhancing bias as a predictor of adjustment among individuals in or near the World Trade Center during the September 11, 2001, terrorist attacks. Resilience was defined from categorical and continuous analyses of both participant self-report and friend and relative ratings of adjustment. Self-enhancement was associated with a resilient outcome, ratings of better adjustment prior to September 11th, greater positive affect, and reduced perceptions of social constraints. Additional analyses indicated that self-enhancers' reduced symptom levels were fully mediated by their low perceived social constraints. However, consistent with previous evidence suggesting a social cost to self-enhancement, at 18 months post-September 11th, self-enhancers' friends and relatives also rated them as decreasing in social adjustment and as being less honest.
ERIC Educational Resources Information Center
Lange, Aart W.; Neeleman, Jan
2004-01-01
Suicide rates may be affected by world news. Our objective was to investigate the possible impact of the terrorist attacks of September 11, 2001, on suicidal behavior in the Netherlands. There was evidence of an increase in rates of suicide and deliberate self-harm in the weeks immediately following the attacks. These findings contrast with…
Barbhuiya, F A; Agarwal, Mayank; Purwar, Sanketh; Biswas, Santosh; Nandi, Sukumar
2015-09-01
TCP is the most widely accepted transport layer protocol. The major emphasis during the development of TCP was its functionality and efficiency. However, not much consideration was given on studying the possibility of attackers exploiting the protocol, which has lead to several attacks on TCP. This paper deals with the induced low rate TCP attack. Since the attack is relatively new, only a few schemes have been proposed to mitigate it. However, the main issues with these schemes are scalability, change in TCP header, lack of formal frameworks, etc. In this paper, we have adapted the stochastic DES framework for detecting the attack, which addresses most of these issues. We have successfully deployed and tested the proposed DES based IDS on a test bed. Copyright © 2015 ISA. Published by Elsevier Ltd. All rights reserved.
Rhenium-Oxygen Interactions at High Temperatures
NASA Technical Reports Server (NTRS)
Jacobson, Nathan S.; Myers, Dwight L.; Zhu, Dongming; Humphrey, Donald
2000-01-01
The reaction of pure rhenium metal with dilute oxygen/argon mixtures was studied from 600 to 1400 C. Temperature, oxygen pressure, and flow rates were systematically varied to determine the rate-controlling steps. At lower temperatures the oxygen/rhenium chemical reaction is rate limiting; at higher temperatures gas-phase diffusion of oxygen through the static boundary layer is rate limiting. At all temperatures post-reaction microstructures indicate preferential attack along certain crystallographic planes and defects.
Research on high power intra-channel crosstalk attack in optical networks
NASA Astrophysics Data System (ADS)
Ren, Shuai; Zhang, Yinfa; Wang, Jingyu; Zhang, Jumei; Rao, Xuejun; Fang, Yuanyuan
2017-02-01
The mechanism of high power intra-channel crosstalk attack is analyzed theoretically and the conclusion that power of attack signal and crosstalk coefficient of optical switch are the main factors for which high power intra-channel have destructive effect on quality of legitimate signals is drawn. Effects of high power intra-channel crosstalk attack on quality of legitimate signals and its capability of attack propagation are investigated quantitatively by building the simulation system in VPI software. The results show that legitimate signals through the first and the second stage optical switch are affected by attack and legitimate signal through the third stage optical switch is almost unaffected by attack when power of original attack signal (OAS) is above 20dB more than that of legitimate signals and crosstalk coefficient of optical switch is -20dB at optical cross connect 1 (OXC1). High power intra-channel crosstalk attack has a certain capability of attack propagation. Attack capability of OAS can be propagated to OXC3 when power of OAS is 27dB more than that of legitimate signals and crosstalk coefficient of optical switch is -20dB. We also find that the secondary attack signal (SAS) does not have capability of attack propagation.
NASA Technical Reports Server (NTRS)
Albertson, Cindy W.
1987-01-01
A model to be used in the flow studies and curved Thermal Protection System (TPS) evaluations was tested in the Langley 8 Foot High-Temperature Tunnel at a nominal Mach number of 6.8. The purpose of the study was to define the surface pressure and heating rates at high angles of attack (in support of curved metallic TPS studies) and to determine the conditions for which the model would be suitable as a test bed for aerothermal load studies. The present study was conducted at a nominal total temperature of 2400 and 3300 R, dynamic pressures from 2.3 to 10.9 psia, and free-stream Reynolds numbers from 4000,000 to 1,700,000/ft. The measurements consisted primarily of surface pressure and cold-wall (530 R) heating rates. Qualitative comparisons between predictions and data show that for this configuration, aerothermal tests should be limited to angles of attack between 10 and -10 degrees. Outside this range, the effects of free-stream flow nonuniformity appear in the data, as a result of the long length of the model. However, for TPS testing, this is not a concern and tests can be performed at angles of attack ranging from 20 to -20 degrees. Laminar and naturally turbulent boundary layers are available over limited ranges of conditions.
Effect of 7 July 2005 terrorist attacks in London on suicide in England and Wales.
Salib, Emad; Cortina-Borja, Mario
2009-01-01
A reduction in suicide in England and Wales has been reported after the attacks of 11 September 2001 in the USA. It may be plausible therefore to expect a much greater impact on suicide in the UK in response to the events of 7 July 2005, caused by the first suicide terrorist attack by Islamic extremists on British soil. To examine the effect of the 7 July 2005 terrorist attacks in London on suicide rates in England and Wales. Analysis of number of suicide (ICD-10 codes X60-X84) and undetermined injury deaths (ICD-10 codes Y10-Y34) reported in England and Wales in the 12 weeks before and after 7 July 2005. We used Shewhart Control Charts based on Poisson rates to explore adjusted daily and weekly suicide rates and rate differences with respect to 7 July 2005. A brief but significant reduction in daily suicide rate was observed a few days after the terrorist attack in London on 7 July 2005. Further reduction was also observed on the 21 July 2005, coinciding with the second wave of attacks. No similar reduction in suicide was seen during the same period in the previous 4 years. Poisson regression models with indicator variables for each day in July 2005 revealed a reduction of 40% of the expected daily rate for these 2 days only. We found no evidence of any longer-term effect on suicide. The study findings are contrary to our expectation and only weakly support Durkheim's theory that periods of national threat lower the suicide rate through the impact on social cohesion. It is possible that previous experience of IRA terrorism in the UK may have limited the effect of the 7 July 2005 attacks on suicide in England and Wales. The shock value of suicide terrorism and its psychological potency appear to diminish over time as the tactic becomes overused.
Natarajan, Deepa; Caramaschi, Doretta
2009-01-01
Violence has been observed in humans and animals alike, indicating its evolutionary/biological significance. However, violence in animals has often been confounded with functional forms of aggressive behavior. Currently, violence in animals is identified primarily as either a quantitative behavior (an escalated, pathological and abnormal form of aggression characterized primarily by short attack latencies, and prolonged and frequent harm-oriented conflict behaviors) or a qualitative one (characterized by attack bites aimed at vulnerable parts of the opponent's body and context independent attacks regardless of the environment or the sex and type of the opponent). Identification of an operational definition for violence thus not only helps in understanding its potential differences from adaptive forms of aggression but also in the selection of appropriate animal models for both. We address this issue theoretically by drawing parallels from research on aggression and appeasement in humans and other animals. We also provide empirical evidences for violence in mice selected for high aggression by comparing our findings with other currently available potentially violent rodent models. The following violence-specific features namely (1) Display of low levels of pre-escalatory/ritualistic behaviors. (2) Immediate and escalated offense durations with low withdrawal rates despite the opponent's submissive supine and crouching/defeat postures. (3) Context independent indiscriminate attacks aimed at familiar/unfamiliar females, anaesthetized males and opponents and in neutral environments. (4) Orientation of attack-bites toward vulnerable body parts of the opponent resulting in severe wounding. (5) Low prefrontal serotonin (5-HT) levels upon repeated aggression. (6) Low basal heart rates and hyporesponsive hypothalamus–pituitary–adrenocortical (HPA) axis were identified uniquely in the short attack latency (SAL) mice suggesting a qualitative difference between violence and adaptive aggression in animals. PMID:20407576
Natarajan, Deepa; Caramaschi, Doretta
2010-01-01
Violence has been observed in humans and animals alike, indicating its evolutionary/biological significance. However, violence in animals has often been confounded with functional forms of aggressive behavior. Currently, violence in animals is identified primarily as either a quantitative behavior (an escalated, pathological and abnormal form of aggression characterized primarily by short attack latencies, and prolonged and frequent harm-oriented conflict behaviors) or a qualitative one (characterized by attack bites aimed at vulnerable parts of the opponent's body and context independent attacks regardless of the environment or the sex and type of the opponent). Identification of an operational definition for violence thus not only helps in understanding its potential differences from adaptive forms of aggression but also in the selection of appropriate animal models for both. We address this issue theoretically by drawing parallels from research on aggression and appeasement in humans and other animals. We also provide empirical evidences for violence in mice selected for high aggression by comparing our findings with other currently available potentially violent rodent models. The following violence-specific features namely (1) Display of low levels of pre-escalatory/ritualistic behaviors. (2) Immediate and escalated offense durations with low withdrawal rates despite the opponent's submissive supine and crouching/defeat postures. (3) Context independent indiscriminate attacks aimed at familiar/unfamiliar females, anaesthetized males and opponents and in neutral environments. (4) Orientation of attack-bites toward vulnerable body parts of the opponent resulting in severe wounding. (5) Low prefrontal serotonin (5-HT) levels upon repeated aggression. (6) Low basal heart rates and hyporesponsive hypothalamus-pituitary-adrenocortical (HPA) axis were identified uniquely in the short attack latency (SAL) mice suggesting a qualitative difference between violence and adaptive aggression in animals.
NASA Technical Reports Server (NTRS)
Paulson, John W.; Shanks, Robert E.
1961-01-01
An investigation of the low-subsonic flight characteristics of a thick 70 deg delta reentry configuration having a diamond cross section has been made in the Langley full-scale tunnel over an angle-of-attack range from 20 to 45 deg. Flight tests were also made at angles of attack near maximum lift (alpha = 40 deg) with a radio-controlled model dropped from a helicopter. Static and dynamic force tests were made over an angle-of-attack range from 0 to 90 deg. The longitudinal stability and control characteristics were considered satisfactory when the model had positive static longitudinal stability. It was possible to fly the model with a small amount of static instability, but the longitudinal characteristics were considered unsatisfactory in this condition. At angles of attack above the stall the model developed a large, constant-amplitude pitching oscillation. The lateral stability characteristics were considered to be only fair at angles of attack from about 20 to 35 deg because of a lightly damped Dutch roll oscillation. At higher angles of attack the oscillation was well damped and the lateral stability was generally satisfactory. The Dutch roll damping at the lower angles of attack was increased to satisfactory values by means of a simple rate-type roll damper. The lateral control characteristics were generally satisfactory throughout the angle- of-attack range, but there was some deterioration in aileron effectiveness in the high angle-of-attack range due mainly to a large increase in damping in roll.
NASA Technical Reports Server (NTRS)
Letko, William
1949-01-01
An investigation has been made in the Langley stability tunnel to determine the low-speed static stability and control characteristics of a model of the Bell MX-776. The results show the model to be longitudinally unstable in the angle-of-attack range around zero angle of attack and to become stable at moderate angles of attack. The results of the present investigation agree reasonably well with results obtained in other facilities at low speed. The present pitching-moment results at low Mach numbers also agree reasonably well with unpublished results of tests of the model at supersonic Mach numbers (up to Mach number 1.86). Unpublished results at moderate and high subsonic speeds, however, indicate considerably greater instability at low angles of attack than is indicated by low-speed results. The results of the present tests also showed that the pitching-moment coefficients for angles of attack up to 12deg remained fairly constant with sideslip angle up to 12deg. The elevators tested produced relatively large pitching moments at zero angle of attack but, as the angle of attack was increased, the elevator effectiveness decreased. The rate of decrease of elevator effectiveness with angle of attack was less for 8deg than for 20deg elevator deflection. Therefore although 8deg deflection caused an appreciable change in longitudinal trim angle and trim lift coefficient a deflection of 20deg caused only a small additional increase in trim angle and trim lift coefficient.
Low speed tests of a fixed geometry inlet for a tilt nacelle V/STOL airplane
NASA Technical Reports Server (NTRS)
Syberg, J.; Koncsek, J. L.
1977-01-01
Test data were obtained with a 1/4 scale cold flow model of the inlet at freestream velocities from 0 to 77 m/s (150 knots) and angles of attack from 45 deg to 120 deg. A large scale model was tested with a high bypass ratio turbofan in the NASA/ARC wind tunnel. A fixed geometry inlet is a viable concept for a tilt nacelle V/STOL application. Comparison of data obtained with the two models indicates that flow separation at high angles of attack and low airflow rates is strongly sensitive to Reynolds number and that the large scale model has a significantly improved range of separation-free operation.
Bloch, Yuval H; Leiba, Adi; Veaacnin, Nurit; Paizer, Yohanan; Schwartz, Dagan; Kraskas, Ahuva; Weiss, Gali; Goldberg, Avishay; Bar-Dayan, Yaron
2007-01-01
Mildly injured and "worried well" patients can have profound effects on the management of a mass-casualty incident. The objective of this study is to describe the characteristics and lessons learned from an event that occurred on 28 August 2005 near the central bus station in Beer-Sheva, Israel. The unique profile of injuries allows for the examination of the medical and operational aspects of the management of mild casualties. Data were collected during and after the event, using patient records and formal debriefings. They were processed focusing on the characteristics of patient complaints, medical response, and the dynamics of admission. A total of 64 patients presented to the local emergency department, including two critical casualties. The remaining 62 patients were mildly injured or suffered from stress. Patient presentation to the emergency department was bi-phasic; during the first two hours following the attack (i.e., early phase), the rate of arrival was high (one patient every three minutes), and anxiety was the most frequent chief complaint. During the second phase, the rate of arrival was lower (one patient every 27 minutes), and the typical chief complaint was somatic. Additionally, tinnitus and complaints related to minor trauma also were recorded frequently. Psychiatric consultation was obtained for 58 (91%) of the patients. Social services were involved in the care of 47 of the patients (73%). Otolaryngology and surgery consultations were obtained for 45% and 44%, respectively. The need for some medical specialties (e.g., surgery and orthopedics) mainly was during the first phase, whereas others, mainly psychiatry and otolaryngology, were needed during both phases. Only 13 patients (20%) needed a consultation from internal medicine. Following a terrorist attack, a large number of mildly injured victims and those experiencing stress are to be expected, without a direct relation to the effectiveness of the attack. Mildly injured patients tend to appear in two phases. In the first phase, the rate of admission is expected to be higher. Due to the high incidence of anxiety and other stress-related phenomena, many mildly injured patients will require psychiatric evaluation. In the case of a bombing attack, many of the victims must be evaluated by an otolaryngologist.
Heavy-Ion Microbeam Fault Injection into SRAM-Based FPGA Implementations of Cryptographic Circuits
NASA Astrophysics Data System (ADS)
Li, Huiyun; Du, Guanghua; Shao, Cuiping; Dai, Liang; Xu, Guoqing; Guo, Jinlong
2015-06-01
Transistors hit by heavy ions may conduct transiently, thereby introducing transient logic errors. Attackers can exploit these abnormal behaviors and extract sensitive information from the electronic devices. This paper demonstrates an ion irradiation fault injection attack experiment into a cryptographic field-programmable gate-array (FPGA) circuit. The experiment proved that the commercial FPGA chip is vulnerable to low-linear energy transfer carbon irradiation, and the attack can cause the leakage of secret key bits. A statistical model is established to estimate the possibility of an effective fault injection attack on cryptographic integrated circuits. The model incorporates the effects from temporal, spatial, and logical probability of an effective attack on the cryptographic circuits. The rate of successful attack calculated from the model conforms well to the experimental results. This quantitative success rate model can help evaluate security risk for designers as well as for the third-party assessment organizations.
Detecting Heap-Spraying Code Injection Attacks in Malicious Web Pages Using Runtime Execution
NASA Astrophysics Data System (ADS)
Choi, Younghan; Kim, Hyoungchun; Lee, Donghoon
The growing use of web services is increasing web browser attacks exponentially. Most attacks use a technique called heap spraying because of its high success rate. Heap spraying executes a malicious code without indicating the exact address of the code by copying it into many heap objects. For this reason, the attack has a high potential to succeed if only the vulnerability is exploited. Thus, attackers have recently begun using this technique because it is easy to use JavaScript to allocate the heap memory area. This paper proposes a novel technique that detects heap spraying attacks by executing a heap object in a real environment, irrespective of the version and patch status of the web browser. This runtime execution is used to detect various forms of heap spraying attacks, such as encoding and polymorphism. Heap objects are executed after being filtered on the basis of patterns of heap spraying attacks in order to reduce the overhead of the runtime execution. Patterns of heap spraying attacks are based on analysis of how an web browser accesses benign web sites. The heap objects are executed forcibly by changing the instruction register into the address of them after being loaded into memory. Thus, we can execute the malicious code without having to consider the version and patch status of the browser. An object is considered to contain a malicious code if the execution reaches a call instruction and then the instruction accesses the API of system libraries, such as kernel32.dll and ws_32.dll. To change registers and monitor execution flow, we used a debugger engine. A prototype, named HERAD(HEap spRAying Detector), is implemented and evaluated. In experiments, HERAD detects various forms of exploit code that an emulation cannot detect, and some heap spraying attacks that NOZZLE cannot detect. Although it has an execution overhead, HERAD produces a low number of false alarms. The processing time of several minutes is negligible because our research focuses on detecting heap spraying. This research can be applied to existing systems that collect malicious codes, such as Honeypot.
Population biology of the European woodwasp, Sirex noctilio, in Galicia, Spain.
Lombardero, M J; Ayres, M P; Krivak-Tetley, F E; Fitza, K N E
2016-10-01
Sirex noctilio Fabricius (Hymenoptera, Siricidae) is rare and rarely studied where it is native in Eurasia, but is a widespread pest of pines in the Southern Hemisphere. Here we report on the abundance, basic biology, host use patterns and natural enemies of native S. noctilio in Galicia, Spain. Most trees attacked by S. noctilio failed to produce any adult progeny: >90% of emergences came from <20% of the attacked trees. The highest reproduction was in Pinus pinaster, followed by Pinus sylvestris and Pinus radiata. The proportions of S. noctilio requiring 1, 2 or 3 years for development were 0.72: 0.24: 0.04. Delayed development could be an adaptation to avoid parasitic nematodes, which sterilized 41.5% adults with one year generation time but only 19% of adults with 2 years generation time. Hymenoptera parasitoids accounted for 20% mortality. Sex ratios were male biased at 1: 2.9. Body size and fecundity were highly variable and lower than previously reported from the Southern Hemisphere. On attacked trees, there were 5-20 attacks per standard log (18 dm2), with usually 1-3 drills per attack. Attack densities and drills per attack were higher in trees that subsequently died. The production of S. noctilio per log was positively related to total attacks, and negatively related to: (1) attack density, (2) incidence of blue stain from Ophiostoma fungi and (3) frequency of lesions in plant tissue around points of attack. A preliminary life table for S. noctilio in Galicia estimated effects on potential population growth rate from (in decreasing order of importance) host suitability, unequal sex ratio, parasitic nematodes and Hymenoptera parasitoids.
Control definition study for advanced vehicles
NASA Technical Reports Server (NTRS)
Lapins, M.; Martorella, R. P.; Klein, R. W.; Meyer, R. C.; Sturm, M. J.
1983-01-01
The low speed, high angle of attack flight mechanics of an advanced, canard-configured, supersonic tactical aircraft designed with moderate longitudinal relaxed static stability (Static Margin, SM = 16% C sub W at M = 0.4) was investigated. Control laws were developed for the longitudinal axis (""G'' or maneuver and angle of attack command systems) and for the lateral/directional axes. The performance of these control laws was examined in engineering simulation. A canard deflection/rate requirement study was performed as part of the ""G'' command law evaluation at low angles of attack. Simulated coupled maneuvers revealed the need for command limiters in all three aircraft axes to prevent departure from controlled flight. When modified with command/maneuver limiters, the control laws were shown to be adequate to prevent aircraft departure during aggressive air combat maneuvering.
Spatio-Temporal Synchrony of Influenza in Cities across Israel: The “Israel Is One City” Hypothesis
Barnea, Oren; Huppert, Amit; Katriel, Guy; Stone, Lewi
2014-01-01
We analysed an 11-year dataset (1998–2009) of Influenza-Like Illness (ILI) that was based on surveillance of ∽23% of Israel's population. We examined whether the level of synchrony of ILI epidemics in Israel's 12 largest cities is high enough to view Israel as a single epidemiological unit. Two methods were developed to assess the synchrony: (1) City-specific attack rates were fitted to a simple model in order to estimate the temporal differences in attack rates and spatial differences in reporting rates of ILI. The model showed good fit to the data (R2 = 0.76) and revealed considerable differences in reporting rates of ILI in different cities (up to a factor of 2.2). (2) A statistical test was developed to examine the null hypothesis (H0) that ILI incidence curves in two cities are essentially identical, and was tested using ILI data. Upon examining all possible pairs of incidence curves, 77.4% of pairs were found not to be different (H0 was not rejected). It was concluded that all cities generally have the same attack rate and follow the same epidemic curve each season, although the attack rate changes from season to season, providing strong support for the “Israel is one city” hypothesis. The cities which were the most out of synchronization were Bnei Brak, Beersheba and Haifa, the latter two being geographically remote from all other cities in the dataset and the former geographically very close to several other cities but socially separate due to being populated almost exclusively by ultra-orthodox Jews. Further evidence of assortative mixing of the ultra-orthodox population can be found in the 2001–2002 season, when ultra-orthodox cities and neighborhoods showed distinctly different incidence curves compared to the general population. PMID:24622820
Reactive strategies for containing developing outbreaks of pandemic influenza
2011-01-01
Background In 2009 and the early part of 2010, the northern hemisphere had to cope with the first waves of the new influenza A (H1N1) pandemic. Despite high-profile vaccination campaigns in many countries, delays in administration of vaccination programs were common, and high vaccination coverage levels were not achieved. This experience suggests the need to explore the epidemiological and economic effectiveness of additional, reactive strategies for combating pandemic influenza. Methods We use a stochastic model of pandemic influenza to investigate realistic strategies that can be used in reaction to developing outbreaks. The model is calibrated to documented illness attack rates and basic reproductive number (R0) estimates, and constructed to represent a typical mid-sized North American city. Results Our model predicts an average illness attack rate of 34.1% in the absence of intervention, with total costs associated with morbidity and mortality of US$81 million for such a city. Attack rates and economic costs can be reduced to 5.4% and US$37 million, respectively, when low-coverage reactive vaccination and limited antiviral use are combined with practical, minimally disruptive social distancing strategies, including short-term, as-needed closure of individual schools, even when vaccine supply-chain-related delays occur. Results improve with increasing vaccination coverage and higher vaccine efficacy. Conclusions Such combination strategies can be substantially more effective than vaccination alone from epidemiological and economic standpoints, and warrant strong consideration by public health authorities when reacting to future outbreaks of pandemic influenza. PMID:21356128
Romón, Pedro; Aparicio, Domitila; Palacios, Francisco; Iturrondobeitia, Juan Carlos; Hance, Thierry; Goldarazena, Arturo
2017-09-01
Concentrations of four monoterpenes were determined in needles of Pinus radiata (D.Don) (Pinales: Pinaceae) trees that were attacked or nonattacked by Tomicus piniperda (L.) (Coleoptera: Scolytinae). Compounds were identified and quantified by gas chromatography-mass spectrometry. The mean ambient temperature was obtained using climate-recording data loggers. The effect of limonene on field aggregation was also evaluated at three limonene release rates using Lindgren attractant-baited traps and trap logs. Attacked trees produced less α-pinene in March, July, and November than nonattacked trees, less β-pinene in July and November, and less limonene from May to November. Limonene reduced the attraction of T. piniperda to attractant-baited traps and trap logs. Results were linked to better responses to high temperatures, with respect to terpene contents, by the nonattacked trees after the spring attack. © The Author 2017. Published by Oxford University Press on behalf of Entomological Society of America.
Efficient Web Vulnerability Detection Tool for Sleeping Giant-Cross Site Request Forgery
NASA Astrophysics Data System (ADS)
Parimala, G.; Sangeetha, M.; AndalPriyadharsini, R.
2018-04-01
Now day’s web applications are very high in the rate of usage due to their user friendly environment and getting any information via internet but these web applications are affected by lot of threats. CSRF attack is one of the serious threats to web applications which is based on the vulnerabilities present in the normal web request and response of HTTP protocol. It is hard to detect but hence still it is present in most of the existing web applications. In CSRF attack, without user knowledge the unwanted actions on a reliable websites are forced to happen. So it is placed in OWASP’s top 10 Web Application attacks list. My proposed work is to do a real time scan of CSRF vulnerability attack in given URL of the web applications as well as local host address for any organization using python language. Client side detection of CSRF is depended on Form count which is presented in that given web site.
Gaul, C; Christmann, N; Schröder, D; Weber, R; Shanib, H; Diener, H C; Holle, D
2012-05-01
Data on clinical differences between episodic (eCH) and chronic cluster headache (cCH) and accompanying migraine features are limited. History and clinical features of 209 consecutive cluster headache patients (144 eCH, 65 cCH; male:female ratio 3.4 : 1) were obtained in a tertiary headache centre by face-to-face interviews. Relationship between occurrence of accompanying symptoms, pain intensity, comorbid migraine, and circannual and circadian rhythmicity was analysed. 99.5% of patients reported a minimum of one ipsilateral cranial autonomic symptom (CAS); 80% showed at least three CAS. A seasonal rhythmicity was observed in both eCH and cCH. A comorbid headache disorder occurred in 25%. No significant difference was detected between patients with comorbid migraine and without regarding occurrence of phonophobia, photophobia or nausea during cluster attacks. Patients with comorbid migraine reported allodynia significantly (p = 0.022) more often during cluster attacks than patients without comorbid migraine. Occurrence of CAS and attack frequency, as well as periodic patterns of attacks, are relatively uniform in eCH and cCH. Multiple CAS are not related to pain intensity. Allodynia during cluster attacks is a frequent symptom. The unexpectedly high rate of accompanying migrainous features during cluster attacks cannot be explained by comorbid migraine.
Habitat-specific foraging of prothonotary warblers: Deducing habitat quality
Lyons, J.E.
2005-01-01
Foraging behavior often reflects food availability in predictable ways. For example, in habitats where food availability is high, predators should attack prey more often and move more slowly than in habitats where food availability is low. To assess relative food availability and habitat quality, I studied the foraging behavior of breeding Prothonotary Warblers (Protonotaria citrea) in two forest habitat types, cypress-gum swamp forest and coastal-plain levee forest. I quantified foraging behavior with focal animal sampling and continuous recording during foraging bouts. I measured two aspects of foraging behavior: 1) prey attack rate (attacks per minute), using four attack maneuvers (glean, sally, hover, strike), and 2) foraging speed (movements per minute), using three types of movement (hop, short flight [???1 m], long flight [>1 m]). Warblers attacked prey more often in cypress-gum swamp forest than in coastal-plain levee forest. Foraging speed, however, was not different between habitats. I also measured foraging effort (% time spent foraging) and relative frequency of attack maneuvers employed in each habitat; neither of these variables was influenced by forest type. I conclude that Prothonotary Warblers encounter more prey when foraging in cypress-gum swamps than in coastal-plain levee forest, and that greater food availability results in higher density and greater reproductive success for birds breeding in cypress-gum swamp.
Injury rates during the 1988 US Olympic Team Trials for taekwondo.
Zemper, E D; Pieter, W
1989-01-01
Injury rates were recorded during the 1988 US Olympic Team Trials for taekwondo involving 48 men and 48 women. The injury rate for men (12.74/100 athlete-exposures) was about 40 per cent higher than the rate for women (9.01/100 athlete-exposures). The foot and the head were the most frequently injured body parts. Contusions were the predominant type of injury, and concussions were recorded for both men and women. A large proportion (41 per cent) of the men's injuries were the result of receiving a blow from an unblocked attack. For the women the most common injury situation (40 per cent) was while attacking with a kick. For both men and women, 15 per cent of the reported injuries were time-loss injuries. The head injuries found in this study are discussed with reference to the high impact velocities and momentum levels generated during taekwondo kicking. Recommendations are made with regard to protective equipment testing and rule changes to reduce the possibility of cerebral injury. PMID:2620229
Stage-structured infection transmission and a spatial epidemic: a model for Lyme disease.
Caraco, Thomas; Glavanakov, Stephan; Chen, Gang; Flaherty, Joseph E; Ohsumi, Toshiro K; Szymanski, Boleslaw K
2002-09-01
A greater understanding of the rate at which emerging disease advances spatially has both ecological and applied significance. Analyzing the spread of vector-borne disease can be relatively complex when the vector's acquisition of a pathogen and subsequent transmission to a host occur in different life stages. A contemporary example is Lyme disease. A long-lived tick vector acquires infection during the larval blood meal and transmits it as a nymph. We present a reaction-diffusion model for the ecological dynamics governing the velocity of the current epidemic's spread. We find that the equilibrium density of infectious tick nymphs (hence the risk of human disease) can depend on density-independent survival interacting with biotic effects on the tick's stage structure. The local risk of infection reaches a maximum at an intermediate level of adult tick mortality and at an intermediate rate of juvenile tick attacks on mammalian hosts. If the juvenile tick attack rate is low, an increase generates both a greater density of infectious nymphs and an increased spatial velocity. However, if the juvenile attack rate is relatively high, nymph density may decline while the epidemic's velocity still increases. Velocities of simulated two-dimensional epidemics correlate with the model pathogen's basic reproductive number (R0), but calculating R0 involves parameters of both host infection dynamics and the vector's stage-structured dynamics.
Sputtering Erosion Measurement on Boron Nitride as a Hall Thruster Material
NASA Technical Reports Server (NTRS)
Britton, Melissa; Waters, Deborah; Messer, Russell; Sechkar, Edward; Banks, Bruce
2002-01-01
The durability of a high-powered Hall thruster may be limited by the sputter erosion resistance of its components. During normal operation, a small fraction of the accelerated ions will impact the interior of the main discharge channel, causing its gradual erosion. A laboratory experiment was conducted to simulate the sputter erosion of a Hall thruster. Tests of sputter etch rate were carried out using 300 to 1000 eV Xenon ions impinging on boron nitride substrates with angles of attack ranging from 30 to 75 degrees from horizontal. The erosion rates varied from 3.41 to 14.37 Angstroms/[sec(mA/sq cm)] and were found to depend on the ion energy and angle of attack, which is consistent with the behavior of other materials.
Sung, Sharon C; Rush, A John; Earnest, Arul; Lim, Leslie E C; Pek, Maeve P P; Choi, Joen M F; Ng, Magdalene P K; Ong, Marcus E H
2018-01-01
Patients with panic-related anxiety often initially present to the emergency department (ED) complaining of respiratory or cardiac symptoms, but rates of detection of panic symptoms by ED physicians remain low. This study was undertaken to evaluate the relevance of panic attacks and panic disorder in ED patients who present with cardiopulmonary symptoms and to determine whether a brief symptom-based tool could be constructed to assist in rapid recognition of panic-related anxiety in the ED setting. English-speaking adult ED patients with a chief complaint of palpitations, chest pain, dizziness, or difficulty breathing were evaluated for the presence of panic attacks and panic disorder with the Structured Clinical Interview for DSM-IV Axis I Disorders. Participants completed self-report measures to assess panic-related symptoms, comorbid psychiatric conditions, health-related disability, and health service use. In this sample (N=200), 23.5% had panic attacks and 23.0% had panic disorder. Both groups reported higher rates of panic attack symptoms, greater psychiatric comorbidity, greater health-related disability, and higher rates of ED and mental health service use compared with those without either condition. A brief 7-item tool consisting of panic symptoms identified patients with panic attacks or panic disorder with 85% accuracy (area under the curve=0.90, sensitivity=82%, specificity=88%). Patients with panic attacks or panic disorder commonly present to the ED, but often go unrecognized. A brief 7-item clinician rating scale accurately identifies these patients among those ED patients presenting with cardiopulmonary complaints.
NASA Technical Reports Server (NTRS)
Wittliff, C. E.
1982-01-01
The aerodynamic heating of a tip-fin controller mounted on a Space Shuttle Orbiter model was studied experimentally in the Calspan Advanced Technology Center 96 inch Hypersonic Shock Tunnel. A 0.0175 scale model was tested at Mach numbers from 10 to 17.5 at angles of attack typical of a shuttle entry. The study was conducted in two phases. In phase 1 testing a thermographic phosphor technique was used to qualitatively determine the areas of high heat-transfer rates. Based on the results of this phase, the model was instrumented with 40 thin-film resistance thermometers to obtain quantitative measurements of the aerodynamic heating. The results of the phase 2 testing indicate that the highest heating rates, which occur on the leading edge of the tip-fin controller, are very sensitive to angle of attack for alpha or = 30 deg. The shock wave from the leading edge of the orbiter wing impinges on the leading edge of the tip-fin controller resulting in peak values of h/h(Ref) in the range from 1.5 to 2.0. Away from the leading edge, the heat-transfer rates never exceed h/h(Ref) = 0.25 when the control surface, is not deflected. With the control surface deflected 20 deg, the heat-transfer rates had a maximum value of h/h(Ref) = 0.3. The heating rates are quite nonuniform over the outboard surface and are sensitive to angle of attack.
Outbreaks of influenza-like illness in long-term care facilities in Winnipeg, Canada.
Mahmud, Salaheddin M; Thompson, Laura H; Nowicki, Deborah L; Plourde, Pierre J
2013-11-01
Outbreaks of influenza-like illness (ILI) are common in long-term care facilities (LTCFs) and result in significant morbidity and mortality among residents. We describe patterns of reported ILI outbreaks in LTCFs in Winnipeg, Canada, and examine LTCF and outbreak characteristics that influence the clinical outcomes of these outbreaks. We analyzed the electronic records of all ILI outbreaks reported by LTCFs in Winnipeg from 2003 to 2011. Outbreak duration, ILI attack rates among staff and residents, and residents' death rates were calculated by presumed viral etiology, staff vaccination rates, type of influenza chemoprophylaxis used, and time to notification to public health. Of a total of 154 reported outbreaks, most (N=80) were attributed to influenza, and these outbreaks tended to have higher attack and death rates among LTCF residents compared with outbreaks caused by other respiratory viruses (12) or those of unknown etiology (62). About 92% of residents and 38% of staff of the average LTCFs were vaccinated. Chemoprophylaxis was used in 57·5% of influenza outbreaks. Regardless of presumed viral etiology, outbreaks reported within 3 days of onset ended sooner and had lower attack and mortality rates among residents. Influenza-like illness outbreaks still occur among highly immunized LTCF residents, so in addition to vaccination of staff and residents, it is important to maintain competent infection control practices. Early identification and notification to public health authorities and possibly early initiation of control measures could improve clinical outcomes of ILI outbreaks. © 2012 John Wiley & Sons Ltd.
Kinetics of enzymatic high-solid hydrolysis of lignocellulosic biomass studied by calorimetry.
Olsen, Søren N; Lumby, Erik; McFarland, Kc; Borch, Kim; Westh, Peter
2011-03-01
Enzymatic hydrolysis of high-solid biomass (>10% w/w dry mass) has become increasingly important as a key step in the production of second-generation bioethanol. To this end, development of quantitative real-time assays is desirable both for empirical optimization and for detailed kinetic analysis. In the current work, we have investigated the application of isothermal calorimetry to study the kinetics of enzymatic hydrolysis of two substrates (pretreated corn stover and Avicel) at high-solid contents (up to 29% w/w). It was found that the calorimetric heat flow provided a true measure of the hydrolysis rate with a detection limit of about 500 pmol glucose s(-1). Hence, calorimetry is shown to be a highly sensitive real-time method, applicable for high solids, and independent on the complexity of the substrate. Dose-response experiments with a typical cellulase cocktail enabled a multidimensional analysis of the interrelationships of enzyme load and the rate, time, and extent of the reaction. The results suggest that the hydrolysis rate of pretreated corn stover is limited initially by available attack points on the substrate surface (<10% conversion) but becomes proportional to enzyme dosage (excess of attack points) at later stages (>10% conversion). This kinetic profile is interpreted as an increase in polymer end concentration (substrate for CBH) as the hydrolysis progresses, probably due to EG activity in the enzyme cocktail. Finally, irreversible enzyme inactivation did not appear to be the source of reduced hydrolysis rate over time.
Lou, Yonggen; Baldwin, Ian T.
2004-01-01
Although nitrogen (N) availability is known to alter constitutive resistance against herbivores, its influence on herbivore-induced responses, including signaling pathways, transcriptional signatures, and the subsequently elicited chemical defenses is poorly understood. We used the native tobacco, Nicotiana attenuata, which germinates in the postfire environment and copes with large changes in soil N during postfire succession, to compare a suite of Manduca sexta- and elicitor-induced responses in plants grown under high- and low-N (LN) supply rates. LN supply decreased relative growth rates and biomass by 35% at 40 d compared to high-N plants; furthermore, it also attenuated (by 39 and 60%) the elicitor-induced jasmonate and salicylate bursts, two N-intensive direct defenses (nicotine and trypsin proteinase inhibitors, albeit by different mechanisms), and carbon-containing nonvolatile defenses (rutin, chlorogenic acid, and diterpene glycosides), but did not affect the induced release of volatiles (cis-α-bergamotene and germacrene A), which function as indirect defenses. M. sexta and methyl jasmonate-induced transcriptional responses measured with a microarray enriched in herbivore-induced genes were also substantially reduced in plants grown under LN supply rates. In M. sexta-attacked LN plants, only 36 (45%) up-regulated and 46 (58%) down-regulated genes showed the same regulation as those in attacked high-N plants. However, transcriptional responses frequently directly countered the observed metabolic changes. Changes in a leaf's sensitivity to elicitation, an attacked leaf's waning ability to export oxylipin wound signals, and/or resource limitations in LN plants can account for the observed results, underscoring the conclusion that defense activation is a resource-intensive response. PMID:15133153
Amarenco, Pierre; Goldstein, Larry B; Sillesen, Henrik; Benavente, Oscar; Zweifler, Richard M; Callahan, Alfred; Hennerici, Michael G; Zivin, Justin A; Welch, K Michael A
2010-03-01
Noncoronary forms of atherosclerosis (including transient ischemic attacks or stroke of carotid origin or >50% stenosis of the carotid artery) are associated with a 10-year vascular risk of >20% and are considered as a coronary heart disease (CHD) -risk equivalent from the standpoint of lipid management. The Stroke Prevention by Aggressive Reduction in Cholesterol Levels (SPARCL) trial included patients with stroke or transient ischemic attack and no known CHD regardless of the presence of carotid atherosclerosis. We evaluated the risk of developing clinically recognized CHD in SPARCL patients. A total of 4731 patients (mean age, 63 years) was randomized to 80 mg/day atorvastatin placebo. The rates of major coronary event, any CHD event, and any revascularization procedure were evaluated. After 4.9 years of follow-up, the risks of a major coronary event and of any CHD end point in the placebo group were 5.1% and 8.6%, respectively. The rate of outcome of stroke decreased over time, whereas the major coronary event rate was stable. Relative to those having a large vessel-related stroke at baseline, those having a transient ischemic attack, hemorrhagic stroke, small vessel stroke, or a stroke of unknown cause had similar absolute rates for a first major coronary event and for any CHD event; transient ischemic attack, small vessel, and unknown cause groups had lower absolute revascularization procedure rates. Major coronary event, any CHD event, and any revascularization procedure rates were similarly reduced in all baseline stroke subtypes in the atorvastatin arm compared with placebo with no heterogeneity between groups. CHD risk can be substantially reduced by atorvastatin therapy in patients with recent stroke or transient ischemic attack regardless of stroke subtype.
Szykman, Micaela; Engh, Anne L.; Van Horn, Russell C.; Boydston, Erin E.; Scribner, Kim T.; Holekamp, Kay E.
2003-01-01
Spotted hyenas (Crocuta crocuta) are gregarious carnivores. The females are socially dominant to males, and adult males rarely direct aggression toward adult females. This study analyzed all cases in which adult immigrant males behaved aggressively toward adult females in a large population of free-living hyenas in Kenya, observed for 11 years. Our goals were to describe the conditions under which male attacks on females occur, and address possible adaptive functions. Most aggression directed by adult immigrant males against females occurred when coalitions of two or more males attacked a single adult female, who typically responded by defending herself and fighting back. Male aggression against females frequently occurred at sites of ungulate kills, but males never behaved aggressively toward females over food, and all male attacks on females were unprovoked. Although no mounting or other copulatory behaviors ever occurred during or immediately after an attack, the number of male attacks on females peaked around the time of conception. Daily rates at which males attacked females did not vary with female social rank. However, daily attack rates did vary significantly with female reproductive state, and the highest rates of male attack on females were observed during the two stages of the reproductive cycle during which females were most likely to conceive litters. The adaptive significance of male aggression against females in this species remains unknown, but a tight association between male attacks on females and a female's time of conception provides strong evidence of some role for male aggression in hyena sexual behavior. In particular, our data are consistent with hypotheses suggesting that male aggression toward females in this species either serves to inform females about male fitness or represents sexual harassment.
Network Anomaly Detection Based on Wavelet Analysis
NASA Astrophysics Data System (ADS)
Lu, Wei; Ghorbani, Ali A.
2008-12-01
Signal processing techniques have been applied recently for analyzing and detecting network anomalies due to their potential to find novel or unknown intrusions. In this paper, we propose a new network signal modelling technique for detecting network anomalies, combining the wavelet approximation and system identification theory. In order to characterize network traffic behaviors, we present fifteen features and use them as the input signals in our system. We then evaluate our approach with the 1999 DARPA intrusion detection dataset and conduct a comprehensive analysis of the intrusions in the dataset. Evaluation results show that the approach achieves high-detection rates in terms of both attack instances and attack types. Furthermore, we conduct a full day's evaluation in a real large-scale WiFi ISP network where five attack types are successfully detected from over 30 millions flows.
Computational Investigation of Tangential Slot Blowing on a Generic Chined Forebody
NASA Technical Reports Server (NTRS)
Agosta-Greenman, Roxana M.; Gee, Ken; Cummings, Russell M.; Schiff, Lewis B.
1995-01-01
The effect of tangential slot blowing on the flowfield about a generic chined forebody at high angles of attack is investigated numerically using solutions of the thin-layer, Reynolds-averaged, Navier-Stokes equations. The effects of jet mass now ratios, angle of attack, and blowing slot location in the axial and circumferential directions are studied. The computed results compare well with available wind-tunnel experimental data. Computational results show that for a given mass now rate, the yawing moments generated by slot blowing increase as the body angle of attack increases. It is observed that greater changes in the yawing moments are produced by a slot located closest to the lip of the nose. Also, computational solutions show that inboard blowing across the top surface is more effective at generating yawing moments than blowing outboard from the bottom surface.
NASA Technical Reports Server (NTRS)
Gates, Ordway B., Jr.; Woodling, C. H.
1959-01-01
Theoretical analysis of the longitudinal behavior of an automatically controlled supersonic interceptor during the attack phase against a nonmaneuvering target is presented. Control of the interceptor's flight path is obtained by use of a pitch rate command system. Topics lift, and pitching moment, effects of initial tracking errors, discussion of normal acceleration limited, limitations of control surface rate and deflection, and effects of neglecting forward velocity changes of interceptor during attack phase.
Lodewyck, Jérôme; Debuisschert, Thierry; García-Patrón, Raúl; Tualle-Brouri, Rosa; Cerf, Nicolas J; Grangier, Philippe
2007-01-19
An intercept-resend attack on a continuous-variable quantum-key-distribution protocol is investigated experimentally. By varying the interception fraction, one can implement a family of attacks where the eavesdropper totally controls the channel parameters. In general, such attacks add excess noise in the channel, and may also result in non-Gaussian output distributions. We implement and characterize the measurements needed to detect these attacks, and evaluate experimentally the information rates available to the legitimate users and the eavesdropper. The results are consistent with the optimality of Gaussian attacks resulting from the security proofs.
Anti-spoofing for display and print attacks on palmprint verification systems
NASA Astrophysics Data System (ADS)
Kanhangad, Vivek; Bhilare, Shruti; Garg, Pragalbh; Singh, Pranjalya; Chaudhari, Narendra
2015-05-01
A number of approaches for personal authentication using palmprint features have been proposed in the literature, majority of which focus on improving the matching performance. However, of late, preventing potential attacks on biometric systems has become a major concern as more and more biometric systems get deployed for wide range of applications. Among various types of attacks, sensor level attack, commonly known as spoof attack, has emerged as the most common attack due to simplicity in its execution. In this paper, we present an approach for detection of display and print based spoof attacks on palmprint verifcation systems. The approach is based on the analysis of acquired hand images for estimating surface re ectance. First and higher order statistical features computed from the distributions of pixel intensities and sub-band wavelet coeefficients form the feature set. A trained binary classifier utilizes the discriminating information to determine if the acquired image is of real hand or a fake one. Experiments are performed on a publicly available hand image dataset, containing 1300 images corresponding to 230 subjects. Experimental results show that the real hand biometrics samples can be substituted by the fake digital or print copies with an alarming spoof acceptance rate as high as 79.8%. Experimental results also show that the proposed spoof detection approach is very effective for discriminating between real and fake palmprint images. The proposed approach consistently achieves over 99% average 10-fold cross validation classification accuracy in our experiments.
Do Unexpected Panic Attacks Occur Spontaneously?
Meuret, Alicia E.; Rosenfield, David; Wilhelm, Frank H.; Zhou, Enlu; Conrad, Ansgar; Ritz, Thomas; Roth, Walton T.
2012-01-01
Background Spontaneous or unexpected panic attacks, per definition, occur out-of-the blue, in absence of cues or triggers. Accordingly, physiological arousal or instability should occur at the onset of or during the attack, but not preceding it. To test this hypothesisweexaminedif points of significant autonomic changes preceded the onset of spontaneous panic attacks. Methods Forty-three panic disorder patients underwent repeated 24-hour ambulatory monitoring. Thirteen naturally panic attacks were recorded during 1,960 hours of monitoring. Minute-by-minute epochs beginning 60 minutes before, and continuing to 10 minutes after, the onset of individual attacks were examined for respiration, heart rate, and skin conductance level. Measures were controlled for physical activity and vocalization, and compared to time matched control periods within the same person. Results Significant patterns of instability across a numberof autonomic and respiratory variables were detected as early as 47 minutes before panic onset. The final minutes prior to onset were dominated by respiratory changes, with significant decreases in tidal volume followed by abrupt PCO2 increases. Panic attack onset was characterized by heart rate and tidal volume increases and a drop in PCO2. Symptom report was consistent with these changes. Skin conductance levels were generally elevated in the hour before and duringthe attacks. Changes in the matched control periods were largely absent. Conclusions Significant autonomic irregularities preceded the onset of attacks that were reported as abrupt and unexpected. The findings invite reconsideration of the current diagnostic distinction betweenuncuedand cued panic attacks. PMID:21783179
Enhancing Electromagnetic Side-Channel Analysis in an Operational Environment
NASA Astrophysics Data System (ADS)
Montminy, David P.
Side-channel attacks exploit the unintentional emissions from cryptographic devices to determine the secret encryption key. This research identifies methods to make attacks demonstrated in an academic environment more operationally relevant. Algebraic cryptanalysis is used to reconcile redundant information extracted from side-channel attacks on the AES key schedule. A novel thresholding technique is used to select key byte guesses for a satisfiability solver resulting in a 97.5% success rate despite failing for 100% of attacks using standard methods. Two techniques are developed to compensate for differences in emissions from training and test devices dramatically improving the effectiveness of cross device template attacks. Mean and variance normalization improves same part number attack success rates from 65.1% to 100%, and increases the number of locations an attack can be performed by 226%. When normalization is combined with a novel technique to identify and filter signals in collected traces not related to the encryption operation, the number of traces required to perform a successful attack is reduced by 85.8% on average. Finally, software-defined radios are shown to be an effective low-cost method for collecting side-channel emissions in real-time, eliminating the need to modify or profile the target encryption device to gain precise timing information.
Characterization of collective Gaussian attacks and security of coherent-state quantum cryptography.
Pirandola, Stefano; Braunstein, Samuel L; Lloyd, Seth
2008-11-14
We provide a simple description of the most general collective Gaussian attack in continuous-variable quantum cryptography. In the scenario of such general attacks, we analyze the asymptotic secret-key rates which are achievable with coherent states, joint measurements of the quadratures and one-way classical communication.
Richards, Robert J; Hammitt, James K
2002-09-01
Although surgery is recommended after two or more attacks of uncomplicated diverticulitis, the optimal timing for surgery in terms of cost-effectiveness is unknown. A Markov model was used to compare the costs and outcomes of performing surgery after one, two, or three uncomplicated attacks in 60-year-old hypothetical cohorts. Transition state probabilities were assigned values using published data and expert opinion. Costs were estimated from Medicare reimbursement rates. Surgery after the third attack is cost saving, yielding more years of life and quality adjusted life years at a lower cost than the other two strategies. The results were not sensitive to many of the variables tested in the model or to changes made in the discount rate (0-5%). In conclusion, performing prophylactic resection after the third attack of diverticulitis is cost saving in comparison to resection performed after the first or second attacks and remains cost-effective during sensitivity analysis.
Teacher Victimization in Authoritative School Environments
ERIC Educational Resources Information Center
Kapa, Ryan R.; Luke, Jeremy; Moulthrop, Dorothy; Gimbert, Belinda
2018-01-01
Background: Victimization in schools is not limited to students. Teachers increasingly face threats and attacks from their students. An authoritative school environment, characterized by high structure and support, has been associated with lower rates of victimization. The purpose of this study was to explore the relationship between authoritative…
ERIC Educational Resources Information Center
Davis, Robert E.
2017-01-01
Cyber attackers targeting large corporations achieved a high perimeter penetration success rate during 2013, resulting in many corporations incurring financial losses. Corporate information technology leaders have a fiduciary responsibility to implement information security domain processes that effectually address the challenges for preventing…
Flashbulb memories of Paris attacks
El Haj, Mohamad; Gandolphe, Marie-Charlotte; Wawrziczny, Emilie; Antoine, Pascal
2016-01-01
Abstract Rationale: Flashbulb memories are detailed and vivid memories of attributes of the reception context of surprising and emotionally arousing public events. Patient concerns and diagnosis: This paper offers a fine-grained view of flashbulb memories in a patient with mild Alzheimer's disease (AD). Interventions: The patient underwent a directed interview about the 13 November 2015 attacks in Paris. Outcomes: Unlike her memory about the date and month of the attacks, the patient provided accurate information about the year, time and places they occurred. The patient also provided accurate information about how she first became aware of the attacks, where she was, with whom, what she was doing, and what time it was when she learned about them. As for the affective characteristics of these memories, she tended to have high ratings of vividness and rehearsal. Negative emotional states and great surprise and novelty were also reported. Lessons: By assessing the impact of flashbulb memories in this patient with AD, this paper offers a unique view into how such memories may trigger a considerable recall of context as well much subjective reliving. PMID:27861395
El Haj, Mohamad; Gandolphe, Marie-Charlotte; Wawrziczny, Emilie; Antoine, Pascal
2016-11-01
Flashbulb memories are detailed and vivid memories of attributes of the reception context of surprising and emotionally arousing public events. This paper offers a fine-grained view of flashbulb memories in a patient with mild Alzheimer's disease (AD). The patient underwent a directed interview about the 13 November 2015 attacks in Paris. Unlike her memory about the date and month of the attacks, the patient provided accurate information about the year, time and places they occurred. The patient also provided accurate information about how she first became aware of the attacks, where she was, with whom, what she was doing, and what time it was when she learned about them. As for the affective characteristics of these memories, she tended to have high ratings of vividness and rehearsal. Negative emotional states and great surprise and novelty were also reported. By assessing the impact of flashbulb memories in this patient with AD, this paper offers a unique view into how such memories may trigger a considerable recall of context as well much subjective reliving.
... breathing; Respiratory rate - rapid and deep; Hyperventilation syndrome; Panic attack - hyperventilation; Anxiety - hyperventilation ... from an emotional cause such as during a panic attack. Or, it can be due to a medical ...
Simple and high-speed polarization-based QKD
NASA Astrophysics Data System (ADS)
Grünenfelder, Fadri; Boaron, Alberto; Rusca, Davide; Martin, Anthony; Zbinden, Hugo
2018-01-01
We present a simplified BB84 protocol with only three quantum states and one decoy-state level. We implement this scheme using the polarization degree of freedom at telecom wavelength. Only one pulsed laser is used in order to reduce possible side-channel attacks. The repetition rate of 625 MHz and the achieved secret bit rate of 23 bps over 200 km of standard fiber are the actual state of the art.
Shimizu, S; Kagawa, J; Ishiguro, M
2001-07-01
The number of nocturnal visits of asthmatic attack patients to the emergency room of Yokohama Medical Association's Clinic from January 1990 to December 1991 was compared to daily levels of air pollution (NO, NO2, SO2 and SPM) and weather (temperature and relative humidity) variables measured in Yokohama City. Trend-cycle components (Trend) that control for the weekly effects, other irregular variance for asthmatic attack incidence and environmental parameter measurements were estimated from the original data series using the method of Akaike and Ishiguro (1980). The rate of increase for each environmental parameter was then calculated from its trend-cycle components. We classified the data into four stages on the basis of rising and falling temperature and humidity. For each stage of temperature and humidity, fluctuation we estimated correlations between the number of asthmatic attack visits and original data series measurements, estimated trend-cycle components, and calculated rates of increase for each of the air pollutants. The daily number of asthmatic attack visits was negatively correlated to the daily mean values of all air pollutants, but positively correlated to the daily mean temperature and relative humidity. The trend-cycle components of the air pollutants were also negatively correlated to the frequencies of asthmatic attacks (p < 0.01 for all pollutants except NO2). In contrast, the number of asthmatic attack visits were in general positively correlated with increasing levels of pollutants. Furthermore, when both temperature and relative humidity decreased, significant correlations (r > 0.31, p < 0.001) between the number of asthmatic attacks and increased rates of all air pollutants were observed (r: NO2 > NO > SO2 > SPM).
Santer, Roger D.; Rind, F. Claire; Simmons, Peter J.
2012-01-01
Many arthropods possess escape-triggering neural mechanisms that help them evade predators. These mechanisms are important neuroethological models, but they are rarely investigated using predator-like stimuli because there is often insufficient information on real predator attacks. Locusts possess uniquely identifiable visual neurons (the descending contralateral movement detectors, DCMDs) that are well-studied looming motion detectors. The DCMDs trigger ‘glides’ in flying locusts, which are hypothesised to be appropriate last-ditch responses to the looms of avian predators. To date it has not been possible to study glides in response to stimuli simulating bird attacks because such attacks have not been characterised. We analyse video of wild black kites attacking flying locusts, and estimate kite attack speeds of 10.8±1.4 m/s. We estimate that the loom of a kite’s thorax towards a locust at these speeds should be characterised by a relatively low ratio of half size to speed (l/|v|) in the range 4–17 ms. Peak DCMD spike rate and gliding response occurrence are known to increase as l/|v| decreases for simple looming shapes. Using simulated looming discs, we investigate these trends and show that both DCMD and behavioural responses are strong to stimuli with kite-like l/|v| ratios. Adding wings to looming discs to produce a more realistic stimulus shape did not disrupt the overall relationships of DCMD and gliding occurrence to stimulus l/|v|. However, adding wings to looming discs did slightly reduce high frequency DCMD spike rates in the final stages of object approach, and slightly delay glide initiation. Looming discs with or without wings triggered glides closer to the time of collision as l/|v| declined, and relatively infrequently before collision at very low l/|v|. However, the performance of this system is in line with expectations for a last-ditch escape response. PMID:23209660
Split-second escape decisions in blue tits (Parus caeruleus)
NASA Astrophysics Data System (ADS)
Lind, Johan; Kaby, Ulrika; Jakobsson, Sven
2002-07-01
Bird mortality is heavily affected by birds of prey. Under attack, take-off is crucial for survival and even minor mistakes in initial escape response can have devastating consequences. Birds may respond differently depending on the character of the predator's attack and these split-second decisions were studied using a model merlin (Falco columbarius) that attacked feeding blue tits (Parus caeruleus) from two different attack angles in two different speeds. When attacked from a low attack angle they took off more steeply than when attacked from a high angle. This is the first study to show that escape behaviour also depends on predator attack speed. The blue tits responded to a high-speed attack by dodging sideways more often than when attacked at a low speed. Escape speed was not significantly affected by the different treatments. Although they have only a split-second before escaping an attack, blue tits do adjust their escape strategy to the prevailing attack conditions.
Combat Agility Management System (CAMS)
NASA Technical Reports Server (NTRS)
Skow, Andrew; Porada, William
1994-01-01
The proper management of energy becomes a complex task in fighter aircraft which have high angle of attack (AOA) capability. Maneuvers at high AOA are accompanied by high bleed rates (velocity decrease), a characteristic that is usually undesirable in a typical combat arena. Eidetics has developed under NASA SBIR Phase 1 and NAVAIR SBIR Phase 2 contracts a system which allows a pilot to more easily and effectively manage the trade-off of energy (airspeed or altitude) for turn rate while not imposing hard limits on the high AOA nose pointing capability that can be so important in certain air combat maneuver situations. This has been accomplished by incorporating a two-stage angle of attack limiter into the flight control laws. The first stage sets a limit on AOA to achieve a limit on the maximum bleed rate (selectable) by limiting AOA to values which are dependent on the aircraft attitude and dynamic pressure (or flight path, velocity, and altitude). The second stage sets an AOA limit near the AOA for C(sub l max). One of the principal benefits of such a system is that it enables a low-experience pilot to become much more proficient at managing his energy. The Phase 2 simulation work is complete, and an exploratory flight test on the F-18 HARV is planned for the Fall of 1994 to demonstrate/validate the concept.
Sandrini, G; Cerbo, R; Del Bene, E; Ferrari, A; Genco, S; Grazioli, I; Martelletti, P; Nappi, G; Pinessi, L; Sarchielli, P; Tamburro, P; Uslenghi, C; Zanchin, G
2007-01-01
Aims and methods: In this double-blind, double-dummy, randomised, parallel group, multicentre study, the efficacy of dosing and re-dosing of a fixed combination of indomethacin, prochlorperazine and caffeine (Indoprocaf) was compared with encapsulated sumatriptan in the acute treatment of two migraine attacks. Additionally, in the group taking Indoprocaf, two different oral formulations were tested: effervescent tablets and encapsulated coated tablets. Results: Of 297 patients randomised (150 assigned to Indoprocaf and 147 to sumatriptan), 281 were included in the intention-to-treat efficacy analysis. The initial dosing of Indoprocaf and sumatriptan was similarly effective with pain-free rates higher than 30% (95% CI of odds-ratio: 0.57–1.28) and headache relief rates of about 60% (95% CI of odds-ratio: 0.82–1.84) with both the drugs. The efficacy of re-dosing of Indoprocaf as rescue medication was more effective than that of sumatriptan with pain-free values of 47% vs. 27% in the total attacks with a statistically significant difference in the first migraine attack in favour of Indoprocaf. The efficacy of re-dosing to treat a recurrence/relapse was very high without differences between the drugs (pain-free: 60% with Indoprocaf and 50% with sumatriptan in the total attacks). Indoprocaf and sumatriptan were well-tolerated. Conclusion: The study demonstrated that the efficacy of the initial dosing of Indoprocaf was not higher than that of sumatriptan, but that the strategy to use the lowest effective dose as soon as the headache occurred, followed by a second dose if the headache has not relieved or to treat a relapse, was very effective, especially with Indoprocaf. PMID:17627707
Carrying weapons and intent to harm among Victorian secondary school students in 1999 and 2009.
Hemphill, Sheryl A; Tollit, Michelle A; Romaniuk, Helena; Williams, Joanne; Toumbourou, John W; Bond, Lyndal; Patton, George C
2013-12-16
To examine comparable survey data across 10 years to assess whether rates of self-reported weapon carrying and intent to harm others have increased as suggested in reported trends in violent offences. Population-based surveys administered to Victorian secondary school students in 1999 (8984 students) and 2009 (10 273 students) attending government, Catholic and independent schools. Student self-reports of carrying a weapon and attacking someone with the intent to harm in the past 12 months. In both surveys, about 15.0% of students reported carrying a weapon and about 7.0% reported attacking someone with intent to harm in the past 12 months, with higher rates among boys than girls. There was no change over time in the rates of students carrying weapons or attacking someone with the intent to harm, after controlling for demographic variables. In contrast to media portrayals and reported trends in violent offences, rates of students carrying weapons and attacking others with intent to harm have not changed between 1999 and 2009. These findings underline the importance of having national population-based data to regularly monitor the rates of these and related behaviours among young Australians.
Estimating the attack rate of pregnancy-associated listeriosis during a large outbreak.
Imanishi, Maho; Routh, Janell A; Klaber, Marigny; Gu, Weidong; Vanselow, Michelle S; Jackson, Kelly A; Sullivan-Chang, Loretta; Heinrichs, Gretchen; Jain, Neena; Albanese, Bernadette; Callaghan, William M; Mahon, Barbara E; Silk, Benjamin J
2015-01-01
In 2011, a multistate outbreak of listeriosis linked to contaminated cantaloupes raised concerns that many pregnant women might have been exposed to Listeria monocytogenes. Listeriosis during pregnancy can cause fetal death, premature delivery, and neonatal sepsis and meningitis. Little information is available to guide healthcare providers who care for asymptomatic pregnant women with suspected L. monocytogenes exposure. We tracked pregnancy-associated listeriosis cases using reportable diseases surveillance and enhanced surveillance for fetal death using vital records and inpatient fetal deaths data in Colorado. We surveyed 1,060 pregnant women about symptoms and exposures. We developed three methods to estimate how many pregnant women in Colorado ate the implicated cantaloupes, and we calculated attack rates. One laboratory-confirmed case of listeriosis was associated with pregnancy. The fetal death rate did not increase significantly compared to preoutbreak periods. Approximately 6,500-12,000 pregnant women in Colorado might have eaten the contaminated cantaloupes, an attack rate of ~1 per 10,000 exposed pregnant women. Despite many exposures, the risk of pregnancy-associated listeriosis was low. Our methods for estimating attack rates may help during future outbreaks and product recalls. Our findings offer relevant considerations for management of asymptomatic pregnant women with possible L. monocytogenes exposure.
Policies to Reduce Influenza in the Workplace: Impact Assessments Using an Agent-Based Model
Grefenstette, John J.; Galloway, David; Albert, Steven M.; Burke, Donald S.
2013-01-01
Objectives. We examined the impact of access to paid sick days (PSDs) and stay-at-home behavior on the influenza attack rate in workplaces. Methods. We used an agent-based model of Allegheny County, Pennsylvania, with PSD data from the US Bureau of Labor Statistics, standard influenza epidemic parameters, and the probability of staying home when ill. We compared the influenza attack rate among employees resulting from workplace transmission, focusing on the effects of presenteeism (going to work when ill). Results. In a simulated influenza epidemic (R0 = 1.4), the attack rate among employees owing to workplace transmission was 11.54%. A large proportion (72.00%) of this attack rate resulted from exposure to employees engaging in presenteeism. Universal PSDs reduced workplace infections by 5.86%. Providing 1 or 2 “flu days”—allowing employees with influenza to stay home—reduced workplace infections by 25.33% and 39.22%, respectively. Conclusions. PSDs reduce influenza transmission owing to presenteeism and, hence, the burden of influenza illness in workplaces. PMID:23763426
McCutcheon, Vivia V; Heath, Andrew C; Nelson, Elliot C; Bucholz, Kathleen K; Madden, Pamela A F; Martin, Nicholas G
2010-02-01
Individuals who experience one type of trauma often experience other types, yet few studies have examined the clustering of trauma. This study examines the clustering of traumatic events and associations of trauma with risk for single and co-occurring major depressive disorder (MDD) and panic attack for 20 years after first trauma. Lifetime histories of MDD, panic attack, and traumatic events were obtained from participants in an Australian twin sample. Latent class analysis was used to derive trauma classes based on each respondent's trauma history. Associations of the resulting classes and of parental alcohol problems and familial effects with risk for a first onset of single and co-occurring MDD and panic attack were examined from the year of first trauma to 20 years later. Traumatic events clustered into three distinct classes characterized by endorsement of little or no trauma, primarily nonassaultive, and primarily assaultive events. Individuals in the assaultive class were characterized by a younger age at first trauma, a greater number of traumatic events, and high rates of parental alcohol problems. Members of the assaultive trauma class had the strongest and most enduring risk for single and co-occurring lifetime MDD and panic attack. Assaultive trauma outweighed associations of familial effects and nonassaultive trauma with risk for 10 years following first trauma.
Analysis of counterfactual quantum key distribution using error-correcting theory
NASA Astrophysics Data System (ADS)
Li, Yan-Bing
2014-10-01
Counterfactual quantum key distribution is an interesting direction in quantum cryptography and has been realized by some researchers. However, it has been pointed that its insecure in information theory when it is used over a high lossy channel. In this paper, we retry its security from a error-correcting theory point of view. The analysis indicates that the security flaw comes from the reason that the error rate in the users' raw key pair is as high as that under the Eve's attack when the loss rate exceeds 50 %.
Madsen-Bouterse, Sally A; Schneider, David A; Zhuang, Dongyue; Dassanayake, Rohana P; Balachandran, Aru; Mitchell, Gordon B; O'Rourke, Katherine I
2016-09-01
Development of mice expressing either ovine (Tg338) or cervid (TgElk) prion protein (PrP) have aided in characterization of scrapie and chronic wasting disease (CWD), respectively. Experimental inoculation of sheep with CWD prions has demonstrated the potential for interspecies transmission but, infection with CWD versus classical scrapie prions may be difficult to differentiate using validated diagnostic platforms. In this study, mouse bioassay in Tg338 and TgElk was utilized to evaluate transmission of CWD versus scrapie prions from small ruminants. Mice (≥5 per homogenate) were inoculated with brain homogenates from clinically affected sheep or goats with naturally acquired classical scrapie, white-tailed deer with naturally acquired CWD (WTD-CWD) or sheep with experimentally acquired CWD derived from elk (sheep-passaged-CWD). Survival time (time to clinical disease) and attack rates (brain accumulation of protease resistant PrP, PrPres) were determined. Inoculation with classical scrapie prions resulted in clinical disease and 100 % attack rates in Tg338, but no clinical disease at endpoint (>300 days post-inoculation, p.i.) and low attack rates (6.8 %) in TgElk. Inoculation with WTD-CWD prions yielded no clinical disease or brain PrPres accumulation in Tg338 at endpoint (>500 days p.i.), but rapid onset of clinical disease (~121 days p.i.) and 100 % attack rate in TgElk. Sheep-passaged-CWD resulted in transmission to both mouse lines with 100 % attack rates at endpoint in Tg338 and an attack rate of ~73 % in TgElk with some culled due to clinical disease. These primary transmission observations demonstrate the potential of bioassay in Tg338 and TgElk to help differentiate possible infection with CWD versus classical scrapie prions in sheep and goats.
Ding, Zheyuan; Zhai, Yujia; Wu, Chen; Wu, Haocheng; Lu, Qinbao; Lin, Junfen; He, Fan
2017-06-01
In China, waterborne outbreaks of infectious diarrheal disease mainly occur in schools, and contaminated well water is a common source of pathogens. The objective of this review was to present the attack rates, durations of outbreak, pathogens of infectious diarrheal disease, and sanitary conditions of wells in primary and secondary schools in China, and to analyze risk factors and susceptibility of school children. Relevant articles and reports were identified by searching PubMed, Web of Science, China National Knowledge Infrastructure, China Information System for Disease Control and Prevention, and the Chinese Field Epidemiology Training Program. Essential information, including urban/rural areas, school types, attack rates, pathogens, durations of outbreak, report intervals, and interventions were extracted from the eligible articles. Wilcoxon signed-rank test, Kruskal-Wallis H test, and Spearman correlation test were conducted in statistical analyses. Sex- and age-specific attack rate ratios were calculated as pooled effect sizes. We screened 2188 articles and retrieved data of 85 outbreaks from 1987 to 2014. Attack rates of outbreaks in rural areas (median, 12.63 cases/100 persons) and in primary schools (median, 14.54 cases/100 persons) were higher than those in urban areas (median, 5.62 cases/100 persons) and in secondary schools (median, 8.74 cases/100 persons) (P = 0.004 and P = 0.013, respectively). Shigella, pathogenic Escherichia coli, and norovirus were the most common pathogens. Boys tended toward higher attack rates than girls (sex-specific attack rate ratio, 1.13; 95% CI, 1.00-1.29, P = 0.05). Unsanitary conditions of water wells were reported frequently, and unhealthy behavior habits were common in students. School children were susceptible to waterborne disease in China. Chinese government should make efforts to improve access to safe water in schools. Health education promotion and conscientiousness of school leaders and teachers should be enhanced. Copyright © 2017. Production and hosting by Elsevier B.V.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-09
... attacks up to and including the design basis cyber attack threat, thereby achieving high assurance that... provide assurance that safety-related SSCs are protected from cyber attacks. Implementation of 10 CFR 73... of ``high assurance of adequate protection against cyber attacks.'' The proposed revision would not...
A hybrid protection approaches for denial of service (DoS) attacks in wireless sensor networks
NASA Astrophysics Data System (ADS)
Gunasekaran, Mahalakshmi; Periakaruppan, Subathra
2017-06-01
Wireless sensor network (WSN) contains the distributed autonomous devices with the sensing capability of physical and environmental conditions. During the clustering operation, the consumption of more energy causes the draining in battery power that leads to minimum network lifetime. Hence, the WSN devices are initially operated on low-power sleep mode to maximise the lifetime. But, the attacks arrival cause the disruption in low-power operating called denial of service (DoS) attacks. The conventional intrusion detection (ID) approaches such as rule-based and anomaly-based methods effectively detect the DoS attacks. But, the energy consumption and false detection rate are more. The absence of attack information and broadcast of its impact to the other cluster head (CH) leads to easy DoS attacks arrival. This article combines the isolation and routing tables to detect the attack in the specific cluster and broadcasts the information to other CH. The intercommunication between the CHs prevents the DoS attacks effectively. In addition, the swarm-based defence approach is proposed to migrate the fault channel to normal operating channel through frequency hop approaches. The comparative analysis between the proposed table-based intrusion detection systems (IDSs) and swarm-based defence approaches with the traditional IDS regarding the parameters of transmission overhead/efficiency, energy consumption, and false positive/negative rates proves the capability of DoS prediction/prevention in WSN.
Unsteady Computational Tests of a Non-Equilibrium
NASA Astrophysics Data System (ADS)
Jirasek, Adam; Hamlington, Peter; Lofthouse, Andrew; Usafa Collaboration; Cu Boulder Collaboration
2017-11-01
A non-equilibrium turbulence model is assessed on simulations of three practically-relevant unsteady test cases; oscillating channel flow, transonic flow around an oscillating airfoil, and transonic flow around the Benchmark Super-Critical Wing. The first case is related to piston-driven flows while the remaining cases are relevant to unsteady aerodynamics at high angles of attack and transonic speeds. Non-equilibrium turbulence effects arise in each of these cases in the form of a lag between the mean strain rate and Reynolds stresses, resulting in reduced kinetic energy production compared to classical equilibrium turbulence models that are based on the gradient transport (or Boussinesq) hypothesis. As a result of the improved representation of unsteady flow effects, the non-equilibrium model provides substantially better agreement with available experimental data than do classical equilibrium turbulence models. This suggests that the non-equilibrium model may be ideally suited for simulations of modern high-speed, high angle of attack aerodynamics problems.
Hansen, Bertel T; Østergaard, Søren D; Sønderskov, Kim M; Dinesen, Peter T
2016-10-01
The terrorist attacks that occurred on September 11, 2001 (hereafter referred to as 9/11) in the United States had a profound impact on the physical and mental health of Americans, but the effects beyond the United States are largely unknown. To understand the wider aftermath, we examined the consequences of the 9/11 attacks on mental disorders in the Kingdom of Denmark. Utilizing population data from the Danish Psychiatric Central Research Register from 1995 to 2012, we used a time-series intervention approach to estimate the change in the incidence rate of mental disorders after the 9/11 attacks. Based on analyses of 1,448,250 contacts with psychiatric services, we found that the attacks were followed by an immediate 16% increase in the incidence rate of trauma- and stressor-related disorders. This surge dissipated approximately a year after 9/11. In contrast, no similar increases were found for other disorders. This is consistent with the prominent role of external stressors in the etiology of trauma- and stressor-related disorders. The results indicate that the effects of 9/11 on mental disorders extended across the Atlantic Ocean to Denmark. Thus, the impact of terrorist attacks on mental health is likely not limited to inhabitants of the country under attack; it also extends to people far away and without immediate relation to it. © The Author 2016. Published by Oxford University Press on behalf of the Johns Hopkins Bloomberg School of Public Health. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.
Investigation of High-Angle-of-Attack Maneuver-Limiting Factors. Part 1. Analysis and Simulation
1980-12-01
useful, are not so satisfying or in- structive as the more positive identification of causal factors offered by the methods developed in Reference 5...same methods be applied to additional high-performance fighter aircraft having widely differing high AOA handling characteristics to see if further...predictions and the nonlinear model results were resolved. The second task involved development of methods , criteria, and an associated pilot rating scale, for
Fourth High Alpha Conference, volume 1
NASA Technical Reports Server (NTRS)
1994-01-01
The goal of the Fourth High Alpha Conference was to focus on the flight validation of high angle-of-attack technologies and provide an in-depth review of the latest high angle-of-attack activities. Areas that were covered include: high angle-of-attack aerodynamics, propulsion and inlet dynamics, thrust vectoring, control laws and handling qualities, tactical utility, and forebody controls.
NASA Technical Reports Server (NTRS)
Iliff, Kenneth W.; Wang, Kon-Sheng Charles Wang
1996-01-01
The lateral-directional stability and control derivatives of the X-29A number 2 are extracted from flight data over an angle-of-attack range of 4 degrees to 53 degrees using a parameter identification algorithm. The algorithm uses the linearized aircraft equations of motion and a maximum likelihood estimator in the presence of state and measurement noise. State noise is used to model the uncommanded forcing function caused by unsteady aerodynamics over the aircraft at angles of attack above 15 degrees. The results supported the flight-envelope-expansion phase of the X-29A number 2 by helping to update the aerodynamic mathematical model, to improve the real-time simulator, and to revise flight control system laws. Effects of the aircraft high gain flight control system on maneuver quality and the estimated derivatives are also discussed. The derivatives are plotted as functions of angle of attack and compared with the predicted aerodynamic database. Agreement between predicted and flight values is quite good for some derivatives such as the lateral force due to sideslip, the lateral force due to rudder deflection, and the rolling moment due to roll rate. The results also show significant differences in several important derivatives such as the rolling moment due to sideslip, the yawing moment due to sideslip, the yawing moment due to aileron deflection, and the yawing moment due to rudder deflection.
Sheng, Sheng; Ling, Meng; Fu-an, Wu; Baoping, Li
2015-01-01
Foraging parasitoids often must estimate local risk of predation just as they must estimate local patch value. Here, we investigate the effects a generalist predator Chlaenius bioculatus (Coleoptera: Carabidae), has on the oviposition behavior and the patch residence decisions of a solitary parasitoid Meteorus pulchricornis (Hymenoptera: Braconidae) in response to the varying host quality of Spodoptera litura (Lepidoptera: Noctuidae) larvae (L2 and L4). M. pulchricornis attacked more L4 than on L2 hosts, with the difference in attack rate varying depending on predation treatments, greater in the presence (either actively feeding or not) of the predator than in the absence of it. The parasitoid attacked fewer L2 and L4 hosts when the predator was actively feeding than when it was not feeding or not present in the patch. M. pulchricornis decreased the patch leaving tendency with increasing rejections of hosts, but increased the tendency in response to the presence of the predator as compared with the absence of it, and furthermore, increased the patch leaving tendency when the predator was actively feeding as compared with when it was not. Our study suggests that M. pulchricornis can exploit high quality patches while minimizing predation risk, by attacking more hosts in high quality patches while reducing total patch time in response to risk of predation. PMID:25943317
Predator personality structures prey communities and trophic cascades.
Start, Denon; Gilbert, Benjamin
2017-03-01
Intraspecific variation is central to our understanding of evolution and population ecology, yet its consequences for community ecology are poorly understood. Animal personality - consistent individual differences in suites of behaviours - may be particularly important for trophic dynamics, where predator personality can determine activity rates and patterns of attack. We used mesocosms with aquatic food webs in which the top predator (dragonfly nymphs) varied in activity and subsequent attack rates on zooplankton, and tested the effects of predator personality. We found support for four hypotheses: (1) active predators disproportionately reduce the abundance of prey, (2) active predators select for predator-resistant prey species, (3) active predators strengthen trophic cascades (increase phytoplankton abundance) and (4) active predators are more likely to cannibalise one another, weakening all other trends when at high densities. These results suggest that intraspecific variation in predator personality is an important determinant of prey abundance, community composition and trophic cascades. © 2017 John Wiley & Sons Ltd/CNRS.
Effect of deoxidation practice and heat treatment on the hydrogen attack of carbon steels
NASA Astrophysics Data System (ADS)
López, Hugo F.
1987-11-01
The hydrogen attack (HA) kinetics of an electroslag refined (ESR) and a rare earth metal (REM)-treated steel in the Q. and T. condition were investigated by a highly sensitive dilatometer. Measured activation energies for bubble growth of 108 to 203 kJ/mol and pressure exponents of 0.9 to 1.6 are rationalized in terms of surface or grain boundary self-diffusion of iron as the rate controlling mechanisms depending on the external hydrogen pressure and temperature. Comparisons of the HA susceptibility of these steels with published work show that although the HA resistance of the ESR steel is not influenced by the heat treatment, the REM steel shows a significant decrease in the rate of sample expansion. SEM observations indicate that the improvement in the HA resistance of the REM steel is related to the presence of a very low density of methane bubbles.
Attacked ravens flexibly adjust signalling behaviour according to audience composition.
Szipl, Georgine; Ringler, Eva; Bugnyar, Thomas
2018-06-13
A fundamental attribute of social intelligence is the ability to monitor third-party relationships, which has been repeatedly demonstrated in primates, and recently also in captive ravens. It is yet unknown how ravens make use of this ability when dealing with different types of social relationships simultaneously during complex real-life situations. Free-ranging non-breeder ravens live in societies characterized by high fission-fusion dynamics and structured by age, pair-bond status and kinship. Here, we show that free-ranging ravens modify communication during conflicts according to audience composition. When being attacked by dominant conspecifics, victims of aggression signal their distress via defensive calls. Victims increased call rates when their kin were in the bystander audience, but reduced call rates when the bystanders were bonding partners of their aggressors. Hence, ravens use social knowledge flexibly and probably based on their own need (i.e. alert nearby allies and avoid alerting nearby rivals). © 2018 The Authors.
ERIC Educational Resources Information Center
Raun, Loren H.; Campos, Laura A.; Stevenson, Elizabeth; Ensor, Katherine B.; Johnson, Gwen; Persse, David
2017-01-01
Background: Rates of uncontrolled asthma vary by demographics, space, and time. This article uses data on ambulance-treated asthma attacks in children to analyze these variations so that school districts can improve their asthma management interventions. Methods: Incidence rates of 1826 ambulance-treated asthma attacks for children aged 5-18 years…
NASA Technical Reports Server (NTRS)
Campbell, J. F.
1975-01-01
Wind-tunnel data were obtained at a free-stream Mach number of 0.26 for a range of model angle of attack, jet thrust coefficient, and jet location. Results of this study show that the sectional effects to spanwise blowing are strongly dependent on angle of attack, jet thrust coefficient, and span location; the largest effects occur at the highest angles of attack and thrust coefficients and on the inboard portion of the wing. Full vortex lift was achieved at the inboard span station with a small blowing rate, but successively higher blowing rates were necessary to achieve full vortex lift at increased span distances. It is shown that spanwise blowing increases lift throughout the angle-of-attack range, delays wing stall to higher angles of attack, and improves the induced-drag polars. The leading-edge suction analogy can be used to estimate the section and total lifts resulting from spanwise blowing.
Hansen, Bertel T; Dinesen, Peter T; Østergaard, Søren D
2017-11-01
On 22 July 2011, Anders Breivik killed 77 adults and children in Norway. Having recently documented increases in the incidence of trauma- and stressor-related disorders in Denmark after the 9/11 attacks, we hypothesized that the Breivik attacks-due to their geographic proximity-would be followed by even larger increases in Denmark. Using population-based data from the Danish Psychiatric Central Research Register (1995-2012), we conducted an intervention analysis of the change in the incidence of trauma- and stressor-related disorders after the Breivik attacks. The incidence rate increased by 16% over the following 1½ years after the Breivik attacks, corresponding to 2736 additional cases. In comparison, 9/11 was followed by a 4% increase. We also present evidence of a subsequent surge in incidence stimulated by media attention. This study bolsters previous findings on extra-national consequences of terrorism and indicates that geographic proximity and media coverage may exacerbate effects.
Generalised Category Attack—Improving Histogram-Based Attack on JPEG LSB Embedding
NASA Astrophysics Data System (ADS)
Lee, Kwangsoo; Westfeld, Andreas; Lee, Sangjin
We present a generalised and improved version of the category attack on LSB steganography in JPEG images with straddled embedding path. It detects more reliably low embedding rates and is also less disturbed by double compressed images. The proposed methods are evaluated on several thousand images. The results are compared to both recent blind and specific attacks for JPEG embedding. The proposed attack permits a more reliable detection, although it is based on first order statistics only. Its simple structure makes it very fast.
Coherent attacking continuous-variable quantum key distribution with entanglement in the middle
NASA Astrophysics Data System (ADS)
Zhang, Zhaoyuan; Shi, Ronghua; Zeng, Guihua; Guo, Ying
2018-06-01
We suggest an approach on the coherent attack of continuous-variable quantum key distribution (CVQKD) with an untrusted entangled source in the middle. The coherent attack strategy can be performed on the double links of quantum system, enabling the eavesdropper to steal more information from the proposed scheme using the entanglement correlation. Numeric simulation results show the improved performance of the attacked CVQKD system in terms of the derived secret key rate with the controllable parameters maximizing the stolen information.
Steinman, A; Chaffer, M; Elad, D; Shpigel, N Y
2006-08-01
The recent outbreaks of cattle botulism in vaccinated Israeli dairy cattle prompted us to determine vaccine efficacy and reasons for vaccine failure. Analysis of clinical signs, feeding practice, vaccination history, and epidemic curves enabled us to define a study population in two outbreaks, where high doses of Clostridium botulinum neurotoxin type D (BoNT/D) were evenly consumed by the affected animal groups. Attack rates among unvaccinated 6- to 24-month-old heifers were 96% (55/57) and 85% (53/62). The attack rates in vaccinated parity 1, 2, and >or=3 cows were 40.4% (21/52), 14.3% (4/28), and 5.6% (3/54), respectively. Vaccine efficacies for these cow groups were 52.5%, 83.2%, and 93.4%, respectively. In younger, unvaccinated 2- to 6-month-old calves, presumably protected by maternal antibodies, the attack rate was 24% (17/71). These differences correlated with significant differences in levels of specific anti-BoNT/D antibody in serum by an enzyme-linked immunosorbent assay (ELISA). The ELISA performance for predicting protection was analyzed by receiver operating characteristic analysis and was found to be highly significant, with an area under the curve of 0.941 (standard error, 0.034; 95% confidence interval, 0.875 to 1.008; P < 0.000). No animals with serum ELISA unit levels above 0.33 were affected in these exposed groups. At this cutoff level, the specificity of the ELISA was 100%, sensitivity was 67%, and accuracy was 92%. We concluded that botulinum toxoids can confer adequate protection against natural exposure to lethal doses of BoNT/D; however, the vaccination protocols should be optimized. Our in-house ELISA system will enable us to optimize vaccination protocols in the animal population.
Spatio-Temporal Dynamics of Cholera during the First Year of the Epidemic in Haiti
Gaudart, Jean; Rebaudet, Stanislas; Barrais, Robert; Boncy, Jacques; Faucher, Benoit; Piarroux, Martine; Magloire, Roc; Thimothe, Gabriel; Piarroux, Renaud
2013-01-01
Background In October 2010, cholera importation in Haiti triggered an epidemic that rapidly proved to be the world's largest epidemic of the seventh cholera pandemic. To establish effective control and elimination policies, strategies rely on the analysis of cholera dynamics. In this report, we describe the spatio-temporal dynamics of cholera and the associated environmental factors. Methodology/Principal findings Cholera-associated morbidity and mortality data were prospectively collected at the commune level according to the World Health Organization standard definition. Attack and mortality rates were estimated and mapped to assess epidemic clusters and trends. The relationships between environmental factors were assessed at the commune level using multivariate analysis. The global attack and mortality rates were 488.9 cases/10,000 inhabitants and 6.24 deaths/10,000 inhabitants, respectively. Attack rates displayed a significantly high level of spatial heterogeneity (varying from 64.7 to 3070.9 per 10,000 inhabitants), thereby suggesting disparate outbreak processes. The epidemic course exhibited two principal outbreaks. The first outbreak (October 16, 2010–January 30, 2011) displayed a centrifugal spread of a damping wave that suddenly emerged from Mirebalais. The second outbreak began at the end of May 2011, concomitant with the onset of the rainy season, and displayed a highly fragmented epidemic pattern. Environmental factors (river and rice fields: p<0.003) played a role in disease dynamics exclusively during the early phases of the epidemic. Conclusion Our findings demonstrate that the epidemic is still evolving, with a changing transmission pattern as time passes. Such an evolution could have hardly been anticipated, especially in a country struck by cholera for the first time. These results argue for the need for control measures involving intense efforts in rapid and exhaustive case tracking. PMID:23593516
Matthew Hansen, E; Steven Munson, A; Blackford, Darren C; Wakarchuk, David; Scott Baggett, L
2016-10-01
We tested lethal trap trees and repellent semiochemicals as area treatments to protect host trees from spruce beetle (Dendroctonus rufipennis Kirby) attacks. Lethal trap tree treatments ("spray treatment") combined a spruce beetle bait with carbaryl treatment of the baited spruce. Repellent treatments ("spray-repellent") combined a baited lethal trap tree within a 16-m grid of MCH (3-methylcyclohex-2-en-1-one) and two novel spruce beetle repellents. After beetle flight, we surveyed all trees within 50 m of plot center, stratified by 10-m radius subplots, and compared attack rates to those from baited and unbaited control plots. Compared to the baited controls, spruce in the spray treatment had significantly reduced likelihood of a more severe attack classification (e.g., mass-attacked over strip-attacked or unsuccessful-attacked over unattacked). Because spruce in the spray treatment also had significantly heightened probability of more severe attack classification than those in the unbaited controls, however, we do not recommend lethal trap trees as a stand-alone beetle suppression strategy for epidemic beetle populations. Spruce in the spray-repellent treatment were slightly more likely to be classified as more severely attacked within 30 m of plot center compared to unbaited controls but, overall, had reduced probabilities of beetle attack over the entire 50-m radius plots. The semiochemical repellents deployed in this study were effective at reducing attacks on spruce within treated plots despite the presence of a centrally located spruce beetle bait. Further testing will be required to clarify operational protocols such as dose, elution rate, and release device spacing. Published by Oxford University Press on behalf of Entomological Society of America 2016. This work is written by US Government employees and is in the public domain in the US.
Can people with Raynaud's phenomenon travel to high altitude?
Luks, Andrew M; Grissom, Colin K; Jean, Dominique; Swenson, Erik R
2009-01-01
To determine whether high altitude travel adversely affects mountain enthusiasts with Raynaud's phenomenon. Volunteers with Raynaud's phenomenon were recruited using announcements disseminated by organizations dedicated to climbing or wilderness travel and Internet discussion boards dedicated to mountain activities to complete an online, anonymous survey. Survey questions addressed demographic variables, aspects of their Raynaud's phenomenon, and features of their mountain activities. Respondents compared experiences with Raynaud's phenomenon between high (>2440 m; 8000 feet) and low elevations and rated agreement with statements concerning their disease and the effects of high altitude. One hundred forty-two people, 98% of whom had primary Raynaud's phenomenon, completed the questionnaire. Respondents spent 5 to 7 days per month at elevations above 2440 m and engaged in 5.4 +/- 2.0 different activities. Eighty-nine percent of respondents engaged in winter sports and only 22% reported changing their mountain activities because of Raynaud's phenomenon. Respondents reported a variety of tactics to prevent and treat Raynaud's attacks, but only 12% used prophylactic medications. Fifteen percent of respondents reported an episode of frostbite following a Raynaud's phenomenon attack at high altitude. There was considerable heterogeneity in participants' perceptions of the frequency, duration, and severity of attacks at high altitude compared to their home elevation. Motivated individuals with primary Raynaud's phenomenon, employing various prevention and treatment strategies, can engage in different activities, including winter sports, at altitudes above 2440 m. Frostbite may be common in this population at high altitude, and care must be taken to prevent its occurrence.
Public health consequences of terrorism on maternal-child health in New York City and Madrid.
Sherrieb, Kathleen; Norris, Fran H
2013-06-01
Past research provides evidence for trajectories of health and wellness among individuals following disasters that follow specific pathways of resilience, resistance, recovery, or continued dysfunction. These individual responses are influenced by event type and pre-event capacities. This study was designed to utilize the trajectories of health model to determine if it translates to population health. We identified terrorist attacks that could potentially impact population health rather than only selected individuals within the areas of the attacks. We chose to examine a time series of population birth outcomes before and after the terrorist events of the New York City (NYC) World Trade Center (WTC) attacks of 2001 and the Madrid, Spain train bombings of 2004 to determine if the events affected maternal-child health of those cities and, if so, for how long. For percentages of low birth weight (LBW) and preterm births, we found no significant effects from the WTC attacks in NYC and transient but significant effects on rates of LBW and preterm births following the bombings in Madrid. We did find a significant positive and sustained effect on infant mortality rate in NYC following the WTC attacks but no similar effect in Madrid. There were no effects on any of the indicator variables in the comparison regions of New York state and the remainder of Spain. Thus, population maternal-health in New York and Madrid showed unique adverse effects after the terrorist attacks in those cities. Short-term effects on LBW and preterm birth rates in Madrid and long-term effects on infant mortality rates in NYC were found when quarterly data were analyzed from 1990 through 2008/2009. These findings raise questions about chronic changes in the population's quality of life following catastrophic terrorist attacks. Public health should be monitored and interventions designed to address chronic stress, environmental, and socioeconomic threats beyond the acute aftermath of events.
Do burns increase the severity of terror injuries?
Peleg, Kobi; Liran, Alon; Tessone, Ariel; Givon, Adi; Orenstein, Arie; Haik, Josef
2008-01-01
The use of explosives and suicide bombings has become more frequent since October 2000. This change in the nature of terror attacks has marked a new era in the Israeli-Palestinian conflict. We previously reported that the incidence of thermal injuries has since risen. However, the rise in the incidence of burns among victims of terror was proportionate to the rise in the incidence of burns among all trauma victims. This paper presents data from the Israeli National Trauma Registry during the years 1997--2003, to compare the severity of injuries and outcome (mortality rates) in terror victims with and without burn injuries. We also compare the severity of injuries and outcome (mortality rates) for patients with terror-attack related burns to non terror-attack related burns during the same period. Data was obtained from the Israeli National Trauma Registry for all patients admitted to 8 to 10 hospitals in Israel between 1997 and 2003. We analyzed and compared demographic and clinical characteristics of 219 terror-related burn patients (terror/burn), 2228 terror patients with no associated burns (Terror/no-burn) and 6546 non terror related burn patients (burn/no-terror). Severity of injuries was measured using the injury severity score, and burn severity by total body surface percentage indices. Admission rates to Intensive Care Units (ICU) and total length of hospitalization were also used to measure severity of injuries. In-hospital mortality rates were used to indicate outcome. Of burn/terror patients, 87.2% suffered other accompanying injuries, compared with 10.4% of burn/no-terror patients. Of burn/terror patients, 49.8% were admitted to ICU compared with only 11.9% of burn/no-terror patients and 23.8% of no-burn/terror patients. Mean length of hospital stay was 18.5 days for the terror/burn group compared with 11.1 days for the burn/no-terror group and 9.5 days for the terror/no-burn group. Burn/terror patients had a significantly higher injury severity score compared with the other groups. In-hospital mortality rate for the burn/no-terror group was 3.4%. The burn/terror group had a mortality rate of 6.4% which was similar to the no-burn/terror group (6.6%). Terror-attack injuries with accompanying burns have a more complex presentation, are of higher severity, and are associated with increased length of hospital stay and a higher ICU admissions rate, compared with terror-attack injuries without burns and non terror-attack related burns. However, mortality rates in terror-attack injuries are not affected by burns.
DeTrano, Alexander; Karimi, Naghmeh; Karri, Ramesh; Guo, Xiaofei; Carlet, Claude; Guilley, Sylvain
2015-01-01
Masking countermeasures, used to thwart side-channel attacks, have been shown to be vulnerable to mask-extraction attacks. State-of-the-art mask-extraction attacks on the Advanced Encryption Standard (AES) algorithm target S-Box recomputation schemes but have not been applied to scenarios where S-Boxes are precomputed offline. We propose an attack targeting precomputed S-Boxes stored in nonvolatile memory. Our attack targets AES implemented in software protected by a low entropy masking scheme and recovers the masks with 91% success rate. Recovering the secret key requires fewer power traces (in fact, by at least two orders of magnitude) compared to a classical second-order attack. Moreover, we show that this attack remains viable in a noisy environment or with a reduced number of leakage points. Eventually, we specify a method to enhance the countermeasure by selecting a suitable coset of the masks set.
Brown, Mark P
2006-01-01
The effect of nursing professionals (i.e., nurse aid/orderly, licensed practical nurse, registered nurse) pay structures and pay levels on hospitals risk-adjusted heart attack outcomes was determined. Operationalizing hospitals' heart attack outcomes as their thirty-day risk-adjusted mortality rates, a positive curvilinear relation is hypothesized between pay dispersion and hospitals' heart attack outcomes, whereas a direct relation is hypothesized between pay level and hospitals' heart attack outcomes. Pay level is also hypothesized as a moderator of the relation between pay dispersion and hospitals' heart attack outcomes. Using a sample of 138 California hospitals, support is not found for either the curvilinear relation between hospitals' nursing professionals pay dispersion and hospitals' heart attack outcomes, or the direct relation between nursing professionals' pay level and hospitals' heart attack outcomes. Support is found for the moderation hypothesis in which nursing professionals' pay level moderates the relation between hospitals' nursing professionals pay dispersion and hospitals' heart attack outcomes. Implications for practice are discussed in light of the study's results.
DeTrano, Alexander; Karimi, Naghmeh; Karri, Ramesh; Guo, Xiaofei; Carlet, Claude; Guilley, Sylvain
2015-01-01
Masking countermeasures, used to thwart side-channel attacks, have been shown to be vulnerable to mask-extraction attacks. State-of-the-art mask-extraction attacks on the Advanced Encryption Standard (AES) algorithm target S-Box recomputation schemes but have not been applied to scenarios where S-Boxes are precomputed offline. We propose an attack targeting precomputed S-Boxes stored in nonvolatile memory. Our attack targets AES implemented in software protected by a low entropy masking scheme and recovers the masks with 91% success rate. Recovering the secret key requires fewer power traces (in fact, by at least two orders of magnitude) compared to a classical second-order attack. Moreover, we show that this attack remains viable in a noisy environment or with a reduced number of leakage points. Eventually, we specify a method to enhance the countermeasure by selecting a suitable coset of the masks set. PMID:26491717
Beier, J C; Oster, C N; Onyango, F K; Bales, J D; Sherwood, J A; Perkins, P V; Chumo, D K; Koech, D V; Whitmire, R E; Roberts, C R
1994-05-01
Relationships between Plasmodium falciparum incidence and entomologic inoculation rates (EIRs) were determined for a 21-month period in Saradidi, western Kenya, in preparation for malaria vaccine field trials. Children, ranging in age from six months to six years and treated to clear malaria parasites, were monitored daily for up to 12 weeks to detect new malaria infections. Overall, new P. falciparum infections were detected in 77% of 809 children. The percentage of children that developed infections per two-week period averaged 34.7%, ranging from 7.3% to 90.9%. Transmission by vector populations was detected in 86.4% (38 of 44) of the two-week periods, with daily EIRs averaging 0.75 infective bites per person. Periods of intense transmission during April to August, and from November to January, coincided with seasonal rains. Relationships between daily malaria attack rates and EIRs indicated that an average of only 7.5% (1 in 13) of the sporozoite inoculations produced new infections in children. Regression analysis demonstrated that EIRs accounted for 74% of the variation in attack rates. One of the components of the EIR, the human-biting rate, alone accounted for 68% of the variation in attack rates. Thus, measurements of either the EIR or the human-biting rate can be used to predict corresponding attack rates in children. These baseline epidemiologic studies indicate that the intense transmission patterns of P. falciparum in Saradidi will provide excellent conditions for evaluating malaria vaccine efficacy.
Kishore, Amit; Vail, Andy; Majid, Arshad; Dawson, Jesse; Lees, Kennedy R; Tyrrell, Pippa J; Smith, Craig J
2014-02-01
Atrial fibrillation (AF) confers a high risk of recurrent stroke, although detection methods and definitions of paroxysmal AF during screening vary. We therefore undertook a systematic review and meta-analysis to determine the frequency of newly detected AF using noninvasive or invasive cardiac monitoring after ischemic stroke or transient ischemic attack. Prospective observational studies or randomized controlled trials of patients with ischemic stroke, transient ischemic attack, or both, who underwent any cardiac monitoring for a minimum of 12 hours, were included after electronic searches of multiple databases. The primary outcome was detection of any new AF during the monitoring period. We prespecified subgroup analysis of selected (prescreened or cryptogenic) versus unselected patients and according to duration of monitoring. A total of 32 studies were analyzed. The overall detection rate of any AF was 11.5% (95% confidence interval, 8.9%-14.3%), although the timing, duration, method of monitoring, and reporting of diagnostic criteria used for paroxysmal AF varied. Detection rates were higher in selected (13.4%; 95% confidence interval, 9.0%-18.4%) than in unselected patients (6.2%; 95% confidence interval, 4.4%-8.3%). There was substantial heterogeneity even within specified subgroups. Detection of AF was highly variable, and the review was limited by small sample sizes and marked heterogeneity. Further studies are required to inform patient selection, optimal timing, methods, and duration of monitoring for detection of AF/paroxysmal AF.
Van Apeldoorn, Franske J; Van Hout, Wiljo J P J; Timmerman, Marieke E; Mersch, Peter Paul A; den Boer, Johan A
2013-09-05
Existing literature on panic disorder (PD) yields no data regarding the differential rates of improvement during Cognitive Behavioral Therapy (CBT), Selective Serotonin Reuptake Inhibitor (SSRI) or both combined (CBT+SSRI). Patients were randomized to CBT, SSRI or CBT+SSRI which each lasted one year including three months of medication taper. Participating patients kept record of the frequency of panic attacks throughout the full year of treatment. Rate of improvement on panic frequency and the relationship between rate of improvement and baseline agoraphobia (AG) were examined. A significant decline in frequency of panic attacks was observed for each treatment modality. SSRI and CBT+SSRI were associated with a significant faster rate of improvement as compared to CBT. Gains were maintained after tapering medication. For patients with moderate or severe AG, CBT+SSRI was associated with a more rapid improvement on panic frequency as compared to patients receiving either mono-treatment. Frequency of panic attacks was not assessed beyond the full year of treatment. Second, only one process variable was used. Patients with PD respond well to each treatment as indicated by a significant decline in panic attacks. CBT is associated with a slower rate of improvement as compared to SSRI and CBT+SSRI. Discontinuation of SSRI treatment does not result in a revival of frequency of panic attacks. Our data suggest that for patients without or with only mild AG, SSRI-only will suffice. For patients with moderate or severe AG, the combined CBT+SSRI treatment is recommended. Copyright © 2013 Elsevier B.V. All rights reserved.
Dorratoltaj, Nargesalsadat; Marathe, Achla; Swarup, Samarth; Eubank, Stephen G.
2017-01-01
The study objective is to estimate the epidemiological and economic impact of vaccine interventions during influenza pandemics in Chicago, and assist in vaccine intervention priorities. Scenarios of delay in vaccine introduction with limited vaccine efficacy and limited supplies are not unlikely in future influenza pandemics, as in the 2009 H1N1 influenza pandemic. We simulated influenza pandemics in Chicago using agent-based transmission dynamic modeling. Population was distributed among high-risk and non-high risk among 0–19, 20–64 and 65+ years subpopulations. Different attack rate scenarios for catastrophic (30.15%), strong (21.96%), and moderate (11.73%) influenza pandemics were compared against vaccine intervention scenarios, at 40% coverage, 40% efficacy, and unit cost of $28.62. Sensitivity analysis for vaccine compliance, vaccine efficacy and vaccine start date was also conducted. Vaccine prioritization criteria include risk of death, total deaths, net benefits, and return on investment. The risk of death is the highest among the high-risk 65+ years subpopulation in the catastrophic influenza pandemic, and highest among the high-risk 0–19 years subpopulation in the strong and moderate influenza pandemics. The proportion of total deaths and net benefits are the highest among the high-risk 20–64 years subpopulation in the catastrophic, strong and moderate influenza pandemics. The return on investment is the highest in the high-risk 0–19 years subpopulation in the catastrophic, strong and moderate influenza pandemics. Based on risk of death and return on investment, high-risk groups of the three age group subpopulations can be prioritized for vaccination, and the vaccine interventions are cost saving for all age and risk groups. The attack rates among the children are higher than among the adults and seniors in the catastrophic, strong, and moderate influenza pandemic scenarios, due to their larger social contact network and homophilous interactions in school. Based on return on investment and higher attack rates among children, we recommend prioritizing children (0–19 years) and seniors (65+ years) after high-risk groups for influenza vaccination during times of limited vaccine supplies. Based on risk of death, we recommend prioritizing seniors (65+ years) after high-risk groups for influenza vaccination during times of limited vaccine supplies. PMID:28570660
Estimating the Attack Rate of Pregnancy-Associated Listeriosis during a Large Outbreak
Imanishi, Maho; Routh, Janell A.; Klaber, Marigny; Gu, Weidong; Vanselow, Michelle S.; Jackson, Kelly A.; Sullivan-Chang, Loretta; Heinrichs, Gretchen; Jain, Neena; Albanese, Bernadette; Callaghan, William M.; Mahon, Barbara E.; Silk, Benjamin J.
2015-01-01
Background. In 2011, a multistate outbreak of listeriosis linked to contaminated cantaloupes raised concerns that many pregnant women might have been exposed to Listeria monocytogenes. Listeriosis during pregnancy can cause fetal death, premature delivery, and neonatal sepsis and meningitis. Little information is available to guide healthcare providers who care for asymptomatic pregnant women with suspected L. monocytogenes exposure. Methods. We tracked pregnancy-associated listeriosis cases using reportable diseases surveillance and enhanced surveillance for fetal death using vital records and inpatient fetal deaths data in Colorado. We surveyed 1,060 pregnant women about symptoms and exposures. We developed three methods to estimate how many pregnant women in Colorado ate the implicated cantaloupes, and we calculated attack rates. Results. One laboratory-confirmed case of listeriosis was associated with pregnancy. The fetal death rate did not increase significantly compared to preoutbreak periods. Approximately 6,500–12,000 pregnant women in Colorado might have eaten the contaminated cantaloupes, an attack rate of ~1 per 10,000 exposed pregnant women. Conclusions. Despite many exposures, the risk of pregnancy-associated listeriosis was low. Our methods for estimating attack rates may help during future outbreaks and product recalls. Our findings offer relevant considerations for management of asymptomatic pregnant women with possible L. monocytogenes exposure. PMID:25784782
Identification of aerodynamic models for maneuvering aircraft
NASA Technical Reports Server (NTRS)
Lan, C. Edward; Hu, C. C.
1992-01-01
A Fourier analysis method was developed to analyze harmonic forced-oscillation data at high angles of attack as functions of the angle of attack and its time rate of change. The resulting aerodynamic responses at different frequencies are used to build up the aerodynamic models involving time integrals of the indicial type. An efficient numerical method was also developed to evaluate these time integrals for arbitrary motions based on a concept of equivalent harmonic motion. The method was verified by first using results from two-dimensional and three-dimensional linear theories. The developed models for C sub L, C sub D, and C sub M based on high-alpha data for a 70 deg delta wing in harmonic motions showed accurate results in reproducing hysteresis. The aerodynamic models are further verified by comparing with test data using ramp-type motions.
Security Assessment of Cyberphysical Digital Microfluidic Biochips.
Ali, Sk Subidh; Ibrahim, Mohamed; Sinanoglu, Ozgur; Chakrabarty, Krishnendu; Karri, Ramesh
2016-01-01
A digital microfluidic biochip (DMFB) is an emerging technology that enables miniaturized analysis systems for point-of-care clinical diagnostics, DNA sequencing, and environmental monitoring. A DMFB reduces the rate of sample and reagent consumption, and automates the analysis of assays. In this paper, we provide the first assessment of the security vulnerabilities of DMFBs. We identify result-manipulation attacks on a DMFB that maliciously alter the assay outcomes. Two practical result-manipulation attacks are shown on a DMFB platform performing enzymatic glucose assay on serum. In the first attack, the attacker adjusts the concentration of the glucose sample and thereby modifies the final result. In the second attack, the attacker tampers with the calibration curve of the assay operation. We then identify denial-of-service attacks, where the attacker can disrupt the assay operation by tampering either with the droplet-routing algorithm or with the actuation sequence. We demonstrate these attacks using a digital microfluidic synthesis simulator. The results show that the attacks are easy to implement and hard to detect. Therefore, this work highlights the need for effective protections against malicious modifications in DMFBs.
NASA Technical Reports Server (NTRS)
Zoby, E. V.
1981-01-01
An engineering method has been developed for computing the windward-symmetry plane convective heat-transfer rates on Shuttle-like vehicles at large angles of attack. The engineering code includes an approximate inviscid flowfield technique, laminar and turbulent heating-rate expressions, an approximation to account for the variable-entropy effects on the surface heating and the concept of an equivalent axisymmetric body to model the windward-ray flowfields of Shuttle-like vehicles at angles of attack from 25 to 45 degrees. The engineering method is validated by comparing computed heating results with corresponding experimental data measured on Shuttle and advanced transportation models over a wide range of flow conditions and angles of attack from 25 to 40 degrees and also with results of existing prediction techniques. The comparisons are in good agreement.
An Investigation of Anaerobic Processes in Fuel/Natural Seawater Environments
2012-02-08
Corrosion rates were estimated from polarization resistance measurements and corrosion was measured by weight loss. Corrosion attack morphology and...rates were estimated from polarization resistance measurements and corrosion was measured by weight loss. Corrosion attack morphology and corrosion...the backside of the coupons with conductive epoxy and carbon tape to achieve electrical connection. Coupons were individually mounted in epoxy to
Destabilization of yttria-stabilized zirconia induced by molten sodium vanadate-sodium sulfate melts
NASA Technical Reports Server (NTRS)
Nagelberg, A. S.; Hamilton, J. C.
1985-01-01
The extent of surface destabilization of ZrO2 - 8 wt percent Y2O3 ceramic disks was determined after exposure to molten salt mixtures of sodium sulfate containing up to 15 mole percent sodium metavanadate (NaVO3) at 1173 K. The ceramic surface was observed to transform from the cubic/tetragonal to monoclinic phase, concurrent with chemical changes in the molten salt layer in contact with the ceramic. Significant attack rates were observed in both pure sulfate and metavanadate sulfate melts. The rate of attack was found to be quite sensitive to the mole fraction of vanadate in the molten salt solution and the partial pressure of sulfur trioxide in equilibrium with the salt melt. The observed parabolic rate of attack is interpreted to be caused by a reaction controlled by diffusion in the salt that penetrates into the porous layer formed by the destabilization. The parabolic rate constant in mixed sodium metavanadate - sodium sulfate melts was found to be proportional to the SO3 partial pressure and the square of the metavanadate concentration. In-situ Raman spectroscopic measurements allowed simultaneous observations of the ceramic phases and salt chemistry during the attack process.
HIDEC adaptive engine control system flight evaluation results
NASA Technical Reports Server (NTRS)
Yonke, W. A.; Landy, R. J.; Stewart, J. F.
1987-01-01
An integrated flight propulsion control mode, the Adaptive Engine Control System (ADECS), has been developed and flight tested on an F-15 aircraft as part of the NASA Highly Integrated Digital Electronic Control program. The ADECS system realizes additional engine thrust by increasing the engine pressure ratio (EPR) at intermediate and afterburning power, with the amount of EPR uptrim modulated using a predictor scheme for angle-of-attack and sideslip angle. Substantial improvement in aircraft and engine performance was demonstrated, with a 16 percent rate of climb increase, a 14 percent reduction in time to climb, and a 15 percent reduction in time to accelerate. Significant EPR uptrim capability was found with angles-of-attack up to 20 degrees.
NASA Astrophysics Data System (ADS)
Zeeshan, Mohd; Hazarika, Saheera Azmi; Nath, Sujit; Bhanja, Dipankar
2017-07-01
In the present work, a 3-D numerical investigation has been performed to explore the effect of attack angles on the thermal-hydraulic performance of fin and tube heat exchanger (FTHE) using rectangular winglet pairs (RWPs). RWPs are placed adjacent to the tubes and three attack angels are considered for the study i.e. 5°, 15° and 25°. The effect of attack angles are examined on the heat transfer characteristics as well as in pressure drop penalty with airside Reynolds number Rea ranges from 500 to 900. Two performance evaluation criteria namely PEC1 i.e. area goodness factor (j/f) and PEC2 i.e. heat transfer rate per unit fan power consumption (Q/Pf) are considered for the performance evaluation. Furthermore, MOORA method is applied to obtain the performance order of FTHE configurations by taking PEC1 and PEC2 as beneficial attributes and fan power Pf as a non-beneficial attribute, keeping equal importance to each attribute. The results show that 5° attack angle provides the better performance in terms of PEC1 as heat transfer coefficient is increased by 27.70% at Rea=500 and 32.73% at Rea=900 respectively with 13.01% increased pressure drop penalty at Rea=500 and 14.26% at Rea=900 respectively. In terms of PEC2, though the 5° attack angle provides the high values of Q/Pf factor among the 15° and 25° attack angles, but it is found insignificant to replace the baseline configuration i.e. plain fin and tube heat exchanger configuration without vortex generators. Moreover, in MOORA optimization analysis also, it is found that 5° attack angle provides the better thermal-hydraulic performance.
Aberer, Werner; Maurer, Marcus; Bouillet, Laurence; Zanichelli, Andrea; Caballero, Teresa; Longhurst, Hilary J; Perrin, Amandine; Andresen, Irmgard
2017-01-01
Patients with hereditary angioedema (HAE) due to C1-inhibitor deficiency (C1-INH-HAE) experience recurrent attacks of cutaneous or submucosal edema that may be frequent and severe; prophylactic treatments can be prescribed to prevent attacks. However, despite the use of long-term prophylaxis (LTP), breakthrough attacks are known to occur. We used data from the Icatibant Outcome Survey (IOS) to evaluate the characteristics of breakthrough attacks and the effectiveness of icatibant as a treatment option. Data on LTP use, attacks, and treatments were recorded. Attack characteristics, treatment characteristics, and outcomes (time to treatment, time to resolution, and duration of attack) were compared for attacks that occurred with versus without LTP. Data on 3228 icatibant-treated attacks from 448 patients with C1-INH-HAE were analyzed; 30.1% of attacks occurred while patients were using LTP. Attack rate, attack severity, and the distribution of attack sites were similar across all types of LTP used, and were comparable to the results found in patients who did not receive LTP. Attacks were successfully treated with icatibant; 82.5% of all breakthrough attacks were treated with a single icatibant injection without C1-INH rescue medication. Treatment outcomes were comparable for breakthrough attacks across all LTP types, and for attacks without LTP. Patients who use LTP should be aware that breakthrough attacks can occur, and such attacks can be severe. Thus, patients with C1-INH-HAE using LTP should have emergency treatment readily available. Data from IOS show that icatibant is effective for the treatment of breakthrough attacks. Trial Registration NCT01034969.
Kelly, David M; Strudwick, Anthony J; Atkinson, Greg; Drust, Barry; Gregson, Warren
2016-07-01
The measurement of relative physiological stress during training is important because this is the stimulus for the long-term adaptive response. Measurements of perceived exertion (RPE) have been reported to correlate with the heart rate during field-based training sessions. Nevertheless, there are few studies on how well RPE tracks with the heart rate over repeated training sessions in elite soccer players. Therefore, we aimed to quantify the within-participant correlations between variability in session-RPE (sRPE) and the heart rate in elite male soccer players, and to determine whether the playing position moderated these correlations. The field-based training of four central defenders, four wide defenders, six central midfielders, two wide midfielders and three attackers from an elite English Premier League squad were monitored over an entire in-season competitive period, giving a total of 1010 individual training sessions for study. Correlations between session-RPE and heart rates were quantified using a within-participant model. The correlation between changes in sRPE and heart rates was r = 0.75 (95% CI: 0.71-0.78). This correlation remained high across the various player positions (wide-defender, r = 0.81; central-defender, r = 0.74; wide midfielder, r = 0.70; central midfielder, r = 0.70; attacker, r = 0.84; P < 0.001). The correlation between changes in RPE and heart rates, measured during a season-long period of field-based training, is high in a sample of elite soccer players.
Stability of a non-orthogonal stagnation flow to three dimensional disturbances
NASA Technical Reports Server (NTRS)
Lasseigne, D. G.; Jackson, T. L.
1991-01-01
A similarity solution for a low Mach number nonorthogonal flow impinging on a hot or cold plate is presented. For the constant density case, it is known that the stagnation point shifts in the direction of the incoming flow and that this shift increases as the angle of attack decreases. When the effects of density variations are included, a critical plate temperature exists; above this temperature the stagnation point shifts away from the incoming stream as the angle is decreased. This flow field is believed to have application to the reattachment zone of certain separated flows or to a lifting body at a high angle of attack. Finally, the stability of this nonorthogonal flow to self similar, 3-D disturbances is examined. Stability properties of the flow are given as a function of the parameters of this study; ratio of the plate temperature to that of the outer potential flow and angle of attack. In particular, it is shown that the angle of attack can be scaled out by a suitable definition of an equivalent wavenumber and temporal growth rate, and the stability problem for the nonorthogonal case is identical to the stability problem for the orthogonal case.
Identifying Electromagnetic Attacks against Airports
NASA Astrophysics Data System (ADS)
Kreth, A.; Genender, E.; Doering, O.; Garbe, H.
2012-05-01
This work presents a new and sophisticated approach to detect and locate the origin of electromagnetic attacks. At the example of an airport, a normal electromagnetic environment is defined, in which electromagnetic attacks shall be identified. After a brief consideration of the capabilities of high power electromagnetic sources to produce high field strength values, this contribution finally presents the approach of a sensor network, realizing the identification of electromagnetic attacks.
Fourth High Alpha Conference, volume 3
NASA Technical Reports Server (NTRS)
1994-01-01
Thie goal of this conference was to focus on the flight validation of high-angle-of-attack technologies and provide an in-depth review of the latest high-angle-of-attack activities. Areas covered include: (1) high-angle-of-attack aerodynamics; (2) propulsion and inlet dynamics; (3) thrust vectoring; (4) control laws and handling qualities; (5) tactical utility; and (6) forebody controls.
Formulating a strategy for securing high-speed rail in the United States.
DOT National Transportation Integrated Search
2013-03-01
This report presents an analysis of information relating to attacks, attempted attacks, and plots against high-speed rail (HSR) : systems. It draws upon empirical data from MTIs Database of Terrorist and Serious Criminal Attacks Against Public Sur...
Collective attacks and unconditional security in continuous variable quantum key distribution.
Grosshans, Frédéric
2005-01-21
We present here an information theoretic study of Gaussian collective attacks on the continuous variable key distribution protocols based on Gaussian modulation of coherent states. These attacks, overlooked in previous security studies, give a finite advantage to the eavesdropper in the experimentally relevant lossy channel, but are not powerful enough to reduce the range of the reverse reconciliation protocols. Secret key rates are given for the ideal case where Bob performs optimal collective measurements, as well as for the realistic cases where he performs homodyne or heterodyne measurements. We also apply the generic security proof of Christiandl et al. to obtain unconditionally secure rates for these protocols.
Numerical simulation of the flow about the F-18 HARV at high angle of attack
NASA Technical Reports Server (NTRS)
Murman, Scott M.
1994-01-01
As part of NASA's High Alpha Technology Program, research has been aimed at developing and extending numerical methods to accurately predict the high Reynolds number flow about the NASA F-18 High Alpha Research Vehicle (HARV) at large angles of attack. The HARV aircraft is equipped with a bidirectional thrust vectoring unit which enables stable, controlled flight through 70 deg angle of attack. Currently, high-fidelity numerical solutions for the flow about the HARV have been obtained at alpha = 30 deg, and validated against flight-test data. It is planned to simulate the flow about the HARV through alpha = 60 deg, and obtain solutions of the same quality as those at the lower angles of attack. This report presents the status of work aimed at extending the HARV computations to the extreme angle of attack range.
Control-system techniques for improved departure/spin resistance for fighter aircraft
NASA Technical Reports Server (NTRS)
Nguyen, L. T.; Gilbert, W. P.; Ogburn, M. E.
1980-01-01
Some fundamental information on control system effects on controllability of highly maneuverable aircraft at high angles of attack are summarized as well as techniques for enhancing fighter aircraft departure/spin resistance using control system design. The discussion includes: (1) a brief review of pertinent high angle of attack phenomena including aerodynamics, inertia coupling, and kinematic coupling; (2) effects of conventional stability augmentation systems at high angles of attack; (3) high angle of attack control system concepts designed to enhance departure/spin resistance; and (4) the outlook for applications of these concepts to future fighters, particularly those designs which incorporate relaxed static stability.
Predicting Factors of Zone 4 Attack in Volleyball.
Costa, Gustavo C; Castro, Henrique O; Evangelista, Breno F; Malheiros, Laura M; Greco, Pablo J; Ugrinowitsch, Herbert
2017-06-01
This study examined 142 volleyball games of the Men's Super League 2014/2015 seasons in Brazil from which we analyzed 24-26 games of each participating team, identifying 5,267 Zone 4 attacks for further analysis. Within these Zone 4 attacks, we analyzed the association between the effect of the attack carried out and the separate effects of serve reception, tempo and type of attack. We found that the reception, tempo of attack, second tempo of attack, and power of diagonal attack were predictors of the attack effect in Zone 4. Moreover, placed attacks showed a tendency to not yield a score. In conclusion, winning points in high-level men's volleyball requires excellent receptions, a fast attack tempo and powerfully executed of attacks.
Error and attack tolerance of complex networks
NASA Astrophysics Data System (ADS)
Albert, Réka; Jeong, Hawoong; Barabási, Albert-László
2000-07-01
Many complex systems display a surprising degree of tolerance against errors. For example, relatively simple organisms grow, persist and reproduce despite drastic pharmaceutical or environmental interventions, an error tolerance attributed to the robustness of the underlying metabolic network. Complex communication networks display a surprising degree of robustness: although key components regularly malfunction, local failures rarely lead to the loss of the global information-carrying ability of the network. The stability of these and other complex systems is often attributed to the redundant wiring of the functional web defined by the systems' components. Here we demonstrate that error tolerance is not shared by all redundant systems: it is displayed only by a class of inhomogeneously wired networks, called scale-free networks, which include the World-Wide Web, the Internet, social networks and cells. We find that such networks display an unexpected degree of robustness, the ability of their nodes to communicate being unaffected even by unrealistically high failure rates. However, error tolerance comes at a high price in that these networks are extremely vulnerable to attacks (that is, to the selection and removal of a few nodes that play a vital role in maintaining the network's connectivity). Such error tolerance and attack vulnerability are generic properties of communication networks.
Seeger, M; Timmis, K N; Hofer, B
1995-01-01
Metabolism of 21 chlorobiphenyls by the enzymes of the upper biphenyl catabolic pathway encoded by the bph locus of Pseudomonas sp. strain LB400 was investigated by using recombinant strains harboring gene cassettes containing bphABC or bphABCD. The enzymes of the upper pathway were generally able to metabolize mono- and dichlorinated biphenyls but only partially transform most trichlorinated congeners investigated: 14 of 15 mono- and dichlorinated and 2 of 6 trichlorinated congeners were converted into benzoates. All mono- and at least 8 of 12 dichlorinated congeners were attacked by the bphA-encoded biphenyl dioxygenase virtually exclusively at ortho and meta carbons. This enzyme exhibited a high degree of selectivity for the aromatic ring to be attacked, with the order of ring preference being non- > ortho- > meta- > para-substituted for mono- and dichlorinated congeners. The influence of the chlorine substitution pattern of the metabolized ring on benzoate formation resembled its influence on the reactivity of initial dioxygenation, suggesting that the rate of benzoate formation may frequently be determined by the rate of initial attack. The absorption spectra of phenylhexadienoates formed correlated with the presence or absence of a chlorine substituent at an ortho position. PMID:7618878
Fourth High Alpha Conference, volume 2
NASA Technical Reports Server (NTRS)
1994-01-01
The goal of the Fourth High Alpha Conference, held at the NASA Dryden Flight Research Center on July 12-14, 1994, was to focus on the flight validation of high angle of attack technologies and provide an in-depth review of the latest high angle of attack activities. Areas that were covered include high angle of attack aerodynamics, propulsion and inlet dynamics, thrust vectoring, control laws and handling qualities, and tactical utility.
Hansen, E Matthew; Munson, A Steven; Blackford, Darren C; Graves, Andrew D; Coleman, Tom W; Baggett, L Scott
2017-10-01
We tested 3-methylcyclohex-2-en-1-one (MCH) and an Acer kairomone blend (AKB) as repellent semiochemicals for area and single tree protection to prevent spruce beetle (Dendroctonus rufipennis Kirby) attacks at locations in Utah and New Mexico. In the area protection study, we compared host infestation rates of MCH applications at three densities (20, 40, and 80 g MCH ha-1) against a control treatment over 0.64 ha plots centered within ~1.25 ha treatment blocks. All treatments included two baited funnel traps within the plot to assure spruce beetle pressure. Following beetle attack, plots were surveyed for new spruce beetle attacks and to quantify stand characteristics. The probability of more severe spruce beetle attacks was significantly reduced, by ~50%, in each of the MCH area treatments compared with the control treatment but there was no significant treatment difference among the MCH deployment densities. For the single tree protection study, we compared attack rates of MCH, Acer kairomone blend (AKB), and MCH plus AKB on spruce beetle-baited trees against bait-only trees. Each treatment was applied over a range of host diameters to test for host size effects. Seventy-five percent of control trees were mass-attacked, about one-third of MCH- and AKB-alone spruce was mass-attacked, and no MCH plus AKB spruce were mass-attacked. These results suggest that MCH alone is a marginal area and single tree protectant against spruce beetle but that deployment with other repellents can significantly increase treatment efficacy. Published by Oxford University Press on behalf of Entomological Society of America 2017. This work is written by (a) US Government employee(s) and is in the public domain in the US.
An outbreak of influenza A(H1N1)pdm09 virus in a primary school in Vietnam.
Duong, Tran Nhu; Tho, Nguyen Thi Thi; Hien, Nguyen Tran; Olowokure, Babatunde
2015-10-15
Despite school pupils being at greatest risk during the 2009 influenza pandemic there are limited data on outbreaks of influenza A(H1N1)pdm09 in primary schools in South-East Asia. This prospective cohort study describes an outbreak of influenza A(H1N1)pdm09 in a primary school in rural Vietnam. In total 103 cases of influenza-like illness were found among the 407 pupils in the primary school. Ten of these were laboratory confirmed cases of influenza A(H1N1)pdm09 virus. The overall attack rate (AR) was 25% (103/407), and was highest (41%) in grade 4 pupils, where the outbreak started. All cases in the outbreak presented with a mild and self-limiting illness, acute respiratory symptoms and fever. Public health interventions to contain the outbreak could explain the lower attack rates in other grades. Ill pupils were asked to stay at home. Oseltamivir was not given to pupils and the school did not close during the outbreak. The last detected case occurred 12 days following identification of the first case. This is the first report of an outbreak of influenza A(H1N1)pdm09 among pupils in a primary school in Vietnam. High attack rates in Grade 4 pupils suggest shared activities contributed to transmission. The public health response using non-pharmaceutical measures may have played a role in ending the outbreak.
NASA Technical Reports Server (NTRS)
Gilbert, W. P.; Nguyen, L. T.; Vangunst, R. W.
1976-01-01
A piloted, fixed-base simulation was conducted to study the effectiveness of some automatic control system features designed to improve the stability and control characteristics of fighter airplanes at high angles of attack. These features include an angle-of-attack limiter, a normal-acceleration limiter, an aileron-rudder interconnect, and a stability-axis yaw damper. The study was based on a current lightweight fighter prototype. The aerodynamic data used in the simulation were measured on a 0.15-scale model at low Reynolds number and low subsonic Mach number. The simulation was conducted on the Langley differential maneuvering simulator, and the evaluation involved representative combat maneuvering. Results of the investigation show the fully augmented airplane to be quite stable and maneuverable throughout the operational angle-of-attack range. The angle-of-attack/normal-acceleration limiting feature of the pitch control system is found to be a necessity to avoid angle-of-attack excursions at high angles of attack. The aileron-rudder interconnect system is shown to be very effective in making the airplane departure resistant while the stability-axis yaw damper provided improved high-angle-of-attack roll performance with a minimum of sideslip excursions.
Estimating the Benefits of Gypsy Moth Control on Timberland
David A. Gansner; Owen W. Herrick; Owen W. Herrick
1987-01-01
A recent study of forest stand losses to gypsy moth has provided basic information for evaluating the benefits of control on new frontiers of infestation. Protecting highly susceptible trees from impending attack can prevent a potential loss of 15 percent in their timber value and 2.8 percent in their compound rate of value growth.
Hirst, William; Phelps, Elizabeth A.; Buckner, Randy L.; Budson, Andrew E.; Cuc, Alexandru; Gabrieli, John D. E.; Johnson, Marcia K.; Lyle, Keith B.; Lustig, Cindy; Mather, Mara; Meksin, Robert; Mitchell, Karen J.; Ochsner, Kevin N.; Schacter, Daniel L.; Simons, Jon S.; Vaidya, Chandan J.
2010-01-01
More than 3,000 individuals from seven US cities reported on their memories of learning of the terrorist attacks of September 11, as well as details about the attack, one week, 11 months, and/or 35 months after the assault. Some studies of flashbulb memories examining long-term retention show slowing in the rate of forgetting after a year, whereas others demonstrate accelerated forgetting. The present paper indicates that (1) the rate of forgetting for flashbulb memories and event memory (memory for details about the event itself) slows after a year, (2) the strong emotional reactions elicited by flashbulb events are remembered poorly, worse than non-emotional features such as where and from whom one learned of the attack, and (3) the content of flashbulb and event memories stabilizes after a year. The results are discussed in terms of community memory practices. PMID:19397377
Quantum key distribution using continuous-variable non-Gaussian states
NASA Astrophysics Data System (ADS)
Borelli, L. F. M.; Aguiar, L. S.; Roversi, J. A.; Vidiella-Barranco, A.
2016-02-01
In this work, we present a quantum key distribution protocol using continuous-variable non-Gaussian states, homodyne detection and post-selection. The employed signal states are the photon added then subtracted coherent states (PASCS) in which one photon is added and subsequently one photon is subtracted from the field. We analyze the performance of our protocol, compared with a coherent state-based protocol, for two different attacks that could be carried out by the eavesdropper (Eve). We calculate the secret key rate transmission in a lossy line for a superior channel (beam-splitter) attack, and we show that we may increase the secret key generation rate by using the non-Gaussian PASCS rather than coherent states. We also consider the simultaneous quadrature measurement (intercept-resend) attack, and we show that the efficiency of Eve's attack is substantially reduced if PASCS are used as signal states.
AdaBoost-based algorithm for network intrusion detection.
Hu, Weiming; Hu, Wei; Maybank, Steve
2008-04-01
Network intrusion detection aims at distinguishing the attacks on the Internet from normal use of the Internet. It is an indispensable part of the information security system. Due to the variety of network behaviors and the rapid development of attack fashions, it is necessary to develop fast machine-learning-based intrusion detection algorithms with high detection rates and low false-alarm rates. In this correspondence, we propose an intrusion detection algorithm based on the AdaBoost algorithm. In the algorithm, decision stumps are used as weak classifiers. The decision rules are provided for both categorical and continuous features. By combining the weak classifiers for continuous features and the weak classifiers for categorical features into a strong classifier, the relations between these two different types of features are handled naturally, without any forced conversions between continuous and categorical features. Adaptable initial weights and a simple strategy for avoiding overfitting are adopted to improve the performance of the algorithm. Experimental results show that our algorithm has low computational complexity and error rates, as compared with algorithms of higher computational complexity, as tested on the benchmark sample data.
Improved Fake-State Attack to the Quantum Key Distribution Systems
NASA Astrophysics Data System (ADS)
Zhang, Sheng; Wang, Jian; Tang, Chao-jing
2012-09-01
It has been showed that most commercial quantum cryptosystems are vulnerable to the fake-state attacks, which employ the loophole that the avalanche photodiodes as single photon detectors still produce detection events in the linear mode. However, previous fake-state attacks may be easily prevented by either installing a watch dog or reconfiguring the dead-time assigning component. In this paper, we present a new technique to counteract the after-pulse effect ever enhanced by the fake-state attacks, in order to lower the quantum bit error rate. Obviously, it is more difficult to detect the presented attack scheme. Indeed, it contributes to promoting of implementing a secure quantum cryptosystem in real life.
Multi-application controls: Robust nonlinear multivariable aerospace controls applications
NASA Technical Reports Server (NTRS)
Enns, Dale F.; Bugajski, Daniel J.; Carter, John; Antoniewicz, Bob
1994-01-01
This viewgraph presentation describes the general methodology used to apply Honywell's Multi-Application Control (MACH) and the specific application to the F-18 High Angle-of-Attack Research Vehicle (HARV) including piloted simulation handling qualities evaluation. The general steps include insertion of modeling data for geometry and mass properties, aerodynamics, propulsion data and assumptions, requirements and specifications, e.g. definition of control variables, handling qualities, stability margins and statements for bandwidth, control power, priorities, position and rate limits. The specific steps include choice of independent variables for least squares fits to aerodynamic and propulsion data, modifications to the management of the controls with regard to integrator windup and actuation limiting and priorities, e.g. pitch priority over roll, and command limiting to prevent departures and/or undesirable inertial coupling or inability to recover to a stable trim condition. The HARV control problem is characterized by significant nonlinearities and multivariable interactions in the low speed, high angle-of-attack, high angular rate flight regime. Systematic approaches to the control of vehicle motions modeled with coupled nonlinear equations of motion have been developed. This paper will discuss the dynamic inversion approach which explicity accounts for nonlinearities in the control design. Multiple control effectors (including aerodynamic control surfaces and thrust vectoring control) and sensors are used to control the motions of the vehicles in several degrees-of-freedom. Several maneuvers will be used to illustrate performance of MACH in the high angle-of-attack flight regime. Analytical methods for assessing the robust performance of the multivariable control system in the presence of math modeling uncertainty, disturbances, and commands have reached a high level of maturity. The structured singular value (mu) frequency response methodology is presented as a method for analyzing robust performance and the mu-synthesis method will be presented as a method for synthesizing a robust control system. The paper concludes with the author's expectations regarding future applications of robust nonlinear multivariable controls.
Improved statistical analysis of moclobemide dose effects on panic disorder treatment.
Ross, Donald C; Klein, Donald F; Uhlenhuth, E H
2010-04-01
Clinical trials with several measurement occasions are frequently analyzed using only the last available observation as the dependent variable [last observation carried forward (LOCF)]. This ignores intermediate observations. We reanalyze, with complete data methods, a clinical trial previously reported using LOCF, comparing placebo and five dosage levels of moclobemide in the treatment of outpatients with panic disorder to illustrate the superiority of methods using repeated observations. We initially analyzed unprovoked and situational, major and minor attacks as the four dependent variables, by repeated measures maximum likelihood methods. The model included parameters for linear and curvilinear time trends and regression of measures during treatment on baseline measures. Significance tests using this method take into account the structure of the error covariance matrix. This makes the sphericity assumption irrelevant. Missingness is assumed to be unrelated to eventual outcome and the residuals are assumed to have a multivariate normal distribution. No differential treatment effects for limited attacks were found. Since similar results were obtained for both types of major attack, data for the two types of major attack were combined. Overall downward linear and negatively accelerated downward curvilinear time trends were found. There were highly significant treatment differences in the regression slopes of scores during treatment on baseline observations. For major attacks, all treatment groups improved over time. The flatter regression slopes, obtained with higher doses, indicated that higher doses result in uniformly lower attack rates regardless of initial severity. Lower doses do not lower the attack rate of severely ill patients to those achieved in the less severely ill. The clinical implication is that more severe patients require higher doses to attain best benefit. Further, the significance levels obtained by LOCF analyses were only in the 0.05-0.01 range, while significance levels of <0.00001 were obtained by these repeated measures analyses indicating increased power. The greater sensitivity to treatment effect of this complete data method is illustrated. To increase power, it is often recommended to increase sample size. However, this is often impractical since a major proportion of the cost per subject is due to the initial evaluation. Increasing the number of repeated observations increases power economically and also allows detailed longitudinal trajectory analyses.
Three-Dimensional Effects in Multi-Element High Lift Computations
NASA Technical Reports Server (NTRS)
Rumsey, Christopher L.; LeeReusch, Elizabeth M.; Watson, Ralph D.
2003-01-01
In an effort to discover the causes for disagreement between previous two-dimensional (2-D) computations and nominally 2-D experiment for flow over the three-element McDonnell Douglas 30P-30N airfoil configuration at high lift, a combined experimental/CFD investigation is described. The experiment explores several different side-wall boundary layer control venting patterns, documents venting mass flow rates, and looks at corner surface flow patterns. The experimental angle of attack at maximum lift is found to be sensitive to the side-wall venting pattern: a particular pattern increases the angle of attack at maximum lift by at least 2 deg. A significant amount of spanwise pressure variation is present at angles of attack near maximum lift. A CFD study using three-dimensional (3-D) structured-grid computations, which includes the modeling of side-wall venting, is employed to investigate 3-D effects on the flow. Side-wall suction strength is found to affect the angle at which maximum lift is predicted. Maximum lift in the CFD is shown to be limited by the growth of an off-body corner flow vortex and consequent increase in spanwise pressure variation and decrease in circulation. The 3-D computations with and without wall venting predict similar trends to experiment at low angles of attack, but either stall too early or else overpredict lift levels near maximum lift by as much as 5%. Unstructured-grid computations demonstrate that mounting brackets lower the lift levels near maximum lift conditions.
Three-Dimensional Effects on Multi-Element High Lift Computations
NASA Technical Reports Server (NTRS)
Rumsey, Christopher L.; Lee-Rausch, Elizabeth M.; Watson, Ralph D.
2002-01-01
In an effort to discover the causes for disagreement between previous 2-D computations and nominally 2-D experiment for flow over the 3-clement McDonnell Douglas 30P-30N airfoil configuration at high lift, a combined experimental/CFD investigation is described. The experiment explores several different side-wall boundary layer control venting patterns, document's venting mass flow rates, and looks at corner surface flow patterns. The experimental angle of attack at maximum lift is found to be sensitive to the side wall venting pattern: a particular pattern increases the angle of attack at maximum lift by at least 2 deg. A significant amount of spanwise pressure variation is present at angles of attack near maximum lift. A CFD study using 3-D structured-grid computations, which includes the modeling of side-wall venting, is employed to investigate 3-D effects of the flow. Side-wall suction strength is found to affect the angle at which maximum lift is predicted. Maximum lift in the CFD is shown to be limited by the growth of all off-body corner flow vortex and consequent increase in spanwise pressure variation and decrease in circulation. The 3-D computations with and without wall venting predict similar trends to experiment at low angles of attack, but either stall too earl or else overpredict lift levels near maximum lift by as much as 5%. Unstructured-grid computations demonstrate that mounting brackets lower die the levels near maximum lift conditions.
Sheng, Sheng; Ling, Meng; Fu-An, Wu; Baoping, Li
2015-01-01
Foraging parasitoids often must estimate local risk of predation just as they must estimate local patch value. Here, we investigate the effects a generalist predator Chlaenius bioculatus (Coleoptera: Carabidae), has on the oviposition behavior and the patch residence decisions of a solitary parasitoid Meteorus pulchricornis (Hymenoptera: Braconidae) in response to the varying host quality of Spodoptera litura (Lepidoptera: Noctuidae) larvae (L2 and L4). M. pulchricornis attacked more L4 than on L2 hosts, with the difference in attack rate varying depending on predation treatments, greater in the presence (either actively feeding or not) of the predator than in the absence of it. The parasitoid attacked fewer L2 and L4 hosts when the predator was actively feeding than when it was not feeding or not present in the patch. M. pulchricornis decreased the patch leaving tendency with increasing rejections of hosts, but increased the tendency in response to the presence of the predator as compared with the absence of it, and furthermore, increased the patch leaving tendency when the predator was actively feeding as compared with when it was not. Our study suggests that M. pulchricornis can exploit high quality patches while minimizing predation risk, by attacking more hosts in high quality patches while reducing total patch time in response to risk of predation. © The Author 2015. Published by Oxford University Press on behalf of the Entomological Society of America.
NASA Technical Reports Server (NTRS)
Weick, Fred E; Harris, Thomas A
1933-01-01
Discussed here are a series of systematic tests being conducted to compare different lateral control devices with particular reference to their effectiveness at high angles of attack. The present tests were made with six different forms of floating tip ailerons of symmetrical section. The tests showed the effect of the various ailerons on the general performance characteristics of the wing, and on the lateral controllability and stability characteristics. In addition, the hinge moments were measured for the most interesting cases. The results are compared with those for a rectangular wing with ordinary ailerons and also with those for a rectangular wing having full-chord floating tip ailerons. Practically all the floating tip ailerons gave satisfactory rolling moments at all angles of attack and at the same time gave no adverse yawing moments of appreciable magnitude. The general performance characteristics with the floating tip ailerons, however, were relatively poor, especially the rate of climb. None of the floating tip ailerons entirely eliminated the auto rotational moments at angles of attack above the stall, but all of them gave lower moments than a plain wing. Some of the floating ailerons fluttered if given sufficiently large deflection, but this could have been eliminated by moving the hinge axis of the ailerons forward. Considering all points including hinge moments, the floating tip ailerons on the wing with 5:1 taper are probably the best of those which were tested.
Zhang, Zheshen; Voss, Paul L
2009-07-06
We propose a continuous variable based quantum key distribution protocol that makes use of discretely signaled coherent light and reverse error reconciliation. We present a rigorous security proof against collective attacks with realistic lossy, noisy quantum channels, imperfect detector efficiency, and detector electronic noise. This protocol is promising for convenient, high-speed operation at link distances up to 50 km with the use of post-selection.
Cougar attacks on children: injury patterns and treatment.
Kadesky, K M; Manarey, C; Blair, G K; Murphy, J J; Verchere, C; Atkinson, K
1998-06-01
Cougar attacks on humans appear to be on the rise. A review of all attacks on children was performed to determine the method of attack and injury patterns so that a treatment regimen as well as possible preventative measures could be determined. A review of all attacks, including attacks on children, was performed, including three recent attacks treated at our institution. Situation, adult supervision, patient age, injuries recorded, survival, and mode of attack, if known, were reviewed. There were 50 documented attacks on children with a 25% fatality rate. Most children were not alone at the time of the attack (92%), and in many instances adult supervision was present or nearby. Severe head and neck lacerations along with puncture wounds were the most common injury. Examples of typical cervical injuries include a nonfatal vertebral artery injury, phrenic nerve injury, a fatal internal carotid artery injury, and a fatal cervical spine injury. The cougar was rabid in two cases. Pasteurella resulted in late infections in two patients. Based on the pattern of injuries, the authors recommend aggressive evaluation for occult cervical injuries as well as surgical debridement. Antibiotics should cover oropharyngeal flora including Pasteurella multocida. Rabies prophylaxis is indicated. Adult supervision in wilderness areas is not necessarily protective.
NASA Technical Reports Server (NTRS)
Stoll, F.; Koenig, D. G.
1983-01-01
Data obtained through very high angles of attack from a large-scale, subsonic wind-tunnel test of a close-coupled canard-delta-wing fighter model are analyzed. The canard delays wing leading-edge vortex breakdown, even for angles of attack at which the canard is completely stalled. A vortex-lattice method was applied which gave good predictions of lift and pitching moment up to an angle of attack of about 20 deg, where vortex-breakdown effects on performance become significant. Pitch-control inputs generally retain full effectiveness up to the angle of attack of maximum lift, beyond which, effectiveness drops off rapidly. A high-angle-of-attack prediction method gives good estimates of lift and drag for the completely stalled aircraft. Roll asymmetry observed at zero sideslip is apparently caused by an asymmetry in the model support structure.
Strategic Policy for Pandemic Vaccine Distribution
2010-09-01
Act (PREP Act) was passed as part of the “Department of Defense, Emergency Supplemental Appropriations to address hurricanes in the Gulf of Mexico ...few respondents stated, “It caught us by surprise!” The next pandemic was to have come over from Asia. H1N1 came up quickly through Mexico . It was...discussion. The severity of H1N1 in Mexico was extremely high initially, in addition to the attack rate. The case fatality rate exceeded 65 percent.9 A
Public knowledge of heart attack symptoms in Beijing residents.
Zhang, Qing-Tan; Hu, Da-Yi; Yang, Jin-Gang; Zhang, Shou-Yan; Zhang, Xin-Quan; Liu, Shu-Shan
2007-09-20
Definitive treatment for heart attack is early reperfusion with either angioplasty or thrombolytic therapy, and the benefit is strictly time-dependent. Patient outcomes are improved with either therapy when initiated as soon as possible. Recognition of heart attack symptoms is logically tied to taking action to receive prompt emergency care. Inadequate knowledge of heart attack symptoms may prolong delay. The purpose of this study was to document knowledge about heart attack symptoms in Beijing residents and to identify the characteristics associated with increased knowledge of heart attack. A structured survey was conducted in 18 communities in Beijing from March 1 through June 10 in 2006. Addresses and participants were selected randomly following a stratification. The survey was designed to collect knowledge of heart attack symptoms from sampled adults in each community. A total of 4627 respondents completed the questionnaires correctly, and 50.29% of them were female. Totally 64.15% of the respondents reported chest pain or discomfort (common symptoms) as a symptom of heart attack; 75.38% reported at least one of the following eight symptoms as a symptom of heart attack: back pain, shortness of breath, arm pain or numbness, nausea or vomiting, neck, jaw or shoulder pain, epigastric pain, sweating, weakness (less common symptoms); 20.36% correctly reported four or more heart attack symptoms, only 7.4% knew all the correct heart attack symptoms, and 28.94% knew about reperfusion therapy for heart attack; 31.7% reported to call 120 or 999 while having a heart attack themselves; however 89.6% reported to call 120 or 999 when someone else is suffering from a heart attack. Very old persons and those with health insurance coverage, high education level, high household income, longer living in Beijing and previous experience with heart disease had greater knowledge of heart attack symptoms. Public knowledge of common heart attack symptoms as well as less common heart attack symptoms is deficient in Beijing residents. But their knowledge of calling emergency medical services when someone is having a heart attack is relatively adequate. Public health efforts are needed to increase the recognition of the major heart attack symptoms in both the general public and groups at high risk for an acute cardiac event, especially in socioeconomically disadvantaged subgroups, including persons with low education level, low household income, and no health insurance coverage.
Experimental Flight Characterization of Spin Stabilized Projectiles at High Angle of Attack
2017-08-07
ARL-TR-8082 ● AUG 2017 US Army Research Laboratory Experimental Flight Characterization of Spin- Stabilized Projectiles at High ...Experimental Flight Characterization of Spin- Stabilized Projectiles at High Angle of Attack by Frank Fresconi and Ilmars Celmins Weapons and Materials...June 2016–June 2017 4. TITLE AND SUBTITLE Experimental Flight Characterization of Spin-Stabilized Projectiles at High Angle of Attack 5a. CONTRACT
Brown, Lily A; LeBeau, Richard; Liao, Betty; Niles, Andrea N; Glenn, Daniel; Craske, Michelle G
2016-01-30
Panic attacks occurring outside of Panic Disorder are not well-understood despite their inclusion as a diagnostic specifier in the Diagnostic and Statistical Manual for Mental Disorders (DSM-5). This study compares panic attacks in the context of Panic Disorder compared to social anxiety in terms of their symptom frequency, severity, and clinical correlates. Participants (n=404) were interviewed using the Anxiety Disorders Interview Schedule (ADIS-IV-L; Brown et al., 1994), from which we analyzed interviewer ratings of panic attacks and panic attack symptoms, as well as other demographic and clinical characteristics. Panic attacks in the context of Panic Disorder were characterized by a greater number and severity of symptoms compared to panic attacks in the context of Social Anxiety Disorder, and were associated with a history of traumatization, inpatient psychiatric treatment, and benzodiazepine use. Social anxiety panic attacks were associated with reduced physical health concerns. Cognitive panic attack symptoms were more prevalent in Panic Disorder and were associated with a variety of poor clinical correlates. Panic attacks in the context of Panic Disorder are more severe than those in social anxiety, and this may be driven by cognitive disturbances during those attacks. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.
Sandset, Else Charlotte; Berge, Eivind; Kjeldsen, Sverre E; Julius, Stevo; Holzhauer, Björn; Krarup, Lars-Henrik; Hua, Tsushung A
2014-01-01
Risk factors for first stroke are well established, but less is known about risk factors for recurrent stroke. In the present analysis, we aimed to assess the effect of heart rate and other possible predictors of stroke in a hypertensive population with previous stroke or transient ischemic attack (TIA). The Valsartan Antihypertensive Long-Term Use Evaluation trial was a multicentre, double-masked, randomized controlled, parallel group trial comparing the effects of an angiotensin receptor blocker (valsartan) and a calcium channel blocker (amlodipine) in patients with hypertension and high cardiovascular risk. We used Cox proportional hazard models to investigate the effect of baseline variables on the risk of stroke. Quadratic terms of the continuous variables were entered in the models to test for linearity. Of 15,245 patients included in the trial, 3014 had a previous stroke or TIA at baseline and were included in the present analysis. Stroke recurrence occurred in 239 patients (7.9%) during a median of 4.5 years of follow-up. Resting heart rate (per 10 beats per minute; hazard ratio [HR], 2.78; 95% confidence interval [CI], 1.18-6.58) and diabetes mellitus at baseline (HR, 1.47; 95% CI, 1.03-2.10) were significantly associated with an increased risk of stroke recurrence in the multivariable analysis. In high-risk, hypertensive patients with previous stroke or TIA, resting heart rate was the strongest predictor of recurrent stroke. Copyright © 2014 National Stroke Association. Published by Elsevier Inc. All rights reserved.
Evidence for maintenance of sex by pathogens in plants.
Busch, Jeremiah W; Neiman, Maurine; Koslow, Jennifer M
2004-11-01
The predominance of outcrossing despite the substantial transmission advantage of self-fertilization remains a paradox. Theory suggests that selection can favor outcrossing if it enables the production of offspring that are less susceptible to pathogen attack than offspring produced via self-fertilization. Thus, if pathogen pressure is contributing to the maintenance of outcrossing in plants, there may be a positive correlation between the number of pathogen species attacking plant species and the outcrossing rate of the plant species. We tested this hypothesis by examining the association between outcrossing rate and the number of fungal pathogen species that attack a large, taxonomically diverse set of seed plants. We show that plant species attacked by more fungal pathogen species have higher outcrossing rates than plants with fewer enemies. This relationship persists after correcting for study bias among natural and agricultural species of plants. We also accounted for the nested hierarchy of relationships among plant lineages by conducting phylogenetically independent contrasts (PICs) within genera and families that were adequately represented in our dataset. A meta-analysis of the correlation between pathogen and outcrossing PICs shows that there is a positive correlation between pathogen species number and outcrossing rates. This pattern is consistent with the hypothesis that pathogen-mediated selection may contribute to the maintenance of outcrossing in species of seed plants.
Cancellation control law for lateral-directional dynamics of a supermaneuverable aircraft
NASA Technical Reports Server (NTRS)
Snell, Antony
1993-01-01
Cancellation control laws are designed which reduce the high levels of lateral acceleration encountered during aggressive rolling maneuvers executed at high angle of attack. Two independent problem are examined. One is to reduce lateral acceleration at the mass center, while the other focuses on lateral acceleration at the pilot's station, located 7.0 m forward of the mass center. Both of these problems are challenging and somewhat different in their limitations. In each case the design is based on a linearization of the lateral-directional dynamics about a high angle of attack condition. The controllers incorporate dynamic inversion inner loops to provide control of stability-axis roll- and yaw-rates and then employ cancellation filters in both feed-forward and feed-back signal paths. The relative simplicity of the control laws should allow nonlinear generalizations to be devised. Although it is shown that lateral acceleration can be reduced substantially by such control laws, this is at the cost of slowed roll response, poor dutch-roll damping or a combination of the two.
High angle-of-attack aerodynamic characteristics of crescent and elliptic wings
NASA Technical Reports Server (NTRS)
Vandam, C. P.
1989-01-01
Static longitudinal and lateral-directional forces and moments were measured for elliptic- and crescent-wing models at high angles-of-attack in the NASA Langley 14 by 22-Ft Subsonic Tunnel. The forces and moments were obtained for an angle-of-attack range including stall and post-stall conditions at a Reynolds number based on the average wing chord of about 1.8 million. Flow-visualization photographs using a mixture of oil and titanium-dioxide were also taken for several incidence angles. The force and moment data and the flow-visualization results indicated that the crescent wing model with its highly swept tips produced much better high angle-of-attack aerodynamic characteristics than the elliptic model. Leading-edge separation-induced vortex flow over the highly swept tips of the crescent wing is thought to produce this improved behavior at high angles-of-attack. The unique planform design could result in safer and more efficient low-speed airplanes.
Method and tool for network vulnerability analysis
Swiler, Laura Painton [Albuquerque, NM; Phillips, Cynthia A [Albuquerque, NM
2006-03-14
A computer system analysis tool and method that will allow for qualitative and quantitative assessment of security attributes and vulnerabilities in systems including computer networks. The invention is based on generation of attack graphs wherein each node represents a possible attack state and each edge represents a change in state caused by a single action taken by an attacker or unwitting assistant. Edges are weighted using metrics such as attacker effort, likelihood of attack success, or time to succeed. Generation of an attack graph is accomplished by matching information about attack requirements (specified in "attack templates") to information about computer system configuration (contained in a configuration file that can be updated to reflect system changes occurring during the course of an attack) and assumed attacker capabilities (reflected in "attacker profiles"). High risk attack paths, which correspond to those considered suited to application of attack countermeasures given limited resources for applying countermeasures, are identified by finding "epsilon optimal paths."
Yatomi, A; Iguchi, A; Uemura, K; Sakamoto, N; Iwase, S; Mano, T
1989-03-01
Muscle sympathetic nerve activity was recorded in a 57-year-old male patient suffering from severe hypotensive attacks with bradycardia for 10 years. Continuous blood pressure recording demonstrated frequent drastic falls in pressure. Disappearance and reappearance of muscle sympathetic nerve activity coincided with the onset and termination of attacks. Awakening from sleep or emotional and/or cardiovascular stress seems to trigger hypotension. Cardiac pacemaker was not useful in limiting the attack, because right ventricular pacing caused abrupt falls in both blood pressure and heart rate.
Pfaltz, Monique C; Michael, Tanja; Meyer, Andrea H; Wilhelm, Frank H
2013-08-01
Panic attacks are frequently perceived as life threatening. Panic disorder (PD) patients may therefore experience symptoms of posttraumatic stress disorder (PTSD). The authors explored this in 28 healthy controls, 17 PTSD patients, and 24 PD patients with agoraphobia who completed electronic diaries 36 times during 1 week. Patient groups frequently reported dissociation as well as thoughts, memories, and reliving of their trauma or panic attacks. PTSD patients reported more trauma/panic attack thoughts (incidence rate ratio [IRR] = 2.9) and memories (IRR = 2.8) than PD patients. Patient groups relived their trauma or panic attacks equally frequently, and reported comparable bodily reactions and distress associated with trauma or panic attack memories. Clinical groups avoided trauma or panic attack reminders more often than healthy controls (avoidance of trauma- or panic attack-related thoughts (IRR = 8.0); avoidance of things associated with the trauma or panic attack (IRR = 40.7). PD patients avoided trauma or panic attack reminders less often than PTSD patients (avoidance of trauma- or panic attack-related thoughts [IRR = 2.5]; avoidance of things associated with the trauma or panic attack [IRR = 4.1]), yet these differences were nonsignificant when controlling for functional impairment. In conclusion, trauma-like symptoms are common in PD with agoraphobia and panic attacks may be processed similarly as trauma in PTSD. Copyright © 2013 International Society for Traumatic Stress Studies.
False Positive and False Negative Effects on Network Attacks
NASA Astrophysics Data System (ADS)
Shang, Yilun
2018-01-01
Robustness against attacks serves as evidence for complex network structures and failure mechanisms that lie behind them. Most often, due to detection capability limitation or good disguises, attacks on networks are subject to false positives and false negatives, meaning that functional nodes may be falsely regarded as compromised by the attacker and vice versa. In this work, we initiate a study of false positive/negative effects on network robustness against three fundamental types of attack strategies, namely, random attacks (RA), localized attacks (LA), and targeted attack (TA). By developing a general mathematical framework based upon the percolation model, we investigate analytically and by numerical simulations of attack robustness with false positive/negative rate (FPR/FNR) on three benchmark models including Erdős-Rényi (ER) networks, random regular (RR) networks, and scale-free (SF) networks. We show that ER networks are equivalently robust against RA and LA only when FPR equals zero or the initial network is intact. We find several interesting crossovers in RR and SF networks when FPR is taken into consideration. By defining the cost of attack, we observe diminishing marginal attack efficiency for RA, LA, and TA. Our finding highlights the potential risk of underestimating or ignoring FPR in understanding attack robustness. The results may provide insights into ways of enhancing robustness of network architecture and improve the level of protection of critical infrastructures.
NASA Astrophysics Data System (ADS)
El-Shafai, W.; El-Rabaie, S.; El-Halawany, M.; Abd El-Samie, F. E.
2018-03-01
Three-Dimensional Video-plus-Depth (3DV + D) comprises diverse video streams captured by different cameras around an object. Therefore, there is a great need to fulfill efficient compression to transmit and store the 3DV + D content in compressed form to attain future resource bounds whilst preserving a decisive reception quality. Also, the security of the transmitted 3DV + D is a critical issue for protecting its copyright content. This paper proposes an efficient hybrid watermarking scheme for securing the 3DV + D transmission, which is the homomorphic transform based Singular Value Decomposition (SVD) in Discrete Wavelet Transform (DWT) domain. The objective of the proposed watermarking scheme is to increase the immunity of the watermarked 3DV + D to attacks and achieve adequate perceptual quality. Moreover, the proposed watermarking scheme reduces the transmission-bandwidth requirements for transmitting the color-plus-depth 3DV over limited-bandwidth wireless networks through embedding the depth frames into the color frames of the transmitted 3DV + D. Thus, it saves the transmission bit rate and subsequently it enhances the channel bandwidth-efficiency. The performance of the proposed watermarking scheme is compared with those of the state-of-the-art hybrid watermarking schemes. The comparisons depend on both the subjective visual results and the objective results; the Peak Signal-to-Noise Ratio (PSNR) of the watermarked frames and the Normalized Correlation (NC) of the extracted watermark frames. Extensive simulation results on standard 3DV + D sequences have been conducted in the presence of attacks. The obtained results confirm that the proposed hybrid watermarking scheme is robust in the presence of attacks. It achieves not only very good perceptual quality with appreciated PSNR values and saving in the transmission bit rate, but also high correlation coefficient values in the presence of attacks compared to the existing hybrid watermarking schemes.
Distributed Secure Coordinated Control for Multiagent Systems Under Strategic Attacks.
Feng, Zhi; Wen, Guanghui; Hu, Guoqiang
2017-05-01
This paper studies a distributed secure consensus tracking control problem for multiagent systems subject to strategic cyber attacks modeled by a random Markov process. A hybrid stochastic secure control framework is established for designing a distributed secure control law such that mean-square exponential consensus tracking is achieved. A connectivity restoration mechanism is considered and the properties on attack frequency and attack length rate are investigated, respectively. Based on the solutions of an algebraic Riccati equation and an algebraic Riccati inequality, a procedure to select the control gains is provided and stability analysis is studied by using Lyapunov's method.. The effect of strategic attacks on discrete-time systems is also investigated. Finally, numerical examples are provided to illustrate the effectiveness of theoretical analysis.
ERIC Educational Resources Information Center
Hirst, William; Phelps, Elizabeth A.; Buckner, Randy L.; Budson, Andrew E.; Cuc, Alexandru; Gabrieli, John D. E.; Johnson, Marcia K.; Lustig, Cindy; Lyle, Keith B.; Mather, Mara; Meksin, Robert; Mitchell, Karen J.; Ochsner, Kevin N.; Schacter, Daniel L.; Simons, Jon S.; Vaidya, Chandan J.
2009-01-01
More than 3,000 individuals from 7 U.S. cities reported on their memories of learning of the terrorist attacks of September 11, as well as details about the attack, 1 week, 11 months, and/or 35 months after the assault. Some studies of flashbulb memories examining long-term retention show slowing in the rate of forgetting after a year, whereas…
Serial agonistic attacks by greylag goose families, Anser anser, against the same opponent
Scheiber, Isabella B.R.; Kotrschal, Kurt; Weiß, Brigitte M.
2011-01-01
It is known from primates that alliance partners may support each other’s interests in competition with others, for example, through repeated agonistic attacks against a particular individual. We examined serial aggressive interactions between greylag goose families and other flock members. We found that repeated attacks towards the same individual were common and that up to five serial attacks by family members followed an initial attack. Family size did not affect the frequency of such serial attacks. Juvenile geese evidently benefited most from active social support through serial attacks. About 60% of the juveniles’ lost primary interactions were subsequently reversed by another family member. This may be one of the reasons why juveniles rank higher in the social hierarchy than would be expected from their age and size alone. Losses in serial attacks predominantly occurred against other, presumably higher-ranking, family geese and ganders. We propose three major functions/consequences of serial attacks. Analogous to primates, serial attacks in greylag geese may serve to reinforce a losing experience of an opponent defeated in a preceding attack. On the side of the winning family, serial attacks may reinforce the experience of winning. Both winning and losing experiences are linked with physiological consequences in higher vertebrates, affecting the future social performance of winners or losers. Finally, serial attacks may signal the agonistic potential of a family to other flock members. This is supported by heart rate data, which indicate that greylags are competent to interpret third-party relationships. PMID:21984838
Khyâl attacks: a key idiom of distress among traumatized cambodia refugees.
Hinton, Devon E; Pich, Vuth; Marques, Luana; Nickerson, Angela; Pollack, Mark H
2010-06-01
Traumatized Cambodian refugees with PTSD often complain of khyâl attacks. The current study investigates khyâl attacks from multiple perspectives and examines the validity of a model of how khyâl attacks are generated. The study found that khyâl attacks had commonly been experienced in the previous 4 weeks and that their severity was strongly correlated with the severity of PTSD (PTSD Checklist). It was found that khyâl attacks were triggered by various processes--such as worry, trauma recall, standing up, going to a mall--and that khyâl attacks almost always met panic attack criteria. It was also found that during a khyâl attack there was great fear that death might occur from bodily dysfunction. It was likewise found that a complex nosology of khyâl attacks exists that rates the attacks on a scale of severity, that the severity determines how the khyâl attacks should be treated and that those treatments are often complex. As illustrated by the article, khyâl attacks constitute a key aspect of trauma ontology in this group, a culturally specific experiencing of anxiety and trauma-related disorder. The article also contributes to the study of trauma somatics, that is, to the study of how trauma results in specific symptoms in a specific cultural context, showing that a key part of the trauma-somatic reticulum is often a cultural syndrome.
Identification of an unsteady aerodynamic model up to high angle of attack regime
NASA Astrophysics Data System (ADS)
Fan, Yigang
1997-12-01
The harmonic oscillatory tests for a fighter aircraft configuration using the Dynamic Plunge-Pitch-Roll (DyPPiR) model mount at Virginia Tech Stability Wind Tunnel are described and analyzed. The corresponding data reduction methods are developed on the basis of multirate digital signal processing techniques. Since the model is sting-mounted to the support system of DyPPiR, the Discrete Fourier Transform (DFT) is first used to identify the frequencies of the elastic modes of sting. Then the sampling rate conversion systems are built up in digital domain to resample the data at a lower rate without introducing distortions to the signals of interest. Finally linear-phase Finite Impulse Response (FIR) filters are designed by Remez exchange algorithm to extract the aerodynamic characteristics responses to the programmed motions from the resampled measurements. These data reduction procedures are also illustrated through examples. The results obtained from the harmonic oscillatory tests are then illustrated and the associated flow mechanisms are discussed. Since no significant hysteresis loops are observed for the lift and the drag coefficients for the current angle of attack range and the tested reduced frequencies, the dynamic lags of separated and vortex flow effects are small in the current oscillatory tests. However, large hysteresis loops are observed for pitch moment coefficient in the current tests. This observation suggests that at current flow conditions, pitch moment has large pitch rate dotalpha dependencies. Then the nondimensional maximum pitch rate \\ qsb{max} is introduced to characterize these harmonic oscillatory motions. It is found that at current flow conditions, all the hysteresis loops of pitch moment coefficient with same \\ qsb{max} are tangential to one another at both top and bottom of the loops, implying approximately same maximum offset of these loops from static values. Several cases are also illustrated. Based on the results obtained and those from references, a state-space model is developed to describe the unsteady aerodynamic characteristics up to the high angle of attack regime. A nondimensional coordinate is introduced as the state variable describing the flow separation or vortex burst. First-order differential equation is used to govern the dynamics of flow separation or vortex bursting through this state variable. To be valid for general configurations, Taylor series expansions in terms of the input variables are used in the determination of aerodynamic characteristics, resembling the current approach of the stability derivatives. However, these derivatives are longer constant. They are dependent on the state variable of flow separation or vortex burst. In this way, the changes in stability derivatives with the angle of attack are included dynamically. The performance of the model is then validated by the wind-tunnel measurements of an NACA 0015 airfoil, a 70sp° delta wing and, finally two F-18 aircraft configurations. The results obtained show that within the framework of the proposed model, it is possible to obtain good agreement with different unsteady wind tunnel data in high angle-of-attack regime.
Patrick C. Tobin; Ottar N. Bjornstad
2005-01-01
Natural enemy-victim systems may exhibit a range of dynamic space-time patterns. We used a theoretical framework to study spatiotemporal structuring in a transient natural enemy-victim system subject to differential rates of dispersal, stochastic forcing, and nonlinear dynamics. Highly mobile natural enemies that attacked less mobile victims were locally spatially...
Defense of Cyber Infrastructures Against Cyber-Physical Attacks Using Game-Theoretic Models
Rao, Nageswara S. V.; Poole, Stephen W.; Ma, Chris Y. T.; ...
2015-04-06
The operation of cyber infrastructures relies on both cyber and physical components, which are subject to incidental and intentional degradations of different kinds. Within the context of network and computing infrastructures, we study the strategic interactions between an attacker and a defender using game-theoretic models that take into account both cyber and physical components. The attacker and defender optimize their individual utilities expressed as sums of cost and system terms. First, we consider a Boolean attack-defense model, wherein the cyber and physical sub-infrastructures may be attacked and reinforced as individual units. Second, we consider a component attack-defense model wherein theirmore » components may be attacked and defended, and the infrastructure requires minimum numbers of both to function. We show that the Nash equilibrium under uniform costs in both cases is computable in polynomial time, and it provides high-level deterministic conditions for the infrastructure survival. When probabilities of successful attack and defense, and of incidental failures are incorporated into the models, the results favor the attacker but otherwise remain qualitatively similar. This approach has been motivated and validated by our experiences with UltraScience Net infrastructure, which was built to support high-performance network experiments. In conclusion, the analytical results, however, are more general, and we apply them to simplified models of cloud and high-performance computing infrastructures.« less
Defense of Cyber Infrastructures Against Cyber-Physical Attacks Using Game-Theoretic Models
DOE Office of Scientific and Technical Information (OSTI.GOV)
Rao, Nageswara S. V.; Poole, Stephen W.; Ma, Chris Y. T.
The operation of cyber infrastructures relies on both cyber and physical components, which are subject to incidental and intentional degradations of different kinds. Within the context of network and computing infrastructures, we study the strategic interactions between an attacker and a defender using game-theoretic models that take into account both cyber and physical components. The attacker and defender optimize their individual utilities expressed as sums of cost and system terms. First, we consider a Boolean attack-defense model, wherein the cyber and physical sub-infrastructures may be attacked and reinforced as individual units. Second, we consider a component attack-defense model wherein theirmore » components may be attacked and defended, and the infrastructure requires minimum numbers of both to function. We show that the Nash equilibrium under uniform costs in both cases is computable in polynomial time, and it provides high-level deterministic conditions for the infrastructure survival. When probabilities of successful attack and defense, and of incidental failures are incorporated into the models, the results favor the attacker but otherwise remain qualitatively similar. This approach has been motivated and validated by our experiences with UltraScience Net infrastructure, which was built to support high-performance network experiments. In conclusion, the analytical results, however, are more general, and we apply them to simplified models of cloud and high-performance computing infrastructures.« less
Defense of Cyber Infrastructures Against Cyber-Physical Attacks Using Game-Theoretic Models.
Rao, Nageswara S V; Poole, Stephen W; Ma, Chris Y T; He, Fei; Zhuang, Jun; Yau, David K Y
2016-04-01
The operation of cyber infrastructures relies on both cyber and physical components, which are subject to incidental and intentional degradations of different kinds. Within the context of network and computing infrastructures, we study the strategic interactions between an attacker and a defender using game-theoretic models that take into account both cyber and physical components. The attacker and defender optimize their individual utilities, expressed as sums of cost and system terms. First, we consider a Boolean attack-defense model, wherein the cyber and physical subinfrastructures may be attacked and reinforced as individual units. Second, we consider a component attack-defense model wherein their components may be attacked and defended, and the infrastructure requires minimum numbers of both to function. We show that the Nash equilibrium under uniform costs in both cases is computable in polynomial time, and it provides high-level deterministic conditions for the infrastructure survival. When probabilities of successful attack and defense, and of incidental failures, are incorporated into the models, the results favor the attacker but otherwise remain qualitatively similar. This approach has been motivated and validated by our experiences with UltraScience Net infrastructure, which was built to support high-performance network experiments. The analytical results, however, are more general, and we apply them to simplified models of cloud and high-performance computing infrastructures. © 2015 Society for Risk Analysis.
Optimal Attack Strategies Subject to Detection Constraints Against Cyber-Physical Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chen, Yuan; Kar, Soummya; Moura, Jose M. F.
This paper studies an attacker against a cyberphysical system (CPS) whose goal is to move the state of a CPS to a target state while ensuring that his or her probability of being detected does not exceed a given bound. The attacker’s probability of being detected is related to the nonnegative bias induced by his or her attack on the CPS’s detection statistic. We formulate a linear quadratic cost function that captures the attacker’s control goal and establish constraints on the induced bias that reflect the attacker’s detection-avoidance objectives. When the attacker is constrained to be detected at the false-alarmmore » rate of the detector, we show that the optimal attack strategy reduces to a linear feedback of the attacker’s state estimate. In the case that the attacker’s bias is upper bounded by a positive constant, we provide two algorithms – an optimal algorithm and a sub-optimal, less computationally intensive algorithm – to find suitable attack sequences. Lastly, we illustrate our attack strategies in numerical examples based on a remotely-controlled helicopter under attack.« less
Optimal Attack Strategies Subject to Detection Constraints Against Cyber-Physical Systems
Chen, Yuan; Kar, Soummya; Moura, Jose M. F.
2017-03-31
This paper studies an attacker against a cyberphysical system (CPS) whose goal is to move the state of a CPS to a target state while ensuring that his or her probability of being detected does not exceed a given bound. The attacker’s probability of being detected is related to the nonnegative bias induced by his or her attack on the CPS’s detection statistic. We formulate a linear quadratic cost function that captures the attacker’s control goal and establish constraints on the induced bias that reflect the attacker’s detection-avoidance objectives. When the attacker is constrained to be detected at the false-alarmmore » rate of the detector, we show that the optimal attack strategy reduces to a linear feedback of the attacker’s state estimate. In the case that the attacker’s bias is upper bounded by a positive constant, we provide two algorithms – an optimal algorithm and a sub-optimal, less computationally intensive algorithm – to find suitable attack sequences. Lastly, we illustrate our attack strategies in numerical examples based on a remotely-controlled helicopter under attack.« less
Wu, Ping; Duarte, Cristiane S.; Mandell, Donald J.; Fan, Bin; Liu, Xinhua; Fuller, Cordelia J.; Musa, George; Cohen, Michael; Cohen, Patricia; Hoven, Christina W.
2006-01-01
We examined exposure to the World Trade Center attack and changes in cigarette smoking and drinking among 2731 New York City public high-school students evaluated 6 months after the attack. Increased drinking was associated with direct exposure to the World Trade Center attack (P < .05). Increased smoking was not directly associated with exposure to the World Trade Center attack but was marginally significantly associated with posttraumatic stress disorder (P= .06). Our findings suggest that targeted substance-use interventions for youths may be warranted after large-scale disasters. PMID:16571705
Leira, R; Rodríguez, R
1996-05-01
Some foods in our diet can spark off migraine attacks in susceptible individuals. Some foods can bring an attack on through an allergic reaction. A certain number such as citrus fruits, tea, coffee, pork, chocolate, milk, nuts, vegetables and cola drinks have been cited as possible allergens associated with migraine. This mechanism has however been criticized: an improvement in symptoms by eliminating some food(s) from our diet does not necessarily mean an immunologically based allergic reaction. The high IgE incidence rate is not greater in such patients than in the population at large. Other allergic reactions unrelated to diet may also be associated with migraine attacks. On the other hand substances in food may be the cause of modifications in vascular tone and bring migraine on in those so prone. Among such substances are tyramine, phenylalanine, phenolic flavonoids, alcohol, food additives (sodium nitrate, monosodium glutamate, aspartame) and caffeine. Another recognized trigger for migraine is hypoglycemia. Such foods as chocolate, cheese, citrus fruits, bananas, nuts, 'cured' meats, dairy products, cereals, beans, hot dogs, pizza, food additives (sodium nitrate, monosodium glutamate in Chinese restaurant food, aspartame as a sweetener), coffee, tea, cola drinks, alcoholic drinks such as red wine, beer or whisky distilled in copper stills, all may bring on a migraine attack. For every patient we have to assess which foodstuffs are involved in the attack (not necessarily produced by consuming the product concerned) in order to try to avoid their consumptions as a means of prophylaxis for migraine.
DiGrande, Laura; Neria, Yuval; Brackbill, Robert M; Pulliam, Paul; Galea, Sandro
2011-02-01
Although the September 11, 2001, terrorist attacks were the largest human-made disaster in US history, there is little extant research documenting the attacks' consequences among those most directly affected, that is, persons who were in the World Trade Center towers. Data from a cross-sectional survey conducted 2-3 years after the attacks ascertained the prevalence of long-term, disaster-related posttraumatic stress symptoms and probable posttraumatic stress disorder (PTSD) in 3,271 civilians who evacuated World Trade Center towers 1 and 2. Overall, 95.6% of survivors reported at least 1 current posttraumatic stress symptom. The authors estimated the probable rate of PTSD at 15.0% by using the PTSD Checklist. Women and minorities were at an increased risk of PTSD. A strong inverse relation with annual income was observed. Five characteristics of direct exposure to the terrorist attacks independently predicted PTSD: being on a high floor in the towers, initiating evacuation late, being caught in the dust cloud that resulted from the tower collapses, personally witnessing horror, and sustaining an injury. Working for an employer that sustained fatalities also increased risk. Each addition of an experience of direct exposure resulted in a 2-fold increase in the risk of PTSD (odds ratio = 2.09, 95% confidence interval: 1.84, 2.36). Identification of these risk factors may be useful when screening survivors of large-scale terrorist events for long-term psychological sequelae.
Brown, K M; Middaugh, S J; Haythornthwaite, J A; Bielory, L
2001-04-01
It was expected that stress and anxiety would be related to Raynaud's phenomenon (RP) attack characteristics when mild outdoor temperatures produced partial or no digital vasoconstriction. Hypotheses were that in warmer temperature categories, compared to those below 40 degrees F, higher stress or anxiety would be associated with more frequent, severe, and painful attacks. The Raynaud's Treatment Study recruited 313 participants with primary RP. Outcomes were attack rate, severity, and pain. Predictors were average daily outdoor temperature, stress, anxiety, age, gender, and a stress-by-temperature or an anxiety-by-temperature interaction. Outcomes were tested separately in multiple linear regression models. Stress and anxiety were tested in separate models. Stress was not a significant predictor of RP attack characteristics. Higher anxiety was related to more frequent attacks above 60 degrees F. It was also related to greater attack severity at all temperatures, and to greater pain above 60 degrees F and between 40 degrees and 49.9 degrees F.
NASA Technical Reports Server (NTRS)
Gray, Vernon H.
1958-01-01
An empirical relation has been obtained by which the change in drag coefficient caused by ice formations on an unswept NACA 65AO04 airfoil section can be determined from the following icing and operating conditions: icing time, airspeed, air total temperature, liquid-water content, cloud droplet impingement efficiencies, airfoil chord length, and angles of attack. The correlation was obtained by use of measured ice heights and ice angles. These measurements were obtained from a variety of ice formations, which were carefully photographed, cross-sectioned, and weighed. Ice weights increased at a constant rate with icing time in a rime icing condition and at progressively increasing rates in glaze icing conditions. Initial rates of ice collection agreed reasonably well with values predicted from droplet impingement data. Experimental droplet impingement rates obtained on this airfoil section agreed with previous theoretical calculations for angles of attack of 40 or less. Disagreement at higher angles of attack was attributed to flow separation from the upper surface of the experimental airfoil model.
Low Speed Analysis of Mission Adaptive Flaps on a High Speed Civil Transport Configuration
NASA Technical Reports Server (NTRS)
Lessard, Victor R.
1999-01-01
Thin-layer Navier-Stokes analyses were done on a high speed civil transport configuration with mission adaptive leading-edge flaps. The flow conditions simulated were Mach = 0.22 and Reynolds number of 4.27 million for angles-of-attack ranging from 0 to 18 degrees. Two turbulence closure models were used. Analyses were done exclusively with the Baldwin-Lomax turbulence model at low angle-of-attack conditions. At high angles-of-attack where considerable flow separation and vortices occurred the Spalart-Allmaras turbulence model was also considered. The effects of flow transition were studied. Predicted aerodynamic forces, moment, and pressure are compared to experimental data obtained in the 14- by 22-Foot Subsonic Tunnel at NASA Langley. The forces and moments correlated well with experimental data in terms of trends. Drag and pitching moment were consistently underpredicted. Predicted surface pressures compared well with experiment at low angles-of-attack. Above 10 angle-of-attack the pressure comparisons were not as favorable. The two turbulent models affected the pressures on the flap considerably and neither produced correct results at the high angles-of-attack.
High-angle-of-attack pneumatic lag and upwash corrections for a hemispherical flow direction sensor
NASA Technical Reports Server (NTRS)
Whitmore, Stephen A.; Heeg, Jennifer; Larson, Terry J.; Ehernberger, L. J.; Hagen, Floyd W.; Deleo, Richard V.
1987-01-01
As part of the NASA F-14 high angle of attack flight test program, a nose mounted hemispherical flow direction sensor was calibrated against a fuselage mounted movable vane flow angle sensor. Significant discrepancies were found to exist in the angle of attack measurements. A two fold approach taken to resolve these discrepancies during subsonic flight is described. First, the sensing integrity of the isolated hemispherical sensor is established by wind tunnel data extending to an angle of attack of 60 deg. Second, two probable causes for the discrepancies, pneumatic lag and upwash, are examined. Methods of identifying and compensating for lag and upwash are presented. The wind tunnel data verify that the isolated hemispherical sensor is sufficiently accurate for static conditions with angles of attack up to 60 deg and angles of sideslip up to 30 deg. Analysis of flight data for two high angle of attack maneuvers establishes that pneumatic lag and upwash are highly correlated with the discrepancies between the hemispherical and vane type sensor measurements.
Rotation Rate Sensing via Magnetostatic Surface Wave Propagation on a Thick Yig Ring.
1979-12-03
Introduction . . . . . . . . . . . 1 Background . . . . . . . . I Statement of the Problem. o o . 4 Plan of Attack. o. . o o o • 4 Sequence of...crystal growth process. It was subsequently suggested that the thin film disfiguration problem could be avoided by ma- chining the desired ring...sensor provide any practical advantages that would make it a better choice over current rate sensing schemes? Plan of Attack This thesis concerns itself
Giraudon, I; Cathcart, S; Blomqvist, S; Littleton, A; Surman-Lee, S; Mifsud, A; Anaraki, S; Fraser, G
2009-06-01
To describe the epidemiology of an outbreak of Salmonella enteritidis phage type 1 (PT1) infection associated with a fast food premises, and to identify the causative factors leading to an acute outbreak with high attack rate and severe illness including hospital admission. Integrated descriptive study of epidemiology, food and environmental microbiology, and professional environmental health assessment, supplemented by a case-case analytical study. Cases were identified through multiple sources and were interviewed to identify food items consumed. Descriptive epidemiology of all cases and a case-case analytical study of risk factors for severe illness were undertaken. Microbiological investigation included analysis and typing of pathogens from stools, blood and environmental surfaces. Professional environmental heath assessment of the premises was undertaken. S. enteritidis PT1 was recovered from two-thirds of faecal samples. Three cases had dual infection with enterotoxin-producing Clostridium perfringens. S. enteritidis PT1 was isolated from 14 of 40 food samples examined and C. perfringens was isolated from eight food samples. Environmental health inspection of the premises revealed multiple deficiencies, including deficits in food preparation and hygiene consistent with multiple cross-contamination, and time-temperature abuse of sauces widely used across menu items. Severe cases were associated with consumption of chips and salad. Outbreaks from fast food premises have been infrequently described. This outbreak demonstrates the potential for fast food premises, with multiple deficiencies in food preparation and hygiene, to produce large, intense community outbreaks with high attack rates and severe illness, highly confined in space and time.
F/A-18 forebody vortex control. Volume 1: Static tests
NASA Technical Reports Server (NTRS)
Kramer, Brian R.; Suarez, Carlos J.; Malcolm, Gerald N.; Ayers, Bert F.
1994-01-01
A wind tunnel test was conducted on a six percent model of the F/A-18 at the NASA Ames 7 X 10-Foot Low Speed Wind Tunnel. The primary objective of the test was to evaluate several forebody vortex control configurations at high angles of attack in order to determine the most effective method of obtaining well behaved yawing moments, in preparation for the rotary balance test. Both mechanical and pneumatic systems were tested. Single and dual rotating nose tip strakes and a vertical nose strake were tested at different sizes and deflections. A series of jet blowing configurations were located at various fuselage stations, azimuth angles, and pointing angles ranging from straight aft to 60 deg canted inboard. Slot blowing was investigated for several slot lengths and fuselage stations. The effect of blowing rate was tested for both of these pneumatic systems. The most effective configurations were then further tested with a variation of both sideslip angle and Reynolds number over a range of angles of attack from 0 to 60 deg. It was found that a very robust system can be developed that provides yawing moments at angles of attack up to 60 deg that significantly exceeds that available from 30 deg of rudder deflection (F/A-18 maximum) at 0 deg angle of attack.
Rodríguez-Marroyo, J A; Villa, J G; López-Satue, J; Pernía, R; Carballo, B; García-López, J; Foster, C
2011-11-01
The aim of this study was to analyse the physiological strain of firefighters, using heart rate (HR) and core temperature, during real wildfire suppression according to the type of attack performed (direct, indirect or mixed). Three intensity zones were established according to the HR corresponding to the ventilatory threshold (VT) and respiratory compensation threshold (RCT): zone 1,
Adrion, Christine; Fischer, Carolin Simone; Wagner, Judith; Gürkov, Robert; Mansmann, Ulrich
2016-01-01
Study question What is the long term efficacy of betahistine dihydrochloride on the incidence of vertigo attacks in patients with Meniere’s disease, compared with placebo? Methods The BEMED trial is a multicentre, double blind, randomised, placebo controlled, three arm, parallel group, phase III, dose defining superiority trial conducted in 14 German tertiary referral centres (for neurology or ear, nose, and throat). Adults aged 21-80 years (mean age 56 years) with definite unilateral or bilateral Meniere’s disease were recruited from March 2008 to November 2012. Participants received placebo (n=74), low dose betahistine (2×24 mg daily, (n=73)), or high dose betahistine (3×48 mg daily, (n=74)) over nine months. The primary outcome was the number of attacks per 30 days, based on patients’ diaries during a three month assessment period at months seven to nine. An internet based randomisation schedule performed a concealed 1:1:1 allocation, stratified by study site. Secondary outcomes included the duration and severity of attacks, change in quality of life scores, and several observer-reported parameters to assess changes in audiological and vestibular function. Study answer and limitations Incidence of attacks related to Meniere’s disease did not differ between the three treatment groups (P=0.759). Compared with placebo, attack rate ratios were 1.036 (95% confidence interval 0.942 to 1.140) and 1.012 (0.919 to 1.114) for low dose and high dose betahistine, respectively. The overall monthly attack rate fell significantly by the factor 0.758 (0.705 to 0.816; P<0.001). The population based, mean monthly incidence averaged over the assessment period was 2.722 (1.304 to 6.309), 3.204 (1.345 to 7.929), and 3.258 (1.685 to 7.266) for the placebo, low dose betahistine, and high dose betahistine groups, respectively. Results were consistent for all secondary outcomes. Treatment was well tolerated with no unexpected safety findings. Without a control group of patients who did not receive any intervention to follow the natural course of the disease, the placebo effect could not be accurately assessed and differentiated from spontaneous remission and fluctuation of symptoms. What this study adds Current evidence is limited as to whether betahistine prevents vertigo attacks caused by Meniere’s disease, compared with placebo. The trial provides information on symptom relief on placebo intervention which is relevant for the design of future studies on potential disease modifying treatments in patients with Meniere’s disease. Funding, competing interests, data sharing Support from the German Federal Ministry of Education and Research (BMBF support code 01KG0708). Potential competing interests have been reported in full at the end of the paper on thebmj.com. Data are available from the corresponding author (Michael.Strupp@med.uni-muenchen.de) or biostatistician (mansmann@ibe.med.uni-muenchen.de). Study registration EudraCT no 2005-000752-32; ISRCTN no ISRCTN44359668. PMID:26797774
Tseng, Hui-Yun; Lin, Chung-Ping; Hsu, Jung-Ya; Pike, David A.; Huang, Wen-San
2014-01-01
Conspicuous colouration can evolve as a primary defence mechanism that advertises unprofitability and discourages predatory attacks. Geographic overlap is a primary determinant of whether individual predators encounter, and thus learn to avoid, such aposematic prey. We experimentally tested whether the conspicuous colouration displayed by Old World pachyrhynchid weevils (Pachyrhynchus tobafolius and Kashotonus multipunctatus) deters predation by visual predators (Swinhoe’s tree lizard; Agamidae, Japalura swinhonis). During staged encounters, sympatric lizards attacked weevils without conspicuous patterns at higher rates than weevils with intact conspicuous patterns, whereas allopatric lizards attacked weevils with intact patterns at higher rates than sympatric lizards. Sympatric lizards also attacked masked weevils at lower rates, suggesting that other attributes of the weevils (size/shape/smell) also facilitate recognition. Allopatric lizards rapidly learned to avoid weevils after only a single encounter, and maintained aversive behaviours for more than three weeks. The imperfect ability of visual predators to recognize potential prey as unpalatable, both in the presence and absence of the aposematic signal, may help explain how diverse forms of mimicry exploit the predator’s visual system to deter predation. PMID:24614681
Comparison of X-31 Flight and Ground-Based Yawing Moment Asymmetries at High Angles of Attack
NASA Technical Reports Server (NTRS)
Cobleigh, Brent R.; Croom, Mark A.
2001-01-01
Significant yawing moment asymmetries were encountered during the high-angle-of-attack envelope expansion of the two X-31 aircraft. These asymmetries caused position saturations of the thrust-vectoring vanes and trailing-edge flaps during some stability-axis rolling maneuvers at high angles of attack. The two test aircraft had different asymmetry characteristics, and ship two has asymmetries that vary as a function of Reynolds number. Several aerodynamic modifications have been made to the X-31 forebody with the goal of minimizing the asymmetry. These modifications include adding transition strips on the forebody and noseboom, using two different length strakes, and increasing nose bluntness. Ultimately, a combination of forebody strakes, nose blunting, and noseboom transition strips reduced the yawing moment asymmetry enough to fully expand the high-angle-of-attack envelope. Analysis of the X-31 flight data is reviewed and compared to wind-tunnel and water-tunnel measurements. Several lessons learned are outlined regarding high-angle-of-attack configuration design and ground testing.
Novel mechanism of network protection against the new generation of cyber attacks
NASA Astrophysics Data System (ADS)
Milovanov, Alexander; Bukshpun, Leonid; Pradhan, Ranjit
2012-06-01
A new intelligent mechanism is presented to protect networks against the new generation of cyber attacks. This mechanism integrates TCP/UDP/IP protocol stack protection and attacker/intruder deception to eliminate existing TCP/UDP/IP protocol stack vulnerabilities. It allows to detect currently undetectable, highly distributed, low-frequency attacks such as distributed denial-of-service (DDoS) attacks, coordinated attacks, botnet, and stealth network reconnaissance. The mechanism also allows insulating attacker/intruder from the network and redirecting the attack to a simulated network acting as a decoy. As a result, network security personnel gain sufficient time to defend the network and collect the attack information. The presented approach can be incorporated into wireless or wired networks that require protection against known and the new generation of cyber attacks.
Retrospective evaluation of coyote attacks in dogs: 154 cases (1997-2012).
Frauenthal, Virginia M; Bergman, Philip; Murtaugh, Robert J
2017-05-01
To describe the clinical presentation and outcome of known attacks in client-owned dogs caused by the common coyote, Canis latrans. Retrospective observational study. Private referral hospital. One hundred fifty-four client-owned dogs known to be attacked by coyotes. None. Records from a private referral hospital from May 1997 through December 2012 were reviewed. Time of day and month/season of year, signalment, body temperature, heart rate, respiratory rate, body weight, location and severity of wounds inflicted, common injuries, length of hospitalization, necessity of surgical wound repair under anesthesia, antimicrobial use and mortality were recorded. Eighty-six percent of dogs presenting following coyote attack weighed <10 kg. Overall mortality rate was 15.6%. Dogs with bite wounds to the thorax had the highest mortality at 21.3%. Criteria for systemic inflammatory response syndrome (SIRS) based on admission vital signs were met in 58.8% of dogs and the presence of SIRS was significantly associated with mortality (P < 0.001). Common coyote-induced injuries included rib fracture (38/154; 24.6%), pulmonary contusion (30/154; 19.4%), tracheal tear (18/154; 11.6%), pneumothorax (16/154; 10.3%), abdominal wall hernia (9/154; 5.8%), and abdominal penetrating wounds (8/146; 5.5%). Dogs <10 kg were significantly more likely to incur wounds to multiple body parts or sustain abdominal penetrating wounds. The presence of rib fracture was significantly associated with mortality. Frequency of coyote attacks over the time of this study increased by 330%. Coyote attacks on dogs are a problem in Southern California and are associated with substantial morbidity and mortality, especially in dogs with wounds to the thorax. Aggressive management involving surgical wound repair was associated with survival to discharge. © Veterinary Emergency and Critical Care Society 2017.
Comparisons of Attacks on Honeypots With Those on Real Networks
2006-03-01
Oracle , MySQL , or PostgreSQL. Figure 2 shows an incoming packet and the process involved before and after the Snort engine detects the suspicious...stored on a separate, secured system.”[2]. Honeypots have several other uses besides monitoring attackers. They serve to protect real networks and...interaction vs . high-interaction. Although, both low-interaction and high-interaction honeypots are effective in soliciting attacks, high-interaction
NASA Technical Reports Server (NTRS)
Walsh, Kevin R.; Yuhas, Andrew J.; Williams, John G.; Steenken, William G.
1997-01-01
The effects of high-angle-of-attack flight on aircraft inlet aerodynamic characteristics were investigated at NASA Dryden Flight Research Center, Edwards, California, as part of NASA's High Alpha Technology Program. The highly instrumented F/A-18A High Alpha Research Vehicle was used for this research. A newly designed inlet total-pressure rake was installed in front of the starboard F404-GE-400 engine to measure inlet recovery and distortion characteristics. One objective was to determine inlet total-pressure characteristics at steady high-angle-of-attack conditions. Other objectives include assessing whether significant differences exist in inlet distortion between rapid angle-of-attack maneuvers and corresponding steady aerodynamic conditions, assessing inlet characteristics during aircraft departures, providing data for developing and verifying computational fluid dynamic codes, and calculating engine airflow using five methods. This paper addresses the first objective by summarizing results of 79 flight maneuvers at steady aerodynamic conditions, ranging from -10 deg to 60 deg angle of attack and from -8 deg to 11 deg angle of sideslip at Mach 0.3 and 0.4. These data and the associated database have been rigorously validated to establish a foundation for understanding inlet characteristics at high angle of attack.
Spatial variability in oviposition damage by periodical cicadas in a fragmented landscape.
Cook, William M; Holt, Robert D; Yao, Jin
2001-03-01
Effects of the periodical cicada (Magicicada spp.) on forest dynamics are poorly documented. A 1998 emergence of M. cassini in eastern Kansas led to colonization of a fragmented experimental landscape undergoing secondary succession. We hypothesized that per-tree rates of oviposition damage by cicadas would reflect: (1) distance from the source of the emergence, (2) patch size, and (3) local tree density. Ovipositing females displayed clear preferences for host species and damage incidence showed predictable spatial patterns. Two species (smooth sumac, Rhus glabra, and eastern red cedar, Juniperus virginiana) were rarely attacked, whereas others (rough-leaved dogwood, Cornus drummondii; slippery elm, Ulmus rubra; box elder, Acer negundo, and honey locust, Gleditsia triacanthos) were strongly attacked. The dominant early successional tree, dogwood, received on average the most attacks. As predicted, attacks per stem declined strongly with distance from the emergence source, and with local stem density (a "dilution" effect). Contrary to expectations, there were more attacks per stem on larger patches. Because ovipositing cicadas cut damaging slits in host tree branches, potentially affecting tree growth rate, competitive ability, and capacity to reproduce, cicada damage could potentially influence spatial variation in secondary succession.
Cerebral correlates of heart rate variations during a spontaneous panic attack in the fMRI scanner.
Spiegelhalder, Kai; Hornyak, Magdolna; Kyle, Simon David; Paul, Dominik; Blechert, Jens; Seifritz, Erich; Hennig, Jürgen; Tebartz van Elst, Ludger; Riemann, Dieter; Feige, Bernd
2009-12-01
We report the first published case study of a suddenly occurring panic attack in a patient with no prior history of panic disorder during combined functional magnetic resonance imaging (fMRI, 1.5 Tesla) and electrocardiogram (ECG) recording. The single case was a 46-year-old woman who developed a panic attack near the planned end of the fMRI acquisition session, which therefore had to be aborted. Correlational analysis of heart rate fluctuations and fMRI data revealed a significant negative association in the left middle temporal gyrus. Additionally, regions-of-interest (ROI) analyses indicated significant positive associations in the left amygdala, and trends towards significance in the right amygdala and left insula.
The anatomy of a shark attack: a case report and review of the literature.
Caldicott, D G; Mahajani, R; Kuhn, M
2001-07-01
Shark attacks are rare but are associated with a high morbidity and significant mortality. We report the case of a patient's survival from a shark attack and their subsequent emergency medical and surgical management. Using data from the International Shark Attack File, we review the worldwide distribution and incidence of shark attack. A review of the world literature examines the features which make shark attacks unique pathological processes. We offer suggestions for strategies of management of shark attack, and techniques for avoiding adverse outcomes in human encounters with these endangered creatures.
A likelihood ratio anomaly detector for identifying within-perimeter computer network attacks
DOE Office of Scientific and Technical Information (OSTI.GOV)
Grana, Justin; Wolpert, David; Neil, Joshua
The rapid detection of attackers within firewalls of enterprise computer networks is of paramount importance. Anomaly detectors address this problem by quantifying deviations from baseline statistical models of normal network behavior and signaling an intrusion when the observed data deviates significantly from the baseline model. But, many anomaly detectors do not take into account plausible attacker behavior. As a result, anomaly detectors are prone to a large number of false positives due to unusual but benign activity. Our paper first introduces a stochastic model of attacker behavior which is motivated by real world attacker traversal. Then, we develop a likelihoodmore » ratio detector that compares the probability of observed network behavior under normal conditions against the case when an attacker has possibly compromised a subset of hosts within the network. Since the likelihood ratio detector requires integrating over the time each host becomes compromised, we illustrate how to use Monte Carlo methods to compute the requisite integral. We then present Receiver Operating Characteristic (ROC) curves for various network parameterizations that show for any rate of true positives, the rate of false positives for the likelihood ratio detector is no higher than that of a simple anomaly detector and is often lower. Finally, we demonstrate the superiority of the proposed likelihood ratio detector when the network topologies and parameterizations are extracted from real-world networks.« less
Effect of noninvasive vagus nerve stimulation on acute migraine: an open-label pilot study.
Goadsby, P J; Grosberg, B M; Mauskop, A; Cady, R; Simmons, K A
2014-10-01
We sought to assess a novel, noninvasive, portable vagal nerve stimulator (nVNS) for acute treatment of migraine. Participants with migraine with or without aura were eligible for an open-label, single-arm, multiple-attack study. Up to four migraine attacks were treated with two 90-second doses, at 15-minute intervals delivered to the right cervical branch of the vagus nerve within a six-week time period. Subjects were asked to self-treat at moderate or severe pain, or after 20 minutes of mild pain. Of 30 enrolled patients (25 females, five males, median age 39), two treated no attacks, and one treated aura only, leaving a Full Analysis Set of 27 treating 80 attacks with pain. An adverse event was reported in 13 patients, notably: neck twitching (n = 1), raspy voice (n = 1) and redness at the device site (n = 1). No unanticipated, serious or severe adverse events were reported. The pain-free rate at two hours was four of 19 (21%) for the first treated attack with a moderate or severe headache at baseline. For all moderate or severe attacks at baseline, the pain-free rate was 12/54 (22%). nVNS may be an effective and well-tolerated acute treatment for migraine in certain patients. © International Headache Society 2014 Reprints and permissions: sagepub.co.uk/journalsPermissions.nav.
A likelihood ratio anomaly detector for identifying within-perimeter computer network attacks
Grana, Justin; Wolpert, David; Neil, Joshua; ...
2016-03-11
The rapid detection of attackers within firewalls of enterprise computer networks is of paramount importance. Anomaly detectors address this problem by quantifying deviations from baseline statistical models of normal network behavior and signaling an intrusion when the observed data deviates significantly from the baseline model. But, many anomaly detectors do not take into account plausible attacker behavior. As a result, anomaly detectors are prone to a large number of false positives due to unusual but benign activity. Our paper first introduces a stochastic model of attacker behavior which is motivated by real world attacker traversal. Then, we develop a likelihoodmore » ratio detector that compares the probability of observed network behavior under normal conditions against the case when an attacker has possibly compromised a subset of hosts within the network. Since the likelihood ratio detector requires integrating over the time each host becomes compromised, we illustrate how to use Monte Carlo methods to compute the requisite integral. We then present Receiver Operating Characteristic (ROC) curves for various network parameterizations that show for any rate of true positives, the rate of false positives for the likelihood ratio detector is no higher than that of a simple anomaly detector and is often lower. Finally, we demonstrate the superiority of the proposed likelihood ratio detector when the network topologies and parameterizations are extracted from real-world networks.« less
Facelock: familiarity-based graphical authentication.
Jenkins, Rob; McLachlan, Jane L; Renaud, Karen
2014-01-01
Authentication codes such as passwords and PIN numbers are widely used to control access to resources. One major drawback of these codes is that they are difficult to remember. Account holders are often faced with a choice between forgetting a code, which can be inconvenient, or writing it down, which compromises security. In two studies, we test a new knowledge-based authentication method that does not impose memory load on the user. Psychological research on face recognition has revealed an important distinction between familiar and unfamiliar face perception: When a face is familiar to the observer, it can be identified across a wide range of images. However, when the face is unfamiliar, generalisation across images is poor. This contrast can be used as the basis for a personalised 'facelock', in which authentication succeeds or fails based on image-invariant recognition of faces that are familiar to the account holder. In Study 1, account holders authenticated easily by detecting familiar targets among other faces (97.5% success rate), even after a one-year delay (86.1% success rate). Zero-acquaintance attackers were reduced to guessing (<1% success rate). Even personal attackers who knew the account holder well were rarely able to authenticate (6.6% success rate). In Study 2, we found that shoulder-surfing attacks by strangers could be defeated by presenting different photos of the same target faces in observed and attacked grids (1.9% success rate). Our findings suggest that the contrast between familiar and unfamiliar face recognition may be useful for developers of graphical authentication systems.
Modeling inter-signal arrival times for accurate detection of CAN bus signal injection attacks
DOE Office of Scientific and Technical Information (OSTI.GOV)
Moore, Michael Roy; Bridges, Robert A; Combs, Frank L
Modern vehicles rely on hundreds of on-board electronic control units (ECUs) communicating over in-vehicle networks. As external interfaces to the car control networks (such as the on-board diagnostic (OBD) port, auxiliary media ports, etc.) become common, and vehicle-to-vehicle / vehicle-to-infrastructure technology is in the near future, the attack surface for vehicles grows, exposing control networks to potentially life-critical attacks. This paper addresses the need for securing the CAN bus by detecting anomalous traffic patterns via unusual refresh rates of certain commands. While previous works have identified signal frequency as an important feature for CAN bus intrusion detection, this paper providesmore » the first such algorithm with experiments on five attack scenarios. Our data-driven anomaly detection algorithm requires only five seconds of training time (on normal data) and achieves true positive / false discovery rates of 0.9998/0.00298, respectively (micro-averaged across the five experimental tests).« less
Daysal, N Meltem
2012-07-01
In this paper, I examine the impact of uninsured patients on the in-hospital mortality rate of insured heart attack patients. I employ panel data models using patient discharge and hospital financial data from California (1999-2006). My results indicate that uninsured patients have an economically significant effect that increases the mortality rate of insured heart attack patients. I show that these results are not driven by alternative explanations, including reverse causality, patient composition effects, sample selection or unobserved trends and that they are robust to a host of specification checks. The primary channel for the observed spillover effects is increased hospital uncompensated care costs. Although data limitations constrain my capacity to check how hospitals change their provision of care to insured heart attack patients in response to reduced revenues, the evidence I have suggests a modest increase in the quantity of cardiac services without a corresponding increase in hospital staff. Copyright © 2012 Elsevier B.V. All rights reserved.
NASA Technical Reports Server (NTRS)
Hahne, D. E.
1985-01-01
A wind tunnel investigation of concepts to improve the high angle-of-attack stability and control characteristics of a high performance aircraft was conducted. The effect of vertical tail geometry on stability and the effectiveness of several conventional and unusual control concepts was determined. These results were obtained over a large angle-of-attack range. Vertical tail location, cant angle and leading edge sweep could influence both longitudinal and lateral-directional stability. The control concepts tested were found to be effective and to provide control into the post stall angle-of-attack region.
NASA Astrophysics Data System (ADS)
McClure, Melanie; Despland, Emma
2011-05-01
Gregariousness in animals is widely accepted as a behavioral adaptation for protection from predation. However, predation risk and the effectiveness of a prey's defense can be a function of several other factors, including predator species and prey size or age. The objective of this study was to determine if the gregarious habit of Malacosoma disstria caterpillars is advantageous against invertebrate natural enemies, and whether it is through dilution or cooperative defenses. We also examined the effects of larval growth and group size on the rate and success of attacks. Caterpillars of M. disstria responded with predator-specific behaviors, which led to increased survival. Evasive behaviors were used against stinkbugs, while thrashing by fourth instar caterpillars and holding on to the silk mat by second instar caterpillars was most efficient against spider attacks. Collective head flicking and biting by groups of both second and fourth instar caterpillars were observed when attacked by parasitoids. Increased larval size decreased the average number of attacks by spiders but increased the number of attacks by both stinkbugs and parasitoids. However, increased body size decreased the success rate of attacks by all three natural enemies and increased handling time for both predators. Larger group sizes did not influence the number of attacks from predators but increased the number of attacks and the number of successful attacks from parasitoids. In all cases, individual risk was lower in larger groups. Caterpillars showed collective defenses against parasitoids but not against the walking predators. These results show that caterpillars use different tactics against different natural enemies. Overall, these tactics are both more diverse and more effective in fourth instar than in second instar caterpillars, confirming that growth reduces predation risk. We also show that grouping benefits caterpillars through dilution of risk, and, in the case of parasitoids, through group defenses. The decreased tendency to aggregate in the last larval instar may therefore be linked to decreasing predation risk.
Dhamodharan, Udaya Suriya Raj Kumar; Vayanaperumal, Rajamani
2015-01-01
Wireless sensor networks are highly indispensable for securing network protection. Highly critical attacks of various kinds have been documented in wireless sensor network till now by many researchers. The Sybil attack is a massive destructive attack against the sensor network where numerous genuine identities with forged identities are used for getting an illegal entry into a network. Discerning the Sybil attack, sinkhole, and wormhole attack while multicasting is a tremendous job in wireless sensor network. Basically a Sybil attack means a node which pretends its identity to other nodes. Communication to an illegal node results in data loss and becomes dangerous in the network. The existing method Random Password Comparison has only a scheme which just verifies the node identities by analyzing the neighbors. A survey was done on a Sybil attack with the objective of resolving this problem. The survey has proposed a combined CAM-PVM (compare and match-position verification method) with MAP (message authentication and passing) for detecting, eliminating, and eventually preventing the entry of Sybil nodes in the network. We propose a scheme of assuring security for wireless sensor network, to deal with attacks of these kinds in unicasting and multicasting.
Dhamodharan, Udaya Suriya Raj Kumar; Vayanaperumal, Rajamani
2015-01-01
Wireless sensor networks are highly indispensable for securing network protection. Highly critical attacks of various kinds have been documented in wireless sensor network till now by many researchers. The Sybil attack is a massive destructive attack against the sensor network where numerous genuine identities with forged identities are used for getting an illegal entry into a network. Discerning the Sybil attack, sinkhole, and wormhole attack while multicasting is a tremendous job in wireless sensor network. Basically a Sybil attack means a node which pretends its identity to other nodes. Communication to an illegal node results in data loss and becomes dangerous in the network. The existing method Random Password Comparison has only a scheme which just verifies the node identities by analyzing the neighbors. A survey was done on a Sybil attack with the objective of resolving this problem. The survey has proposed a combined CAM-PVM (compare and match-position verification method) with MAP (message authentication and passing) for detecting, eliminating, and eventually preventing the entry of Sybil nodes in the network. We propose a scheme of assuring security for wireless sensor network, to deal with attacks of these kinds in unicasting and multicasting. PMID:26236773
Could missile attacks trigger acute myocardial infarction?
Zubaid, Mohammad; Suresh, Cheiyil G; Thalib, Lukman; Rashed, Wafa
2006-08-01
During the Gulf war in 2003, Kuwait was targeted with missile attacks for 10 consecutive days. Our objective is to evaluate the influence of missile attacks on the incidence of acute myocardial infarction (AMI). We retrospectively compared the number of admissions for AMI presenting to a major general hospital during missile attacks period (MAP) in 2003 with four control periods. MAP and each control period consisted of the same number of days (10 days). The four control periods were the 10 days immediately before and after MAP; and the same time period as MAP for the years 2001 and 2002. The number of admissions for AMI was highest during MAP, 21 cases compared to 14-16 cases in the four control periods, with a trend towards increase during MAP (incidence rate ratio = 1.59; 95% CI 0.95 to 2.66, p < 0.07). The number of admissions for AMI during the first 5 days of MAP was significantly higher compared to the first 5 days of the four control periods (incidence rate ratio = 2.43; 95% CI 1.23 to 4.26, p < 0.01). The observed AMI admission rate during the first 5 days of MAP was significantly higher than expected for a 5-day period in the years 2001, 2002 and 2003. This increase was specific to AMI and did not affect other acute cardiac conditions. Missile attacks were associated with an increase in the incidence of AMI. This increase was specific to AMI and did not influence acute cardiac conditions.
Steinman, A.; Chaffer, M.; Elad, D.; Shpigel, N. Y.
2006-01-01
The recent outbreaks of cattle botulism in vaccinated Israeli dairy cattle prompted us to determine vaccine efficacy and reasons for vaccine failure. Analysis of clinical signs, feeding practice, vaccination history, and epidemic curves enabled us to define a study population in two outbreaks, where high doses of Clostridium botulinum neurotoxin type D (BoNT/D) were evenly consumed by the affected animal groups. Attack rates among unvaccinated 6- to 24-month-old heifers were 96% (55/57) and 85% (53/62). The attack rates in vaccinated parity 1, 2, and ≥3 cows were 40.4% (21/52), 14.3% (4/28), and 5.6% (3/54), respectively. Vaccine efficacies for these cow groups were 52.5%, 83.2%, and 93.4%, respectively. In younger, unvaccinated 2- to 6-month-old calves, presumably protected by maternal antibodies, the attack rate was 24% (17/71). These differences correlated with significant differences in levels of specific anti-BoNT/D antibody in serum by an enzyme-linked immunosorbent assay (ELISA). The ELISA performance for predicting protection was analyzed by receiver operating characteristic analysis and was found to be highly significant, with an area under the curve of 0.941 (standard error, 0.034; 95% confidence interval, 0.875 to 1.008; P < 0.000). No animals with serum ELISA unit levels above 0.33 were affected in these exposed groups. At this cutoff level, the specificity of the ELISA was 100%, sensitivity was 67%, and accuracy was 92%. We concluded that botulinum toxoids can confer adequate protection against natural exposure to lethal doses of BoNT/D; however, the vaccination protocols should be optimized. Our in-house ELISA system will enable us to optimize vaccination protocols in the animal population. PMID:16893985
Magnus effects on spinning transonic missiles
NASA Technical Reports Server (NTRS)
Seginer, A.; Rosenwasser, I.
1983-01-01
Magnus forces and moments were measured on a basic-finner model spinning in transonic flow. Spin was induced by canted fins or by full-span or semi-span, outboard and inboard roll controls. Magnus force and moment reversals were caused by Mach number, reduced spin rate, and angle of attack variations. Magnus center of pressure was found to be independent of the angle of attack but varied with the Mach number and model configuration or reduced spin rate.
Effects of long-term shock and associated stimuli on aggressive and manual responses1
Hutchinson, R. R.; Renfrew, J. W.; Young, G. A.
1971-01-01
Squirrel monkeys were exposed to response-independent, fixed-frequency shock that produced biting attack upon a pneumatic hose. Attacks decreased within and across sessions at low intensities and high frequencies of shock, but increased within and across sessions at higher intensities and lower shock frequencies. Stimuli paired with shock, when presented alone, came to produce biting, and stimuli correlated with shock parameters that produced increases in responding within sessions produced similar increases when presented alone. Further experiments showed that continuing exposure to shock also produced lever pressing or chain pulling, with longer shock exposure again producing higher response rates. Whereas biting generally decreased throughout the intershock interval, manual responding generally increased as shock time approached, but immediately before shock was often suppressed. Following shock, biting attack predominated over manual behavior. The results suggest a possible explanation for the extreme resistance of avoidance behavior to extinction, and may also partially explain the persistence of responding during schedules of response-produced shock. Relationships of the present findings to naturalistic observations of relations between fleeing, freezing, and fighting performances are discussed. PMID:16811496
Michael I. Haverty; Patrick J. Shea; James T. Hoffman; John M. Wenz; Kenneth E. Gibson
1998-01-01
The effectiveness of registered and experimental application rates of insecticides esfenvalerate (Asana XL), cyfluthrin (Tempo WP and Tempo 2), and carbaryl (Sevimol and Sevin SL) was assessed for protection of individual high-value lodgepole pines from mountain pine beetles in Montana and ponderosa pines from western pine beetles in Idaho and California. This field...
Orman, G; Wang, K Y; Pekcevik, Y; Thompson, C B; Mealy, M; Levy, M; Izbudak, I
2017-05-01
Neuromyelitis optica spectrum disorders are inflammatory demyelinating disorders with optic neuritis and/or longitudinally extensive transverse myelitis episodes. We now know that neuromyelitis optica spectrum disorders are associated with antibodies to aquaporin-4, which are highly concentrated on astrocytic end-feet at the blood-brain barrier. Immune-mediated disruption of the blood-brain barrier may manifest as contrast enhancement on brain MR imaging. We aimed to delineate the extent and frequency of contrast enhancement on brain MR imaging within 1 month of optic neuritis and/or longitudinally extensive transverse myelitis attacks and to correlate contrast enhancement with outcome measures. Brain MRIs of patients with neuromyelitis optica spectrum disorders were evaluated for patterns of contrast enhancement (periependymal, cloudlike, leptomeningeal, and so forth). The Fisher exact test was used to evaluate differences between the proportion of contrast enhancement in patients who were seropositive and seronegative for aquaporin-4 antibodies. The Mann-Whitney test was used to compare the annualized relapse rate and disease duration between patients with and without contrast enhancement and with and without seropositivity. Brain MRIs of 77 patients were evaluated; 59 patients (10 males, 49 females) were scanned within 1 month of optic neuritis and/or longitudinally extensive transverse myelitis attacks and were included in the analysis. Forty-eight patients were seropositive, 9 were seronegative, and 2 were not tested for aquaporin-4 antibodies. Having brain contrast enhancement of any type during an acute attack was significantly associated with higher annualized relapse rates ( P = .03) and marginally associated with shorter disease duration ( P = .05). Having periependymal contrast enhancement was significantly associated with higher annualized relapse rates ( P = .03). Brain MRIs of patients with neuromyelitis optica spectrum disorders with contrast enhancement during an acute relapse of optic neuritis and/or longitudinally extensive transverse myelitis are associated with increased annual relapse rates. © 2017 by American Journal of Neuroradiology.
Krug, L M; Grant, S C; Miller, V A; Ng, K K; Kris, M G
1999-10-01
In the last 25 years, treatment for small cell lung cancer (SCLC) has improved with advances in chemotherapy and radiotherapy. Standard chemotherapy regimens can yield 80% to 90% response rates and some cures when combined with thoracic irradiation in limited-stage patients. Nonetheless, small cell lung cancer has a high relapse rate due to drug resistance; this has resulted in poor survival for most patients. Attacking this problem requires a unique approach to eliminate resistant disease remaining after induction therapy. This review will focus on three potential strategies: high-dose chemotherapy with autologous bone marrow transplantation, matrix metalloproteinase inhibitors, and BEC2 plus BCG vaccination.
NASA Technical Reports Server (NTRS)
Gittner, Nathan M.; Chokani, Ndaona
1991-01-01
An experimental study of the effects of aft blowing on the forebody vortex asymmetry over a 3.0 caliber tangent ogive body at high angles of attack was conducted. The tip of the ogive body was equipped with a single blowing nozzle whose position could be adjusted. The tests were conducted in a subsonic wind tunnel at laminar flow conditions. The effects of model roll, angle of attack, blowing coefficient, and blowing nozzle axial position were independently studied. Surface pressure measurements and flow visualization results were obtained. Aft blowing was observed to alleviate the degree of vortex asymmetry at all angles of attack. The blowing was found to be more effective at the higher angles of attack. However, proportional control of the degree of vortex asymmetry was not observed, because the initial flowfield was highly asymmetric.
Impact of Tumarkin attacks on complaints and work ability in Ménière's disease.
Pyykkö, Ilmari; Manchaiah, Vinaya; Zou, Jing; Levo, Hilla; Kentala, Erna
2018-05-22
The purpose of the present study was to characterize the occurrence of Tumarkin attacks in patients with Ménière'sdisease (MD), and to study its association with reported complaints, severity of consequences, and also self-reported work ability. The study used a cross-sectional design. Data obtained from the Finnish Ménière Federation using an electronic survey was analyzed. 602 people with MD responded to the survey (62% response rate) with a mean age of 56.7 years and a mean duration of the disease 12.4 years. 49% of the respondents experienced Tumarkin attacks, which lasted for a few seconds to a few minutes. There were significant differences in complaints reported by MD patients with and without Tumarkin attacks. Respondents with Tumarkin attacks experienced various consequences, including tripping, falls, fear, anxiety, problems in dyadic life, and even transient loss of consciousness. Respondents with Tumarkin attacks had more frequently applied for pension than those not having Tumarkin attacks. On an average, respondents with Tumarkin attacks had less self-reported working ability when compared to those without Tumarkin attacks. The current study results suggest various differences in terms of complaints reported, severity of consequences, and the self-reported working ability in MD patients with and without Tumarkin attacks. Hearing healthcare professionals must examine Tumarkin attacks and their consequences in patients with MD during clinical examinations. In addition, the therapy should focus on alleviating the consequences and improving work ability.
Smoking Behavior and Alcohol Consumption in Individuals With Panic Attacks
Mathew, Amanda R.; Norton, Peter J.; Zvolensky, Michael J.; Buckner, Julia D.; Smits, Jasper A. J.
2011-01-01
Individuals with anxiety often report greater smoking and drinking behaviors relative to those without a history of anxiety. In particular, smoking and alcohol use have been directly implicated among individuals experiencing panic attacks, diagnosed with panic disorder, or high on panic-relevant risk factors such as anxiety sensitivity. Less is known, however, about specific features of panic that may differentiate among those who do or do not use cigarettes or alcohol. The purpose of the current study was to replicate previous research findings of an association between panic symptomatology, cigarette smoking, and alcohol consumption, as well as extend findings by examining whether specific symptoms of panic attacks differentiated among those who do or do not use cigarettes or alcohol. Participants (n = 489) completed the Panic Attack Questionnaire-IV, a highly detailed assessment of panic attacks and symptoms, as well as self-report measures of smoking history and alcohol use. Consistent with previous research, participants who reported a history of panic attacks (n = 107) were significantly more likely to report current daily or lifetime daily cigarette smoking, and significantly greater hazardous or harmful alcohol use than participants with no panic history (n = 382). Although smoking and hazardous alcohol use were highly associated regardless of panic status, participants with panic attacks showed elevated hazardous alcohol use after controlling for daily or lifetime smoking. Surprisingly, although participants who reported having had at least one panic attack were more likely to smoke, panic attack symptoms, intensity, or frequency did not differentiate panickers who did or did not smoke. Furthermore, panic-related variables were not shown to differentially relate to problematic drinking among panickers. Implications for understanding the complex relationship between panic attacks and smoking and drinking behaviors are discussed. PMID:21915160
Flight test experience with high-alpha control system techniques on the F-14 airplane
NASA Technical Reports Server (NTRS)
Gera, J.; Wilson, R. J.; Enevoldson, E. K.; Nguyen, L. T.
1981-01-01
Improved handling qualities of fighter aircraft at high angles of attack can be provided by various stability and control augmentation techniques. NASA and the U.S. Navy are conducting a joint flight demonstration of these techniques on an F-14 airplane. This paper reports on the flight test experience with a newly designed lateral-directional control system which suppresses such high angle of attack handling qualities problems as roll reversal, wing rock, and directional divergence while simultaneously improving departure/spin resistance. The technique of integrating a piloted simulation into the flight program was used extensively in this program. This technique had not been applied previously to high angle of attack testing and required the development of a valid model to simulate the test airplane at extremely high angles of attack.
Tierney, P; Tobin, D P; Blake, C; Delahunt, E
2017-12-01
Global Positioning System (GPS) technology is commonly utilized in team sports, including rugby union. It has been used to describe the average running demands of rugby union. This has afforded an enhanced understanding of the physical fitness requirements for players. However, research in team sports has suggested that training players relative to average demands may underprepare them for certain scenarios within the game. To date, no research has investigated the running demands of attacking 22 entries in rugby union. Additionally, no research has been undertaken to determine whether differences exist in the running intensity of successful and unsuccessful attacking 22 entries in rugby union. The first aim of this study was to describe the running intensity of attacking 22 entries. The second aim of this study was to investigate whether differences exist in the running intensity of successful and unsuccessful attacking 22 entries. Running intensity was measured using meters per minute (m min -1 ) for (a) total distance, (b) running distance, (c) high-speed running distance, and (d) very high-speed running distance. This study provides normative data for the running intensity of attacking 22 entries in rugby union. Forwards achieved greater high-speed running intensity in successful (3.6 m min -1 ) compared to unsuccessful (1.8 m min -1 ) attacking 22 entries. Forwards should try and achieve greater high-speed running intensity in attacking 22 entries to increase the likelihood of successful outcomes during this period of gameplay. © 2016 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.
NASA Technical Reports Server (NTRS)
Foster, John V.; Ross, Holly M.; Ashley, Patrick A.
1993-01-01
Designers of the next-generation fighter and attack airplanes are faced with the requirements of good high-angle-of-attack maneuverability as well as efficient high speed cruise capability with low radar cross section (RCS) characteristics. As a result, they are challenged with the task of making critical design trades to achieve the desired levels of maneuverability and performance. This task has highlighted the need for comprehensive, flight-validated lateral-directional control power design guidelines for high angles of attack. A joint NASA/U.S. Navy study has been initiated to address this need and to investigate the complex flight dynamics characteristics and controls requirements for high-angle-of-attack lateral-directional maneuvering. A multi-year research program is underway which includes ground-based piloted simulation and flight validation. This paper will give a status update of this program that will include a program overview, description of test methodology and preliminary results.
NASA Technical Reports Server (NTRS)
Foster, John V.; Ross, Holly M.; Ashley, Patrick A.
1993-01-01
Designers of the next-generation fighter and attack airplanes are faced with the requirements of good high angle-of-attack maneuverability as well as efficient high speed cruise capability with low radar cross section (RCS) characteristics. As a result, they are challenged with the task of making critical design trades to achieve the desired levels of maneuverability and performance. This task has highlighted the need for comprehensive, flight-validated lateral-directional control power design guidelines for high angles of attack. A joint NASA/U.S. Navy study has been initiated to address this need and to investigate the complex flight dynamics characteristics and controls requirements for high angle-of-attack lateral-directional maneuvering. A multi-year research program is underway which includes groundbased piloted simulation and flight validation. This paper will give a status update of this program that will include a program overview, description of test methodology and preliminary results.
Reduction in Predator Defense in the Presence of Neighbors in a Colonial Fish
Schädelin, Franziska C.; Fischer, Stefan; Wagner, Richard H.
2012-01-01
Predation pressure has long been considered a leading explanation of colonies, where close neighbors may reduce predation via dilution, alarming or group predator attacks. Attacking predators may be costly in terms of energy and survival, leading to the question of how neighbors contribute to predator deterrence in relationship to each other. Two hypotheses explaining the relative efforts made by neighbors are byproduct-mutualism, which occurs when breeders inadvertently attack predators by defending their nests, and reciprocity, which occurs when breeders deliberately exchange predator defense efforts with neighbors. Most studies investigating group nest defense have been performed with birds. However, colonial fish may constitute a more practical model system for an experimental approach because of the greater ability of researchers to manipulate their environment. We investigated in the colonial fish, Neolamprologus caudopunctatus, whether prospecting pairs preferred to breed near conspecifics or solitarily, and how breeders invested in anti-predator defense in relation to neighbors. In a simple choice test, prospecting pairs selected breeding sites close to neighbors versus a solitary site. Predators were then sequentially presented to the newly established test pairs, the previously established stimulus pairs or in between the two pairs. Test pairs attacked the predator eight times more frequently when they were presented on their non-neighbor side compared to between the two breeding sites, where stimulus pairs maintained high attack rates. Thus, by joining an established pair, test pairs were able to reduce their anti-predator efforts near neighbors, at no apparent cost to the stimulus pairs. These findings are unlikely to be explained by reciprocity or byproduct-mutualism. Our results instead suggest a commensal relationship in which new pairs exploit the high anti-predator efforts of established pairs, which invest similarly with or without neighbors. Further studies are needed to determine the scope of commensalism as an anti-predator strategy in colonial animals. PMID:22615741
Verification of Sulfate Attack Penetration Rates for Saltstone Disposal Unit Modeling
DOE Office of Scientific and Technical Information (OSTI.GOV)
Flach, G. P.
Recent Special Analysis modeling of Saltstone Disposal Units consider sulfate attack on concrete and utilize degradation rates estimated from Cementitious Barriers Partnership software simulations. This study provides an independent verification of those simulation results using an alternative analysis method and an independent characterization data source. The sulfate penetration depths estimated herein are similar to the best-estimate values in SRNL-STI-2013-00118 Rev. 2 and well below the nominal values subsequently used to define Saltstone Special Analysis base cases.
Kinematic properties of the helicopter in coordinated turns
NASA Technical Reports Server (NTRS)
Chen, R. T. N.; Jeske, J. A.
1981-01-01
A study on the kinematic relationship of the variables of helicopter motion in steady, coordinated turns involving inherent sideslip is described. A set of exact kinematic equations which govern a steady coordinated helical turn about an Earth referenced vertical axis is developed. A precise definition for the load factor parameter that best characterizes a coordinated turn is proposed. Formulas are developed which relate the aircraft angular rates and pitch and roll attitudes to the turn parameters, angle of attack, and inherent sideslip. A steep, coordinated helical turn at extreme angles of attack with inherent sideslip is of primary interest. The bank angle of the aircraft can differ markedly from the tilt angle of the normal load factor. The normal load factor can also differ substantially from the accelerometer reading along the vertical body axis of the aircraft. Sideslip has a strong influence on the pitch attitude and roll rate of the helicopter. Pitch rate is independent of angle of attack in a coordinated turn and in the absence of sideslip, angular rates about the stability axes are independent of the aerodynamic characteristics of the aircraft.
Kumar, Supriya; Piper, Kaitlin; Galloway, David D; Hadler, James L; Grefenstette, John J
2015-09-23
In New Haven County, CT (NHC), influenza hospitalization rates have been shown to increase with census tract poverty in multiple influenza seasons. Though multiple factors have been hypothesized to cause these inequalities, including population structure, differential vaccine uptake, and differential access to healthcare, the impact of each in generating observed inequalities remains unknown. We can design interventions targeting factors with the greatest explanatory power if we quantify the proportion of observed inequalities that hypothesized factors are able to generate. Here, we ask if population structure is sufficient to generate the observed area-level inequalities in NHC. To our knowledge, this is the first use of simulation models to examine the causes of differential poverty-related influenza rates. Using agent-based models with a census-informed, realistic representation of household size, age-structure, population density in NHC census tracts, and contact rates in workplaces, schools, households, and neighborhoods, we measured poverty-related differential influenza attack rates over the course of an epidemic with a 23 % overall clinical attack rate. We examined the role of asthma prevalence rates as well as individual contact rates and infection susceptibility in generating observed area-level influenza inequalities. Simulated attack rates (AR) among adults increased with census tract poverty level (F = 30.5; P < 0.001) in an epidemic caused by a virus similar to A (H1N1) pdm09. We detected a steeper, earlier influenza rate increase in high-poverty census tracts-a finding that we corroborate with a temporal analysis of NHC surveillance data during the 2009 H1N1 pandemic. The ratio of the simulated adult AR in the highest- to lowest-poverty tracts was 33 % of the ratio observed in surveillance data. Increasing individual contact rates in the neighborhood did not increase simulated area-level inequalities. When we modified individual susceptibility such that it was inversely proportional to household income, inequalities in AR between high- and low-poverty census tracts were comparable to those observed in reality. To our knowledge, this is the first study to use simulations to probe the causes of observed inequalities in influenza disease patterns. Knowledge of the causes and their relative explanatory power will allow us to design interventions that have the greatest impact on reducing inequalities. Differential exposure due to population structure in our realistic simulation model explains a third of the observed inequality. Differential susceptibility to disease due to prevailing chronic conditions, vaccine uptake, and smoking should be considered in future models in order to quantify the role of additional factors in generating influenza inequalities.
NASA Technical Reports Server (NTRS)
Coe, P. L., Jr.; Newsom, W. A., Jr.
1974-01-01
An investigation was conducted to determine the low-speed yawing stability derivatives of a twin-jet fighter airplane model at high angles of attack. Tests were performed in a low-speed tunnel utilizing variable-curvature walls to simulate pure yawing motion. The results of the study showed that at angles of attack below the stall the yawing derivatives were essentially independent of the yawing velocity and sideslip angle. However, at angles of attack above the stall some nonlinear variations were present and the derivatives were strongly dependent upon sideslip angle. The results also showed that the rolling moment due to yawing was primarily due to the wing-fuselage combination, and that at angles of attack below the stall both the vertical and horizontal tails produced significant contributions to the damping in yaw. Additionally, the tests showed that the use of the forced-oscillation data to represent the yawing stability derivatives is questionable, at high angles of attack, due to large effects arising from the acceleration in sideslip derivatives.
Aerodynamic characteristics of airplanes at high angles of attack
NASA Technical Reports Server (NTRS)
Chambers, J. R.; Grafton, S. B.
1977-01-01
An introduction to, and a broad overiew of, the aerodynamic characteristics of airplanes at high angles of attack are provided. Items include: (1) some important fundamental phenomena which determine the aerodynamic characteristics of airplanes at high angles of attack; (2) static and dynamic aerodynamic characteristics near the stall; (3) aerodynamics of the spin; (4) test techniques used in stall/spin studies; (5) applications of aerodynamic data to problems in flight dynamics in the stall/spin area; and (6) the outlook for future research in the area. Although stalling and spinning are flight dynamic problems of importance to all aircraft, including general aviation aircraft, commercial transports, and military airplanes, emphasis is placed on military configurations and the principle aerodynamic factors which influence the stability and control of such vehicles at high angles of attack.
Flight Test Techniques for Quantifying Pitch Rate and Angle of Attack Rate Dependencies
NASA Technical Reports Server (NTRS)
Grauer, Jared A.; Morelli, Eugene A.; Murri, Daniel G.
2017-01-01
Three different types of maneuvers were designed to separately quantify pitch rate and angle of attack rate contributions to the nondimensional aerodynamic pitching moment coefficient. These maneuvers combined pilot inputs and automatic multisine excitations, and were own with the subscale T-2 and Bat-4 airplanes using the NASA AirSTAR flight test facility. Stability and control derivatives, in particular C(sub mq) and C(sub m alpha(.)) were accurately estimated from the flight test data. These maneuvers can be performed with many types of aircraft, and the results can be used to increase simulation prediction fidelity and facilitate more accurate comparisons with wind tunnel experiments or numerical investigations.
Olfactory-triggered panic attacks among Khmer refugees: a contextual approach.
Hinton, Devon; Pich, Vuth; Chhean, Dara; Pollack, Mark
2004-06-01
One hundred Khmer refugees attending a psychiatric clinic were surveyed to determine the prevalence of olfactory-triggered panic attacks as well as certain characteristics of the episodes, including trigger (i.e. type of odor), frequency, length, somatic symptoms, and the rate of associated flashbacks and catastrophic cognitions. Forty-five of the 100 patients had experienced an olfactory-triggered panic attack in the last month. Trauma associations and catastrophic cognitions (e.g. fears of a 'wind attack', 'weakness', and 'weak heart') were common during events of olfactory panic. Several case examples are presented. A multifactorial model of the generation of olfactory panic is adduced. The therapeutic implications of this model for the treatment of olfactory panic are discussed.
NASA Astrophysics Data System (ADS)
Zhang, Sheng; Wang, Jian; Tang, Chao-Jing
2012-06-01
Counterfactual quantum cryptography, recently proposed by Noh, is featured with no transmission of signal particles. This exhibits evident security advantages, such as its immunity to the well-known photon-number-splitting attack. In this paper, the theoretical security of counterfactual quantum cryptography protocol against the general intercept-resend attacks is proved by bounding the information of an eavesdropper Eve more tightly than in Yin's proposal [Phys. Rev. A 82 042335 (2010)]. It is also shown that practical counterfactual quantum cryptography implementations may be vulnerable when equipped with imperfect apparatuses, by proving that a negative key rate can be achieved when Eve launches a time-shift attack based on imperfect detector efficiency.
Kahan, Ernesto; Fogelman, Yacov; Kitai, Eliezer; Vinker, Shlomo
2003-08-01
The threat of bioterrorism consequent to the September 11, 2001 attack in the USA generated suggestions for improved medical response mainly through hospital preparedness. The aim of the present study was to investigate the impact of this period of tension on patients' first choice for care and for receiving relevant information, and on primary care doctors' feelings of responsibility in the eventuality of an anthrax attack. During October 11-31, 2001, 500 patients from 30 clinics throughout Israel were asked to complete a questionnaire on their awareness of the anthrax threat, measures taken to prepare for it, and preferred sources of care and information. Their 30 physicians, and an additional 20, completed a questionnaire on knowledge about anthrax and anthrax-related patient behaviours and clinic visits. The outstanding finding was the low rate (30%) of patients who chose the hospital emergency department as their first choice for care or information if they were worried about an anthrax attack or the media communicated that an attack was in progress. The other two-thirds preferred their family doctor or the health authorities. Most of the physicians (89%) felt it was their responsibility to treat anthrax-infected patients and that they should therefore be supplied with appropriate guidelines. This study suggests that in Israel, a country with a high degree of awareness of civil defence aspects, both patients and primary care doctors believe that family physicians should have a major role in the case of bioterrorist attacks. This must be seriously considered during formulation of relevant health services programmes.
Countermeasures for unintentional and intentional video watermarking attacks
NASA Astrophysics Data System (ADS)
Deguillaume, Frederic; Csurka, Gabriela; Pun, Thierry
2000-05-01
These last years, the rapidly growing digital multimedia market has revealed an urgent need for effective copyright protection mechanisms. Therefore, digital audio, image and video watermarking has recently become a very active area of research, as a solution to this problem. Many important issues have been pointed out, one of them being the robustness to non-intentional and intentional attacks. This paper studies some attacks and proposes countermeasures applied to videos. General attacks are lossy copying/transcoding such as MPEG compression and digital/analog (D/A) conversion, changes of frame-rate, changes of display format, and geometrical distortions. More specific attacks are sequence edition, and statistical attacks such as averaging or collusion. Averaging attack consists of averaging locally consecutive frames to cancel the watermark. This attack works well for schemes which embed random independent marks into frames. In the collusion attack the watermark is estimated from single frames (based on image denoising), and averaged over different scenes for better accuracy. The estimated watermark is then subtracted from each frame. Collusion requires that the same mark is embedded into all frames. The proposed countermeasures first ensures robustness to general attacks by spread spectrum encoding in the frequency domain and by the use of an additional template. Secondly, a Bayesian criterion, evaluating the probability of a correctly decoded watermark, is used for rejection of outliers, and to implement an algorithm against statistical attacks. The idea is to embed randomly chosen marks among a finite set of marks, into subsequences of videos which are long enough to resist averaging attacks, but short enough to avoid collusion attacks. The Bayesian criterion is needed to select the correct mark at the decoding step. Finally, the paper presents experimental results showing the robustness of the proposed method.
A graph-based system for network-vulnerability analysis
DOE Office of Scientific and Technical Information (OSTI.GOV)
Swiler, L.P.; Phillips, C.
1998-06-01
This paper presents a graph-based approach to network vulnerability analysis. The method is flexible, allowing analysis of attacks from both outside and inside the network. It can analyze risks to a specific network asset, or examine the universe of possible consequences following a successful attack. The graph-based tool can identify the set of attack paths that have a high probability of success (or a low effort cost) for the attacker. The system could be used to test the effectiveness of making configuration changes, implementing an intrusion detection system, etc. The analysis system requires as input a database of common attacks,more » broken into atomic steps, specific network configuration and topology information, and an attacker profile. The attack information is matched with the network configuration information and an attacker profile to create a superset attack graph. Nodes identify a stage of attack, for example the class of machines the attacker has accessed and the user privilege level he or she has compromised. The arcs in the attack graph represent attacks or stages of attacks. By assigning probabilities of success on the arcs or costs representing level-of-effort for the attacker, various graph algorithms such as shortest-path algorithms can identify the attack paths with the highest probability of success.« less
Knowledge and Attitude of Iranian Red Crescent Society Volunteers in Dealing with Chemical Attacks.
Nadjafi, Maryam; Hamzeh Pour, Siavash
2017-04-01
To evaluate the knowledge, attitude, and preparedness of Mahabad Red Crescent Society volunteers in dealing with chemical attacks. This prospective cross-sectional study was conducted on 120 Red Crescent Society volunteers in Mahabad City, Iran, during 2014-2015.The knowledge of the volunteers was evaluated and rated using a questionnaire as poor, moderate, and good. Also, the attitude of the volunteers towards the chemical attacks and their preparedness were rated as appropriate and inappropriate using a questionnaire. Data were analyzed using the SPSS software version 21. From a total of 120 volunteers, 62.5% were males. The mean age of the volunteers was 32.0 ± 8.2 years. None of the volunteers had adequate knowledge regarding management of the consequences of chemical terrorist attacks. Only 10 volunteers (8.3%) had appropriate attitude and 7 (5.8%) stated their preparedness for being sent to the crisis zone. Also, 116 volunteers (96.7%) declared that Mahabad Red Crescent Society has an inappropriate level of preparedness to encounter chemical terrorism attacks and release of chemical agents related to petrochemical industrial chlorine resources into the water and wastewater. The findings of the present study show poor knowledge and inappropriate attitude of Mahabad Red Crescent Society volunteers, and rescuers in encountering probable chemical attacks and industrial accidents. Furthermore, the Red Crescent Society had an inappropriate level of preparedness in the field of chemical terrorism from the viewpoint of the studied volunteers.
Brighton, Caroline H.; Thomas, Adrian L. R.
2017-01-01
The ability to intercept uncooperative targets is key to many diverse flight behaviors, from courtship to predation. Previous research has looked for simple geometric rules describing the attack trajectories of animals, but the underlying feedback laws have remained obscure. Here, we use GPS loggers and onboard video cameras to study peregrine falcons, Falco peregrinus, attacking stationary targets, maneuvering targets, and live prey. We show that the terminal attack trajectories of peregrines are not described by any simple geometric rule as previously claimed, and instead use system identification techniques to fit a phenomenological model of the dynamical system generating the observed trajectories. We find that these trajectories are best—and exceedingly well—modeled by the proportional navigation (PN) guidance law used by most guided missiles. Under this guidance law, turning is commanded at a rate proportional to the angular rate of the line-of-sight between the attacker and its target, with a constant of proportionality (i.e., feedback gain) called the navigation constant (N). Whereas most guided missiles use navigation constants falling on the interval 3 ≤ N ≤ 5, peregrine attack trajectories are best fitted by lower navigation constants (median N < 3). This lower feedback gain is appropriate at the lower flight speed of a biological system, given its presumably higher error and longer delay. This same guidance law could find use in small visually guided drones designed to remove other drones from protected airspace. PMID:29203660
Brighton, Caroline H; Thomas, Adrian L R; Taylor, Graham K
2017-12-19
The ability to intercept uncooperative targets is key to many diverse flight behaviors, from courtship to predation. Previous research has looked for simple geometric rules describing the attack trajectories of animals, but the underlying feedback laws have remained obscure. Here, we use GPS loggers and onboard video cameras to study peregrine falcons, Falco peregrinus , attacking stationary targets, maneuvering targets, and live prey. We show that the terminal attack trajectories of peregrines are not described by any simple geometric rule as previously claimed, and instead use system identification techniques to fit a phenomenological model of the dynamical system generating the observed trajectories. We find that these trajectories are best-and exceedingly well-modeled by the proportional navigation (PN) guidance law used by most guided missiles. Under this guidance law, turning is commanded at a rate proportional to the angular rate of the line-of-sight between the attacker and its target, with a constant of proportionality (i.e., feedback gain) called the navigation constant ( N ). Whereas most guided missiles use navigation constants falling on the interval 3 ≤ N ≤ 5, peregrine attack trajectories are best fitted by lower navigation constants (median N < 3). This lower feedback gain is appropriate at the lower flight speed of a biological system, given its presumably higher error and longer delay. This same guidance law could find use in small visually guided drones designed to remove other drones from protected airspace. Copyright © 2017 the Author(s). Published by PNAS.
Facelock: familiarity-based graphical authentication
McLachlan, Jane L.; Renaud, Karen
2014-01-01
Authentication codes such as passwords and PIN numbers are widely used to control access to resources. One major drawback of these codes is that they are difficult to remember. Account holders are often faced with a choice between forgetting a code, which can be inconvenient, or writing it down, which compromises security. In two studies, we test a new knowledge-based authentication method that does not impose memory load on the user. Psychological research on face recognition has revealed an important distinction between familiar and unfamiliar face perception: When a face is familiar to the observer, it can be identified across a wide range of images. However, when the face is unfamiliar, generalisation across images is poor. This contrast can be used as the basis for a personalised ‘facelock’, in which authentication succeeds or fails based on image-invariant recognition of faces that are familiar to the account holder. In Study 1, account holders authenticated easily by detecting familiar targets among other faces (97.5% success rate), even after a one-year delay (86.1% success rate). Zero-acquaintance attackers were reduced to guessing (<1% success rate). Even personal attackers who knew the account holder well were rarely able to authenticate (6.6% success rate). In Study 2, we found that shoulder-surfing attacks by strangers could be defeated by presenting different photos of the same target faces in observed and attacked grids (1.9% success rate). Our findings suggest that the contrast between familiar and unfamiliar face recognition may be useful for developers of graphical authentication systems. PMID:25024913
Bondü, Rebecca; Beier, Sophia
2015-01-01
School attacks are attracting increasing attention in aggression research. Recent systematic analyses provided new insights into offense and offender characteristics. Less is known about attacks in institutes of higher education (e.g., universities). It is therefore questionable whether the term "school attack" should be limited to institutions of general education or could be extended to institutions of higher education. Scientific literature is divided in distinguishing or unifying these two groups and reports similarities as well as differences. We researched 232 school attacks and 45 attacks in institutes of higher education throughout the world and conducted systematic comparisons between the two groups. The analyses yielded differences in offender (e.g., age, migration background) and offense characteristics (e.g., weapons, suicide rates), and some similarities (e.g., gender). Most differences can apparently be accounted for by offenders' age and situational influences. We discuss the implications of our findings for future research and the development of preventative measures. © The Author(s) 2014.
NASA Astrophysics Data System (ADS)
Ghimire, Rajendra P.; Kivimäenpää, Minna; Blomqvist, Minna; Holopainen, Toini; Lyytikäinen-Saarenmaa, Päivi; Holopainen, Jarmo K.
2016-02-01
Climate warming driven storms are evident causes for an outbreak of the European spruce bark beetle (Ips typographus L.) resulting in the serious destruction of mature Norway spruce (Picea abies Karst.) forests in northern Europe. Conifer species are major sources of biogenic volatile organic compounds (BVOCs) in the boreal zone. Climate relevant BVOC emissions are expected to increase when conifer trees defend against bark beetle attack by monoterpene (MT)-rich resin flow. In this study, BVOC emission rates from the bark surface of beetle-attacked and non-attacked spruce trees were measured from two outbreak areas, Iitti and Lahti in southern Finland, and from one control site at Kuopio in central Finland. Beetle attack increased emissions of total MTs 20-fold at Iitti compared to Kuopio, but decreased the emissions of several sesquiterpenes (SQTs) at Iitti. At the Lahti site, the emission rate of α-pinene was positively correlated with mean trap catch of bark beetles. The responsive individual MTs were tricyclene, α-pinene, camphene, myrcene, limonene, 1,8-cineole and bornyl acetate in both of the outbreak areas. Our results suggest that bark beetle outbreaks affect local BVOC emissions from conifer forests dominated by Norway spruce. Therefore, the impacts of insect outbreaks are worth of consideration to global BVOC emission models.
NASA Astrophysics Data System (ADS)
Gemmell, Brad; Sheng, Jian; Buskey, Ed
2008-11-01
Copepods are an important planktonic food source for most of the world's fish species. This high predation pressure has led copepods to evolve an extremely effective escape response, with reaction times to hydrodynamic disturbances of less than 4 ms and escape speeds of over 500 body lengths per second. Using 3D high speed digital holographic cinematography (up to 2000 frames per second) we elucidate the role of entrainment flow fields generated by a natural visual predator, the dwarf seahorse (Hippocampus zosterae) during attacks on its prey, Acartia tonsa. Using phytoplankton as a tracer, we recorded and reconstructed 3D flow fields around the head of the seahorse and its prey during both successful and unsuccessful attacks to better understand how some attacks lead to capture with little or no detection from the copepod while others result in failed attacks. Attacks start with a slow approach to minimize the hydro-mechanical disturbance which is used by copepods to detect the approach of a potential predator. Successful attacks result in the seahorse using its pipette-like mouth to create suction faster than the copepod's response latency. As these characteristic scales of entrainment increase, a successful escape becomes more likely.
Kleis, Sebastian; Rueckmann, Max; Schaeffer, Christian G
2017-04-15
In this Letter, we propose a novel implementation of continuous variable quantum key distribution that operates with a real local oscillator placed at the receiver site. In addition, pulsing of the continuous wave laser sources is not required, leading to an extraordinary practical and secure setup. It is suitable for arbitrary schemes based on modulated coherent states and heterodyne detection. The shown results include transmission experiments, as well as an excess noise analysis applying a discrete 8-state phase modulation. Achievable key rates under collective attacks are estimated. The results demonstrate the high potential of the approach to achieve high secret key rates at relatively low effort and cost.
Kent, S
1979-06-01
Because the advantage that women have over men in a lower heart attack rate is gradually lost after menopause, it has been suggested that estrogen may exert a protective effect against heart disease. The situation is complex, and the available data are open to various interpretations. Available data show a gradual, predictable increase in the death rate from heart disease among women with advancing age, despite the apparent increase in cardiovascular events around the time of menopause. This suggests that men may be particularly susceptible to heart disease, rather than that women have an immunity to the disease. The theory that estrogen exerts a protective effect against heart disease was examined when men who had had heart attacks were treated with estrogen in the Coronary Drug Project. The practice was discontinued when it was found that men receiving estrogen had an elevated incidence of myocardial infarction, a finding that suggests that estrogen may promote heart disease. Additional evidence that estrogen may have a harmful effect on the cardiovascular system comes from a recent study by Gerald B. Phillips who found that men who had suffered heart attacks before age 43 had higher levels of estradiol in their blood than men who had not had heart attacks. A noteworthy finding from th e Framingham study was the fact that the relative risk of cardiovascular events in postmenopausal compared with premenopausal women seemed to decrease with age. Hans Selye identifies stress as "the final, decisive eliciting factor" in precipitating heart attack. Broda O. Barnes also maintains that stress is a major cause of heart attack, but adds that most stress-prone individuals suffer from thyroid deficiency, which is the underlying cause of their increased susceptibility to heart attacks.
True random bit generators based on current time series of contact glow discharge electrolysis
NASA Astrophysics Data System (ADS)
Rojas, Andrea Espinel; Allagui, Anis; Elwakil, Ahmed S.; Alawadhi, Hussain
2018-05-01
Random bit generators (RBGs) in today's digital information and communication systems employ a high rate physical entropy sources such as electronic, photonic, or thermal time series signals. However, the proper functioning of such physical systems is bound by specific constrains that make them in some cases weak and susceptible to external attacks. In this study, we show that the electrical current time series of contact glow discharge electrolysis, which is a dc voltage-powered micro-plasma in liquids, can be used for generating random bit sequences in a wide range of high dc voltages. The current signal is quantized into a binary stream by first using a simple moving average function which makes the distribution centered around zero, and then applying logical operations which enables the binarized data to pass all tests in industry-standard randomness test suite by the National Institute of Standard Technology. Furthermore, the robustness of this RBG against power supply attacks has been examined and verified.
Müller, Heinz
1989-01-01
During extensive field surveys in central and eastern Europe, 21 herbivorous root insect species were found on Centaurea maculosa ssp. rhenana Boreau, 12 species on C. diffusa Lam. and 11 species on C. vallesiaca Jordan, representing 12 families in 4 orders. The large geographic distribution (species-area function), the high number of Centaurea spp. present (host speciation rate), and the high apparency of the rosettes and the rich food resources offered by the roots during winter, together with their poor accessibility, correlate with the high number of specialist feeders associated with the roots of C. maculosa and C. diffusa. The members of the taxonomically diverse root entomofauna exploit specific structures of the tap root (food niches). Interspecific competition among members of food niches, as well as species-specific responses to different phenological stages (for oviposition) and tissues (for larval development) are thought to be responsible for the high predictability in guild structure. The relatively low levels of host plant attack (two thirds of the roots were unattacked) and the fact that food niches remained unoccupied in most of the regions suggest, however, that the majority of the studied guilds do not represent equilibrium assemblages. Ecological (different habitats), climatic (transitional zone) and historical (ancient pre-Pleistocene communities) factors could account for the highest values of species diversity, infestation levels, species packing and food niche utilization, which are found on C. maculosa in E. Austria/NW. Hungary, compared to other regions. A positive correlation between species packing (number of root-feeding species per population) and infestation rates (percent of roots attacked) was only found for the more stable, semi-natural habitats. A comparative analysis of the regional root insect guilds of C. maculosa with corresponding data for the phytophagous insects associated with the flower heads revealed distinct taxonomical differences, but a high degree of numerical and structural similarity. The different geographical regions are similarly ranked for host plant attack, herbivore pressure, average species packing and level of food niche utilization.
Minari, A; Husni, R; Avery, R K; Longworth, D L; DeCamp, M; Bertin, M; Schilz, R; Smedira, N; Haug, M T; Mehta, A; Gordon, S M
2002-12-01
Invasive aspergillosis (IA) is associated with significant morbidity and mortality in solid organ transplant recipients but data on the incidence rates stratified by type of solid organ are limited. To describe the attack rates and incidence of IA in solid organ transplant recipients, and the impact of universal Aspergillus prophylaxis (aerosolized amphotericin B or oral itraconazole) in lung transplant recipients. The 2,046 patients who received solid organ transplants at the Cleveland Clinic Foundation from January 1990 through 1999 were studied. Cases were ascertained through computerized records of microbiology, cytology, and pathology reports. Definite IA was defined as a positive culture and pathology showing septate hyphae. Probable IA was clinical disease and either a positive culture or histopathology. Disseminated IA was defined as involvement of two or more noncontiguous anatomic sites. We identified 33 cases of IA (28% disseminated) in 2,046 patients (attack rate = 1.6%) for an incidence of 4.8 cases per 1,000 patient-years (33 cases/6,813 pt-years). Both the attack and the incidence rates were significantly higher for lung transplant recipients vs. other transplant recipients: lung 12.8% (24 cases/188 patients) or 40.5 cases/1,000-pt year vs. heart 0.4% (3/686) or 1.4 per 1,000-pt year vs. liver 0.7% (3/439) or 2.1 per 1,000-pt year vs. renal 0.4% (3/733) or 1.2 per 1,000-pt year (P < 0.01). The incidence of IA was highest during the first year after transplantation for all categories, but cases occurred after the first year of transplantation only in lung transplant recipients. The attack rate of IA in lung transplant recipients was significantly lower after institution of routine Aspergillus prophylaxis (4.9% vs. 18.2%, P < 0.05). The highest incidence and attack rate of invasive aspergillosis among solid organ transplant recipients occurs in lung transplant recipients and supports the routine use of Aspergillus prophylaxis for at least one year after transplantation in this group.
... high blood pressure, staying on your medicines is critical to prevent heart attacks, strokes, kidney disease and ... high blood pressure, staying on your medicines is critical to prevent heart attacks, strokes, kidney disease and ...
Flight Dynamics of an Aeroshell Using an Attached Inflatable Aerodynamic Decelerator
NASA Technical Reports Server (NTRS)
Cruz, Juan R.; Schoenenberger, Mark; Axdahl, Erik; Wilhite, Alan
2009-01-01
An aeroelastic analysis of the behavior of an entry vehicle utilizing an attached inflatable aerodynamic decelerator during supersonic flight is presented. The analysis consists of a planar, four degree of freedom simulation. The aeroshell and the IAD are assumed to be separate, rigid bodies connected with a spring-damper at an interface point constraining the relative motion of the two bodies. Aerodynamic forces and moments are modeled using modified Newtonian aerodynamics. The analysis includes the contribution of static aerodynamic forces and moments as well as pitch damping. Two cases are considered in the analysis: constant velocity flight and planar free flight. For the constant velocity and free flight cases with neutral pitch damping, configurations with highly-stiff interfaces exhibit statically stable but dynamically unstable aeroshell angle of attack. Moderately stiff interfaces exhibit static and dynamic stability of aeroshell angle of attack due to damping induced by the pitch angle rate lag between the aeroshell and IAD. For the free-flight case, low values of both the interface stiffness and damping cause divergence of the aeroshell angle of attack due to the offset of the IAD drag force with respect to the aeroshell center of mass. The presence of dynamic aerodynamic moments was found to influence the stability characteristics of the vehicle. The effect of gravity on the aeroshell angle of attack stability characteristics was determined to be negligible for the cases investigated.
Trustworthiness of detectors in quantum key distribution with untrusted detectors
Qi, Bing
2015-02-25
Measurement-device-independent quantum key distribution (MDI-QKD) protocol has been demonstrated as a viable solution to detector side-channel attacks. One of the main advantages of MDI-QKD is that the security can be proved without making any assumptions about how the measurement device works. The price to pay is the relatively low secure key rate comparing with conventional quantum key distribution (QKD), such as the decoy-state BB84 protocol. Recently a new QKD protocol, aiming at bridging the strong security of MDI-QKD with the high e ciency of conventional QKD, has been proposed. In this protocol, the legitimate receiver employs a trusted linear opticsmore » network to encode information on photons received from an insecure quantum channel, and then performs a Bell state measurement (BSM) using untrusted detectors. One crucial assumption made in most of these studies is that the untrusted BSM located inside the receiver's laboratory cannot send any unwanted information to the outside. Here in this paper, we show that if the BSM is completely untrusted, a simple scheme would allow the BSM to send information to the outside. Combined with Trojan horse attacks, this scheme could allow Eve to gain information of the quantum key without being detected. Ultimately, to prevent the above attack, either countermeasures to Trojan horse attacks or some trustworthiness to the "untrusted" BSM device is required.« less
NASA Technical Reports Server (NTRS)
Hall, Robert M.; Erickson, Gary E.; Fox, Charles H., Jr.; Banks, Daniel W.; Fisher, David F.
1998-01-01
A subsonic study of high-angle-of-attack gritting strategies was undertaken with a 0.06-scale model of the F/A-18, which was assumed to be typical of airplanes with smooth-sided forebodies. This study was conducted in the Langley 7- by 10-Foot High-Speed Tunnel and was intended to more accurately simulate flight boundary layer characteristics on the model in the wind tunnel than would be possible by using classical, low-angle-of-attack gritting on the fuselage. Six-component force and moment data were taken with an internally mounted strain-gauge balance, while pressure data were acquired by using electronically scanned pressure transducers. Data were taken at zero sideslip over an angle-of-attack range from 0 deg to 40 deg and, at selected angles of attack, over sideslip angles from -10 deg to 10 deg. Free-stream Mach number was fixed at 0.30, which resulted in a Reynolds number, based on mean aerodynamic chord, of 1.4 x 10(exp 6). Pressure data measured over the forebody and leading-edge extensions are compared to similar pressure data taken by a related NASA flight research program by using a specially instrumented F/A-18, the High-Alpha Research Vehicle (HARV). Preliminary guidelines for high-angle-of-attack gritting strategies are given.
Salticid predation as one potential driving force of ant mimicry in jumping spiders
Huang, Jin-Nan; Cheng, Ren-Chung; Li, Daiqin; Tso, I-Min
2011-01-01
Many spiders possess myrmecomorphy, and species of the jumping spider genus Myrmarachne exhibit nearly perfect ant mimicry. Most salticids are diurnal predators with unusually high visual acuity that prey on various arthropods, including conspecifics. In this study, we tested whether predation pressure from large jumping spiders is one possible driving force of perfect ant mimicry in jumping spiders. The results showed that small non-ant-mimicking jumping spiders were readily treated as prey by large ones (no matter whether heterospecific or conspecific) and suffered high attack and mortality rates. The size difference between small and large jumping spiders significantly affected the outcomes of predatory interactions between them: the smaller the juvenile jumping spiders, the higher the predation risk from large ones. The attack and mortality rates of ant-mimicking jumping spiders were significantly lower than those of non-ant-mimicking jumping spiders, indicating that a resemblance to ants could provide protection against salticid predation. However, results of multivariate behavioural analyses showed that the responses of large jumping spiders to ants and ant-mimicking salticids differed significantly. Results of this study indicate that predation pressure from large jumping spiders might be one selection force driving the evolution of nearly perfect myrmecomorphy in spiders and other arthropods. PMID:20961898
Effects of behavioral changes in a smallpox attack model.
Del Valle, S; Hethcote, H; Hyman, J M; Castillo-Chavez, C
2005-06-01
The impact of individual and community behavioral changes in response to an outbreak of a disease with high mortality is often not appreciated. Response strategies to a smallpox bioterrorist attack have focused on interventions such as isolation of infectives, contact tracing, quarantine of contacts, ring vaccination, and mass vaccination. We formulate and analyze a mathematical model in which some individuals lower their daily contact activity rates once an epidemic has been identified in a community. Transmission parameters are estimated from data and an expression is derived for the effective reproduction number. We use computer simulations to analyze the effects of behavior change alone and in combination with other control measures. We demonstrate that the spread of the disease is highly sensitive to how rapidly people reduce their contact activity rates and to the precautions that the population takes to reduce the transmission of the disease. Even gradual and mild behavioral changes can have a dramatic impact in slowing an epidemic. When behavioral changes are combined with other interventions, the epidemic is shortened and the number of smallpox cases is reduced. We conclude that for simulations of a smallpox outbreak to be useful, they must consider the impact of behavioral changes. This is especially true if the model predictions are being used to guide public health policy.
NASA Technical Reports Server (NTRS)
Rainey, A Gerald
1957-01-01
The oscillating air forces on a two-dimensional wing oscillating in pitch about the midchord have been measured at various mean angles of attack and at Mach numbers of 0.35 and 0.7. The magnitudes of normal-force and pitching-moment coefficients were much higher at high angles of attack than at low angles of attack for some conditions. Large regions of negative damping in pitch were found, and it was shown that the effect of increasing the Mach number 0.35 to 0.7 was to decrease the initial angle of attack at which negative damping occurred. Measurements of the aerodynamic damping of a 10-percent-thick and of a 3-percent-thick finite-span wing oscillating in the first bending mode indicate no regions of negative damping for this type of motion over the range of variables covered. The damping measured at high angles of attack was generally larger than that at low angles of attack. (author)
Korean immigrants' knowledge of heart attack symptoms and risk factors.
Hwang, Seon Y; Ryan, Catherine J; Zerwic, Julie Johnson
2008-02-01
This study assessed the knowledge of heart attack symptoms and risk factors in a convenience sample of Korean immigrants. A total of 116 Korean immigrants in a Midwestern metropolitan area were recruited through Korean churches and markets. Knowledge was assessed using both open-ended questions and a structured questionnaire. Latent class cluster analysis and Chi-square tests were used to analyze the data. About 76% of the sample had at least one self-reported risk factor for cardiovascular disease. Using an open-ended question, the majority of subjects could only identify one symptom. In the structured questionnaire, subjects identified a mean of 5 out of 10 heart attack symptoms and a mean of 5 out of 9 heart attack risk factors. Latent class cluster analysis showed that subjects clustered into two groups for both risk factors and symptoms: a high knowledge group and a low knowledge group. Subjects who clustered into the risk factor low knowledge group (48%) were more likely than the risk factor high knowledge group to be older than 65 years, to have lower education, to not know to use 911 when a heart attack occurred, and to not have a family history of heart attack. Korean immigrants' knowledge of heart attack symptoms and risk factors was variable, ranging from high to very low. Education should be focused on those at highest risk for a heart attack, which includes the elderly and those with risk factors.
Optimality of Gaussian attacks in continuous-variable quantum cryptography.
Navascués, Miguel; Grosshans, Frédéric; Acín, Antonio
2006-11-10
We analyze the asymptotic security of the family of Gaussian modulated quantum key distribution protocols for continuous-variables systems. We prove that the Gaussian unitary attack is optimal for all the considered bounds on the key rate when the first and second momenta of the canonical variables involved are known by the honest parties.
Assessing Sexual Abuse/Attack Histories with Bariatric Surgery Patients
ERIC Educational Resources Information Center
Mahony, David
2010-01-01
This study assessed sexual abuse/attack histories in 537 bariatric surgery patients using the PsyBari. The prevalence rates found were lower (15.5%, 19.3% of women, 5.2% of men) than other studies that used bariatric surgery patients but consistent with studies that used nonbariatric obese subjects. Furthermore, bariatric surgery patients who…
Efficient Data Transfer Rate and Speed of Secured Ethernet Interface System.
Ghanti, Shaila; Naik, G M
2016-01-01
Embedded systems are extensively used in home automation systems, small office systems, vehicle communication systems, and health service systems. The services provided by these systems are available on the Internet and these services need to be protected. Security features like IP filtering, UDP protection, or TCP protection need to be implemented depending on the specific application used by the device. Every device on the Internet must have network interface. This paper proposes the design of the embedded Secured Ethernet Interface System to protect the service available on the Internet against the SYN flood attack. In this experimental study, Secured Ethernet Interface System is customized to protect the web service against the SYN flood attack. Secured Ethernet Interface System is implemented on ALTERA Stratix IV FPGA as a system on chip and uses the modified SYN flood attack protection method. The experimental results using Secured Ethernet Interface System indicate increase in number of genuine clients getting service from the server, considerable improvement in the data transfer rate, and better response time during the SYN flood attack.
Efficient Data Transfer Rate and Speed of Secured Ethernet Interface System
Ghanti, Shaila
2016-01-01
Embedded systems are extensively used in home automation systems, small office systems, vehicle communication systems, and health service systems. The services provided by these systems are available on the Internet and these services need to be protected. Security features like IP filtering, UDP protection, or TCP protection need to be implemented depending on the specific application used by the device. Every device on the Internet must have network interface. This paper proposes the design of the embedded Secured Ethernet Interface System to protect the service available on the Internet against the SYN flood attack. In this experimental study, Secured Ethernet Interface System is customized to protect the web service against the SYN flood attack. Secured Ethernet Interface System is implemented on ALTERA Stratix IV FPGA as a system on chip and uses the modified SYN flood attack protection method. The experimental results using Secured Ethernet Interface System indicate increase in number of genuine clients getting service from the server, considerable improvement in the data transfer rate, and better response time during the SYN flood attack. PMID:28116350
Distributed reinforcement learning for adaptive and robust network intrusion response
NASA Astrophysics Data System (ADS)
Malialis, Kleanthis; Devlin, Sam; Kudenko, Daniel
2015-07-01
Distributed denial of service (DDoS) attacks constitute a rapidly evolving threat in the current Internet. Multiagent Router Throttling is a novel approach to defend against DDoS attacks where multiple reinforcement learning agents are installed on a set of routers and learn to rate-limit or throttle traffic towards a victim server. The focus of this paper is on online learning and scalability. We propose an approach that incorporates task decomposition, team rewards and a form of reward shaping called difference rewards. One of the novel characteristics of the proposed system is that it provides a decentralised coordinated response to the DDoS problem, thus being resilient to DDoS attacks themselves. The proposed system learns remarkably fast, thus being suitable for online learning. Furthermore, its scalability is successfully demonstrated in experiments involving 1000 learning agents. We compare our approach against a baseline and a popular state-of-the-art throttling technique from the network security literature and show that the proposed approach is more effective, adaptive to sophisticated attack rate dynamics and robust to agent failures.
On the Lateral Static Stability of Low-Aspect-Ratio Rectangular Wings
NASA Astrophysics Data System (ADS)
Linehan, Thomas; Mohseni, Kamran
2017-11-01
Low-aspect-ratio rectangular wings experience a reduction in lateral static stability at angles of attack distinct from that of lift stall. Stereoscopic digital particle image velocimetry is used to elucidate the flow physics behind this trend. Rectangular wings of AR = 0.75, 1, 1.5, 3 were tested at side-slip angles β = -10° and 0° with angle of attack varied in the range α =10° -40° . In side-slip, the leading-edge separation region emerges on the leeward wing where leading-edge flow reattachment is highly intermittent due to vortex shedding. The tip vortex downwash of the AR < 1.5 wings is sufficient to restrict the shedding of leading-edge vorticity, enabling sustained lift from the leading-edge separation region to high angles of attack. The windward tip vortex grows in size with increasing angle of attack, occupying an increasingly larger percentage of the windward wing. At high angles of attack pre-lift stall, the windward tip vortex lifts off the wing, resulting in separated flow underneath it. The downwash of the AR = 3 wing is insufficient to reattach the leading-edge flow at high incidence. The flow stalls on the leeward wing with stalled flow expanding upstream toward the windward wing with increasing angle of attack.
Reding, Michael E; Oliver, Jason B; Schultz, Peter B; Ranger, Christopher M; Youssef, Nadeer N
2013-02-01
Exotic ambrosia beetles are damaging pests in ornamental tree nurseries in North America. The species Xylosandrus crassiusculus (Motshulsky) and Xylosandrus germanus (Blandford) are especially problematic. Management of these pests relies on preventive treatments of insecticides. However, field tests of recommended materials on nursery trees have been limited because of unreliable attacks by ambrosia beetles on experimental trees. Ethanol-injection of trees was used to induce colonization by ambrosia beetles to evaluate insecticides and botanical formulations for preventing attacks by ambrosia beetles. Experiments were conducted in Ohio, Tennessee, and Virginia. Experimental trees injected with ethanol had more attacks by ambrosia beetles than uninjected control trees in all but one experiment. Xylosandrus crassiusculus and X. germanus colonized trees injected with ethanol. In most experiments, attack rates declined 8 d after ethanol-injection. Ethanol-injection induced sufficient pressure from ambrosia beetles to evaluate the efficacy of insecticides for preventing attacks. Trunk sprays of permethrin suppressed cumulative total attacks by ambrosia beetles in most tests. Trunk sprays of the botanical formulations Armorex and Veggie Pharm suppressed cumulative total attacks in Ohio. Armorex, Armorex + Permethrin, and Veggie Pharm + Permethrin suppressed attacks in Tennessee. The bifenthrin product Onyx suppressed establishment of X. germanus in one Ohio experiment, and cumulative total ambrosia beetle attacks in Virginia. Substrate drenches and trunk sprays of neonicotinoids, or trunk sprays of anthranilic diamides or tolfenpyrad were not effective. Ethanol-injection is effective for inducing attacks and ensuring pressure by ambrosia beetles for testing insecticide efficacy on ornamental trees.
An Overview of Controls and Flying Qualities Technology on the F/A-18 High Alpha Research Vehicle
NASA Technical Reports Server (NTRS)
Pahle, Joseph W.; Wichman, Keith D.; Foster, John V.; Bundick, W. Thomas
1996-01-01
The NASA F/A-18 High Alpha Research Vehicle (HARV) has been the flight test bed of a focused technology effort to significantly increase maneuvering capability at high angles of attack. Development and flight test of control law design methodologies, handling qualities metrics, performance guidelines, and flight evaluation maneuvers are described. The HARV has been modified to include two research control effectors, thrust vectoring, and actuated forebody strakes in order to provide increased control power at high angles of attack. A research flight control system has been used to provide a flexible, easily modified capability for high-angle-of-attack research controls. Different control law design techniques have been implemented and flight-tested, including eigenstructure assignment, variable gain output feedback, pseudo controls, and model-following. Extensive piloted simulation has been used to develop nonlinear performance guide-lines and handling qualities criteria for high angles of attack. This paper reviews the development and evaluation of technologies useful for high-angle-of-attack control. Design, development, and flight test of the research flight control system, control laws, flying qualities specifications, and flight test maneuvers are described. Flight test results are used to illustrate some of the lessons learned during flight test and handling qualities evaluations.
Jibson, R.W.
2002-01-01
Following the 17 January 1994 Northridge. California earthquake (M = 6.7), Ventura County, California, experienced a major outbreak of coccidioidomycosis (CM), commonly known as valley fever, a respiratory disease contracted by inhaling airborne fungal spores. In the 8 weeks following the earthquake (24 January through 15 March), 203 outbreak-associated cases were reported, which is about an order of magnitude more than the expected number of cases, and three of these cases were fatal. Simi Valley, in easternmost Ventura County, had the highest attack rate in the county, and the attack rate decreased westward across the county. The temporal and spatial distribution of CM cases indicates that the outbreak resulted from inhalation of spore-contaminated dust generated by earthquake-triggered landslides. Canyons North East of Simi Valley produced many highly disrupted, dust-generating landslides during the earthquake and its aftershocks. Winds after the earthquake were from the North East, which transported dust into Simi Valley and beyond to communities to the West. The three fatalities from the CM epidemic accounted for 4 percent of the total earthquake-related fatalities.
An outbreak of influenza in a residential drug-rehabilitation community.
Boschini, Antonio; Longo, Benedetta; Caselli, Francesca; Begnini, Marco; De Maria, Cesare; Ansaldi, Filippo; Durando, Paolo; Icardi, Giancarlo; Rezza, Giovanni
2006-09-01
Influenza outbreaks can be difficult to control in confined settings where high-risk individuals are concentrated. Following the occurrence of a large number of cases of influenza-like illness in a rehabilitation community for drug users, between February and March 2004, surveillance activities were implemented. Attack rates of influenza-like illness were calculated, and risk factors for the development of disease and complications were evaluated through the use of relative risks (RR) with 95% confidence intervals (CI). Nasal-pharyngeal samples were collected for virological studies. Of 1,310 persons who were living in the community, 209 were diagnosed with influenza-like illness: the attack rate (15.9% overall) was higher for HIV-infected persons (RR: 1.77, 95% CI: 1.32-2.37), older individuals, and dormitory residents. HIV-infected participants were also more likely to develop complications compared with HIV-uninfected persons diagnosed with influenza-like illness (RR: 5.13, 95% CI: 2.52-10.20). The outbreak was attributable to Christchurch-like influenza A strains. Vaccination was ineffective because of the mismatch between wild and vaccine strains.
NASA Astrophysics Data System (ADS)
Jibson, Randall W.
Following the 17 January 1994 Northridge, California earthquake (M = 6.7), Ventura County, California, experienced a major outbreak ofcoccidioidomycosis (CM), commonly known as valley fever, a respiratory disease contracted byinhaling airborne fungal spores. In the 8 weeks following the earthquake (24 Januarythrough 15 March), 203 outbreak-associated cases were reported, which is about an order of magnitude more than the expected number of cases, and three of these cases were fatal.Simi Valley, in easternmost Ventura County, had the highest attack rate in the county,and the attack rate decreased westward across the county. The temporal and spatial distribution of CM cases indicates that the outbreak resulted from inhalation of spore-contaminated dust generated by earthquake-triggered landslides. Canyons North East of Simi Valleyproduced many highly disrupted, dust-generating landslides during the earthquake andits aftershocks. Winds after the earthquake were from the North East, which transporteddust into Simi Valley and beyond to communities to the West. The three fatalities from the CM epidemic accounted for 4 percent of the total earthquake-related fatalities.
Cuthbertson, Andrew G. S.; Braham, Mohamed
2018-01-01
The almond bark beetle, Scolytus amygdali Geurin-Meneville, is responsible for significant loss of fruit production in almond orchards throughout the world. Here, we studied the damage and the incidences of S. amygdali attack on two different scales: (1) at the level of a single tree; and (2) in an entire orchard. Our results revealed no differences in attack level among four orientations (east, west, south and north sides) for the whole tree. However, the bark that was facing west side in the direction of the prevailing wind was found to be the most suitable for females to initiate attack in Stratum S2. Attack distribution remains the same among different strata (strata is vertical divisions of the tree from the ground to the uppermost twigs with ~40 cm intervals). More than 50% of attack was observed in the trunk of the tree and upper strata. However, multiplication rate (number of emerged adults/maternal gallery) varies significantly between strata. In addition, we studied attack intensity (holes produced by beetle per tree) comparing it to tree morphology (flowers, leaves and circumferences) and gum deposit. Our results revealed a positive correlation between attack intensity and gum deposits, and a negative correlation between attack intensity and tree morphology. This revealed that gum on the tree was an indicator for attack intensity. A positive correlation between attack intensity and the circumference of the tree revealed that older trees were more susceptible to S. amygdali attack. These results, while preliminary, aim to help in the monitoring of S. amygdali populations before deciding to apply any control measures. PMID:29301271
Birkelund, Gunn Elisabeth; Chan, Tak Wing; Ugreninov, Elisabeth; Midtbøen, Arnfinn H; Rogstad, Jon
2018-01-24
Terrorist attacks are known to influence public opinion. But do they also change behaviour? We address this question by comparing the results of two identical randomized field experiments on ethnic discrimination in hiring that we conducted in Oslo. The first experiment was conducted before the 2011 terrorist attacks in Norway; the second experiment was conducted after the attacks. In both experiments, applicants with a typical Pakistani name were significantly less likely to get a job interview compared to those with a typical Norwegian name. But the ethnic gap in call-back rates were very similar in the two experiments. Thus, Pakistanis in Norway still experienced the same level of discrimination, despite claims that Norwegians have become more positive about migrants after the far-right, anti-migrant terrorist attacks of 2011. © London School of Economics and Political Science 2018.
X-31 high angle of attack control system performance
NASA Technical Reports Server (NTRS)
Huber, Peter; Seamount, Patricia
1994-01-01
The design goals for the X-31 flight control system were: (1) level 1 handling qualities during post-stall maneuvering (30 to 70 degrees angle-of-attack); (2) thrust vectoring to enhance performance across the flight envelope; and (3) adequate pitch-down authority at high angle-of-attack. Additional performance goals are discussed. A description of the flight control system is presented, highlighting flight control system features in the pitch and roll axes and X-31 thrust vectoring characteristics. The high angle-of-attack envelope clearance approach will be described, including a brief explanation of analysis techniques and tools. Also, problems encountered during envelope expansion will be discussed. This presentation emphasizes control system solutions to problems encountered in envelope expansion. An essentially 'care free' envelope was cleared for the close-in-combat demonstrator phase. High angle-of-attack flying qualities maneuvers are currently being flown and evaluated. These results are compared with pilot opinions expressed during the close-in-combat program and with results obtained from the F-18 HARV for identical maneuvers. The status and preliminary results of these tests are discussed.
Drenckhan, I; Glöckner-Rist, A; Rist, F; Richter, J; Gloster, A T; Fehm, L; Lang, T; Alpers, G W; Hamm, A O; Fydrich, T; Kircher, T; Arolt, V; Deckert, J; Ströhle, A; Wittchen, H-U; Gerlach, A L
2015-06-01
Previous studies of the dimensional structure of panic attack symptoms have mostly identified a respiratory and a vestibular/mixed somatic dimension. Evidence for additional dimensions such as a cardiac dimension and the allocation of several of the panic attack symptom criteria is less consistent. Clarifying the dimensional structure of the panic attack symptoms should help to specify the relationship of potential risk factors like anxiety sensitivity and fear of suffocation to the experience of panic attacks and the development of panic disorder. In an outpatient multicentre study 350 panic patients with agoraphobia rated the intensity of each of the ten DSM-IV bodily symptoms during a typical panic attack. The factor structure of these data was investigated with nonlinear confirmatory factor analysis (CFA). The identified bodily symptom dimensions were related to panic cognitions, anxiety sensitivity and fear of suffocation by means of nonlinear structural equation modelling (SEM). CFA indicated a respiratory, a vestibular/mixed somatic and a cardiac dimension of the bodily symptom criteria. These three factors were differentially associated with specific panic cognitions, different anxiety sensitivity facets and suffocation fear. Taking into account the dimensional structure of panic attack symptoms may help to increase the specificity of the associations between the experience of panic attack symptoms and various panic related constructs.
A Revolutionary Attack on Tobacco: Bolshevik Antismoking Campaigns in the 1920s
2017-01-01
Using archival records of the Commissariat of Public Health, journals, and propaganda materials from the antismoking campaign of the Soviet 1920s, this article argues that the revolutionary state pursued an antitobacco policy unique in the world in its attack on tobacco use at a national scale. The commissar of public health, Nikolai Alexandrovich Semashko, attempted to severely curtail tobacco cultivation and production, limit tobacco sales, and create a public opinion against tobacco with a propaganda campaign. Even in failing in its farther-reaching goals, the policy proved one of the most forward in terms of antismoking propaganda and state-sponsored treatment regimens, with the distribution of antismoking posters, pamphlets, articles, plays, and films as well as the creation of special state-sponsored smoking-cessation programs that boasted high success rates. PMID:28933924
Application of dynamical systems theory to the high angle of attack dynamics of the F-14
NASA Technical Reports Server (NTRS)
Jahnke, Craig C.; Culick, Fred E. C.
1990-01-01
Dynamical systems theory has been used to study the nonlinear dynamics of the F-14. An eight degree of freedom model that does not include the control system present in operational F-14s has been analyzed. The aerodynamic model, supplied by NASA, includes nonlinearities as functions of the angles of attack and sideslip, the rotation rate, and the elevator deflection. A continuation method has been used to calculate the steady states of the F-14 as continuous functions of the control surface deflections. Bifurcations of these steady states have been used to predict the onset of wing rock, spiral divergence, and jump phenomena which cause the aircraft to enter a spin. A simple feedback control system was designed to eliminate the wing rock and spiral divergence instabilities. The predictions were verified with numerical simulations.
Quantum key distribution with prepare-and-measure Bell test
Tan, Yong-gang
2016-01-01
The prepare-and-measure quantum key distribution (QKD) has the merits of fast speed, high key generation rate, and easy implementation. However, the detector side channel attacks greatly undermine the security of the key bits. The eavesdropper, Eve, exploits the flaws of the detectors to obtain illegal information without violating quantum principles. It means that she can intervene in the communication without being detected. A prepare-and-measure Bell test protocol will be proposed. By randomly carrying out Bell test at the side of the information receiver, Bob, Eve’s illegal information gain within the detector side channel attack can be well bounded. This protocol does not require any improvement on the detectors used in available prepare-and-measure QKD. Though we only illustrate its application in the BB84 protocol, it is applicable for any prepare-and-measure QKD. PMID:27733771
2011-01-01
Background Malaria is a major health concern for displaced persons occupying refugee camps in sub-Saharan Africa, yet there is little information on the incidence of infection and nature of transmission in these settings. Kakuma Refugee Camp, located in a dry area of north-western Kenya, has hosted ca. 60,000 to 90,000 refugees since 1992, primarily from Sudan and Somalia. The purpose of this study was to investigate malaria prevalence and attack rate and sources of Anopheles vectors in Kakuma refugee camp, in 2005-2006, after a malaria epidemic was observed by staff at camp clinics. Methods Malaria prevalence and attack rate was estimated from cases of fever presenting to camp clinics and the hospital in August 2005, using rapid diagnostic tests and microscopy of blood smears. Larval habitats of vectors were sampled and mapped. Houses were sampled for adult vectors using the pyrethrum knockdown spray method, and mapped. Vectors were identified to species level and their infection with Plasmodium falciparum determined. Results Prevalence of febrile illness with P. falciparum was highest among the 5 to 17 year olds (62.4%) while malaria attack rate was highest among the two to 4 year olds (5.2/1,000/day). Infected individuals were spatially concentrated in three of the 11 residential zones of the camp. The indoor densities of Anopheles arabiensis, the sole malaria vector, were similar during the wet and dry seasons, but were distributed in an aggregated fashion and predominantly in the same zones where malaria attack rates were high. Larval habitats and larval populations were also concentrated in these zones. Larval habitats were man-made pits of water associated with tap-stands installed as the water delivery system to residents with year round availability in the camp. Three percent of A. arabiensis adult females were infected with P. falciparum sporozoites in the rainy season. Conclusions Malaria in Kakuma refugee camp was due mainly to infection with P. falciparum and showed a hyperendemic age-prevalence profile, in an area with otherwise low risk of malaria given prevailing climate. Transmission was sustained by A. arabiensis, whose populations were facilitated by installation of man-made water distribution and catchment systems. PMID:21639926
Relation of Temperature and Humidity to the Risk of Recurrent Gout Attacks
Neogi, Tuhina; Chen, Clara; Niu, Jingbo; Chaisson, Christine; Hunter, David J.; Choi, Hyon; Zhang, Yuqing
2014-01-01
Gout attack risk may be affected by weather (e.g., because of volume depletion). We therefore examined the association of temperature and humidity with the risk of recurrent gout attacks by conducting an internet-based case-crossover study in the United States (in 2003–2010) among subjects with a diagnosis of gout who had 1 or more attacks during 1 year of follow-up. We examined the association of temperature and humidity over the prior 48 hours with the risk of gout attacks using a time-stratified approach and conditional logistic regression. Among 632 subjects with gout, there was a significant dose-response relationship between mean temperature in the prior 48 hours and the risk of subsequent gout attack (P = 0.01 for linear trend). Higher temperatures were associated with approximately 40% higher risk of gout attack compared with moderate temperatures. There was a reverse J-shaped relationship between mean relative humidity and the risk of gout attacks (P = 0.03 for quadratic trend). The combination of high temperature and low humidity had the greatest association (odds ratio = 2.04, 95% confidence interval: 1.26, 3.30) compared with moderate temperature and relative humidity. Thus, high ambient temperature and possibly extremes of humidity were associated with an increased risk of gout attack, despite the likelihood that individuals are often in climate-controlled indoor environments. PMID:24993733
Longhurst, Hilary J; Aberer, Werner; Bouillet, Laurence; Caballero, Teresa; Fabien, Vincent; Zanichelli, Andrea; Maurer, Marcus
2015-01-01
Phase 3 icatibant trials showed that most hereditary angioedema (HAE) (C1 inhibitor deficiency) acute attacks were treated successfully with one injection of icatibant, a selective bradykinin B2 receptor antagonist. We conducted a post hoc analysis of icatibant reinjection for HAE type I and II attacks in a real-world setting by using data from the Icatibant Outcome Survey, an ongoing observational study that monitors the safety and effectiveness of icatibant treatment. Descriptive retrospective analyses of icatibant reinjection were performed on Icatibant Outcome Survey data (February 2008 to December 2012). New attacks were defined as the onset of new symptoms after full resolution of the previous attack. Potential associations between the patient and attack characteristics and reinjection were explored by using logistic regression analysis. Icatibant was administered for 652 attacks in 170 patients with HAE type I or II. Most attacks (89.1%) were treated with a single icatibant injection. For attacks that required two or three injections, the second injection was given a median of 11.0 hours after the first injection, with 90.4% of second injections administered ≥6 hours after the first injection. Time to resolution and attack duration were significantly longer for two or three injections versus one icatibant injection (p < 0.0001 and p < 0.05, respectively). Multivariate logistic regression analysis identified sex, attack severity, and laryngeal attacks as significantly correlated with reinjection (all p ≤ 0.05). These factors did not remain predictors for reinjection when two outlier patients with distinct patterns of icatibant use were excluded. In this real-world setting, most HAE attacks resolved with one icatibant injection. There was no distinct profile for patients or attacks that required reinjection when outliers with substantially different patterns of use were excluded. Because new attacks were not distinguished from the recurrence of symptoms, reinjection rates may be slightly higher than shown here. Clinical trial identifier: NCT01034969.
Zhang, J; Wang, Y F; Wu, B; Zhong, Z X; Wang, K X; Yang, L Q; Wang, Y Q; Li, Y Q; Gao, J; Li, Z S
2017-01-01
Tumor-infiltrating lymphocytes (TILs) are one of the major participants in the tumor microenvironment of pancreatic ductal adenocarcinoma (PDAC). However, the mechanism of interaction between TILs and tumors is complex and remains unclear. To evaluate the state of immunoreactions in PDAC tissues, and explore the prognostic value of these markers in a large sample, to provide a new theoretical basis for PDAC immunotherapy. Immunohistochemical staining of CD4+ and CD8+T cells was performed in a tissue microarray (TMA) of 143 cases of PDAC. Two major variables for the spatial distributions of CD4+T and CD8+T cells in PDAC tissues, intraepithelial attack and intratumoral infiltration, were used to evaluate the state of immunoreactions, and the interrelationships with the clinicopathological variables were analyzed. Our data showed that both the intraepithelial CD4+T and CD8+T attack were less frequent than the intratumoral infiltration. CD8+T intraepithelial attack and intratumoral infiltration were more intense than CD4+T. CD8+T intraepithelial attack was an independent favorable prognostic factor for overall survival, correlating negatively with vascular invasion and positively with CD4+T and CD8+T high intratumoral infiltration. CD8+T high intratumoral infiltration without CD8+T intraepithelial attack was a poor prognostic factor. CD8+T high intratumoral infiltration was accompanied by T stage progression. Conclusively, in PDAC progression, imbalances of T cells occurred in CD4+ and CD8+ immunoreactions. The CD8+T intraepithelial attack was an independent favorable prognostic indicator, however the intraepithelial attack of CD4+T and the both intratumoral infiltration of CD8+T and CD4+T played an ambiguous role. Our data suggested that it is a potential approach to increasing the number of intraepithelial attacking CD8+T cells for tumor immunotherapy, and exploring a new mechanism for immunosuppression in a tumor microenvironment with high T cell infiltration without attack. Copyright© Bentham Science Publishers; For any queries, please email at epub@benthamscience.org.
Extended analysis of the Trojan-horse attack in quantum key distribution
NASA Astrophysics Data System (ADS)
Vinay, Scott E.; Kok, Pieter
2018-04-01
The discrete-variable quantum key distribution protocols based on the 1984 protocol of Bennett and Brassard (BB84) are known to be secure against an eavesdropper, Eve, intercepting the flying qubits and performing any quantum operation on them. However, these protocols may still be vulnerable to side-channel attacks. We investigate the Trojan-horse side-channel attack where Eve sends her own state into Alice's apparatus and measures the reflected state to estimate the key. We prove that the separable coherent state is optimal for Eve among the class of multimode Gaussian attack states, even in the presence of thermal noise. We then provide a bound on the secret key rate in the case where Eve may use any separable state.
Olfactory-Triggered Panic Attacks Among Khmer Refugees: A Contextual Approach
Hinton, Devon; Pich, Vuth; Chhean, Dara; Pollack, Mark
2009-01-01
One hundred Khmer refugees attending a psychiatric clinic were surveyed to determine the prevalence of olfactory-triggered panic attacks as well as certain characteristics of the episodes, including trigger (i.e. type of odor), frequency, length, somatic symptoms, and the rate of associated flashbacks and catastrophic cognitions. Forty-five of the 100 patients had experienced an olfactory-triggered panic attack in the last month. Trauma associations and catastrophic cognitions (e.g. fears of a ‘wind attack,’ ‘weakness,’ and ‘weak heart’) were common during events of olfactory panic. Several case examples are presented. A multifactorial model of the generation of olfactory panic is adduced. The therapeutic implications of this model for the treatment of olfactory panic are discussed. PMID:15446720
NASA Astrophysics Data System (ADS)
Zhou, Jian; Guo, Ying
2017-02-01
A continuous-variable measurement-device-independent (CV-MDI) multipartite quantum communication protocol is designed to realize multipartite communication based on the GHZ state analysis using Gaussian coherent states. It can remove detector side attack as the multi-mode measurement is blindly done in a suitable Black Box. The entanglement-based CV-MDI multipartite communication scheme and the equivalent prepare-and-measurement scheme are proposed to analyze the security and guide experiment, respectively. The general eavesdropping and coherent attack are considered for the security analysis. Subsequently, all the attacks are ascribed to coherent attack against imperfect links. The asymptotic key rate of the asymmetric configuration is also derived with the numeric simulations illustrating the performance of the proposed protocol.
TANDI: threat assessment of network data and information
NASA Astrophysics Data System (ADS)
Holsopple, Jared; Yang, Shanchieh Jay; Sudit, Moises
2006-04-01
Current practice for combating cyber attacks typically use Intrusion Detection Sensors (IDSs) to passively detect and block multi-stage attacks. This work leverages Level-2 fusion that correlates IDS alerts belonging to the same attacker, and proposes a threat assessment algorithm to predict potential future attacker actions. The algorithm, TANDI, reduces the problem complexity by separating the models of the attacker's capability and opportunity, and fuse the two to determine the attacker's intent. Unlike traditional Bayesian-based approaches, which require assigning a large number of edge probabilities, the proposed Level-3 fusion procedure uses only 4 parameters. TANDI has been implemented and tested with randomly created attack sequences. The results demonstrate that TANDI predicts future attack actions accurately as long as the attack is not part of a coordinated attack and contains no insider threats. In the presence of abnormal attack events, TANDI will alarm the network analyst for further analysis. The attempt to evaluate a threat assessment algorithm via simulation is the first in the literature, and shall open up a new avenue in the area of high level fusion.
Charre, Caroline; Ramière, Christophe; Roque-Afonso, Anne-Marie; Chidiac, Christian; Zoulim, Fabien; Godinot, Matthieu; Koffi, Joseph; Scholtès, Caroline; Livrozet, Jean-Michel; Hav Lyon Study Group; Cotte, Laurent
2017-11-01
Since 2016, an increase in the number of hepatitis A cases affecting mainly men who have sex with men (MSM) has been reported in low endemic countries in Europe. We calculated the attack rate in Lyon, France, in populations considered at high-risk: HIV-infected MSM and HIV-negative MSM receiving HIV pre-exposure prophylaxis (PrEP). In these populations, high level of immunity did not prevent the outbreak, indicating that vaccination should be reinforced, particularly in younger individuals.
Charre, Caroline; Ramière, Christophe; Roque-Afonso, Anne-Marie; Chidiac, Christian; Zoulim, Fabien; Godinot, Matthieu; Koffi, Joseph; Scholtès, Caroline; Livrozet, Jean-Michel; Cotte, Laurent
2017-01-01
Since 2016, an increase in the number of hepatitis A cases affecting mainly men who have sex with men (MSM) has been reported in low endemic countries in Europe. We calculated the attack rate in Lyon, France, in populations considered at high-risk: HIV-infected MSM and HIV-negative MSM receiving HIV pre-exposure prophylaxis (PrEP). In these populations, high level of immunity did not prevent the outbreak, indicating that vaccination should be reinforced, particularly in younger individuals. PMID:29208161
The radiation of sound from a propeller at angle of attack
NASA Technical Reports Server (NTRS)
Mani, Ramani
1990-01-01
The mechanism by which the noise generated at the blade passing frequency by a propeller is altered when the propeller axis is at an angle of attack to the freestream is examined. The measured noise field is distinctly non axially symmetric under such conditions with far field sound pressure levels both diminished and increased relative to the axially symmetric values produced with the propeller at zero angle of attack. Attempts have been made to explain this non axially symmetric sound field based on the unsteady (once per rev) loading experienced by the propeller blades when the propeller axis is at non zero angle of attack. A calculation based on this notion appears to greatly underestimate the measured azimuthal asymmetry of noise for high tip speed, highly loaded propellers. A new mechanism is proposed; namely, that at angle of attack, there is a non axially symmetric modulation of the radiative efficiency of the steady loading and thickness noise which is the primary cause of the non axially symmetric sound field at angle of attack for high tip speed, heavily loaded propellers with a large number of blades. A calculation of this effect to first order in the crossflow Mach number (component of freestream Mach number normal to the propeller axis) is carried out and shows much better agreement with measured noise data on the angle of attack effect.
Caballero, Teresa; Zanichelli, Andrea; Aberer, Werner; Maurer, Marcus; Longhurst, Hilary J; Bouillet, Laurence; Andresen, Irmgard
2018-01-01
Icatibant is a bradykinin B2-receptor antagonist used for the treatment of hereditary angioedema attacks resulting from C1-inhibitor deficiency. Treatment is not adjusted by body weight however the impact of body mass index (BMI) on the effectiveness of icatibant is not documented in the literature. We examined disease characteristics and icatibant treatment effectiveness in patients stratified by BMI in the Icatibant Outcome Survey, an ongoing, international, observational study monitoring the real-world safety and effectiveness of icatibant. Attack and treatment characteristics as well as outcomes following treatment with icatibant were compared among patients with underweight, normal, overweight, and obese BMI. Data from 2697 icatibant-treated attacks in 342 patients (3.5, 44.7, 34.8, and 17.0% patients of underweight, normal, overweight, and obese BMI, respectively) were analyzed. There was no significant difference in the frequency and severity of attacks across BMI groups, although obese patients tended to have more attacks of high severity. There was no impact of BMI on the frequency of laryngeal attacks, but patients with normal BMI had fewer cutaneous attacks and more abdominal attacks. Most attacks (71.9-83.8%) were treated with a single icatibant injection without the need for rescue with plasma-derived C1-inhibitor (pdC1-INH), regardless of BMI. Patients with obese BMI used pdC1-INH as rescue treatment more often (P < 0.0001; P = 0.0232 excluding 2 outliers) and treated attacks earlier than patients with normal BMI (P = 0.007). Furthermore, time to resolution and duration of attack were shorter for patients with high BMI (P < 0.001 for overweight and P < 0.05 for obese versus normal). Overall, icatibant was comparatively effective in treating attacks in patients across all BMI groups. Trial registration NCT01034969.
Attitude determination with three-axis accelerometer for emergency atmospheric entry
NASA Technical Reports Server (NTRS)
Garcia-Llama, Eduardo (Inventor)
2012-01-01
Two algorithms are disclosed that, with the use of a 3-axis accelerometer, will be able to determine the angles of attack, sideslip and roll of a capsule-type spacecraft prior to entry (at very high altitudes, where the atmospheric density is still very low) and during entry. The invention relates to emergency situations in which no reliable attitude and attitude rate are available. Provided that the spacecraft would not attempt a guided entry without reliable attitude information, the objective of the entry system in such case would be to attempt a safe ballistic entry. A ballistic entry requires three controlled phases to be executed in sequence: First, cancel initial rates in case the spacecraft is tumbling; second, maneuver the capsule to a heat-shield-forward attitude, preferably to the trim attitude, to counteract the heat rate and heat load build up; and third, impart a ballistic bank or roll rate to null the average lift vector in order to prevent prolonged lift down situations. Being able to know the attitude, hence the attitude rate, will allow the control system (nominal or backup, automatic or manual) to cancel any initial angular rates. Also, since a heat-shield forward attitude and the trim attitude can be specified in terms of the angles of attack and sideslip, being able to determine the current attitude in terms of these angles will allow the control system to maneuver the vehicle to the desired attitude. Finally, being able to determine the roll angle will allow for the control of the roll ballistic rate during entry.
Yılmaz, Nigar; Yılmaz, Mustafa; Sirin, Burcu; Yılmaztekin, Sureyya; Kutlu, Gülnihal
2017-10-01
Migraine is one of the most common types of pain associated with sterile inflammatory conditions. Soluble urokinase plasminogen activator receptor (suPAR) is a potential novel inflammatory marker. We aim to determine the association between serum values of suPAR, procalcitonin, fibrinogen, and high-sensitivity C-reactive protein (hs-CRP) and migraine disease characteristics. The study involved a total of 60 migraine patients (33 patients in the interictal period, 27 patients in the attack period) and 30 healthy individuals. The serum values of suPAR were found to be significantly higher in migraine patients in the attack period than in migraine patients in the interictal period, and in healthy individuals (p < .01 for both). In addition, levels of suPAR were determined to be higher in migraine with aura patients than in migraine without aura patients. When we subdivided migraine patients according to frequency of attack (attacks/month), significant differences were found between the suPAR and procalcitonin levels (measured during the attack period) of those in the frequent-attack group (4-5 or more) versus those in the less frequent attack group (less than 4). Serum levels of procalcitonin were shown to be significantly higher in migraine patients during the attack period compared with migraine patients in the interictal period and in control subjects (p = .001 for both). Significant differences were found between plasma levels of fibrinogen in migraine patients versus control subjects (p < .01). No statistically significant difference was found between levels of hs-CRP in migraine patients versus the control group. These findings may show that presenting a high level of suPAR in migraine patients with attack and aura results to predisposition to occurring on the symptoms and that high levels of suPAR, procalcitonin and fibrinogen in patients with migraine result in neurogenic inflammation during migraine headaches.
NASA Astrophysics Data System (ADS)
Liu, Peng
High temperature hydrogen attack (HTHA) is a form of surface decarburization, internal decarburization, and/or intergranular cracking in steels exposed to high temperature (>400°F) and high hydrogen pressure. Hydrogen attack is an irreversible process which can cause permanent damage resulting in degradation of mechanical properties and failures such as leakage, bursting, fire, and/or explosion. The continuous progression of hydrogen attack in C-0.5Mo steel and weldments below the C-0.5Mo Nelson Curve has caused a significant concern for the integrity and serviceability of C-0.5Mo steel utilized for pressure vessels and piping in the petroleum refinery and petrochemical industries. A state-of-the-art literature review was implemented to provide a comprehensive overview of the published research efforts on hydrogen attack studies. The evolution of "Nelson Curves" for carbon steel, C-0.5Mo, and Cr-Mo steels was historically reviewed in regard to design applications and limitations. Testing techniques for hydrogen attack assessment were summarized under the categories of hydrogen exposure testing, mechanical evaluation, and dilatometric swelling testing. In accord with the demands of these industries, fundamental studies of hydrogen attack in C-0.5Mo steel and weldments were accomplished in terms of quantitative methodologies for hydrogen damage evaluation; hydrogen damage assessment of service exposed weldments and autoclave exposed materials; effects of carbon and alloying elements, heat treatments, hot and cold working, welding processes and postweld heat treatment (PWHT) on hydrogen attack susceptibility; development of continuous cooling transformation (CCT) diagrams for C-0.5Mo base metals and the coarse grained heat-affected zone (CGHAZ); carbide evaluation for the C-0.5Mo steel after service exposure and heat treatment; methane evolution by the reaction of hydrogen and carbides; hydrogen diffusion and methane pressure through the wall thickness of one-sided hydrogen exposure assembly; hydrogen attack mechanism and hydrogen attack limit modeling.
Lupkovics, Géza; Motyovszki, Akos; Németh, Zoltán; Takács, István; Kenéz, András; Burkali, Bernadett; Menyhárt, Ildikó
2010-04-04
Morbidity and mortality rates of acute heart attack emphasize the significance of this patient group worldwide. The prompt and exact diagnosis and the timing of adequate therapy is crucial for this patients. Modern supply of acute heart attack includes invasive cardiology intervention, primer percutaneous coronary intervention. In year 1999, American and European recommendations suggested primer percutaneous coronary intervention only as an alternative possibility instead of thrombolysis, or in case of cardiogenic shock. 24 hour intervention unit for patients with acute heart attack was first organized in Hungary in Zala County Hospital's Cardiology Department, in year 1998. Our present study confirms, that since the intervention treatment has been introduced, average mortality rate has been reduced considerably in our area comparing to the national average. Mortality rates in West Transdanubian region and in Zalaegerszeg's micro-region were studied and compared for the period between 1997-2004, according to the data of National Public Health and Medical Officer Service. These data were then compared with the national average mortality data of Hungarian Central Statistical Office. With the help of our own computerized database we examined this period and compared the number of the completed invasive interventions to the mortality statistics. In the first full year, in 1998, we completed 82 primer and 283 elective PCIs; these number increased to 318 and 1265 by year 2005. At the same time, significant decrease of acute infarction related mortality was detectable among men of the Zalaegerszeg micro-region, comparing to the national average (p<0.001). The first Hungarian 24 hour acute heart attack intervention care improved the area's mortality statistics significantly, comparing to the national average. The skilled work of the experienced team means an important advantage to the patients in Zalaegerszeg micro-region.
Terrorism, Governance, and Development
2016-01-13
Changes in unemployment are not positively correlated with changes in insurgent attacks in several important conflicts. Data from Afghanistan, Iraq...and the Philippines show no significant relationship between unemployment and the rate of insurgent attacks that kill civilians (Berman, et al...is that gainfully employed young men are less likely to participate in political violence, implying a positive correlation between unemployment and
Free-Flight Evaluation of Forebody Blowing for Yaw Control at High Angels of Attack
NASA Technical Reports Server (NTRS)
Kiddy, Jason
1995-01-01
Forebody blowing is a concept developed to provide yaw control for aircraft flying at high angles of attack where a conventional rudder becomes ineffective. The basic concept is fairly simple. A small jet of air is forced out of the nose of the aircraft. This jet causes a repositioning of the forebody vortices in an asymmetrical fashion. The asymmetric forebody vortex flows develop a side force on the forebody which results in substantial yawing moments at high angles of attack. The purpose of this project was to demonstrate the use of forebody blowing as a control device through free-flight evaluation. This unique type of testing was performed at the NASA-Langley 30- by 60-foot tunnel. From these tests, it could then be shown that forebody blowing is an effective method of maintaining yaw control at high angles of attack.
The Aerodynamics of Axisymmetric Blunt Bodies Flying at Angle of Attack
NASA Technical Reports Server (NTRS)
Schoenenberger, Mark; Kutty, Prasad; Queen, Eric; Karlgaard, Chris
2014-01-01
The Mars Science Laboratory entry capsule is used as an example to demonstrate how a blunt body of revolution must be treated as asymmetric in some respects when flying at a non-zero trim angle of attack. A brief description of the axisymmetric moment equations are provided before solving a system of equations describing the lateral-directional moment equations for a blunt body trimming at an angle of attack. Simplifying assumptions are made which allow the solution to the equations to be rearranged to relate the roll and yaw stability with sideslip angle to the frequency of oscillation of the vehicle body rates. The equations show that for a blunt body the roll and yaw rates are in phase and proportional to each other. The ratio of the rates is determined by the static stability coefficients and mass properties about those axes. A trajectory simulation is used to validate the static yaw stability parameter identification equation and a simple method of identifying the oscillation frequency from the body rates. The approach is shown to successfully extract the modeled yaw stability coefficient along a simulated Mars entry in agreement with data earlier analysis of MSL flight data.
A Comparative Study of Anomaly Detection Techniques for Smart City Wireless Sensor Networks.
Garcia-Font, Victor; Garrigues, Carles; Rifà-Pous, Helena
2016-06-13
In many countries around the world, smart cities are becoming a reality. These cities contribute to improving citizens' quality of life by providing services that are normally based on data extracted from wireless sensor networks (WSN) and other elements of the Internet of Things. Additionally, public administration uses these smart city data to increase its efficiency, to reduce costs and to provide additional services. However, the information received at smart city data centers is not always accurate, because WSNs are sometimes prone to error and are exposed to physical and computer attacks. In this article, we use real data from the smart city of Barcelona to simulate WSNs and implement typical attacks. Then, we compare frequently used anomaly detection techniques to disclose these attacks. We evaluate the algorithms under different requirements on the available network status information. As a result of this study, we conclude that one-class Support Vector Machines is the most appropriate technique. We achieve a true positive rate at least 56% higher than the rates achieved with the other compared techniques in a scenario with a maximum false positive rate of 5% and a 26% higher in a scenario with a false positive rate of 15%.
A Comparative Study of Anomaly Detection Techniques for Smart City Wireless Sensor Networks
Garcia-Font, Victor; Garrigues, Carles; Rifà-Pous, Helena
2016-01-01
In many countries around the world, smart cities are becoming a reality. These cities contribute to improving citizens’ quality of life by providing services that are normally based on data extracted from wireless sensor networks (WSN) and other elements of the Internet of Things. Additionally, public administration uses these smart city data to increase its efficiency, to reduce costs and to provide additional services. However, the information received at smart city data centers is not always accurate, because WSNs are sometimes prone to error and are exposed to physical and computer attacks. In this article, we use real data from the smart city of Barcelona to simulate WSNs and implement typical attacks. Then, we compare frequently used anomaly detection techniques to disclose these attacks. We evaluate the algorithms under different requirements on the available network status information. As a result of this study, we conclude that one-class Support Vector Machines is the most appropriate technique. We achieve a true positive rate at least 56% higher than the rates achieved with the other compared techniques in a scenario with a maximum false positive rate of 5% and a 26% higher in a scenario with a false positive rate of 15%. PMID:27304957
Shang, Jianyu; Deng, Zhihong; Fu, Mengyin; Wang, Shunting
2016-06-16
Traditional artillery guidance can significantly improve the attack accuracy and overall combat efficiency of projectiles, which makes it more adaptable to the information warfare of the future. Obviously, the accurate measurement of artillery spin rate, which has long been regarded as a daunting task, is the basis of precise guidance and control. Magnetoresistive (MR) sensors can be applied to spin rate measurement, especially in the high-spin and high-g projectile launch environment. In this paper, based on the theory of a MR sensor measuring spin rate, the mathematical relationship model between the frequency of MR sensor output and projectile spin rate was established through a fundamental derivation. By analyzing the characteristics of MR sensor output whose frequency varies with time, this paper proposed the Chirp z-Transform (CZT) time-frequency (TF) domain analysis method based on the rolling window of a Blackman window function (BCZT) which can accurately extract the projectile spin rate. To put it into practice, BCZT was applied to measure the spin rate of 155 mm artillery projectile. After extracting the spin rate, the impact that launch rotational angular velocity and aspect angle have on the extraction accuracy of the spin rate was analyzed. Simulation results show that the BCZT TF domain analysis method can effectively and accurately measure the projectile spin rate, especially in a high-spin and high-g projectile launch environment.
Describing a multitrophic plant-herbivore-parasitoid system at four spatial scales
NASA Astrophysics Data System (ADS)
Cuautle, M.; Parra-Tabla, V.
2014-02-01
Herbivore-parasitoid interactions must be studied using a multitrophic and multispecies approach. The strength and direction of multiple effects through trophic levels may change across spatial scales. In this work, we use the herbaceous plant Ruellia nudiflora, its moth herbivore Tripudia quadrifera, and several parasitoid morphospecies that feed on the herbivore to answer the following questions: Do herbivore and parasitoid attack levels vary depending on the spatial scale considered? With which plant characteristics are the parasitoid and the herbivore associated? Do parasitoid morphospecies vary in the magnitude of their positive indirect effect on plant reproduction? We evaluated three approximations of herbivore and parasitoid abundance (raw numbers, ratios, and attack rates) at four spatial scales: regional (three different regions which differ in terms of abiotic and biotic characteristics); population (i.e. four populations within each region); patch (four 1 m2 plots in each population); and plant level (using a number of plant characteristics). Finally, we determined whether parasitoids have a positive indirect effect on plant reproductive success (seed number). Herbivore and parasitoid numbers differed at three of the spatial scales considered. However, herbivore/fruit ratio and attack rates did not differ at the population level. Parasitoid/host ratio and attack rates did not differ at any scale, although there was a tendency of a higher attack in one region. At the plant level, herbivore and parasitoid abundances were related to different plant traits, varying the importance and the direction (positive or negative) of those traits. In addition, only one parasitoid species (Bracon sp.) had a positive effect on plant fitness saving up to 20% of the seeds in a fruit. These results underline the importance of knowing the scales that are relevant to organisms at different trophic levels and distinguish between the specific effects of species.
Drinking Water: Experts’ Views on How Future Federal Funding Can Best Be Spent to Improve Security
2003-10-01
training to support, among other things, simulation exercises to provide responders with experience in carrying out emergency response plans; specialized...attack. These activities include, among other things, support for simulation exercises to provide responders with experience in carrying out utilities...conducting regional simulation exercises to test emergency response plans, with more than 88 percent (38 of 43) rating this as a high or highest
Fothergill, Rachael T; Watson, Lynne R; Virdi, Gurkamal K; Moore, Fionna P; Whitbread, Mark
2014-01-01
This study reports survival outcomes for patients resuscitated from out-of-hospital cardiac arrest (OHCA) subsequent to ST-elevation myocardial infarction (STEMI), and who were conveyed directly by ambulance clinicians to a specialist Heart Attack Centre for expert cardiology assessment, angiography and possible percutaneous coronary intervention (PCI). This is a retrospective descriptive review of data sourced from the London Ambulance Service's OHCA registry over a one-year period. We observed excellent survival rates for our cohort of patients with 66% of patients surviving to be discharged from hospital, the majority of whom were still alive after one year. Those who survived tended to be younger, to have had a witnessed arrest in a public place with an initial cardiac rhythm of VF/VT, and to have been transported to the specialist centre more quickly than those who did not. A system allowing ambulance clinicians to autonomously convey OHCA STEMI patients who achieve a return of spontaneous circulation directly to a Heart Attack Centre is highly effective and yields excellent survival outcomes. Copyright © 2013 Elsevier Ireland Ltd. All rights reserved.
NASA Technical Reports Server (NTRS)
Helms, V. T., III; Bradley, P. F.
1984-01-01
Results are presented for oil flow and phase change paint heat transfer tests conducted on a 0.006 scale model of a proposed single stage to orbit control configured vehicle. The data were taken at angles of attack up to 40 deg at a free stream Mach number of 10 for Reynolds numbers based on model length of 0.5 x 10 to the 6th power, 1.0 x 10 to the 6th power and 2.0 x 10 to the 6th power. The magnitude and distribution of heating are characterized in terms of angle of attack and Reynolds number aided by an analysis of the flow data which are used to suggest the presence of various three dimensional flow structures that produce the observed heating patterns. Of particular interest are streak heating patterns that result in high localized heat transfer rates on the wing windward surface at low to moderate angles of attack. These streaks are caused by the bow-shock/wing-shock interaction and formation of the wing-shock. Embedded vorticity was found to be associated with these interactions.
Fuel clad chemical interactions in fast reactor MOX fuels
NASA Astrophysics Data System (ADS)
Viswanathan, R.
2014-01-01
Clad corrosion being one of the factors limiting the life of a mixed-oxide fast reactor fuel element pin at high burn-up, some aspects known about the key elements (oxygen, cesium, tellurium, iodine) in the clad-attack are discussed and many Fuel-Clad-Chemical-Interaction (FCCI) models available in the literature are also discussed. Based on its relatively superior predictive ability, the HEDL (Hanford Engineering Development Laboratory) relation is recommended: d/μm = ({0.507 ṡ [B/(at.% fission)] ṡ (T/K-705) ṡ [(O/M)i-1.935]} + 20.5) for (O/M)i ⩽ 1.98. A new model is proposed for (O/M)i ⩾ 1.98: d/μm = [B/(at.% fission)] ṡ (T/K-800)0.5 ṡ [(O/M)i-1.94] ṡ [P/(W cm-1)]0.5. Here, d is the maximum depth of clad attack, B is the burn-up, T is the clad inner surface temperature, (O/M)i is the initial oxygen-to-(uranium + plutonium) ratio, and P is the linear power rating. For fuels with [n(Pu)/n(M = U + Pu)] > 0.25, multiplication factors f are recommended to consider the potential increase in the depth of clad-attack.
Aversive imagery in panic disorder: agoraphobia severity, comorbidity, and defensive physiology.
McTeague, Lisa M; Lang, Peter J; Laplante, Marie-Claude; Bradley, Margaret M
2011-09-01
Panic is characterized as a disorder of interoceptive physiologic hyperarousal, secondary to persistent anticipation of panic attacks. The novel aim of this research was to investigate whether severity of agoraphobia within panic disorder covaries with the intensity of physiological reactions to imagery of panic attacks and other aversive scenarios. A community sample of principal panic disorder (n = 112; 41 without agoraphobia, 71 with agoraphobia) and control (n = 76) participants imagined threatening and neutral events while acoustic startle probes were presented and the eye-blink response (orbicularis oculi) recorded. Changes in heart rate, skin conductance level, and facial expressivity were also measured. Overall, panic disorder patients exceeded control participants in startle reflex and heart rate during imagery of standard panic attack scenarios, concordant with more extreme ratings of aversion and emotional arousal. Accounting for the presence of agoraphobia revealed that both panic disorder with and without situational apprehension showed the pronounced heart rate increases during standard panic attack imagery observed for the sample as a whole. In contrast, startle potentiation to aversive imagery was more robust in those without versus with agoraphobia. Reflex diminution was most dramatic in those with the most pervasive agoraphobia, coincident with the most extreme levels of comorbid broad negative affectivity, disorder chronicity, and functional impairment. Principal panic disorder may represent initial, heightened interoceptive fearfulness and concomitant defensive hyperactivity, which through progressive generalization of anticipatory anxiety ultimately transitions to a disorder of pervasive agoraphobic apprehension and avoidance, broad dysphoria, and compromised mobilization for defensive action. Copyright © 2011 Society of Biological Psychiatry. Published by Elsevier Inc. All rights reserved.
Aversive imagery in panic disorder: Agoraphobia severity, comorbidity and defensive physiology
McTeague, Lisa M.; Lang, Peter J.; Laplante, Marie-Claude; Bradley, Margaret M.
2011-01-01
Background Panic is characterized as a disorder of interoceptive physiological hyperarousal, secondary to persistent anticipation of panic attacks. The novel aim of the present research was to investigate whether severity of agoraphobia within panic disorder covaries with the intensity of physiological reactions to imagery of panic attacks and other aversive scenarios. Methods A community sample of principal panic disorder (n=112; 41 without agoraphobia, 71 with agoraphobia) and control (n=76) participants imagined threatening and neutral events while acoustic startle probes were presented and the eye-blink response (orbicularis oculi) recorded. Changes in heart rate, skin conductance level, and facial expressivity were also measured. Results Overall panic disorder patients exceeded controls in startle reflex and heart rate during imagery of standard panic attack scenarios, concordant with more extreme ratings of aversion and emotional arousal. Accounting for the presence of agoraphobia revealed that both panic disorder with and without situational apprehension showed the pronounced heart rate increases during standard panic attack imagery observed for the sample as a whole. In contrast, startle potentiation to aversive imagery was more robust in those without versus with agoraphobia. Reflex diminution was most dramatic in those with the most pervasive agoraphobia, coincident with the most extreme levels of comorbid broad negative affectivity, disorder chronicity, and functional impairment. Conclusions Principal panic disorder may represent initial, heightened interoceptive fearfulness and concomitant defensive hyperactivity, which through progressive generalization of anticipatory anxiety, ultimately transitions to a disorder of pervasive agoraphobic apprehension and avoidance, broad dysphoria and compromised mobilization for defensive action. PMID:21550590
NASA Astrophysics Data System (ADS)
Yamaguchi, Keisuke; Ueda, Takao; Nanasawa, Akira
As a new rehabilitation technique for recovery both of loading ability and durability of concrete structures deteriorated by chloride attack, desalination (electrochemical chloride removal technique from concrete) using CFRP composite electrode bonding to concrete has been developed. In this study, basic application was tried using small RC specimens, and also application to the large-scale RC beams deteriorated by the chloride attack through the long-term exposure in the outdoors was investigated. As the result of bending test of treated specimens, the decrease of strengthening effect with the electrochemical treatment was observed in the case of small specimens using low absorption rate resin for bonding, on the other hand, in the case of large-scale RC beam using 20% absorption rate resin for bonding CFRP composite electrode, enough strengthening effect was obtained by the bending failure of RC beam with the fracture of CFRP board.
Experimental quantum key distribution with finite-key security analysis for noisy channels.
Bacco, Davide; Canale, Matteo; Laurenti, Nicola; Vallone, Giuseppe; Villoresi, Paolo
2013-01-01
In quantum key distribution implementations, each session is typically chosen long enough so that the secret key rate approaches its asymptotic limit. However, this choice may be constrained by the physical scenario, as in the perspective use with satellites, where the passage of one terminal over the other is restricted to a few minutes. Here we demonstrate experimentally the extraction of secure keys leveraging an optimal design of the prepare-and-measure scheme, according to recent finite-key theoretical tight bounds. The experiment is performed in different channel conditions, and assuming two distinct attack models: individual attacks or general quantum attacks. The request on the number of exchanged qubits is then obtained as a function of the key size and of the ambient quantum bit error rate. The results indicate that viable conditions for effective symmetric, and even one-time-pad, cryptography are achievable.
Impingement of Water Droplets on NACA 65A004 Airfoil at 8 deg Angle of Attack
NASA Technical Reports Server (NTRS)
Brun, R. J.; Gallagher, H. M.; Vogt, D. E.
1954-01-01
The trajectories of droplets in the air flowing past an NACA 65AO04 airfoil at an angle of attack of 8 deg were determined.. The amount of water in droplet form impinging on the airfoil, the area of droplet impingement, and the rate of droplet impingement per unit area on the airfoil surface were calculated from the trajectories and presented to cover a large range of flight and atmospheric conditions. These impingement characteristics are compared briefly with those previously reported for the same airfoil at an angle of attack of 4 deg.
NASA Technical Reports Server (NTRS)
Houser, J.; Johnson, L. J.; Oiye, M.; Runciman, W.
1972-01-01
Experimental aerodynamic investigations were made in a transonic wind tunnel on a 1/150-scale model of the Boeing H-32 space shuttle booster configuration. The purpose of the test was: (1) to verify the transonic reentry corridor at high angles of attack; (2) to determine the transonic aerodynamic characteristics; and (3) to determine the subsonic aerodynamic characteristics at low angles of attack. Test variables included configuration buildup, horizontal stabilizer settings of 0 and -20 deg, elevator deflections of 0 and -30 deg, and wing spoiler settings of 60 deg.
Piller, Linda B.; Baraniuk, Sarah; Simpson, Lara M.; Cushman, William C.; Massie, Barry M.; Einhorn, Paula T.; Oparil, Suzanne; Ford, Charles E.; Graumlich, James F.; Dart, Richard A.; Parish, David C.; Retta, Tamrat M.; Cuyjet, Aloysius B.; Jafri, Syed Z.; Furberg, Curt D.; Saklayen, Mohammad G.; Thadani, Udho; Probstfield, Jeffrey L.; Davis, Barry R.
2011-01-01
Background In the Antihypertensive and Lipid-Lowering Treatment to Prevent Heart Attack Trial (ALLHAT), a randomized, double-blind, practice-based, active-control, comparative effectiveness trial in high-risk hypertensive participants, risk of new-onset heart failure (HF) was higher in the amlodipine (2.5-10 mg/day) and lisinopril (10-40 mg/day) arms compared with the chlorthalidone (12.5-25 mg/day) arm . Similar to other studies, mortality rates following new-onset HF were very high (≥50% at 5 years), and were similar across randomized treatment arms. After the randomized phase of the trial ended in 2002, outcomes were determined from administrative databases. Methods and Results Using national databases, post-trial follow-up mortality through 2006 was obtained on participants who developed new-onset HF during the randomized (in-trial) phase of ALLHAT. Mean follow-up for the entire period was 8.9 years. Of 1761 participants with incident HF in-trial, 1348 died. Post-HF all-cause mortality was similar across treatment groups with adjusted hazard ratios (95% confidence intervals) of 0.95 (0.81-1.12) and 1.05 (0.89-1.25), respectively, for amlodipine and lisinopril compared with chlorthalidone, and 10-year adjusted rates of 86%, 87%, and 83%, respectively. All-cause mortality rates were also similar among those with reduced ejection fractions (84%) and preserved ejection fractions (81%) with no significant differences by randomized treatment arm. Conclusions Once HF develops, risk of death is high and consistent across randomized treatment groups. Measures to prevent the development of HF, especially blood pressure control, must be a priority if mortality associated with development of HF is to be addressed. PMID:21969009
DOE Office of Scientific and Technical Information (OSTI.GOV)
Li, Hong-Wei; Zhengzhou Information Science and Technology Institute, Zhengzhou, 450004; Wang, Shuang
2011-12-15
It is well known that the unconditional security of quantum-key distribution (QKD) can be guaranteed by quantum mechanics. However, practical QKD systems have some imperfections, which can be controlled by the eavesdropper to attack the secret key. With current experimental technology, a realistic beam splitter, made by fused biconical technology, has a wavelength-dependent property. Based on this fatal security loophole, we propose a wavelength-dependent attacking protocol, which can be applied to all practical QKD systems with passive state modulation. Moreover, we experimentally attack a practical polarization encoding QKD system to obtain all the secret key information at the cost ofmore » only increasing the quantum bit error rate from 1.3 to 1.4%.« less
A numerical analysis of the British Experimental Rotor Program blade
NASA Technical Reports Server (NTRS)
Duque, Earl P. N.
1989-01-01
Two Computational Fluid Dynamic codes which solve the compressible full-potential and the Reynolds-Averaged Thin-Layer Navier-Stokes equations were used to analyze the nonrotating aerodynamic characteristics of the British Experimental Rotor Program (BERP) helicopter blade at three flow regimes: low angle of attack, high angle of attack and transonic. Excellent agreement was found between the numerical results and experiment. In the low angle of attack regime, the BERP had less induced drag than a comparable aspect ratio rectangular planform wing. At high angle of attack, the blade attained high-lift by maintaining attached flow at the outermost spanwise locations. In the transonic regime, the BERP design reduces the shock strength at the outer spanwise locations which affects wave drag and shock-induced separation. Overall, the BERP blade exhibited many favorable aerodynamic characteristics in comparison to conventional helicopter rotor blades.
Application of variable-gain output feedback for high-alpha control
NASA Technical Reports Server (NTRS)
Ostroff, Aaron J.
1990-01-01
A variable-gain, optimal, discrete, output feedback design approach that is applied to a nonlinear flight regime is described. The flight regime covers a wide angle-of-attack range that includes stall and post stall. The paper includes brief descriptions of the variable-gain formulation, the discrete-control structure and flight equations used to apply the design approach, and the high performance airplane model used in the application. Both linear and nonlinear analysis are shown for a longitudinal four-model design case with angles of attack of 5, 15, 35, and 60 deg. Linear and nonlinear simulations are compared for a single-point longitudinal design at 60 deg angle of attack. Nonlinear simulations for the four-model, multi-mode, variable-gain design include a longitudinal pitch-up and pitch-down maneuver and high angle-of-attack regulation during a lateral maneuver.
NASA Astrophysics Data System (ADS)
Devipriya, K.; Ivy, B. Persis Urbana; Prabha, D.
2018-04-01
A mobile ad hoc network (MANET) is an assemblage of nodes composed of mobile devices coupled in various ways wirelessly which do not have any central administration. Each node in MANET cooperates in forwarding packets in the network. This type of collaboration incurs high cost but there exits nodes that declines to cooperate leading to selfish conduct of nodes which effects overall network performance. To discover the attacks caused by such nodes, a renowned mechanism using watchdog can be deployed. In infrastructure less network attack detection and reaction and high false positives, false negatives initiating black hole attack becomes major issue in watchdog. This paper put forward a collaborative approach for identifying such attacks in MANET. Through abstract analysis and extensive simulation of this approach, the detection time of misbehaved nodes is reduced and substantial enhancement in overhead and throughput is witnessed.
Action mechanism of tyrosinase on meta- and para-hydroxylated monophenols.
Fenoll, L G; Rodríguez-López, J N; Varón, R; García-Ruiz, P A; García-Cánovas, F; Tudela, J
2000-04-01
The relationship between the structure and activity of meta- and para-hydroxylated monophenols was studied during their tyrosinase-catalysed hydroxylation and the rate-limiting steps of the reaction mechanism were identified. The para-hydroxylated substrates permit us to study the effect of a substituent (R) in the carbon-1 position (C-1) of the benzene ring on the nucleophilic attack step, while the meta group permits a similar study of the effect on the electrophilic attack step. Substrates with a -OCH3 group on C-1, as p-hydroxyanisol (4HA) and m-hydroxyanisol (3HA), or with a -CH2OH group, as p-hydroxybenzylalcohol (4HBA) and m-hydroxybenzylalcohol (3HBA), were used because the effect of the substituent (R) size was assumed to be similar. However, the electron-donating effect of the -OCH3 group means that the carbon-4 position (C-4) is favoured for nucleophilic attack (para-hydroxylated substrates) or for electrophilic attack (meta-hydroxylated substrates). The electron-attracting effect of the -CH2OH group has the opposite effect, hindering nucleophilic (para) or electrophilic (meta) attack of C-4. The experimental data point to differences between the maximum steady-state rate (V(M)Max) of the different substrates, the value of this parameter depends on the nucleophilic and electrophilic attack. However, differences are greatest in the Michaelis constants (K(M)m), with the meta-hydroxylated substrates having very large values. The catalytic efficiency k(M)cat/K(M)m is much greater for thepara-hydroxylated substrates although it varies greatly between one substrate and the other. However, it varies much less in the meta-hydroxylated substrates since this parameter describes the power of the nucleophilic attack, which is weaker in the meta OH. The large increase in the K(M)m of the meta-hydroxylated substrates might suggest that the phenolic OH takes part in substrate binding. Since this is a weaker nucleophil than the para-hydroxylated substrates, the binding constant decreases, leading to an increase in K(M)m. The catalytic efficiency of tyrosinase on a monophenol (para or meta) is directly related to the nucleophilic power of the oxygen of the phenolic OH. The oxidation step is not limiting since if this were the case, the para and meta substrates would have the same V(M)max. The small difference between the absolute values of V(M)max suggests that the rate constants of the nucleophilic and electrophilic attacks are on the same order of magnitude.
Regression methods for spatially correlated data: an example using beetle attacks in a seed orchard
Preisler Haiganoush; Nancy G. Rappaport; David L. Wood
1997-01-01
We present a statistical procedure for studying the simultaneous effects of observed covariates and unmeasured spatial variables on responses of interest. The procedure uses regression type analyses that can be used with existing statistical software packages. An example using the rate of twig beetle attacks on Douglas-fir trees in a seed orchard illustrates the...
Aircrew Training Devices: Fidelity Features.
1981-01-01
providing artificial cues for glideslope and lineup . He found that an adaptive strategy for using augmenting cues, where the presence or absence of the...with continuously available sources of augmented information for lineup and glideslope in the simulatot, they performed more poorly on test trials...flown: fighting wing, barrel roll attack, sequential attack, free engagement, aileron roll and loop. Results indicated higher ratings of realism for
ERIC Educational Resources Information Center
Wise, Meg
Heart attacks are the leading cause of death in the United States, and cardiac rehabilitation, a form of post-MI (myocardial infarction) education, accounts for at most 20% of improved lifestyle behavior that can effectively manage symptoms, delay or prevent subsequent attacks, and lower mortality and morbidity rates. In an attempt to improve…
Ghigo, Giovanni; Causà, Mauro; Maranzana, Andrea; Tonachini, Glauco
2006-12-14
The viability of some nitration pathways is explored for benzene (B), naphthalene (N), and in part pyrene (P). In principle, functionalization can either take place by direct nitration (NO2 or N2O5 attack) or be initiated by more reactive species, as the nitrate and hydroxyl radicals. The direct attack of the NO2 radical on B and N, followed by abstraction of the H geminal to the nitro group (most likely accomplished by 3O2) could yield the final nitro-derivatives. Nevertheless, the initial step (NO2 attack) involves significant free energy barriers. N2O5 proves to be an even worst nitrating agent. These results rule out direct nitration at room temperature. Instead, NO3 and, even more easily, HO can form pi-delocalized nitroxy- or hydroxycyclohexadienyl radicals. A subsequent NO2 attack can produce several regio- and diastereoisomers of nitroxy-nitro or hydroxy-nitro cyclohexadienes. In this respect, the competition between NO2 and O2 is considered: the rate ratios are such to indicate that the NO3 and HO initiated pathways are the major source of nitroarenes. Finally, if the two substituents are 1,2-trans, either a HNO3 or a H2O concerted elimination can give the nitro-derivatives. Whereas HNO3 elimination is feasible, H2O elimination presents, by contrast, a high barrier. Under combustion conditions the NO2 direct nitration pathway is more feasible, but remains a minor channel.
Sjödén, Björn; Granhag, Pär Anders; Ost, James; Roos Af Hjelmsäter, Emma
2009-06-01
The present study examined the effects of fantasy proneness on false "reports" and false "memories", of existent and non-existent footage of a public event. We predicted that highly fantasy prone individuals would be more likely to stand by their initial claim of having seen a film of the event than low fantasy prone participants when prompted for more details about their experiences. Eighty creative arts students and 80 other students were asked whether they had seen CCTV footage preceding the attack on Swedish foreign minister Anna Lindh up to, and including, non-existent footage of the actual moment of the attack. If affirmative, they were probed for extended narratives of what they claimed to have seen. Overall, 64% of participants provided a false "report" by answering yes to the initial question. Of these, 30% provided no explicit details of the attack, and a further 15% retracted their initial answer in their narratives. This left 19% of the sample who appeared to have false "memories" because they provided explicit details of the actual moment of the attack. Women scored higher than men and art students scored higher than other students on fantasy proneness, but there was no effect on levels of false reporting or false "memory". Memories were rated more vivid and clear for existent compared to non-existent aspects of the event. In sum, these data suggest a more complex relationship between memory distortions and fantasy proneness than previously observed.
Blanchard, Edward B; Kuhn, Eric; Rowell, Dianna L; Hickling, Edward J; Wittrock, David; Rogers, Rebecca L; Johnson, Michelle R; Steckler, Debra C
2004-02-01
From mid-October 2001 through the end of November 2001, we collected fairly large sets of questionnaires from undergraduates at three public universities (Albany, NY, n = 507, Augusta, GA, n = 336, Fargo, ND, n = 526 ) to assess rate of acute stress disorder (ASD) and level of ASD symptoms following the September 11th attacks, rate of current posttraumatic stress disorder (PTSD) and level of PTSD symptoms, and current level of depressive symptoms resulting from the September 11th attacks. We also gathered information on exposure to media coverage of the attacks, connectedness to the World Trade Center (WTC) and personnel there, and degree of engagement in reparative acts such as giving blood, attending vigils. We found higher levels of ASD, ASD symptoms, PTSD and PTSD symptoms as a function of geographical proximity to New York City (and within the Albany site, proximity of students' homes) and gender. Exposure (hours of TV watched) was a predictor in some instances as was connectedness to WTC victims. ASD symptoms were the strongest predictor of subsequent PTSD symptoms. Path models accounted for over 60% of the variance in PTSD symptoms.
Cognitive style, alprazolam plasma levels, and treatment response in panic disorder.
Uhlenhuth, E H; Starcevic, Vladan; Qualls, Clifford; Antal, Edward J; Matuzas, William; Javaid, Javaid I; Barnhill, Jamie
2008-01-01
This study investigated an anxiety-prone cognitive style (measured by the Anxious Thoughts and Tendencies Questionnaire, AT&T) as a predictor of the acute response to increasing alprazolam plasma levels in panic disorder. Panic disorder patients (n=26) were treated with escalating doses of alprazolam for 4 weeks, then a fixed dose of 1 mg four times a day for 4 weeks. At 0, 1, 2, 3, 4, 6, and 8 weeks, trough alprazolam plasma levels; clinical, self-report, and performance measures; and vital signs were assessed. Panic attack data were from daily diaries. The repeated response measures were analyzed in relation to alprazolam plasma levels using SAS GENMOD, with patients classified as high or low on the baseline AT&T. Panic attacks, anticipatory anxiety, fear, avoidance, overall agoraphobia, the Hamilton Anxiety Rating Scale, and clinicians' global ratings improved with increasing alprazolam plasma levels. Hopkins Symptom Checklist-90 Anger-Hostility; Profile of Mood States Vigor, Confusion, and Friendliness; and speed and accuracy of performance worsened. Patients with high AT&T scores were worse throughout the study on situational panics, fear, avoidance, overall agoraphobia, the Hamilton Anxiety Rating Scale, the Hamilton Rating Scale for Depression, and Clinical Global Improvement; most Hopkins Symptom Checklist-90 clusters; Profile of Mood States Anxiety, Depression, and Confusion; and Continuous Performance Task omissions. We conclude that in panic disorder: (1) alprazolam has a broad spectrum of clinical activity related to plasma levels in individual patients; (2) sedation, disinhibition, and performance deficits may persist for at least a month after dose escalation ends; (3) marked anxiety-prone cognitions predict more symptoms throughout treatment, but do not modify the response to alprazolam and therefore should not influence the choice of alprazolam as treatment. Published 2007 Wiley-Liss, Inc.
NASA Astrophysics Data System (ADS)
Sanabria-Cala, J. A.; Montañez, N. D.; Laverde Cataño, D.; Y Peña Ballesteros, D.; Mejía, C. A.
2017-12-01
Naphthenic acids present in oil from most regions worldwide currently stand as the main responsible for the naphthenic corrosion problems, affecting the oil-refining industry. The phenomenon of sulfidation, accompanying corrosion processes brought about by naphthenic acids in high-temperature refining plant applications, takes place when the combination of sulfidic acid (H2S) with Fe forms layers of iron sulphide (FeS) on the material surface, layers with the potential to protect the material from attack by other corrosive species like naphthenic acids. This work assessed corrosion products formed by sulfidation as inhibitors of naphthenic corrosion rate in AISI-316 steel exposed to processing conditions of simulated crude oil in a dynamic autoclave. Calculation of the sulfidation and naphthenic corrosion rates were determined by gravimetry. The surfaces of the AISI-316 gravimetric coupons exposed to acid systems; were characterized morphologically by X-Ray Diffraction (XRD) and X-ray Fluorescence by Energy Dispersive Spectroscopy (EDS) combined with Scanning Electron Microscopy (SEM). One of the results obtained was the determination of an inhibiting effect of corrosion products at 250 and 300°C, where lower corrosion rate levels were detected. For the temperature of 350°C, naphthenic corrosion rates increased due to deposition of naphthenic acids on the areas where corrosion products formed by sulfidation have lower homogeneity and stability on the surface, thus accelerating the destruction of AISI-316 steel. The above provides an initial contribution to oil industry in search of new alternatives to corrosion control by the attack of naphthenic acids, from the formation of FeS layers on exposed materials in the processing of heavy crude oils with high sulphur content.
Usenko, G A; Usenko, A G; Vasendin, D V
2015-01-01
During magnetic storms the observed increase in γ-background environment and the reduction of the rate of oxygen utilization by the tissues, but the increase in the number of angina attacks per day to magnetic storms the choleric, in the days of magnetic storms in sanguine, for 3-4 days at a phlegmatic, and 4-5 days in the melancholic especially in groups high anxiety phlegmatic and melancholic. Last-risk group severe arterial hypertension and ischemic heart disease. Antihypertensive therapy based on the blockade of the features of the psychosomatic status, significantly reduced the number of attacks and brought the values of the utilization of oxygen and coefficient of oxygen utilization bu the tissues of all the days to those in healthy individual relevant anxiety and temperament.
The geometry of high angle of attack maneuvers and the implications for Gy-induced neck injuries.
Newman, David G; Ostler, David
2011-08-01
Modern super agile fighter aircraft have significantly expanded maneuverability envelopes, often involving very high angles of attack (AOA) in the post-stall region. One such maneuver is the high AOA velocity vector roll. The geometry of this flight maneuver is such that during the roll there is a significant lateral C load imposed on the unrestrained head-neck complex of the pilot. A mathematical analysis of the geometric relationship determining the magnitude of +/- Gy acceleration during high AOA maneuvering was conducted. This preliminary mathematical model is able to predict the Gy load imposed on the head-neck complex of the pilot for a given set of flight maneuver parameters. The analysis predicts that at an AOA of 700 and with a roll rate of 100 degrees x s(-1), the lateral G developed will be approximately 3.5 Gy. Increasing the roll rate increases the lateral G component: at 200 degrees x s(-1) the Gy, load is more than 6 Gy. There are serious potential implications of super agile maneuvers on the neck of the pilot. The G environment experienced by the pilot of super agile aircraft is increasingly multiaxial, involving +/- Gx, +/- Gy, and +/- Gz. The level of lateral G developed during these dynamic flight maneuvers should not be underestimated, as such G loads can potentially lead to neck injuries. While aircraft become ever more capable, a full understanding of the biodynamic effects on the pilot while exploiting the agility of the aircraft still needs to be developed.
Merianos, A; Miller, N C; Patel, M S
1993-09-01
An outbreak of measles occurred in Darwin from February to March 1991. The first case was in a 13-year-old high school student who had returned from a holiday overseas. She was symptomatic on the second day of the new school term. She infected an infant while both waited in a doctor's surgery. Outbreak control measures were instituted 18 days later when the Communicable Diseases Centre was first alerted of cases through the laboratory notification scheme. Through active surveillance, we identified 76 cases of measles, of whom 92 per cent (70 cases) were under 20 years of age. Of these, 46 were students at the index high school in which the attack rate was 39.2 per 1,000. They transmitted the disease to six unvaccinated siblings aged 11 to 18 years, resulting in a secondary attack rate of 113 per 1,000 in this age group (relative risk of disease in siblings 2.8, 95 per cent confidence interval 1.2 to 6.2). The outbreak affected one other high school, a number of primary schools, one tertiary institution, and nine children under five years. Only four of the cases had a verified history of previous immunisation against measles. The outbreak was arrested within two weeks of instituting community-wide control measures. Inadequate immunisation coverage among school-aged children and delays in notification contributed to the severity of the outbreak. Improved measles surveillance systems, including telephone notification of clinical cases are needed so that control measures can be instituted immediately within the household and in the community.
NASA Astrophysics Data System (ADS)
Kristiawan, S. A.; Sunarmasto; Tyas, G. P.
2016-02-01
Concrete is susceptible to a variety of chemical attacks. In the sulfuric acid environment, concrete is subjected to a combination of sulfuric and acid attack. This research is aimed to investigate the degradation of self-compacting concrete (SCC) due to sulfuric acid attack based on measurement of compressive strength loss and diameter change. Since the proportion of SCC contains higher cement than that of normal concrete, the vulnerability of this concrete to sulfuric acid attack could be reduced by partial replacement of cement with fly ash at high volume level. The effect of high volume fly ash at 50-70% cement replacement levels on the extent of degradation owing to sulfuric acid will be assessed in this study. It can be shown that an increase in the utilization of fly ash to partially replace cement tends to reduce the degradation as confirmed by less compressive strength loss and diameter change. The effect of fly ash to reduce the degradation of SCC is more pronounced at a later age.
Improvement of maneuver aerodynamics by spanwise blowing
NASA Technical Reports Server (NTRS)
Erickson, G. E.; Campbell, J. F.
1977-01-01
Spanwise blowing was used to test a generalized wind-tunnel model to investigate component concepts in order to provide improved maneuver characteristics for advanced fighter aircraft. Primary emphasis was placed on performance, stability, and control at high angles of attack and subsonic speeds. Test data were obtained in the Langley high speed 7 by 10 foot tunnel at free stream Mach numbers up to 0.50 for a range of model angles of attack, jet momentum coefficients, and leading and trailing edge flap deflection angles. Spanwise blowing on a 44 deg swept trapezoidal wing resulted in leading edge vortex enhancement with subsequent large vortex induced lift increments and drag polar improvements at the higher angles of attack. Small deflections of a leading edge flap delayed these lift and drag benefits to higher angles of attack. In addition, blowing was more effective at higher Mach numbers. Spanwise blowing in conjunction with a deflected trailing edge flap resulted in lift and drag benefits that exceeded the summation of the effects of each high lift device acting alone. Asymmetric blowing was an effective lateral control device at the higher angles of attack.
Kshettry, Aritra; Vaidyanathan, Srinivas; Athreya, Vidya
2017-01-01
There is increasing evidence of the importance of multi-use landscapes for the conservation of large carnivores. However, when carnivore ranges overlap with high density of humans, there are often serious conservation challenges. This is especially true in countries like India where loss of peoples' lives and property to large wildlife are not uncommon. The leopard (Panthera pardus) is a large felid that is widespread in India, often sharing landscapes with high human densities. In order to understand the ecology of leopards in a human use landscape and the nature of human-leopard interactions, we studied (i) the spatial and temporal distribution and the characteristics of leopard attacks on people, (ii) the spatial variability in the pattern of habitat use by the leopard, and (iii) the spatial relationship between attack locations and habitat use by leopards. The study site, located in northern West Bengal, India, is a densely populated mixed-use landscape of 630 km2, comprising of forests, tea plantations, agriculture fields, and human settlements. A total of 171 leopard attacks on humans were reported between January 2009 and March 2016, most of which occurred within the tea-gardens. None of the attacks was fatal. We found significant spatial clustering of locations of leopard attacks on humans. However, most of the attacks were restricted to certain tea estates and occurred mostly between January and May. Analysis of habitat use by leopards showed that the probability of use of areas with more ground vegetation cover was high while that of areas with high density of buildings was low. However, locations of leopard attacks on people did not coincide with areas that showed a higher probability of use by leopards. This indicates that an increased use of an area by leopards, by itself, does not necessarily imply an increase in attacks on people. The spatial and temporal clustering of attack locations allowed us to use this information to prioritize areas to focus mitigation activities in order reduce negative encounters between people and leopards in this landscape which has had a long history of conflict.
2017-01-01
There is increasing evidence of the importance of multi-use landscapes for the conservation of large carnivores. However, when carnivore ranges overlap with high density of humans, there are often serious conservation challenges. This is especially true in countries like India where loss of peoples’ lives and property to large wildlife are not uncommon. The leopard (Panthera pardus) is a large felid that is widespread in India, often sharing landscapes with high human densities. In order to understand the ecology of leopards in a human use landscape and the nature of human-leopard interactions, we studied (i) the spatial and temporal distribution and the characteristics of leopard attacks on people, (ii) the spatial variability in the pattern of habitat use by the leopard, and (iii) the spatial relationship between attack locations and habitat use by leopards. The study site, located in northern West Bengal, India, is a densely populated mixed-use landscape of 630 km2, comprising of forests, tea plantations, agriculture fields, and human settlements. A total of 171 leopard attacks on humans were reported between January 2009 and March 2016, most of which occurred within the tea-gardens. None of the attacks was fatal. We found significant spatial clustering of locations of leopard attacks on humans. However, most of the attacks were restricted to certain tea estates and occurred mostly between January and May. Analysis of habitat use by leopards showed that the probability of use of areas with more ground vegetation cover was high while that of areas with high density of buildings was low. However, locations of leopard attacks on people did not coincide with areas that showed a higher probability of use by leopards. This indicates that an increased use of an area by leopards, by itself, does not necessarily imply an increase in attacks on people. The spatial and temporal clustering of attack locations allowed us to use this information to prioritize areas to focus mitigation activities in order reduce negative encounters between people and leopards in this landscape which has had a long history of conflict. PMID:28493999
NASA Technical Reports Server (NTRS)
Dugan, Duane W.
1959-01-01
The possibility of obtaining useful estimates of the static longitudinal stability of aircraft flying at high supersonic Mach numbers at angles of attack between 0 and +/-180 deg is explored. Existing theories, empirical formulas, and graphical procedures are employed to estimate the normal-force and pitching-moment characteristics of an example airplane configuration consisting of an ogive-cylinder body, trapezoidal wing, and cruciform trapezoidal tail. Existing wind-tunnel data for this configuration at a Mach number of 6.86 provide an evaluation of the estimates up to an angle of attack of 35 deg. Evaluation at higher angles of attack is afforded by data obtained from wind-tunnel tests made with the same configuration at angles of attack between 30 and 150 deg at five Mach numbers between 2.5 and 3.55. Over the ranges of Mach numbers and angles of attack investigated, predictions of normal force and center-of-pressure locations for the configuration considered agree well with those obtained experimentally, particularly at the higher Mach numbers.
Knowledge of signs and symptoms of heart attack and stroke among Singapore residents.
Quah, Joy Li Juan; Yap, Susan; Cheah, Si Oon; Ng, Yih Yng; Goh, E Shaun; Doctor, Nausheen; Leong, Benjamin Sieu-Hon; Tiah, Ling; Chia, Michael Yih Chong; Ong, Marcus Eng Hock
2014-01-01
To determine the level of knowledge of signs and symptoms of heart attack and stroke in Singapore resident population, in comparison to the global community. A population based, random sample of 7,840 household addresses was selected from a validated national sampling frame. Each participant was asked eight questions on signs and symptoms of heart attack and 10 questions on stroke. The response rate was 65.2% with 4,192 respondents. The level of knowledge for preselected, common signs and symptoms of heart attack and stroke was 57.8% and 57.1%, respectively. The respondents scored a mean of 5.0 (SD 2.4) out of 8 for heart attack, while they scored a mean of 6.8 (SD 2.9) out of 10 for stroke. Respondents who were ≥ 50 years, with lower educational level, and unemployed/retired had the least knowledge about both conditions. The level of knowledge of signs and symptoms of heart attack and stroke in Singapore is comparable to USA and Canada. We found a comparable knowledge of stroke and heart attack signs and symptoms in the community to countries within the same economic, educational, and healthcare strata. However older persons, those with lower educational level and those who are unemployed/retired, require more public health education efforts.
Craig, Timothy; Shapiro, Ralph; Vegh, Arthur; Baker, James W.; Bernstein, Jonathan A.; Busse, Paula; Magerl, Markus; Martinez-Saguer, Inmaculada; Riedl, Marc A.; Lumry, William; Williams-Herman, Debora; Edelman, Jonathan; Feuersenger, Henrike; Machnig, Thomas
2017-01-01
Background: The plasma-derived, pasteurized, nanofiltered C1-inhibitor concentrate (pnfC1-INH) is approved in the United States as an intravenous (IV) on-demand treatment for hereditary angioedema (HAE) attacks, and, in Europe, as on demand and short-term prophylaxis. Objective: This analysis evaluated Berinert Patient Registry data regarding IV pnfC1-INH used as long-term prophylaxis (LTP). Methods: The international registry (2010–2014) collected prospective and retrospective usage, dosing, and safety data on individuals who used pnfC1-INH for any reason. Results: The registry included data on 47 subjects (80.9% female subjects; mean age, 44.8 years), which reflected 4082 infusions categorized as LTP and a total of 430.2 months of LTP administration. The median absolute dose of pnfC1-INH given for LTP was 1000 IU (range, 500–3000 IU), with a median time interval between infusion and a subsequent pnfC1-INH–treated attack of 72.0 hours (range, 0.0–166.4 hours). Fifteen subjects (31.9%) had no pnfC1-INH–treated HAE attacks within 7 days after pnfC1-INH infusion for LTP; 32 subjects (68.1%) experienced 246 attacks, with rates of 0.06 attacks per infusion and 0.57 attacks per month. A total of 81 adverse events were reported in 16 subjects (34.0%) (0.02 events per infusion; 0.19 events per month); only 3 adverse events were considered related to pnfC1-INH (noncardiac chest pain, postinfusion headache, deep vein thrombosis in a subject with an IV port). Conclusion: In this international registry, IV pnf-C1-INH given as LTP for HAE was safe and efficacious, with a low rate of attacks that required pnfC1-INH treatment, particularly within the first several days after LTP administration. PMID:28381322
Riedl, Marc A; Aygören-Pürsün, Emel; Baker, James; Farkas, Henriette; Anderson, John; Bernstein, Jonathan A; Bouillet, Laurence; Busse, Paula; Manning, Michael; Magerl, Markus; Gompels, Mark; Huissoon, Aarnoud P; Longhurst, Hillary; Lumry, William; Ritchie, Bruce; Shapiro, Ralph; Soteres, Daniel; Banerji, Aleena; Cancian, Mauro; Johnston, Douglas T; Craig, Timothy J; Launay, David; Li, H Henry; Liebhaber, Myron; Nickel, Timothy; Offenberger, Jacob; Rae, William; Schrijvers, Rik; Triggiani, Massimo; Wedner, H James; Dobo, Sylvia; Cornpropst, Melanie; Clemons, Desiree; Fang, Lei; Collis, Phil; Sheridan, William P; Maurer, Marcus
2018-04-24
Effective inhibition of plasma kallikrein may have significant benefits for patients with hereditary angioedema due to deficiency of C1 inhibitor (C1-INH-HAE) by reducing the frequency of angioedema attacks. Avoralstat is a small molecule inhibitor of plasma kallikrein. This study (OPuS-2) evaluated the efficacy and safety of prophylactic avoralstat 300 or 500 mg compared with placebo. OPuS-2 was a Phase 3, multicenter, randomized, double-blind, placebo-controlled, parallel-group study. Subjects were administered avoralstat 300 mg, avoralstat 500 mg, or placebo orally 3 times per day for 12 weeks. The primary efficacy endpoint was the angioedema attack rate based on adjudicator-confirmed attacks. A total of 110 subjects were randomized and dosed. The least squares (LS) mean attack rates per week were 0.589, 0.675, and 0.593 for subjects receiving avoralstat 500 mg, avoralstat 300 mg, and placebo, respectively. Overall, 1 subject in each of the avoralstat groups and no subjects in the placebo group were attack-free during the 84-day treatment period. The LS mean duration of all confirmed attacks was 25.4, 29.4 and 31.4 hours for the avoralstat 500 mg, avoralstat 300 mg and placebo groups respectively. Using the Angioedema Quality of Life Questionnaire (AE-QoL), improved QoL was observed for the avoralstat 500 mg group compared with placebo. Avoralstat was generally safe and well tolerated. Although this study did not demonstrate efficacy of avoralstat in preventing angioedema attacks in C1-INH-HAE, it provided evidence of shortened angioedema episodes and improved QoL in the avoralstat 500 mg treatment group compared with placebo. This article is protected by copyright. All rights reserved. This article is protected by copyright. All rights reserved.
A method for estimating the rolling moment due to spin rate for arbitrary planform wings
NASA Technical Reports Server (NTRS)
Poppen, W. A., Jr.
1985-01-01
The application of aerodynamic theory for estimating the force and moments acting upon spinning airplanes is of interest. For example, strip theory has been used to generate estimates of the aerodynamic characteristics as a function of spin rate for wing-dominated configurations for angles of attack up to 90 degrees. This work, which had been limited to constant chord wings, is extended here to wings comprised of tapered segments. Comparison of the analytical predictions with rotary balance wind tunnel results shows that large discrepancies remain, particularly for those angles-of-attack greater than 40 degrees.
A robust trust establishment scheme for wireless sensor networks.
Ishmanov, Farruh; Kim, Sung Won; Nam, Seung Yeob
2015-03-23
Security techniques like cryptography and authentication can fail to protect a network once a node is compromised. Hence, trust establishment continuously monitors and evaluates node behavior to detect malicious and compromised nodes. However, just like other security schemes, trust establishment is also vulnerable to attack. Moreover, malicious nodes might misbehave intelligently to trick trust establishment schemes. Unfortunately, attack-resistance and robustness issues with trust establishment schemes have not received much attention from the research community. Considering the vulnerability of trust establishment to different attacks and the unique features of sensor nodes in wireless sensor networks, we propose a lightweight and robust trust establishment scheme. The proposed trust scheme is lightweight thanks to a simple trust estimation method. The comprehensiveness and flexibility of the proposed trust estimation scheme make it robust against different types of attack and misbehavior. Performance evaluation under different types of misbehavior and on-off attacks shows that the detection rate of the proposed trust mechanism is higher and more stable compared to other trust mechanisms.
Krymchantowski, Abouch Valenty; Bigal, Marcelo Eduardo
2004-01-01
Background Rizatriptan is an effective and fast acting drug for the acute treatment of migraine. Some nonsteroidal anti-inflammatory drugs (NSAID) have also demonstrated efficacy in treating migraine attacks. There is evidence that the combination of a triptan and a NSAID decreases migraine recurrence in clinical practice. The primary aim of this randomized open label study was to assess the recurrence rates in migraine sufferers acutely treated with rizatriptan (RI) alone vs. rizatriptan plus a COX-2 enzyme inhibitor (rofecoxib, RO) vs. rizatriptan plus a traditional NSAID (tolfenamic acid, TO). We were also interested in comparing the efficacy rates within these three groups. Methods We assessed 45 patients from a headache clinic in Rio de Janeiro (35 women and 10 men, ages 18 to 65 years, mean 37 years). Patients with IHS migraine were randomized to one out of 3 groups, where they had to treat 6 consecutive moderate or severe attacks in counterbalanced order. In group 1, patients treated the first two attacks with 10 mg RI, the third and fourth attacks with RI + 50 mg RO and the last attacks with RI + 200 mg of TA. In group 2, we began with RI + TA, followed by RI, and RI + RO. Group 3 treated in the following order: RI + RO, RI + TA, RI alone. The presence of headache, nausea and photophobia at 1, 2 and 4 hours, as well as recurrence and side effects were compared. Results A total of 33 patients finished the study, treating 184 attacks. The pain-free rates at 1 hour were: RI: 15.5%; RI + RO: 22.6%; RI + TA: 20.3%(NS). Pain-free rates at 2 h were: RI: 37.9%; RI + RO: 62.9%, and RI + TA: 40.6% (p = 0.008 for RI vs. RI + RO; p = 0.007 for RI + RO vs. RI + TA, NS for RI vs RI + TA). At 4 h, pain-free rates were: RI: 69%; RI + RO: 82.3%; RI + TA: 78.1% (NS for all comparisons). The combination of RI + RO was superior to RI and to RI + TA in regard of the absense of nausea and photophobia at 4 hours. Recurrence (after being pain-free at 2 h) was observed in 50% of patients treated with RI, in 15,4% of those treated with RI + RO, and in 7,7% of those treated with RI + TA. Conclusions Despite the methodological limitations of this study, the combination of RI and RO revealed a higher response rate at 2 hours. Recurrence was also clearly decreased with both combinations in relation to the use of RI alone. Controlled studies are necessary to provide additional evidence. PMID:15222892
Garfin, Dana Rose; Poulin, Michael J; Blum, Scott; Silver, Roxane Cohen
2018-02-01
Research conducted in the early years after the September 11, 2001 (9/11) terrorist attacks in New York, Pennsylvania, and Washington, DC demonstrated adverse psychological outcomes among residents of the United States who were exposed to the attacks both directly and indirectly via the media. However, less is known about the impact of this collective trauma over time. Beginning at the end of December 2006, a longitudinal study of a nationally representative sample of U.S. residents (Cohort 2, N = 1,613) examined the long-term effects of 9/11, with annual assessments administered every year for 3 years. We assessed rates of 9/11-related posttraumatic stress (PTS) annually during the first 2 years of the study; during the second and third years of the study, we assessed fear and worry regarding future terrorism. Rates of PTS among participants were compared with those assessed annually in a nationally representative sample between 2002 and 2004 (Cohort 1); results indicated a relatively stable pattern of 9/11-related PTS symptoms for 6 years following the attacks. Five to six years after 9/11, we found an association between 9/11-related PTS and both direct, B = 8.45, 95% CI [4.32, 12.59] and media-based (live television), B = 1.78, 95% CI [0.90, 2.65] exposure to the attacks. Six to 7 years post-9/11, fear and worry regarding future terrorism were predicted by 9/11-related PTS symptoms that had been reported approximately 5 years after the attacks, B = 0.04, 95% CI [0.03, 0.05]. The psychological legacy of 9/11 was perceptible among many U.S. residents throughout the decade that followed. Copyright © 2018 International Society for Traumatic Stress Studies.
NASA Technical Reports Server (NTRS)
Kim, Hyun D.; Frate, Franco C.
2001-01-01
A subscale aerodynamic model of the GTX air-breathing launch vehicle was tested at NASA Glenn Research Center's 10- by 10-Foot Supersonic Wind Tunnel from Mach 2.0 to 3.5 at various angles-of-attack. The objective of the test was to investigate the effect of angle-of-attack on inlet mass capture, inlet diverter effectiveness, and the flowfield at the cowl lip plane. The flow-through inlets were tested with and without boundary-layer diverters. Quantitative measurements such as inlet mass flow rates and pitot-pressure distributions in the cowl lip plane are presented. At a 3deg angle-of-attack, the flow rates for the top and side inlets were within 8 percent of the zero angle-of-attack value, and little distortion was evident at the cowl lip plane. Surface oil flow patterns showing the shock/boundary-layer interaction caused by the inlet spikes are shown. In addition to inlet data, vehicle forebody static pressure distributions, boundary-layer profiles, and temperature-sensitive paint images to evaluate the boundary-layer transition are presented. Three-dimensional parabolized Navier-Stokes computational fluid dynamics calculations of the forebody flowfield are presented and show good agreement with the experimental static pressure distributions and boundary-layer profiles. With the boundary-layer diverters installed, no adverse aerodynamic phenomena were found that would prevent the inlets from operating at the required angles-of-attack. We recommend that phase 2 of the test program be initiated, where inlet contraction ratio and diverter geometry variations will be tested.
Power reduction and the radial limit of stall delay in revolving wings of different aspect ratio
Kruyt, Jan W.; van Heijst, GertJan F.; Altshuler, Douglas L.; Lentink, David
2015-01-01
Airplanes and helicopters use high aspect ratio wings to reduce the power required to fly, but must operate at low angle of attack to prevent flow separation and stall. Animals capable of slow sustained flight, such as hummingbirds, have low aspect ratio wings and flap their wings at high angle of attack without stalling. Instead, they generate an attached vortex along the leading edge of the wing that elevates lift. Previous studies have demonstrated that this vortex and high lift can be reproduced by revolving the animal wing at the same angle of attack. How do flapping and revolving animal wings delay stall and reduce power? It has been hypothesized that stall delay derives from having a short radial distance between the shoulder joint and wing tip, measured in chord lengths. This non-dimensional measure of wing length represents the relative magnitude of inertial forces versus rotational accelerations operating in the boundary layer of revolving and flapping wings. Here we show for a suite of aspect ratios, which represent both animal and aircraft wings, that the attachment of the leading edge vortex on a revolving wing is determined by wing aspect ratio, defined with respect to the centre of revolution. At high angle of attack, the vortex remains attached when the local radius is shorter than four chord lengths and separates outboard on higher aspect ratio wings. This radial stall limit explains why revolving high aspect ratio wings (of helicopters) require less power compared with low aspect ratio wings (of hummingbirds) at low angle of attack and vice versa at high angle of attack. PMID:25788539
NASA Technical Reports Server (NTRS)
Steenken, William G.; Williams, John G.; Yuhas, Andrew J.; Walsh, Kevin R.
1997-01-01
The F404-GE-400-powered F/A-18A High Alpha Research Vehicle (HARV) was used to examine the quality of inlet airflow during departed flight maneuvers, that is, during flight outside the normal maneuvering envelope where control surfaces have little or no effectiveness. Six nose-left and six nose-right departures were initiated at Mach numbers between 0.3 and 0.4 at an altitude of 35 kft. The entry yaw rates were approximately 40 to 90 deg/sec. Engine surges were encountered during three of the nose-left and one of the nose-right departures. Time-variant inlet-total-pressure distortion levels at the engine face did not significantly exceed those at maximum angle-of-attack and sideslip maneuvers during controlled flight. Surges caused by inlet distortion levels resulted from a combination of high levels of inlet distortion and rapid changes in aircraft position. These rapid changes indicate a combination of engine support and gyroscopic loads being applied to the engine structure that impact the aerodynamic stability of the compressor through changes in the rotor-to-case clearances. This document presents the slides from an oral presentation.
High-model abundance may permit the gradual evolution of Batesian mimicry: an experimental test
Kikuchi, David W.; Pfennig, David W.
2010-01-01
In Batesian mimicry, a harmless species (the ‘mimic’) resembles a dangerous species (the ‘model’) and is thus protected from predators. It is often assumed that the mimetic phenotype evolves from a cryptic phenotype, but it is unclear how a population can transition through intermediate phenotypes; such intermediates may receive neither the benefits of crypsis nor mimicry. Here, we ask if selection against intermediates weakens with increasing model abundance. We also ask if mimicry has evolved from cryptic phenotypes in a mimetic clade. We first present an ancestral character-state reconstruction showing that mimicry of a coral snake (Micrurus fulvius) by the scarlet kingsnake (Lampropeltis elapsoides) evolved from a cryptic phenotype. We then evaluate predation rates on intermediate phenotypes relative to cryptic and mimetic phenotypes under conditions of both high- and low-model abundances. Our results indicate that where coral snakes are rare, intermediate phenotypes are attacked more often than cryptic and mimetic phenotypes, indicating the presence of an adaptive valley. However, where coral snakes are abundant, intermediate phenotypes are not attacked more frequently, resulting in an adaptive landscape without a valley. Thus, high-model abundance may facilitate the evolution of Batesian mimicry. PMID:19955153
High-model abundance may permit the gradual evolution of Batesian mimicry: an experimental test.
Kikuchi, David W; Pfennig, David W
2010-04-07
In Batesian mimicry, a harmless species (the 'mimic') resembles a dangerous species (the 'model') and is thus protected from predators. It is often assumed that the mimetic phenotype evolves from a cryptic phenotype, but it is unclear how a population can transition through intermediate phenotypes; such intermediates may receive neither the benefits of crypsis nor mimicry. Here, we ask if selection against intermediates weakens with increasing model abundance. We also ask if mimicry has evolved from cryptic phenotypes in a mimetic clade. We first present an ancestral character-state reconstruction showing that mimicry of a coral snake (Micrurus fulvius) by the scarlet kingsnake (Lampropeltis elapsoides) evolved from a cryptic phenotype. We then evaluate predation rates on intermediate phenotypes relative to cryptic and mimetic phenotypes under conditions of both high- and low-model abundances. Our results indicate that where coral snakes are rare, intermediate phenotypes are attacked more often than cryptic and mimetic phenotypes, indicating the presence of an adaptive valley. However, where coral snakes are abundant, intermediate phenotypes are not attacked more frequently, resulting in an adaptive landscape without a valley. Thus, high-model abundance may facilitate the evolution of Batesian mimicry.
Panic attacks and panic disorder in a population-based sample of active Canadian military personnel.
Kinley, D Jolene; Walker, John R; Mackenzie, Corey S; Sareen, Jitender
2011-01-01
The factors contributing to psychiatric problems among military personnel, particularly for panic, are unclear. The objective of this study was to examine the prevalence and correlates of panic disorder and panic attacks in the Canadian military. Statistics Canada and the Department of National Defense conducted the Canadian Community Health Survey-Canadian Forces Supplement in 2002 (May to December) with a representative sample of active Canadian military personnel (aged 16-54 years; N = 8,441; response rate, 81.5%). Comparisons were made between respondents with no past-year panic attacks, panic attacks without panic disorder, and panic disorder on measures of DSM-IV mental disorders, as well as validated measures of disability, distress, suicidal ideation, perceived need for mental health treatment, and mental health service use. Lifetime exposure to combat operations, witnessing of atrocities, and deployments were also assessed. Panic disorder and panic attacks were common in the military population, with past-year prevalence estimates of 1.8% and 7.0%, respectively. Both panic disorder and panic attacks were associated with increased odds of all mental disorders assessed, suicidal ideation, 2-week disability, and distress. Perceived need for mental health treatment and service use were common in individuals with panic attacks and panic disorder (perceived need: 46.3% for panic attacks, 89.6% for panic disorder; service use: 32.5% for panic attacks, 74.5% for panic disorder). Panic attacks and panic disorder in the military are associated with outcomes that could be detrimental to well-being and work performance, and early detection of panic in this population could help reduce these negative outcomes. © Copyright 2011 Physicians Postgraduate Press, Inc.
Outbreak of influenza in highly vaccinated crew of U.S. Navy ship.
Earhart, K. C.; Beadle, C.; Miller, L. K.; Pruss, M. W.; Gray, G. C.; Ledbetter, E. K.; Wallace, M. R.
2001-01-01
An outbreak of influenza A (H3N2) occurred aboard a U.S. Navy ship in February 1996, despite 95% of the crew's having been appropriately vaccinated. Virus isolated from ill crew members was antigenically distinct from the vaccination strain. With an attack rate of 42%, this outbreak demonstrates the potential for rapid spread of influenza in a confined population and the impact subsequent illness may have upon the workplace. PMID:11384530
Engineering Design Test 4 YAH-64 Advanced Attack Helicopter
1980-01-01
representative absorber installed data. However, this data was used for comparison with the absorber removed vibration levels. Additionally, a comparison of the...Figure 5 presents a comparison of performance measured duriag EDT-4 and EDT-2. Dimensional data for each flight are presented in figures 6 through 9...pilot could easily compensate for the lack of yaw rate danilpilg. 28. The YAH-64 requires a high brake pedal pres,,ure dirw ! r )wtJ i.iv (pcrations and
Guillén, Larissa; Adaime, Ricardo; Birke, Andrea; Velázquez, Olinda; Angeles, Guillermo; Ortega, Fernando; Ruíz, Eliel; Aluja, Martín
2017-04-01
We determined the influence of resin ducts, sap content, and fruit physicochemical features of four mango cultivars (Criollo, Manila, Ataulfo, and Tommy Atkins) on their susceptibility to the attack of the two most pestiferous fruit fly species infesting mangoes in Mexico: Anastrepha ludens (Loew) and Anastrepha obliqua (Macquart). We performed three studies: 1) analysis of resin ducts in mango fruit exocarp to determine the density and area occupied by resin ducts in each mango cultivar, 2) assessment of mango physicochemical features including fruit sap content, and 3) a forced infestation trial under field conditions using enclosed fruit-bearing branches to expose mangoes to gravid A. ludens or A. obliqua females. Infestation rates, development time from egg to prepupae and pupae, pupal weight, and percent of adult emergence, were assessed. 'Ataulfo' and 'Tommy Atkins' cultivars exhibited the highest resin duct density and sap content, the lowest infestation rate, and had a negative effect on immature development and pupal weight. In sharp contrast, 'Manila' and 'Criollo' cultivars, with the lowest resin duct density and sap content, were highly susceptible to A. ludens and A. obliqua attack. We conclude that sap content and the number, size, and distribution of resin ducts as well as firmness in mango fruit exocarp are all involved in the resistance of mango to A. ludens and A. obliqua attack. © The Authors 2017. Published by Oxford University Press on behalf of Entomological Society of America. All rights reserved. For Permissions, please email: journals.permissions@oup.com.
NASA Technical Reports Server (NTRS)
Jordan, Frank L., Jr.; Hahne, David E.
1992-01-01
An investigation was conducted in the Langley 30- by 60-Foot Tunnel and the Langley 12-Foot Low-Speed Tunnel to identify factors contributing to a directional divergence at high angles of attack for the EA-6B airplane. The study consisted of static wind-tunnel tests, smoke and tuft flow-visualization tests, and free-flight tests of a 1/8.5-scale model of the airplane. The results of the investigation indicate that the directional divergence of the airplane is brought about by a loss of directional stability and effective dihedral at high angles of attack. Several modifications were tested that significantly alleviate the stability problem. The results of the free-flight study show that the modified configuration exhibits good dynamic stability characteristics and could be flown at angles of attack significantly higher than those of the unmodified configuration.
Development of mental health first aid guidelines for panic attacks: a Delphi study.
Kelly, Claire M; Jorm, Anthony F; Kitchener, Betty A
2009-08-10
Panic attacks are common, and while they are not life-threatening events, they can lead to the development of panic disorder and agoraphobia. Appropriate help at the time that a panic attack occurs may decrease the fear associated with the attack and reduce the risk of developing an anxiety disorder. However, few people have the knowledge and skills required to assist. Simple first aid guidelines may help members of the public to offer help to people who experience panic attacks. The Delphi method was used to reach consensus in a panel of experts. Experts included 50 professionals and 6 people who had experience of panic attacks and were active in mental health advocacy. Statements about how to assist someone who is having a panic attack were sourced through a systematic search of both professional and lay literature. These statements were rated for importance as first aid guidelines by the expert and consumer panels and guidelines were written using the items most consistently endorsed. Of 144 statements presented to the panels, 27 were accepted. These statements were used to develop the guidelines appended to this paper. There are a number of actions which are considered to be useful for members of the public to do if they encounter someone who is having a panic attack. These guidelines will be useful in revision of curricula of mental health first aid programs. They can also be used by members of the public who want immediate information about how to assist someone who is experiencing panic attacks.
Mass casualty response in the 2008 Mumbai terrorist attacks.
Roy, Nobhojit; Kapil, Vikas; Subbarao, Italo; Ashkenazi, Isaac
2011-12-01
The November 26-29, 2008, terrorist attacks on Mumbai were unique in its international media attention, multiple strategies of attack, and the disproportionate national fear they triggered. Everyone was a target: random members of the general population, iconic targets, and foreigners alike were under attack by the terrorists. A retrospective, descriptive study of the distribution of terror victims to various city hospitals, critical radius, surge capacity, and the nature of specialized medical interventions was gathered through police, legal reports, and interviews with key informants. Among the 172 killed and 304 injured people, about four-fifths were men (average age, 33 years) and 12% were foreign nationals. The case-fatality ratio for this event was 2.75:1, and the mortality rate among those who were critically injured was 12%. A total of 38.5% of patients arriving at the hospitals required major surgical intervention. Emergency surgical operations were mainly orthopedic (external fixation for compound fractures) and general surgical interventions (abdominal explorations for penetrating bullet/shrapnel injuries). The use of heavy-duty automatic weapons, explosives, hostages, and arson in these terrorist attacks alerts us to new challenges to medical counterterrorism response. The need for building central medical control for a coordinated response and for strengthening public hospital capacity are lessons learned for future attacks. These particular terrorist attacks had global consequences, in terms of increased security checks and alerts for and fears of further similar "Mumbai-style" attacks. The resilience of the citizens of Mumbai is a critical measure of the long-term effects of terror attacks.
Gaussian-modulated coherent-state measurement-device-independent quantum key distribution
NASA Astrophysics Data System (ADS)
Ma, Xiang-Chun; Sun, Shi-Hai; Jiang, Mu-Sheng; Gui, Ming; Liang, Lin-Mei
2014-04-01
Measurement-device-independent quantum key distribution (MDI-QKD), leaving the detection procedure to the third partner and thus being immune to all detector side-channel attacks, is very promising for the construction of high-security quantum information networks. We propose a scheme to implement MDI-QKD, but with continuous variables instead of discrete ones, i.e., with the source of Gaussian-modulated coherent states, based on the principle of continuous-variable entanglement swapping. This protocol not only can be implemented with current telecom components but also has high key rates compared to its discrete counterpart; thus it will be highly compatible with quantum networks.
... to low blood pressure are an abnormally low heart rate ( bradycardia ), problems with heart valves , heart attack and ... occurred. Is low blood pressure related to low heart rate? Find out . This content was last reviewed October ...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wymore, Troy W; Langan, Paul; Smith, Jeremy C
Organophosphorus (OP) nerve agents such as (S)-sarin are among the most highly toxic compounds that have been synthesized. Engineering enzymes that catalyze the hydrolysis of nerve agents ( bioscavengers ) is an emerging prophylactic approach to diminishing their toxic effects. Although its native function is not known, diisopropyl fluorophosphatase (DFPase) from Loligo vulgaris catalyzes the hydrolysis of OP compounds. Here, we investigate the mechanisms of diisopropylfluorophosphate (DFP) and (S)-sarin hydrolysis by DFPase with quantum mechanical/molecular mechanical (QM/MM) umbrella sampling simulations. We find that the mechanism for hydrolysis of DFP involves nucleophilic attack by Asp229 on phosphorus to form a pentavalentmore » intermediate. P F bond dissociation then yields a phosphoacyl enzyme intermediate in the rate-limiting step. The simulations suggest that a water molecule, coordinated to the catalytic Ca2+, donates a proton to Asp121 and then attacks the tetrahedral phosphoacyl intermediate to liberate the diisopropylphosphate product. In contrast, the calculated free energy barrier for hydrolysis of (S)-sarin by the same mechanism is highly unfavorable, primarily due to the instability of the pentavalent phosphoenzyme species. Instead, simulations suggest that hydrolysis of (S)-sarin proceeds by a mechanism in which Asp229 could activate an intervening water molecule for nucleophilic attack on the substrate. These findings may lead to improved strategies for engineering DFPase and related six-bladed -propeller folds for more efficient degradation of OP compounds.« less
2015-01-01
Organophosphorus (OP) nerve agents such as (S)-sarin are among the most highly toxic compounds that have been synthesized. Engineering enzymes that catalyze the hydrolysis of nerve agents (“bioscavengers”) is an emerging prophylactic approach to diminish their toxic effects. Although its native function is not known, diisopropyl fluorophosphatase (DFPase) from Loligo vulgaris catalyzes the hydrolysis of OP compounds. Here, we investigate the mechanisms of diisopropylfluorophosphate (DFP) and (S)-sarin hydrolysis by DFPase with quantum mechanical/molecular mechanical umbrella sampling simulations. We find that the mechanism for hydrolysis of DFP involves nucleophilic attack by Asp229 on phosphorus to form a pentavalent intermediate. P–F bond dissociation then yields a phosphoacyl enzyme intermediate in the rate-limiting step. The simulations suggest that a water molecule, coordinated to the catalytic Ca2+, donates a proton to Asp121 and then attacks the tetrahedral phosphoacyl intermediate to liberate the diisopropylphosphate product. In contrast, the calculated free energy barrier for hydrolysis of (S)-sarin by the same mechanism is highly unfavorable, primarily because of the instability of the pentavalent phosphoenzyme species. Instead, simulations suggest that hydrolysis of (S)-sarin proceeds by a mechanism in which Asp229 could activate an intervening water molecule for nucleophilic attack on the substrate. These findings may lead to improved strategies for engineering DFPase and related six-bladed β-propeller folds for more efficient degradation of OP compounds. PMID:24720808
Synthesis of advanced aluminide intermetallic coatings by low-energy Al-ion radiation
NASA Astrophysics Data System (ADS)
Shen, Mingli; Gu, Yan; Zhao, Panpan; Zhu, Shenglong; Wang, Fuhui
2016-05-01
Metals that work at high temperatures (for instance, superalloys in gas-turbines) depend on thermally grown oxide (TGO, commonly alumina) to withstand corrosion attack. Nickel Aluminide (NiAl) as one superior alumina TGO former plays an important role in protective coatings for turbine blades in gas-turbine engines used for aircraft propulsion and power generation. Lowering TGO growth rate is essentially favored for offering sustainable protection, especially in thermal barrier coatings (TBC). However, it can only be achieved currently by a strategy of adding the third element (Pt or reactive elements) into NiAl during traditional diffusion- or deposition-based synthesis of the coating. Here we present a highly flexible Al-ion radiation-based synthesis of advanced NiAl coatings, achieving low TGO growth rate without relying on the third element addition. Our results expand the strategy for lowering TGO growth rate and demonstrate potentials for ion radiation in advancing materials synthesis.
Synthesis of advanced aluminide intermetallic coatings by low-energy Al-ion radiation
Shen, Mingli; Gu, Yan; Zhao, Panpan; Zhu, Shenglong; Wang, Fuhui
2016-01-01
Metals that work at high temperatures (for instance, superalloys in gas-turbines) depend on thermally grown oxide (TGO, commonly alumina) to withstand corrosion attack. Nickel Aluminide (NiAl) as one superior alumina TGO former plays an important role in protective coatings for turbine blades in gas-turbine engines used for aircraft propulsion and power generation. Lowering TGO growth rate is essentially favored for offering sustainable protection, especially in thermal barrier coatings (TBC). However, it can only be achieved currently by a strategy of adding the third element (Pt or reactive elements) into NiAl during traditional diffusion- or deposition-based synthesis of the coating. Here we present a highly flexible Al-ion radiation-based synthesis of advanced NiAl coatings, achieving low TGO growth rate without relying on the third element addition. Our results expand the strategy for lowering TGO growth rate and demonstrate potentials for ion radiation in advancing materials synthesis. PMID:27194417
Synthesis of advanced aluminide intermetallic coatings by low-energy Al-ion radiation.
Shen, Mingli; Gu, Yan; Zhao, Panpan; Zhu, Shenglong; Wang, Fuhui
2016-05-19
Metals that work at high temperatures (for instance, superalloys in gas-turbines) depend on thermally grown oxide (TGO, commonly alumina) to withstand corrosion attack. Nickel Aluminide (NiAl) as one superior alumina TGO former plays an important role in protective coatings for turbine blades in gas-turbine engines used for aircraft propulsion and power generation. Lowering TGO growth rate is essentially favored for offering sustainable protection, especially in thermal barrier coatings (TBC). However, it can only be achieved currently by a strategy of adding the third element (Pt or reactive elements) into NiAl during traditional diffusion- or deposition-based synthesis of the coating. Here we present a highly flexible Al-ion radiation-based synthesis of advanced NiAl coatings, achieving low TGO growth rate without relying on the third element addition. Our results expand the strategy for lowering TGO growth rate and demonstrate potentials for ion radiation in advancing materials synthesis.
Finite key analysis for symmetric attacks in quantum key distribution
DOE Office of Scientific and Technical Information (OSTI.GOV)
Meyer, Tim; Kampermann, Hermann; Kleinmann, Matthias
2006-10-15
We introduce a constructive method to calculate the achievable secret key rate for a generic class of quantum key distribution protocols, when only a finite number n of signals is given. Our approach is applicable to all scenarios in which the quantum state shared by Alice and Bob is known. In particular, we consider the six state protocol with symmetric eavesdropping attacks, and show that for a small number of signals, i.e., below n{approx}10{sup 4}, the finite key rate differs significantly from the asymptotic value for n{yields}{infinity}. However, for larger n, a good approximation of the asymptotic value is found.more » We also study secret key rates for protocols using higher-dimensional quantum systems.« less
Controlling The Spread of Land-Attack Cruise Missiles.
1995-01-01
propellant additives and agents: (1) Bonding agents as follows: (i) tris(l-(2-methyl)aziridinyl) phosphine oxide (MAPO); (ii) trimesoyl-l(2-ethyl...Triphenyl bismuth (TPB) (ii) Isophorone diisocyanate (IPDI) (3) Burning rate modifiers as follows: (i) Catocene (ii) N-butyl- ferrocene (iii...Butacene (iv) Other ferrocene derivatives 9g Controlling the Spread of Land-Attack Cruise Missiles (4) Nitrate esters and nitrato plasticizers as
DETERMINING ELECTRONIC AND CYBER ATTACK RISK LEVEL FOR UNMANNED AIRCRAFT IN A CONTESTED ENVIRONMENT
2016-08-01
AIR COMMAND AND STAFF COLLEGE AIR UNIVERSITY DETERMINING ELECTRONIC AND CYBER ATTACK RISK LEVEL FOR UNMANNED AIRCRAFT IN A CONTESTED ENVIRONMENT...iii ABSTRACT During operations in a contested air environment, adversary electronic warfare (EW) and cyber-attack capability will pose a high...10 Russian Federation Electronic Warfare Systems ...................................................12 Chinese Cyber Warfare Program
Trape, Sébastien
2008-01-30
The International Shark Attack File mentions only four unprovoked shark attacks on the coast of West Africa during the period 1828-2004, an area where high concentrations of sharks and 17 species potentially dangerous to man have been observed. To investigate if the frequency of shark attacks could be really low and not just under-reported and whether there are potentially sharks that might attack in the area, a study was carried out in Dakar and the Cap Vert peninsula, Senegal. Personnel of health facilities, administrative services, traditional authorities and groups of fishermen from the region of Dakar were interviewed about the occurrence of shark attacks, and visual censuses were conducted along the coastline to investigate shark communities associated with the coasts of Dakar and the Cap Vert peninsula. Six attacks were documented for the period 1947-2005, including two fatal ones attributed to the tiger shark Galeocerdo cuvieri. All attacks concerned fishermen and only one occurred after 1970. Sharks were observed year round along the coastline in waters 3-15 m depth. Two species potentially dangerous for man, the nurse shark Ginglymostoma cirratum and the blacktip shark Carcharhinus limbatus, represented together 94% of 1,071 sharks enumerated during 1,459 hours of observations. Threatening behaviour from sharks was noted in 12 encounters (1.1%), including 8 encounters with C. limbatus, one with Galeocerdo cuvieri and 3 with unidentified sharks. These findings suggest that the frequency of shark attacks on the coast of West Africa is underestimated. However, they also indicate that the risk is very low despite the abundance of sharks. In Dakar area, most encounters along the coastline with potentially dangerous species do not result in an attack. Compared to other causes of water related deaths, the incidence of shark attack appears negligible, at least one thousand fold lower.
Trape, Sébastien
2008-01-01
Background The International Shark Attack File mentions only four unprovoked shark attacks on the coast of West Africa during the period 1828–2004, an area where high concentrations of sharks and 17 species potentially dangerous to man have been observed. To investigate if the frequency of shark attacks could be really low and not just under-reported and whether there are potentially sharks that might attack in the area, a study was carried out in Dakar and the Cap Vert peninsula, Senegal. Methodology/Principal Findings Personnel of health facilities, administrative services, traditional authorities and groups of fishermen from the region of Dakar were interviewed about the occurrence of shark attacks, and visual censuses were conducted along the coastline to investigate shark communities associated with the coasts of Dakar and the Cap Vert peninsula. Six attacks were documented for the period 1947–2005, including two fatal ones attributed to the tiger shark Galeocerdo cuvieri. All attacks concerned fishermen and only one occurred after 1970. Sharks were observed year round along the coastline in waters 3–15 m depth. Two species potentially dangerous for man, the nurse shark Ginglymostoma cirratum and the blacktip shark Carcharhinus limbatus, represented together 94% of 1,071 sharks enumerated during 1,459 hours of observations. Threatening behaviour from sharks was noted in 12 encounters (1.1%), including 8 encounters with C. limbatus, one with Galeocerdo cuvieri and 3 with unidentified sharks. Conclusions/Significance These findings suggest that the frequency of shark attacks on the coast of West Africa is underestimated. However, they also indicate that the risk is very low despite the abundance of sharks. In Dakar area, most encounters along the coastline with potentially dangerous species do not result in an attack. Compared to other causes of water related deaths, the incidence of shark attack appears negligible, at least one thousand fold lower. PMID:18231582
Quantum key distribution with hacking countermeasures and long term field trial.
Dixon, A R; Dynes, J F; Lucamarini, M; Fröhlich, B; Sharpe, A W; Plews, A; Tam, W; Yuan, Z L; Tanizawa, Y; Sato, H; Kawamura, S; Fujiwara, M; Sasaki, M; Shields, A J
2017-05-16
Quantum key distribution's (QKD's) central and unique claim is information theoretic security. However there is an increasing understanding that the security of a QKD system relies not only on theoretical security proofs, but also on how closely the physical system matches the theoretical models and prevents attacks due to discrepancies. These side channel or hacking attacks exploit physical devices which do not necessarily behave precisely as the theory expects. As such there is a need for QKD systems to be demonstrated to provide security both in the theoretical and physical implementation. We report here a QKD system designed with this goal in mind, providing a more resilient target against possible hacking attacks including Trojan horse, detector blinding, phase randomisation and photon number splitting attacks. The QKD system was installed into a 45 km link of a metropolitan telecom network for a 2.5 month period, during which time the system operated continuously and distributed 1.33 Tbits of secure key data with a stable secure key rate over 200 kbit/s. In addition security is demonstrated against coherent attacks that are more general than the collective class of attacks usually considered.
Ceyhan, Mehmet; Tezer, Hasan; Yildirim, Inci
2009-01-01
Hepatitis A, varicella, and mumps are common in countries without universal immunization against these infections. Information about secondary household attack rates is limited. A prospective study was conducted in children <16 y of age who had household contact with the above infections. History for previous infections and vaccination was obtained from the parents. Specific antibodies in the sera during enrollment and at the end of the longest incubation periods were determined. A total of 113 children who had household contact with cases of varicella, hepatitis A, or mumps were enrolled. Secondary attack rate (SAR) was lower in hepatitis A (43.3%) than those for varicella (75.0%) and mumps (65.3%) (p<0.05). Rate of secondary asymptomatic infections was 25.6% in the hepatitis A group, 3.1% in the varicella group, and 16.6% in the mumps group. Positive predictive value (PPV) of the history was 100% for all 3 diseases and negative predictive value (NPV) was 85% for hepatitis A, 80.0% for varicella, and 56.2% for mumps. In conclusion, asymptomatic infections are important in the calculation of SARs in household contacts. PPV and NPV of medical history taken from parents might be useful when deciding the need for vaccination.
NASA Astrophysics Data System (ADS)
Tsifouti, A.; Triantaphillidou, S.; Larabi, M. C.; Doré, G.; Bilissi, E.; Psarrou, A.
2015-01-01
In this investigation we study the effects of compression and frame rate reduction on the performance of four video analytics (VA) systems utilizing a low complexity scenario, such as the Sterile Zone (SZ). Additionally, we identify the most influential scene parameters affecting the performance of these systems. The SZ scenario is a scene consisting of a fence, not to be trespassed, and an area with grass. The VA system needs to alarm when there is an intruder (attack) entering the scene. The work includes testing of the systems with uncompressed and compressed (using H.264/MPEG-4 AVC at 25 and 5 frames per second) footage, consisting of quantified scene parameters. The scene parameters include descriptions of scene contrast, camera to subject distance, and attack portrayal. Additional footage, including only distractions (no attacks) is also investigated. Results have shown that every system has performed differently for each compression/frame rate level, whilst overall, compression has not adversely affected the performance of the systems. Frame rate reduction has decreased performance and scene parameters have influenced the behavior of the systems differently. Most false alarms were triggered with a distraction clip, including abrupt shadows through the fence. Findings could contribute to the improvement of VA systems.
NASA Technical Reports Server (NTRS)
Ogburn, Marilyn E.; Foster, John V.; Hoffler, Keith D.
2005-01-01
This paper reviews the use of piloted simulation at Langley Research Center as part of the NASA High-Angle-of-Attack Technology Program (HATP), which was created to provide concepts and methods for the design of advanced fighter aircraft. A major research activity within this program is the development of the design processes required to take advantage of the benefits of advanced control concepts for high-angle-of-attack agility. Fundamental methodologies associated with the effective use of piloted simulation for this research are described, particularly those relating to the test techniques, validation of the test results, and design guideline/criteria development.
Aerodynamic characteristics at high angles of attack
NASA Technical Reports Server (NTRS)
Chambers, J. R.
1977-01-01
An overview is presented of the aerodynamic inputs required for analysis of flight dynamics in the high-angle-of-attack regime wherein large-disturbance, nonlinear effects predominate. An outline of the presentation is presented. The discussion includes: (1) some important fundamental phenomena which determine to a large extent the aerodynamic characteristics of airplanes at high angles of attack; (2) static and dynamic aerodynamic characteristics near the stall; (3) aerodynamics of the spin; (4) test techniques used in stall/spin studies; (5) applications of aerodynamic data to problems in flight dynamics in the stall/spin area; and (6) the outlook for future research in the area.
Chu, Chen-Yi; de Silva, U Chandimal; Guo, Jin-Peng; Wang, Yong; Wen, Liang; Lee, Vernon J; Li, Shen-Long; Huang, Liu-Yu
2017-07-01
Many studies have suggested the effectiveness of single control measures in the containment and mitigation of pandemic influenza A (H1N1) 2009. The effects of combined interventions by multiple control measures in reducing the impact of an influenza A (H1N1) 2009 outbreak in a closed physical training camp in Beijing, China were evaluated. Oseltamivir was prescribed for the treatment of confirmed cases and possible cases and as prophylaxis for all other participants in this training camp. Public health control measures were applied simultaneously, including the isolation of patients and possible cases, personal protection and hygiene, and social distancing measures. Symptom surveillance of all participants was initiated, and the actual attack rate was calculated. For comparison, the theoretical attack rate for this outbreak was projected using the Newton-Raphson numerical method. A total of 3256 persons were present at the physical training camp. During the outbreak, 405 (68.3%) possible cases and 26 (4.4%) confirmed cases were reported before the intervention and completed oseltamivir treatment; 162 (27.3%) possible cases were reported after the intervention and received part treatment and part prophylaxis. The other 2663 participants completed oseltamivir prophylaxis. Of the possible cases, 181 with fever ≥38.5°C were isolated. The actual attack rate for this outbreak of pandemic influenza A (H1N1) 2009 was 18.2%, which is much lower than the theoretical attack rate of 80% projected. Combined interventions of large-scale antiviral ring prophylaxis and treatment and public health control measures could be applied to reduce the magnitude of influenza A (H1N1) 2009 outbreaks in closed settings. Copyright © 2017 The Authors. Published by Elsevier Ltd.. All rights reserved.
Does fluoride in drinking water delay tooth eruption?
Jolaoso, Ismail Adeyemi; Kumar, Jayanth; Moss, Mark E
2014-01-01
The objectives of this study are to determine the effect of fluoride exposure on permanent tooth eruption patterns as well as to understand its effect on caries attack rate by accounting for the number of erupted tooth surfaces. We analyzed data from the 1986-1987 National Survey of Oral Health of US Schoolchildren to determine the mean number of erupted permanent teeth and permanent first molars according to fluoride level in drinking water. The analysis included 13,348 children aged 5-17 years with a history of single residence. We also estimated the attack rate (decayed, missing, and filled surfaces/surfaces at risk) for fluoride deficient, suboptimal, and optimally fluoridated areas adjusting for covariates. Multivariable statistical analyses were performed to control for potential confounders. By age 7, almost all permanent first molars had erupted. The adjusted mean number of erupted permanent first molars per child were 3.81, 3.67, and 3.92 in areas with <0.3, 0.3-<0.7, and 0.7-1.2 ppm of fluoride, respectively. The adjusted caries attack rate in the first permanent molars among 5- to 17-year-old children was 93, 81, and 78 per 1,000 surfaces in fluoride deficient, suboptimal, and optimally fluoridated areas, respectively (P < 0.0001). This pattern of higher first molar attack rate among children in the fluoride-deficient communities was also observed in all erupted teeth. Exposure to fluoride in drinking water did not delay the eruption of permanent teeth. The observed difference in dental caries experience among children exposed to different fluoride levels could not be explained by the timing of eruption of permanent teeth. © 2014 American Association of Public Health Dentistry.
Messinger, Susanna M; Ostling, Annette
2013-11-01
Predation interactions are an important element of ecological communities. Population spatial structure has been shown to influence predator evolution, resulting in the evolution of a reduced predator attack rate; however, the evolutionary role of traits governing predator and prey ecology is unknown. The evolutionary effect of spatial structure on a predator's attack rate has primarily been explored assuming a fixed metapopulation spatial structure, and understood in terms of group selection. But endogenously generated, emergent spatial structure is common in nature. Furthermore, the evolutionary influence of ecological traits may be mediated through the spatial self-structuring process. Drawing from theory on pathogens, the evolutionary effect of emergent spatial structure can be understood in terms of self-shading, where a voracious predator limits its long-term invasion potential by reducing local prey availability. Here we formalize the effects of self-shading for predators using spatial moment equations. Then, through simulations, we show that in a spatial context self-shading leads to relationships between predator-prey ecology and the predator's attack rate that are not expected in a non-spatial context. Some relationships are analogous to relationships already shown for host-pathogen interactions, but others represent new trait dimensions. Finally, since understanding the effects of ecology using existing self-shading theory requires simplifications of the emergent spatial structure that do not apply well here, we also develop metrics describing the complex spatial structure of the predator and prey populations to help us explain the evolutionary effect of predator and prey ecology in the context of self-shading. The identification of these metrics may provide a step towards expansion of the predictive domain of self-shading theory to more complex spatial dynamics. Copyright © 2013 Elsevier Inc. All rights reserved.
Identification of aerodynamic models for maneuvering aircraft
NASA Technical Reports Server (NTRS)
Chin, Suei; Lan, C. Edward
1990-01-01
Due to the requirement of increased performance and maneuverability, the flight envelope of a modern fighter is frequently extended to the high angle-of-attack regime. Vehicles maneuvering in this regime are subjected to nonlinear aerodynamic loads. The nonlinearities are due mainly to three-dimensional separated flow and concentrated vortex flow that occur at large angles of attack. Accurate prediction of these nonlinear airloads is of great importance in the analysis of a vehicle's flight motion and in the design of its flight control system. A satisfactory evaluation of the performance envelope of the aircraft may require a large number of coupled computations, one for each change in initial conditions. To avoid the disadvantage of solving the coupled flow-field equations and aircraft's motion equations, an alternate approach is to use a mathematical modeling to describe the steady and unsteady aerodynamics for the aircraft equations of motion. Aerodynamic forces and moments acting on a rapidly maneuvering aircraft are, in general, nonlinear functions of motion variables, their time rate of change, and the history of maneuvering. A numerical method was developed to analyze the nonlinear and time-dependent aerodynamic response to establish the generalized indicial function in terms of motion variables and their time rates of change.
Preliminary design study of a lateral-directional control system using thrust vectoring
NASA Technical Reports Server (NTRS)
Lallman, F. J.
1985-01-01
A preliminary design of a lateral-directional control system for a fighter airplane capable of controlled operation at extreme angles of attack is developed. The subject airplane is representative of a modern twin-engine high-performance jet fighter, is equipped with ailerons, rudder, and independent horizontal-tail surfaces. Idealized bidirectional thrust-vectoring engine nozzles are appended to the mathematic model of the airplane to provide additional control moments. Optimal schedules for lateral and directional pseudo control variables are calculated. Use of pseudo controls results in coordinated operation of the aerodynamic and thrust-vectoring controls with minimum coupling between the lateral and directional airplane dynamics. Linear quadratic regulator designs are used to specify a preliminary flight control system to improve the stability and response characteristics of the airplane. Simulated responses to step pilot control inputs are stable and well behaved. For lateral stick deflections, peak stability axis roll rates are between 1.25 and 1.60 rad/sec over an angle-of-attack range of 10 deg to 70 deg. For rudder pedal deflections, the roll rates accompanying the sideslip responses can be arrested by small lateral stick motions.
Avalappampatty Sivasamy, Aneetha; Sundan, Bose
2015-01-01
The ever expanding communication requirements in today's world demand extensive and efficient network systems with equally efficient and reliable security features integrated for safe, confident, and secured communication and data transfer. Providing effective security protocols for any network environment, therefore, assumes paramount importance. Attempts are made continuously for designing more efficient and dynamic network intrusion detection models. In this work, an approach based on Hotelling's T2 method, a multivariate statistical analysis technique, has been employed for intrusion detection, especially in network environments. Components such as preprocessing, multivariate statistical analysis, and attack detection have been incorporated in developing the multivariate Hotelling's T2 statistical model and necessary profiles have been generated based on the T-square distance metrics. With a threshold range obtained using the central limit theorem, observed traffic profiles have been classified either as normal or attack types. Performance of the model, as evaluated through validation and testing using KDD Cup'99 dataset, has shown very high detection rates for all classes with low false alarm rates. Accuracy of the model presented in this work, in comparison with the existing models, has been found to be much better. PMID:26357668
Sivasamy, Aneetha Avalappampatty; Sundan, Bose
2015-01-01
The ever expanding communication requirements in today's world demand extensive and efficient network systems with equally efficient and reliable security features integrated for safe, confident, and secured communication and data transfer. Providing effective security protocols for any network environment, therefore, assumes paramount importance. Attempts are made continuously for designing more efficient and dynamic network intrusion detection models. In this work, an approach based on Hotelling's T(2) method, a multivariate statistical analysis technique, has been employed for intrusion detection, especially in network environments. Components such as preprocessing, multivariate statistical analysis, and attack detection have been incorporated in developing the multivariate Hotelling's T(2) statistical model and necessary profiles have been generated based on the T-square distance metrics. With a threshold range obtained using the central limit theorem, observed traffic profiles have been classified either as normal or attack types. Performance of the model, as evaluated through validation and testing using KDD Cup'99 dataset, has shown very high detection rates for all classes with low false alarm rates. Accuracy of the model presented in this work, in comparison with the existing models, has been found to be much better.
Shang, Jianyu; Deng, Zhihong; Fu, Mengyin; Wang, Shunting
2016-01-01
Traditional artillery guidance can significantly improve the attack accuracy and overall combat efficiency of projectiles, which makes it more adaptable to the information warfare of the future. Obviously, the accurate measurement of artillery spin rate, which has long been regarded as a daunting task, is the basis of precise guidance and control. Magnetoresistive (MR) sensors can be applied to spin rate measurement, especially in the high-spin and high-g projectile launch environment. In this paper, based on the theory of a MR sensor measuring spin rate, the mathematical relationship model between the frequency of MR sensor output and projectile spin rate was established through a fundamental derivation. By analyzing the characteristics of MR sensor output whose frequency varies with time, this paper proposed the Chirp z-Transform (CZT) time-frequency (TF) domain analysis method based on the rolling window of a Blackman window function (BCZT) which can accurately extract the projectile spin rate. To put it into practice, BCZT was applied to measure the spin rate of 155 mm artillery projectile. After extracting the spin rate, the impact that launch rotational angular velocity and aspect angle have on the extraction accuracy of the spin rate was analyzed. Simulation results show that the BCZT TF domain analysis method can effectively and accurately measure the projectile spin rate, especially in a high-spin and high-g projectile launch environment. PMID:27322266
Side-force alleviation on slender, pointed forebodies at high angles of attack
NASA Technical Reports Server (NTRS)
Rao, D. M.
1978-01-01
A new device was proposed for alleviating high angle-of-attack side force on slender, pointed forebodies. A symmetrical pair of separation strips in the form of helical ridges are applied to the forebody to disrupt the primary lee-side vortices and thereby avoid the instability that produces vortex asymmetry. Preliminary wind tunnel tests at Mach 0.3 and Reynolds no. 5,250,000 on a variety of forebody configurations and on a wing-body combination at angles of attack up to 56 degrees, demonstrated the effectiveness of the device.
Measurement-Device-Independent Quantum Key Distribution over 200 km
NASA Astrophysics Data System (ADS)
Tang, Yan-Lin; Yin, Hua-Lei; Chen, Si-Jing; Liu, Yang; Zhang, Wei-Jun; Jiang, Xiao; Zhang, Lu; Wang, Jian; You, Li-Xing; Guan, Jian-Yu; Yang, Dong-Xu; Wang, Zhen; Liang, Hao; Zhang, Zhen; Zhou, Nan; Ma, Xiongfeng; Chen, Teng-Yun; Zhang, Qiang; Pan, Jian-Wei
2014-11-01
Measurement-device-independent quantum key distribution (MDIQKD) protocol is immune to all attacks on detection and guarantees the information-theoretical security even with imperfect single-photon detectors. Recently, several proof-of-principle demonstrations of MDIQKD have been achieved. Those experiments, although novel, are implemented through limited distance with a key rate less than 0.1 bit /s . Here, by developing a 75 MHz clock rate fully automatic and highly stable system and superconducting nanowire single-photon detectors with detection efficiencies of more than 40%, we extend the secure transmission distance of MDIQKD to 200 km and achieve a secure key rate 3 orders of magnitude higher. These results pave the way towards a quantum network with measurement-device-independent security.
Kroes, Anneke; Broekgaarden, Colette; Castellanos Uribe, Marcos; May, Sean; van Loon, Joop J A; Dicke, Marcel
2017-01-01
Plants are commonly attacked by multiple herbivorous species. Yet, little is known about transcriptional patterns underlying plant responses to multiple insect attackers feeding simultaneously. Here, we assessed transcriptomic responses of Arabidopsis thaliana plants to simultaneous feeding by Plutella xylostella caterpillars and Brevicoryne brassicae aphids in comparison to plants infested by P. xylostella caterpillars alone, using microarray analysis. We particularly investigated how aphid feeding interferes with the transcriptomic response to P. xylostella caterpillars and whether this interference is dependent on aphid density and time since aphid attack. Various JA-responsive genes were up-regulated in response to feeding by P. xylostella caterpillars. The additional presence of aphids, both at low and high densities, clearly affected the transcriptional plant response to caterpillars. Interestingly, some important modulators of plant defense signalling, including WRKY transcription factor genes and ABA-dependent genes, were differentially induced in response to simultaneous aphid feeding at low or high density compared with responses to P. xylostella caterpillars feeding alone. Furthermore, aphids affected the P. xylostella-induced transcriptomic response in a density-dependent manner, which caused an acceleration in plant response against dual insect attack at high aphid density compared to dual insect attack at low aphid density. In conclusion, our study provides evidence that aphids influence the caterpillar-induced transcriptional response of A. thaliana in a density-dependent manner. It highlights the importance of addressing insect density to understand how plant responses to single attackers interfere with responses to other attackers and thus underlines the importance of the dynamics of transcriptional plant responses to multiple herbivory.
Ballare, C. L.; Scopel, A. L.; Stapleton, A. E.; Yanovsky, M. J.
1996-01-01
To study functional relationships between the effects of solar ultraviolet-B radiation (UV-B) on different aspects of the physiology of a wild plant, we carried out exclusion experiments in the field with the summer annual Datura ferox L. Solar UV-B incident over Buenos Aires reduced daytime seedling emergence, inhibited stem elongation and leaf expansion, and tended to reduce biomass accumulation during early growth. However, UV-B had no effect on calculated net assimilation rate. Using a monoclonal antibody specific to the cyclobutane-pyrimidine dimer (CPD), we found that plants receiving full sunlight had more CPDs per unit of DNA than plants shielded from solar UV-B, but the positive correlation between UV-B and CPD burden tended to level off at high (near solar) UV-B levels. At our field site, Datura plants were consumed by leaf beetles (Coleoptera), and the proportion of plants attacked by insects declined with the amount of UV-B received during growth. Field experiments showed that plant exposure to solar UV-B reduced the likelihood of leaf beetle attack by one-half. Our results highlight the complexities associated with scaling plant responses to solar UV-B, because they show: (a) a lack of correspondence between UV-B effects on net assimilation rate and whole-plant growth rate, (b) nonlinear UV-B dose-response curves, and (c) UV-B effects of plant attractiveness to natural herbivores. PMID:12226382
Diabetes - preventing heart attack and stroke
Diabetes complications - heart; Coronary artery disease - diabetes; CAD - diabetes; Cerebrovascular disease - diabetes ... with diabetes have a higher chance of having heart attacks and strokes. Smoking and having high blood ...
Corrosion of Alloy 690 process pot by sulfate containing high level radioactive waste at feed stage
NASA Astrophysics Data System (ADS)
Sengupta, P.; Soudamini, N.; Kaushik, C. P.; Jagannath; Mishra, R. K.; Kale, G. B.; Raj, K.; Das, D.; Sharma, B. P.
2008-02-01
Prolonged exposure of Alloy 690 process pot to sulfate containing high level radioactive waste leads to (a) depletion of Cr from the alloy, (b) intergranular attack and (c) building up of Cr 2O 3-Ni 2O 3-Fe 2O 3 mixed oxide surface layer containing Na and Cs sulfate precipitates. Time dependence of material loss from Alloy 690 is found to follow a linear relationship of the type Δ w (material loss) = -7.05 + 0.05 t. Corrosion rate calculated for 2400 h exposure is 3.66 mpy. Cr and Ni leach rates obtained for the same sample are 1.61 g m -2 d -1 and 2.52 g m -2 d -1, respectively. Ni leach rates followed a linear time dependence relationship of the type dNL Ni/d t (leach rate) = -0.09 + 0.027 t, whereas Cr leach rates obeyed a non-linear relationship of the type dNL Cr/d t (leach rate) = 0.241 + 0.027 t - 1.33 × 10 -4t1/2.
Comparative rates of violence in chimpanzees and humans.
Wrangham, Richard W; Wilson, Michael L; Muller, Martin N
2006-01-01
This paper tests the proposal that chimpanzees (Pan troglodytes) and humans have similar rates of death from intraspecific aggression, whereas chimpanzees have higher rates of non-lethal physical attack (Boehm 1999, Hierarchy in the forest: the evolution of egalitarian behavior. Harvard University Press). First, we assembled data on lethal aggression from long-term studies of nine communities of chimpanzees living in five populations. We calculated rates of death from intraspecific aggression both within and between communities. Variation among communities in mortality rates from aggression was high, and rates of death from intercommunity and intracommunity aggression were not correlated. Estimates for average rates of lethal violence for chimpanzees proved to be similar to average rates for subsistence societies of hunter-gatherers and farmers. Second, we compared rates of non-lethal physical aggression for two populations of chimpanzees and one population of recently settled hunter-gatherers. Chimpanzees had rates of aggression between two and three orders of magnitude higher than humans. These preliminary data support Boehm's hypothesis.
Ultra high bypass Nacelle aerodynamics inlet flow-through high angle of attack distortion test
NASA Technical Reports Server (NTRS)
Larkin, Michael J.; Schweiger, Paul S.
1992-01-01
A flow-through inlet test program was conducted to evaluate inlet test methods and determine the impact of the fan on inlet separation when operating at large angles of attack. A total of 16 model configurations of approximately 1/6 scale were tested. A comparison of these flow-through results with powered data indicates the presence of the fan increased separation operation 3 degrees to 4 degrees over the flow through inlet. Rods and screens located at the fan face station, that redistribute the flow, achieved simulation of the powered-fan results for separation angle of attack. Concepts to reduce inlet distortion and increase angle of attack capability were also evaluated. Vortex generators located on the inlet surface increased inlet angle of attack capability up to 2 degrees and reduced inlet distortion in the separated region. Finally, a method of simulating the fan/inlet aerodynamic interaction using blockage sizing method has been defined. With this method, a static blockage device used with a flow-through model will approximate the same inlet onset of separation angle of attack and distortion pattern that would be obtained with an inlet model containing a powered fan.
In-flight flow visualization results from the X-29A aircraft at high angles of attack
NASA Technical Reports Server (NTRS)
Delfrate, John H.; Saltzman, John A.
1992-01-01
Flow visualization techniques were used on the X-29A aircraft at high angles of attack to study the vortical flow off the forebody and the surface flow on the wing and tail. The forebody vortex system was studied because asymmetries in the vortex system were suspected of inducing uncommanded yawing moments at zero sideslip. Smoke enabled visualization of the vortex system and correlation of its orientation with flight yawing moment data. Good agreement was found between vortex system asymmetries and the occurrence of yawing moments. Surface flow on the forward-swept wing of the X-29A was studied using tufts and flow cones. As angle of attack increased, separated flow initiated at the root and spread outboard encompassing the full wing by 30 deg angle of attack. In general, the progression of the separated flow correlated well with subscale model lift data. Surface flow on the vertical tail was also studied using tufts and flow cones. As angle of attack increased, separated flow initiated at the root and spread upward. The area of separated flow on the vertical tail at angles of attack greater than 20 deg correlated well with the marked decrease in aircraft directional stability.
Presentation Attack Detection for Iris Recognition System Using NIR Camera Sensor
Nguyen, Dat Tien; Baek, Na Rae; Pham, Tuyen Danh; Park, Kang Ryoung
2018-01-01
Among biometric recognition systems such as fingerprint, finger-vein, or face, the iris recognition system has proven to be effective for achieving a high recognition accuracy and security level. However, several recent studies have indicated that an iris recognition system can be fooled by using presentation attack images that are recaptured using high-quality printed images or by contact lenses with printed iris patterns. As a result, this potential threat can reduce the security level of an iris recognition system. In this study, we propose a new presentation attack detection (PAD) method for an iris recognition system (iPAD) using a near infrared light (NIR) camera image. To detect presentation attack images, we first localized the iris region of the input iris image using circular edge detection (CED). Based on the result of iris localization, we extracted the image features using deep learning-based and handcrafted-based methods. The input iris images were then classified into real and presentation attack categories using support vector machines (SVM). Through extensive experiments with two public datasets, we show that our proposed method effectively solves the iris recognition presentation attack detection problem and produces detection accuracy superior to previous studies. PMID:29695113
Presentation Attack Detection for Iris Recognition System Using NIR Camera Sensor.
Nguyen, Dat Tien; Baek, Na Rae; Pham, Tuyen Danh; Park, Kang Ryoung
2018-04-24
Among biometric recognition systems such as fingerprint, finger-vein, or face, the iris recognition system has proven to be effective for achieving a high recognition accuracy and security level. However, several recent studies have indicated that an iris recognition system can be fooled by using presentation attack images that are recaptured using high-quality printed images or by contact lenses with printed iris patterns. As a result, this potential threat can reduce the security level of an iris recognition system. In this study, we propose a new presentation attack detection (PAD) method for an iris recognition system (iPAD) using a near infrared light (NIR) camera image. To detect presentation attack images, we first localized the iris region of the input iris image using circular edge detection (CED). Based on the result of iris localization, we extracted the image features using deep learning-based and handcrafted-based methods. The input iris images were then classified into real and presentation attack categories using support vector machines (SVM). Through extensive experiments with two public datasets, we show that our proposed method effectively solves the iris recognition presentation attack detection problem and produces detection accuracy superior to previous studies.
Talaat, Hossam Sanyelbhaa; Kabel, Abdel-Magied Hasan; Khaliel, Lobna Hamed; Abuhadied, Ghada; El-Naga, Heba Abd El-Rehem Abo; Talaat, Ahmed Sanyelbhaa
2016-06-01
Several studies correlated between vitamin D deficiency and the development, and the recurrence of benign positional paroxysmal vertigo (BPPV), but none of them proved that treatment of vitamin D deficiency would reduce the recurrence rate of BPPV. This study aims to detect the effect of treatment of severe vitamin D deficiency on the recurrence rate of BPPV. The inclusion criteria of the study group were: (1) Unilateral, idiopathic, posterior canal BPPV with no history suggestive of secondary BPPV and (2) 25-hydroxyvitamin D3 level ≤10 ng/ml. All subjects enrolled in the current study underwent detailed clinical history, audiovestibular evaluation consisting of pure-tone audiometry, Immittancemetry, Videonystugmography, serum 25-hydroxyvitamin D3 assessment, and Dual-energy X-ray absorptiometry (DXA). Vitamin D therapy was prescribed for the study group. Serum 25-hydroxyvitamin D3 level was evaluated twice, on recruitment into the study group and 3 months after commencing vitamin D therapy. According to the results of the second evaluation of serum 25-hydroxyvitamin D3, the study group was subdivided into two subgroups: Subgroup (I): including 28 subjects who disclosed elevation of serum 25-hydroxyvitamin D3 level; improvement ≥10 ng/ml. Subgroup (II): including 65 patients who disclosed elevation of serum 25-hydroxyvitamin D3 levels <10 ng/ml. The study group was followed up for 18 months in order to observe the recurrence of BPPV. The differences between both study subgroups (I) & (II) regarding age, sex distribution, and bone mineral density were insignificant. The number of subjects who had recurrence of BPPV in subgroup (I) was 4 (14%) versus 28 subjects (43%) in subgroup (II). The mean values for recurrent attacks/subject in subgroups (I) & (II) were 0.18, and 0.66 attack/subject respectively; these differences between both subgroups were of high statistical significance (p<0.01). The Odds Ratio for development of recurrence of BPPV in subjects with severe vitamin D deficiency was 4.54 (95% CI: 1.41-14.58, p<0.01). The relapse attacks of BPPV affected both ears irrespective of the ear showing the original BPPV attack. The present study indicates that improvement of serum 25-hydroxyvitamin D3 levels is associated with substantial decrease in recurrence of BPPV. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.
Huynh, Bich Tram; Tual, Séverine; Turbelin, Clément; Pelat, Camille; Cecchi, Lorenzo; D'Amato, Gennaro; Blanchon, Thierry; Annesi-Maesano, Isabella
2010-09-01
To investigate for the first time the short-term effects of airborne pollen counts on general practitioner (GP) consultations for asthma attacks in the Greater Paris area between 2003-2007. Counts were available for common pollens (Betula, Cupressa, Fraxinus and Poaceae). Weekly data on GP visits for asthma attacks were obtained from the French GP Sentinel Network. A quasi-Poisson regression with generalised additive models was implemented. Short-term effects of pollen counts were assessed using single and multi-pollen models after adjustment for air pollution and influenza. A mean weekly incidence rate of 25.4 cases of asthma attacks per 100,000 inhabitants was estimated during the study period. The strongest significant association between asthma attacks and pollen counts was registered for grass (Poaceae) in the same week of asthma attacks, with a slight reduction of the effect observed in the multi-pollen model. Adjusted relative risk for Poaceae was 1.54 (95% CI: 1.33-1.79) with an inter-quartile range increase of 17.6 grains/m3 during the pollen season. For the first time, a significant short-term association was observed between Poaceae pollen counts and consultations for asthma attacks as seen by GPs. These findings need to be confirmed by more consistent time-series and investigations on a daily basis.
Contextual Factors Among Indiscriminate or Large Attacks on Food or Water Supplies, 1946-2015
Hunter, Paul R.
2016-01-01
This research updates previous inventories of malicious attacks on food and water and includes data from 1946 through mid-2015. A systematic search of news reports, databases, and previous inventories of poisoning events was undertaken. Incidents that threatened or were intended to achieve direct harm to humans and that were either relatively large (more than 4 victims) or indiscriminate in intent or realization were included. Agents could be chemical, biological, or radionuclear. Reports of candidate incidents were subjected to systematic inclusion and exclusion criteria as well as validity analysis (not always clearly undertaken in previous inventories of such attacks). We summarize contextual aspects of the attacks that may be important for scenario prioritization, modelling, and defensive preparedness. Opportunity, and particularly access to dangerous agents, is key to most realized attacks. The most common motives and relative success rate in causing harm were very different between food and water attacks. The likelihood that people were made ill or died also varied by food or water mode and according to motive and opportunity for delivery of the hazardous agent. Deaths and illness associated with attacks during food manufacture and prior to sale have been fewer than those in some other contexts. Valuable opportunities for food defense improvements are identified in other contexts, especially food prepared in private or community settings. PMID:26889577
Knowledge of Signs and Symptoms of Heart Attack and Stroke among Singapore Residents
Quah, Joy Li Juan; Yap, Susan; Cheah, Si Oon; Ng, Yih Yng; Goh, E. Shaun; Doctor, Nausheen; Leong, Benjamin Sieu-Hon; Tiah, Ling; Chia, Michael Yih Chong; Ong, Marcus Eng Hock
2014-01-01
Aim. To determine the level of knowledge of signs and symptoms of heart attack and stroke in Singapore resident population, in comparison to the global community. Methods. A population based, random sample of 7,840 household addresses was selected from a validated national sampling frame. Each participant was asked eight questions on signs and symptoms of heart attack and 10 questions on stroke. Results. The response rate was 65.2% with 4,192 respondents. The level of knowledge for preselected, common signs and symptoms of heart attack and stroke was 57.8% and 57.1%, respectively. The respondents scored a mean of 5.0 (SD 2.4) out of 8 for heart attack, while they scored a mean of 6.8 (SD 2.9) out of 10 for stroke. Respondents who were ≥50 years, with lower educational level, and unemployed/retired had the least knowledge about both conditions. The level of knowledge of signs and symptoms of heart attack and stroke in Singapore is comparable to USA and Canada. Conclusion. We found a comparable knowledge of stroke and heart attack signs and symptoms in the community to countries within the same economic, educational, and healthcare strata. However older persons, those with lower educational level and those who are unemployed/retired, require more public health education efforts. PMID:24812623
McGruder, Henraya E; Greenlund, Kurt J; Malarcher, Ann M; Antoine, Theresa L; Croft, Janet B; Zheng, Zhi-Jie
2008-01-01
Heart attacks are more prevalent among Hispanics and Blacks than among Whites. Bystanders must be able to recognize heart attack symptoms and activate the emergency response system in order to receive time-dependent therapies that increase survival. This study estimated racial/ethnic disparities in awareness of heart attack symptoms in a sample of the US population. We evaluated data from 33,059 adult participants in the 2001 National Health Interview Survey. Respondents indicated their awareness of five heart attack symptoms and the need to call 911 in the presence of such symptoms. Hispanics and Blacks were less likely to recognize each heart attack symptom than were Whites (P<.05). Hispanics (25.6%), people aged 18-24 years (33.6%), men (39.1%), and those with less than a high school education (31.3%) were less likely to recognize all five heart attack symptoms and report that they would call 911 than were Whites (45.8%), Blacks (36.1%), respondents aged 45-64 years (47.7%) and >65 years (43.9%), and those with a high school education (41.0%) or more (45.6%). In multivariate logistic regression analyses, Blacks (OR .73, 95% CI .66-.80) and Hispanics (OR .49, 95% CI .45-.54) were less likely than were Whites to recognize all five heart attack symptoms and the need to call 911 if someone had these symptoms. One Healthy People 2010 goal is to eliminate health disparities. Racial/ethnic disparities exist in knowledge of heart attack symptoms and the need to call 911. Special educational efforts should focus on Black and Hispanic populations and highlight the importance of symptoms and time-dependent therapies.
Autonomic changes after treatment of agoraphobia with panic attacks.
Roth, W T; Telch, M J; Taylor, C B; Agras, W S
1988-04-01
Twenty-three patients meeting DSM-III criteria for agoraphobia with panic attacks and 14 age-, race-, and sex-matched nonanxious controls were tested in the laboratory and on a test walk in a shopping mall. The patients were tested before and after about 15 weeks of treatment with placebo and exposure therapy, imipramine and exposure therapy, or imipramine and initial antiexposure instructions. Controls were tested twice at a similar interval, but without any treatment. On test day 1, patients compared to controls showed higher average heart rate and skin conductance levels and greater numbers of skin conductance fluctuations in the laboratory, and higher heart rates before and during the test walk. Between pretreatment and posttreatment tests, clinical ratings improved and skin conductance levels decreased in all treatment groups. Heart rate levels in the laboratory, on the other hand, decreased in patients on placebo and rose in patients on imipramine. Thus, imipramine compromises the usefulness of heart rate as a measure of emotional arousal. Higher pretreatment heart rates predicted greater clinical improvement.
CPAD: Cyber-Physical Attack Detection
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ferragut, Erik M; Laska, Jason A
The CPAD technology relates to anomaly detection and more specifically to cyber physical attack detection. It infers underlying physical relationships between components by analyzing the sensor measurements of a system. It then uses these measurements to detect signs of a non-physically realizable state, which is indicative of an integrity attack on the system. CPAD can be used on any highly-instrumented cyber-physical system to detect integrity attacks and identify the component or components compromised. It has applications to power transmission and distribution, nuclear and industrial plants, and complex vehicles.
Side-channel-free quantum key distribution.
Braunstein, Samuel L; Pirandola, Stefano
2012-03-30
Quantum key distribution (QKD) offers the promise of absolutely secure communications. However, proofs of absolute security often assume perfect implementation from theory to experiment. Thus, existing systems may be prone to insidious side-channel attacks that rely on flaws in experimental implementation. Here we replace all real channels with virtual channels in a QKD protocol, making the relevant detectors and settings inside private spaces inaccessible while simultaneously acting as a Hilbert space filter to eliminate side-channel attacks. By using a quantum memory we find that we are able to bound the secret-key rate below by the entanglement-distillation rate computed over the distributed states.
2011-12-01
of residuals versus iteration number. “ Intermit ” and “retheta” are turbulence parameters for turbulence intermittency and . 42 ix Figure 4-7 – Wall...is based on the fact that “the flow‐field adapts at a very fast rate to changes in the free stream conditions as the vehicle is accelerating. This...4‐6 – Example of residuals versus iteration number. “ Intermit ” and “retheta” are turbulence parameters for turbulence intermittency and
Kyol Goeu (‘Wind Overload’) Part I: A Cultural Syndrome of Orthostatic Panic among Khmer Refugees
Hinton, Devon; Um, Khin; Ba, Phalnarith
2009-01-01
Certain cultural syndromes seem to increase the risk of panic attacks by generating catastrophic cognitions about symptoms of autonomic arousal. These schemas create a constant anxious scanning of the body, hence facilitating, maintaining, and producing panic. As a case in point, a Khmer fainting syndrome,‘wind overload’ (kyol goeu), results in dire expectations concerning the autonomic symptoms experienced upon standing, thus contributing to the high rate of orthostatically induced panic observed in this population. PMID:20852723
NASA Technical Reports Server (NTRS)
Gai, S. L.; Cain, T.; Joe, W. S.; Sandeman, R. J.; Miller, C. G.
1988-01-01
Heat transfer rate measurements have been obtained at 0, 5, 15, and 21 deg angles-of-attack for a straight biconic scale model of an aeroassisted orbital vehicle proposed for planetary probe missions. Heat-transfer distributions were measured using palladium thin-film resistance gauges deposited on a glass-ceramic substrate. The windward heat transfer correlations were based on equilibrium flow in the shock layer of the model, although the flow may depart from equilibrium in the flow-field.
Analysis of Wind Tunnel Lateral Oscillatory Data of the F-16XL Aircraft
NASA Technical Reports Server (NTRS)
Klein, Vladislav; Murphy, Patrick C.; Szyba, Nathan M.
2004-01-01
Static and dynamic wind tunnel tests were performed on an 18% scale model of the F-16XL aircraft. These tests were performed over a wide range of angles of attack and sideslip with oscillation amplitudes from 5 deg. to 30 deg. and reduced frequencies from 0.073 to 0.269. Harmonic analysis was used to estimate Fourier coefficients and in-phase and out-of-phase components. For frequency dependent data from rolling oscillations, a two-step regression method was used to obtain unsteady models (indicial functions), and derivatives due to sideslip angle, roll rate and yaw rate from in-phase and out-of-phase components. Frequency dependence was found for angles of attack between 20 deg. and 50 deg. Reduced values of coefficient of determination and increased values of fit error were found for angles of attack between 35 deg. and 45 deg. An attempt to estimate model parameters from yaw oscillations failed, probably due to the low number of test cases at different frequencies.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Liu, Jun; Qiu, Qiwen; Chen, Xiaochi
An experimental study is carried out with the aim to understand the interacted mechanism between carbonation and chloride aerosol attack in ordinary Portland cement (OPC) concrete. Effects of carbonation on the chloride profile, the chloride binding capacity and the chloride diffusion coefficient are evaluated. Besides, effect of chloride aerosol attack on the carbonation rate is investigated. Concrete specimens with three water-to-cement ratios (0.38, 0.47 and 0.53) are fabricated in this work. Tested results demonstrate that carbonation remarkably affects the chloride profile, reduces the chloride binding capacity, and also accelerates the rate of chloride ion diffusion of concrete. Besides, the presencemore » of chloride aerosol can lead to lower the carbonation depth and increase the pH value of carbonated concrete. Microscopic properties such as morphology, porosity, and pore size distribution for the contaminated concretes are explored by scanning electron microscope and mercury intrusion porosimetry, which provide strong evidence to these research findings.« less
Erosion of aluminum 6061-T6 under cavitation attack in mineral oil and water
NASA Technical Reports Server (NTRS)
Rao, B. C. S.; Buckley, D. H.
1985-01-01
Studies of the erosion of aluminum 6061-T6 under cavitation attack in distilled water, ordinary tap water and a viscous mineral oil are presented. The mean depth of penetration for the mineral oil was about 40 percent of that for water at the end of a 40 min test. The mean depth of penetration and its rate did not differ significantly for distilled and tap water. The mean depth of penetration rate for both distilled and tap water increased to a maximum and then decreased with test duration, while that for mineral oil had a maximum during the initial period. The ratio h/2a of the pit depth h to the pit diameter 2a varied from 0.04 to 0.13 in water and from 0.06 to 0.20 in mineral oil. Scanning electron microscopy indicates that the pits are initially formed over the grain boundaries and precipitates while the surface grains are deformed under cavitation attack.
USDA-ARS?s Scientific Manuscript database
We evaluated the susceptibility of 15 mango cultivars to the attack of Anastrepha ludens and A. obliqua, the main Tephritid pests of this crop in Mexico. In a field experiment, bagged, fruit-bearing branches were exposed to gravid females of both fly species. Infestation rates, developmental time,...
Nkwembe-Ngabana, Edith; Ahuka-Mundeke, Steve; Kebela-Ilunga, Benoit; Londa, Emile Okitolo; Muyembe-Tamfum, Jean-Jacques
2017-01-01
In the Democratic Republic of the Congo (DRC), several influenza epidemics are ignored because they are confused with other infectious diseases which have similar symptoms. Our study aims to assess influenza epidemics occurred in the DRC before 2008, year of the implementation of the influenza surveillance program in the DRC. We searched all the documents [articles, report,…] about influenza epidemic or acute respiratory infections [ARI] in the DRC before 2008 by using chosen key words. Epidemic description elements were identified and analyzed in each report. 4 documents have been found that had no article published. The sites of the epidemic outbreak were the rural health zones in Koshibanda and Kahemba, Bandundu [1995 and 2007], in Bosobolo, Equator [2002] and in Kinshasa [2002-2003]. Attack and lethality rates were 3.9% and 16% in Koshibanda respectively; 0.1% and 2% in Kinshasa; 47.5% and 1.5% in Bosobolo and 14.6% and 2.9% in Kahemba. Children less than 5 years of age were the most affected. Their attack rates ranged between 22.6 and 57.7% and lethality rates ranged between 3.2 and 3.7%. The two epidemics in Bosobolo and Kinshasa were associated with H3N2 influenza virus. This literature review highlights a high morbidity and mortality due to rare influenza epidemics in the DRC.
Rubaltelli, Enrico; Scrimin, Sara; Moscardino, Ughetta; Priolo, Giulia; Buodo, Giulia
2018-03-02
Terrorist attacks have a destabilizing impact on the general population, causing distress and fear. However, not all individuals are equally susceptible to the effects of terror threat. This study aimed to examine whether exposure to terrorism-related pictures interacted with individual differences in environmental sensitivity and psychophysiological response to stress to explain people's risk perception, operationalized as perceived likelihood of a terrorist attack and willingness to trade off one's privacy to increase national security. Ninety-five university students were randomly assigned to one of two conditions (terrorism-related vs. neutral pictures). After watching the pictures, they answered questions concerning risk perception and completed questionnaires. Stress was induced by the Mannheim Multicomponent Stress Test, during which heart rate was recorded. Results showed that the perceived likelihood of future attacks was affected by the interaction between exposure to terrorism pictures and psychophysiological reactivity to stress, whereas willingness to trade off one's privacy to improve national security was influenced by the interaction between exposure to terrorism pictures and environmental sensitivity. The study suggests that individuals high in sensitivity and psychophysiological stress reactivity are particularly affected by terrorism-related pictures. Psychologists should direct their efforts to raise general awareness of the negative effects, especially for some people, of such media coverage. © 2018 The British Psychological Society.
CORROSION EXPERIENCE WITH ALUMINUM POWDER PRODUCTS
DOE Office of Scientific and Technical Information (OSTI.GOV)
Draley, J.E.; Ruther, W.E.; Greenberg, S.
1963-11-01
Extrusions of aluminum alloy powder products were obtained from several sources and evaluated for corrosion resistance to high-temperature (260-- 350 deg C) water. Several types of tubing impact-extruded by ALCOA were tested. The stronger tabing (M655) failed very rapidly. The weaker tubing suffered extensive localized surface attack and penetration of the corrosion attack along the extrusion direction after prolonged ( approximates 3 months) exposure to 290 deg C water. A precorrosion heat treatment was effective in reducing both types of attack on the weaker tubing. Armour Research Foundation supplied several types of tubing extraded through a bridge die. All tubesmore » failed on prolonged ( approximates 8 months) corrosion in 290 deg C water at the longitudinal bond lines. These lines were formed by the rejoining of the metal streams passing over the mandrel supports in the die during extrusion. Directly extruded tubing supplied by the Torrance Brass Company also failed on extended exposure to 290 deg C water. Many experimental rod extrusions (from Armour Research Foundation and Trefimetaux) exhibited corrosion resistance to static 290 deg C water equivalent to that of wrought alloys. The Trefimetaux specimens were also tested in rapidly flowing water at 315 deg C. Under these conditions a corrosion rate significantly faster than for the wrought alloy was measured. (auth)« less
Cognitive and affective matching effects in persuasion: an amplification perspective.
Clarkson, Joshua J; Tormala, Zakary L; Rucker, Derek D
2011-11-01
Past research suggests that cognitive and affective attitudes are more open to change toward cognitive and affective (i.e., matched) persuasive attacks, respectively. The present research investigates how attitude certainty influences this openness. Although an extensive literature suggests that certainty generally reduces an attitude's openness to change, the authors explore the possibility that certainty might increase an attitude's openness to change in the context of affective or cognitive appeals. Based on the recently proposed amplification hypothesis, the authors posit that high (vs. low) attitude certainty will boost the resistance of attitudes to mismatched attacks (e.g., affective attitudes attacked by cognitive messages) but boost the openness of attitudes to matched attacks (e.g., affective attitudes attacked by affective messages). Two experiments provide support for this hypothesis. Implications for increasing the openness of attitudes to both matched and mismatched attacks are discussed.
How to Minimize the Attack Rate during Multiple Influenza Outbreaks in a Heterogeneous Population
Fung, Isaac Chun-Hai; Antia, Rustom; Handel, Andreas
2012-01-01
Background If repeated interventions against multiple outbreaks are not feasible, there is an optimal level of control during the first outbreak. Any control measures above that optimal level will lead to an outcome that may be as sub-optimal as that achieved by an intervention that is too weak. We studied this scenario in more detail. Method An age-stratified ordinary-differential-equation model was constructed to study infectious disease outbreaks and control in a population made up of two groups, adults and children. The model was parameterized using influenza as an example. This model was used to simulate two consecutive outbreaks of the same infectious disease, with an intervention applied only during the first outbreak, and to study how cumulative attack rates were influenced by population composition, strength of inter-group transmission, and different ways of triggering and implementing the interventions. We assumed that recovered individuals are fully immune and the intervention does not confer immunity. Results/Conclusion The optimal intervention depended on coupling between the two population sub-groups, the length, strength and timing of the intervention, and the population composition. Population heterogeneity affected intervention strategies only for very low cross-transmission between groups. At more realistic values, coupling between the groups led to synchronization of outbreaks and therefore intervention strategies that were optimal in reducing the attack rates for each subgroup and the population overall coincided. For a sustained intervention of low efficacy, early intervention was found to be best, while at high efficacies, a delayed start was better. For short interventions, a delayed start was always advantageous, independent of the intervention efficacy. For most scenarios, starting the intervention after a certain cumulative proportion of children were infected seemed more robust in achieving close to optimal outcomes compared to a strategy that used a specified duration after an outbreak’s beginning as the trigger. PMID:22701558
Buehlmann, Manuela; Beltraminelli, Helmut; Strub, Christoph; Bircher, Andreas; Jordan, Xavier; Battegay, Manuel; Itin, Peter; Widmer, Andreas F
2009-04-01
To investigate a large outbreak of scabies in an intensive care unit of a university hospital and an affiliated rehabilitation center, and to establish effective control measures to prevent further transmission. Outbreak investigation. The intensive care unit of a 750-bed university hospital and an affiliated 92-bed rehabilitation center. All exposed individuals were screened by a senior staff dermatologist. Scabies was diagnosed on the basis of (1) identification of mites by skin scraping, (2) identification of mites by dermoscopy, or (3) clinical examination of patients without history of prior treatment for typical burrows. During a follow-up period of 6 months, the attack rate was calculated as the number of symptomatic individuals divided by the total number of exposed individuals. All exposed healthcare workers (HCWs) and their household members underwent preemptive treatment. Initially, the most effective registered drug in Switzerland (ie, topical lindane) was prescribed, but this prescription was switched to topical permethrin or systemic ivermectin as a result of the progression of the outbreak. Individuals with any signs or symptoms of scabies underwent dermatological examination. Within 7 months, 19 cases of scabies were diagnosed, 6 in children with a mean age of 3.1 years after exposure to the index patient with HIV and crusted scabies. A total of 1,640 exposed individuals underwent preemptive treatment. The highest attack rate of 26%-32% was observed among HCWs involved in the care of the index patient. A too-restricted definition of individuals at risk, noncompliance with treatment, and the limited effectiveness of lindane likely led to treatment failure, relapse, and reinfestation within families. Crusted scabies resulted in high attack rates among HCWs and household contacts. Timely institution of hygienic precautions with close monitoring and widespread, simultaneous scabicide treatment of all exposed individuals are essential for control of an outbreak.
Household Transmission of Influenza A(H1N1)pdm09 in the Pandemic and Post-Pandemic Seasons
Casado, Itziar; Martínez-Baz, Iván; Burgui, Rosana; Irisarri, Fátima; Arriazu, Maite; Elía, Fernando; Navascués, Ana; Ezpeleta, Carmen; Aldaz, Pablo; Castilla, Jesús
2014-01-01
Background The transmission of influenza viruses occurs person to person and is facilitated by contacts within enclosed environments such as households. The aim of this study was to evaluate secondary attack rates and factors associated with household transmission of laboratory-confirmed influenza A(H1N1)pdm09 in the pandemic and post-pandemic seasons. Methods During the 2009–2010 and 2010–2011 influenza seasons, 76 sentinel physicians in Navarra, Spain, took nasopharyngeal and pharyngeal swabs from patients diagnosed with influenza-like illness. A trained nurse telephoned households of those patients who were laboratory-confirmed for influenza A(H1N1)pdm09 to ask about the symptoms, risk factors and vaccination status of each household member. Results In the 405 households with a patient laboratory-confirmed for influenza A(H1N1)pdm09, 977 susceptible contacts were identified; 16% of them (95% CI 14–19%) presented influenza-like illness and were considered as secondary cases. The secondary attack rate was 14% in 2009–2010 and 19% in the 2010–2011 season (p = 0.049), an increase that mainly affected persons with major chronic conditions. In the multivariate logistic regression analysis, the risk of being a secondary case was higher in the 2010–2011 season than in the 2009–2010 season (adjusted odds ratio: 1.72; 95% CI 1.17–2.54), and in children under 5 years, with a decreasing risk in older contacts. Influenza vaccination was associated with lesser incidence of influenza-like illness near to statistical significance (adjusted odds ratio: 0.29; 95% CI 0.08–1.03). Conclusion The secondary attack rate in households was higher in the second season than in the first pandemic season. Children had a greater risk of infection. Preventive measures should be maintained in the second pandemic season, especially in high-risk persons. PMID:25254376
Localized attacks on spatially embedded networks with dependencies.
Berezin, Yehiel; Bashan, Amir; Danziger, Michael M; Li, Daqing; Havlin, Shlomo
2015-03-11
Many real world complex systems such as critical infrastructure networks are embedded in space and their components may depend on one another to function. They are also susceptible to geographically localized damage caused by malicious attacks or natural disasters. Here, we study a general model of spatially embedded networks with dependencies under localized attacks. We develop a theoretical and numerical approach to describe and predict the effects of localized attacks on spatially embedded systems with dependencies. Surprisingly, we find that a localized attack can cause substantially more damage than an equivalent random attack. Furthermore, we find that for a broad range of parameters, systems which appear stable are in fact metastable. Though robust to random failures-even of finite fraction-if subjected to a localized attack larger than a critical size which is independent of the system size (i.e., a zero fraction), a cascading failure emerges which leads to complete system collapse. Our results demonstrate the potential high risk of localized attacks on spatially embedded network systems with dependencies and may be useful for designing more resilient systems.