Attack rates of dengue fever in Swedish travellers.
Rocklöv, Joacim; Lohr, Wolfgang; Hjertqvist, Marika; Wilder-Smith, Annelies
2014-06-01
Dengue is endemic in many countries visited by Swedish travellers. We aimed to determine the attack rate of dengue in Swedish travellers and analyse the trends over time and the geographical variation. We obtained the following data from the Swedish Institute for Communicable Disease Control for the y 1995-2010: number of Swedish residents with confirmed dengue, the country and year of infection. We also obtained registers on the Swedish annual air traveller arrivals to dengue endemic areas from the United Nations World Tourist Organization for the time period. We estimated attack rates with 95% confidence intervals (CI). In total, 925 Swedish travellers with confirmed dengue were reported. We found an increasing trend over time for most destinations. The majority of the dengue cases were acquired in Thailand (492 out of 925 travellers; 53%), with an attack rate of 13.6 (95% CI 12.7, 14.4) per 100,000 travellers. However, the 2 highest attack rates per 100,000 travellers were found for Sri Lanka (45.3, 95% CI 34.3, 56.4) and Bangladesh (42.6, 95% CI 23.8, 61.5). Information on attack rates in travellers is more helpful in guiding travel medicine practitioners than reports of absolute numbers, as the latter reflect travel preferences rather than the true risk. Although the majority of dengue infections in Swedish travellers were acquired in Thailand, the attack rates for dengue in travellers to Sri Lanka and Bangladesh were much higher. These data aid in refining information on the risk of dengue in travellers.
NASA Technical Reports Server (NTRS)
Campbell, J. F.
1975-01-01
Wind-tunnel data were obtained at a free-stream Mach number of 0.26 for a range of model angle of attack, jet thrust coefficient, and jet location. Results of this study show that the sectional effects to spanwise blowing are strongly dependent on angle of attack, jet thrust coefficient, and span location; the largest effects occur at the highest angles of attack and thrust coefficients and on the inboard portion of the wing. Full vortex lift was achieved at the inboard span station with a small blowing rate, but successively higher blowing rates were necessary to achieve full vortex lift at increased span distances. It is shown that spanwise blowing increases lift throughout the angle-of-attack range, delays wing stall to higher angles of attack, and improves the induced-drag polars. The leading-edge suction analogy can be used to estimate the section and total lifts resulting from spanwise blowing.
Liu, Ying; Song, Shaoxia; Wang, Wei; Geng, Xingyi; Liu, Wen; Han, Debiao; Liu, Ti; Wu, Julong; Li, Zhong; Wang, Xianjun; Bi, Zhenqiang
2015-12-01
To analyze the status of acute upper respiratory infection and influenza-like illness (ILI) among community residents in Jinan in 2015, and to make a understand of the patient's medical treatment behavior and influenza vaccination coverage status in 2014. Balloting method and convenient sampling method were used to launch a household survey. The residents who had been in Jinan for more than 3 months were selected, to investigate the residents' attack ratio of acute upper respiratory and influenza-like from Jan. 8 to Feb. 7, 2015. Totally, 1 300 persons from 410 families were involved in this survey which recovered 1 241 valid questionnaires with the efficiency of 95.5%. Based on the national age-urban demographic statistics in 2010, the attack rates of acute respiratory infections, influenza-like illness were estimated by the direct standardization method, and the influenza vaccination rates were also calculated in this study. χ(2)-test method was used to compare the different status of incidence and vaccination among residents with different features. The attack rate of acute upper respiratory infection and influenza-like illness in Jinan from January 8, 2015 to February 7, 2015 were 30.2% (375 cases), and 6.1% (76 cases), respectively, with a standardized rate of 29.1% and 5.4%. 5.3% (66 cases) of the residents have vaccinated with the influenza vaccine inoculation, with an adjusted rate of 3.8%. The attack rate difference of acute upper respiratory tract infections was statistically significant between each age group (χ(2)=17.121, P= 0.002). The 0-4 age group had a highest attack rate (45.4%) of acute respiratory infection, while the 15-24 age group got the lowest (26.5%). 38.9% (146 cases) of patients went for a treatment in hospital. Among them, 37.7% (55 cases) of them selected the county level hospitals for treatment, 37.7% (55 cases) selected the community level hospitals, and 24.6% (36 cases) selected the individual clinic. Significant differences of influenza-like illness attack rate between each age group were also found in this study (χ(2)=76.79, P<0.001). 0-4 age group had the highest attack rate (22.7%). 81.6% (62 cases) of the ILI sought treatment in the hospital, of which 53.2% (33 cases) selected county level hospital or above, and 33.9% (21 cases) selected community hospital, and 12.9% (8 cases) selected the individual clinic. The attack rate of acute upper respiratory infections among the residents of Jinan was high, whereas that of influenza-like illness was relatively low. 0-4 age group had a higher risk of ILI than other age groups. Most of the cases were likely to take the treatment in large hospitals. In general, the coverage rate of influenza vaccination was relatively low.
Minari, A; Husni, R; Avery, R K; Longworth, D L; DeCamp, M; Bertin, M; Schilz, R; Smedira, N; Haug, M T; Mehta, A; Gordon, S M
2002-12-01
Invasive aspergillosis (IA) is associated with significant morbidity and mortality in solid organ transplant recipients but data on the incidence rates stratified by type of solid organ are limited. To describe the attack rates and incidence of IA in solid organ transplant recipients, and the impact of universal Aspergillus prophylaxis (aerosolized amphotericin B or oral itraconazole) in lung transplant recipients. The 2,046 patients who received solid organ transplants at the Cleveland Clinic Foundation from January 1990 through 1999 were studied. Cases were ascertained through computerized records of microbiology, cytology, and pathology reports. Definite IA was defined as a positive culture and pathology showing septate hyphae. Probable IA was clinical disease and either a positive culture or histopathology. Disseminated IA was defined as involvement of two or more noncontiguous anatomic sites. We identified 33 cases of IA (28% disseminated) in 2,046 patients (attack rate = 1.6%) for an incidence of 4.8 cases per 1,000 patient-years (33 cases/6,813 pt-years). Both the attack and the incidence rates were significantly higher for lung transplant recipients vs. other transplant recipients: lung 12.8% (24 cases/188 patients) or 40.5 cases/1,000-pt year vs. heart 0.4% (3/686) or 1.4 per 1,000-pt year vs. liver 0.7% (3/439) or 2.1 per 1,000-pt year vs. renal 0.4% (3/733) or 1.2 per 1,000-pt year (P < 0.01). The incidence of IA was highest during the first year after transplantation for all categories, but cases occurred after the first year of transplantation only in lung transplant recipients. The attack rate of IA in lung transplant recipients was significantly lower after institution of routine Aspergillus prophylaxis (4.9% vs. 18.2%, P < 0.05). The highest incidence and attack rate of invasive aspergillosis among solid organ transplant recipients occurs in lung transplant recipients and supports the routine use of Aspergillus prophylaxis for at least one year after transplantation in this group.
Szykman, Micaela; Engh, Anne L.; Van Horn, Russell C.; Boydston, Erin E.; Scribner, Kim T.; Holekamp, Kay E.
2003-01-01
Spotted hyenas (Crocuta crocuta) are gregarious carnivores. The females are socially dominant to males, and adult males rarely direct aggression toward adult females. This study analyzed all cases in which adult immigrant males behaved aggressively toward adult females in a large population of free-living hyenas in Kenya, observed for 11 years. Our goals were to describe the conditions under which male attacks on females occur, and address possible adaptive functions. Most aggression directed by adult immigrant males against females occurred when coalitions of two or more males attacked a single adult female, who typically responded by defending herself and fighting back. Male aggression against females frequently occurred at sites of ungulate kills, but males never behaved aggressively toward females over food, and all male attacks on females were unprovoked. Although no mounting or other copulatory behaviors ever occurred during or immediately after an attack, the number of male attacks on females peaked around the time of conception. Daily rates at which males attacked females did not vary with female social rank. However, daily attack rates did vary significantly with female reproductive state, and the highest rates of male attack on females were observed during the two stages of the reproductive cycle during which females were most likely to conceive litters. The adaptive significance of male aggression against females in this species remains unknown, but a tight association between male attacks on females and a female's time of conception provides strong evidence of some role for male aggression in hyena sexual behavior. In particular, our data are consistent with hypotheses suggesting that male aggression toward females in this species either serves to inform females about male fitness or represents sexual harassment.
[Mortality from heart attack in Belgrade population during the period 1990-2004].
Ratkov, Isidora; Sipetić, Sandra; Vlajinac, Hristina; Sekeres, Bojan
2008-01-01
In most countries, cardiovascular diseases are the leading disorders, with ischemic heart diseases being the leading cause of death. According to WHO data, every year about 17 million people die of cardiovascular diseases, which is 30% of all deaths. Ischemic heart diseases contribute from one-third to one-half of all deaths due to cardiovascular diseases. Three point eight million men and 3.4 million women in the world die every year from ischemic heart diseases, and in Europe about 2 million. The highest mortality rate from ischemic heart diseases occurs in India, China and Russia. The aim of this descriptive epidemiological study was to determine heart attack mortality in Belgrade population during the period 1990-2004. In the study, we conducted investigation of Belgrade population during the period 1990-2004. Mortality data were obtained from the city institution for statistics. The mortality rates were calculated based on the total Belgrade population obtained from the mean values for the last two register years (1991 and 2002). The mortality rates were standardized using the direct method of standardization according to the world (Segi) standard population. In the Belgrade population during the period 1990-2004, the participation of mortality rate due to heart attack among deaths from cardiovascular diseases was 17% in males and 10% in females. In Belgrade male population, mean standardized mortality rates (per 100,000 habitants) were 50.5 for heart attack, 8.3 for chronic ischemic heart diseases and 4.6 for angina pectoris, while in females the rates were 30.8, 6.7 and 4.2, respectively. Mortality from ischemic heart diseases and from heart attack was higher in males than in females. During the studied 15-year period, on average 755 males and 483 females died due to heart attack every year. Mean standardized mortality rates per 100,000 habitants were 50.0 in male and 31.1 in female population. Males died 1.6 times more frequently from heart attack than females. During the studied period, mean standardized mortality rates from heart attack, in the population aged over 30 increased with age both in male and female population. However, males tended to die from heart attack at an earlier age than females, with death rates for males approximately the same as those for women who were 10 years older. In Belgrade during the period from 1990-2004, we found that there was an increasing trend in mortality rate due to cardiovascular diseases, while the trend of mortality rate from heart attack was constant with insignificant oscillations.
Preemptive Striking in Individual and Group Conflict.
Mifune, Nobuhiro; Hizen, Yoichi; Kamijo, Yoshio; Okano, Yoshitaka
2016-01-01
In this study, we conducted a laboratory experiment to assess preemptive striking by and towards individuals or groups. In the framework of a preemptive strike game, we set the following four conditions: one person faced another person, one person faced a three-person group, a three-person group faced an individual, and a three-person group faced another three-person group. Previous studies have revealed that greed is activated when participants belong to a group, while fear is activated when participants interact with a group, and further, that attacking behaviors in the preemptive strike game are driven by fear. These observations led to a hypothesis that high attack rates would be realized when participants interact with a group, regardless of whether the participants make decisions as individuals or a group. The results of our experiment, however, rejected this hypothesis. Among the four conditions, the attack rate was highest when a three-person group faced an individual. As possible reasons for our observation, we discuss the potential threat stemming from the imbalance in the effectiveness of attack between individuals and groups, and the (incorrect) belief by groups that single individuals would be more likely to attack out of fear.
Preemptive Striking in Individual and Group Conflict
Mifune, Nobuhiro; Hizen, Yoichi; Kamijo, Yoshio; Okano, Yoshitaka
2016-01-01
In this study, we conducted a laboratory experiment to assess preemptive striking by and towards individuals or groups. In the framework of a preemptive strike game, we set the following four conditions: one person faced another person, one person faced a three-person group, a three-person group faced an individual, and a three-person group faced another three-person group. Previous studies have revealed that greed is activated when participants belong to a group, while fear is activated when participants interact with a group, and further, that attacking behaviors in the preemptive strike game are driven by fear. These observations led to a hypothesis that high attack rates would be realized when participants interact with a group, regardless of whether the participants make decisions as individuals or a group. The results of our experiment, however, rejected this hypothesis. Among the four conditions, the attack rate was highest when a three-person group faced an individual. As possible reasons for our observation, we discuss the potential threat stemming from the imbalance in the effectiveness of attack between individuals and groups, and the (incorrect) belief by groups that single individuals would be more likely to attack out of fear. PMID:27148871
Voorhoeve, A M; Muller, A S; Schulpen, T W; Gemert, W; Valkenburg, H A; Ensering, H E
1977-12-01
Between April 1974 and March 1976 surveillance of measles has been conducted by 12 fieldworkers making fortnightly home visits among a total population of 24,000 living in nearly 4000 households scattered in variable density throughout an area of 87 sq km in the northern division of the Machakos district, Kenya. The diagnosis of measles was verified by one of the project's physicians according to standardized procedures and was, whenever possible, supported by virus isolation and serum antibody level determination. Because not all reported patients were actually seen during the period of clinical manifestations, the diagnosis remained doubtful in a number of cases. Incidence and mortality figures have been estimated with 95% confidence limits based on the assumption that doubtful cases represent a probability of measles of .33 and probable cases a probability of .67. The estimated attack rate for the susceptible population 0-15 years of age was 13.5%. When related to all children--susceptible or not--the attack rate was highest in the 1-2 years age group (11%). Almost 15% of cases occurred below the age of one year, 1% below 6 months of age and 6% between 6 and 8 months. The estimated case fatality rate was 6.5%, fatality being highest between 1 and 2 years of age. For the age group 0-15 years measles accounted for 16.7% of all deaths. The estimated death rate per 100,000 total population was 113. The epidemiological pattern of measles suggests continuous re-introduction of the measles virus in a dispersed population causing micro-outbreaks of the disease in geographically widely separated spots throughout the year which tends to keep the proportion of susceptibles down and the attack rate during a protracted epidemic relatively low.
Could missile attacks trigger acute myocardial infarction?
Zubaid, Mohammad; Suresh, Cheiyil G; Thalib, Lukman; Rashed, Wafa
2006-08-01
During the Gulf war in 2003, Kuwait was targeted with missile attacks for 10 consecutive days. Our objective is to evaluate the influence of missile attacks on the incidence of acute myocardial infarction (AMI). We retrospectively compared the number of admissions for AMI presenting to a major general hospital during missile attacks period (MAP) in 2003 with four control periods. MAP and each control period consisted of the same number of days (10 days). The four control periods were the 10 days immediately before and after MAP; and the same time period as MAP for the years 2001 and 2002. The number of admissions for AMI was highest during MAP, 21 cases compared to 14-16 cases in the four control periods, with a trend towards increase during MAP (incidence rate ratio = 1.59; 95% CI 0.95 to 2.66, p < 0.07). The number of admissions for AMI during the first 5 days of MAP was significantly higher compared to the first 5 days of the four control periods (incidence rate ratio = 2.43; 95% CI 1.23 to 4.26, p < 0.01). The observed AMI admission rate during the first 5 days of MAP was significantly higher than expected for a 5-day period in the years 2001, 2002 and 2003. This increase was specific to AMI and did not affect other acute cardiac conditions. Missile attacks were associated with an increase in the incidence of AMI. This increase was specific to AMI and did not influence acute cardiac conditions.
Descriptive epidemiology of a cholera outbreak in Kaduna State, Northwest Nigeria, 2014.
Sule, Ibrahim Baffa; Yahaya, Mohammed; Aisha, Abubakar Ahmed; Zainab, Ahmed Datti; Ummulkhulthum, Bajoga; Nguku, Patrick
2017-01-01
Cholera is an acute gastrointestinal infection caused by Vibrio cholerae, which may lead to severe dehydration and death if not treated. This analysis is aimed at highlighting the magnitude, pattern and trend of cholera outbreak that occurred in Kaduna State in 2014. We obtained the 2014 cholera line-list from the Kaduna State Disease Surveillance and Notification officer (DSNO). We described the outbreaks in time, place and person using Epi-info 7 and Health Mapper. A total of 1468 case-patients and 54 deaths were recorded, giving a case fatality rate (CFR) of 3.68%. Female case-patients were 809(55.08%). The median age for case-patients was 15 years, with an age range of 0.04-90 years. Age specific case fatality rate (ASCFR) is highest among the > 60 years. Seven (30%) out of the 23 local government areas (LGAs) in Kaduna State were affected by the cholera outbreak in 2014. Igabi LGA has the highest attack rate (150.46 per 100,000 population) while Chikun LGA has the lowest attack rate (12.22 per 100,000 population). Chikun LGA records the highest CFR (17.54%). Cholera infection spread across LGAs sharing the same borders. The outbreak started from the first epidemic week of 2014 and lasted over 33 weeks. Our analysis revealed a protracted cholera outbreak that gradually increases in magnitude throughout the first half of 2014 and spread within contiguous LGAs. We recommended the strengthening of the state's diseases surveillance system towards timely detection and early response to disease outbreaks in the future.
Retrospective evaluation of coyote attacks in dogs: 154 cases (1997-2012).
Frauenthal, Virginia M; Bergman, Philip; Murtaugh, Robert J
2017-05-01
To describe the clinical presentation and outcome of known attacks in client-owned dogs caused by the common coyote, Canis latrans. Retrospective observational study. Private referral hospital. One hundred fifty-four client-owned dogs known to be attacked by coyotes. None. Records from a private referral hospital from May 1997 through December 2012 were reviewed. Time of day and month/season of year, signalment, body temperature, heart rate, respiratory rate, body weight, location and severity of wounds inflicted, common injuries, length of hospitalization, necessity of surgical wound repair under anesthesia, antimicrobial use and mortality were recorded. Eighty-six percent of dogs presenting following coyote attack weighed <10 kg. Overall mortality rate was 15.6%. Dogs with bite wounds to the thorax had the highest mortality at 21.3%. Criteria for systemic inflammatory response syndrome (SIRS) based on admission vital signs were met in 58.8% of dogs and the presence of SIRS was significantly associated with mortality (P < 0.001). Common coyote-induced injuries included rib fracture (38/154; 24.6%), pulmonary contusion (30/154; 19.4%), tracheal tear (18/154; 11.6%), pneumothorax (16/154; 10.3%), abdominal wall hernia (9/154; 5.8%), and abdominal penetrating wounds (8/146; 5.5%). Dogs <10 kg were significantly more likely to incur wounds to multiple body parts or sustain abdominal penetrating wounds. The presence of rib fracture was significantly associated with mortality. Frequency of coyote attacks over the time of this study increased by 330%. Coyote attacks on dogs are a problem in Southern California and are associated with substantial morbidity and mortality, especially in dogs with wounds to the thorax. Aggressive management involving surgical wound repair was associated with survival to discharge. © Veterinary Emergency and Critical Care Society 2017.
Understanding estimated worker absenteeism rates during an influenza pandemic.
Thanner, Meridith H; Links, Jonathan M; Meltzer, Martin I; Scheulen, James J; Kelen, Gabor D
2011-01-01
Published employee absenteeism estimates during an influenza pandemic range from 10 to 40 percent. The purpose of this study was to estimate daily employee absenteeism through the duration of an influenza pandemic and to determine the relative impact of key variables used to derive the estimates. Using the Centers for Disease Control and Prevention's FluWorkLoss program, the authors estimated the number of absent employees on any given day over the course of a simulated 8-week pandemic wave by using varying attack rates. Employee data from a university with a large academic health system were used. Sensitivity of the program outputs to variation in predictor (inputs) values was assessed. Finally, the authors examined and documented the algorithmic sequence of the program. Using a 35 percent attack rate, a total of 47,270 workdays (or 3.4 percent of all available workdays) would be lost over the course of an 8-week pandemic among a population of 35,026 employees. The highest (peak) daily absenteeism estimate was 5.8 percent (minimum 4.8 percent; maximum 7.4 percent). Sensitivity analysis revealed that varying days missed for nonhospitalized illness had the greatest potential effect on peak absence rate (3.1 to 17.2 percent). Peak absence with 15 and 25 percent attack rates were 2.5 percent and 4.2 percent, respectively. The impact of an influenza pandemic on employee availability may be less than originally thought, even with a high attack rate. These data are generalizable and are not specific to institutions of higher education or medical centers. Thus, these findings provide realistic and useful estimates for influenza pandemic planning for most organizations.
Pandemic (H1N1) 2009 Outbreak at Camp for Children with Hematologic and Oncologic Conditions
Morrison, Cori; Maurtua-Neumann, Paola; Myint, Myo Thwin; Drury, Stacy S.
2011-01-01
An outbreak of influenza A pandemic (H1N1) 2009 occurred among campers and staff at a summer camp attended by children with hematologic and oncologic conditions. The overall attack rate was 36% and was highest among children and adolescents (43%), persons with cancer (48%), and persons with sickle cell disease (82%). PMID:21192861
Dorratoltaj, Nargesalsadat; Marathe, Achla; Swarup, Samarth; Eubank, Stephen G.
2017-01-01
The study objective is to estimate the epidemiological and economic impact of vaccine interventions during influenza pandemics in Chicago, and assist in vaccine intervention priorities. Scenarios of delay in vaccine introduction with limited vaccine efficacy and limited supplies are not unlikely in future influenza pandemics, as in the 2009 H1N1 influenza pandemic. We simulated influenza pandemics in Chicago using agent-based transmission dynamic modeling. Population was distributed among high-risk and non-high risk among 0–19, 20–64 and 65+ years subpopulations. Different attack rate scenarios for catastrophic (30.15%), strong (21.96%), and moderate (11.73%) influenza pandemics were compared against vaccine intervention scenarios, at 40% coverage, 40% efficacy, and unit cost of $28.62. Sensitivity analysis for vaccine compliance, vaccine efficacy and vaccine start date was also conducted. Vaccine prioritization criteria include risk of death, total deaths, net benefits, and return on investment. The risk of death is the highest among the high-risk 65+ years subpopulation in the catastrophic influenza pandemic, and highest among the high-risk 0–19 years subpopulation in the strong and moderate influenza pandemics. The proportion of total deaths and net benefits are the highest among the high-risk 20–64 years subpopulation in the catastrophic, strong and moderate influenza pandemics. The return on investment is the highest in the high-risk 0–19 years subpopulation in the catastrophic, strong and moderate influenza pandemics. Based on risk of death and return on investment, high-risk groups of the three age group subpopulations can be prioritized for vaccination, and the vaccine interventions are cost saving for all age and risk groups. The attack rates among the children are higher than among the adults and seniors in the catastrophic, strong, and moderate influenza pandemic scenarios, due to their larger social contact network and homophilous interactions in school. Based on return on investment and higher attack rates among children, we recommend prioritizing children (0–19 years) and seniors (65+ years) after high-risk groups for influenza vaccination during times of limited vaccine supplies. Based on risk of death, we recommend prioritizing seniors (65+ years) after high-risk groups for influenza vaccination during times of limited vaccine supplies. PMID:28570660
Population biology of the European woodwasp, Sirex noctilio, in Galicia, Spain.
Lombardero, M J; Ayres, M P; Krivak-Tetley, F E; Fitza, K N E
2016-10-01
Sirex noctilio Fabricius (Hymenoptera, Siricidae) is rare and rarely studied where it is native in Eurasia, but is a widespread pest of pines in the Southern Hemisphere. Here we report on the abundance, basic biology, host use patterns and natural enemies of native S. noctilio in Galicia, Spain. Most trees attacked by S. noctilio failed to produce any adult progeny: >90% of emergences came from <20% of the attacked trees. The highest reproduction was in Pinus pinaster, followed by Pinus sylvestris and Pinus radiata. The proportions of S. noctilio requiring 1, 2 or 3 years for development were 0.72: 0.24: 0.04. Delayed development could be an adaptation to avoid parasitic nematodes, which sterilized 41.5% adults with one year generation time but only 19% of adults with 2 years generation time. Hymenoptera parasitoids accounted for 20% mortality. Sex ratios were male biased at 1: 2.9. Body size and fecundity were highly variable and lower than previously reported from the Southern Hemisphere. On attacked trees, there were 5-20 attacks per standard log (18 dm2), with usually 1-3 drills per attack. Attack densities and drills per attack were higher in trees that subsequently died. The production of S. noctilio per log was positively related to total attacks, and negatively related to: (1) attack density, (2) incidence of blue stain from Ophiostoma fungi and (3) frequency of lesions in plant tissue around points of attack. A preliminary life table for S. noctilio in Galicia estimated effects on potential population growth rate from (in decreasing order of importance) host suitability, unequal sex ratio, parasitic nematodes and Hymenoptera parasitoids.
NASA Technical Reports Server (NTRS)
Wittliff, C. E.
1982-01-01
The aerodynamic heating of a tip-fin controller mounted on a Space Shuttle Orbiter model was studied experimentally in the Calspan Advanced Technology Center 96 inch Hypersonic Shock Tunnel. A 0.0175 scale model was tested at Mach numbers from 10 to 17.5 at angles of attack typical of a shuttle entry. The study was conducted in two phases. In phase 1 testing a thermographic phosphor technique was used to qualitatively determine the areas of high heat-transfer rates. Based on the results of this phase, the model was instrumented with 40 thin-film resistance thermometers to obtain quantitative measurements of the aerodynamic heating. The results of the phase 2 testing indicate that the highest heating rates, which occur on the leading edge of the tip-fin controller, are very sensitive to angle of attack for alpha or = 30 deg. The shock wave from the leading edge of the orbiter wing impinges on the leading edge of the tip-fin controller resulting in peak values of h/h(Ref) in the range from 1.5 to 2.0. Away from the leading edge, the heat-transfer rates never exceed h/h(Ref) = 0.25 when the control surface, is not deflected. With the control surface deflected 20 deg, the heat-transfer rates had a maximum value of h/h(Ref) = 0.3. The heating rates are quite nonuniform over the outboard surface and are sensitive to angle of attack.
2011-01-01
Background Malaria is a major health concern for displaced persons occupying refugee camps in sub-Saharan Africa, yet there is little information on the incidence of infection and nature of transmission in these settings. Kakuma Refugee Camp, located in a dry area of north-western Kenya, has hosted ca. 60,000 to 90,000 refugees since 1992, primarily from Sudan and Somalia. The purpose of this study was to investigate malaria prevalence and attack rate and sources of Anopheles vectors in Kakuma refugee camp, in 2005-2006, after a malaria epidemic was observed by staff at camp clinics. Methods Malaria prevalence and attack rate was estimated from cases of fever presenting to camp clinics and the hospital in August 2005, using rapid diagnostic tests and microscopy of blood smears. Larval habitats of vectors were sampled and mapped. Houses were sampled for adult vectors using the pyrethrum knockdown spray method, and mapped. Vectors were identified to species level and their infection with Plasmodium falciparum determined. Results Prevalence of febrile illness with P. falciparum was highest among the 5 to 17 year olds (62.4%) while malaria attack rate was highest among the two to 4 year olds (5.2/1,000/day). Infected individuals were spatially concentrated in three of the 11 residential zones of the camp. The indoor densities of Anopheles arabiensis, the sole malaria vector, were similar during the wet and dry seasons, but were distributed in an aggregated fashion and predominantly in the same zones where malaria attack rates were high. Larval habitats and larval populations were also concentrated in these zones. Larval habitats were man-made pits of water associated with tap-stands installed as the water delivery system to residents with year round availability in the camp. Three percent of A. arabiensis adult females were infected with P. falciparum sporozoites in the rainy season. Conclusions Malaria in Kakuma refugee camp was due mainly to infection with P. falciparum and showed a hyperendemic age-prevalence profile, in an area with otherwise low risk of malaria given prevailing climate. Transmission was sustained by A. arabiensis, whose populations were facilitated by installation of man-made water distribution and catchment systems. PMID:21639926
Optimal attacks on qubit-based Quantum Key Recycling
NASA Astrophysics Data System (ADS)
Leermakers, Daan; Škorić, Boris
2018-03-01
Quantum Key Recycling (QKR) is a quantum cryptographic primitive that allows one to reuse keys in an unconditionally secure way. By removing the need to repeatedly generate new keys, it improves communication efficiency. Škorić and de Vries recently proposed a QKR scheme based on 8-state encoding (four bases). It does not require quantum computers for encryption/decryption but only single-qubit operations. We provide a missing ingredient in the security analysis of this scheme in the case of noisy channels: accurate upper bounds on the required amount of privacy amplification. We determine optimal attacks against the message and against the key, for 8-state encoding as well as 4-state and 6-state conjugate coding. We provide results in terms of min-entropy loss as well as accessible (Shannon) information. We show that the Shannon entropy analysis for 8-state encoding reduces to the analysis of quantum key distribution, whereas 4-state and 6-state suffer from additional leaks that make them less effective. From the optimal attacks we compute the required amount of privacy amplification and hence the achievable communication rate (useful information per qubit) of qubit-based QKR. Overall, 8-state encoding yields the highest communication rates.
Mitigation of corrosion attack on carbon steel coated cermet alloy in different anion contents
NASA Astrophysics Data System (ADS)
Khalid, Muhamad Azrin Mohd; Ismail, Azzura
2017-12-01
This research study evaluated the corrosion mechanism attack on carbon steel coated with cermet alloys (WC-9% Ni) in seawater at different sulphate-to-chloride ratios. The four different sulphate-to-chloride ratios were synthesised with the same seawater salinity of 3.5 % and same pH of real seawater. The corrosion tests involved immersion and electrochemical tests. The immersion test is used to determine the cermet coating ability to withstand the corrosion attack based on different ratios of anions present in the seawater at different periods of immersion. The corrosion attack was characterized by optical and Scanning Electron Microscopy (SEM). The aggressive anions present in the seawater influenced the corrosion attack on the cermet coating. For immersion test, results revealed that increasing sulphate more than chloride, increased the weight loss of cermets. The electrochemistry analysis showed that the passive layer forms on cermet coating prevented the material from further corrosion attack. However, due to its porosity, the passive layer collapsed and exposed the material for other corrosion reaction. For electrochemical test, the result shows that the solution with sulphate-to-chloride ratio of 0.14 (real seawater) has the highest corrosion current and Open Circuit Potential (OCP) compared to other solutions (different sulphate-to-chloride ratio). In conclusion, sulfate and chloride show their competition to attack the cermet coating on carbon steel and the higher the amount of chloride present in seawater, the higher the corrosion rate and pits formed on the cermet coating.
Mumpower, Jeryl L; Shi, Liu; Stoutenborough, James W; Vedlitz, Arnold
2013-10-01
A 2009 national telephone survey of 924 U.S. adults assessed perceptions of terrorism and homeland security issues. Respondents rated severity of effects, level of understanding, number affected, and likelihood of four terrorist threats: poisoned water supply; explosion of a small nuclear device in a major U.S. city; an airplane attack similar to 9/11; and explosion of a bomb in a building, train, subway, or highway. Respondents rated perceived risk and willingness to pay (WTP) for dealing with each threat. Demographic, attitudinal, and party affiliation data were collected. Respondents rated bomb as highest in perceived risk but gave the highest WTP ratings to nuclear device. For both perceived risk and WTP, psychometric variables were far stronger predictors than were demographic ones. OLS regression analyses using both types of variables to predict perceived risk found only two significant demographic predictors for any threat--Democrat (a negative predictor for bomb) and white male (a significant positive predictor for airline attack). In contrast, among psychometric variables, severity, number affected, and likelihood were predictors of all four threats and level of understanding was a predictor for one. For WTP, education was a negative predictor for three threats; no other demographic variables were significant predictors for any threat. Among psychometric variables, perceived risk and number affected were positive predictors of WTP for all four threats; severity and likelihood were predictors for three; level of understanding was a significant predictor for two. © 2013 Society for Risk Analysis.
BIÇAKCI, Şebnem
2013-01-01
Migraine is a common neurological disorder and can be severely disabling during attacks. The highest prevalence occurs between the ages of 25 and 55 years. Prior studies have found that migraine occurs together with other illnesses at a greater coincidental rate than is seen in the general population. These occurrences are called “comorbidities”. To delineate the comorbidities of migraine is important, because it can help improve treatment strategies and the understanding of the possible pathophysiology of migraine. PMID:28360578
Drinking Water: Experts’ Views on How Future Federal Funding Can Best Be Spent to Improve Security
2003-10-01
training to support, among other things, simulation exercises to provide responders with experience in carrying out emergency response plans; specialized...attack. These activities include, among other things, support for simulation exercises to provide responders with experience in carrying out utilities...conducting regional simulation exercises to test emergency response plans, with more than 88 percent (38 of 43) rating this as a high or highest
Reynolds, Mary G; Anh, Bach Huy; Thu, Vu Hoang; Montgomery, Joel M; Bausch, Daniel G; Shah, J Jina; Maloney, Susan; Leitmeyer, Katrin C; Huy, Vu Quang; Horby, Peter; Plant, Aileen Y; Uyeki, Timothy M
2006-01-01
Background In March of 2003, an outbreak of Severe Acute Respiratory Syndrome (SARS) occurred in Northern Vietnam. This outbreak began when a traveler arriving from Hong Kong sought medical care at a small hospital (Hospital A) in Hanoi, initiating a serious and substantial transmission event within the hospital, and subsequent limited spread within the community. Methods We surveyed Hospital A personnel for exposure to the index patient and for symptoms of disease during the outbreak. Additionally, serum specimens were collected and assayed for antibody to SARS-associated coronavirus (SARS-CoV) antibody and job-specific attack rates were calculated. A nested case-control analysis was performed to assess risk factors for acquiring SARS-CoV infection. Results One hundred and fifty-three of 193 (79.3%) clinical and non-clinical staff consented to participate. Excluding job categories with <3 workers, the highest SARS attack rates occurred among nurses who worked in the outpatient and inpatient general wards (57.1, 47.4%, respectively). Nurses assigned to the operating room/intensive care unit, experienced the lowest attack rates (7.1%) among all clinical staff. Serologic evidence of SARS-CoV infection was detected in 4 individuals, including 2 non-clinical workers, who had not previously been identified as SARS cases; none reported having had fever or cough. Entering the index patient's room and having seen (viewed) the patient were the behaviors associated with highest risk for infection by univariate analysis (odds ratios 20.0, 14.0; 95% confidence intervals 4.1–97.1, 3.6–55.3, respectively). Conclusion This study highlights job categories and activities associated with increased risk for SARS-CoV infection and demonstrates that a broad diversity of hospital workers may be vulnerable during an outbreak. These findings may help guide recommendations for the protection of vulnerable occupational groups and may have implications for other respiratory infections such as influenza. PMID:16907978
Computational/Experimental Aeroheating Predictions for X-33. Phase 2; Vehicle
NASA Technical Reports Server (NTRS)
Hamilton, H. Harris, II; Weilmuenster, K. James; Horvath, Thomas J.; Berry, Scott A.
1998-01-01
Laminar and turbulent heating-rate calculations from an "engineering" code and laminar calculations from a "benchmark" Navier-Stokes code are compared with experimental wind-tunnel data obtained on several candidate configurations for the X-33 Phase 2 flight vehicle. The experimental data were obtained at a Mach number of 6 and a freestream Reynolds number ranging from 1 to 8 x 10(exp 6)/ft. Comparisons are presented along the windward symmetry plane and in a circumferential direction around the body at several axial stations at angles of attack from 20 to 40 deg. The experimental results include both laminar and turbulent flow. For the highest angle of attack some of the measured heating data exhibited a "non-laminar" behavior which caused the heating to increase above the laminar level long before "classical" transition to turbulent flow was observed. This trend was not observed at the lower angles of attack. When the flow was laminar, both codes predicted the heating along the windward symmetry plane reasonably well but under-predicted the heating in the chine region. When the flow was turbulent the LATCH code accurately predicted the measured heating rates. Both codes were used to calculate heating rates over the X-33 vehicle at the peak heating point on the design trajectory and they were found to be in very good agreement over most of the vehicle windward surface.
Aerothermodynamic Analysis of Commercial Experiment Transporter (COMET) Reentry Capsule
NASA Technical Reports Server (NTRS)
Wood, William A.; Gnoffo, Peter A.; Rault, Didier F. G.
1996-01-01
An aerothermodynamic analysis of the Commercial Experiment Transporter (COMET) reentry capsule has been performed using the laminar thin-layer Navier-Stokes solver Langley Aerothermodynamic Upwind Relaxation Algorithm. Flowfield solutions were obtained at Mach numbers 1.5, 2, 5, 10, 15, 20, 25, and 27.5. Axisymmetric and 5, 10, and 20 degree angles of attack were considered across the Mach-number range, with the Mach 25 conditions taken to 90 degrees angle of attack and the Mach 27.5 cases taken to 60 degrees angle of attack. Detailed surface heat-transfer rates were computed at Mach 20 and 25, revealing that heating rates on the heat-shield shoulder ,can exceed the stagnation-point heating by 230 percent. Finite-rate chemistry solutions were performed above Mach 10, otherwise perfect gas computations were made. Drag, lift, and pitching moment coefficients are computed and details of a wake flow are presented. The effect of including the wake in the solution domain was investigated and base pressure corrections to forebody drag coefficients were numerically determined for the lower Mach numbers. Pitching moment comparisons are made with direct simulation Monte Carlo results in the more rarefied flow at the highest Mach numbers, showing agreement within two-percent. Thin-layer Navier-Stokes computations of the axial force are found to be 15 percent higher across the speed range than the empirical/Newtonian based results used during the initial trajectory analyses.
Measles in Vietnamese refugee children in Hong Kong.
Taylor, W. R.
1999-01-01
From September 1991-January 1992, there was a measles epidemic in an established refugee camp for 7000 Vietnamese 'Boat People' living in Hong Kong. This 16 week outbreak occurred against a backdrop of poor uptake of measles vaccination and overcrowded living conditions. Two hundred and sixty-two children were affected (155 boys, 107 girls); 235 children (89.7 %) were < 2 years old, age range 5-39 months. Children age 6-11 months had the highest crude attack rate (AR) of 54.3%. The highest age specific crude AR was 83.8% in children aged 14 months. Measles complications affected 234 (89.3%) children. Sixty-six children (25.2%) were admitted to hospital. There were two deaths from pneumonia, giving a case fatality rate of 0.76%. Measles control in refugee camps continues to be a public health challenge. PMID:10459648
NASA Technical Reports Server (NTRS)
Bertin, J. J.; Lamb, J. P.; Center, K. R.; Graumann, B. W.
1971-01-01
Windward and leeward measurements were made for a variety of simulated infinite cylinders exposed to hypersonic streams over an angle of attack from 30 deg to 90 deg. For the range of conditions included in the study, the following conclusions are made: (1) Swept cylinder theory provides a reasonable correlation of the measured laminar heat transfer rates from the plane of symmetry. (2) The boundary layer transition criteria in the plane of symmetry are a function of the transverse curvature. (3) Relaminarization of the circumferential boundary layer for a right circular cylinder was observed at the highest Reynolds number tested. (4) The effect of leeside geometry on the average heat transfer rate can be correlated with a single geometric parameter which is dependent on the location of separation. (5) The relationship of leeward heating to angle of attack is virtually linear for each cross section. (6) No systematic effect of free stream Reynolds number was observed.
A graph-based network-vulnerability analysis system
DOE Office of Scientific and Technical Information (OSTI.GOV)
Swiler, L.P.; Phillips, C.; Gaylor, T.
1998-05-03
This paper presents a graph based approach to network vulnerability analysis. The method is flexible, allowing analysis of attacks from both outside and inside the network. It can analyze risks to a specific network asset, or examine the universe of possible consequences following a successful attack. The analysis system requires as input a database of common attacks, broken into atomic steps, specific network configuration and topology information, and an attacker profile. The attack information is matched with the network configuration information and an attacker profile to create a superset attack graph. Nodes identify a stage of attack, for example themore » class of machines the attacker has accessed and the user privilege level he or she has compromised. The arcs in the attack graph represent attacks or stages of attacks. By assigning probabilities of success on the arcs or costs representing level of effort for the attacker, various graph algorithms such as shortest path algorithms can identify the attack paths with the highest probability of success.« less
A graph-based network-vulnerability analysis system
DOE Office of Scientific and Technical Information (OSTI.GOV)
Swiler, L.P.; Phillips, C.; Gaylor, T.
1998-01-01
This report presents a graph-based approach to network vulnerability analysis. The method is flexible, allowing analysis of attacks from both outside and inside the network. It can analyze risks to a specific network asset, or examine the universe of possible consequences following a successful attack. The analysis system requires as input a database of common attacks, broken into atomic steps, specific network configuration and topology information, and an attacker profile. The attack information is matched with the network configuration information and an attacker profile to create a superset attack graph. Nodes identify a stage of attack, for example the classmore » of machines the attacker has accessed and the user privilege level he or she has compromised. The arcs in the attack graph represent attacks or stages of attacks. By assigning probabilities of success on the arcs or costs representing level-of-effort for the attacker, various graph algorithms such as shortest-path algorithms can identify the attack paths with the highest probability of success.« less
Novel Method For Low-Rate Ddos Attack Detection
NASA Astrophysics Data System (ADS)
Chistokhodova, A. A.; Sidorov, I. D.
2018-05-01
The relevance of the work is associated with an increasing number of advanced types of DDoS attacks, in particular, low-rate HTTP-flood. Last year, the power and complexity of such attacks increased significantly. The article is devoted to the analysis of DDoS attacks detecting methods and their modifications with the purpose of increasing the accuracy of DDoS attack detection. The article details low-rate attacks features in comparison with conventional DDoS attacks. During the analysis, significant shortcomings of the available method for detecting low-rate DDoS attacks were found. Thus, the result of the study is an informal description of a new method for detecting low-rate denial-of-service attacks. The architecture of the stand for approbation of the method is developed. At the current stage of the study, it is possible to improve the efficiency of an already existing method by using a classifier with memory, as well as additional information.
Risk factors for hypertensive attack during pheochromocytoma resection
Kwon, Se Yun; Lee, Kyung Seop; Lee, Jun Nyung; Ha, Yun-Sok; Choi, Seock Hwan; Kim, Hyun Tae; Kim, Tae-Hwan; Yoo, Eun Sang
2016-01-01
Purpose We aimed to retrospectively evaluate the risk factors for hypertensive attack during adrenalectomy in patients with pheochromocytoma. Despite the development of newer surgical and anesthetic techniques for the management of pheochromocytoma, intraoperative hypertensive attack continues to present a challenge. Materials and Methods Data from 53 patients diagnosed with pheochromocytoma at Kyungpook National Uriversity Medical Center between January 2000 and June 2012 were retrospectively analyzed. The subjects were divided into 2 groups depending on the presence or absence of hypertensive attack at the time of surgery. Patient demographic characteristics and preoperative evaluations were assessed for their prognostic relevance with respect to hypertensive attack. A univariate analysis was conducted, and a multivariate logistic regression analysis was also performed. Results In the univariate analysis, systolic blood pressure at presentation, preoperative hormonal status (including epinephrine, norepinephrine, vanillylmandelic acid, and metanephrine levels in a 24-hour urine sample), tumor size, and postoperative systolic blood pressure were significantly associated with the development of hypertensive attack. In the multivariate analysis, preoperative epinephrine level and tumor size were independent factors that predicted hypertensive attack. The highest odds ratio for tumor size (2.169) was obtained at a cutoff value of 4.25 cm and the highest odds ratio for preoperative epinephrine (1.020) was obtained at a cutoff value of 166.3 µg/d. Conclusions In this study, a large tumor size and an elevated preoperative urinary epinephrine level were risk factors for intraoperative hypertensive attack in patients with pheochromocytoma. PMID:27194549
Hybrid attacks on model-based social recommender systems
NASA Astrophysics Data System (ADS)
Yu, Junliang; Gao, Min; Rong, Wenge; Li, Wentao; Xiong, Qingyu; Wen, Junhao
2017-10-01
With the growing popularity of the online social platform, the social network based approaches to recommendation emerged. However, because of the open nature of rating systems and social networks, the social recommender systems are susceptible to malicious attacks. In this paper, we present a certain novel attack, which inherits characteristics of the rating attack and the relation attack, and term it hybrid attack. Furtherly, we explore the impact of the hybrid attack on model-based social recommender systems in multiple aspects. The experimental results show that, the hybrid attack is more destructive than the rating attack in most cases. In addition, users and items with fewer ratings will be influenced more when attacked. Last but not the least, the findings suggest that spammers do not depend on the feedback links from normal users to become more powerful, the unilateral links can make the hybrid attack effective enough. Since unilateral links are much cheaper, the hybrid attack will be a great threat to model-based social recommender systems.
An outbreak of influenza A(H1N1)pdm09 virus in a primary school in Vietnam.
Duong, Tran Nhu; Tho, Nguyen Thi Thi; Hien, Nguyen Tran; Olowokure, Babatunde
2015-10-15
Despite school pupils being at greatest risk during the 2009 influenza pandemic there are limited data on outbreaks of influenza A(H1N1)pdm09 in primary schools in South-East Asia. This prospective cohort study describes an outbreak of influenza A(H1N1)pdm09 in a primary school in rural Vietnam. In total 103 cases of influenza-like illness were found among the 407 pupils in the primary school. Ten of these were laboratory confirmed cases of influenza A(H1N1)pdm09 virus. The overall attack rate (AR) was 25% (103/407), and was highest (41%) in grade 4 pupils, where the outbreak started. All cases in the outbreak presented with a mild and self-limiting illness, acute respiratory symptoms and fever. Public health interventions to contain the outbreak could explain the lower attack rates in other grades. Ill pupils were asked to stay at home. Oseltamivir was not given to pupils and the school did not close during the outbreak. The last detected case occurred 12 days following identification of the first case. This is the first report of an outbreak of influenza A(H1N1)pdm09 among pupils in a primary school in Vietnam. High attack rates in Grade 4 pupils suggest shared activities contributed to transmission. The public health response using non-pharmaceutical measures may have played a role in ending the outbreak.
Rodríguez-Marroyo, J A; Villa, J G; López-Satue, J; Pernía, R; Carballo, B; García-López, J; Foster, C
2011-11-01
The aim of this study was to analyse the physiological strain of firefighters, using heart rate (HR) and core temperature, during real wildfire suppression according to the type of attack performed (direct, indirect or mixed). Three intensity zones were established according to the HR corresponding to the ventilatory threshold (VT) and respiratory compensation threshold (RCT): zone 1,
The management of gout in different clinical specialties in Turkey: a patient-based survey.
Öztürk, Mehmet Akif; Mercan, Rıdvan; Gök, Kevser; Onat, Ahmet Mesut; Kısacık, Bünyamin; Kimyon, Gezmiş; Balkarlı, Ayşe; Kaya, Arif; Çobankara, Veli; Balcı, Mehmet Ali; Pamuk, ÖmerNuri; Yıldırım Çetin, Gözde; Sayarlıoğlu, Mehmet; Şenel, Soner; Tezcan, Mehmet Engin; Küçük, Adem; Üreten, Kemal; Şahin, Şafak; Tufan, Abdurrahman
2016-12-01
Although gout is potentially curable, the management of this disease is often suboptimal. In this study, we investigated the treatment of gout in Turkey and also compared the management approaches to gout in different clinical specialties. Three hundred and nineteen consecutive patients (mean age 58.60 ± 12.8 years; 44 females, 275 males) were included in this multicenter study. A standardized form was generated to collect data about the patient's first admission to health care, the specialty of the doctor first diagnosed the gout, the treatment options for gout including attack management, patient referral, chronic treatment including medical treatment, and life style modifications. Forty patients were referred to another center without any treatment (12.8 %), and referral rate is most common among the primary care physicians (28.8 %). Colchicine was more commonly used for attack prophylaxis than allopurinol. Ninety-two patients had never been treated with allopurinol (28.8 %). Allopurinol prescription was less common among the primary care physicians and orthopedists, and highest among the rheumatologists. Recommendation of diet and life style modifications was less common among the primary care physicians and orthopedists, and highest among the rheumatologists. The rates of life style modification recommendation and long-term allopurinol prescription were 83.7 and 77.6 %, respectively, among the rheumatologists. Both acute and chronic management of gout is suboptimal in Turkey especially among the primary care physicians and orthopedists. Moreover, chronic treatment is even suboptimal among rheumatologists.
Shilling Attacks Detection in Recommender Systems Based on Target Item Analysis
Zhou, Wei; Wen, Junhao; Koh, Yun Sing; Xiong, Qingyu; Gao, Min; Dobbie, Gillian; Alam, Shafiq
2015-01-01
Recommender systems are highly vulnerable to shilling attacks, both by individuals and groups. Attackers who introduce biased ratings in order to affect recommendations, have been shown to negatively affect collaborative filtering (CF) algorithms. Previous research focuses only on the differences between genuine profiles and attack profiles, ignoring the group characteristics in attack profiles. In this paper, we study the use of statistical metrics to detect rating patterns of attackers and group characteristics in attack profiles. Another question is that most existing detecting methods are model specific. Two metrics, Rating Deviation from Mean Agreement (RDMA) and Degree of Similarity with Top Neighbors (DegSim), are used for analyzing rating patterns between malicious profiles and genuine profiles in attack models. Building upon this, we also propose and evaluate a detection structure called RD-TIA for detecting shilling attacks in recommender systems using a statistical approach. In order to detect more complicated attack models, we propose a novel metric called DegSim’ based on DegSim. The experimental results show that our detection model based on target item analysis is an effective approach for detecting shilling attacks. PMID:26222882
Jibson, R.W.
2002-01-01
Following the 17 January 1994 Northridge. California earthquake (M = 6.7), Ventura County, California, experienced a major outbreak of coccidioidomycosis (CM), commonly known as valley fever, a respiratory disease contracted by inhaling airborne fungal spores. In the 8 weeks following the earthquake (24 January through 15 March), 203 outbreak-associated cases were reported, which is about an order of magnitude more than the expected number of cases, and three of these cases were fatal. Simi Valley, in easternmost Ventura County, had the highest attack rate in the county, and the attack rate decreased westward across the county. The temporal and spatial distribution of CM cases indicates that the outbreak resulted from inhalation of spore-contaminated dust generated by earthquake-triggered landslides. Canyons North East of Simi Valley produced many highly disrupted, dust-generating landslides during the earthquake and its aftershocks. Winds after the earthquake were from the North East, which transported dust into Simi Valley and beyond to communities to the West. The three fatalities from the CM epidemic accounted for 4 percent of the total earthquake-related fatalities.
NASA Astrophysics Data System (ADS)
Jibson, Randall W.
Following the 17 January 1994 Northridge, California earthquake (M = 6.7), Ventura County, California, experienced a major outbreak ofcoccidioidomycosis (CM), commonly known as valley fever, a respiratory disease contracted byinhaling airborne fungal spores. In the 8 weeks following the earthquake (24 Januarythrough 15 March), 203 outbreak-associated cases were reported, which is about an order of magnitude more than the expected number of cases, and three of these cases were fatal.Simi Valley, in easternmost Ventura County, had the highest attack rate in the county,and the attack rate decreased westward across the county. The temporal and spatial distribution of CM cases indicates that the outbreak resulted from inhalation of spore-contaminated dust generated by earthquake-triggered landslides. Canyons North East of Simi Valleyproduced many highly disrupted, dust-generating landslides during the earthquake andits aftershocks. Winds after the earthquake were from the North East, which transporteddust into Simi Valley and beyond to communities to the West. The three fatalities from the CM epidemic accounted for 4 percent of the total earthquake-related fatalities.
Yen, Shirley; Shea, M Tracie; Battle, Cynthia L; Johnson, Dawn M; Zlotnick, Caron; Dolan-Sewell, Regina; Skodol, Andrew E; Grilo, Carlos M; Gunderson, John G; Sanislow, Charles A; Zanarini, Mary C; Bender, Donna S; Rettew, Jennifer Bame; McGlashan, Thomas H
2002-08-01
The association between trauma and personality disorders (PDs), while receiving much attention and debate, has not been comprehensively examined for multiple types of trauma and PDs. The authors examined data from a multisite study of four PD groups: schizotypal, borderline (BPD), avoidant, and obsessive-compulsive, and a major depression comparison group. Rates of traumatic exposure to specific types of trauma, age of first trauma onset, and rates of posttraumatic stress disorder are compared. Results indicate that BPD participants reported the highest rate of traumatic exposure (particularly to sexual traumas, including childhood sexual abuse), the highest rate of posttraumatic stress disorder, and youngest age of first traumatic event. Those with the more severe PDs (schizotypal, BPD) reported more types of traumatic exposure and higher rates of being physically attacked (childhood and adult) when compared to other groups. These results suggest a specific relationship between BPD and sexual trauma (childhood and adult) that does not exist among other PDs. In addition, they support an association between severity of PD and severity of traumatic exposure, as indicated by earlier trauma onset, trauma of an assaultive and personal nature, and more types of traumatic events.
Ericsson; DuPont; Mathewson
1995-03-01
Background: A previous study suggested that U.S. students who lived in Mexico for 1 year had a risk of diarrhea intermediate between the rate for newly arrived U.S. students and Mexican students; however, the study was not controlled for changes of risky behavior over time. Methods: An analysis of acute diarrhea occurring among U.S. and Mexican student groups living in Guadalajara, Mexico was conducted to explore the association of diarrhea developing during selected 28-day periods with length of residence, season, and risk factors such as locations of food consumption, consumption of tap water, unsafe ice, alcohol, and antibiotics. Results: Compared to U.S. and Mexican student groups, newly arrived U.S. college students in July had the highest rate of diarrhea (55%), highest enteropathogen isolation rate (46%), and most consumption of alcohol and antibiotics; they also ate most frequently at restaurants and in Mexican family homes. Compared to a 34% rate of diarrhea among newly arrived U.S. medical students in August, the rate was only 6% among established medical students in January. This drop in attack rate was attended by less tap water and unsafe ice consumption by established students in January compared to the habits of newly arrived students in January or August when risky behavior was otherwise similar among these groups. The role of tap water and unsafe ice in the acquisition of wintertime diarrhea is further supported by the relatively high 29% rate of diarrhea among U.S. medical students newly arrived in January, who also consumed more tap water and ice than established students in January. Enterotoxigenic E. coli disease was observed only during the summer months; whereas, Campylobacter jejuni disease and disease associated with no detected pathogen were more common in winter. Conclusions: These data imply that wintertime diarrhea in Guadalajara is more likely than summertime diarrhea to be waterborne and to be caused by agents such as viruses or previously unrecognized enteropathogens that were not assessed in this study. Among Mexican students who had the highest frequency of tap water consumption and eating from vendors, the low rates of diarrhea in summer (3%) and winter (5%) imply that they enjoy a substantial degree of immunity. Further study will be necessary to understand the role that immunity (or its loss during summer vacation back in the United States) might play in additionally accounting for observed differences in attack rates between newly arrived students and those who had lived for a period of time in Mexico. (J Travel Med 2:6-10, 1995)
A graph-based system for network-vulnerability analysis
DOE Office of Scientific and Technical Information (OSTI.GOV)
Swiler, L.P.; Phillips, C.
1998-06-01
This paper presents a graph-based approach to network vulnerability analysis. The method is flexible, allowing analysis of attacks from both outside and inside the network. It can analyze risks to a specific network asset, or examine the universe of possible consequences following a successful attack. The graph-based tool can identify the set of attack paths that have a high probability of success (or a low effort cost) for the attacker. The system could be used to test the effectiveness of making configuration changes, implementing an intrusion detection system, etc. The analysis system requires as input a database of common attacks,more » broken into atomic steps, specific network configuration and topology information, and an attacker profile. The attack information is matched with the network configuration information and an attacker profile to create a superset attack graph. Nodes identify a stage of attack, for example the class of machines the attacker has accessed and the user privilege level he or she has compromised. The arcs in the attack graph represent attacks or stages of attacks. By assigning probabilities of success on the arcs or costs representing level-of-effort for the attacker, various graph algorithms such as shortest-path algorithms can identify the attack paths with the highest probability of success.« less
High angle of attack flying qualities criteria for longitudinal rate command systems
NASA Technical Reports Server (NTRS)
Wilson, David J.; Citurs, Kevin D.; Davidson, John B.
1994-01-01
This study was designed to investigate flying qualities requirements of alternate pitch command systems for fighter aircraft at high angle of attack. Flying qualities design guidelines have already been developed for angle of attack command systems at 30, 45, and 60 degrees angle of attack, so this research fills a similar need for rate command systems. Flying qualities tasks that require post-stall maneuvering were tested during piloted simulations in the McDonnell Douglas Aerospace Manned Air Combat Simulation facility. A generic fighter aircraft model was used to test angle of attack rate and pitch rate command systems for longitudinal gross acquisition and tracking tasks at high angle of attack. A wide range of longitudinal dynamic variations were tested at 30, 45, and 60 degrees angle of attack. Pilot comments, Cooper-Harper ratings, and pilot induced oscillation ratings were taken from five pilots from NASA, USN, CAF, and McDonnell Douglas Aerospace. This data was used to form longitudinal design guidelines for rate command systems at high angle of attack. These criteria provide control law design guidance for fighter aircraft at high angle of attack, low speed flight conditions. Additional time history analyses were conducted using the longitudinal gross acquisition data to look at potential agility measures of merit and correlate agility usage to flying qualities boundaries. This paper presents an overview of this research.
Mountain pine beetle attack in ponderosa pine: Comparing methods for rating susceptibility
David C. Chojnacky; Barbara J. Bentz; Jesse A. Logan
2000-01-01
Two empirical methods for rating susceptibility of mountain pine beetle attack in ponderosa pine were evaluated. The methods were compared to stand data modeled to objectively rate each sampled stand for susceptibly to bark-beetle attack. Data on bark-beetle attacks, from a survey of 45 sites throughout the Colorado Plateau, were modeled using logistic regression to...
Claassen, Cynthia A; Carmody, Thomas; Stewart, Sunita M; Bossarte, Robert M; Larkin, Gregory L; Woodward, Wayne A; Trivedi, Madhukar H
2010-05-01
The terrorist attacks in the USA on 11 September 2001 affected suicide rates in two European countries, whereas overall US rates remained stable. The effect on attack site rates, however, has not been studied. To examine post-attack suicide rates in areas surrounding the three airline crash sites. Daily mortality rates were modelled using time series techniques. Where rate change was significant, both duration and geographic scope were analysed. Around the World Trade Center, post-attack 180-day rates dropped significantly (t = 2.4, P = 0.0046), whereas comparison condition rates remained stable. No change was observed for Pentagon or Flight 93 crash sites. The differential effect by site suggests that proximity may be less important that other event characteristics. Both temporal and geographic aspects of rate fluctuation after sentinel events appear measurable and further analyses may contribute valuable knowledge about how sociological forces affect these rates.
Pandemic influenza-implications for critical care resources in Australia and New Zealand.
Anderson, Therese A; Hart, Graeme K; Kainer, Marion A
2003-09-01
To quantify resource requirements (additional beds and ventilator capacity), for critical care services in the event of pandemic influenza. Cross-sectional survey about existing and potential critical care resources. Participants comprised 156 of the 176 Australasian (Australia and New Zealand) critical care units on the database of the Australian and New Zealand Intensive Care Society (ANZICS) Research Centre for Critical Care Resources. The Meltzer, Cox and Fukuda model was adapted to map a range of influenza attack rate estimates for hospitalisation and episodes likely to require intensive care and to predict critical care admission rates and bed day requirements. Estimations of ventilation rates were based on those for community-acquired pneumonia. The estimated extra number of persons requiring hospitalisation ranged from 8,455 (10% attack rate) to 150,087 (45% attack rate). The estimated number of additional admissions to critical care units ranged from 423 (5% admission rate, 10% attack rate) to 37,522 (25% admission rate, 45% attack rate). The potential number of required intensive care bed days ranged from 846 bed days (2 day length of stay, 10% attack rate) to 375,220 bed days (10 day length of stay, 45% attack rate). The number of persons likely to require mechanical ventilation ranged from 106 (25% of projected critical care admissions, 10% attack rate) to 28,142 (75% of projected critical care admissions, 45% attack rate). An additional 1,195 emergency ventilator beds were identified in public sector and 248 in private sector hospitals. Cancellation of elective surgery could release a potential 76,402 intensive care bed days (per annum), but in the event of pandemic influenza, 31,150 bed days could be required over an 8- to 12-week period. Australasian critical care services would be overwhelmed in the event of pandemic influenza. More work is required in relation to modelling, contingency plans, and resource allocation.
Epidemiology of international terrorism involving fatal outcomes in developed countries (1994-2003).
Wilson, Nick; Thomson, George
2005-01-01
We aimed to describe the public health burden and epidemiology of international terrorism (i.e. involving foreign nationals) with fatal outcomes in developed countries. Data was abstracted from a United States Department of State database for 21 'established market economy' countries and 18 'former socialist economies of Europe' for 1994-2003. To put the findings in a wider context, comparisons were made with WHO data on all homicides for each country. A total of 32 international terrorist attacks causing fatalities were identified over the 10-year period. These resulted in 3299 deaths, giving a crude annual mortality rate of 0.3 per million population. The mortality burden attributable to international terrorism in these countries was 208 times less than that attributable to other homicide. Even for the country with the highest mortality burden from international terrorism (the United States), this ratio was 60. There was no statistically significant trend in the number of attacks over time, but the attack severity (in terms of deaths per attack) was higher in the latter part of the 10-year period. A number of limitations with this data set were identified. If a more rigorous definition of 'international terrorism' was used, then this would substantially reduce the total number of such attacks defined in this way. In conclusion, there is a need for better quality data and improved classification systems for describing international terrorism. Nevertheless, the available data indicates that the mortality burden from international terrorism in developed countries is small compared to that from other homicide.
[Field epidemiological study on a varicella outbreak among schoolchildren in Shenzhen].
Zheng, Qing-ming; Zeng, Hua-tang; Wang, Tie-qiang; Liu, Yi; Wang, Guang-li; Mei, Shu-jiang; Zhang, Shun-xiang
2013-09-01
Both epidemiologic characteristics and transmission mode of a varicella outbreak among schoolchildren in Shenzhen city were studied and related control measures were discussed. Case definition was established. Case-finding and face-to-face investigation were conducted, followed by analysis on distributions of time, place and persons of the outbreak. Association between possible modes of transmission and the outbreak was explored. Retrospective cohort study was carried out. The overall attack rate of this outbreak was 4.4% (122 of 2742). The attack rate among primary schoolchildren(8.3%, 118/1419)was higher than that in the middle-school children(0.3%, 4/1323). There were no statistically significant differences on the attack rates between male and female students. A total of 22 classes from the 9 grades were affected by this outbreak and the aggregation of varicella cases was found in classes. The highest attack rates was found in the students of fifth grade(23.7%), followed by from the third grade (13.4%). The main transmission mode appeared to be close personal contact. The outbreak, with four peaks of incidence, lasted 72 days. Data from the investigation suggested that the primary case was introduced into the school during military training involved by the students. Activities related to physical examination for all the schoolchildren seemed to have contributed to the spread of this disease among classes. Delayed isolation of cases appeared to be the major factor causing the spread of disease among classes. Intensive off-school activities or free community bus for children did not seem to be associated with the spreading of the disease. 52.5% (64/122) of the cases had received one-dose of varicella vaccine, with the median of onset after the vaccination as 7 years. The results demonstrated that one single-dose vaccine or long vaccination period were factors related to the insufficient immunity that causing the outbreak of disease. Varicella outbreak has been one of the most grievous public health problems in schools, posting challenges on the implementation of isolation measures, in particular. Once the chain of transmission is in place, it is difficult to make the universal measures effective within a short period.
Schankin, Christoph J; Maniyar, Farooq H; Seo, Youngho; Kori, Shashidar; Eller, Michael; Chou, Denise E; Blecha, Joseph; Murphy, Stephanie T; Hawkins, Randall A; Sprenger, Till; VanBrocklin, Henry F; Goadsby, Peter J
2016-07-01
SEE DREIER DOI 101093/AWW112 FOR A SCIENTIFIC COMMENTARY ON THIS ARTICLE: For many decades a breakdown of the blood-brain barrier has been postulated to occur in migraine. Hypothetically this would facilitate access of medications, such as dihydroergotamine or triptans, to the brain despite physical properties otherwise restricting their entry. We studied the permeability of the blood-brain barrier in six migraineurs and six control subjects at rest and during acute glyceryl trinitrate-induced migraine attacks using positron emission tomography with the novel radioligand (11)C-dihydroergotamine, which is chemically identical to pharmacologically active dihydroergotamine. The influx rate constant Ki, average dynamic image and time activity curve were assessed using arterial blood sampling and served as measures for receptor binding and thus blood-brain barrier penetration. At rest, there was binding of (11)C-dihydroergotamine in the choroid plexus, pituitary gland, and venous sinuses as expected from the pharmacology of dihydroergotamine. However, there was no binding to the brain parenchyma, including the hippocampus, the area with the highest density of the highest-affinity dihydroergotamine receptors, and the raphe nuclei, a postulated brainstem site of action during migraine, suggesting that dihydroergotamine is not able to cross the blood-brain barrier. This binding pattern was identical in migraineurs during glyceryl trinitrate-induced migraine attacks as well as in matched control subjects. We conclude that (11)C-dihydroergotamine is unable to cross the blood-brain barrier interictally or ictally demonstrating that the blood-brain barrier remains tight for dihydroergotamine during acute glyceryl trinitrate-induced migraine attacks. © The Author (2016). Published by Oxford University Press on behalf of the Guarantors of Brain. All rights reserved.
Robustness of Controllability for Networks Based on Edge-Attack
Nie, Sen; Wang, Xuwen; Zhang, Haifeng; Li, Qilang; Wang, Binghong
2014-01-01
We study the controllability of networks in the process of cascading failures under two different attacking strategies, random and intentional attack, respectively. For the highest-load edge attack, it is found that the controllability of Erdős-Rényi network, that with moderate average degree, is less robust, whereas the Scale-free network with moderate power-law exponent shows strong robustness of controllability under the same attack strategy. The vulnerability of controllability under random and intentional attacks behave differently with the increasing of removal fraction, especially, we find that the robustness of control has important role in cascades for large removal fraction. The simulation results show that for Scale-free networks with various power-law exponents, the network has larger scale of cascades do not mean that there will be more increments of driver nodes. Meanwhile, the number of driver nodes in cascading failures is also related to the edges amount in strongly connected components. PMID:24586507
Robustness of controllability for networks based on edge-attack.
Nie, Sen; Wang, Xuwen; Zhang, Haifeng; Li, Qilang; Wang, Binghong
2014-01-01
We study the controllability of networks in the process of cascading failures under two different attacking strategies, random and intentional attack, respectively. For the highest-load edge attack, it is found that the controllability of Erdős-Rényi network, that with moderate average degree, is less robust, whereas the Scale-free network with moderate power-law exponent shows strong robustness of controllability under the same attack strategy. The vulnerability of controllability under random and intentional attacks behave differently with the increasing of removal fraction, especially, we find that the robustness of control has important role in cascades for large removal fraction. The simulation results show that for Scale-free networks with various power-law exponents, the network has larger scale of cascades do not mean that there will be more increments of driver nodes. Meanwhile, the number of driver nodes in cascading failures is also related to the edges amount in strongly connected components.
Homeland Security and the Private Sector : a CBO Paper
2004-12-01
private sector and the nation as a whole that would underlie the expected costs of terrorist attacks and, hence, the broader benefits of security. This paper focuses on those industries for which the expected human and economic losses from a terrorist attack would be highest -- the country’s critical infrastructure. The analysis more narrowly focuses on those industries that reside largely in the private sector and for which an attack could lead to a direct loss of life. The paper also reviews the incentives for private actions to limit
Kessler, Ronald C.; Chiu, Wai Tat; Jin, Robert; Ruscio, Ayelet Meron; Shear, Katherine; Walters, Ellen E.
2007-01-01
Context Only limited information exists about the epidemiology of DSM-IV panic attacks and panic disorder. Objective To present nationally representative data on the epidemiology of panic attacks and panic disorder with or without agoraphobia based on the National Comorbidity Survey Replication (NCS-R). Design and Setting Nationally representative face-to-face household survey conducted using the fully structured WHO Composite International Diagnostic Interview (CIDI). Participants 9282 English-speaking respondents ages 18 and older. Main Outcome Measures DSM-IV panic attacks (PA) and panic disorder (PD) with and without agoraphobia (AG). Results Lifetime prevalence estimates are 22.7% for isolated panic without agoraphobia (PA-only), 0.8% for PA with agoraphobia without PD (PA-AG), 3.7% for PD without AG (PD-only), and 1.1% for PD with AG (PD-AG). Persistence, number of lifetime attacks, and number of years with attacks all increase monotonically across these four subgroups. All four subgroups are significantly comorbid with other lifetime DSM-IV disorders, with the highest odds for PD-AG and the lowest for PA-only. Scores on the Panic Disorder Severity Scale are also highest for PD-AG (86.3% moderate-severe) and lowest for PA-only (6.7% moderate-severe). Agoraphobia is associated with substantial severity, impairment, and comorbidity. Lifetime treatment is high (from 96.1% PD-AG to 61.1% PA-only), but 12-month treatment meeting published treatment guidelines is low (from 54.9% PD-AG to 18.2% PA-only). Conclusions Although the major societal burden of panic is due to PD and PA-AGG, isolated panic attacks also have high prevalence and meaningful role impairment. PMID:16585471
NASA Astrophysics Data System (ADS)
Choubey, Gautam; Pandey, K. M.
2017-04-01
Numerical analysis of the supersonic combustion and flow structure through a scramjet engine at Mach 7 with alternating wedge fuel injection and with three angle of attack (α=-3°, α=0°, α=3°) have been studied in the present research article. The configuration used here is slight modification of the Rabadan et al. scramjet model. Steady two dimensional (2D) Reynolds-averaged Navier-Stokes (RANS) simulation and Shear stress transport (SST) based on k-ω turbulent model is used to predict the shock structure and combustion phenomenon inside the scramjet combustor. All the simulations are done by using Ansys 14-Fluent code. The combustion model used here is the combination of eddy dissipation and finite rate chemistry models since this model avoids Arrhenius calculations in which reaction rates are controlled by turbulence. Present results show that the geometry with negative angle of attack (α=-3°) have lowest ignition delay and it improves the performance of scramjet combustor as compared to geometry with α=0°, α=3°. The combustion phenomena and efficiency is also found to be stronger and highest in case of α=-3°.
NASA Technical Reports Server (NTRS)
Stoliker, Patrick C.; Bosworth, John T.
1996-01-01
The X-31A aircraft gross-acquisition and fine-tracking handling qualities have been evaluated using standard evaluation maneuvers developed by Wright Laboratory, Wright-Patterson Air Force Base. The emphasis of the testing is in the angle-of-attack range between 30 deg and 70 deg. Longitudinal gross-acquisition handling qualities results show borderline Level 1/Level 2 performance. Lateral gross-acquisition testing results in Level 1/Level 2 ratings below 45 deg angle of attack, degrading into Level 3 as angle of attack increases. The fine-tracking performance in both longitudinal and lateral axes also receives Level 1 ratings near 30 deg angle of attack, with the ratings tending towards Level 3 at angles of attack greater than 50 deg. These ratings do not match the expectations from the extensive close-in combat testing where the X-31A aircraft demonstrated fair to good handling qualities maneuvering for high angles of attack. This paper presents the results of the high-angle-of-attack handling qualities flight testing of the X-31A aircraft. Discussion of the preparation for the maneuvers, the pilot ratings, and selected pilot comments are included. Evaluation of the results is made in conjunction with existing Neal-Smith, bandwidth, Smith-Geddes, and military specifications.
NASA Technical Reports Server (NTRS)
Stoliker, Patrick C.; Bosworth, John T.
1997-01-01
The X-31A aircraft gross-acquisition and fine-tracking handling qualities have been evaluated using standard evaluation maneuvers developed by Wright Laboratory, Wright Patterson Air Force Base. The emphasis of the testing is in the angle-of-attack range between 30 deg. and 70 deg. Longitudinal gross-acquisition handling qualities results show borderline Level l/Level 2 performance. Lateral gross-acquisition testing results in Level l/Level 2 ratings below 45 deg. angle of attack, degrading into Level 3 as angle of attack increases. The fine tracking performance in both longitudinal and lateral axes also receives Level 1 ratings near 30 deg. angle of attack, with the ratings tending towards Level 3 at angles of attack greater than 50 deg. These ratings do not match the expectations from the extensive close-in combat testing where the X-31A aircraft demonstrated fair to good handling qualities maneuvering for high angles of attack. This paper presents the results of the high-angle-of-attack handling qualities flight testing of the X-31A aircraft. Discussion of the preparation for the maneuvers, the pilot ratings, and selected pilot comments are included. Evaluation of the results is made in conjunction with existing Neal Smith, bandwidth, Smith-Geddes, and military specifications.
Kelly, Peter J; Albers, Gregory W; Chatzikonstantinou, Anastasios; De Marchis, Gian Marco; Ferrari, Julia; George, Paul; Katan, Mira; Knoflach, Michael; Kim, Jong S; Li, Linxin; Lee, Eun-Jae; Olivot, Jean-Marc; Purroy, Francisco; Raposo, Nicolas; Rothwell, Peter M; Sharma, Vijay K; Song, Bo; Tsivgoulis, Georgios; Walsh, Cathal; Xu, Yuming; Merwick, Aine
2016-11-01
Identification of patients at highest risk of early stroke after transient ischaemic attack has been improved with imaging based scores. We aimed to compare the validity and prognostic utility of imaging-based stroke risk scores in patients after transient ischaemic attack. We did a pooled analysis of published and unpublished individual-patient data from 16 cohort studies of transient ischaemic attack done in Asia, Europe, and the USA, with early brain and vascular imaging and follow up. All patients were assessed by stroke specialists in hospital settings as inpatients, in emergency departments, or in transient ischaemic attack clinics. Inclusion criteria were stroke-specialist confirmed transient ischaemic attack, age of 18 years or older, and MRI done within 7 days of index transient ischaemic attack and before stroke recurrence. Multivariable logistic regression was done to analyse the predictive utility of abnormal diffusion-weighted MRI, carotid stenosis, and transient ischaemic attack within 1 week of index transient ischaemic attack (dual transient ischaemic attack) after adjusting for ABCD2 score. We compared the prognostic utility of the ABCD2, ABCD2-I, and ABCD3-I scores using discrimination, calibration, and risk reclassification. In 2176 patients from 16 cohort studies done between 2005 and 2015, after adjusting for ABCD2 score, positive diffusion-weighted imaging (odds ratio [OR] 3·8, 95% CI 2·1-7·0), dual transient ischaemic attack (OR 3·3, 95% CI 1·8-5·8), and ipsilateral carotid stenosis (OR 4·7, 95% CI 2·6-8·6) were associated with 7 day stroke after index transient ischaemic attack (p<0·001 for all). 7 day stroke risk increased with increasing ABCD2-I and ABCD3-I scores (both p<0·001). Discrimination to identify early stroke risk was improved for ABCD2-I versus ABCD2 (2 day c statistic 0·74 vs 0·64; p=0·006). However, discrimination was further improved by ABCD3-I compared with ABCD2 (2 day c statistic 0·84 vs 0·64; p<0·001) and ABCD2-I (c statistic 0·84 vs 0·74; p<0·001). Early stroke risk reclassification was improved by ABCD3-I compared with ABCD2-I score (clinical net reclassification improvement 33% at 2 days). Although ABCD2-I and ABCD3-I showed validity, the ABCD3-I score reliably identified highest-risk patients at highest risk of a stroke after transient ischaemic attack with improved risk prediction compared with ABCD2-I. Transient ischaemic attack management guided by ABCD3-I with immediate stroke-specialist assessment, urgent MRI, and vascular imaging should now be considered, with monitoring of safety and cost-effectiveness. Health Research Board of Ireland, Irish Heart Foundation, Irish Health Service Executive, Irish National Lottery, National Medical Research Council of Singapore, Swiss National Science Foundation, Bangerter-Rhyner Foundation, Swiss National Science Foundation, Swisslife Jubiläumsstiftung for Medical Research, Swiss Neurological Society, Fondazione Dr Ettore Balli (Switzerland), Clinical Trial Unit of University of Bern, South Korea's Ministry for Health, Welfare, and Family Affairs, UK Wellcome Trust, Wolfson Foundation, UK Stroke Association, British Heart Foundation, Dunhill Medical Trust, National Institute of Health Research (NIHR), Medical Research Council, and the NIHR Oxford Biomedical Research Centre. Copyright © 2016 Elsevier Ltd. All rights reserved.
Yoshikura, Hiroshi; Takeuchi, Fumihiko
2017-11-22
In norovirus and Campylobacter food poisonings, the frequencies of the number of patients per incident and that of the number of eaters per incident followed a lognormal distribution, with medians of 12-27 and 23-48 for norovirus and 5-8 and 9-21 for Campylobacter food poisonings, respectively. The lognormal frequency distribution of eaters could be simulated by assuming that people find a dish more appealing if that dish has already been found to be appealing to others. The numbers of patients and eaters per incident were not necessarily inter-correlated; the frequencies of the attack rates (number of patients/number of eaters) were distributed evenly from 0.01 to 1; that is, the attack rates of these food poisonings could not be represented by means and standard deviations. The frequency distributions of the attack rates were nevertheless not entirely disordered; plotting the attack rate against the number of patients in individual incidents produced fingerprint-like patterns that were repeatedly produced at the prefectural and national levels.
Lift and drag forces on an inclined plow moving over a granular surface.
Percier, Baptiste; Manneville, Sebastien; McElwaine, Jim N; Morris, Stephen W; Taberlet, Nicolas
2011-11-01
We studied the drag and lift forces acting on an inclined plate while it is dragged on the surface of a granular media, both in experiment and in numerical simulation. In particular, we investigated the influence of the horizontal velocity of the plate and its angle of attack. We show that a steady wedge of grains is moved in front of the plow and that the lift and drag forces are proportional to the weight of this wedge. These constants of proportionality vary with the angle of attack but not (or only weakly) on the velocity. We found a universal effective friction law that accounts for the dependence on all the above-mentioned parameters. The stress and velocity fields are calculated from the numerical simulations and show the existence of a shear band under the wedge and that the pressure is nonhydrostatic. The strongest gradients in stress and shear occur at the base of the plow where the dissipation rate is therefore highest.
Baaten, Gijs G; Sonder, Gerard J B; Van Der Loeff, Maarten F Schim; Coutinho, Roel A; Van Den Hoek, Anneke
2010-01-01
To evaluate whether changes in attack rates of fecal-orally transmitted diseases among travelers are related to changes in pretravel vaccination practices or better hygienic standards at travel destination. National surveillance data on all laboratory-confirmed cases of travel-related hepatitis A, shigellosis, and typhoid fever diagnosed in the Netherlands from 1995 to 2006 were matched with the number of Dutch travelers to developing countries to calculate region-specific annual attack rates. Trends in attack rates of non-vaccine-preventable shigellosis were compared with those of vaccine-preventable hepatitis A and typhoid fever. Trends were also compared with three markers for hygienic standards of the local population at travel destinations, drawn from the United Nations Development Programme database: the human development index, the sanitation index, and the water source index. Attack rates among Dutch travelers to developing regions declined for hepatitis A, shigellosis, and typhoid fever. Region-specific trends in attack rates of shigellosis resembled trends of hepatitis A and typhoid fever. Declining attack rates of the three fecal-orally transmitted diseases correlated with improvements in socioeconomic, sanitary, and water supply conditions of the local population at travel destination. These findings suggest that improved hygienic standards at travel destination strongly contributed to the overall decline in attack rates of fecal-orally transmitted diseases among visiting travelers. © 2010 International Society of Travel Medicine.
Epidemiologic patterns of influenza outbreaks in institutional settings.
Šubelj, M
2018-02-01
Congregate environments facilitate spread of influenza viruses and could result in serious outcomes among residents. We reviewed the epidemiology and identified factors that affect outbreak outcomes, using descriptive statistics and generalized estimating equations (GEE) regression. Outbreak duration, attack rate, hospitalization rate, case fatality rate, and the proportion of laboratory tests performed among infected residents were calculated by viral etiology, time to notification, and facility type and size. Between January 2011 and May 2015, the median attack rate for the 41 influenza outbreaks was highest among children in kindergarten (34%) and lowest among patients, who acquired influenza during hospitalization (17%). The median number of cases in each outbreak was 37 (range: 6-158) and a median of 199 individuals (range: 25-574) was exposed to influenza. The outbreaks lasted 2-49 days (median: 13 days). The average case fatality rate among residents for outbreaks attributed to influenza A or B was 3.1/1000 and for outbreaks attributed to influenza B 6.7/1000. Median time to notification was 10 days after the index case. In multivariate analysis, influenza outbreaks reported sooner after onset in the primary case ended sooner (P = 0.027) and had lower case fatality rates (P < 0.001). Residing in larger facilities was associated with lower proportion of laboratory tests performed (P = 0.024). Understanding whether earlier notification is a measure of a better functioning and therefore safer facility is a potentially important measure of the quality of care. Copyright © 2017 The Royal Society for Public Health. Published by Elsevier Ltd. All rights reserved.
NASA Astrophysics Data System (ADS)
Zhang, Yichen; Li, Zhengyu; Zhao, Yijia; Yu, Song; Guo, Hong
2017-02-01
We analyze the security of the two-way continuous-variable quantum key distribution protocol in reverse reconciliation against general two-mode attacks, which represent all accessible attacks at fixed channel parameters. Rather than against one specific attack model, the expression of secret key rates of the two-way protocol are derived against all accessible attack models. It is found that there is an optimal two-mode attack to minimize the performance of the protocol in terms of both secret key rates and maximal transmission distances. We identify the optimal two-mode attack, give the specific attack model of the optimal two-mode attack and show the performance of the two-way protocol against the optimal two-mode attack. Even under the optimal two-mode attack, the performances of two-way protocol are still better than the corresponding one-way protocol, which shows the advantage of making double use of the quantum channel and the potential of long-distance secure communication using a two-way protocol.
Item Anomaly Detection Based on Dynamic Partition for Time Series in Recommender Systems
Gao, Min; Tian, Renli; Wen, Junhao; Xiong, Qingyu; Ling, Bin; Yang, Linda
2015-01-01
In recent years, recommender systems have become an effective method to process information overload. However, recommendation technology still suffers from many problems. One of the problems is shilling attacks-attackers inject spam user profiles to disturb the list of recommendation items. There are two characteristics of all types of shilling attacks: 1) Item abnormality: The rating of target items is always maximum or minimum; and 2) Attack promptness: It takes only a very short period time to inject attack profiles. Some papers have proposed item anomaly detection methods based on these two characteristics, but their detection rate, false alarm rate, and universality need to be further improved. To solve these problems, this paper proposes an item anomaly detection method based on dynamic partitioning for time series. This method first dynamically partitions item-rating time series based on important points. Then, we use chi square distribution (χ2) to detect abnormal intervals. The experimental results on MovieLens 100K and 1M indicate that this approach has a high detection rate and a low false alarm rate and is stable toward different attack models and filler sizes. PMID:26267477
Item Anomaly Detection Based on Dynamic Partition for Time Series in Recommender Systems.
Gao, Min; Tian, Renli; Wen, Junhao; Xiong, Qingyu; Ling, Bin; Yang, Linda
2015-01-01
In recent years, recommender systems have become an effective method to process information overload. However, recommendation technology still suffers from many problems. One of the problems is shilling attacks-attackers inject spam user profiles to disturb the list of recommendation items. There are two characteristics of all types of shilling attacks: 1) Item abnormality: The rating of target items is always maximum or minimum; and 2) Attack promptness: It takes only a very short period time to inject attack profiles. Some papers have proposed item anomaly detection methods based on these two characteristics, but their detection rate, false alarm rate, and universality need to be further improved. To solve these problems, this paper proposes an item anomaly detection method based on dynamic partitioning for time series. This method first dynamically partitions item-rating time series based on important points. Then, we use chi square distribution (χ2) to detect abnormal intervals. The experimental results on MovieLens 100K and 1M indicate that this approach has a high detection rate and a low false alarm rate and is stable toward different attack models and filler sizes.
Guillén, Larissa; Adaime, Ricardo; Birke, Andrea; Velázquez, Olinda; Angeles, Guillermo; Ortega, Fernando; Ruíz, Eliel; Aluja, Martín
2017-04-01
We determined the influence of resin ducts, sap content, and fruit physicochemical features of four mango cultivars (Criollo, Manila, Ataulfo, and Tommy Atkins) on their susceptibility to the attack of the two most pestiferous fruit fly species infesting mangoes in Mexico: Anastrepha ludens (Loew) and Anastrepha obliqua (Macquart). We performed three studies: 1) analysis of resin ducts in mango fruit exocarp to determine the density and area occupied by resin ducts in each mango cultivar, 2) assessment of mango physicochemical features including fruit sap content, and 3) a forced infestation trial under field conditions using enclosed fruit-bearing branches to expose mangoes to gravid A. ludens or A. obliqua females. Infestation rates, development time from egg to prepupae and pupae, pupal weight, and percent of adult emergence, were assessed. 'Ataulfo' and 'Tommy Atkins' cultivars exhibited the highest resin duct density and sap content, the lowest infestation rate, and had a negative effect on immature development and pupal weight. In sharp contrast, 'Manila' and 'Criollo' cultivars, with the lowest resin duct density and sap content, were highly susceptible to A. ludens and A. obliqua attack. We conclude that sap content and the number, size, and distribution of resin ducts as well as firmness in mango fruit exocarp are all involved in the resistance of mango to A. ludens and A. obliqua attack. © The Authors 2017. Published by Oxford University Press on behalf of Entomological Society of America. All rights reserved. For Permissions, please email: journals.permissions@oup.com.
Darrah, Abigail J.; Greeney, Harold F.; van Riper, Charles
2017-01-01
The Lower Colorado River provides critical riparian areas in an otherwise arid region and is an important stopover site for migrating landbirds. In order to reverse ongoing habitat degradation due to drought and human-altered hydrology, a pulse flow was released from Morelos Dam in spring of 2014, which brought surface flow to dry stretches of the Colorado River in Mexico. To assess the potential effects of habitat modification resulting from the pulse flow, we used foraging behavior of spring migrants from past and current studies to assess the relative importance of different riparian habitats. We observed foraging birds in 2000 and 2014 at five riparian sites along the Lower Colorado River in Mexico to quantify prey attack rates, prey attack maneuvers, vegetation use patterns, and degree of preference for fully leafed-out or flowering plants. Prey attack rate was highest in mesquite (Prosopis spp.) in 2000 and in willow (Salix gooddingii) in 2014; correspondingly, migrants predominantly used mesquite in 2000 and willow in 2014 and showed a preference for willows in flower or fruit in 2014. Wilson’s warbler (Cardellina pusilla) used relatively more low-energy foraging maneuvers in willow than in tamarisk (Tamarix spp.) or mesquite. Those patterns in foraging behavior suggest native riparian vegetation, and especially willow, are important resources for spring migrants along the lower Colorado River. Willow is a relatively short-lived tree dependent on spring floods for dispersal and establishment and thus spring migrants are likely to benefit from controlled pulse flows.
Rojas, DP; Dean, NE; Yang, Y; Kenah, E; Quintero, J; Tomasi, S; Ramirez, EL; Kelly, Y; Castro, C; Carrasquilla, G; Halloran, ME; Longini, IM
2016-01-01
Transmission of Zika virus (ZIKV) was first detected in Colombia in September 2015. As of April 2016, Colombia had reported over 65,000 cases of Zika virus disease (ZVD). We analysed daily surveillance data of ZVD cases reported to the health authorities of San Andres and Girardot, Colombia, between September 2015 and January 2016. ZVD was laboratory-confirmed by reverse transcription-polymerase chain reaction (RT-PCR) in the serum of acute cases within five days of symptom onset. We use daily incidence data to estimate the basic reproductive number (R0) in each population. We identified 928 and 1,936 reported ZVD cases from San Andres and Girardot, respectively. The overall attack rate for reported ZVD was 12.13 cases per 1,000 residents of San Andres and 18.43 cases per 1,000 residents of Girardot. Attack rates were significantly higher in females in both municipalities (p < 0.001). Cases occurred in all age groups with highest rates in 20 to 49 year-olds. The estimated R0 for the Zika outbreak was 1.41 (95% confidence interval (CI): 1.15–1.74) in San Andres and 4.61 (95% CI: 4.11–5.16) in Girardot. Transmission of ZIKV is ongoing in the Americas. The estimated R0 from Colombia supports the observed rapid spread. PMID:27452806
Johnson, Eric L; Beal, James R
2013-03-01
Secondhand smoking (passive smoking) is associated with many negative health effects, primarily respiratory and cardiovascular diseases. Approximately, 46,000 deaths from cardiovascular disease are associated with secondhand smoke exposure annually in the United States, which is roughly 150 deaths in North Dakota. Studies show that passage of smoke-free laws at the community level can reduce the incidence of heart attack. We conducted a retrospective review of electronic medical records of patients admitted for heart attacks 4 months prior (April 15, 2010 through August 14, 2010) to implementation of the smoke-free ordinance and 4 months following (August 15, 2010 through December 14, 2010) implementation of the comprehensive smoke-free ordinance in Grand Forks, ND, United States. We found an association between the heart attack rate and implementation of the comprehensive smoke-free law. The heart attack rate prior to the ban was 0.5% (83/16,702) compared with 0.3% (63/18,513) after the ban (p = .023). Thus, the rate of heart attacks decreased 30.6% and number of heart attack admissions decreased 24.1%, from 83 to 63, after implementation of a comprehensive smoke-free law. We found an implementation of the comprehensive smoke-free law was associated with a decrease in the heart attack rate. The heart attack rate decreased 30.6%. Our finding was similar to previous community level smoke-free law implementation studies and notable for the change going from a partial smoke-free law to a comprehensive smoke-free law.
Kriszbacher, Ildikó; Bódis, József; Boncz, Imre; Koppan, Agnes; Koppan, Miklós
2010-04-01
We investigated whether the time of sunrise and the number of daylight hours have an effect on the seasonality, or the daily rhythm of heart attack mortality. We analyzed retrospectively data of patients admitted to hospitals with the diagnosis of heart attack (n=32,329) and patients who deceased of a heart attack (n=5142) between January 1, 2004 and December 31, 2005 in Hungary. Heart attack mortality was highest during winter, while lowest number of events was recorded during summer . The daily peak of diurnality was between 6:00 am and 12:00 pm (33.77%). A positive correlation was found between the time of sunrise, time of sunset and the mortality caused by myocardial infarction (p<0,01). In the analysis of the number of daylight hours and the heart attack mortality we found a negative correlation (r=-0.105, p<0.05). No significant difference was found between sexes and different age-groups in heart attack mortality. Our data suggest, that the occurrence and the mortality of heart attack may be related to the time of sunrise and the number of daylight hours. Copyright 2008 Elsevier Ireland Ltd. All rights reserved.
Ie, Kenya; Yoshizawa, Atsuto; Hirano, Satoru; Izumi, Sinyuu; Hojo, Masaaki; Sugiyama, Haruhito; Kobayasi, Nobuyuki; Kudou, Kouichirou; Maehara, Yasuhiro; Kawachi, Masaharu; Miyakoshi, Kouichi
2010-07-01
We investigated the risk factor of perioperative asthmatic attack and effectiveness of preventing treatment for asthmatic attack before operation. We performed retrospective chart review of one hundred eleven patients with asthma underwent general anesthesia and surgical intervention from January 2006 to October 2007 in our hospital. The rate of perioperative asthmatic attack were as follows; 10.2% (5 in 49 cases) in no pretreatment group, 7.5% (3 in 40 cases) in any pretreatments except for systemic steroid, and 4.5% (1 in 22 cases) in systemic steroid pretreatment group. Neither preoperative asthma severity nor duration from the last attack had significant relevancy to perioperative attack rate. The otolaryngological surgery, especially those have nasal polyp and oral surgery had high perioperative asthma attack rate, although there was no significant difference. We recommend the systemic steroid pretreatment for asthmatic patients, especially when they have known risk factor such as administration of the systemic steroid within 6 months, or possibly new risk factor such as nasal polyp, otolaryngological and oral surgery.
determined by a kinetic study of the reactions of m-chloro- and 3,4-dimethylbenzylamine with styrene oxide in ethanol at 3 temperatures. The results...and o-methyl-styrene oxide with benzylamine in ethanol showed that the beta-methyl group reduces the rate of attack at both positions very...considerably, while the alpha-methyl group reduces the rate of normal attack slightly and that of abnormal attack considerably, and the o-methyl group has surprisingly little effect of the rate of attack at either position. (Author)
Filleul, Laurent; Ranoaritiana, Dany Bakoly; Balleydier, Elsa; Vandroux, David; Ferlay, Clémence; Jaffar-Bandjee, Marie-Christine; Jaubert, Julien; Roquebert, Bénédicte; Lina, Bruno; Valette, Martine; Hubert, Bruno; Larrieu, Sophie; Brottet, Elise
2016-11-24
The 2016 seasonal influenza in Réunion in the southern hemisphere, was dominated by influenza A(H1N1)pdm09 (possibly genogroup 6B.1). An estimated 100,500 patients with acute respiratory infection (ARI) consulted a physician (cumulative attack rate 11.9%). Sixty-six laboratory-confirmed cases (65.7/100,000 ARI consultations) were hospitalised in an intensive care unit, the highest number since 2009. Impact on intensive care units was major. Correlation between severe cases was 0.83 between Réunion and France and good for 2009 to 2015. This article is copyright of The Authors, 2016.
Filleul, Laurent; Ranoaritiana, Dany Bakoly; Balleydier, Elsa; Vandroux, David; Ferlay, Clémence; Jaffar-Bandjee, Marie-Christine; Jaubert, Julien; Roquebert, Bénédicte; Lina, Bruno; Valette, Martine; Hubert, Bruno; Larrieu, Sophie; Brottet, Elise
2016-01-01
The 2016 seasonal influenza in Réunion in the southern hemisphere, was dominated by influenza A(H1N1)pdm09 (possibly genogroup 6B.1). An estimated 100,500 patients with acute respiratory infection (ARI) consulted a physician (cumulative attack rate 11.9%). Sixty-six laboratory-confirmed cases (65.7/100,000 ARI consultations) were hospitalised in an intensive care unit, the highest number since 2009. Impact on intensive care units was major. Correlation between severe cases was 0.83 between Réunion and France and good for 2009 to 2015. PMID:27918264
Ventilatory control of heart rate during inhalation of 5% CO2 and types of panic attacks.
Ley, R
1991-09-01
Differences in the magnitude of increases in heart rate during prolonged inhalation of 5% CO2 range from a mean of 25 b/min for a group of eight panic-disorder patients who panicked (Woods, Charney, Goodman, & Heninger, 1988. Archives of General Psychiatry, 45, 43-52) to zero b/min for 16 patients, eight of whom panicked (Craske & Barlow, 1990. Journal of Abnormal Psychology, 99, 302-307). What accounts for this disparity? The present paper describes how heart rate can be increased by means of voluntary overbreathing during prolonged inhalation of 5% CO2 in air. This suggests that differences in the degree of overbreathing may explain differences in the magnitude of increases in heart rate during inhalation of 5% CO2. An explanation is also offered for the curious finding that some patients experience "panic attacks" with zero increase in heart rate. Evidence suggests that this is likely to happen in cognitively based panic attacks, in contrast to hyperventilatory attacks or anticipatory attacks.
Martinson, S J; Fernádez Ajó, A A; Martínez, A S; Krivak-Tetley, F E; Villacide, J M; Ayres, M P; Corley, J C
2018-04-18
Accidental and intentional global movement of species has increased the frequency of novel plant-insect interactions. In Patagonia, the European woodwasp, Sirex noctilio, has invaded commercial plantations of North American pines. We compared the patterns of resin defenses and S. noctilio-caused mortality at two mixed-species forests near San Carlos de Bariloche, Argentina. We observed lower levels of resin flow and higher levels of mortality in Pinus contorta compared with Pinus ponderosa. In general, S. noctilio attacked trees with lower resin compared with neighboring trees. Resin production in P. ponderosa was not related to growth rates, but for P. contorta, slower growing trees produced less resin than faster growing conspecifics. For all infested trees, attack density and number of drills (ovipositor probes) per attack did not vary with resin production. Most attacks resulted in one or two drills. Attack rates and drills/attack were basically uniform across the bole of the tree except for a decrease in both drills/attack and attack density in the upper portion of the crown, and an increase in the attack density for the bottom 10% of the tree. Planted pines in Patagonia grow faster than their counterparts in North America, and produce less resin, consistent with the growth-differentiation balance hypothesis. Limited resin defenses may help to explain the high susceptibility of P. contorta to woodwasps in Patagonia.
Unsupervised Anomaly Detection Based on Clustering and Multiple One-Class SVM
NASA Astrophysics Data System (ADS)
Song, Jungsuk; Takakura, Hiroki; Okabe, Yasuo; Kwon, Yongjin
Intrusion detection system (IDS) has played an important role as a device to defend our networks from cyber attacks. However, since it is unable to detect unknown attacks, i.e., 0-day attacks, the ultimate challenge in intrusion detection field is how we can exactly identify such an attack by an automated manner. Over the past few years, several studies on solving these problems have been made on anomaly detection using unsupervised learning techniques such as clustering, one-class support vector machine (SVM), etc. Although they enable one to construct intrusion detection models at low cost and effort, and have capability to detect unforeseen attacks, they still have mainly two problems in intrusion detection: a low detection rate and a high false positive rate. In this paper, we propose a new anomaly detection method based on clustering and multiple one-class SVM in order to improve the detection rate while maintaining a low false positive rate. We evaluated our method using KDD Cup 1999 data set. Evaluation results show that our approach outperforms the existing algorithms reported in the literature; especially in detection of unknown attacks.
Ngwa, Moise C; Liang, Song; Kracalik, Ian T; Morris, Lillian; Blackburn, Jason K; Mbam, Leonard M; Ba Pouth, Simon Franky Baonga; Teboh, Andrew; Yang, Yang; Arabi, Mouhaman; Sugimoto, Jonathan D; Morris, John Glenn
2016-11-01
Recurrent cholera outbreaks have been reported in Cameroon since 1971. However, case fatality ratios remain high, and we do not have an optimal understanding of the epidemiology of the disease, due in part to the diversity of Cameroon's climate subzones and a lack of comprehensive data at the health district level. A unique health district level dataset of reported cholera case numbers and related deaths from 2000-2012, obtained from the Ministry of Public Health of Cameroon and World Health Organization (WHO) country office, served as the basis for the analysis. During this time period, 43,474 cholera cases were reported: 1748 were fatal (mean annual case fatality ratio of 7.9%), with an attack rate of 17.9 reported cases per 100,000 inhabitants per year. Outbreaks occurred in three waves during the 13-year time period, with the highest case fatality ratios at the beginning of each wave. Seasonal patterns of illness differed strikingly between climate subzones (Sudano-Sahelian, Tropical Humid, Guinea Equatorial, and Equatorial Monsoon). In the northern Sudano-Sahelian subzone, highest number of cases tended to occur during the rainy season (July-September). The southern Equatorial Monsoon subzone reported cases year-round, with the lowest numbers during peak rainfall (July-September). A spatial clustering analysis identified multiple clusters of high incidence health districts during 2010 and 2011, which were the 2 years with the highest annual attack rates. A spatiotemporal autoregressive Poisson regression model fit to the 2010-2011 data identified significant associations between the risk of transmission and several factors, including the presence of major waterbody or highway, as well as the average daily maximum temperature and the precipitation levels over the preceding two weeks. The direction and/or magnitude of these associations differed between climate subzones, which, in turn, differed from national estimates that ignored subzones differences in climate variables. The epidemiology of cholera in Cameroon differs substantially between climate subzones. Development of an optimal comprehensive country-wide control strategy for cholera requires an understanding of the impact of the natural and built environment on transmission patterns at the local level, particularly in the setting of ongoing climate change.
Kabacinski, Jaroslae; Dworak, Lecholslaw B; Murawa, Michal; Ostarello, John; Rzepnicka, Agata; Maczynski, Jacek
2016-12-01
The purpose of the study was to compare the take-off dynamics in counter-movement jump (CMJ), volleyball block and spikes. Twelve professional female players, representing the highest volleyball league in Poland, participated in the laboratory tests. A force platform was used to record ground reaction force (GRF) during take-off phase in CMJ test, block from a run-up and spikes: front row attack, slide attack, back row attack. Vertical (v) GRF (peak: Rmax and integral mean: ) were analyzed. Significant differences (P<0.05) of values of the dynamic parameters (Rmax, ) were found between CMJ, block from a run-up and three different technique spikes. The highest values were recorded during take-off in the back row attack: peak vGRF (2.93±0.05 BW), integral mean vGRF (1.90±0.08 BW), impulse of vGRF (354±40 Ns), peak power (5320±918 W) and integral mean power (3604±683 W). Peak power (2608±217 W) and integral mean power (1417±94 W) were determined in CMJ test to evaluate the force-velocity capabilities of the players. In terms of GRF and the mechanical power, high level of dynamics in take-off influences positively the jumping height and significantly increases the effectiveness of attacks during spike of the ball over the block of the opponent.
Asnaani, Anu; Gutner, Cassidy A; Hinton, Devon E; Hofmann, Stefan G
2009-01-01
The current study investigates race-ethnic differences in rates of panic disorder, panic attacks and certain panic attack symptoms by jointly combining three major national epidemiological databases. The compared groups were White, African American, Latino and Asian. The White group had significantly higher rates of panic disorder, and of many panic symptoms, including palpitations, as compared to the African American, Asian and Latino groups. Several expected race-ethnic differences were not found. An explanation for these findings are adduced, and suggestions are given for future studies so that possible ethnic-racial differences in panic disorder, panic attacks and panic attack symptoms can be investigated in a more rigorous manner.
The potential economic burden of Zika in the continental United States.
Lee, Bruce Y; Alfaro-Murillo, Jorge A; Parpia, Alyssa S; Asti, Lindsey; Wedlock, Patrick T; Hotez, Peter J; Galvani, Alison P
2017-04-01
As the Zika virus epidemic continues to spread internationally, countries such as the United States must determine how much to invest in prevention, control, and response. Fundamental to these decisions is quantifying the potential economic burden of Zika under different scenarios. To inform such decision making, our team developed a computational model to forecast the potential economic burden of Zika across six states in the US (Alabama, Florida, Georgia, Louisiana, Mississippi, and Texas) which are at greatest risk of Zika emergence, under a wide range of attack rates, scenarios and circumstances. In order to accommodate a wide range of possibilities, different scenarios explored the effects of varying the attack rate from 0.01% to 10%. Across the six states, an attack rate of 0.01% is estimated to cost $183.4 million to society ($117.1 million in direct medical costs and $66.3 million in productivity losses), 0.025% would result in $198.6 million ($119.4 million and $79.2 million), 0.10% would result in $274.6 million ($130.8 million and $143.8 million) and 1% would result in $1.2 billion ($268.0 million and $919.2 million). Our model and study show how direct medical costs, Medicaid costs, productivity losses, and total costs to society may vary with different attack rates across the six states and the circumstances at which they may exceed certain thresholds (e.g., Zika prevention and control funding allocations that are being debated by the US government). A Zika attack rate of 0.3% across the six states at greatest risk of Zika infection, would result in total costs that exceed $0.5 billion, an attack rate of 1% would exceed $1 billion, and an attack rate of 2% would exceed $2 billion.
Spelman, Tim; Meyniel, Claire; Rojas, Juan Ignacio; Lugaresi, Alessandra; Izquierdo, Guillermo; Grand'Maison, Francois; Boz, Cavit; Alroughani, Raed; Havrdova, Eva; Horakova, Dana; Iuliano, Gerardo; Duquette, Pierre; Terzi, Murat; Grammond, Pierre; Hupperts, Raymond; Lechner-Scott, Jeannette; Oreja-Guevara, Celia; Pucci, Eugenio; Verheul, Freek; Fiol, Marcela; Van Pesch, Vincent; Cristiano, Edgardo; Petersen, Thor; Moore, Fraser; Kalincik, Tomas; Jokubaitis, Vilija; Trojano, Maria; Butzkueven, Helmut
2017-09-01
Characteristics at clinically isolated syndrome (CIS) examination assist in identification of patient at highest risk of early second attack and could benefit the most from early disease-modifying drugs (DMDs). To examine determinants of second attack and validate a prognostic nomogram for individualised risk assessment of clinical conversion. Patients with CIS were prospectively followed up in the MSBase Incident Study. Predictors of clinical conversion were analysed using Cox proportional hazards regression. Prognostic nomograms were derived to calculate conversion probability and validated using concordance indices. A total of 3296 patients from 50 clinics in 22 countries were followed up for a median (inter-quartile range (IQR)) of 1.92 years (0.90, 3.71). In all, 1953 (59.3%) patients recorded a second attack. Higher Expanded Disability Status Scale (EDSS) at baseline, first symptom location, oligoclonal bands and various brain and spinal magnetic resonance imaging (MRI) metrics were all predictors of conversion. Conversely, older age and DMD exposure post-CIS were associated with reduced rates. Prognostic nomograms demonstrated high concordance between estimated and observed conversion probabilities. This multinational study shows that age at CIS onset, DMD exposure, EDSS, multiple brain and spinal MRI criteria and oligoclonal bands are associated with shorter time to relapse. Nomogram assessment may be useful in clinical practice for estimating future clinical conversion.
Zhou, Wei; Wen, Junhao; Qu, Qiang; Zeng, Jun; Cheng, Tian
2018-01-01
Recommender systems are vulnerable to shilling attacks. Forged user-generated content data, such as user ratings and reviews, are used by attackers to manipulate recommendation rankings. Shilling attack detection in recommender systems is of great significance to maintain the fairness and sustainability of recommender systems. The current studies have problems in terms of the poor universality of algorithms, difficulty in selection of user profile attributes, and lack of an optimization mechanism. In this paper, a shilling behaviour detection structure based on abnormal group user findings and rating time series analysis is proposed. This paper adds to the current understanding in the field by studying the credibility evaluation model in-depth based on the rating prediction model to derive proximity-based predictions. A method for detecting suspicious ratings based on suspicious time windows and target item analysis is proposed. Suspicious rating time segments are determined by constructing a time series, and data streams of the rating items are examined and suspicious rating segments are checked. To analyse features of shilling attacks by a group user's credibility, an abnormal group user discovery method based on time series and time window is proposed. Standard testing datasets are used to verify the effect of the proposed method.
Wen, Junhao; Qu, Qiang; Zeng, Jun; Cheng, Tian
2018-01-01
Recommender systems are vulnerable to shilling attacks. Forged user-generated content data, such as user ratings and reviews, are used by attackers to manipulate recommendation rankings. Shilling attack detection in recommender systems is of great significance to maintain the fairness and sustainability of recommender systems. The current studies have problems in terms of the poor universality of algorithms, difficulty in selection of user profile attributes, and lack of an optimization mechanism. In this paper, a shilling behaviour detection structure based on abnormal group user findings and rating time series analysis is proposed. This paper adds to the current understanding in the field by studying the credibility evaluation model in-depth based on the rating prediction model to derive proximity-based predictions. A method for detecting suspicious ratings based on suspicious time windows and target item analysis is proposed. Suspicious rating time segments are determined by constructing a time series, and data streams of the rating items are examined and suspicious rating segments are checked. To analyse features of shilling attacks by a group user’s credibility, an abnormal group user discovery method based on time series and time window is proposed. Standard testing datasets are used to verify the effect of the proposed method. PMID:29742134
Dow, Geoffrey S; McCarthy, William F; Reid, Mark; Smith, Bryan; Tang, Douglas; Shanks, G Dennis
2014-02-06
In 2000/2001, the Australian Defense Forces (ADF), in collaboration with SmithKline Beecham and the United States Army, conducted a field trial to evaluate the safety, tolerability and efficacy of tafenoquine and mefloquine/primaquine for the prophylaxis of malaria amongst non-immune Australian soldiers deployed to East Timor (now called Timor Leste) for peacekeeping operations. The lack of a concurrent placebo control arm prevented an internal estimate of the malaria attack rate and so the protective efficacy of the study regimens was not determined at the time. In a retrospective analysis of the trial results, the all species malaria attack rate was estimated for the prophylactic phase of the study which was defined as the period between administration of the first prophylactic dose and the first dose of post-deployment medication. First, the Plasmodium vivax attack rate was estimated during the prophylactic phase of the deployment by adjusting the observed P. vivax relapse rate during post-deployment to account for the known anti-relapse efficacies (or effectiveness) of the study medications (determined from prior studies). The all species malaria attack rate (P. vivax and Plasmodium falciparum) was then determined by adjusting the P. vivax attack rate based on the ratio of P. falciparum to P. vivax observed during prior ADF deployments to Timor Leste. This estimated all species malaria attack rate was then used as the 'constant estimated attack rate' in the calculation of the protective efficacy of tafenoquine and mefloquine during the prophylactic phase of the deployment. The estimated attack rate during the prophylactic phase of the study was determined to be 7.88%. The protective efficacies of tafenoquine and mefloquine, with corresponding 95% confidence intervals (95% CI), were determined to be 100% (93%-100%) and 100% (79%-100%) respectively. The protective efficacy of tafenoquine (200 mg per day for three days, followed by weekly 200 mg maintenance doses) is similar to that of the weekly standard of care (mefloquine, 250 mg).
NASA Technical Reports Server (NTRS)
Hinton, David A.
1988-01-01
An effort is underway by NASA, FAA, and industry to reduce the threat of convective microburst wind shear phenomena to aircraft. The goal is to develop and test a candidate set of strategies for recovery from inadvertent microburst encounters during takeoff. Candidate strategies were developed and evaluated using a fast-time simulation consisting of a simple point-mass performance model of a transport-category airplane and an analytical microburst model. The results indicate that the recovery strategy characteristics that best utilize available airplane energy include an initial reduction in pitch attitude to reduce the climb rate, followed by an increase in pitch up to the stick shaker angle of attack. The stick shaker angle of attack should be reached just as the airplane is exiting the microburst. The shallowest angle of climb necessary for obstacle clearance should be used. If the altitude is higher than necessary, an intentional descent to reduce the airspeed deceleration should be used. Of the strategies tested, two flight-path-angle based strategies had the highest recovery altitudes and the least sensitivity to variations in the encounter scenarios.
Effect of attack angle on flow characteristic of centrifugal fan
NASA Astrophysics Data System (ADS)
Wu, Y.; Dou, H. S.; Wei, Y. K.; Chen, X. P.; Chen, Y. N.; Cao, W. B.
2016-05-01
In this paper, numerical simulation is performed for the performance and internal flow of a centrifugal fan with different operating conditions using steady three-dimensional incompressible Navier-Stokes equations coupled with the RNG k-e turbulent model. The performance curves, the contours of static pressure, total pressure, radial velocity, relative streamlines and turbulence intensity at different attack angles are obtained. The distributions of static pressure and velocity on suction surface and pressure surface in the same impeller channel are compared for various attack angles. The research shows that the efficiency of the centrifugal fan is the highest when the attack angle is 8 degree. The main reason is that the vortex flow in the impeller is reduced, and the jet-wake pattern is weakened at the impeller outlet. The pressure difference between pressure side and suction side is smooth and the amplitude of the total pressure fluctuation is low along the circumferential direction. These phenomena may cause the loss reduced for the attack angle of about 8 degree.
Buehlmann, Manuela; Beltraminelli, Helmut; Strub, Christoph; Bircher, Andreas; Jordan, Xavier; Battegay, Manuel; Itin, Peter; Widmer, Andreas F
2009-04-01
To investigate a large outbreak of scabies in an intensive care unit of a university hospital and an affiliated rehabilitation center, and to establish effective control measures to prevent further transmission. Outbreak investigation. The intensive care unit of a 750-bed university hospital and an affiliated 92-bed rehabilitation center. All exposed individuals were screened by a senior staff dermatologist. Scabies was diagnosed on the basis of (1) identification of mites by skin scraping, (2) identification of mites by dermoscopy, or (3) clinical examination of patients without history of prior treatment for typical burrows. During a follow-up period of 6 months, the attack rate was calculated as the number of symptomatic individuals divided by the total number of exposed individuals. All exposed healthcare workers (HCWs) and their household members underwent preemptive treatment. Initially, the most effective registered drug in Switzerland (ie, topical lindane) was prescribed, but this prescription was switched to topical permethrin or systemic ivermectin as a result of the progression of the outbreak. Individuals with any signs or symptoms of scabies underwent dermatological examination. Within 7 months, 19 cases of scabies were diagnosed, 6 in children with a mean age of 3.1 years after exposure to the index patient with HIV and crusted scabies. A total of 1,640 exposed individuals underwent preemptive treatment. The highest attack rate of 26%-32% was observed among HCWs involved in the care of the index patient. A too-restricted definition of individuals at risk, noncompliance with treatment, and the limited effectiveness of lindane likely led to treatment failure, relapse, and reinfestation within families. Crusted scabies resulted in high attack rates among HCWs and household contacts. Timely institution of hygienic precautions with close monitoring and widespread, simultaneous scabicide treatment of all exposed individuals are essential for control of an outbreak.
Hagengimana, Athanase; Hinton, Devon; Bird, Bruce; Pollack, Mark; Pitman, Roger K.
2009-01-01
The present study is the first to attempt to determine rates of panic attacks, especially ‘somatically focused’ panic attacks, panic disorder, symptoms of post-traumatic stress disorder (PTSD), and depression levels in a population of Rwandans traumatized by the 1994 genocide. The following measures were utilized: the Rwandan Panic-Disorder Survey (RPDS); the Beck Depression Inventory (BDI); the Harvard Trauma Questionnaire (HTQ); and the PTSD Checklist (PCL). Forty of 100 Rwandan widows suffered somatically focused panic attacks during the previous 4 weeks. Thirty-five (87%) of those having panic attacks suffered panic disorder, making the rate of panic disorder for the entire sample 35%. Rwandan widows with panic attacks had greater psychopathology on all measures. Somatically focused panic-attack subtypes seem to constitute a key response to trauma in the Rwandan population. Future studies of traumatized non-Western populations should carefully assess not only somatoform disorder but also somatically focused panic attacks. PMID:12581815
NASA Technical Reports Server (NTRS)
Suit, W. T.
1977-01-01
Flight test data are used to extract the lateral aerodynamic parameters of the F-8C airplane at moderate to high angles of attack. The data were obtained during perturbations of the airplane from steady turns with trim normal accelerations from 1.5g to 3.0g. The angle-of-attack variation from trim was negligible. The aerodynamic coefficients extracted from flight data were compared with several other sets of coefficients, and the extracted coefficients resulted in characteristics for the Dutch roll mode (at the highest angles of attack) similar to those of a set of coefficients that have been the basis of several simulations of the F-8C.
Epidemic meningococcal disease: recommendations for travelers to Nepal.
1985-03-08
In the Kathmandu Valley of Nepal, an epidemic of serogroup A meningococcal meningitis resulted in 875 cases and 95 deaths during the 1st 6 months of 1983. The overall annual attack rate was 103 cases/100,000 population; the case fatality ratio was 11%. The highest age-specific attack rate (223/100,000) occurred among children under age 1 year. 3 times as many cases occurred in Kathmandu during December 1983 and January 1984 as in the same period a year previously. A mass vaccination campaign was initiated on February 8, 1984, and 330,000 doses of bivalent A/C meningococcal vaccine were administered, achieving approximately 65% coverage of the target population. A marked decline in the number of meningitis cases occurred coincident with the initiation of the mass campaign. In 1985 meningococcal meningitis is occurring at a much lower rate than in 1984, but meningococcal disease among hikers now is being recognized. Over the January 1984-January 1985 period, 2 culture-confirmed and 4 clinically suspected cases of meningococcal disease were documented among tourists from western countries traveling in Nepal. Patients ranged in age from 16-40 years. 5 patients had evidence of meningococcemia; the other had meningitis alone. 2 patients died, and all became ill during or shortly after hiking outside kathmandu. 3 patients were from the US, 2 from Australia, and 1 from Switzerland. Tables present data on cases of specified notifiable diseases in the US.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ye, Rong; Zhao, Jie; Yuan, Bing
The Hayashi–Ito aldol reaction of methyl isocyanoacetate (MI) and benzaldehydes, a classic homogeneous Au(I)-catalyzed reaction, was studied with heterogenized homogeneous catalysts. Among dendrimer encapsulated nanoparticles (NPs) of Au, Pd, Rh, or Pt loaded in mesoporous supports and the homogeneous analogues, the Au NPs led to the highest yield and highest diastereoselectivity of products in toluene at room temperature. The Au catalyst was stable and was recycled for at least six runs without substantial deactivation. Moreover, larger pore sizes of the support and the use of a hydrophobic solvent led to a high selectivity for the trans diastereomer of the product.more » The activation energy is sensitive to neither the size of Au NPs nor the support. A linear Hammett plot was obtained with a positive slope, suggesting an increased electron density on the carbonyl carbon atom in the rate-limiting step. As a result, IR studies revealed a strong interaction between MI and the gold catalyst, supporting the proposed mechanism, in which rate-limiting step involves an electrophilic attack of the aldehyde on the enolate formed from the deprotonated MI.« less
Ye, Rong; Zhao, Jie; Yuan, Bing; ...
2016-12-14
The Hayashi–Ito aldol reaction of methyl isocyanoacetate (MI) and benzaldehydes, a classic homogeneous Au(I)-catalyzed reaction, was studied with heterogenized homogeneous catalysts. Among dendrimer encapsulated nanoparticles (NPs) of Au, Pd, Rh, or Pt loaded in mesoporous supports and the homogeneous analogues, the Au NPs led to the highest yield and highest diastereoselectivity of products in toluene at room temperature. The Au catalyst was stable and was recycled for at least six runs without substantial deactivation. Moreover, larger pore sizes of the support and the use of a hydrophobic solvent led to a high selectivity for the trans diastereomer of the product.more » The activation energy is sensitive to neither the size of Au NPs nor the support. A linear Hammett plot was obtained with a positive slope, suggesting an increased electron density on the carbonyl carbon atom in the rate-limiting step. As a result, IR studies revealed a strong interaction between MI and the gold catalyst, supporting the proposed mechanism, in which rate-limiting step involves an electrophilic attack of the aldehyde on the enolate formed from the deprotonated MI.« less
2014-01-01
Background In 2000/2001, the Australian Defense Forces (ADF), in collaboration with SmithKline Beecham and the United States Army, conducted a field trial to evaluate the safety, tolerability and efficacy of tafenoquine and mefloquine/primaquine for the prophylaxis of malaria amongst non-immune Australian soldiers deployed to East Timor (now called Timor Leste) for peacekeeping operations. The lack of a concurrent placebo control arm prevented an internal estimate of the malaria attack rate and so the protective efficacy of the study regimens was not determined at the time. Methods In a retrospective analysis of the trial results, the all species malaria attack rate was estimated for the prophylactic phase of the study which was defined as the period between administration of the first prophylactic dose and the first dose of post-deployment medication. First, the Plasmodium vivax attack rate was estimated during the prophylactic phase of the deployment by adjusting the observed P. vivax relapse rate during post-deployment to account for the known anti-relapse efficacies (or effectiveness) of the study medications (determined from prior studies). The all species malaria attack rate (P. vivax and Plasmodium falciparum) was then determined by adjusting the P. vivax attack rate based on the ratio of P. falciparum to P. vivax observed during prior ADF deployments to Timor Leste. This estimated all species malaria attack rate was then used as the ‘constant estimated attack rate’ in the calculation of the protective efficacy of tafenoquine and mefloquine during the prophylactic phase of the deployment. Results The estimated attack rate during the prophylactic phase of the study was determined to be 7.88%. The protective efficacies of tafenoquine and mefloquine, with corresponding 95% confidence intervals (95% CI), were determined to be 100% (93%-100%) and 100% (79%-100%) respectively. Conclusions The protective efficacy of tafenoquine (200 mg per day for three days, followed by weekly 200 mg maintenance doses) is similar to that of the weekly standard of care (mefloquine, 250 mg). PMID:24502679
Palmieri, L.; Barchielli, A.; Cesana, G.; de Campora, E.; Goldoni, C.A.; Spolaore, P.; Uguccioni, M.; Vancheri, F.; Vanuzzo, D.; Ciccarelli, P.; Giampaoli, S.
2007-01-01
Background The Italian register of cardiovascular diseases is a surveillance system of fatal and nonfatal cardiovascular events in the general population aged 35–74 years. It was launched in Italy at the end of the 1990s with the aim of estimating periodically the occurrence and case fatality rate of coronary and cerebrovascular events in the different geographical areas of the country. This paper presents data for cerebrovascular events. Methods Currentevents were assessed through record linkage between two sources of information: death certificates and hospital discharge diagnosis records. Events were identified through the ICD codes and duration. To calculate the number of estimated events, current events were multiplied by the positive predictive value of each specific mortality or discharge code derived from the validation of a sample of suspected events. Attack rates were calculated by dividing estimatedevents by resident population, and case fatality rate at 28 days was determined from the ratio of estimated fatal to total events. Results Attack rates were found to be higher in men than in women: mean age-standardized attack rate was 21.9/10,000 in men and 12.5/10,000 in women; age-standardized 28-day case fatality rate was higher in women (17.1%) than in men (14.5%). Significant geographical differences were found in attack rates of both men and women. Case fatality was significantly heterogeneous in both men and women. Conclusions Differences still exist in the geographical distribution of attack and case fatality rates of cerebrovascular events, regardless of the north-south gradient. These data show the feasibility of implementing a population-based register using a validated routine database, necessary for monitoring cardiovascular diseases. PMID:17971632
Fusion of Heterogeneous Intrusion Detection Systems for Network Attack Detection
Kaliappan, Jayakumar; Thiagarajan, Revathi; Sundararajan, Karpagam
2015-01-01
An intrusion detection system (IDS) helps to identify different types of attacks in general, and the detection rate will be higher for some specific category of attacks. This paper is designed on the idea that each IDS is efficient in detecting a specific type of attack. In proposed Multiple IDS Unit (MIU), there are five IDS units, and each IDS follows a unique algorithm to detect attacks. The feature selection is done with the help of genetic algorithm. The selected features of the input traffic are passed on to the MIU for processing. The decision from each IDS is termed as local decision. The fusion unit inside the MIU processes all the local decisions with the help of majority voting rule and makes the final decision. The proposed system shows a very good improvement in detection rate and reduces the false alarm rate. PMID:26295058
Fusion of Heterogeneous Intrusion Detection Systems for Network Attack Detection.
Kaliappan, Jayakumar; Thiagarajan, Revathi; Sundararajan, Karpagam
2015-01-01
An intrusion detection system (IDS) helps to identify different types of attacks in general, and the detection rate will be higher for some specific category of attacks. This paper is designed on the idea that each IDS is efficient in detecting a specific type of attack. In proposed Multiple IDS Unit (MIU), there are five IDS units, and each IDS follows a unique algorithm to detect attacks. The feature selection is done with the help of genetic algorithm. The selected features of the input traffic are passed on to the MIU for processing. The decision from each IDS is termed as local decision. The fusion unit inside the MIU processes all the local decisions with the help of majority voting rule and makes the final decision. The proposed system shows a very good improvement in detection rate and reduces the false alarm rate.
Jeerakathil, Thomas; Shuaib, Ashfaq; Majumdar, Sumit R; Demchuk, Andrew M; Butcher, Kenneth S; Watson, Tim J; Dean, Naeem; Gordon, Deb; Edmond, Cathy; Coutts, Shelagh B
2014-10-01
Stroke risk after transient ischaemic attack is high and, it is a challenge worldwide to provide urgent assessment and preventive services to entire populations. To determine whether a province-wide transient ischaemic attack Triaging algorithm and transient ischaemic attack hotline (the Alberta Stroke Prevention in transient ischaemic attacks and mild strokes intervention) can reduce the rate of stroke recurrence following transient ischaemic attack across the population of Alberta, Canada (population 3·7 million, 90-day rate of post-stroke transient ischaemic attack currently 9·5%). It also seeks to improve upon current transient ischaemic attack triaging rules by incorporating time from symptom onset as a predictive variable. The transient ischaemic attack algorithm and hotline were developed with a broad consensus of clinicians, patients, policy-makers, and researchers and based on local adaptation of the work of others and research and insights developed within the province. Because neither patient-level nor region-level randomization was possible, we conducted a quasi-experimental design examining changes in the post-transient ischaemic attack rate of stroke recurrence before and after the 15-month implementation period using an interrupted time-series regression analysis. The design controls for changes in case-mix, co-interventions, and secular trends. A prospective transient ischaemic attack cohort will also be concurrently created with telephone follow-up at seven-days and 90 days as well as passive follow-up over the longer term using linkages to provincial healthcare administrative databases. The primary outcome measure is the change in recurrence rate of stroke following transient ischaemic attack at seven-days and 90 days, comparing a period of two-years before vs. two-years after the intervention is implemented. All cases of recurrent stroke will be validated. Secondary outcomes include functional status, hospitalizations, morbidity, and mortality. We are undertaking a rigorous evaluation of a population-based approach to improving quality of transient ischaemic attack care. Whether positive or negative, our work should provide important insights for all potential stakeholders. © 2012 The Authors. International Journal of Stroke © 2012 World Stroke Organization.
ERIC Educational Resources Information Center
Lange, Aart W.; Neeleman, Jan
2004-01-01
Suicide rates may be affected by world news. Our objective was to investigate the possible impact of the terrorist attacks of September 11, 2001, on suicidal behavior in the Netherlands. There was evidence of an increase in rates of suicide and deliberate self-harm in the weeks immediately following the attacks. These findings contrast with…
Barbhuiya, F A; Agarwal, Mayank; Purwar, Sanketh; Biswas, Santosh; Nandi, Sukumar
2015-09-01
TCP is the most widely accepted transport layer protocol. The major emphasis during the development of TCP was its functionality and efficiency. However, not much consideration was given on studying the possibility of attackers exploiting the protocol, which has lead to several attacks on TCP. This paper deals with the induced low rate TCP attack. Since the attack is relatively new, only a few schemes have been proposed to mitigate it. However, the main issues with these schemes are scalability, change in TCP header, lack of formal frameworks, etc. In this paper, we have adapted the stochastic DES framework for detecting the attack, which addresses most of these issues. We have successfully deployed and tested the proposed DES based IDS on a test bed. Copyright © 2015 ISA. Published by Elsevier Ltd. All rights reserved.
2016-01-01
The Tijuana River Valley is the first natural habitat in California to be substantially invaded by the Kuroshio Shot Hole Borer (KSHB, Euwallacea sp.), an ambrosia beetle native to Southeast Asia. This paper documents the distribution of the KSHB in the riparian vegetation in the valley and assesses the damage done to the vegetation as of early 2016, approximately six months after the beetle was first observed in the valley. I divided the riparian habitats into 29 survey units so that the vegetation within each unit was relatively homogenous in terms of plant species composition, age and density. From a random point within each unit, I examined approximately 60 individuals of the dominant plant species for evidence of KSHB infestation and evidence of major damage such as limb breakage. In the 22 forested units,I examined the dominant arroyo and black willows (Salix lasiolepis Benth. and S. gooddingii C.R. Ball), and in the seven scrub units, I examined mule fat (Baccharis salicifolia (Ruiz & Pav.) Pers.). Evidence of KSHB infestation was found in 25 of the 29 units. In the forest units, infestation rates ranged from 0 to 100% and were high (>60%) in 16 of the units. In the scrub units, infestation rates ranged from 0 to 33%. Infestation rates were significantly correlated with the wetness of a unit; wetter units had higher infestation rates. Evidence of major physical damage was found in 24 units, and dense stands of willows were reduced to broken trunks in several areas. Overall, I estimated that more than 280,000 (70%) of the willows in the valley were infested, and more than 140,000 had suffered major limb damage. In addition, I recorded evidence of KSHB infestation in the other common plant species in the valley; of the 23 species examined, 14 showed evidence of beetle attack. The four species with the highest rates of infestation were native trees in the Salicaceae family. The three species considered to be the worst invasive plants in the valley, Ricinus communis L., Tamarix ramosissima Ledeb. and Arundo donax L., had low rates of infestation. Several findings from this study have significance for resource managers: (1) the KSHB attack caused extensive mortality of trees soon after being first discovered so, if managers are to control the spread of the beetle, they will need to develop an effective early detection and rapid response program; (2) infestation rates were highest in units that were wet, so resource managers trying to detect the beetle in other areas should thoroughly search trees near water, particularly nutrient-enriched water; (3) the infestation appears to be a novel form of disturbance, and the affected forests may need special management actions in order to recover; and (4) the infestation has altered the structure of the forest canopy, and this is likely to promote the growth of invasive plant species that were relatively inconspicuous in the forests prior to the beetle attack but will now need more attention. PMID:27366644
Boland, John M
2016-01-01
The Tijuana River Valley is the first natural habitat in California to be substantially invaded by the Kuroshio Shot Hole Borer (KSHB, Euwallacea sp.), an ambrosia beetle native to Southeast Asia. This paper documents the distribution of the KSHB in the riparian vegetation in the valley and assesses the damage done to the vegetation as of early 2016, approximately six months after the beetle was first observed in the valley. I divided the riparian habitats into 29 survey units so that the vegetation within each unit was relatively homogenous in terms of plant species composition, age and density. From a random point within each unit, I examined approximately 60 individuals of the dominant plant species for evidence of KSHB infestation and evidence of major damage such as limb breakage. In the 22 forested units,I examined the dominant arroyo and black willows (Salix lasiolepis Benth. and S. gooddingii C.R. Ball), and in the seven scrub units, I examined mule fat (Baccharis salicifolia (Ruiz & Pav.) Pers.). Evidence of KSHB infestation was found in 25 of the 29 units. In the forest units, infestation rates ranged from 0 to 100% and were high (>60%) in 16 of the units. In the scrub units, infestation rates ranged from 0 to 33%. Infestation rates were significantly correlated with the wetness of a unit; wetter units had higher infestation rates. Evidence of major physical damage was found in 24 units, and dense stands of willows were reduced to broken trunks in several areas. Overall, I estimated that more than 280,000 (70%) of the willows in the valley were infested, and more than 140,000 had suffered major limb damage. In addition, I recorded evidence of KSHB infestation in the other common plant species in the valley; of the 23 species examined, 14 showed evidence of beetle attack. The four species with the highest rates of infestation were native trees in the Salicaceae family. The three species considered to be the worst invasive plants in the valley, Ricinus communis L., Tamarix ramosissima Ledeb. and Arundo donax L., had low rates of infestation. Several findings from this study have significance for resource managers: (1) the KSHB attack caused extensive mortality of trees soon after being first discovered so, if managers are to control the spread of the beetle, they will need to develop an effective early detection and rapid response program; (2) infestation rates were highest in units that were wet, so resource managers trying to detect the beetle in other areas should thoroughly search trees near water, particularly nutrient-enriched water; (3) the infestation appears to be a novel form of disturbance, and the affected forests may need special management actions in order to recover; and (4) the infestation has altered the structure of the forest canopy, and this is likely to promote the growth of invasive plant species that were relatively inconspicuous in the forests prior to the beetle attack but will now need more attention.
Effect of 7 July 2005 terrorist attacks in London on suicide in England and Wales.
Salib, Emad; Cortina-Borja, Mario
2009-01-01
A reduction in suicide in England and Wales has been reported after the attacks of 11 September 2001 in the USA. It may be plausible therefore to expect a much greater impact on suicide in the UK in response to the events of 7 July 2005, caused by the first suicide terrorist attack by Islamic extremists on British soil. To examine the effect of the 7 July 2005 terrorist attacks in London on suicide rates in England and Wales. Analysis of number of suicide (ICD-10 codes X60-X84) and undetermined injury deaths (ICD-10 codes Y10-Y34) reported in England and Wales in the 12 weeks before and after 7 July 2005. We used Shewhart Control Charts based on Poisson rates to explore adjusted daily and weekly suicide rates and rate differences with respect to 7 July 2005. A brief but significant reduction in daily suicide rate was observed a few days after the terrorist attack in London on 7 July 2005. Further reduction was also observed on the 21 July 2005, coinciding with the second wave of attacks. No similar reduction in suicide was seen during the same period in the previous 4 years. Poisson regression models with indicator variables for each day in July 2005 revealed a reduction of 40% of the expected daily rate for these 2 days only. We found no evidence of any longer-term effect on suicide. The study findings are contrary to our expectation and only weakly support Durkheim's theory that periods of national threat lower the suicide rate through the impact on social cohesion. It is possible that previous experience of IRA terrorism in the UK may have limited the effect of the 7 July 2005 attacks on suicide in England and Wales. The shock value of suicide terrorism and its psychological potency appear to diminish over time as the tactic becomes overused.
Heavy-Ion Microbeam Fault Injection into SRAM-Based FPGA Implementations of Cryptographic Circuits
NASA Astrophysics Data System (ADS)
Li, Huiyun; Du, Guanghua; Shao, Cuiping; Dai, Liang; Xu, Guoqing; Guo, Jinlong
2015-06-01
Transistors hit by heavy ions may conduct transiently, thereby introducing transient logic errors. Attackers can exploit these abnormal behaviors and extract sensitive information from the electronic devices. This paper demonstrates an ion irradiation fault injection attack experiment into a cryptographic field-programmable gate-array (FPGA) circuit. The experiment proved that the commercial FPGA chip is vulnerable to low-linear energy transfer carbon irradiation, and the attack can cause the leakage of secret key bits. A statistical model is established to estimate the possibility of an effective fault injection attack on cryptographic integrated circuits. The model incorporates the effects from temporal, spatial, and logical probability of an effective attack on the cryptographic circuits. The rate of successful attack calculated from the model conforms well to the experimental results. This quantitative success rate model can help evaluate security risk for designers as well as for the third-party assessment organizations.
Temporal Stability of Multiple Response Systems to 7.5% Carbon Dioxide Challenge
Roberson-Nay, Roxann; Gorlin, Eugenia I.; Beadel, Jessica R.; Cash, Therese; Vrana, Scott; Teachman, Bethany A.
2017-01-01
Self-reported anxiety, and potentially physiological response, to maintained inhalation of carbon dioxide (CO2) enriched air shows promise as a putative marker of panic reactivity and vulnerability. Temporal stability of response systems during low-dose, steady-state CO2 breathing challenge is lacking. Outcomes on multiple levels were measured two times, one week apart, in 93 individuals. Stability was highest during the CO2 breathing phase compared to pre-CO2 and recovery phases, with anxiety ratings, respiratory rate, skin conductance level, and heart rate demonstrating good to excellent temporal stability (ICCs ≥ 0.71). Cognitive symptoms tied to panic were somewhat less stable (ICC = 0.58) than physical symptoms (ICC = 0.74) during CO2 breathing. Escape/avoidance behaviors and DSM-5 panic attacks were not stable. Large effect sizes between task phases also were observed. Overall, results suggest good-excellent levels of temporal stability for multiple outcomes during respiratory stimulation via 7.5% CO2. PMID:28163046
Testing of YUH-61A helicopter transmission in NASA Lewis 2240-kW (3000-hp facility
NASA Technical Reports Server (NTRS)
Mitchell, A. M.; Oswald, F. B.; Schuller, F. T.
1986-01-01
A helicopter transmission that was being considered for the Army's Utility Tactical Transport Attack System (UTTAS) was tested in the NASA Lewis 2240-kW (3000-hp) test facility to obtain the transmission's operational data. The results will form a vibration and efficiency data base for evaluation similar-class helicopter transmissions. The transmission's mechanical efficiency was determined to be 98.7 percent at its rated power level of 2080 kW (2792 hp). At power levels up to 113 percent of rated the transmission displayed 56 percent higher vibration acceleration levels on the right input than on the left input. Both vibration signature analysis and final visual inspection indicated that the right input spiral-bevel gear had poor contact patterns. The highest vibration meter level was 52 g's rms at the accessory gear, which had free-wheeling gearsets. At 113 percent power and 100 percent rated speed the vibration meter levels generally ranged from 3 to 25 g's rms.
Korean immigrants' knowledge of heart attack symptoms and risk factors.
Hwang, Seon Y; Ryan, Catherine J; Zerwic, Julie Johnson
2008-02-01
This study assessed the knowledge of heart attack symptoms and risk factors in a convenience sample of Korean immigrants. A total of 116 Korean immigrants in a Midwestern metropolitan area were recruited through Korean churches and markets. Knowledge was assessed using both open-ended questions and a structured questionnaire. Latent class cluster analysis and Chi-square tests were used to analyze the data. About 76% of the sample had at least one self-reported risk factor for cardiovascular disease. Using an open-ended question, the majority of subjects could only identify one symptom. In the structured questionnaire, subjects identified a mean of 5 out of 10 heart attack symptoms and a mean of 5 out of 9 heart attack risk factors. Latent class cluster analysis showed that subjects clustered into two groups for both risk factors and symptoms: a high knowledge group and a low knowledge group. Subjects who clustered into the risk factor low knowledge group (48%) were more likely than the risk factor high knowledge group to be older than 65 years, to have lower education, to not know to use 911 when a heart attack occurred, and to not have a family history of heart attack. Korean immigrants' knowledge of heart attack symptoms and risk factors was variable, ranging from high to very low. Education should be focused on those at highest risk for a heart attack, which includes the elderly and those with risk factors.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Mayer, J.
Attacks on humans by wild pigs (Sus scrofa) have been documented since ancient times. However, studies characterizing these incidents are lacking. In an effort to better understand this phenomenon, information was collected from 412 wild pig attacks on humans. Similar to studies of large predator attacks on humans, data came from a variety of sources. The various attacks compiled occurred in seven zoogeographic realms. Most attacks occurred within the species native range, and specifically in rural areas. The occurrence was highest during the winter months and daylight hours. Most happened under non-hunting circumstances and appeared to be unprovoked. Wounded animalsmore » were the chief cause of these attacks in hunting situations. The animals involved were typically solitary, male and large in size. The fate of the wild pigs involved in these attacks varied depending upon the circumstances, however, most escaped uninjured. Most human victims were adult males traveling on foot and alone. The most frequent outcome for these victims was physical contact/mauling. The severity of resulting injuries ranged from minor to fatal. Most of the mauled victims had injuries to only one part of their bodies, with legs/feet being the most frequent body part injured. Injuries were primarily in the form of lacerations and punctures. Fatalities were typically due to blood loss. In some cases, serious infections or toxemia resulted from the injuries. Other species (i.e., pets and livestock) were also accompanying some of the humans during these attacks. The fates of these animals varied from escaping uninjured to being killed. Frequency data on both non-hunting and hunting incidents of wild pig attacks on humans at the Savannah River Site, South Carolina, showed quantitatively that such incidents are rare.« less
Sung, Sharon C; Rush, A John; Earnest, Arul; Lim, Leslie E C; Pek, Maeve P P; Choi, Joen M F; Ng, Magdalene P K; Ong, Marcus E H
2018-01-01
Patients with panic-related anxiety often initially present to the emergency department (ED) complaining of respiratory or cardiac symptoms, but rates of detection of panic symptoms by ED physicians remain low. This study was undertaken to evaluate the relevance of panic attacks and panic disorder in ED patients who present with cardiopulmonary symptoms and to determine whether a brief symptom-based tool could be constructed to assist in rapid recognition of panic-related anxiety in the ED setting. English-speaking adult ED patients with a chief complaint of palpitations, chest pain, dizziness, or difficulty breathing were evaluated for the presence of panic attacks and panic disorder with the Structured Clinical Interview for DSM-IV Axis I Disorders. Participants completed self-report measures to assess panic-related symptoms, comorbid psychiatric conditions, health-related disability, and health service use. In this sample (N=200), 23.5% had panic attacks and 23.0% had panic disorder. Both groups reported higher rates of panic attack symptoms, greater psychiatric comorbidity, greater health-related disability, and higher rates of ED and mental health service use compared with those without either condition. A brief 7-item tool consisting of panic symptoms identified patients with panic attacks or panic disorder with 85% accuracy (area under the curve=0.90, sensitivity=82%, specificity=88%). Patients with panic attacks or panic disorder commonly present to the ED, but often go unrecognized. A brief 7-item clinician rating scale accurately identifies these patients among those ED patients presenting with cardiopulmonary complaints.
Changes in EEG alpha power to different disgust elicitors: the specificity of mutilations.
Sarlo, Michela; Buodo, Giulia; Poli, Silvia; Palomba, Daniela
2005-07-15
It is unclear in the literature whether the various disgust elicitors are differentially processed by the brain and/or able to elicit distinct psychophysiological response patterns. On the other hand, disgusting stimuli depicting mutilations have been proved to elicit a distinct autonomic response pattern and to demand greater attentional resources, as compared with other unpleasant visual stimuli. In this EEG study, 34 participants viewed 4 film-clips depicting surgery, cockroach invasion, human attack and neutral landscape during EEG recording, and then rated the clips for valence, arousal and the basic emotions. Independent of location, the highest cortical activation was found during the viewing of the surgery scene. Moreover, the above activation was prominent over the right posterior regions.
Liang, Song; Kracalik, Ian T.; Morris, Lillian; Blackburn, Jason K.; Mbam, Leonard M.; Ba Pouth, Simon Franky Baonga; Teboh, Andrew; Yang, Yang; Arabi, Mouhaman; Sugimoto, Jonathan D.; Morris, John Glenn
2016-01-01
Introduction Recurrent cholera outbreaks have been reported in Cameroon since 1971. However, case fatality ratios remain high, and we do not have an optimal understanding of the epidemiology of the disease, due in part to the diversity of Cameroon’s climate subzones and a lack of comprehensive data at the health district level. Methods/Findings A unique health district level dataset of reported cholera case numbers and related deaths from 2000–2012, obtained from the Ministry of Public Health of Cameroon and World Health Organization (WHO) country office, served as the basis for the analysis. During this time period, 43,474 cholera cases were reported: 1748 were fatal (mean annual case fatality ratio of 7.9%), with an attack rate of 17.9 reported cases per 100,000 inhabitants per year. Outbreaks occurred in three waves during the 13-year time period, with the highest case fatality ratios at the beginning of each wave. Seasonal patterns of illness differed strikingly between climate subzones (Sudano-Sahelian, Tropical Humid, Guinea Equatorial, and Equatorial Monsoon). In the northern Sudano-Sahelian subzone, highest number of cases tended to occur during the rainy season (July-September). The southern Equatorial Monsoon subzone reported cases year-round, with the lowest numbers during peak rainfall (July-September). A spatial clustering analysis identified multiple clusters of high incidence health districts during 2010 and 2011, which were the 2 years with the highest annual attack rates. A spatiotemporal autoregressive Poisson regression model fit to the 2010–2011 data identified significant associations between the risk of transmission and several factors, including the presence of major waterbody or highway, as well as the average daily maximum temperature and the precipitation levels over the preceding two weeks. The direction and/or magnitude of these associations differed between climate subzones, which, in turn, differed from national estimates that ignored subzones differences in climate variables. Conclusions/Significance The epidemiology of cholera in Cameroon differs substantially between climate subzones. Development of an optimal comprehensive country-wide control strategy for cholera requires an understanding of the impact of the natural and built environment on transmission patterns at the local level, particularly in the setting of ongoing climate change. PMID:27855171
NASA Technical Reports Server (NTRS)
Fisher, David F.; Richwine, David M.; Landers, Stephen
1992-01-01
In-flight pressure distributions at four fuselage stations on the forebody of the X-29A aircraft have been reported at angles of attack from 15 to 66 deg and at Mach numbers from 0.22 to 0.60. At angles of attack of 20 deg and higher, vortices shed from the nose strake caused suction peaks in the pressure distributions that generally increased in magnitude with angle of attack. Above 30 deg-angle of attack, the forebody pressure distributions became asymmetrical at the most forward station, while they remained nearly symmetrical until 50 to 55 deg-angle of attack for the aft stations. Between 59 to 66 deg-angle of attack, the asymmetry of the pressure distributions changed direction. Yawing moments for the forebody alone were obtained by integrating the forebody pressure distributions. At 45 deg-angle of attack, the aircraft yaws to the right and at 50 deg and higher, the aircraft yaws to the left. The forebody yawing moments correlated well with the aircraft left yawing moment at an angle of attack of 50 deg or higher. At a 45 deg-angle of attack, the forebody yawing moments did not correlate well with the aircraft yawing moment, but it is suggested that this was due to asymmetric pressures on the cockpit region of the fuselage which was not instrumented. The forebody was also shown to provide a positive component of directional stability of the aircraft at angles of attack of 25 deg or higher. A Mach number effect was noted at angles of attack of 30 deg or higher at the station where the nose strake was present. At this station, the suction peaks in the pressure distributions at the highest Mach number were reduced and much more symmetrical as compared to the lower Mach number pressure distributions.
Amarenco, Pierre; Goldstein, Larry B; Sillesen, Henrik; Benavente, Oscar; Zweifler, Richard M; Callahan, Alfred; Hennerici, Michael G; Zivin, Justin A; Welch, K Michael A
2010-03-01
Noncoronary forms of atherosclerosis (including transient ischemic attacks or stroke of carotid origin or >50% stenosis of the carotid artery) are associated with a 10-year vascular risk of >20% and are considered as a coronary heart disease (CHD) -risk equivalent from the standpoint of lipid management. The Stroke Prevention by Aggressive Reduction in Cholesterol Levels (SPARCL) trial included patients with stroke or transient ischemic attack and no known CHD regardless of the presence of carotid atherosclerosis. We evaluated the risk of developing clinically recognized CHD in SPARCL patients. A total of 4731 patients (mean age, 63 years) was randomized to 80 mg/day atorvastatin placebo. The rates of major coronary event, any CHD event, and any revascularization procedure were evaluated. After 4.9 years of follow-up, the risks of a major coronary event and of any CHD end point in the placebo group were 5.1% and 8.6%, respectively. The rate of outcome of stroke decreased over time, whereas the major coronary event rate was stable. Relative to those having a large vessel-related stroke at baseline, those having a transient ischemic attack, hemorrhagic stroke, small vessel stroke, or a stroke of unknown cause had similar absolute rates for a first major coronary event and for any CHD event; transient ischemic attack, small vessel, and unknown cause groups had lower absolute revascularization procedure rates. Major coronary event, any CHD event, and any revascularization procedure rates were similarly reduced in all baseline stroke subtypes in the atorvastatin arm compared with placebo with no heterogeneity between groups. CHD risk can be substantially reduced by atorvastatin therapy in patients with recent stroke or transient ischemic attack regardless of stroke subtype.
Kumar, Supriya; Piper, Kaitlin; Galloway, David D; Hadler, James L; Grefenstette, John J
2015-09-23
In New Haven County, CT (NHC), influenza hospitalization rates have been shown to increase with census tract poverty in multiple influenza seasons. Though multiple factors have been hypothesized to cause these inequalities, including population structure, differential vaccine uptake, and differential access to healthcare, the impact of each in generating observed inequalities remains unknown. We can design interventions targeting factors with the greatest explanatory power if we quantify the proportion of observed inequalities that hypothesized factors are able to generate. Here, we ask if population structure is sufficient to generate the observed area-level inequalities in NHC. To our knowledge, this is the first use of simulation models to examine the causes of differential poverty-related influenza rates. Using agent-based models with a census-informed, realistic representation of household size, age-structure, population density in NHC census tracts, and contact rates in workplaces, schools, households, and neighborhoods, we measured poverty-related differential influenza attack rates over the course of an epidemic with a 23 % overall clinical attack rate. We examined the role of asthma prevalence rates as well as individual contact rates and infection susceptibility in generating observed area-level influenza inequalities. Simulated attack rates (AR) among adults increased with census tract poverty level (F = 30.5; P < 0.001) in an epidemic caused by a virus similar to A (H1N1) pdm09. We detected a steeper, earlier influenza rate increase in high-poverty census tracts-a finding that we corroborate with a temporal analysis of NHC surveillance data during the 2009 H1N1 pandemic. The ratio of the simulated adult AR in the highest- to lowest-poverty tracts was 33 % of the ratio observed in surveillance data. Increasing individual contact rates in the neighborhood did not increase simulated area-level inequalities. When we modified individual susceptibility such that it was inversely proportional to household income, inequalities in AR between high- and low-poverty census tracts were comparable to those observed in reality. To our knowledge, this is the first study to use simulations to probe the causes of observed inequalities in influenza disease patterns. Knowledge of the causes and their relative explanatory power will allow us to design interventions that have the greatest impact on reducing inequalities. Differential exposure due to population structure in our realistic simulation model explains a third of the observed inequality. Differential susceptibility to disease due to prevailing chronic conditions, vaccine uptake, and smoking should be considered in future models in order to quantify the role of additional factors in generating influenza inequalities.
NASA Technical Reports Server (NTRS)
Gates, Ordway B., Jr.; Woodling, C. H.
1959-01-01
Theoretical analysis of the longitudinal behavior of an automatically controlled supersonic interceptor during the attack phase against a nonmaneuvering target is presented. Control of the interceptor's flight path is obtained by use of a pitch rate command system. Topics lift, and pitching moment, effects of initial tracking errors, discussion of normal acceleration limited, limitations of control surface rate and deflection, and effects of neglecting forward velocity changes of interceptor during attack phase.
Lodewyck, Jérôme; Debuisschert, Thierry; García-Patrón, Raúl; Tualle-Brouri, Rosa; Cerf, Nicolas J; Grangier, Philippe
2007-01-19
An intercept-resend attack on a continuous-variable quantum-key-distribution protocol is investigated experimentally. By varying the interception fraction, one can implement a family of attacks where the eavesdropper totally controls the channel parameters. In general, such attacks add excess noise in the channel, and may also result in non-Gaussian output distributions. We implement and characterize the measurements needed to detect these attacks, and evaluate experimentally the information rates available to the legitimate users and the eavesdropper. The results are consistent with the optimality of Gaussian attacks resulting from the security proofs.
3 CFR 8668 - Proclamation 8668 of May 3, 2011. 50th Anniversary of the Freedom Rides
Code of Federal Regulations, 2012 CFR
2012-01-01
.... Along the way, buses were attacked and men and women were intimidated, arrested, and brutally beaten... America accountable to our highest ideals and bend the arc of history towards justice. They showed that...
Do Unexpected Panic Attacks Occur Spontaneously?
Meuret, Alicia E.; Rosenfield, David; Wilhelm, Frank H.; Zhou, Enlu; Conrad, Ansgar; Ritz, Thomas; Roth, Walton T.
2012-01-01
Background Spontaneous or unexpected panic attacks, per definition, occur out-of-the blue, in absence of cues or triggers. Accordingly, physiological arousal or instability should occur at the onset of or during the attack, but not preceding it. To test this hypothesisweexaminedif points of significant autonomic changes preceded the onset of spontaneous panic attacks. Methods Forty-three panic disorder patients underwent repeated 24-hour ambulatory monitoring. Thirteen naturally panic attacks were recorded during 1,960 hours of monitoring. Minute-by-minute epochs beginning 60 minutes before, and continuing to 10 minutes after, the onset of individual attacks were examined for respiration, heart rate, and skin conductance level. Measures were controlled for physical activity and vocalization, and compared to time matched control periods within the same person. Results Significant patterns of instability across a numberof autonomic and respiratory variables were detected as early as 47 minutes before panic onset. The final minutes prior to onset were dominated by respiratory changes, with significant decreases in tidal volume followed by abrupt PCO2 increases. Panic attack onset was characterized by heart rate and tidal volume increases and a drop in PCO2. Symptom report was consistent with these changes. Skin conductance levels were generally elevated in the hour before and duringthe attacks. Changes in the matched control periods were largely absent. Conclusions Significant autonomic irregularities preceded the onset of attacks that were reported as abrupt and unexpected. The findings invite reconsideration of the current diagnostic distinction betweenuncuedand cued panic attacks. PMID:21783179
NASA Astrophysics Data System (ADS)
Lupo, Cosmo; Ottaviani, Carlo; Papanastasiou, Panagiotis; Pirandola, Stefano
2018-05-01
We present a rigorous security analysis of continuous-variable measurement-device-independent quantum key distribution (CV MDI QKD) in a finite-size scenario. The security proof is obtained in two steps: by first assessing the security against collective Gaussian attacks, and then extending to the most general class of coherent attacks via the Gaussian de Finetti reduction. Our result combines recent state-of-the-art security proofs for CV QKD with findings about min-entropy calculus and parameter estimation. In doing so, we improve the finite-size estimate of the secret key rate. Our conclusions confirm that CV MDI protocols allow for high rates on the metropolitan scale, and may achieve a nonzero secret key rate against the most general class of coherent attacks after 107-109 quantum signal transmissions, depending on loss and noise, and on the required level of security.
Effectiveness of the call in beach volleyball attacking play.
Künzell, Stefan; Schweikart, Florian; Köhn, Daniel; Schläppi-Lienhard, Olivia
2014-12-09
In beach volleyball the setter has the opportunity to give her or his hitter a "call". The call intends that the setter suggests to her or his partner where to place the attack in the opponent's court. The effectiveness of a call is still unknown. We investigated the women's and men's Swiss National Beach Volleyball Championships in 2011 and analyzed 2185 attacks. We found large differences between female and male players. While men called in only 38.4% of attacks, women used calls in 85.5% of attacks. If the male players followed a given call, 63% of the attacks were successful. The success rate of attacks without any call was 55.8% and 47.6% when the call was ignored. These differences were not significant (χ(2)(2) = 4.55, p = 0.103). In women's beach volleyball, the rate of successful attacks was 61.5% when a call was followed, 35% for attacks without a call, and 42.6% when a call was ignored. The differences were highly significant (χ(2)(2) = 23.42, p < 0.0005). Taking into account the findings of the present study, we suggested that the call was effective in women's beach volleyball, while its effect in men's game was unclear. Considering the quality of calls we indicate that there is a significant potential to increase the effectiveness of a call.
Nukiwa-Souma, Nao; Burmaa, Alexanderyn; Kamigaki, Taro; Od, Ishiin; Bayasgalan, Namuutsetsegiin; Darmaa, Badarchiin; Suzuki, Akira; Nymadawa, Pagbajabyn; Oshitani, Hitoshi
2012-01-01
Background Knowledge of how influenza viruses spread in a community is important for planning and implementation of effective interventions, including social distancing measures. Households and schools are implicated as the major sites for influenza virus transmission. However, the overall picture of community transmission is not well defined during actual outbreaks. We conducted a community-based prospective cohort study to describe the transmission characteristics of influenza in Mongolia. Methods and Findings A total of 5,655 residents in 1,343 households were included in this cohort study. An active search for cases of influenza-like illness (ILI) was performed between October 2010 and April 2011. Data collected during a community outbreak of influenza A(H3N2) were analyzed. Total 282 ILI cases occurred during this period, and 73% of the subjects were aged <15 years. The highest attack rate (20.4%) was in those aged 1–4 years, whereas the attack rate in those aged 5–9 years was 10.8%. Fifty-one secondary cases occurred among 900 household contacts from 43 households (43 index cases), giving an overall crude household secondary attack rate (SAR) of 5.7%. SAR was significantly higher in younger household contacts (relative risk for those aged <1 year: 9.90, 1–4 years: 5.59, and 5–9 years: 6.43). We analyzed the transmission patterns among households and a community and repeated transmissions were detected between households, preschools, and schools. Children aged 1–4 years played an important role in influenza transmission in households and in the community at large. Working-age adults were also a source of influenza in households, whereas elderly cases (aged ≥65 years) had no link with household transmission. Conclusions Repeated transmissions between households, preschools, and schools were observed during an influenza A(H3N2) outbreak period in Mongolia, where subjects aged 1–4 years played an important role in influenza transmission. PMID:22427943
Jasmonate-induced responses are costly but benefit plants under attack in native populations
Baldwin, Ian T.
1998-01-01
Herbivore attack is widely known to reduce food quality and to increase chemical defenses and other traits responsible for herbivore resistance. Inducible defenses are commonly thought to allow plants to forgo the costs of defense when not needed; however, neither their defensive function (increasing a plant’s fitness) nor their cost-savings function have been demonstrated in nature. The root-produced toxin nicotine increases after herbivore attack in the native, postfire annual Nicotiana attenuata and is internally activated by the wound hormone, jasmonic acid. I treated the roots of plants with the methyl ester of this hormone (MeJA) to elicit a response in one member of each of 745 matched pairs of plants growing in native populations with different probabilities of attack from herbivores, and measured the lifetime production of viable seed. In populations with intermediate rates of attack, induced plants were attacked less often by herbivores and survived to produce more seed than did their uninduced counterparts. Previous induction did not significantly increase the fitness of plants suffering high rates of attack. However, if plants had not been attacked, induced plants produced less seed than did their uninduced counterparts. Jasmonate-induced responses function as defenses but are costly, and inducibility allows this species to forgo these costs when the defenses are unnecessary. PMID:9653149
Enhancing Electromagnetic Side-Channel Analysis in an Operational Environment
NASA Astrophysics Data System (ADS)
Montminy, David P.
Side-channel attacks exploit the unintentional emissions from cryptographic devices to determine the secret encryption key. This research identifies methods to make attacks demonstrated in an academic environment more operationally relevant. Algebraic cryptanalysis is used to reconcile redundant information extracted from side-channel attacks on the AES key schedule. A novel thresholding technique is used to select key byte guesses for a satisfiability solver resulting in a 97.5% success rate despite failing for 100% of attacks using standard methods. Two techniques are developed to compensate for differences in emissions from training and test devices dramatically improving the effectiveness of cross device template attacks. Mean and variance normalization improves same part number attack success rates from 65.1% to 100%, and increases the number of locations an attack can be performed by 226%. When normalization is combined with a novel technique to identify and filter signals in collected traces not related to the encryption operation, the number of traces required to perform a successful attack is reduced by 85.8% on average. Finally, software-defined radios are shown to be an effective low-cost method for collecting side-channel emissions in real-time, eliminating the need to modify or profile the target encryption device to gain precise timing information.
Characterization of collective Gaussian attacks and security of coherent-state quantum cryptography.
Pirandola, Stefano; Braunstein, Samuel L; Lloyd, Seth
2008-11-14
We provide a simple description of the most general collective Gaussian attack in continuous-variable quantum cryptography. In the scenario of such general attacks, we analyze the asymptotic secret-key rates which are achievable with coherent states, joint measurements of the quadratures and one-way classical communication.
Richards, Robert J; Hammitt, James K
2002-09-01
Although surgery is recommended after two or more attacks of uncomplicated diverticulitis, the optimal timing for surgery in terms of cost-effectiveness is unknown. A Markov model was used to compare the costs and outcomes of performing surgery after one, two, or three uncomplicated attacks in 60-year-old hypothetical cohorts. Transition state probabilities were assigned values using published data and expert opinion. Costs were estimated from Medicare reimbursement rates. Surgery after the third attack is cost saving, yielding more years of life and quality adjusted life years at a lower cost than the other two strategies. The results were not sensitive to many of the variables tested in the model or to changes made in the discount rate (0-5%). In conclusion, performing prophylactic resection after the third attack of diverticulitis is cost saving in comparison to resection performed after the first or second attacks and remains cost-effective during sensitivity analysis.
... breathing; Respiratory rate - rapid and deep; Hyperventilation syndrome; Panic attack - hyperventilation; Anxiety - hyperventilation ... from an emotional cause such as during a panic attack. Or, it can be due to a medical ...
Shimizu, S; Kagawa, J; Ishiguro, M
2001-07-01
The number of nocturnal visits of asthmatic attack patients to the emergency room of Yokohama Medical Association's Clinic from January 1990 to December 1991 was compared to daily levels of air pollution (NO, NO2, SO2 and SPM) and weather (temperature and relative humidity) variables measured in Yokohama City. Trend-cycle components (Trend) that control for the weekly effects, other irregular variance for asthmatic attack incidence and environmental parameter measurements were estimated from the original data series using the method of Akaike and Ishiguro (1980). The rate of increase for each environmental parameter was then calculated from its trend-cycle components. We classified the data into four stages on the basis of rising and falling temperature and humidity. For each stage of temperature and humidity, fluctuation we estimated correlations between the number of asthmatic attack visits and original data series measurements, estimated trend-cycle components, and calculated rates of increase for each of the air pollutants. The daily number of asthmatic attack visits was negatively correlated to the daily mean values of all air pollutants, but positively correlated to the daily mean temperature and relative humidity. The trend-cycle components of the air pollutants were also negatively correlated to the frequencies of asthmatic attacks (p < 0.01 for all pollutants except NO2). In contrast, the number of asthmatic attack visits were in general positively correlated with increasing levels of pollutants. Furthermore, when both temperature and relative humidity decreased, significant correlations (r > 0.31, p < 0.001) between the number of asthmatic attacks and increased rates of all air pollutants were observed (r: NO2 > NO > SO2 > SPM).
The epidemiology of physical attack and rape among crack-using women.
Falck, R S; Wang, J; Carlson, R G; Siegal, H A
2001-02-01
This prospective study examines the epidemiology of physical attack and rape among a sample of 171 not-in-treatment, crack-cocaine using women. Since initiating crack use, 62% of the women reported suffering a physical attack. The annual rate of victimization by physical attack was 45%. Overall, more than half of the victims sought medical care subsequent to an attack. The prevalence of rape since crack use was initiated was 32%, and the annual rate was 11%. Among those women having been raped since they initiated crack use, 83% reported they were high on crack when the crime occurred as were an estimated 57% of the perpetrators. Logistic regression analyses showed that duration of crack use, arrest for prostitution, and some college education were predictors of having experienced a physical attack. Duration of crack use and a history of prostitution were predictors of suffering a rape. Drug abuse treatment programs must be sensitive to high levels of violence victimization experienced by crack-cocaine using women. Screening women for victimization, and treating the problems that emanate from it, may help make drug abuse treatment more effective.
Schuett, Wiebke; Dall, Sasha R X; Kloesener, Michaela H; Baeumer, Jana; Beinlich, Felix; Eggers, Till
2015-01-01
Life-history trade-offs are considered a major driving force in the emergence of consistent behavioural differences (personality variation); but empirical tests are scarce. We investigated links between a personality trait (escape response), life-history and state variables (growth rate, size and age at first reproduction, age-dependent reproductive rates, lifetime reproductive success, life span) in red and green colour morphs of clonal pea aphids, Acyrthosiphon pisum. Escape response (dropping/non-dropping off a plant upon a predatory attack) was measured repeatedly to classify individuals as consistent droppers, consistent nondroppers or inconsistents. Red morphs experienced stronger trade-offs between early reproduction and life span than green morphs; and red consistent (non)droppers had highest lifetime reproductive success. Red droppers followed a risk-averse life-history strategy (high late reproduction), red nondroppers a risk-prone strategy (high early reproduction), while reproductive rates were equivalent for all green behavioural types and red inconsistents. This suggests that red morphs suffer the highest costs of dropping (they are most conspicuous to predators), which 'equivalates' fitness payoffs to both risk-takers (red non-droppers) and risk-averse red droppers. The strong trade-off also means that committing to a particular lifestyle (being consistent) maximises fitness. Our study suggests that life-history trade-offs likely mediate personality variation but effects might depend on interactions with other organismal characteristics (here: colour morph). © 2014 The Authors. Journal of Animal Ecology © 2014 British Ecological Society.
Carrying weapons and intent to harm among Victorian secondary school students in 1999 and 2009.
Hemphill, Sheryl A; Tollit, Michelle A; Romaniuk, Helena; Williams, Joanne; Toumbourou, John W; Bond, Lyndal; Patton, George C
2013-12-16
To examine comparable survey data across 10 years to assess whether rates of self-reported weapon carrying and intent to harm others have increased as suggested in reported trends in violent offences. Population-based surveys administered to Victorian secondary school students in 1999 (8984 students) and 2009 (10 273 students) attending government, Catholic and independent schools. Student self-reports of carrying a weapon and attacking someone with the intent to harm in the past 12 months. In both surveys, about 15.0% of students reported carrying a weapon and about 7.0% reported attacking someone with intent to harm in the past 12 months, with higher rates among boys than girls. There was no change over time in the rates of students carrying weapons or attacking someone with the intent to harm, after controlling for demographic variables. In contrast to media portrayals and reported trends in violent offences, rates of students carrying weapons and attacking others with intent to harm have not changed between 1999 and 2009. These findings underline the importance of having national population-based data to regularly monitor the rates of these and related behaviours among young Australians.
Estimating the attack rate of pregnancy-associated listeriosis during a large outbreak.
Imanishi, Maho; Routh, Janell A; Klaber, Marigny; Gu, Weidong; Vanselow, Michelle S; Jackson, Kelly A; Sullivan-Chang, Loretta; Heinrichs, Gretchen; Jain, Neena; Albanese, Bernadette; Callaghan, William M; Mahon, Barbara E; Silk, Benjamin J
2015-01-01
In 2011, a multistate outbreak of listeriosis linked to contaminated cantaloupes raised concerns that many pregnant women might have been exposed to Listeria monocytogenes. Listeriosis during pregnancy can cause fetal death, premature delivery, and neonatal sepsis and meningitis. Little information is available to guide healthcare providers who care for asymptomatic pregnant women with suspected L. monocytogenes exposure. We tracked pregnancy-associated listeriosis cases using reportable diseases surveillance and enhanced surveillance for fetal death using vital records and inpatient fetal deaths data in Colorado. We surveyed 1,060 pregnant women about symptoms and exposures. We developed three methods to estimate how many pregnant women in Colorado ate the implicated cantaloupes, and we calculated attack rates. One laboratory-confirmed case of listeriosis was associated with pregnancy. The fetal death rate did not increase significantly compared to preoutbreak periods. Approximately 6,500-12,000 pregnant women in Colorado might have eaten the contaminated cantaloupes, an attack rate of ~1 per 10,000 exposed pregnant women. Despite many exposures, the risk of pregnancy-associated listeriosis was low. Our methods for estimating attack rates may help during future outbreaks and product recalls. Our findings offer relevant considerations for management of asymptomatic pregnant women with possible L. monocytogenes exposure.
Grigaltchik, Veronica S; Ward, Ashley J W; Seebacher, Frank
2012-10-07
Different species respond differently to environmental change so that species interactions cannot be predicted from single-species performance curves. We tested the hypothesis that interspecific difference in the capacity for thermal acclimation modulates predator-prey interactions. Acclimation of locomotor performance in a predator (Australian bass, Macquaria novemaculeata) was qualitatively different to that of its prey (eastern mosquitofish, Gambusia holbrooki). Warm (25°C) acclimated bass made more attacks than cold (15°C) acclimated fish regardless of acute test temperatures (10-30°C), and greater frequency of attacks was associated with increased prey capture success. However, the number of attacks declined at the highest test temperature (30°C). Interestingly, escape speeds of mosquitofish during predation trials were greater than burst speeds measured in a swimming arena, whereas attack speeds of bass were lower than burst speeds. As a result, escape speeds of mosquitofish were greater at warm temperatures (25°C and 30°C) than attack speeds of bass. The decline in the number of attacks and the increase in escape speed of prey means that predation pressure decreases at high temperatures. We show that differential thermal responses affect species interactions even at temperatures that are within thermal tolerance ranges. This thermal sensitivity of predator-prey interactions can be a mechanism by which global warming affects ecological communities.
Grigaltchik, Veronica S.; Ward, Ashley J. W.; Seebacher, Frank
2012-01-01
Different species respond differently to environmental change so that species interactions cannot be predicted from single-species performance curves. We tested the hypothesis that interspecific difference in the capacity for thermal acclimation modulates predator–prey interactions. Acclimation of locomotor performance in a predator (Australian bass, Macquaria novemaculeata) was qualitatively different to that of its prey (eastern mosquitofish, Gambusia holbrooki). Warm (25°C) acclimated bass made more attacks than cold (15°C) acclimated fish regardless of acute test temperatures (10–30°C), and greater frequency of attacks was associated with increased prey capture success. However, the number of attacks declined at the highest test temperature (30°C). Interestingly, escape speeds of mosquitofish during predation trials were greater than burst speeds measured in a swimming arena, whereas attack speeds of bass were lower than burst speeds. As a result, escape speeds of mosquitofish were greater at warm temperatures (25°C and 30°C) than attack speeds of bass. The decline in the number of attacks and the increase in escape speed of prey means that predation pressure decreases at high temperatures. We show that differential thermal responses affect species interactions even at temperatures that are within thermal tolerance ranges. This thermal sensitivity of predator–prey interactions can be a mechanism by which global warming affects ecological communities. PMID:22859598
Policies to Reduce Influenza in the Workplace: Impact Assessments Using an Agent-Based Model
Grefenstette, John J.; Galloway, David; Albert, Steven M.; Burke, Donald S.
2013-01-01
Objectives. We examined the impact of access to paid sick days (PSDs) and stay-at-home behavior on the influenza attack rate in workplaces. Methods. We used an agent-based model of Allegheny County, Pennsylvania, with PSD data from the US Bureau of Labor Statistics, standard influenza epidemic parameters, and the probability of staying home when ill. We compared the influenza attack rate among employees resulting from workplace transmission, focusing on the effects of presenteeism (going to work when ill). Results. In a simulated influenza epidemic (R0 = 1.4), the attack rate among employees owing to workplace transmission was 11.54%. A large proportion (72.00%) of this attack rate resulted from exposure to employees engaging in presenteeism. Universal PSDs reduced workplace infections by 5.86%. Providing 1 or 2 “flu days”—allowing employees with influenza to stay home—reduced workplace infections by 25.33% and 39.22%, respectively. Conclusions. PSDs reduce influenza transmission owing to presenteeism and, hence, the burden of influenza illness in workplaces. PMID:23763426
NASA Astrophysics Data System (ADS)
Kathiar, S. A.; Flaih, S. K.; Al-Khazraji, H. I.; Ismael, S. K.
2018-05-01
The eggplant Solanum melongena L. crop is attacked by one of the most common pests which is the leafminer Liriomyza sativae (Blanchard, 1938); therefore, this investigation was conducted to study the seasonal abundance of the eggplant leafminer in eggplant Plastic-house. The results showed that the highest average of infested leaves was 6.67 leaf, the highest average of tunnels by leaf miner was 9.87 tunnels and the highest percent of infestation was recorded 30.5% in 23. April. 2017. This study showed the parasitoid Diglyphus isaea (Walker, 1838) (Hymenoptera, Eulophidae) was recorded as a natural enemy to control the pest and the highest incidence of parasitism was 32.2 parasites on average in 16. April. 2017.
Epidemiology of non-fatal cerebrovascular stroke and transient ischemic attacks in Al Quseir, Egypt.
El-Tallawy, Hamdy N; Farghaly, Wafaa M A; Shehata, Ghaydaa A; Abdel-Hakeem, Nabil M; Rageh, Tarek A; Badry, Reda; Kandil, Mahmoud R
2013-01-01
Stroke is a medical emergency that can cause permanent neurological damage, complications, and disability. We aim to determine the epidemiology of non-fatal cerebrovascular stroke (CVS) and transient ischemic attacks (TIAs) in Al Quseir City, Red Sea, Egypt. The total population (n=33,285) was screened through a door to door study by three specialists of neurology and 15 female social workers (for demographic data collection). All suspected stroke patients were subjected to a full clinical examination, computerized tomography (CT) and/or magnetic resonance imaging (MRI) of their brain, blood sugar, lipogram, serum uric acid, complete blood cells, blood urea, and serum creatinine, as well as evaluated by Barthel Index and Scandinavian Stroke Scale. Carotid doppler, echocardiography, and thyroid functions were done for selected cases. CVS was recorded among 130 patients out of 19,848 subjects aged 20 years and more, yielding a total prevalence of 6.55/1,000 population. From June 1, 2010 to May 31, 2011, 36 patients were recorded to have stroke within 1-year, yielding an incidence rate of 1.81/1,000. Prevalence and incidence rates were higher among males than females, and both indices increased steadily with advancing age to reach the highest prevalence (37.02/1,000) and incidence rate (9.5/1,000) among aged persons 60 years and more. The prevalence of non-fatal stroke in Al Quseir city (6.55/1,000) was at the lower range of that recorded in developing countries (5-10/1,000) and slightly higher than that recorded in industrialized countries (5/1,000 population). Ischemic stroke is the most common type of stroke. The prevalence of TIAs was 0.15/1,000.
A prolonged outbreak of ornithosis in duck processors.
Newman, C. P.; Palmer, S. R.; Kirby, F. D.; Caul, E. O.
1992-01-01
In 1985 an outbreak of ornithosis affected 13 of 80 (16%) workers in a duck-processing plant. New employees were three times more likely to become cases than established employees. The highest attack rate was in those on the production line. Following the outbreak, an occupational health scheme was set up to monitor the health of new recruits to the company. Serological evidence of recent infection was demonstrated in 18 of 37 (49%) new employees tested in the first 3 months of employment. Five (14%) also had clinical evidence of ornithosis. Veterinary investigation of the ducks demonstrated a high proportion with asymptomatic chlamydial infection. It is suggested that ornithosis may be more common in duck processors than is currently supposed. Strategies to reduce occupational risks are discussed. PMID:1547838
Madsen-Bouterse, Sally A; Schneider, David A; Zhuang, Dongyue; Dassanayake, Rohana P; Balachandran, Aru; Mitchell, Gordon B; O'Rourke, Katherine I
2016-09-01
Development of mice expressing either ovine (Tg338) or cervid (TgElk) prion protein (PrP) have aided in characterization of scrapie and chronic wasting disease (CWD), respectively. Experimental inoculation of sheep with CWD prions has demonstrated the potential for interspecies transmission but, infection with CWD versus classical scrapie prions may be difficult to differentiate using validated diagnostic platforms. In this study, mouse bioassay in Tg338 and TgElk was utilized to evaluate transmission of CWD versus scrapie prions from small ruminants. Mice (≥5 per homogenate) were inoculated with brain homogenates from clinically affected sheep or goats with naturally acquired classical scrapie, white-tailed deer with naturally acquired CWD (WTD-CWD) or sheep with experimentally acquired CWD derived from elk (sheep-passaged-CWD). Survival time (time to clinical disease) and attack rates (brain accumulation of protease resistant PrP, PrPres) were determined. Inoculation with classical scrapie prions resulted in clinical disease and 100 % attack rates in Tg338, but no clinical disease at endpoint (>300 days post-inoculation, p.i.) and low attack rates (6.8 %) in TgElk. Inoculation with WTD-CWD prions yielded no clinical disease or brain PrPres accumulation in Tg338 at endpoint (>500 days p.i.), but rapid onset of clinical disease (~121 days p.i.) and 100 % attack rate in TgElk. Sheep-passaged-CWD resulted in transmission to both mouse lines with 100 % attack rates at endpoint in Tg338 and an attack rate of ~73 % in TgElk with some culled due to clinical disease. These primary transmission observations demonstrate the potential of bioassay in Tg338 and TgElk to help differentiate possible infection with CWD versus classical scrapie prions in sheep and goats.
Ding, Zheyuan; Zhai, Yujia; Wu, Chen; Wu, Haocheng; Lu, Qinbao; Lin, Junfen; He, Fan
2017-06-01
In China, waterborne outbreaks of infectious diarrheal disease mainly occur in schools, and contaminated well water is a common source of pathogens. The objective of this review was to present the attack rates, durations of outbreak, pathogens of infectious diarrheal disease, and sanitary conditions of wells in primary and secondary schools in China, and to analyze risk factors and susceptibility of school children. Relevant articles and reports were identified by searching PubMed, Web of Science, China National Knowledge Infrastructure, China Information System for Disease Control and Prevention, and the Chinese Field Epidemiology Training Program. Essential information, including urban/rural areas, school types, attack rates, pathogens, durations of outbreak, report intervals, and interventions were extracted from the eligible articles. Wilcoxon signed-rank test, Kruskal-Wallis H test, and Spearman correlation test were conducted in statistical analyses. Sex- and age-specific attack rate ratios were calculated as pooled effect sizes. We screened 2188 articles and retrieved data of 85 outbreaks from 1987 to 2014. Attack rates of outbreaks in rural areas (median, 12.63 cases/100 persons) and in primary schools (median, 14.54 cases/100 persons) were higher than those in urban areas (median, 5.62 cases/100 persons) and in secondary schools (median, 8.74 cases/100 persons) (P = 0.004 and P = 0.013, respectively). Shigella, pathogenic Escherichia coli, and norovirus were the most common pathogens. Boys tended toward higher attack rates than girls (sex-specific attack rate ratio, 1.13; 95% CI, 1.00-1.29, P = 0.05). Unsanitary conditions of water wells were reported frequently, and unhealthy behavior habits were common in students. School children were susceptible to waterborne disease in China. Chinese government should make efforts to improve access to safe water in schools. Health education promotion and conscientiousness of school leaders and teachers should be enhanced. Copyright © 2017. Production and hosting by Elsevier B.V.
A hybrid protection approaches for denial of service (DoS) attacks in wireless sensor networks
NASA Astrophysics Data System (ADS)
Gunasekaran, Mahalakshmi; Periakaruppan, Subathra
2017-06-01
Wireless sensor network (WSN) contains the distributed autonomous devices with the sensing capability of physical and environmental conditions. During the clustering operation, the consumption of more energy causes the draining in battery power that leads to minimum network lifetime. Hence, the WSN devices are initially operated on low-power sleep mode to maximise the lifetime. But, the attacks arrival cause the disruption in low-power operating called denial of service (DoS) attacks. The conventional intrusion detection (ID) approaches such as rule-based and anomaly-based methods effectively detect the DoS attacks. But, the energy consumption and false detection rate are more. The absence of attack information and broadcast of its impact to the other cluster head (CH) leads to easy DoS attacks arrival. This article combines the isolation and routing tables to detect the attack in the specific cluster and broadcasts the information to other CH. The intercommunication between the CHs prevents the DoS attacks effectively. In addition, the swarm-based defence approach is proposed to migrate the fault channel to normal operating channel through frequency hop approaches. The comparative analysis between the proposed table-based intrusion detection systems (IDSs) and swarm-based defence approaches with the traditional IDS regarding the parameters of transmission overhead/efficiency, energy consumption, and false positive/negative rates proves the capability of DoS prediction/prevention in WSN.
Light-mediated predation by northern squawfish on juvenile Chinook salmon
Petersen, James H.; Gadomski, Dena M.
1994-01-01
Northern squawfish Ptychocheilus oregonensis cause significant mortality of juvenile salmon in the lower Columbia River Basin (U.S.A.). The effects of light intensity on this predator-prey interaction were examined with laboratory experiments and modelling studies. In laboratory experiments, the rate of capture of subyearling chinook salmon Oncorhynchus tshawytscha by northern squawfish was inversely related to light intensity. In a large raceway, about five times more salmon were captured during 4 h periods of relative darkness (0–03 Ix) than during periods with high light intensity (160 Ix). The rate of predation could be manipulated by increasing or decreasing light intensity.A simulation model was developed for visual predators that encounter, attack, and capture juvenile salmon, whose schooling behaviour was light-sensitive. The model was fitted to laboratory results using a Monte Carlo filtering procedure. Model-predicted predation rate was especially sensitive to the visual range of predators at low light intensity and to predator search speed at high light. Modelling results also suggested that predation by northern squawfish on juvenile salmon may be highest across a narrow window of fight intensity.
Hansen, Bertel T; Østergaard, Søren D; Sønderskov, Kim M; Dinesen, Peter T
2016-10-01
The terrorist attacks that occurred on September 11, 2001 (hereafter referred to as 9/11) in the United States had a profound impact on the physical and mental health of Americans, but the effects beyond the United States are largely unknown. To understand the wider aftermath, we examined the consequences of the 9/11 attacks on mental disorders in the Kingdom of Denmark. Utilizing population data from the Danish Psychiatric Central Research Register from 1995 to 2012, we used a time-series intervention approach to estimate the change in the incidence rate of mental disorders after the 9/11 attacks. Based on analyses of 1,448,250 contacts with psychiatric services, we found that the attacks were followed by an immediate 16% increase in the incidence rate of trauma- and stressor-related disorders. This surge dissipated approximately a year after 9/11. In contrast, no similar increases were found for other disorders. This is consistent with the prominent role of external stressors in the etiology of trauma- and stressor-related disorders. The results indicate that the effects of 9/11 on mental disorders extended across the Atlantic Ocean to Denmark. Thus, the impact of terrorist attacks on mental health is likely not limited to inhabitants of the country under attack; it also extends to people far away and without immediate relation to it. © The Author 2016. Published by Oxford University Press on behalf of the Johns Hopkins Bloomberg School of Public Health. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.
Trends in ethnic disparities in stroke incidence in Auckland, New Zealand, during 1981 to 2003.
Carter, Kristie; Anderson, Craig; Hacket, Maree; Feigin, Valery; Barber, P Alan; Broad, Joanna B; Bonita, Ruth
2006-01-01
Although geographical variations in stroke rates are well documented, limited data exist on temporal trends in ethnic-specific stroke incidence. We assessed trends in ethnic-specific stroke rates using standard diagnostic criteria and community-wide surveillance procedures in Auckland, New Zealand (NZ) in 1981 to 1982, 1991 to 1992, and 2002 to 2003. Indirect and direct methods were used to adjust first-ever (incident) and total (attack) rates for changes in the structure of the population and reported with 95% CIs. Ethnicity was self-defined and categorized as "NZ/European," "Maori," "Pacific peoples," and "Asian and other." Stroke attack (19%; 95% CI, 11% to 26%) and incidence rates (19%; 95% CI, 12% to 24%) declined significantly in NZ/Europeans from 1981 to 1982 to 2002 to 2003. These rates remained high or increased in other ethnic groups, particularly for Pacific peoples in whom stroke attack rates increased by 66% (95% CI; 11% to 225%) over the periods. Some favorable downward trends in vascular risk factors, such as cigarette smoking, were counterbalanced by increasing age, body mass index, and diabetes in certain ethnic groups. Divergent trends in ethnic-specific stroke incidence and attack rates, and of associated risk factors, have occurred in Auckland over recent decades. The findings provide mixed views as to the future burden of stroke in populations undergoing similar lifestyle and structural changes.
An Examination of Issues Surrounding Information Security in California Colleges
ERIC Educational Resources Information Center
Butler, Robert D.
2013-01-01
Technological advances have provided increasing opportunities in higher education for delivering instruction and other services. However, exposure to information security attacks has been increasing as more organizations conduct their businesses online. Higher education institutions have one of the highest frequencies of security breaches as…
Review of attacks on health care facilities in six conflicts of the past three decades.
Briody, Carolyn; Rubenstein, Leonard; Roberts, Les; Penney, Eamon; Keenan, William; Horbar, Jeffrey
2018-01-01
In the ongoing conflicts of Syria and Yemen, there have been widespread reports of attacks on health care facilities and personnel. Tabulated evidence does suggest hospital bombings in Syria and Yemen are far higher than reported in other conflicts but it is unclear if this is a reporting artefact. This article examines attacks on health care facilities in conflicts in six middle- to high- income countries that have occurred over the past three decades to try and determine if attacks have become more common, and to assess the different methods used to collect data on attacks. The six conflicts reviewed are Yemen (2015-Present), Syria (2011- Present), Iraq (2003-2011), Chechnya (1999-2000), Kosovo (1998-1999), and Bosnia and Herzegovina (1992-1995). We attempted to get the highest quality source(s) with summary data of the number of facilities attacked for each of the conflicts. The only conflict that did not have summary data was the conflict in Iraq. In this case, we tallied individual reported events of attacks on health care. Physicians for Human Rights (PHR) reported attacks on 315 facilities (4.38 per month) in Syria over a 7-year period, while the Monitoring Violence against Health Care (MVH) tool launched later by the World Health Organization (WHO) Turkey Health Cluster reported attacks on 135 facilities (9.64 per month) over a 14-month period. Yemen had a reported 93 attacks (4.65 per month), Iraq 12 (0.12 per month), Chechnya > 24 (2.4 per month), Kosovo > 100 (6.67 per month), and Bosnia 21 (0.41 per month). Methodologies to collect data, and definitions of both facilities and attacks varied widely across sources. The number of reported facilities attacked is by far the greatest in Syria, suggesting that this phenomenon has increased compared to earlier conflicts. However, data on attacks of facilities was incomplete for all of the conflicts examined, methodologies varied widely, and in some cases, attacks were not defined at all. A global, standardized system that allows multiple reporting routes with different levels of confirmation, as seen in Syria, would likely allow for a more reliable and reproducible documentation system, and potentially, an increase in accountability.
Dengue Outbreak in Hadramout, Yemen, 2010: An Epidemiological Perspective
Ghouth, Abdulla Salim Bin; Amarasinghe, Ananda; Letson, G. William
2012-01-01
We analyzed surveillance data of a dengue outbreak (2010) reported to the Hadramout Health Office (Yemen) and retrospectively analyzed dengue-related epidemiological and entomological events reported in Hadramout from 2005 to 2009. A total of 630 immunoglobulin M (IgM) -confirmed dengue cases of 982 febrile cases was reported during the period from February to June of 2010; 12 cases died, giving case fatality a rate of 1.9%. Among febrile cases, the highest proportion of dengue cases (37.3%) was reported in the 15- to 24-year-old age group. The overall attack rate was 0.89/1,000. The average number of cases reported by month over the preceding 5-year period compared with the 2010 data is consistent with endemicity of dengue in the region and supports epidemic designation for the dengue activity in 2010. Recognition of endemic dengue transmission and potential for substantial dengue epidemics highlight the need for consistent laboratory-based surveillance that can support prevention and control activities accordingly. PMID:22665621
ERIC Educational Resources Information Center
Raun, Loren H.; Campos, Laura A.; Stevenson, Elizabeth; Ensor, Katherine B.; Johnson, Gwen; Persse, David
2017-01-01
Background: Rates of uncontrolled asthma vary by demographics, space, and time. This article uses data on ambulance-treated asthma attacks in children to analyze these variations so that school districts can improve their asthma management interventions. Methods: Incidence rates of 1826 ambulance-treated asthma attacks for children aged 5-18 years…
Subsonic roll oscillation experiments on the Standard Dynamics Model
NASA Technical Reports Server (NTRS)
Beyers, M. E.
1983-01-01
The experimental determination of the subsonic roll derivatives of the Standard Dynamics Model, which is representative of a current fighter aircraft configuration, is described. The direct, cross and cross-coupling derivatives are presented for angles of attack up to 41 deg and sideslip angles in the range from -5 deg to 5 deg, as functions of oscillation frequency. The derivatives exhibited significant nonlinear trends at high incidences and were found to be extremely sensitive to sideslip angle at angles of attack near 36 deg. The roll damping and dynamic cross derivatives were highly frequency dependent at angles of attack above 30 deg. The highest values measured for the dynamic cross and cross-coupling derivatives were comparable in magnitude with the maximum roll damping. The effects of oscillation amplitude and Mach number were also investigated, and the direct derivatives were correlated with data from another facility.
Sleep Quantity and Quality of Ontario Wildland Firefighters Across a Low-Hazard Fire Season
McGillis, Zachary; Dorman, Sandra C.; Robertson, Ayden; Larivière, Michel; Leduc, Caleb; Eger, Tammy; Oddson, Bruce E.; Larivière, Céline
2017-01-01
Objective: The aim of the study was to assess the sleep quality, quantity, and fatigue levels of Canadian wildland firefighters while on deployment. Methods: Objective and subjective sleep and fatigue measures were collected using actigraphy and questionnaires during non-fire (Base) and fire (Initial Attack and Project) deployments. Results: Suboptimal sleep quality and quantity were more frequently observed during high-intensity, Initial Attack fire deployments. Suboptimal sleep was also exhibited during non-fire (Base) work periods, which increases the risk of prefire deployment sleep debt. Self-reported, morning fatigue scores were low-to-moderate and highest for Initial Attack fire deployments. Conclusions: The study highlights the incidence of suboptimal sleep patterns in wildland firefighters during non-fire and fire suppression work periods. These results have implications for the health and safety practices of firefighters given the link between sleep and fatigue, in a characteristically hazardous occupation. PMID:29216017
Hansen, Bertel T; Dinesen, Peter T; Østergaard, Søren D
2017-11-01
On 22 July 2011, Anders Breivik killed 77 adults and children in Norway. Having recently documented increases in the incidence of trauma- and stressor-related disorders in Denmark after the 9/11 attacks, we hypothesized that the Breivik attacks-due to their geographic proximity-would be followed by even larger increases in Denmark. Using population-based data from the Danish Psychiatric Central Research Register (1995-2012), we conducted an intervention analysis of the change in the incidence of trauma- and stressor-related disorders after the Breivik attacks. The incidence rate increased by 16% over the following 1½ years after the Breivik attacks, corresponding to 2736 additional cases. In comparison, 9/11 was followed by a 4% increase. We also present evidence of a subsequent surge in incidence stimulated by media attention. This study bolsters previous findings on extra-national consequences of terrorism and indicates that geographic proximity and media coverage may exacerbate effects.
Trajectory Control for Vehicles Entering the Earth's Atmosphere at Small Flight Path Angles
NASA Technical Reports Server (NTRS)
Eggleston, John M.
1959-01-01
Methods of controlling the trajectories of high-drag-low-lift vehicles entering the earth's atmosphere at angles of attack near 90 deg and at initial entry angles up to 3 deg are studied. The trajectories are calculated for vehicles whose angle of attack can be held constant at some specified value or can be perfectly controlled as a function of some measured quantity along the trajectory. The results might be applied in the design of automatic control systems or in the design of instruments which will give the human pilot sufficient information to control his trajectory properly during an atmospheric entry. Trajectory data are compared on the basis of the deceleration, range, angle of attack, and, in some cases, the rate of descent. The aerodynamic heat-transfer rate and skin temperature of a vehicle with a simple heat-sink type of structure are calculated for trajectories made with several types of control functions. For the range of entry angles considered, it is found that the angle of attack can be controlled to restrict the deceleration down to an arbitrarily chosen level of 3g. All the control functions tried are successful in reducing the maximum deceleration to the desired level. However, in order to avoid a tendency for the deceleration to reach an initial peak decrease, and then reach a second peak, some anticipation is required in the control function so that the change in angle of attack will lead the change in deceleration. When the angle of attack is controlled in the aforementioned manner, the maximum rate of aerodynamic heat transfer to the skin is reduced, the maximum skin temperature of the vehicle is virtually unaffected, and the total heat absorbed is slightly increased. The increase in total heat can be minimized, however, by maintaining the maximum desired deceleration for as much of the trajectory as possible. From an initial angle of attack of 90 deg, the angle-of-attack requirements necessary to maintain constant values of deceleration (1g to 4g) and constant values of rate of descent (450 to 1,130 ft/sec) as long as it is aerodynamically practical are calculated and are found to be moderate in both magnitude and rate. Entry trajectories made with these types of control are presented and discussed.
Generalised Category Attack—Improving Histogram-Based Attack on JPEG LSB Embedding
NASA Astrophysics Data System (ADS)
Lee, Kwangsoo; Westfeld, Andreas; Lee, Sangjin
We present a generalised and improved version of the category attack on LSB steganography in JPEG images with straddled embedding path. It detects more reliably low embedding rates and is also less disturbed by double compressed images. The proposed methods are evaluated on several thousand images. The results are compared to both recent blind and specific attacks for JPEG embedding. The proposed attack permits a more reliable detection, although it is based on first order statistics only. Its simple structure makes it very fast.
Coherent attacking continuous-variable quantum key distribution with entanglement in the middle
NASA Astrophysics Data System (ADS)
Zhang, Zhaoyuan; Shi, Ronghua; Zeng, Guihua; Guo, Ying
2018-06-01
We suggest an approach on the coherent attack of continuous-variable quantum key distribution (CVQKD) with an untrusted entangled source in the middle. The coherent attack strategy can be performed on the double links of quantum system, enabling the eavesdropper to steal more information from the proposed scheme using the entanglement correlation. Numeric simulation results show the improved performance of the attacked CVQKD system in terms of the derived secret key rate with the controllable parameters maximizing the stolen information.
Matthew Hansen, E; Steven Munson, A; Blackford, Darren C; Wakarchuk, David; Scott Baggett, L
2016-10-01
We tested lethal trap trees and repellent semiochemicals as area treatments to protect host trees from spruce beetle (Dendroctonus rufipennis Kirby) attacks. Lethal trap tree treatments ("spray treatment") combined a spruce beetle bait with carbaryl treatment of the baited spruce. Repellent treatments ("spray-repellent") combined a baited lethal trap tree within a 16-m grid of MCH (3-methylcyclohex-2-en-1-one) and two novel spruce beetle repellents. After beetle flight, we surveyed all trees within 50 m of plot center, stratified by 10-m radius subplots, and compared attack rates to those from baited and unbaited control plots. Compared to the baited controls, spruce in the spray treatment had significantly reduced likelihood of a more severe attack classification (e.g., mass-attacked over strip-attacked or unsuccessful-attacked over unattacked). Because spruce in the spray treatment also had significantly heightened probability of more severe attack classification than those in the unbaited controls, however, we do not recommend lethal trap trees as a stand-alone beetle suppression strategy for epidemic beetle populations. Spruce in the spray-repellent treatment were slightly more likely to be classified as more severely attacked within 30 m of plot center compared to unbaited controls but, overall, had reduced probabilities of beetle attack over the entire 50-m radius plots. The semiochemical repellents deployed in this study were effective at reducing attacks on spruce within treated plots despite the presence of a centrally located spruce beetle bait. Further testing will be required to clarify operational protocols such as dose, elution rate, and release device spacing. Published by Oxford University Press on behalf of Entomological Society of America 2016. This work is written by US Government employees and is in the public domain in the US.
[Exposure to carbon monoxide in wildland firefighters during wildfires suppression].
Carballo Leyenda, Belén; Rodríguez-Marroyo, José A; López-Satué, Jorge; Avila Ordás, Concepción; Pernía Cubillo, Raúl; Villa Vicente, José Gerardo
2010-01-01
Health and occupational performance in wildland firefighters are mainly impaired for the carbon monoxide inhalation. Therefore, the aim of this study was to analyze the personal exposure to carbon monoxide in wildland firefighters during wildfires suppression. Carbon monoxide exposure was monitorized in 44 subjects during 58 real wildfires. Moreover, we analyzed the time weighted average exposure for an 8h shift (VA-ED). The wildfires were classified according to the work done (direct attack, indirect attack and mixed attack) and the current fuel (grass, bush, understory and mixed). The mean exposure to carbon monoxide was of 18,4 ± 1,7 ppm, what supposed a VA-ED of 7,0 ± 1,0 ppm. The highest exposures to carbon monoxide were found during the mixed attack (20,4 ± 2,3 ppm) and direct attack (17,5 ± 2,7 ppm). We only obtained significant differences (p < 0.05) between bush (19,8 ± 2,2) and understory (17,2 ± 3,9) and grass (12,0 ± 5,6). Exposures to carbon monoxide were influenced for the work done during the wildfires suppression and the type of fuel involved. Mean values obtained in this study were within safety limits described by different Spanish (INSHT) and international (NIOSH, OSHA) occupational safety and health agencies.
The Seasonality of Acute Attack of Primary Angle-Closure Glaucoma in Beijing, China.
Zhu, Jingyuan; Xu, Yang; Wang, Hongyuan; Liu, Dongjing; Zhu, Jingbo; Wu, Huijuan
2018-03-05
In this study, the seasonality of acute attack of primary angle-closure glaucoma (PACG) was analysed. This retrospective case series included 283 patients (200 women, 83 men; mean age, 68.2 ± 10.3 years; range, 37-96 years) with acute attack of PACG from a university-based clinic over 4 years. Patients' age and sex, and the date and season of onset of PACG attack, were analysed. Descriptive analysis and von Mises distribution were used for statistical analysis. The highest incidence of acute attack of PACG was observed in those aged 60-69 years (34.6%). Descriptive analysis showed that the incidence was greater in June and July for men, November for women, and November for the entire sample. An angular plot (using von Mises distribution) of the individual dates of onset revealed the estimated peak onset on September 11, November 8, and October 28 for men, women, and both, respectively. Integration of the results from the two analyses revealed the incidence to be higher in the summer and winter for men, and in the winter for women and for the entire sample. More females than males were affected. Monthly and seasonal variations in onset were observed, which might be related to weather changes.
Public health consequences of terrorism on maternal-child health in New York City and Madrid.
Sherrieb, Kathleen; Norris, Fran H
2013-06-01
Past research provides evidence for trajectories of health and wellness among individuals following disasters that follow specific pathways of resilience, resistance, recovery, or continued dysfunction. These individual responses are influenced by event type and pre-event capacities. This study was designed to utilize the trajectories of health model to determine if it translates to population health. We identified terrorist attacks that could potentially impact population health rather than only selected individuals within the areas of the attacks. We chose to examine a time series of population birth outcomes before and after the terrorist events of the New York City (NYC) World Trade Center (WTC) attacks of 2001 and the Madrid, Spain train bombings of 2004 to determine if the events affected maternal-child health of those cities and, if so, for how long. For percentages of low birth weight (LBW) and preterm births, we found no significant effects from the WTC attacks in NYC and transient but significant effects on rates of LBW and preterm births following the bombings in Madrid. We did find a significant positive and sustained effect on infant mortality rate in NYC following the WTC attacks but no similar effect in Madrid. There were no effects on any of the indicator variables in the comparison regions of New York state and the remainder of Spain. Thus, population maternal-health in New York and Madrid showed unique adverse effects after the terrorist attacks in those cities. Short-term effects on LBW and preterm birth rates in Madrid and long-term effects on infant mortality rates in NYC were found when quarterly data were analyzed from 1990 through 2008/2009. These findings raise questions about chronic changes in the population's quality of life following catastrophic terrorist attacks. Public health should be monitored and interventions designed to address chronic stress, environmental, and socioeconomic threats beyond the acute aftermath of events.
Do burns increase the severity of terror injuries?
Peleg, Kobi; Liran, Alon; Tessone, Ariel; Givon, Adi; Orenstein, Arie; Haik, Josef
2008-01-01
The use of explosives and suicide bombings has become more frequent since October 2000. This change in the nature of terror attacks has marked a new era in the Israeli-Palestinian conflict. We previously reported that the incidence of thermal injuries has since risen. However, the rise in the incidence of burns among victims of terror was proportionate to the rise in the incidence of burns among all trauma victims. This paper presents data from the Israeli National Trauma Registry during the years 1997--2003, to compare the severity of injuries and outcome (mortality rates) in terror victims with and without burn injuries. We also compare the severity of injuries and outcome (mortality rates) for patients with terror-attack related burns to non terror-attack related burns during the same period. Data was obtained from the Israeli National Trauma Registry for all patients admitted to 8 to 10 hospitals in Israel between 1997 and 2003. We analyzed and compared demographic and clinical characteristics of 219 terror-related burn patients (terror/burn), 2228 terror patients with no associated burns (Terror/no-burn) and 6546 non terror related burn patients (burn/no-terror). Severity of injuries was measured using the injury severity score, and burn severity by total body surface percentage indices. Admission rates to Intensive Care Units (ICU) and total length of hospitalization were also used to measure severity of injuries. In-hospital mortality rates were used to indicate outcome. Of burn/terror patients, 87.2% suffered other accompanying injuries, compared with 10.4% of burn/no-terror patients. Of burn/terror patients, 49.8% were admitted to ICU compared with only 11.9% of burn/no-terror patients and 23.8% of no-burn/terror patients. Mean length of hospital stay was 18.5 days for the terror/burn group compared with 11.1 days for the burn/no-terror group and 9.5 days for the terror/no-burn group. Burn/terror patients had a significantly higher injury severity score compared with the other groups. In-hospital mortality rate for the burn/no-terror group was 3.4%. The burn/terror group had a mortality rate of 6.4% which was similar to the no-burn/terror group (6.6%). Terror-attack injuries with accompanying burns have a more complex presentation, are of higher severity, and are associated with increased length of hospital stay and a higher ICU admissions rate, compared with terror-attack injuries without burns and non terror-attack related burns. However, mortality rates in terror-attack injuries are not affected by burns.
Gaul, Charly; Magis, Delphine; Liebler, Eric; Straube, Andreas
2017-12-01
In the PREVention and Acute treatment of chronic cluster headache (PREVA) study, attack frequency reductions from baseline were significantly more pronounced with non-invasive vagus nerve stimulation plus standard of care (nVNS + SoC) than with SoC alone. Given the intensely painful and frequent nature of chronic cluster headache attacks, additional patient-centric outcomes, including the time to and level of therapeutic response, were evaluated in a post hoc analysis of the PREVA study. After a 2-week baseline phase, 97 patients with chronic cluster headache entered a 4-week randomised phase to receive nVNS + SoC (n = 48) or SoC alone (n = 49). All 92 patients who continued into a 4-week extension phase received nVNS + SoC. Compared with SoC alone, nVNS + SoC led to a significantly lower mean weekly attack frequency by week 2 of the randomised phase; the attack frequency remained significantly lower in the nVNS + SoC group through week 3 of the extension phase (P < 0.02). Attack frequencies in the nVNS + SoC group were significantly lower at all study time points than they were at baseline (P < 0.05). Response rates were significantly greater with nVNS + SoC than with SoC alone when response was defined as attack frequency reductions of ≥25%, ≥50%, and ≥75% from baseline (≥25% and ≥50%, P < 0.001; ≥75%, P = 0.009). The 100% response rate was 8% with nVNS + SoC and 0% with SoC alone. Prophylactic nVNS led to rapid, significant, and sustained reductions in chronic cluster headache attack frequency within 2 weeks after its addition to SoC and was associated with significantly higher ≥25%, ≥50%, and ≥75% response rates than SoC alone. The rapid decrease in weekly attack frequency justifies a 4-week trial period to identify responders to nVNS, with a high degree of confidence, among patients with chronic cluster headache.
DeTrano, Alexander; Karimi, Naghmeh; Karri, Ramesh; Guo, Xiaofei; Carlet, Claude; Guilley, Sylvain
2015-01-01
Masking countermeasures, used to thwart side-channel attacks, have been shown to be vulnerable to mask-extraction attacks. State-of-the-art mask-extraction attacks on the Advanced Encryption Standard (AES) algorithm target S-Box recomputation schemes but have not been applied to scenarios where S-Boxes are precomputed offline. We propose an attack targeting precomputed S-Boxes stored in nonvolatile memory. Our attack targets AES implemented in software protected by a low entropy masking scheme and recovers the masks with 91% success rate. Recovering the secret key requires fewer power traces (in fact, by at least two orders of magnitude) compared to a classical second-order attack. Moreover, we show that this attack remains viable in a noisy environment or with a reduced number of leakage points. Eventually, we specify a method to enhance the countermeasure by selecting a suitable coset of the masks set.
Brown, Mark P
2006-01-01
The effect of nursing professionals (i.e., nurse aid/orderly, licensed practical nurse, registered nurse) pay structures and pay levels on hospitals risk-adjusted heart attack outcomes was determined. Operationalizing hospitals' heart attack outcomes as their thirty-day risk-adjusted mortality rates, a positive curvilinear relation is hypothesized between pay dispersion and hospitals' heart attack outcomes, whereas a direct relation is hypothesized between pay level and hospitals' heart attack outcomes. Pay level is also hypothesized as a moderator of the relation between pay dispersion and hospitals' heart attack outcomes. Using a sample of 138 California hospitals, support is not found for either the curvilinear relation between hospitals' nursing professionals pay dispersion and hospitals' heart attack outcomes, or the direct relation between nursing professionals' pay level and hospitals' heart attack outcomes. Support is found for the moderation hypothesis in which nursing professionals' pay level moderates the relation between hospitals' nursing professionals pay dispersion and hospitals' heart attack outcomes. Implications for practice are discussed in light of the study's results.
DeTrano, Alexander; Karimi, Naghmeh; Karri, Ramesh; Guo, Xiaofei; Carlet, Claude; Guilley, Sylvain
2015-01-01
Masking countermeasures, used to thwart side-channel attacks, have been shown to be vulnerable to mask-extraction attacks. State-of-the-art mask-extraction attacks on the Advanced Encryption Standard (AES) algorithm target S-Box recomputation schemes but have not been applied to scenarios where S-Boxes are precomputed offline. We propose an attack targeting precomputed S-Boxes stored in nonvolatile memory. Our attack targets AES implemented in software protected by a low entropy masking scheme and recovers the masks with 91% success rate. Recovering the secret key requires fewer power traces (in fact, by at least two orders of magnitude) compared to a classical second-order attack. Moreover, we show that this attack remains viable in a noisy environment or with a reduced number of leakage points. Eventually, we specify a method to enhance the countermeasure by selecting a suitable coset of the masks set. PMID:26491717
Beier, J C; Oster, C N; Onyango, F K; Bales, J D; Sherwood, J A; Perkins, P V; Chumo, D K; Koech, D V; Whitmire, R E; Roberts, C R
1994-05-01
Relationships between Plasmodium falciparum incidence and entomologic inoculation rates (EIRs) were determined for a 21-month period in Saradidi, western Kenya, in preparation for malaria vaccine field trials. Children, ranging in age from six months to six years and treated to clear malaria parasites, were monitored daily for up to 12 weeks to detect new malaria infections. Overall, new P. falciparum infections were detected in 77% of 809 children. The percentage of children that developed infections per two-week period averaged 34.7%, ranging from 7.3% to 90.9%. Transmission by vector populations was detected in 86.4% (38 of 44) of the two-week periods, with daily EIRs averaging 0.75 infective bites per person. Periods of intense transmission during April to August, and from November to January, coincided with seasonal rains. Relationships between daily malaria attack rates and EIRs indicated that an average of only 7.5% (1 in 13) of the sporozoite inoculations produced new infections in children. Regression analysis demonstrated that EIRs accounted for 74% of the variation in attack rates. One of the components of the EIR, the human-biting rate, alone accounted for 68% of the variation in attack rates. Thus, measurements of either the EIR or the human-biting rate can be used to predict corresponding attack rates in children. These baseline epidemiologic studies indicate that the intense transmission patterns of P. falciparum in Saradidi will provide excellent conditions for evaluating malaria vaccine efficacy.
Diphtheria in the United States, 1971-81.
Chen, R T; Broome, C V; Weinstein, R A; Weaver, R; Tsai, T F
1985-01-01
After a decade-long resurgence, including a large cutaneous diphtheria outbreak in Washington State, the diphtheria incidence rate in the United States reached its lowest recorded level ever in 1980--two patients (0.01 case per million). Mortality paralleled the decline in incidence rate. Only 143 of the 3,141 US counties reported noncutaneous diphtheria patients during 1971-81; most were located in the West. The highest attack rates were experienced by children less than 15 years old (0.8 case per million) and by American Indians (22.6 cases per million). Persons immunized with three or more doses of diphtheria toxoid had a lower death-to-case ratio (1.3 per cent) than totally unimmunized persons (13.4 per cent). The reasons for the dramatic decline in diphtheria incidence rates are unclear, although it has been postulated that the gene for producing diphtheria toxin may be lost from organisms in highly immunized populations. Significant proportions of the adult and elderly populations are susceptible to diphtheria. Continuation of primary immunization with increased emphasis on the routine use of tetanus and diphtheria toxoids (Td) boosters in adults should ensure that diphtheria will remain largely a scourge of the past. PMID:4061710
Van Apeldoorn, Franske J; Van Hout, Wiljo J P J; Timmerman, Marieke E; Mersch, Peter Paul A; den Boer, Johan A
2013-09-05
Existing literature on panic disorder (PD) yields no data regarding the differential rates of improvement during Cognitive Behavioral Therapy (CBT), Selective Serotonin Reuptake Inhibitor (SSRI) or both combined (CBT+SSRI). Patients were randomized to CBT, SSRI or CBT+SSRI which each lasted one year including three months of medication taper. Participating patients kept record of the frequency of panic attacks throughout the full year of treatment. Rate of improvement on panic frequency and the relationship between rate of improvement and baseline agoraphobia (AG) were examined. A significant decline in frequency of panic attacks was observed for each treatment modality. SSRI and CBT+SSRI were associated with a significant faster rate of improvement as compared to CBT. Gains were maintained after tapering medication. For patients with moderate or severe AG, CBT+SSRI was associated with a more rapid improvement on panic frequency as compared to patients receiving either mono-treatment. Frequency of panic attacks was not assessed beyond the full year of treatment. Second, only one process variable was used. Patients with PD respond well to each treatment as indicated by a significant decline in panic attacks. CBT is associated with a slower rate of improvement as compared to SSRI and CBT+SSRI. Discontinuation of SSRI treatment does not result in a revival of frequency of panic attacks. Our data suggest that for patients without or with only mild AG, SSRI-only will suffice. For patients with moderate or severe AG, the combined CBT+SSRI treatment is recommended. Copyright © 2013 Elsevier B.V. All rights reserved.
Diamond, Kelly M; Schoenfuss, Heiko L; Walker, Jeffrey A; Blob, Richard W
2016-10-01
Experimental measurements of escape performance in fishes have typically been conducted in still water; however, many fishes inhabit environments with flow that could impact escape behavior. We examined the influences of flow and predator attack direction on the escape behavior of fish, using juveniles of the amphidromous Hawaiian goby Sicyopterus stimpsoni In nature, these fish must escape ambush predation while moving through streams with high-velocity flow. We measured the escape performance of juvenile gobies while exposing them to a range of water velocities encountered in natural streams and stimulating fish from three different directions. Frequency of response across treatments indicated strong effects of flow conditions and attack direction. Juvenile S. stimpsoni had uniformly high response rates for attacks from a caudal direction (opposite flow); however, response rates for attacks from a cranial direction (matching flow) decreased dramatically as flow speed increased. Mechanical stimuli produced by predators attacking in the same direction as flow might be masked by the flow environment, impairing the ability of prey to detect attacks. Thus, the likelihood of successful escape performance in fishes can depend critically on environmental context. © 2016. Published by The Company of Biologists Ltd.
Detection of abnormal item based on time intervals for recommender systems.
Gao, Min; Yuan, Quan; Ling, Bin; Xiong, Qingyu
2014-01-01
With the rapid development of e-business, personalized recommendation has become core competence for enterprises to gain profits and improve customer satisfaction. Although collaborative filtering is the most successful approach for building a recommender system, it suffers from "shilling" attacks. In recent years, the research on shilling attacks has been greatly improved. However, the approaches suffer from serious problem in attack model dependency and high computational cost. To solve the problem, an approach for the detection of abnormal item is proposed in this paper. In the paper, two common features of all attack models are analyzed at first. A revised bottom-up discretized approach is then proposed based on time intervals and the features for the detection. The distributions of ratings in different time intervals are compared to detect anomaly based on the calculation of chi square distribution (χ(2)). We evaluated our approach on four types of items which are defined according to the life cycles of these items. The experimental results show that the proposed approach achieves a high detection rate with low computational cost when the number of attack profiles is more than 15. It improves the efficiency in shilling attacks detection by narrowing down the suspicious users.
Estimating the Attack Rate of Pregnancy-Associated Listeriosis during a Large Outbreak
Imanishi, Maho; Routh, Janell A.; Klaber, Marigny; Gu, Weidong; Vanselow, Michelle S.; Jackson, Kelly A.; Sullivan-Chang, Loretta; Heinrichs, Gretchen; Jain, Neena; Albanese, Bernadette; Callaghan, William M.; Mahon, Barbara E.; Silk, Benjamin J.
2015-01-01
Background. In 2011, a multistate outbreak of listeriosis linked to contaminated cantaloupes raised concerns that many pregnant women might have been exposed to Listeria monocytogenes. Listeriosis during pregnancy can cause fetal death, premature delivery, and neonatal sepsis and meningitis. Little information is available to guide healthcare providers who care for asymptomatic pregnant women with suspected L. monocytogenes exposure. Methods. We tracked pregnancy-associated listeriosis cases using reportable diseases surveillance and enhanced surveillance for fetal death using vital records and inpatient fetal deaths data in Colorado. We surveyed 1,060 pregnant women about symptoms and exposures. We developed three methods to estimate how many pregnant women in Colorado ate the implicated cantaloupes, and we calculated attack rates. Results. One laboratory-confirmed case of listeriosis was associated with pregnancy. The fetal death rate did not increase significantly compared to preoutbreak periods. Approximately 6,500–12,000 pregnant women in Colorado might have eaten the contaminated cantaloupes, an attack rate of ~1 per 10,000 exposed pregnant women. Conclusions. Despite many exposures, the risk of pregnancy-associated listeriosis was low. Our methods for estimating attack rates may help during future outbreaks and product recalls. Our findings offer relevant considerations for management of asymptomatic pregnant women with possible L. monocytogenes exposure. PMID:25784782
DOE Office of Scientific and Technical Information (OSTI.GOV)
John Kilgo
2005-04-20
The effects of harvest-created canopy gaps in bottomland hardwood forests on arthropod abundance and, hence, the foraging ecology of birds are poorly understood. I predicted that arthropod abundance would be high near edges of group-selection harvest gaps and lower in the surrounding forest, and that male Hooded Warblers (Wilsonia citrina) foraging near gaps would find more prey per unit time than those foraging in the surrounding forest. In fact, arthropod abundance was greater >100 m from a gap edge than at 0-30 m or 30-100 m from an edge, due to their abundance on switchcane (Arundinaria gigantea); arthropods did notmore » differ in abundance among distances from gaps on oaks (Quercus spp.) or red maple (Acer rubrum). Similarly, Hooded Warbler foraging attack rates were not higher near gap edges: when foraging for fledglings, attack rate did not differ among distances from gaps, but when foraging for themselves, attack rates actually were lower 0-30 m from gap edges than 30-100 m or >100 m from a gap edge. Foraging attack rate was positively associated with arthropod abundance. Hooded Warblers apparently encountered fewer prey and presumably foraged less efficiently where arthropods were least abundant, i.e., near gaps. That attack rates among birds foraging for fledglings were not affected by distance from gap (and hence arthropod abundance) suggests that prey availability may not be limiting at any location across the forest, despite the depressing effects of gaps on arthropod abundance.« less
Security Assessment of Cyberphysical Digital Microfluidic Biochips.
Ali, Sk Subidh; Ibrahim, Mohamed; Sinanoglu, Ozgur; Chakrabarty, Krishnendu; Karri, Ramesh
2016-01-01
A digital microfluidic biochip (DMFB) is an emerging technology that enables miniaturized analysis systems for point-of-care clinical diagnostics, DNA sequencing, and environmental monitoring. A DMFB reduces the rate of sample and reagent consumption, and automates the analysis of assays. In this paper, we provide the first assessment of the security vulnerabilities of DMFBs. We identify result-manipulation attacks on a DMFB that maliciously alter the assay outcomes. Two practical result-manipulation attacks are shown on a DMFB platform performing enzymatic glucose assay on serum. In the first attack, the attacker adjusts the concentration of the glucose sample and thereby modifies the final result. In the second attack, the attacker tampers with the calibration curve of the assay operation. We then identify denial-of-service attacks, where the attacker can disrupt the assay operation by tampering either with the droplet-routing algorithm or with the actuation sequence. We demonstrate these attacks using a digital microfluidic synthesis simulator. The results show that the attacks are easy to implement and hard to detect. Therefore, this work highlights the need for effective protections against malicious modifications in DMFBs.
NASA Technical Reports Server (NTRS)
Zoby, E. V.
1981-01-01
An engineering method has been developed for computing the windward-symmetry plane convective heat-transfer rates on Shuttle-like vehicles at large angles of attack. The engineering code includes an approximate inviscid flowfield technique, laminar and turbulent heating-rate expressions, an approximation to account for the variable-entropy effects on the surface heating and the concept of an equivalent axisymmetric body to model the windward-ray flowfields of Shuttle-like vehicles at angles of attack from 25 to 45 degrees. The engineering method is validated by comparing computed heating results with corresponding experimental data measured on Shuttle and advanced transportation models over a wide range of flow conditions and angles of attack from 25 to 40 degrees and also with results of existing prediction techniques. The comparisons are in good agreement.
An Investigation of Anaerobic Processes in Fuel/Natural Seawater Environments
2012-02-08
Corrosion rates were estimated from polarization resistance measurements and corrosion was measured by weight loss. Corrosion attack morphology and...rates were estimated from polarization resistance measurements and corrosion was measured by weight loss. Corrosion attack morphology and corrosion...the backside of the coupons with conductive epoxy and carbon tape to achieve electrical connection. Coupons were individually mounted in epoxy to
Destabilization of yttria-stabilized zirconia induced by molten sodium vanadate-sodium sulfate melts
NASA Technical Reports Server (NTRS)
Nagelberg, A. S.; Hamilton, J. C.
1985-01-01
The extent of surface destabilization of ZrO2 - 8 wt percent Y2O3 ceramic disks was determined after exposure to molten salt mixtures of sodium sulfate containing up to 15 mole percent sodium metavanadate (NaVO3) at 1173 K. The ceramic surface was observed to transform from the cubic/tetragonal to monoclinic phase, concurrent with chemical changes in the molten salt layer in contact with the ceramic. Significant attack rates were observed in both pure sulfate and metavanadate sulfate melts. The rate of attack was found to be quite sensitive to the mole fraction of vanadate in the molten salt solution and the partial pressure of sulfur trioxide in equilibrium with the salt melt. The observed parabolic rate of attack is interpreted to be caused by a reaction controlled by diffusion in the salt that penetrates into the porous layer formed by the destabilization. The parabolic rate constant in mixed sodium metavanadate - sodium sulfate melts was found to be proportional to the SO3 partial pressure and the square of the metavanadate concentration. In-situ Raman spectroscopic measurements allowed simultaneous observations of the ceramic phases and salt chemistry during the attack process.
Aberer, Werner; Maurer, Marcus; Bouillet, Laurence; Zanichelli, Andrea; Caballero, Teresa; Longhurst, Hilary J; Perrin, Amandine; Andresen, Irmgard
2017-01-01
Patients with hereditary angioedema (HAE) due to C1-inhibitor deficiency (C1-INH-HAE) experience recurrent attacks of cutaneous or submucosal edema that may be frequent and severe; prophylactic treatments can be prescribed to prevent attacks. However, despite the use of long-term prophylaxis (LTP), breakthrough attacks are known to occur. We used data from the Icatibant Outcome Survey (IOS) to evaluate the characteristics of breakthrough attacks and the effectiveness of icatibant as a treatment option. Data on LTP use, attacks, and treatments were recorded. Attack characteristics, treatment characteristics, and outcomes (time to treatment, time to resolution, and duration of attack) were compared for attacks that occurred with versus without LTP. Data on 3228 icatibant-treated attacks from 448 patients with C1-INH-HAE were analyzed; 30.1% of attacks occurred while patients were using LTP. Attack rate, attack severity, and the distribution of attack sites were similar across all types of LTP used, and were comparable to the results found in patients who did not receive LTP. Attacks were successfully treated with icatibant; 82.5% of all breakthrough attacks were treated with a single icatibant injection without C1-INH rescue medication. Treatment outcomes were comparable for breakthrough attacks across all LTP types, and for attacks without LTP. Patients who use LTP should be aware that breakthrough attacks can occur, and such attacks can be severe. Thus, patients with C1-INH-HAE using LTP should have emergency treatment readily available. Data from IOS show that icatibant is effective for the treatment of breakthrough attacks. Trial Registration NCT01034969.
Kabaciński, Jarosław; Dworak, Lechosław Bogdan; Murawa, Michał; Rzepnicka, Agata
2016-01-01
Dynamic loads during landings determined by the ground reaction forces (GRFs) may elaborate internal loads and increase the risk of overload knee injuries as a result of performing volleyball jumps many times. The study dealt with a biomechanical assessment of dynamic load indicators in female volleyball players for the motion sequence of take-off-landing in blocks and attacks. Twelve professional female volleyball players participated in the study. Blocks and attacks were filmed by two cameras. GRFs vs. time graphs were recorded with the use of a force platform. Values of dynamic load indicators in terms of the relations of peak of vertical component of GRF, build-up index of this force (BIF), and power output (P) during landing to the vGRF, BIF and P during take-off (L/T) were calculated. The statistically significant ( p < 0.05) highest values of L/T indicators were found for back row attack spikes: 2.4 (vGRF), 12.2 (BIF) and 3.1 (P). In the case of blocks, slide attack spikes and attack line spikes, results of these variables were in range: 1.8÷2.1, 5.9÷7.6 and 2.1÷2.9, respectively. The reduction of GRFs during landings contributes to decreasing the level of the load indicators L/T which should minimize the incidence of anterior cruciate ligament and patellar tendon injuries in female volleyball players.
Collective attacks and unconditional security in continuous variable quantum key distribution.
Grosshans, Frédéric
2005-01-21
We present here an information theoretic study of Gaussian collective attacks on the continuous variable key distribution protocols based on Gaussian modulation of coherent states. These attacks, overlooked in previous security studies, give a finite advantage to the eavesdropper in the experimentally relevant lossy channel, but are not powerful enough to reduce the range of the reverse reconciliation protocols. Secret key rates are given for the ideal case where Bob performs optimal collective measurements, as well as for the realistic cases where he performs homodyne or heterodyne measurements. We also apply the generic security proof of Christiandl et al. to obtain unconditionally secure rates for these protocols.
Lonsdale, Richard; Hoyle, Simon; Grey, Daniel T; Ridder, Lars; Mulholland, Adrian J
2012-02-28
Soluble epoxide hydrolase (sEH) is an enzyme involved in drug metabolism that catalyzes the hydrolysis of epoxides to form their corresponding diols. sEH has a broad substrate range and shows high regio- and enantioselectivity for nucleophilic ring opening by Asp333. Epoxide hydrolases therefore have potential synthetic applications. We have used combined quantum mechanics/molecular mechanics (QM/MM) umbrella sampling molecular dynamics (MD) simulations (at the AM1/CHARMM22 level) and high-level ab initio (SCS-MP2) QM/MM calculations to analyze the reactions, and determinants of selectivity, for two substrates: trans-stilbene oxide (t-SO) and trans-diphenylpropene oxide (t-DPPO). The calculated free energy barriers from the QM/MM (AM1/CHARMM22) umbrella sampling MD simulations show a lower barrier for phenyl attack in t-DPPO, compared with that for benzylic attack, in agreement with experiment. Activation barriers in agreement with experimental rate constants are obtained only with the highest level of QM theory (SCS-MP2) used. Our results show that the selectivity of the ring-opening reaction is influenced by several factors, including proximity to the nucleophile, electronic stabilization of the transition state, and hydrogen bonding to two active site tyrosine residues. The protonation state of His523 during nucleophilic attack has also been investigated, and our results show that the protonated form is most consistent with experimental findings. The work presented here illustrates how determinants of selectivity can be identified from QM/MM simulations. These insights may also provide useful information for the design of novel catalysts for use in the synthesis of enantiopure compounds.
Cloake, T; Haigh, T; Cheshire, J; Walker, D
2017-03-01
In South Africa, burns are a major public health problem responsible for significant morbidity and long-term physical disability. This is, in part, due to a significant proportion of the urban population living in poorly constructed, combustible accommodation. The presence of co-morbid diseases such as diabetes and malignancy in patients with burns has been associated with a poorer outcome. The impact of other diseases such as HIV has yet to be defined. A retrospective data collection study analysed the 221 patients admitted to Tygerberg Hospital Burns Unit in 2011 and the first six months of 2013. Using hospital records, patient demographic data was collected alongside burn agent, ICU admission, complications, and patient outcome in terms of length of stay and mortality. The most common burn agent was hot liquid (45.7%). A significant proportion of patients were subject to intentional attacks (34.3%). Shack fires and flame accounted cumulatively for 85% of total inhalational burns, the highest rates of admission to ICU (85.5%), the highest rate of complications, as well as 92.3% of all total fatalities. HIV+ patients had a higher mortality (13.3% vs 5%, p=0.22) and a higher complication rate (46.7% vs 30%, p=0.21). There was no difference in length of stay between the HIV+ and HIV- cohort (12days vs. 15.5 days, p=0.916). Burns are a significant yet preventable cause of mortality and morbidity. The rising number of shack fires, responsible for extensive burns and resultant mortality is concerning and indicates urgent attention and action. HIV complicates the recovery from burn and is responsible for an increased rate of in hospital mortality. Copyright © 2016 Elsevier Ltd and ISBI. All rights reserved.
Degradation of chloramphenicol by potassium ferrate (VI) oxidation: kinetics and products.
Zhou, Jia-Heng; Chen, Kai-Bo; Hong, Qian-Kun; Zeng, Fan-Cheng; Wang, Hong-Yu
2017-04-01
The oxidation of chloramphenicol (CAP) by potassium ferrate (VI) in test solution was studied in this paper. A series of jar tests were performed at bench scale with pH of 5-9 and molar ratio [VI/CAP] of 16.3:1-81.6:1. Results showed that raising VI dose could improve the treatment performance and the influence of solution pH was significant. VI is more reactive in neutral conditions, presenting the highest removal efficiency of CAP. The rate law for the oxidation of CAP by VI was first order with respect to each reactant, yielding an overall second-order reaction. Furthermore, five oxidation products were observed during CAP oxidation by VI. Results revealed that VI attacked the amide group of CAP, leading to the cleavage of the group, while benzene ring remained intact.
Hansen, E Matthew; Munson, A Steven; Blackford, Darren C; Graves, Andrew D; Coleman, Tom W; Baggett, L Scott
2017-10-01
We tested 3-methylcyclohex-2-en-1-one (MCH) and an Acer kairomone blend (AKB) as repellent semiochemicals for area and single tree protection to prevent spruce beetle (Dendroctonus rufipennis Kirby) attacks at locations in Utah and New Mexico. In the area protection study, we compared host infestation rates of MCH applications at three densities (20, 40, and 80 g MCH ha-1) against a control treatment over 0.64 ha plots centered within ~1.25 ha treatment blocks. All treatments included two baited funnel traps within the plot to assure spruce beetle pressure. Following beetle attack, plots were surveyed for new spruce beetle attacks and to quantify stand characteristics. The probability of more severe spruce beetle attacks was significantly reduced, by ~50%, in each of the MCH area treatments compared with the control treatment but there was no significant treatment difference among the MCH deployment densities. For the single tree protection study, we compared attack rates of MCH, Acer kairomone blend (AKB), and MCH plus AKB on spruce beetle-baited trees against bait-only trees. Each treatment was applied over a range of host diameters to test for host size effects. Seventy-five percent of control trees were mass-attacked, about one-third of MCH- and AKB-alone spruce was mass-attacked, and no MCH plus AKB spruce were mass-attacked. These results suggest that MCH alone is a marginal area and single tree protectant against spruce beetle but that deployment with other repellents can significantly increase treatment efficacy. Published by Oxford University Press on behalf of Entomological Society of America 2017. This work is written by (a) US Government employee(s) and is in the public domain in the US.
Temperature-dependent growth of Botrytis cinerea isolates from potted plants.
Martínez, J A; Gómez-Bellot, M J; Bañón, S
2009-01-01
Botrytis cinereo is a common aggressive saprophyte fungus which also invades injured plant tissues, causing Botrytis blight (Grey mould) in many ornamental plants, including potted flowering plants. Several B. cinerea isolates from potted plants (Pelargonium x hortorum, Lantana camara, Lonicera japonica, Hydrangea macrophylla, and Cyclamen persicum) affected by Botrytis blight in the south of Spain were studied and identified by PCR. The isolates showed phenotypic differences between them, as previously reported by the authors. In this work we demonstrate that these isolates show different temperature-dependent growth phenomena, expressed as mycelial growth rates, conidiation (measured as the number of conidia per colony and time of appearance), mass of both aerial and submerged mycelia, and sclerotia production. Growth rates were assessed from differences in colony area and mass of both aerial and submerged mycelium growing in potato dextrose agar culture medium (PDA). Three temperatures were used to measure these variables (6, 16, and 26 degrees C) and to establish the differences among isolates by modelling the effects of temperature on the growth variables. B. cinerea showed a high degree of phenotypic variability and differences in its growth kinetics, depending on temperature and isolate in question. The isolate from P. x hortorum showed the greatest conidiation although this process did not depend on the temperatures assayed. The growth rate of the isolates from P. x hortorum was the highest. The growth rates in all the isolates were determined and the growth kinetics could be fitted to a typical equation of fungi growing on solid culture medium. The isolate from P. x hortorum was the most vigorous, while the least vigorous was the isolate from L. japonica. A relationship between mycelial growth rate, conidiation and aerial mycelium could be established. A temperature of 26 degrees C accelerated sclerotia production, but only in the isolate from C. persicum. Such phenotypical variability and differences in growth rates may result in a differential response in plant-pathogen interactions when isolates attack hosts at different temperatures, meaning that a variety of plant protection strategies should be considered when B. cinerea attacks these potted plants.
NASA Astrophysics Data System (ADS)
Kim, Kyung-Su; Lee, Hae-Yeoun; Im, Dong-Hyuck; Lee, Heung-Kyu
Commercial markets employ digital right management (DRM) systems to protect valuable high-definition (HD) quality videos. DRM system uses watermarking to provide copyright protection and ownership authentication of multimedia contents. We propose a real-time video watermarking scheme for HD video in the uncompressed domain. Especially, our approach is in aspect of practical perspectives to satisfy perceptual quality, real-time processing, and robustness requirements. We simplify and optimize human visual system mask for real-time performance and also apply dithering technique for invisibility. Extensive experiments are performed to prove that the proposed scheme satisfies the invisibility, real-time processing, and robustness requirements against video processing attacks. We concentrate upon video processing attacks that commonly occur in HD quality videos to display on portable devices. These attacks include not only scaling and low bit-rate encoding, but also malicious attacks such as format conversion and frame rate change.
Hirst, William; Phelps, Elizabeth A.; Buckner, Randy L.; Budson, Andrew E.; Cuc, Alexandru; Gabrieli, John D. E.; Johnson, Marcia K.; Lyle, Keith B.; Lustig, Cindy; Mather, Mara; Meksin, Robert; Mitchell, Karen J.; Ochsner, Kevin N.; Schacter, Daniel L.; Simons, Jon S.; Vaidya, Chandan J.
2010-01-01
More than 3,000 individuals from seven US cities reported on their memories of learning of the terrorist attacks of September 11, as well as details about the attack, one week, 11 months, and/or 35 months after the assault. Some studies of flashbulb memories examining long-term retention show slowing in the rate of forgetting after a year, whereas others demonstrate accelerated forgetting. The present paper indicates that (1) the rate of forgetting for flashbulb memories and event memory (memory for details about the event itself) slows after a year, (2) the strong emotional reactions elicited by flashbulb events are remembered poorly, worse than non-emotional features such as where and from whom one learned of the attack, and (3) the content of flashbulb and event memories stabilizes after a year. The results are discussed in terms of community memory practices. PMID:19397377
Quantum key distribution using continuous-variable non-Gaussian states
NASA Astrophysics Data System (ADS)
Borelli, L. F. M.; Aguiar, L. S.; Roversi, J. A.; Vidiella-Barranco, A.
2016-02-01
In this work, we present a quantum key distribution protocol using continuous-variable non-Gaussian states, homodyne detection and post-selection. The employed signal states are the photon added then subtracted coherent states (PASCS) in which one photon is added and subsequently one photon is subtracted from the field. We analyze the performance of our protocol, compared with a coherent state-based protocol, for two different attacks that could be carried out by the eavesdropper (Eve). We calculate the secret key rate transmission in a lossy line for a superior channel (beam-splitter) attack, and we show that we may increase the secret key generation rate by using the non-Gaussian PASCS rather than coherent states. We also consider the simultaneous quadrature measurement (intercept-resend) attack, and we show that the efficiency of Eve's attack is substantially reduced if PASCS are used as signal states.
Influence of the Angle of Attack on the Aerothermodynamics of the Mars Science Laboratory
NASA Technical Reports Server (NTRS)
Dyakonov, Artem A.; Edquist, Karl T.; Schoenenberger, Mark
2006-01-01
An investigation of the effects of the incidence angle on the aerothermodynamic environments of the Mars Science Laboratory has been conducted. Flight conditions of peak heating, peak deceleration and chute deploy are selected and the effects of the angle of attack on the aerodynamics and aerothermodynamics are analyzed. The investigation found that static aerodynamics are well behaved within the considered range of incidence angles. Leeside laminar and turbulent computed heating rates decrease with incidence, despite the increase in the leeside running length. Stagnation point was found to stay on the conical flank at all angles of attack, and this is linked to the rapid flow expansion around the shoulder. Hypersonic lift to drag ratio is limited by the heating rates in the region of the windside shoulder. The effects of the high angle of incidence on the dynamic aero at low Mach remains to be determined. Influence of the angle of attack on the smooth-wall transition parameter indicates, that higher angle of attack flight may result in delayed turbulence onset, however, a coupled analysis, involving flight trajectory simulation is necessary.
Improved Fake-State Attack to the Quantum Key Distribution Systems
NASA Astrophysics Data System (ADS)
Zhang, Sheng; Wang, Jian; Tang, Chao-jing
2012-09-01
It has been showed that most commercial quantum cryptosystems are vulnerable to the fake-state attacks, which employ the loophole that the avalanche photodiodes as single photon detectors still produce detection events in the linear mode. However, previous fake-state attacks may be easily prevented by either installing a watch dog or reconfiguring the dead-time assigning component. In this paper, we present a new technique to counteract the after-pulse effect ever enhanced by the fake-state attacks, in order to lower the quantum bit error rate. Obviously, it is more difficult to detect the presented attack scheme. Indeed, it contributes to promoting of implementing a secure quantum cryptosystem in real life.
Baseline measurements of smoke exposure among wildland firefighters.
Reinhardt, Timothy E; Ottmar, Roger D
2004-09-01
Extensive measurements of smoke exposure among wildland firefighters are summarized, showing that firefighters can be exposed to significant levels of carbon monoxide and respiratory irritants, including formaldehyde, acrolein, and respirable particulate matter. Benzene was also measured and found to be well below permissible exposure limits, with the highest concentrations occurring among firefighters working with engines and torches burning petroleum-based fuel. Exposures to all pollutants were higher among firefighters at prescribed burns than at wildfires, while shift-average smoke exposures were lowest among firefighters who performed initial attack of wildfires in the early stages of the fires. Smoke exposure reaches its highest levels among firefighters maintaining fire within designated firelines and performing direct attack of spot fires that cross firelines. These events and the associated smoke exposures were positively correlated with increasing ambient wind speeds, which hamper fire management and carry the convective plume of the fire into firefighters' breathing zone. The pollutants measured in smoke were reasonably well-correlated with each other, enabling estimation of exposure to multiple pollutants in smoke from measurements of a single pollutant such as carbon monoxide.
Polonsky, Jonathan; Ciglenecki, Iza; Bichet, Mathieu; Coldiron, Matthew; Thuambe Lwiyo, Enoch; Akonda, Innocent; Serafini, Micaela; Porten, Klaudia
2018-01-01
In 2013, a large measles epidemic occurred in the Aketi Health Zone of the Democratic Republic of Congo. We conducted a two-stage, retrospective cluster survey to estimate the attack rate, the case fatality rate, and the measles-specific mortality rate during the epidemic. 1424 households containing 7880 individuals were included. The estimated attack rate was 14.0%, (35.0% among children aged <5 years). The estimated case fatality rate was 4.2% (6.1% among children aged <5 years). Spatial analysis and linear regression showed that younger children, those who did not receive care, and those living farther away from Aketi Hospital early in the epidemic had a higher risk of measles related death. Vaccination coverage prior to the outbreak was low (76%), and a delayed reactive vaccination campaign contributed to the high attack rate. We provide evidences suggesting that a comprehensive case management approach reduced measles fatality during this epidemic in rural, inaccessible resource-poor setting. PMID:29538437
Gignoux, Etienne; Polonsky, Jonathan; Ciglenecki, Iza; Bichet, Mathieu; Coldiron, Matthew; Thuambe Lwiyo, Enoch; Akonda, Innocent; Serafini, Micaela; Porten, Klaudia
2018-01-01
In 2013, a large measles epidemic occurred in the Aketi Health Zone of the Democratic Republic of Congo. We conducted a two-stage, retrospective cluster survey to estimate the attack rate, the case fatality rate, and the measles-specific mortality rate during the epidemic. 1424 households containing 7880 individuals were included. The estimated attack rate was 14.0%, (35.0% among children aged <5 years). The estimated case fatality rate was 4.2% (6.1% among children aged <5 years). Spatial analysis and linear regression showed that younger children, those who did not receive care, and those living farther away from Aketi Hospital early in the epidemic had a higher risk of measles related death. Vaccination coverage prior to the outbreak was low (76%), and a delayed reactive vaccination campaign contributed to the high attack rate. We provide evidences suggesting that a comprehensive case management approach reduced measles fatality during this epidemic in rural, inaccessible resource-poor setting.
Cougar attacks on children: injury patterns and treatment.
Kadesky, K M; Manarey, C; Blair, G K; Murphy, J J; Verchere, C; Atkinson, K
1998-06-01
Cougar attacks on humans appear to be on the rise. A review of all attacks on children was performed to determine the method of attack and injury patterns so that a treatment regimen as well as possible preventative measures could be determined. A review of all attacks, including attacks on children, was performed, including three recent attacks treated at our institution. Situation, adult supervision, patient age, injuries recorded, survival, and mode of attack, if known, were reviewed. There were 50 documented attacks on children with a 25% fatality rate. Most children were not alone at the time of the attack (92%), and in many instances adult supervision was present or nearby. Severe head and neck lacerations along with puncture wounds were the most common injury. Examples of typical cervical injuries include a nonfatal vertebral artery injury, phrenic nerve injury, a fatal internal carotid artery injury, and a fatal cervical spine injury. The cougar was rabid in two cases. Pasteurella resulted in late infections in two patients. Based on the pattern of injuries, the authors recommend aggressive evaluation for occult cervical injuries as well as surgical debridement. Antibiotics should cover oropharyngeal flora including Pasteurella multocida. Rabies prophylaxis is indicated. Adult supervision in wilderness areas is not necessarily protective.
Application of thin-layer Navier-Stokes equations near maximum lift
NASA Technical Reports Server (NTRS)
Anderson, W. K.; Thomas, J. L.; Rumsey, C. L.
1984-01-01
The flowfield about a NACA 0012 airfoil at a Mach number of 0.3 and Reynolds number of 1 million is computed through an angle of attack range, up to 18 deg, corresponding to conditions up to and beyond the maximum lift coefficient. Results obtained using the compressible thin-layer Navier-Stokes equations are presented as well as results from the compressible Euler equations with and without a viscous coupling procedure. The applicability of each code is assessed and many thin-layer Navier-Stokes benchmark solutions are obtained which can be used for comparison with other codes intended for use at high angles of attack. Reasonable agreement of the Navier-Stokes code with experiment and the viscous-inviscid interaction code is obtained at moderate angles of attack. An unsteady solution is obtained with the thin-layer Navier-Stokes code at the highest angle of attack considered. The maximum lift coefficient is overpredicted, however, in comparison to experimental data, which is attributed to the presence of a laminar separation bubble near the leading edge not modeled in the computations. Two comparisons with experimental data are also presented at a higher Mach number.
Evaluation of electrolytic tilt sensors for measuring model angle of attack in wind tunnel tests
NASA Technical Reports Server (NTRS)
Wong, Douglas T.
1992-01-01
The results of a laboratory evaluation of electrolytic tilt sensors as potential candidates for measuring model attitude or angle of attack in wind tunnel tests are presented. The performance of eight electrolytic tilt sensors was compared with that of typical servo accelerometers used for angle-of-attack measurements. The areas evaluated included linearity, hysteresis, repeatability, temperature characteristics, roll-on-pitch interaction, sensitivity to lead-wire resistance, step response time, and rectification. Among the sensors being evaluated, the Spectron model RG-37 electrolytic tilt sensors have the highest overall accuracy in terms of linearity, hysteresis, repeatability, temperature sensitivity, and roll sensitivity. A comparison of the sensors with the servo accelerometers revealed that the accuracy of the RG-37 sensors was on the average about one order of magnitude worse. Even though a comparison indicates that the cost of each tilt sensor is about one-third the cost of each servo accelerometer, the sensors are considered unsuitable for angle-of-attack measurements. However, the potential exists for other applications such as wind tunnel wall-attitude measurements where the errors resulting from roll interaction, vibration, and response time are less and sensor temperature can be controlled.
Neria, Yuval; Wickramaratne, Priya; Olfson, Mark; Gameroff, Marc J; Pilowsky, Daniel J; Lantigua, Rafael; Shea, Steven; Weissman, Myrna M
2013-02-01
The magnitude of the September 11, 2001 (9/11) attacks was without precedent in the United States, but long-term longitudinal research on its health consequences for primary care patients is limited. We assessed the prevalence and exposure-related determinants of mental disorders, functioning, general medical conditions, and service utilization, 1 and 4 years after the 9/11 attacks, in an urban primary care cohort (N = 444) in Manhattan. Although the prevalence of posttraumatic stress disorder (PTSD) and levels of functional impairment declined over time, a substantial increase in suicidal ideation and missed work was observed. Most medical outcomes and service utilization indicators demonstrated a short-term increase after the 9/11 attacks (mean change of +20.3%), followed by a minor decrease in the subsequent year (mean change of -3.2%). Loss of a close person was associated with the highest risk for poor mental health and functional status over time. These findings highlight the importance of longitudinal assessments of mental, functional, and medical outcomes in urban populations exposed to mass trauma and terrorism. Copyright © 2013 International Society for Traumatic Stress Studies.
Network traffic anomaly prediction using Artificial Neural Network
NASA Astrophysics Data System (ADS)
Ciptaningtyas, Hening Titi; Fatichah, Chastine; Sabila, Altea
2017-03-01
As the excessive increase of internet usage, the malicious software (malware) has also increase significantly. Malware is software developed by hacker for illegal purpose(s), such as stealing data and identity, causing computer damage, or denying service to other user[1]. Malware which attack computer or server often triggers network traffic anomaly phenomena. Based on Sophos's report[2], Indonesia is the riskiest country of malware attack and it also has high network traffic anomaly. This research uses Artificial Neural Network (ANN) to predict network traffic anomaly based on malware attack in Indonesia which is recorded by Id-SIRTII/CC (Indonesia Security Incident Response Team on Internet Infrastructure/Coordination Center). The case study is the highest malware attack (SQL injection) which has happened in three consecutive years: 2012, 2013, and 2014[4]. The data series is preprocessed first, then the network traffic anomaly is predicted using Artificial Neural Network and using two weight update algorithms: Gradient Descent and Momentum. Error of prediction is calculated using Mean Squared Error (MSE) [7]. The experimental result shows that MSE for SQL Injection is 0.03856. So, this approach can be used to predict network traffic anomaly.
Drought predisposes piñon-juniper woodlands to insect attacks and mortality.
Gaylord, Monica L; Kolb, Thomas E; Pockman, William T; Plaut, Jennifer A; Yepez, Enrico A; Macalady, Alison K; Pangle, Robert E; McDowell, Nate G
2013-04-01
To test the hypothesis that drought predisposes trees to insect attacks, we quantified the effects of water availability on insect attacks, tree resistance mechanisms, and mortality of mature piñon pine (Pinus edulis) and one-seed juniper (Juniperus monosperma) using an experimental drought study in New Mexico, USA. The study had four replicated treatments (40 × 40 m plot/replicate): removal of 45% of ambient annual precipitation (H2 O-); irrigation to produce 125% of ambient annual precipitation (H2 O+); a drought control (C) to quantify the impact of the drought infrastructure; and ambient precipitation (A). Piñon began dying 1 yr after drought initiation, with higher mortality in the H2 O- treatment relative to other treatments. Beetles (bark/twig) were present in 92% of dead trees. Resin duct density and area were more strongly affected by treatments and more strongly associated with piñon mortality than direct measurements of resin flow. For juniper, treatments had no effect on insect resistance or attacks, but needle browning was highest in the H2 O- treatment. Our results provide strong evidence that ≥ 1 yr of severe drought predisposes piñon to insect attacks and increases mortality, whereas 3 yr of the same drought causes partial canopy loss in juniper. © 2013 The Authors. New Phytologist © 2013 New Phytologist Trust.
Brown, Lily A; LeBeau, Richard; Liao, Betty; Niles, Andrea N; Glenn, Daniel; Craske, Michelle G
2016-01-30
Panic attacks occurring outside of Panic Disorder are not well-understood despite their inclusion as a diagnostic specifier in the Diagnostic and Statistical Manual for Mental Disorders (DSM-5). This study compares panic attacks in the context of Panic Disorder compared to social anxiety in terms of their symptom frequency, severity, and clinical correlates. Participants (n=404) were interviewed using the Anxiety Disorders Interview Schedule (ADIS-IV-L; Brown et al., 1994), from which we analyzed interviewer ratings of panic attacks and panic attack symptoms, as well as other demographic and clinical characteristics. Panic attacks in the context of Panic Disorder were characterized by a greater number and severity of symptoms compared to panic attacks in the context of Social Anxiety Disorder, and were associated with a history of traumatization, inpatient psychiatric treatment, and benzodiazepine use. Social anxiety panic attacks were associated with reduced physical health concerns. Cognitive panic attack symptoms were more prevalent in Panic Disorder and were associated with a variety of poor clinical correlates. Panic attacks in the context of Panic Disorder are more severe than those in social anxiety, and this may be driven by cognitive disturbances during those attacks. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.
Evidence for maintenance of sex by pathogens in plants.
Busch, Jeremiah W; Neiman, Maurine; Koslow, Jennifer M
2004-11-01
The predominance of outcrossing despite the substantial transmission advantage of self-fertilization remains a paradox. Theory suggests that selection can favor outcrossing if it enables the production of offspring that are less susceptible to pathogen attack than offspring produced via self-fertilization. Thus, if pathogen pressure is contributing to the maintenance of outcrossing in plants, there may be a positive correlation between the number of pathogen species attacking plant species and the outcrossing rate of the plant species. We tested this hypothesis by examining the association between outcrossing rate and the number of fungal pathogen species that attack a large, taxonomically diverse set of seed plants. We show that plant species attacked by more fungal pathogen species have higher outcrossing rates than plants with fewer enemies. This relationship persists after correcting for study bias among natural and agricultural species of plants. We also accounted for the nested hierarchy of relationships among plant lineages by conducting phylogenetically independent contrasts (PICs) within genera and families that were adequately represented in our dataset. A meta-analysis of the correlation between pathogen and outcrossing PICs shows that there is a positive correlation between pathogen species number and outcrossing rates. This pattern is consistent with the hypothesis that pathogen-mediated selection may contribute to the maintenance of outcrossing in species of seed plants.
Story, Tyler J; Craske, Michelle G
2008-09-01
Participants with elevated anxiety sensitivity and a history of panic attacks were compared to a low anxiety comparison group with respect to physiological and subjective reactivity to false heart-rate feedback and reactivity to a priming procedure. Whereas accurate heart-rate feedback elicited minimal responses, participants across groups showed significant physiological and subjective responses to false feedback. High risk and low risk participants did not differ in heart-rate responses to false feedback, though panic attack frequency did predict physiological and subjective reactions to false feedback in the high risk group. Self-reported nonspecific anxiety was significantly higher in high risk female participants than in low risk female participants, while males did not different in general subjective anxiety. However, high risk participants reported more panic-specific symptoms during the false feedback task than low risk participants, regardless of the sex of the participant. Therefore, although the experimental paradigm appeared to trigger nonspecific anxiety in high risk female participants, panic attack symptoms in reaction to the task were specific to risk group, not sex, and consistent with hypotheses. Surprisingly, the priming procedure did not influence physiological or subjective responses to false feedback in either group. These results raise additional questions regarding the process and impact of interception in individuals with panic attacks, and suggest that false perception of internal changes may contribute to risk for panic disorder when exposed to believable cues.
Müller, Heinz
1989-01-01
During extensive field surveys in central and eastern Europe, 21 herbivorous root insect species were found on Centaurea maculosa ssp. rhenana Boreau, 12 species on C. diffusa Lam. and 11 species on C. vallesiaca Jordan, representing 12 families in 4 orders. The large geographic distribution (species-area function), the high number of Centaurea spp. present (host speciation rate), and the high apparency of the rosettes and the rich food resources offered by the roots during winter, together with their poor accessibility, correlate with the high number of specialist feeders associated with the roots of C. maculosa and C. diffusa. The members of the taxonomically diverse root entomofauna exploit specific structures of the tap root (food niches). Interspecific competition among members of food niches, as well as species-specific responses to different phenological stages (for oviposition) and tissues (for larval development) are thought to be responsible for the high predictability in guild structure. The relatively low levels of host plant attack (two thirds of the roots were unattacked) and the fact that food niches remained unoccupied in most of the regions suggest, however, that the majority of the studied guilds do not represent equilibrium assemblages. Ecological (different habitats), climatic (transitional zone) and historical (ancient pre-Pleistocene communities) factors could account for the highest values of species diversity, infestation levels, species packing and food niche utilization, which are found on C. maculosa in E. Austria/NW. Hungary, compared to other regions. A positive correlation between species packing (number of root-feeding species per population) and infestation rates (percent of roots attacked) was only found for the more stable, semi-natural habitats. A comparative analysis of the regional root insect guilds of C. maculosa with corresponding data for the phytophagous insects associated with the flower heads revealed distinct taxonomical differences, but a high degree of numerical and structural similarity. The different geographical regions are similarly ranked for host plant attack, herbivore pressure, average species packing and level of food niche utilization.
Yatomi, A; Iguchi, A; Uemura, K; Sakamoto, N; Iwase, S; Mano, T
1989-03-01
Muscle sympathetic nerve activity was recorded in a 57-year-old male patient suffering from severe hypotensive attacks with bradycardia for 10 years. Continuous blood pressure recording demonstrated frequent drastic falls in pressure. Disappearance and reappearance of muscle sympathetic nerve activity coincided with the onset and termination of attacks. Awakening from sleep or emotional and/or cardiovascular stress seems to trigger hypotension. Cardiac pacemaker was not useful in limiting the attack, because right ventricular pacing caused abrupt falls in both blood pressure and heart rate.
Pfaltz, Monique C; Michael, Tanja; Meyer, Andrea H; Wilhelm, Frank H
2013-08-01
Panic attacks are frequently perceived as life threatening. Panic disorder (PD) patients may therefore experience symptoms of posttraumatic stress disorder (PTSD). The authors explored this in 28 healthy controls, 17 PTSD patients, and 24 PD patients with agoraphobia who completed electronic diaries 36 times during 1 week. Patient groups frequently reported dissociation as well as thoughts, memories, and reliving of their trauma or panic attacks. PTSD patients reported more trauma/panic attack thoughts (incidence rate ratio [IRR] = 2.9) and memories (IRR = 2.8) than PD patients. Patient groups relived their trauma or panic attacks equally frequently, and reported comparable bodily reactions and distress associated with trauma or panic attack memories. Clinical groups avoided trauma or panic attack reminders more often than healthy controls (avoidance of trauma- or panic attack-related thoughts (IRR = 8.0); avoidance of things associated with the trauma or panic attack (IRR = 40.7). PD patients avoided trauma or panic attack reminders less often than PTSD patients (avoidance of trauma- or panic attack-related thoughts [IRR = 2.5]; avoidance of things associated with the trauma or panic attack [IRR = 4.1]), yet these differences were nonsignificant when controlling for functional impairment. In conclusion, trauma-like symptoms are common in PD with agoraphobia and panic attacks may be processed similarly as trauma in PTSD. Copyright © 2013 International Society for Traumatic Stress Studies.
False Positive and False Negative Effects on Network Attacks
NASA Astrophysics Data System (ADS)
Shang, Yilun
2018-01-01
Robustness against attacks serves as evidence for complex network structures and failure mechanisms that lie behind them. Most often, due to detection capability limitation or good disguises, attacks on networks are subject to false positives and false negatives, meaning that functional nodes may be falsely regarded as compromised by the attacker and vice versa. In this work, we initiate a study of false positive/negative effects on network robustness against three fundamental types of attack strategies, namely, random attacks (RA), localized attacks (LA), and targeted attack (TA). By developing a general mathematical framework based upon the percolation model, we investigate analytically and by numerical simulations of attack robustness with false positive/negative rate (FPR/FNR) on three benchmark models including Erdős-Rényi (ER) networks, random regular (RR) networks, and scale-free (SF) networks. We show that ER networks are equivalently robust against RA and LA only when FPR equals zero or the initial network is intact. We find several interesting crossovers in RR and SF networks when FPR is taken into consideration. By defining the cost of attack, we observe diminishing marginal attack efficiency for RA, LA, and TA. Our finding highlights the potential risk of underestimating or ignoring FPR in understanding attack robustness. The results may provide insights into ways of enhancing robustness of network architecture and improve the level of protection of critical infrastructures.
Bargali, Harendra; Gore, Kedar
2017-01-01
Sloth bears (Melursus ursinus) caused the highest number of human deaths between 2001 and 2015 and ranked second compared to other wild animals in causing human casualties in the Kanha-Pench corridor area. We studied the patterns of sloth bear attacks in the region to understand the reasons for conflict. We interviewed 166 victims of sloth bear attacks which occurred between 2004 and 2016 and found that most attacks occurred in forests (81%), with the greatest number of those (42%) occurring during the collection of Non-Timber Forest Produce (NTFP), 15% during the collection of fuelwood and 13% during grazing of livestock. The remainder took place at forest edges or in agricultural fields (19%), most occurring when person(s) were working in fields (7%), defecating (5%), or engaged in construction work (3%). Most victims were between the ages of 31 to 50 (57%) and most (54%) were members of the Gond tribe. The majority of attacks occurred in summer (40%) followed by monsoon (35%) and winter (25%). Forty-four percent of victims were rescued by people, while 43% of the time bears retreated by themselves. In 60% of attacks, a single bear was involved, whereas 25% involved adult females with dependent cubs and the remainder (15%) of the cases involved a pair of bears. We discuss the compensation program for attack victims as well as other governmental programs which can help reduce conflict. Finally, we recommend short-term mitigation measures for forest-dependent communities. PMID:28448565
Dhamorikar, Aniruddha H; Mehta, Prakash; Bargali, Harendra; Gore, Kedar
2017-01-01
Sloth bears (Melursus ursinus) caused the highest number of human deaths between 2001 and 2015 and ranked second compared to other wild animals in causing human casualties in the Kanha-Pench corridor area. We studied the patterns of sloth bear attacks in the region to understand the reasons for conflict. We interviewed 166 victims of sloth bear attacks which occurred between 2004 and 2016 and found that most attacks occurred in forests (81%), with the greatest number of those (42%) occurring during the collection of Non-Timber Forest Produce (NTFP), 15% during the collection of fuelwood and 13% during grazing of livestock. The remainder took place at forest edges or in agricultural fields (19%), most occurring when person(s) were working in fields (7%), defecating (5%), or engaged in construction work (3%). Most victims were between the ages of 31 to 50 (57%) and most (54%) were members of the Gond tribe. The majority of attacks occurred in summer (40%) followed by monsoon (35%) and winter (25%). Forty-four percent of victims were rescued by people, while 43% of the time bears retreated by themselves. In 60% of attacks, a single bear was involved, whereas 25% involved adult females with dependent cubs and the remainder (15%) of the cases involved a pair of bears. We discuss the compensation program for attack victims as well as other governmental programs which can help reduce conflict. Finally, we recommend short-term mitigation measures for forest-dependent communities.
NO PLIF Study of Hypersonic Transition Over a Discrete Hemispherical Roughness Element
NASA Technical Reports Server (NTRS)
Danehy, Paul M.; Bathel, Brett F.; Ivey, Christopher; Inman, Jennifer A.; Jones, Stephen B.
2009-01-01
Nitric oxide (NO) planar laser-induced fluorescence (PLIF) has been use to investigate the hypersonic flow over a flat plate with and without a 2-mm (0.08-in) radius hemispherical trip. In the absence of the trip, for all angles of attack and two different Reynolds numbers, the flow was observed to be laminar and mostly steady. Boundary layer thicknesses based on the observed PLIF intensity were measured and compared with a CFD computation, showing agreement. The PLIF boundary layer thickness remained constant while the NO flowrate was varied by a factor of 3, indicating non-perturbative seeding of NO. With the hemispherical trip in place, the flow was observed to be laminar but unsteady at the shallowest angle of attack and lowest Reynolds number and appeared vigorously turbulent at the steepest angle of attack and highest Reynolds number. Laminar corkscrew-shaped vortices oriented in the streamwise direction were frequently observed to transition the flow to more turbulent structures.
Distributed Secure Coordinated Control for Multiagent Systems Under Strategic Attacks.
Feng, Zhi; Wen, Guanghui; Hu, Guoqiang
2017-05-01
This paper studies a distributed secure consensus tracking control problem for multiagent systems subject to strategic cyber attacks modeled by a random Markov process. A hybrid stochastic secure control framework is established for designing a distributed secure control law such that mean-square exponential consensus tracking is achieved. A connectivity restoration mechanism is considered and the properties on attack frequency and attack length rate are investigated, respectively. Based on the solutions of an algebraic Riccati equation and an algebraic Riccati inequality, a procedure to select the control gains is provided and stability analysis is studied by using Lyapunov's method.. The effect of strategic attacks on discrete-time systems is also investigated. Finally, numerical examples are provided to illustrate the effectiveness of theoretical analysis.
ERIC Educational Resources Information Center
Hirst, William; Phelps, Elizabeth A.; Buckner, Randy L.; Budson, Andrew E.; Cuc, Alexandru; Gabrieli, John D. E.; Johnson, Marcia K.; Lustig, Cindy; Lyle, Keith B.; Mather, Mara; Meksin, Robert; Mitchell, Karen J.; Ochsner, Kevin N.; Schacter, Daniel L.; Simons, Jon S.; Vaidya, Chandan J.
2009-01-01
More than 3,000 individuals from 7 U.S. cities reported on their memories of learning of the terrorist attacks of September 11, as well as details about the attack, 1 week, 11 months, and/or 35 months after the assault. Some studies of flashbulb memories examining long-term retention show slowing in the rate of forgetting after a year, whereas…
Serial agonistic attacks by greylag goose families, Anser anser, against the same opponent
Scheiber, Isabella B.R.; Kotrschal, Kurt; Weiß, Brigitte M.
2011-01-01
It is known from primates that alliance partners may support each other’s interests in competition with others, for example, through repeated agonistic attacks against a particular individual. We examined serial aggressive interactions between greylag goose families and other flock members. We found that repeated attacks towards the same individual were common and that up to five serial attacks by family members followed an initial attack. Family size did not affect the frequency of such serial attacks. Juvenile geese evidently benefited most from active social support through serial attacks. About 60% of the juveniles’ lost primary interactions were subsequently reversed by another family member. This may be one of the reasons why juveniles rank higher in the social hierarchy than would be expected from their age and size alone. Losses in serial attacks predominantly occurred against other, presumably higher-ranking, family geese and ganders. We propose three major functions/consequences of serial attacks. Analogous to primates, serial attacks in greylag geese may serve to reinforce a losing experience of an opponent defeated in a preceding attack. On the side of the winning family, serial attacks may reinforce the experience of winning. Both winning and losing experiences are linked with physiological consequences in higher vertebrates, affecting the future social performance of winners or losers. Finally, serial attacks may signal the agonistic potential of a family to other flock members. This is supported by heart rate data, which indicate that greylags are competent to interpret third-party relationships. PMID:21984838
Khyâl attacks: a key idiom of distress among traumatized cambodia refugees.
Hinton, Devon E; Pich, Vuth; Marques, Luana; Nickerson, Angela; Pollack, Mark H
2010-06-01
Traumatized Cambodian refugees with PTSD often complain of khyâl attacks. The current study investigates khyâl attacks from multiple perspectives and examines the validity of a model of how khyâl attacks are generated. The study found that khyâl attacks had commonly been experienced in the previous 4 weeks and that their severity was strongly correlated with the severity of PTSD (PTSD Checklist). It was found that khyâl attacks were triggered by various processes--such as worry, trauma recall, standing up, going to a mall--and that khyâl attacks almost always met panic attack criteria. It was also found that during a khyâl attack there was great fear that death might occur from bodily dysfunction. It was likewise found that a complex nosology of khyâl attacks exists that rates the attacks on a scale of severity, that the severity determines how the khyâl attacks should be treated and that those treatments are often complex. As illustrated by the article, khyâl attacks constitute a key aspect of trauma ontology in this group, a culturally specific experiencing of anxiety and trauma-related disorder. The article also contributes to the study of trauma somatics, that is, to the study of how trauma results in specific symptoms in a specific cultural context, showing that a key part of the trauma-somatic reticulum is often a cultural syndrome.
Optimal Attack Strategies Subject to Detection Constraints Against Cyber-Physical Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chen, Yuan; Kar, Soummya; Moura, Jose M. F.
This paper studies an attacker against a cyberphysical system (CPS) whose goal is to move the state of a CPS to a target state while ensuring that his or her probability of being detected does not exceed a given bound. The attacker’s probability of being detected is related to the nonnegative bias induced by his or her attack on the CPS’s detection statistic. We formulate a linear quadratic cost function that captures the attacker’s control goal and establish constraints on the induced bias that reflect the attacker’s detection-avoidance objectives. When the attacker is constrained to be detected at the false-alarmmore » rate of the detector, we show that the optimal attack strategy reduces to a linear feedback of the attacker’s state estimate. In the case that the attacker’s bias is upper bounded by a positive constant, we provide two algorithms – an optimal algorithm and a sub-optimal, less computationally intensive algorithm – to find suitable attack sequences. Lastly, we illustrate our attack strategies in numerical examples based on a remotely-controlled helicopter under attack.« less
Optimal Attack Strategies Subject to Detection Constraints Against Cyber-Physical Systems
Chen, Yuan; Kar, Soummya; Moura, Jose M. F.
2017-03-31
This paper studies an attacker against a cyberphysical system (CPS) whose goal is to move the state of a CPS to a target state while ensuring that his or her probability of being detected does not exceed a given bound. The attacker’s probability of being detected is related to the nonnegative bias induced by his or her attack on the CPS’s detection statistic. We formulate a linear quadratic cost function that captures the attacker’s control goal and establish constraints on the induced bias that reflect the attacker’s detection-avoidance objectives. When the attacker is constrained to be detected at the false-alarmmore » rate of the detector, we show that the optimal attack strategy reduces to a linear feedback of the attacker’s state estimate. In the case that the attacker’s bias is upper bounded by a positive constant, we provide two algorithms – an optimal algorithm and a sub-optimal, less computationally intensive algorithm – to find suitable attack sequences. Lastly, we illustrate our attack strategies in numerical examples based on a remotely-controlled helicopter under attack.« less
NASA Astrophysics Data System (ADS)
Ko, Heasin; Lim, Kyongchun; Oh, Junsang; Rhee, June-Koo Kevin
2016-10-01
Quantum channel loopholes due to imperfect implementations of practical devices expose quantum key distribution (QKD) systems to potential eavesdropping attacks. Even though QKD systems are implemented with optical devices that are highly selective on spectral characteristics, information theory-based analysis about a pertinent attack strategy built with a reasonable framework exploiting it has never been clarified. This paper proposes a new type of trojan horse attack called hidden pulse attack that can be applied in a plug-and-play QKD system, using general and optimal attack strategies that can extract quantum information from phase-disturbed quantum states of eavesdropper's hidden pulses. It exploits spectral characteristics of a photodiode used in a plug-and-play QKD system in order to probe modulation states of photon qubits. We analyze the security performance of the decoy-state BB84 QKD system under the optimal hidden pulse attack model that shows enormous performance degradation in terms of both secret key rate and transmission distance.
Correlates of nest-defense behavior of common terns
Erwin, R.M.
1988-01-01
Nest-defense behavior was studied at seven Common Tern (Sterna hirundo) colonies in southern coastal New Jersey during June and July 1981. Data were collected weekly on numbers of adults, nests, eggs, and young in relation to the frequency and intensity of dive attacks on a human intruder by nesting terns. I explored the relationships between attack behavior and colony size/density, seasonality, and brood survival. The results provide little support for social facilitation since neither colony size (range 30-250 nests) nor density was related to mean attack frequency; however, in larger colonies, fewer birds participated in dive attacks. Although the intensity of attacks was strongly seasonal, patterns were very different among colonies and peak attack rates did not always coincide with peak hatching periods. Defense levels declined late in the season in most colonies regardless of whether brood survival was high or low. Colonies with individuals that attacked early in the season had higher overall nesting success than in colonies where individuals showed little early season aggression.
Brown, K M; Middaugh, S J; Haythornthwaite, J A; Bielory, L
2001-04-01
It was expected that stress and anxiety would be related to Raynaud's phenomenon (RP) attack characteristics when mild outdoor temperatures produced partial or no digital vasoconstriction. Hypotheses were that in warmer temperature categories, compared to those below 40 degrees F, higher stress or anxiety would be associated with more frequent, severe, and painful attacks. The Raynaud's Treatment Study recruited 313 participants with primary RP. Outcomes were attack rate, severity, and pain. Predictors were average daily outdoor temperature, stress, anxiety, age, gender, and a stress-by-temperature or an anxiety-by-temperature interaction. Outcomes were tested separately in multiple linear regression models. Stress and anxiety were tested in separate models. Stress was not a significant predictor of RP attack characteristics. Higher anxiety was related to more frequent attacks above 60 degrees F. It was also related to greater attack severity at all temperatures, and to greater pain above 60 degrees F and between 40 degrees and 49.9 degrees F.
NASA Technical Reports Server (NTRS)
Gray, Vernon H.
1958-01-01
An empirical relation has been obtained by which the change in drag coefficient caused by ice formations on an unswept NACA 65AO04 airfoil section can be determined from the following icing and operating conditions: icing time, airspeed, air total temperature, liquid-water content, cloud droplet impingement efficiencies, airfoil chord length, and angles of attack. The correlation was obtained by use of measured ice heights and ice angles. These measurements were obtained from a variety of ice formations, which were carefully photographed, cross-sectioned, and weighed. Ice weights increased at a constant rate with icing time in a rime icing condition and at progressively increasing rates in glaze icing conditions. Initial rates of ice collection agreed reasonably well with values predicted from droplet impingement data. Experimental droplet impingement rates obtained on this airfoil section agreed with previous theoretical calculations for angles of attack of 40 or less. Disagreement at higher angles of attack was attributed to flow separation from the upper surface of the experimental airfoil model.
A School-Wide Attack on Reading Problems
ERIC Educational Resources Information Center
Shuman, R. Baird
2006-01-01
The teaching of reading has come to be regarded as one of the highest priority areas in modern education because schools have been failing to teach reading effectively to large numbers of students who progress to secondary school without having achieved a working competency in this basic skill. Much of the burden of reading instruction has fallen…
Rotation Rate Sensing via Magnetostatic Surface Wave Propagation on a Thick Yig Ring.
1979-12-03
Introduction . . . . . . . . . . . 1 Background . . . . . . . . I Statement of the Problem. o o . 4 Plan of Attack. o. . o o o • 4 Sequence of...crystal growth process. It was subsequently suggested that the thin film disfiguration problem could be avoided by ma- chining the desired ring...sensor provide any practical advantages that would make it a better choice over current rate sensing schemes? Plan of Attack This thesis concerns itself
Meningococcal disease. Secondary attack rate and chemoprophylaxis in the United States, 1974.
1976-01-19
Three hundred twenty-six reported cases of meningococcal disease in the United States from November 1973 through March 1974 were investigated. Three household members became ill with meningococcal disease following onset of the initial case in their household. The secondary attack rate was approximately 3/1,000 household members. In 60% of the households, members were given an antimicrobial drug as chemoprophylaxis for meningococcal disease, but only 35% received minocycline hydrochloride or rifampin, the two drugs now available for the eradication of sulfonamide-resistant meningococci from the nasopharynx. Only 26% given chemoprophylaxis received the drug within 24 hours after the patient's hospital admission. Survey results indicate that the secondary attack rate of meningococcal disease may justify the use of chemoprophylaxis, but that frequently in the United States, the drugs given are likely to be ineffective, give too late, or administered to persons who are not at high risk to meningococcal disease.
Ponderosa pine resin defenses and growth: metrics matter.
Hood, Sharon; Sala, Anna
2015-11-01
Bark beetles (Coleoptera: Curculionidae, Scolytinae) cause widespread tree mortality in coniferous forests worldwide. Constitutive and induced host defenses are important factors in an individual tree's ability to survive an attack and in bottom-up regulation of bark beetle population dynamics, yet quantifying defense levels is often difficult. For example, in Pinus spp., resin flow is important for resistance to bark beetles but is extremely variable among individuals and within a season. While resin is produced and stored in resin ducts, the specific resin duct metrics that best correlate with resin flow remain unclear. The ability and timing of some pine species to produce induced resin is also not well understood. We investigated (i) the relationships between ponderosa pine (Pinus ponderosa Lawson & C. Lawson) resin flow and axial resin duct characteristics, tree growth and physiological variables, and (ii) if mechanical wounding induces ponderosa pine resin flow and resin ducts in the absence of bark beetles. Resin flow increased later in the growing season under moderate water stress and was highest in faster growing trees. The best predictors of resin flow were nonstandardized measures of resin ducts, resin duct size and total resin duct area, both of which increased with tree growth. However, while faster growing trees tended to produce more resin, models of resin flow using only tree growth were not statistically significant. Further, the standardized measures of resin ducts, density and duct area relative to xylem area, decreased with tree growth rate, indicating that slower growing trees invested more in resin duct defenses per unit area of radial growth, despite a tendency to produce less resin overall. We also found that mechanical wounding induced ponderosa pine defenses, but this response was slow. Resin flow increased after 28 days, and resin duct production did not increase until the following year. These slow induced responses may allow unsuccessfully attacked or wounded trees to resist future bark beetle attacks. Forest management that encourages healthy, vigorously growing trees will also favor larger resin ducts, thereby conferring increased constitutive resistance to bark beetle attacks. © The Author 2015. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.
Tseng, Hui-Yun; Lin, Chung-Ping; Hsu, Jung-Ya; Pike, David A.; Huang, Wen-San
2014-01-01
Conspicuous colouration can evolve as a primary defence mechanism that advertises unprofitability and discourages predatory attacks. Geographic overlap is a primary determinant of whether individual predators encounter, and thus learn to avoid, such aposematic prey. We experimentally tested whether the conspicuous colouration displayed by Old World pachyrhynchid weevils (Pachyrhynchus tobafolius and Kashotonus multipunctatus) deters predation by visual predators (Swinhoe’s tree lizard; Agamidae, Japalura swinhonis). During staged encounters, sympatric lizards attacked weevils without conspicuous patterns at higher rates than weevils with intact conspicuous patterns, whereas allopatric lizards attacked weevils with intact patterns at higher rates than sympatric lizards. Sympatric lizards also attacked masked weevils at lower rates, suggesting that other attributes of the weevils (size/shape/smell) also facilitate recognition. Allopatric lizards rapidly learned to avoid weevils after only a single encounter, and maintained aversive behaviours for more than three weeks. The imperfect ability of visual predators to recognize potential prey as unpalatable, both in the presence and absence of the aposematic signal, may help explain how diverse forms of mimicry exploit the predator’s visual system to deter predation. PMID:24614681
Spatial variability in oviposition damage by periodical cicadas in a fragmented landscape.
Cook, William M; Holt, Robert D; Yao, Jin
2001-03-01
Effects of the periodical cicada (Magicicada spp.) on forest dynamics are poorly documented. A 1998 emergence of M. cassini in eastern Kansas led to colonization of a fragmented experimental landscape undergoing secondary succession. We hypothesized that per-tree rates of oviposition damage by cicadas would reflect: (1) distance from the source of the emergence, (2) patch size, and (3) local tree density. Ovipositing females displayed clear preferences for host species and damage incidence showed predictable spatial patterns. Two species (smooth sumac, Rhus glabra, and eastern red cedar, Juniperus virginiana) were rarely attacked, whereas others (rough-leaved dogwood, Cornus drummondii; slippery elm, Ulmus rubra; box elder, Acer negundo, and honey locust, Gleditsia triacanthos) were strongly attacked. The dominant early successional tree, dogwood, received on average the most attacks. As predicted, attacks per stem declined strongly with distance from the emergence source, and with local stem density (a "dilution" effect). Contrary to expectations, there were more attacks per stem on larger patches. Because ovipositing cicadas cut damaging slits in host tree branches, potentially affecting tree growth rate, competitive ability, and capacity to reproduce, cicada damage could potentially influence spatial variation in secondary succession.
Cerebral correlates of heart rate variations during a spontaneous panic attack in the fMRI scanner.
Spiegelhalder, Kai; Hornyak, Magdolna; Kyle, Simon David; Paul, Dominik; Blechert, Jens; Seifritz, Erich; Hennig, Jürgen; Tebartz van Elst, Ludger; Riemann, Dieter; Feige, Bernd
2009-12-01
We report the first published case study of a suddenly occurring panic attack in a patient with no prior history of panic disorder during combined functional magnetic resonance imaging (fMRI, 1.5 Tesla) and electrocardiogram (ECG) recording. The single case was a 46-year-old woman who developed a panic attack near the planned end of the fMRI acquisition session, which therefore had to be aborted. Correlational analysis of heart rate fluctuations and fMRI data revealed a significant negative association in the left middle temporal gyrus. Additionally, regions-of-interest (ROI) analyses indicated significant positive associations in the left amygdala, and trends towards significance in the right amygdala and left insula.
Atomistic Origin of Deformation Twinning in Biomineral Aragonite.
Liu, Jialin; Huang, Zaiwang; Pan, Zhiliang; Wei, Qiuming; Li, Xiaodong; Qi, Yue
2017-03-10
Deformation twinning rarely occurs in mineral materials which typically show brittle fracture. Surprisingly, it has recently been observed in the biomineral aragonite phase in nacre under high rate impact loading. In this Letter, the twinning tendency and the competition between fracture and deformation twinning were revealed by first principles calculations. The ratio of the unstable stacking fault energy and the stacking fault energy in orthorhombic aragonite is hitherto the highest in a broad range of metallic and oxide materials. The underlining physics for this high ratio is the multineighbor shared ionic bonds and the unique relaxation process during sliding in the aragonite structure. Overall, the unique deformation twining along with other highly coordinated deformation mechanisms synergistically work in the hierarchical structure of nacre, leading to the remarkable strengthening and toughening of nacre upon dynamic loading, and thus protecting the mother-of-pearl from predatory attacks.
Plasmid and surface antigen markers of endemic and epidemic Legionella pneumophila strains.
Brown, A; Vickers, R M; Elder, E M; Lema, M; Garrity, G M
1982-01-01
Environmental and clinical isolates of Legionella pneumophila obtained from the Pittsburgh Veterans Administration Medical Center were studied for the presence of plasmids and for unique surface antigens. The majority of environmental isolates contained a single 80-megadalton plasmid. After an epidemic of nosocomial Legionnaires disease subsided in the Spring of 1981, plasmid-bearing environmental isolates persisted in the environment. Whereas L. pneumophila could not be reisolated from most sites with plasmidless isolates. During this epidemic the attack rate was highest on wards with plasmidless isolates. All clinical isolates were plasmidless. Strains were serotyped by the indirect immunofluorescence method with serum from a single immunized rat which was used both without absorption and after absorption with various plasmid-bearing and plasmidless isolates. These studies suggested that a plasmid-associated surface antigen was present and that the most common plasmidless environmental serotype was similar to the epidemic clinical serotype. Images PMID:7119096
[Anesthesia in patients with anorexia nervosa and bulimia nervosa].
Zenker, J; Hagenah, U; Rossaint, R
2010-03-01
Eating disorders are typical diseases of adolescence and early adulthood. About 1-3% of female juveniles suffer from anorexia nervosa (AN) or bulimia nervosa (BN). Today AN is still the psychiatric disease with the highest mortality rate. The peri-operative mortality rate of patients suffering from AN is in the range up to 15%. The beginning of AN is a lingering process and the majority of patients show increasingly restrictive eating habits ending in cachexia. Patients are obsessed by the predominant idea of being obese in spite of having a significant underweight. Patients suffering from bulimia break the strict regimen by eating enormous amounts of high calorie food. Such eating attacks are followed by weight reducing measures, mostly vomiting. Most of the physical changes caused by AN are due to starvation and loss of weight. The most significant medical complications are alterations of the cardiovascular system accompanied by decreasing contractility of the heart, bradycardia, electrocardiographic changes as well as disequilibrium of electrolytic and water balance. Most of these symptoms can be reversed by putting on weight.
A likelihood ratio anomaly detector for identifying within-perimeter computer network attacks
DOE Office of Scientific and Technical Information (OSTI.GOV)
Grana, Justin; Wolpert, David; Neil, Joshua
The rapid detection of attackers within firewalls of enterprise computer networks is of paramount importance. Anomaly detectors address this problem by quantifying deviations from baseline statistical models of normal network behavior and signaling an intrusion when the observed data deviates significantly from the baseline model. But, many anomaly detectors do not take into account plausible attacker behavior. As a result, anomaly detectors are prone to a large number of false positives due to unusual but benign activity. Our paper first introduces a stochastic model of attacker behavior which is motivated by real world attacker traversal. Then, we develop a likelihoodmore » ratio detector that compares the probability of observed network behavior under normal conditions against the case when an attacker has possibly compromised a subset of hosts within the network. Since the likelihood ratio detector requires integrating over the time each host becomes compromised, we illustrate how to use Monte Carlo methods to compute the requisite integral. We then present Receiver Operating Characteristic (ROC) curves for various network parameterizations that show for any rate of true positives, the rate of false positives for the likelihood ratio detector is no higher than that of a simple anomaly detector and is often lower. Finally, we demonstrate the superiority of the proposed likelihood ratio detector when the network topologies and parameterizations are extracted from real-world networks.« less
Effect of noninvasive vagus nerve stimulation on acute migraine: an open-label pilot study.
Goadsby, P J; Grosberg, B M; Mauskop, A; Cady, R; Simmons, K A
2014-10-01
We sought to assess a novel, noninvasive, portable vagal nerve stimulator (nVNS) for acute treatment of migraine. Participants with migraine with or without aura were eligible for an open-label, single-arm, multiple-attack study. Up to four migraine attacks were treated with two 90-second doses, at 15-minute intervals delivered to the right cervical branch of the vagus nerve within a six-week time period. Subjects were asked to self-treat at moderate or severe pain, or after 20 minutes of mild pain. Of 30 enrolled patients (25 females, five males, median age 39), two treated no attacks, and one treated aura only, leaving a Full Analysis Set of 27 treating 80 attacks with pain. An adverse event was reported in 13 patients, notably: neck twitching (n = 1), raspy voice (n = 1) and redness at the device site (n = 1). No unanticipated, serious or severe adverse events were reported. The pain-free rate at two hours was four of 19 (21%) for the first treated attack with a moderate or severe headache at baseline. For all moderate or severe attacks at baseline, the pain-free rate was 12/54 (22%). nVNS may be an effective and well-tolerated acute treatment for migraine in certain patients. © International Headache Society 2014 Reprints and permissions: sagepub.co.uk/journalsPermissions.nav.
A likelihood ratio anomaly detector for identifying within-perimeter computer network attacks
Grana, Justin; Wolpert, David; Neil, Joshua; ...
2016-03-11
The rapid detection of attackers within firewalls of enterprise computer networks is of paramount importance. Anomaly detectors address this problem by quantifying deviations from baseline statistical models of normal network behavior and signaling an intrusion when the observed data deviates significantly from the baseline model. But, many anomaly detectors do not take into account plausible attacker behavior. As a result, anomaly detectors are prone to a large number of false positives due to unusual but benign activity. Our paper first introduces a stochastic model of attacker behavior which is motivated by real world attacker traversal. Then, we develop a likelihoodmore » ratio detector that compares the probability of observed network behavior under normal conditions against the case when an attacker has possibly compromised a subset of hosts within the network. Since the likelihood ratio detector requires integrating over the time each host becomes compromised, we illustrate how to use Monte Carlo methods to compute the requisite integral. We then present Receiver Operating Characteristic (ROC) curves for various network parameterizations that show for any rate of true positives, the rate of false positives for the likelihood ratio detector is no higher than that of a simple anomaly detector and is often lower. Finally, we demonstrate the superiority of the proposed likelihood ratio detector when the network topologies and parameterizations are extracted from real-world networks.« less
Facelock: familiarity-based graphical authentication.
Jenkins, Rob; McLachlan, Jane L; Renaud, Karen
2014-01-01
Authentication codes such as passwords and PIN numbers are widely used to control access to resources. One major drawback of these codes is that they are difficult to remember. Account holders are often faced with a choice between forgetting a code, which can be inconvenient, or writing it down, which compromises security. In two studies, we test a new knowledge-based authentication method that does not impose memory load on the user. Psychological research on face recognition has revealed an important distinction between familiar and unfamiliar face perception: When a face is familiar to the observer, it can be identified across a wide range of images. However, when the face is unfamiliar, generalisation across images is poor. This contrast can be used as the basis for a personalised 'facelock', in which authentication succeeds or fails based on image-invariant recognition of faces that are familiar to the account holder. In Study 1, account holders authenticated easily by detecting familiar targets among other faces (97.5% success rate), even after a one-year delay (86.1% success rate). Zero-acquaintance attackers were reduced to guessing (<1% success rate). Even personal attackers who knew the account holder well were rarely able to authenticate (6.6% success rate). In Study 2, we found that shoulder-surfing attacks by strangers could be defeated by presenting different photos of the same target faces in observed and attacked grids (1.9% success rate). Our findings suggest that the contrast between familiar and unfamiliar face recognition may be useful for developers of graphical authentication systems.
Effectiveness of previous mumps vaccination during a summer camp outbreak.
Schaffzin, Joshua K; Pollock, Lynn; Schulte, Cynthia; Henry, Kyle; Dayan, Gustavo; Blog, Debra; Smith, Perry
2007-10-01
Mumps is a vaccine-preventable disease that may cause outbreaks. In July 2005, an outbreak of mumps occurred during a children's summer camp in upstate New York. An investigation was initiated to describe the cases and evaluate vaccine effectiveness. A retrospective cohort study was conducted among 541 children from the United States and abroad who attended a 1- or 2-month overnight summer camp. Patients with mumps were interviewed; serologic analysis was conducted for 6 case patients. Vaccine effectiveness was calculated by retrospective review of immunization records for 507 attendees who were eligible for vaccination and had verified immunization history. Thirty-one camp attendees were identified as having mumps (attack rate: 5.7%); 5 (83%) of 6 patients tested had positivity for mumps immunoglobulin M. Of the 507 participants (including 29 patients) with available immunization history, 440 (including 16 [87%] patients) were 2-dose recipients of mumps vaccine (attack rate: 3.6%); 46 participants (including 4 [9%] patients) were 1-dose recipients (attack rate: 8.7%); and 21 (including 9 [4%] patients) were unvaccinated (attack rate: 42.9%). Vaccine effectiveness was 92% for 2 doses and 80% for 1 dose. Outbreaks of mumps in settings such as summer camps can occur despite high vaccination rates. Vaccine effectiveness for 2 mumps vaccinations was greater than vaccine effectiveness for 1 mumps vaccination. Therefore, recommendation of 2 mumps vaccinations for summer camp participants continues to be appropriate. Control of mumps disease relies on broad vaccination coupled with correct clinical diagnosis and strict control measures.
Suryapranata, F S T; Prins, M; Sonder, G J B
2016-12-01
Typhoid fever mainly occurs in (sub) tropical regions where sanitary conditions remain poor. In other regions it occurs mainly among returning travelers or their direct contacts. The aim of this study was to evaluate the current Dutch guidelines for typhoid vaccination. Crude annual attack rates (AR) per 100,000 Dutch travelers were calculated during the period 1997 to 2014 by dividing the number of typhoid fever cases by the estimated total number of travelers to a specific country or region. Regions of exposure and possible risk factors were evaluated. During the study period 607 cases of typhoid fever were reported. Most cases were imported from Asia (60%). Almost half of the cases were ethnically related to typhoid risk regions and 37% were cases visiting friends and relatives. The overall ARs for travelers to all regions declined significantly. Countries with the highest ARs were India (29 per 100,000), Indonesia (8 per 100,000), and Morocco (10 per 100,000). There was a significant decline in ARs among travelers to popular travel destinations such as Morocco, Turkey, and Indonesia. ARs among travelers to intermediate-risk areas according to the Dutch guidelines such as Latin America or Sub-Saharan Africa remained very low, despite the restricted vaccination policy for these areas compared to many other guidelines. The overall AR of typhoid fever among travelers returning to the Netherlands is very low and has declined in the past 20 years. The Dutch vaccination policy not to vaccinate short-term travelers to Latin-America, Sub-Saharan Africa, Thailand and Malaysia seems to be justified, because the ARs for these destinations remain very low. These results suggest that further restriction of the Dutch vaccination policy is justified.
Modeling inter-signal arrival times for accurate detection of CAN bus signal injection attacks
DOE Office of Scientific and Technical Information (OSTI.GOV)
Moore, Michael Roy; Bridges, Robert A; Combs, Frank L
Modern vehicles rely on hundreds of on-board electronic control units (ECUs) communicating over in-vehicle networks. As external interfaces to the car control networks (such as the on-board diagnostic (OBD) port, auxiliary media ports, etc.) become common, and vehicle-to-vehicle / vehicle-to-infrastructure technology is in the near future, the attack surface for vehicles grows, exposing control networks to potentially life-critical attacks. This paper addresses the need for securing the CAN bus by detecting anomalous traffic patterns via unusual refresh rates of certain commands. While previous works have identified signal frequency as an important feature for CAN bus intrusion detection, this paper providesmore » the first such algorithm with experiments on five attack scenarios. Our data-driven anomaly detection algorithm requires only five seconds of training time (on normal data) and achieves true positive / false discovery rates of 0.9998/0.00298, respectively (micro-averaged across the five experimental tests).« less
Daysal, N Meltem
2012-07-01
In this paper, I examine the impact of uninsured patients on the in-hospital mortality rate of insured heart attack patients. I employ panel data models using patient discharge and hospital financial data from California (1999-2006). My results indicate that uninsured patients have an economically significant effect that increases the mortality rate of insured heart attack patients. I show that these results are not driven by alternative explanations, including reverse causality, patient composition effects, sample selection or unobserved trends and that they are robust to a host of specification checks. The primary channel for the observed spillover effects is increased hospital uncompensated care costs. Although data limitations constrain my capacity to check how hospitals change their provision of care to insured heart attack patients in response to reduced revenues, the evidence I have suggests a modest increase in the quantity of cardiac services without a corresponding increase in hospital staff. Copyright © 2012 Elsevier B.V. All rights reserved.
Using the Domain Name System to Thwart Automated Client-Based Attacks
DOE Office of Scientific and Technical Information (OSTI.GOV)
Taylor, Curtis R; Shue, Craig A
2011-09-01
On the Internet, attackers can compromise systems owned by other people and then use these systems to launch attacks automatically. When attacks such as phishing or SQL injections are successful, they can have negative consequences including server downtime and the loss of sensitive information. Current methods to prevent such attacks are limited in that they are application-specific, or fail to block attackers. Phishing attempts can be stopped with email filters, but if the attacker manages to successfully bypass these filters, then the user must determine if the email is legitimate or not. Unfortunately, they often are unable to do so.more » Since attackers have a low success rate, they attempt to compensate for it in volume. In order to have this high throughput, attackers take shortcuts and break protocols. We use this knowledge to address these issues by implementing a system that can detect malicious activity and use it to block attacks. If the client fails to follow proper procedure, they can be classified as an attacker. Once an attacker has been discovered, they will be isolated and monitored. This can be accomplished using existing software in Ubuntu Linux applications, along with our custom wrapper application. After running the system and seeing its performance on three popular Web browsers Chromium, Firefox and Internet Explorer as well as two popular email clients, Thunderbird and Evolution, we found that not only is this system conceivable, it is effective and has low overhead.« less
NASA Astrophysics Data System (ADS)
McClure, Melanie; Despland, Emma
2011-05-01
Gregariousness in animals is widely accepted as a behavioral adaptation for protection from predation. However, predation risk and the effectiveness of a prey's defense can be a function of several other factors, including predator species and prey size or age. The objective of this study was to determine if the gregarious habit of Malacosoma disstria caterpillars is advantageous against invertebrate natural enemies, and whether it is through dilution or cooperative defenses. We also examined the effects of larval growth and group size on the rate and success of attacks. Caterpillars of M. disstria responded with predator-specific behaviors, which led to increased survival. Evasive behaviors were used against stinkbugs, while thrashing by fourth instar caterpillars and holding on to the silk mat by second instar caterpillars was most efficient against spider attacks. Collective head flicking and biting by groups of both second and fourth instar caterpillars were observed when attacked by parasitoids. Increased larval size decreased the average number of attacks by spiders but increased the number of attacks by both stinkbugs and parasitoids. However, increased body size decreased the success rate of attacks by all three natural enemies and increased handling time for both predators. Larger group sizes did not influence the number of attacks from predators but increased the number of attacks and the number of successful attacks from parasitoids. In all cases, individual risk was lower in larger groups. Caterpillars showed collective defenses against parasitoids but not against the walking predators. These results show that caterpillars use different tactics against different natural enemies. Overall, these tactics are both more diverse and more effective in fourth instar than in second instar caterpillars, confirming that growth reduces predation risk. We also show that grouping benefits caterpillars through dilution of risk, and, in the case of parasitoids, through group defenses. The decreased tendency to aggregate in the last larval instar may therefore be linked to decreasing predation risk.
Lerch, Andrew P.; Pfammatter, Jesse A.
2016-01-01
Fire injury can increase tree susceptibility to some bark beetles (Curculionidae, Scolytinae), but whether wildfires can trigger outbreaks of species such as mountain pine beetle (Dendroctonus ponderosae Hopkins) is not well understood. We monitored 1173 lodgepole (Pinus contorta var. latifolia Doug.) and 599 ponderosa (Pinus ponderosa Doug. ex Law) pines for three years post-wildfire in the Uinta Mountains of northeastern Utah in an area with locally endemic mountain pine beetle. We examined how the degree and type of fire injury influenced beetle attacks, brood production, and subsequent tree mortality, and related these to beetle population changes over time. Mountain pine beetle population levels were high the first two post-fire years in lodgepole pine, and then declined. In ponderosa pine, populations declined each year after initial post-fire sampling. Compared to trees with strip or failed attacks, mass attacks occurred on trees with greater fire injury, in both species. Overall, a higher degree of damage to crowns and boles was associated with higher attack rates in ponderosa pines, but additional injury was more likely to decrease attack rates in lodgepole pines. In lodgepole pine, attacks were initially concentrated on fire-injured trees, but during subsequent years beetles attacked substantial numbers of uninjured trees. In ponderosa pine, attacks were primarily on injured trees each year, although these stands were more heavily burned and had few uninjured trees. In total, 46% of all lodgepole and 56% of ponderosa pines underwent some degree of attack. Adult brood emergence within caged bole sections decreased with increasing bole char in lodgepole pine but increased in ponderosa pine, however these relationships did not scale to whole trees. Mountain pine beetle populations in both tree species four years post-fire were substantially lower than the year after fire, and wildfire did not result in population outbreaks. PMID:27783632
Lerch, Andrew P; Pfammatter, Jesse A; Bentz, Barbara J; Raffa, Kenneth F
2016-01-01
Fire injury can increase tree susceptibility to some bark beetles (Curculionidae, Scolytinae), but whether wildfires can trigger outbreaks of species such as mountain pine beetle (Dendroctonus ponderosae Hopkins) is not well understood. We monitored 1173 lodgepole (Pinus contorta var. latifolia Doug.) and 599 ponderosa (Pinus ponderosa Doug. ex Law) pines for three years post-wildfire in the Uinta Mountains of northeastern Utah in an area with locally endemic mountain pine beetle. We examined how the degree and type of fire injury influenced beetle attacks, brood production, and subsequent tree mortality, and related these to beetle population changes over time. Mountain pine beetle population levels were high the first two post-fire years in lodgepole pine, and then declined. In ponderosa pine, populations declined each year after initial post-fire sampling. Compared to trees with strip or failed attacks, mass attacks occurred on trees with greater fire injury, in both species. Overall, a higher degree of damage to crowns and boles was associated with higher attack rates in ponderosa pines, but additional injury was more likely to decrease attack rates in lodgepole pines. In lodgepole pine, attacks were initially concentrated on fire-injured trees, but during subsequent years beetles attacked substantial numbers of uninjured trees. In ponderosa pine, attacks were primarily on injured trees each year, although these stands were more heavily burned and had few uninjured trees. In total, 46% of all lodgepole and 56% of ponderosa pines underwent some degree of attack. Adult brood emergence within caged bole sections decreased with increasing bole char in lodgepole pine but increased in ponderosa pine, however these relationships did not scale to whole trees. Mountain pine beetle populations in both tree species four years post-fire were substantially lower than the year after fire, and wildfire did not result in population outbreaks.
Estimating the annual number of strokes and the issue of imperfect data: an example from Australia.
Cadilhac, Dominique A; Vos, Theo; Thrift, Amanda G
2014-01-01
Estimates of strokes in Australia are typically obtained using 1996-1997 age-specific attack rates from the pilot North East Melbourne Stroke Incidence (NEMESIS) Study (eight postcode regions). Declining hospitalizations for stroke indicate the potential to overestimate cases. To illustrate how current methods may potentially overestimate the number of strokes in Australia. Hospital separations data (primary discharge ICD10 codes I60 to I64) and three stroke projection models were compared. Each model had age- and gender-specific attack rates from the NEMESIS study applied to the 2003 population. One model used the 2003 Burden of Disease approach where the ratio of the 1996-1997 NEMESIS study incidence to hospital separation rate in the same year was adjusted by the 2002/2003 hospital separation rate within the same geographic region using relevant ICD-primary diagnosis codes. Hospital separations data were inflated by 12·1% to account for nonhospitalized stroke, while the Burden of Disease model was inflated by 27·6% to account for recurrent stroke events in that year. The third model used 1997-1999 attack rates from the larger 22-postcode NEMESIS study region. In 2003, Australian hospitalizations for stroke (I60 to I64) were 33,022, and extrapolation to all stroke (hospitalized and nonhospitalized) was 37,568. Applying NEMESIS study attack rates to the 2003 Australian population, 50,731 strokes were projected. Fewer cases for 2003 were estimated with the Burden of Disease model (28,364) and 22-postcode NEMESIS study rates (41,332). Estimating the number of strokes in a country can be highly variable depending on the recency of data, the type of data available, and the methods used. © 2013 The Authors. International Journal of Stroke © 2013 World Stroke Organization.
Magnus effects on spinning transonic missiles
NASA Technical Reports Server (NTRS)
Seginer, A.; Rosenwasser, I.
1983-01-01
Magnus forces and moments were measured on a basic-finner model spinning in transonic flow. Spin was induced by canted fins or by full-span or semi-span, outboard and inboard roll controls. Magnus force and moment reversals were caused by Mach number, reduced spin rate, and angle of attack variations. Magnus center of pressure was found to be independent of the angle of attack but varied with the Mach number and model configuration or reduced spin rate.
Khaji, Ali; Fallahdoost, Shoaodin; Soroush, Mohammad Reza
2010-04-01
To determine the nature and extent of Iranian casualties by ballistic missile attacks during the eight years of the Iraq-Iran war. The data collected about Iraqi missile strikes on Iranian cities included the following: date and time, number and type of missiles, cities targeted, and injuries and deaths resulting from impacts of missiles in civilian areas. The data were extracted from a database that was constructed by the army staff headquarters based on daily reports of Iranian army units during the war. Over a period of eight years (1980-1988), Iraqi army fired 533 ballistic missiles at Iranian territories. From those, 414 missiles (77.7%) landed on Iranian cities. The impacts of these missiles caused the deaths of 2,312 civilians and injured 11,625 others. Three types of ballistic missiles were used: FROG-7, Scud, and Al-Hussein (a modified version of the Scud missile). Twenty-seven cities in Iran were struck by Iraqi ballistic missiles. The highest mortalities from ballistic missiles were in Dezful and Tehran. Iraqi missile attacks continued for 90 months (2,748 days). Our results point to the necessity of investigating the psychological consequences of Iraqi ballistic missile attacks among survivors in 27 Iranian cities during the eight years of the Iraq-Iran war.
Determining Correlation between Shark Location and Atmospheric Wind and Thermal Parameters.
NASA Astrophysics Data System (ADS)
Merchant, J.
2017-12-01
Millions of people visit the nation's shorelines every summer. As recreational use of the ocean increases across the country, so too does the risk of shark attacks on people. According to George H. Burgess, curator for the International Shark Attack File and the Florida Program for Shark Research "The number of shark-human interactions occurring in a given year is directly correlated with the amount of time humans spend in the sea. As world population continues its upsurge and interest in aquatic recreation concurrently rises, we realistically should expect increases in the number of shark attacks and other aquatic recreation-related injuries". Burgess' analysis released in February of 2016, states "2015 yearly total of 98 unprovoked attacks (worldwide) was the highest on record" until 2016. Adding to the previous record number of global shark/human interactions in 2015 were 10 confirmed cases of people bitten by sharks off the shores of North Carolina and South Carolina over a five week period in June and July of 2015. The unusually high amount of attacks within close proximity over a short period of time garnered significant media attention nationwide. Preliminary data resulting from the analysis of these 2015 shark attacks and separate acoustic shark location data from Dr. Gregory Skomal's (Program Manager, Senior Marine Fisheries Biologist for the state of Massachusetts) ongoing research across Cape Code do indicate a correlation between environmental and biological factors leading up to human/shark interactions. Not only will these preliminary findings be presented, but a full description of how the use of higher resolution remote sensing and in-situ surface wind and thermal measurements would improve real time detection and prediction of these dangerous conditions, up to hours in advance, mitigating human risk and interaction with shark.
Pendlebury, Sarah T; Chen, Ping-Jen; Bull, Linda; Silver, Louise; Mehta, Ziyah; Rothwell, Peter M
2015-03-01
Many previous studies on dementia in stroke have restrictive inclusion criteria, which may result in underestimation of dementia rates. We undertook a large prospective population-based study of all transient ischemic attack and stroke to determine the impact of study entry criteria on measured rates of pre- and postevent dementia. All patients with acute transient ischemic attack or stroke from a defined population of 92 728 are referred from primary care or at hospital admission to the Oxford Vascular Study (2002-2007) and have baseline clinical and cognitive assessment and follow-up. We examined the impact of early death, other nonavailability, and commonly used selection criteria, on measured rates of dementia. Among 1236 patients (mean age/SD 75.2/12.1 years, 582 men, 403 transient ischemic attack), 139 died or were otherwise unavailable for baseline assessment, 319 had prior dependency, 425 had comorbidity, 512 were aged ≥80 years, 85 were dysphasic, and 502 were hospitalized. Pre-event dementia was 3-fold higher in patients dying preascertainment (10/47, 21%) and twice as high in other nonassessed (14/92, 15%) versus assessed patients (69/1097, 6%; P=0.0006 and P=0.002) and was several-fold higher in those with prior functional impairment (24% versus 3%; P<0.0001), age >80 years (13% versus 3%; P<0.0001), dysphasia (11% versus 7%; P<0.0001), and comorbidity (10% versus 6%; P=0.04). Findings for postevent dementia were similar: prior functional impairment (40% versus 13%; P<0.0001), age >80 years (28% versus 10%; P<0.0001), dysphasia (39% versus 15%; P<0.0001), and comorbidity (20% versus 15%; P=0.04). Exclusion of patients unavailable for assessment, and other widely used selection criteria, results in underestimation of the measured rate of dementia associated with transient ischemic attack and stroke. © 2015 American Heart Association, Inc.
Muslims on Campus: College-Bound Students, Schools Contend with Rising Intolerance
ERIC Educational Resources Information Center
Stegmeir, Mary
2017-01-01
Hate crimes and incidents of bias against US Muslims have soared to their highest levels since the aftermath of the Sept. 11, 2001 attacks, according to data collected by the FBI and other organizations. As Muslim youth search for a sense of security, counselors on both sides of the desk are called to ensure their institutions remain safe and…
Plotkin, Marian; Vaibavi, Srirangam Ramanujam; Rufaihah, Abdul Jalil; Nithya, Venkateswaran; Wang, Jing; Shachaf, Yonatan; Kofidis, Theo; Seliktar, Dror
2014-02-01
This study compares the effect of four injectable hydrogels with different mechanical properties on the post-myocardial infarction left ventricle (LV) remodeling process. The bioactive hydrogels were synthesized from Tetronic-fibrinogen (TF) and PEG-fibrinogen (PF) conjugates; each hydrogel was supplemented with two levels of additional cross-linker to increase the matrix stiffness as measured by the shear storage modulus (G'). Infarcts created by ligating the left anterior descending coronary artery in a rodent model were treated with the hydrogels, and all four treatment groups showed an increase in wall thickness, arterial density, and viable cardiac tissue in the peri-infarct areas of the LV. Echocardiography and hemodynamics data of the PF/TF treated groups showed significant improvement of heart function associated with the attenuated effects of the remodeling process. Multi-factorial regression analysis indicated that the group with the highest modulus exhibited the best rescue of heart function and highest neovascularization. The results of this study demonstrate that multiple properties of an injectable bioactive biomaterial, and notably the matrix stiffness, provide the multifaceted stimulation necessary to preserve cardiac function and prevent adverse remodeling following a heart attack. Copyright © 2013 Elsevier Ltd. All rights reserved.
Characterizing Verified Head Impacts in High School Girls' Lacrosse.
Caswell, Shane V; Lincoln, Andrew E; Stone, Hannah; Kelshaw, Patricia; Putukian, Margot; Hepburn, Lisa; Higgins, Michael; Cortes, Nelson
2017-12-01
Girls' high school lacrosse players have higher rates of head and facial injuries than boys. Research indicates that these injuries are caused by stick, player, and ball contacts. Yet, no studies have characterized head impacts in girls' high school lacrosse. To characterize girls' high school lacrosse game-related impacts by frequency, magnitude, mechanism, player position, and game situation. Descriptive epidemiology study. Thirty-five female participants (mean age, 16.2 ± 1.2 years; mean height, 1.66 ± 0.05 m; mean weight, 61.2 ± 6.4 kg) volunteered during 28 games in the 2014 and 2015 lacrosse seasons. Participants wore impact sensors affixed to the right mastoid process before each game. All game-related impacts recorded by the sensors were verified using game video. Data were summarized for all verified impacts in terms of frequency, peak linear acceleration (PLA), and peak rotational acceleration (PRA). Descriptive statistics and impact rates were calculated. Fifty-eight verified game-related impacts ≥20 g were recorded (median PLA, 33.8 g; median PRA, 6151.1 rad/s 2 ) during 467 player-games. The impact rate for all game-related verified impacts was 0.12 per athlete-exposure (AE) (95% CI, 0.09-0.16), equivalent to 2.1 impacts per team game, indicating that each athlete suffered fewer than 2 head impacts per season ≥20 g. Of these impacts, 28 (48.3%) were confirmed to directly strike the head, corresponding with an impact rate of 0.05 per AE (95% CI, 0.00-0.10). Overall, midfielders (n = 28, 48.3%) sustained the most impacts, followed by defenders (n = 12, 20.7%), attackers (n = 11, 19.0%), and goalies (n = 7, 12.1%). Goalies demonstrated the highest median PLA and PRA (38.8 g and 8535.0 rad/s 2 , respectively). The most common impact mechanisms were contact with a stick (n = 25, 43.1%) and a player (n = 17, 29.3%), followed by the ball (n = 7, 12.1%) and the ground (n = 7, 12.1%). One hundred percent of ball impacts occurred to goalies. Most impacts occurred to field players within the attack area of the field (n = 32, 55.2%) or the midfield (n = 18, 31.0%). Most (95%) impacts did not result in a penalty. The incidence of verified head impacts in girls' high school lacrosse was quite low. Ball to head impacts were associated with the highest impact magnitudes. While stick and body contacts are illegal in girls' high school lacrosse, rarely did such impacts to the head result in a penalty. The verification of impact mechanisms using video review is critical to collect impact sensor data.
Flight test of the X-29A at high angle of attack: Flight dynamics and controls
NASA Technical Reports Server (NTRS)
Bauer, Jeffrey E.; Clarke, Robert; Burken, John J.
1995-01-01
The NASA Dryden Flight Research Center has flight tested two X-29A aircraft at low and high angles of attack. The high-angle-of-attack tests evaluate the feasibility of integrated X-29A technologies. More specific objectives focus on evaluating the high-angle-of-attack flying qualities, defining multiaxis controllability limits, and determining the maximum pitch-pointing capability. A pilot-selectable gain system allows examination of tradeoffs in airplane stability and maneuverability. Basic fighter maneuvers provide qualitative evaluation. Bank angle captures permit qualitative data analysis. This paper discusses the design goals and approach for high-angle-of-attack control laws and provides results from the envelope expansion and handling qualities testing at intermediate angles of attack. Comparisons of the flight test results to the predictions are made where appropriate. The pitch rate command structure of the longitudinal control system is shown to be a valid design for high-angle-of-attack control laws. Flight test results show that wing rock amplitude was overpredicted and aileron and rudder effectiveness were underpredicted. Flight tests show the X-29A airplane to be a good aircraft up to 40 deg angle of attack.
Impact of Tumarkin attacks on complaints and work ability in Ménière's disease.
Pyykkö, Ilmari; Manchaiah, Vinaya; Zou, Jing; Levo, Hilla; Kentala, Erna
2018-05-22
The purpose of the present study was to characterize the occurrence of Tumarkin attacks in patients with Ménière'sdisease (MD), and to study its association with reported complaints, severity of consequences, and also self-reported work ability. The study used a cross-sectional design. Data obtained from the Finnish Ménière Federation using an electronic survey was analyzed. 602 people with MD responded to the survey (62% response rate) with a mean age of 56.7 years and a mean duration of the disease 12.4 years. 49% of the respondents experienced Tumarkin attacks, which lasted for a few seconds to a few minutes. There were significant differences in complaints reported by MD patients with and without Tumarkin attacks. Respondents with Tumarkin attacks experienced various consequences, including tripping, falls, fear, anxiety, problems in dyadic life, and even transient loss of consciousness. Respondents with Tumarkin attacks had more frequently applied for pension than those not having Tumarkin attacks. On an average, respondents with Tumarkin attacks had less self-reported working ability when compared to those without Tumarkin attacks. The current study results suggest various differences in terms of complaints reported, severity of consequences, and the self-reported working ability in MD patients with and without Tumarkin attacks. Hearing healthcare professionals must examine Tumarkin attacks and their consequences in patients with MD during clinical examinations. In addition, the therapy should focus on alleviating the consequences and improving work ability.
Verification of Sulfate Attack Penetration Rates for Saltstone Disposal Unit Modeling
DOE Office of Scientific and Technical Information (OSTI.GOV)
Flach, G. P.
Recent Special Analysis modeling of Saltstone Disposal Units consider sulfate attack on concrete and utilize degradation rates estimated from Cementitious Barriers Partnership software simulations. This study provides an independent verification of those simulation results using an alternative analysis method and an independent characterization data source. The sulfate penetration depths estimated herein are similar to the best-estimate values in SRNL-STI-2013-00118 Rev. 2 and well below the nominal values subsequently used to define Saltstone Special Analysis base cases.
NASA Technical Reports Server (NTRS)
Lackey, J.; Hadfield, C.
1992-01-01
Recent mishaps and incidents on Class IV aircraft have shown a need for establishing quantitative longitudinal high angle of attack (AOA) pitch control margin design guidelines for future aircraft. NASA Langley Research Center has conducted a series of simulation tests to define these design guidelines. Flight test results have confirmed the simulation studies in that pilot rating of high AOA nose-down recoveries were based on the short-term response interval in the forms of pitch acceleration and rate.
NASA Technical Reports Server (NTRS)
Wurster, K. E.; Eldred, C. H.
1979-01-01
A broad parametric study which examines several critical aspects of low-heat-rate entry trajectories is performed. Low planform loadings associated with future winged earth-entry vehicles coupled with the potential application of metallic thermal protection systems (TPS) suggest that such trajectories are of particular interest. Studied are three heating conditions - reference, stagnation, and windward centerline, for both laminar and turbulent flow; configuration-related factors including planform loading and hypersonic angle of attack; and mission-related factors such as cross-range and orbit inclination. Results indicate benefits in the design of TPS to be gained by utilizing moderate angles of attack as opposed to high-lift coefficient, high angles of attack, during entry. An assessment of design and technology implications is made.
Kinematic properties of the helicopter in coordinated turns
NASA Technical Reports Server (NTRS)
Chen, R. T. N.; Jeske, J. A.
1981-01-01
A study on the kinematic relationship of the variables of helicopter motion in steady, coordinated turns involving inherent sideslip is described. A set of exact kinematic equations which govern a steady coordinated helical turn about an Earth referenced vertical axis is developed. A precise definition for the load factor parameter that best characterizes a coordinated turn is proposed. Formulas are developed which relate the aircraft angular rates and pitch and roll attitudes to the turn parameters, angle of attack, and inherent sideslip. A steep, coordinated helical turn at extreme angles of attack with inherent sideslip is of primary interest. The bank angle of the aircraft can differ markedly from the tilt angle of the normal load factor. The normal load factor can also differ substantially from the accelerometer reading along the vertical body axis of the aircraft. Sideslip has a strong influence on the pitch attitude and roll rate of the helicopter. Pitch rate is independent of angle of attack in a coordinated turn and in the absence of sideslip, angular rates about the stability axes are independent of the aerodynamic characteristics of the aircraft.
Flight Test Techniques for Quantifying Pitch Rate and Angle of Attack Rate Dependencies
NASA Technical Reports Server (NTRS)
Grauer, Jared A.; Morelli, Eugene A.; Murri, Daniel G.
2017-01-01
Three different types of maneuvers were designed to separately quantify pitch rate and angle of attack rate contributions to the nondimensional aerodynamic pitching moment coefficient. These maneuvers combined pilot inputs and automatic multisine excitations, and were own with the subscale T-2 and Bat-4 airplanes using the NASA AirSTAR flight test facility. Stability and control derivatives, in particular C(sub mq) and C(sub m alpha(.)) were accurately estimated from the flight test data. These maneuvers can be performed with many types of aircraft, and the results can be used to increase simulation prediction fidelity and facilitate more accurate comparisons with wind tunnel experiments or numerical investigations.
Olfactory-triggered panic attacks among Khmer refugees: a contextual approach.
Hinton, Devon; Pich, Vuth; Chhean, Dara; Pollack, Mark
2004-06-01
One hundred Khmer refugees attending a psychiatric clinic were surveyed to determine the prevalence of olfactory-triggered panic attacks as well as certain characteristics of the episodes, including trigger (i.e. type of odor), frequency, length, somatic symptoms, and the rate of associated flashbacks and catastrophic cognitions. Forty-five of the 100 patients had experienced an olfactory-triggered panic attack in the last month. Trauma associations and catastrophic cognitions (e.g. fears of a 'wind attack', 'weakness', and 'weak heart') were common during events of olfactory panic. Several case examples are presented. A multifactorial model of the generation of olfactory panic is adduced. The therapeutic implications of this model for the treatment of olfactory panic are discussed.
NASA Astrophysics Data System (ADS)
Zhang, Sheng; Wang, Jian; Tang, Chao-Jing
2012-06-01
Counterfactual quantum cryptography, recently proposed by Noh, is featured with no transmission of signal particles. This exhibits evident security advantages, such as its immunity to the well-known photon-number-splitting attack. In this paper, the theoretical security of counterfactual quantum cryptography protocol against the general intercept-resend attacks is proved by bounding the information of an eavesdropper Eve more tightly than in Yin's proposal [Phys. Rev. A 82 042335 (2010)]. It is also shown that practical counterfactual quantum cryptography implementations may be vulnerable when equipped with imperfect apparatuses, by proving that a negative key rate can be achieved when Eve launches a time-shift attack based on imperfect detector efficiency.
Countermeasures for unintentional and intentional video watermarking attacks
NASA Astrophysics Data System (ADS)
Deguillaume, Frederic; Csurka, Gabriela; Pun, Thierry
2000-05-01
These last years, the rapidly growing digital multimedia market has revealed an urgent need for effective copyright protection mechanisms. Therefore, digital audio, image and video watermarking has recently become a very active area of research, as a solution to this problem. Many important issues have been pointed out, one of them being the robustness to non-intentional and intentional attacks. This paper studies some attacks and proposes countermeasures applied to videos. General attacks are lossy copying/transcoding such as MPEG compression and digital/analog (D/A) conversion, changes of frame-rate, changes of display format, and geometrical distortions. More specific attacks are sequence edition, and statistical attacks such as averaging or collusion. Averaging attack consists of averaging locally consecutive frames to cancel the watermark. This attack works well for schemes which embed random independent marks into frames. In the collusion attack the watermark is estimated from single frames (based on image denoising), and averaged over different scenes for better accuracy. The estimated watermark is then subtracted from each frame. Collusion requires that the same mark is embedded into all frames. The proposed countermeasures first ensures robustness to general attacks by spread spectrum encoding in the frequency domain and by the use of an additional template. Secondly, a Bayesian criterion, evaluating the probability of a correctly decoded watermark, is used for rejection of outliers, and to implement an algorithm against statistical attacks. The idea is to embed randomly chosen marks among a finite set of marks, into subsequences of videos which are long enough to resist averaging attacks, but short enough to avoid collusion attacks. The Bayesian criterion is needed to select the correct mark at the decoding step. Finally, the paper presents experimental results showing the robustness of the proposed method.
Spatio-temporal synchrony of influenza in cities across Israel: the "Israel is one city" hypothesis.
Barnea, Oren; Huppert, Amit; Katriel, Guy; Stone, Lewi
2014-01-01
We analysed an 11-year dataset (1998-2009) of Influenza-Like Illness (ILI) that was based on surveillance of ∽23% of Israel's population. We examined whether the level of synchrony of ILI epidemics in Israel's 12 largest cities is high enough to view Israel as a single epidemiological unit. Two methods were developed to assess the synchrony: (1) City-specific attack rates were fitted to a simple model in order to estimate the temporal differences in attack rates and spatial differences in reporting rates of ILI. The model showed good fit to the data (R2 = 0.76) and revealed considerable differences in reporting rates of ILI in different cities (up to a factor of 2.2). (2) A statistical test was developed to examine the null hypothesis (H0) that ILI incidence curves in two cities are essentially identical, and was tested using ILI data. Upon examining all possible pairs of incidence curves, 77.4% of pairs were found not to be different (H0 was not rejected). It was concluded that all cities generally have the same attack rate and follow the same epidemic curve each season, although the attack rate changes from season to season, providing strong support for the "Israel is one city" hypothesis. The cities which were the most out of synchronization were Bnei Brak, Beersheba and Haifa, the latter two being geographically remote from all other cities in the dataset and the former geographically very close to several other cities but socially separate due to being populated almost exclusively by ultra-orthodox Jews. Further evidence of assortative mixing of the ultra-orthodox population can be found in the 2001-2002 season, when ultra-orthodox cities and neighborhoods showed distinctly different incidence curves compared to the general population.
Knowledge and Attitude of Iranian Red Crescent Society Volunteers in Dealing with Chemical Attacks.
Nadjafi, Maryam; Hamzeh Pour, Siavash
2017-04-01
To evaluate the knowledge, attitude, and preparedness of Mahabad Red Crescent Society volunteers in dealing with chemical attacks. This prospective cross-sectional study was conducted on 120 Red Crescent Society volunteers in Mahabad City, Iran, during 2014-2015.The knowledge of the volunteers was evaluated and rated using a questionnaire as poor, moderate, and good. Also, the attitude of the volunteers towards the chemical attacks and their preparedness were rated as appropriate and inappropriate using a questionnaire. Data were analyzed using the SPSS software version 21. From a total of 120 volunteers, 62.5% were males. The mean age of the volunteers was 32.0 ± 8.2 years. None of the volunteers had adequate knowledge regarding management of the consequences of chemical terrorist attacks. Only 10 volunteers (8.3%) had appropriate attitude and 7 (5.8%) stated their preparedness for being sent to the crisis zone. Also, 116 volunteers (96.7%) declared that Mahabad Red Crescent Society has an inappropriate level of preparedness to encounter chemical terrorism attacks and release of chemical agents related to petrochemical industrial chlorine resources into the water and wastewater. The findings of the present study show poor knowledge and inappropriate attitude of Mahabad Red Crescent Society volunteers, and rescuers in encountering probable chemical attacks and industrial accidents. Furthermore, the Red Crescent Society had an inappropriate level of preparedness in the field of chemical terrorism from the viewpoint of the studied volunteers.
Brighton, Caroline H.; Thomas, Adrian L. R.
2017-01-01
The ability to intercept uncooperative targets is key to many diverse flight behaviors, from courtship to predation. Previous research has looked for simple geometric rules describing the attack trajectories of animals, but the underlying feedback laws have remained obscure. Here, we use GPS loggers and onboard video cameras to study peregrine falcons, Falco peregrinus, attacking stationary targets, maneuvering targets, and live prey. We show that the terminal attack trajectories of peregrines are not described by any simple geometric rule as previously claimed, and instead use system identification techniques to fit a phenomenological model of the dynamical system generating the observed trajectories. We find that these trajectories are best—and exceedingly well—modeled by the proportional navigation (PN) guidance law used by most guided missiles. Under this guidance law, turning is commanded at a rate proportional to the angular rate of the line-of-sight between the attacker and its target, with a constant of proportionality (i.e., feedback gain) called the navigation constant (N). Whereas most guided missiles use navigation constants falling on the interval 3 ≤ N ≤ 5, peregrine attack trajectories are best fitted by lower navigation constants (median N < 3). This lower feedback gain is appropriate at the lower flight speed of a biological system, given its presumably higher error and longer delay. This same guidance law could find use in small visually guided drones designed to remove other drones from protected airspace. PMID:29203660
Brighton, Caroline H; Thomas, Adrian L R; Taylor, Graham K
2017-12-19
The ability to intercept uncooperative targets is key to many diverse flight behaviors, from courtship to predation. Previous research has looked for simple geometric rules describing the attack trajectories of animals, but the underlying feedback laws have remained obscure. Here, we use GPS loggers and onboard video cameras to study peregrine falcons, Falco peregrinus , attacking stationary targets, maneuvering targets, and live prey. We show that the terminal attack trajectories of peregrines are not described by any simple geometric rule as previously claimed, and instead use system identification techniques to fit a phenomenological model of the dynamical system generating the observed trajectories. We find that these trajectories are best-and exceedingly well-modeled by the proportional navigation (PN) guidance law used by most guided missiles. Under this guidance law, turning is commanded at a rate proportional to the angular rate of the line-of-sight between the attacker and its target, with a constant of proportionality (i.e., feedback gain) called the navigation constant ( N ). Whereas most guided missiles use navigation constants falling on the interval 3 ≤ N ≤ 5, peregrine attack trajectories are best fitted by lower navigation constants (median N < 3). This lower feedback gain is appropriate at the lower flight speed of a biological system, given its presumably higher error and longer delay. This same guidance law could find use in small visually guided drones designed to remove other drones from protected airspace. Copyright © 2017 the Author(s). Published by PNAS.
Facelock: familiarity-based graphical authentication
McLachlan, Jane L.; Renaud, Karen
2014-01-01
Authentication codes such as passwords and PIN numbers are widely used to control access to resources. One major drawback of these codes is that they are difficult to remember. Account holders are often faced with a choice between forgetting a code, which can be inconvenient, or writing it down, which compromises security. In two studies, we test a new knowledge-based authentication method that does not impose memory load on the user. Psychological research on face recognition has revealed an important distinction between familiar and unfamiliar face perception: When a face is familiar to the observer, it can be identified across a wide range of images. However, when the face is unfamiliar, generalisation across images is poor. This contrast can be used as the basis for a personalised ‘facelock’, in which authentication succeeds or fails based on image-invariant recognition of faces that are familiar to the account holder. In Study 1, account holders authenticated easily by detecting familiar targets among other faces (97.5% success rate), even after a one-year delay (86.1% success rate). Zero-acquaintance attackers were reduced to guessing (<1% success rate). Even personal attackers who knew the account holder well were rarely able to authenticate (6.6% success rate). In Study 2, we found that shoulder-surfing attacks by strangers could be defeated by presenting different photos of the same target faces in observed and attacked grids (1.9% success rate). Our findings suggest that the contrast between familiar and unfamiliar face recognition may be useful for developers of graphical authentication systems. PMID:25024913
Bondü, Rebecca; Beier, Sophia
2015-01-01
School attacks are attracting increasing attention in aggression research. Recent systematic analyses provided new insights into offense and offender characteristics. Less is known about attacks in institutes of higher education (e.g., universities). It is therefore questionable whether the term "school attack" should be limited to institutions of general education or could be extended to institutions of higher education. Scientific literature is divided in distinguishing or unifying these two groups and reports similarities as well as differences. We researched 232 school attacks and 45 attacks in institutes of higher education throughout the world and conducted systematic comparisons between the two groups. The analyses yielded differences in offender (e.g., age, migration background) and offense characteristics (e.g., weapons, suicide rates), and some similarities (e.g., gender). Most differences can apparently be accounted for by offenders' age and situational influences. We discuss the implications of our findings for future research and the development of preventative measures. © The Author(s) 2014.
NASA Astrophysics Data System (ADS)
Ghimire, Rajendra P.; Kivimäenpää, Minna; Blomqvist, Minna; Holopainen, Toini; Lyytikäinen-Saarenmaa, Päivi; Holopainen, Jarmo K.
2016-02-01
Climate warming driven storms are evident causes for an outbreak of the European spruce bark beetle (Ips typographus L.) resulting in the serious destruction of mature Norway spruce (Picea abies Karst.) forests in northern Europe. Conifer species are major sources of biogenic volatile organic compounds (BVOCs) in the boreal zone. Climate relevant BVOC emissions are expected to increase when conifer trees defend against bark beetle attack by monoterpene (MT)-rich resin flow. In this study, BVOC emission rates from the bark surface of beetle-attacked and non-attacked spruce trees were measured from two outbreak areas, Iitti and Lahti in southern Finland, and from one control site at Kuopio in central Finland. Beetle attack increased emissions of total MTs 20-fold at Iitti compared to Kuopio, but decreased the emissions of several sesquiterpenes (SQTs) at Iitti. At the Lahti site, the emission rate of α-pinene was positively correlated with mean trap catch of bark beetles. The responsive individual MTs were tricyclene, α-pinene, camphene, myrcene, limonene, 1,8-cineole and bornyl acetate in both of the outbreak areas. Our results suggest that bark beetle outbreaks affect local BVOC emissions from conifer forests dominated by Norway spruce. Therefore, the impacts of insect outbreaks are worth of consideration to global BVOC emission models.
Kent, S
1979-06-01
Because the advantage that women have over men in a lower heart attack rate is gradually lost after menopause, it has been suggested that estrogen may exert a protective effect against heart disease. The situation is complex, and the available data are open to various interpretations. Available data show a gradual, predictable increase in the death rate from heart disease among women with advancing age, despite the apparent increase in cardiovascular events around the time of menopause. This suggests that men may be particularly susceptible to heart disease, rather than that women have an immunity to the disease. The theory that estrogen exerts a protective effect against heart disease was examined when men who had had heart attacks were treated with estrogen in the Coronary Drug Project. The practice was discontinued when it was found that men receiving estrogen had an elevated incidence of myocardial infarction, a finding that suggests that estrogen may promote heart disease. Additional evidence that estrogen may have a harmful effect on the cardiovascular system comes from a recent study by Gerald B. Phillips who found that men who had suffered heart attacks before age 43 had higher levels of estradiol in their blood than men who had not had heart attacks. A noteworthy finding from th e Framingham study was the fact that the relative risk of cardiovascular events in postmenopausal compared with premenopausal women seemed to decrease with age. Hans Selye identifies stress as "the final, decisive eliciting factor" in precipitating heart attack. Broda O. Barnes also maintains that stress is a major cause of heart attack, but adds that most stress-prone individuals suffer from thyroid deficiency, which is the underlying cause of their increased susceptibility to heart attacks.
Buffet induced structural/flight-control system interaction of the X-29A aircraft
NASA Technical Reports Server (NTRS)
Voracek, David F.; Clarke, Robert
1991-01-01
High angle-of-attack flight regime research is currently being conducted for modern fighter aircraft at the NASA Ames Research Center's Dryden Flight Research Facility. This flight regime provides enhanced maneuverability to fighter pilots in combat situations. Flight research data are being acquired to compare and validate advanced computational fluid dynamic solutions and wind-tunnel models. High angle-of-attack flight creates unique aerodynamic phenomena including wing rock and buffet on the airframe. These phenomena increase the level of excitation of the structural modes, especially on the vertical and horizontal stabilizers. With high gain digital flight-control systems, this structural response may result in an aeroservoelastic interaction. A structural interaction on the X-29A aircraft was observed during high angle-of-attack flight testing. The roll and yaw rate gyros sensed the aircraft's structural modes at 11, 13, and 16 Hz. The rate gyro output signals were then amplified through the flight-control laws and sent as commands to the flaperons and rudder. The flight data indicated that as the angle of attack increased, the amplitude of the buffet on the vertical stabilizer increased, which resulted in more excitation to the structural modes. The flight-control system sensors and command signals showed this increase in modal power at the structural frequencies up to a 30 degree angle-of-attack. Beyond a 30 degree angle-of-attack, the vertical stabilizer response, the feedback sensor amplitude, and control surface command signal amplitude remained relatively constant. Data are presented that show the increased modal power in the aircraft structural accelerometers, the feedback sensors, and the command signals as a function of angle of attack. This structural interaction is traced from the aerodynamic buffet to the flight-control surfaces.
Yi, Chong; Wenping, Xiang; Hui, Xue; Xin, He; Xiue, Li; Jun, Zhang; Shangyong, Geng
2016-06-01
Vestibular paroxysmia (VP) is a rare episodic peripheral vestibular disorder that can cause acute short attacks of vertigo. This study aimed to compare the efficacy and acceptability of carbamazepine (CBZ), CBZ plus betahistine mesilate tablets (BMT) and oxcarbazepine (OXC) plus BMT in treating VP within 12 weeks. A retrospective analysis of data from 196 VP patients treated in our hospital was conducted. There were 73 patients receiving CBZ, 65 patients receiving CBZ+BMT and 58 patients receiving OXC+BMT. The frequency of vertigo, vertigo duration, vertigo score, response rate (RR) and side effects were compared between groups to assess efficacy and acceptability at the end of 12(th) week. After 12 weeks' treatment, the CBZ+BMT group had a greater reduction in the frequency of vertigo, vertigo duration and vertigo score than the other two groups. The RR was highest in the CBZ+BMT group, second in the OXC+BMT group and lowest in the CBZ group. The incidence of side-effects was highest in the CBZ group, second in the CBZ+BMT group and lowest in the OXC+BMT group. Two patients in the CBZ group were withdrawn. These results indicated that using BMT as an augmentation for CBZ or OXC might be a good choice in treating VP.
An Investigation of Convergent-Divergent Diffusers at Mach Number 1.85
NASA Technical Reports Server (NTRS)
Wyatt, Demarquis D; Hunczak, Henry R
1947-01-01
An investigation has been conducted in the Cleveland 18- by 18-inch supersonic tunnel at a Mach number of 1.85 and angles of attack from 0 deg to 5 deg to determine optimum design configurations for a convergent-divergent type of supersonic diffuser with a subsonic diffuser of 5 deg included divergence angle. Total pressure recoveries in excess of theoretical recovery across a normal shock at a free-stream Mach number of 1.85 wore obtained with several configurations. The highest recovery for configurations without a cylindrical throat section was obtained with an inlet having an included convergence angle of 20 deg. Insertion of a 2-inch throat section between a 10 deg included angle inlet and the subsonic diffuser stabilized the shock inside the diffuser and resulted in recoveries as high as 0.838 free-stream total pressure at an angle of attack of 0 deg, corresponding to recovery of 92.4 percent of the kinetic energy of the free air stream. Use of the throat section also lessened the reduction in recovery of all configurations due to angle of attack.
Evaluation of electrolytic tilt sensors for wind tunnel model angle-of-attack (AOA) measurements
NASA Technical Reports Server (NTRS)
Wong, Douglas T.
1991-01-01
The results of a laboratory evaluation of three types of electrolytic tilt sensors as potential candidates for model attitude or angle of attack (AOA) measurements in wind tunnel tests are presented. Their performance was also compared with that from typical servo accelerometers used for AOA measurements. Model RG-37 electrolytic tilt sensors were found to have the highest overall accuracy among the three types. Compared with the servo accelerometer, their accuracies are about one order of magnitude worse and each of them cost about two-thirds less. Therefore, the sensors are unsuitable for AOA measurements although they are less expensive. However, the potential for other applications exists where the errors resulting from roll interaction, vibration, and response time are less, and sensor temperature can be controlled.
A systematic review of re-identification attacks on health data.
El Emam, Khaled; Jonker, Elizabeth; Arbuckle, Luk; Malin, Bradley
2011-01-01
Privacy legislation in most jurisdictions allows the disclosure of health data for secondary purposes without patient consent if it is de-identified. Some recent articles in the medical, legal, and computer science literature have argued that de-identification methods do not provide sufficient protection because they are easy to reverse. Should this be the case, it would have significant and important implications on how health information is disclosed, including: (a) potentially limiting its availability for secondary purposes such as research, and (b) resulting in more identifiable health information being disclosed. Our objectives in this systematic review were to: (a) characterize known re-identification attacks on health data and contrast that to re-identification attacks on other kinds of data, (b) compute the overall proportion of records that have been correctly re-identified in these attacks, and (c) assess whether these demonstrate weaknesses in current de-identification methods. Searches were conducted in IEEE Xplore, ACM Digital Library, and PubMed. After screening, fourteen eligible articles representing distinct attacks were identified. On average, approximately a quarter of the records were re-identified across all studies (0.26 with 95% CI 0.046-0.478) and 0.34 for attacks on health data (95% CI 0-0.744). There was considerable uncertainty around the proportions as evidenced by the wide confidence intervals, and the mean proportion of records re-identified was sensitive to unpublished studies. Two of fourteen attacks were performed with data that was de-identified using existing standards. Only one of these attacks was on health data, which resulted in a success rate of 0.00013. The current evidence shows a high re-identification rate but is dominated by small-scale studies on data that was not de-identified according to existing standards. This evidence is insufficient to draw conclusions about the efficacy of de-identification methods.
A Systematic Review of Re-Identification Attacks on Health Data
El Emam, Khaled; Jonker, Elizabeth; Arbuckle, Luk; Malin, Bradley
2011-01-01
Background Privacy legislation in most jurisdictions allows the disclosure of health data for secondary purposes without patient consent if it is de-identified. Some recent articles in the medical, legal, and computer science literature have argued that de-identification methods do not provide sufficient protection because they are easy to reverse. Should this be the case, it would have significant and important implications on how health information is disclosed, including: (a) potentially limiting its availability for secondary purposes such as research, and (b) resulting in more identifiable health information being disclosed. Our objectives in this systematic review were to: (a) characterize known re-identification attacks on health data and contrast that to re-identification attacks on other kinds of data, (b) compute the overall proportion of records that have been correctly re-identified in these attacks, and (c) assess whether these demonstrate weaknesses in current de-identification methods. Methods and Findings Searches were conducted in IEEE Xplore, ACM Digital Library, and PubMed. After screening, fourteen eligible articles representing distinct attacks were identified. On average, approximately a quarter of the records were re-identified across all studies (0.26 with 95% CI 0.046–0.478) and 0.34 for attacks on health data (95% CI 0–0.744). There was considerable uncertainty around the proportions as evidenced by the wide confidence intervals, and the mean proportion of records re-identified was sensitive to unpublished studies. Two of fourteen attacks were performed with data that was de-identified using existing standards. Only one of these attacks was on health data, which resulted in a success rate of 0.00013. Conclusions The current evidence shows a high re-identification rate but is dominated by small-scale studies on data that was not de-identified according to existing standards. This evidence is insufficient to draw conclusions about the efficacy of de-identification methods. PMID:22164229
Optimality of Gaussian attacks in continuous-variable quantum cryptography.
Navascués, Miguel; Grosshans, Frédéric; Acín, Antonio
2006-11-10
We analyze the asymptotic security of the family of Gaussian modulated quantum key distribution protocols for continuous-variables systems. We prove that the Gaussian unitary attack is optimal for all the considered bounds on the key rate when the first and second momenta of the canonical variables involved are known by the honest parties.
Assessing Sexual Abuse/Attack Histories with Bariatric Surgery Patients
ERIC Educational Resources Information Center
Mahony, David
2010-01-01
This study assessed sexual abuse/attack histories in 537 bariatric surgery patients using the PsyBari. The prevalence rates found were lower (15.5%, 19.3% of women, 5.2% of men) than other studies that used bariatric surgery patients but consistent with studies that used nonbariatric obese subjects. Furthermore, bariatric surgery patients who…
Efficient Data Transfer Rate and Speed of Secured Ethernet Interface System.
Ghanti, Shaila; Naik, G M
2016-01-01
Embedded systems are extensively used in home automation systems, small office systems, vehicle communication systems, and health service systems. The services provided by these systems are available on the Internet and these services need to be protected. Security features like IP filtering, UDP protection, or TCP protection need to be implemented depending on the specific application used by the device. Every device on the Internet must have network interface. This paper proposes the design of the embedded Secured Ethernet Interface System to protect the service available on the Internet against the SYN flood attack. In this experimental study, Secured Ethernet Interface System is customized to protect the web service against the SYN flood attack. Secured Ethernet Interface System is implemented on ALTERA Stratix IV FPGA as a system on chip and uses the modified SYN flood attack protection method. The experimental results using Secured Ethernet Interface System indicate increase in number of genuine clients getting service from the server, considerable improvement in the data transfer rate, and better response time during the SYN flood attack.
Efficient Data Transfer Rate and Speed of Secured Ethernet Interface System
Ghanti, Shaila
2016-01-01
Embedded systems are extensively used in home automation systems, small office systems, vehicle communication systems, and health service systems. The services provided by these systems are available on the Internet and these services need to be protected. Security features like IP filtering, UDP protection, or TCP protection need to be implemented depending on the specific application used by the device. Every device on the Internet must have network interface. This paper proposes the design of the embedded Secured Ethernet Interface System to protect the service available on the Internet against the SYN flood attack. In this experimental study, Secured Ethernet Interface System is customized to protect the web service against the SYN flood attack. Secured Ethernet Interface System is implemented on ALTERA Stratix IV FPGA as a system on chip and uses the modified SYN flood attack protection method. The experimental results using Secured Ethernet Interface System indicate increase in number of genuine clients getting service from the server, considerable improvement in the data transfer rate, and better response time during the SYN flood attack. PMID:28116350
Distributed reinforcement learning for adaptive and robust network intrusion response
NASA Astrophysics Data System (ADS)
Malialis, Kleanthis; Devlin, Sam; Kudenko, Daniel
2015-07-01
Distributed denial of service (DDoS) attacks constitute a rapidly evolving threat in the current Internet. Multiagent Router Throttling is a novel approach to defend against DDoS attacks where multiple reinforcement learning agents are installed on a set of routers and learn to rate-limit or throttle traffic towards a victim server. The focus of this paper is on online learning and scalability. We propose an approach that incorporates task decomposition, team rewards and a form of reward shaping called difference rewards. One of the novel characteristics of the proposed system is that it provides a decentralised coordinated response to the DDoS problem, thus being resilient to DDoS attacks themselves. The proposed system learns remarkably fast, thus being suitable for online learning. Furthermore, its scalability is successfully demonstrated in experiments involving 1000 learning agents. We compare our approach against a baseline and a popular state-of-the-art throttling technique from the network security literature and show that the proposed approach is more effective, adaptive to sophisticated attack rate dynamics and robust to agent failures.
Reding, Michael E; Oliver, Jason B; Schultz, Peter B; Ranger, Christopher M; Youssef, Nadeer N
2013-02-01
Exotic ambrosia beetles are damaging pests in ornamental tree nurseries in North America. The species Xylosandrus crassiusculus (Motshulsky) and Xylosandrus germanus (Blandford) are especially problematic. Management of these pests relies on preventive treatments of insecticides. However, field tests of recommended materials on nursery trees have been limited because of unreliable attacks by ambrosia beetles on experimental trees. Ethanol-injection of trees was used to induce colonization by ambrosia beetles to evaluate insecticides and botanical formulations for preventing attacks by ambrosia beetles. Experiments were conducted in Ohio, Tennessee, and Virginia. Experimental trees injected with ethanol had more attacks by ambrosia beetles than uninjected control trees in all but one experiment. Xylosandrus crassiusculus and X. germanus colonized trees injected with ethanol. In most experiments, attack rates declined 8 d after ethanol-injection. Ethanol-injection induced sufficient pressure from ambrosia beetles to evaluate the efficacy of insecticides for preventing attacks. Trunk sprays of permethrin suppressed cumulative total attacks by ambrosia beetles in most tests. Trunk sprays of the botanical formulations Armorex and Veggie Pharm suppressed cumulative total attacks in Ohio. Armorex, Armorex + Permethrin, and Veggie Pharm + Permethrin suppressed attacks in Tennessee. The bifenthrin product Onyx suppressed establishment of X. germanus in one Ohio experiment, and cumulative total ambrosia beetle attacks in Virginia. Substrate drenches and trunk sprays of neonicotinoids, or trunk sprays of anthranilic diamides or tolfenpyrad were not effective. Ethanol-injection is effective for inducing attacks and ensuring pressure by ambrosia beetles for testing insecticide efficacy on ornamental trees.
Saleh, Mohammed A; Abdul Manaf, Azizah
2015-01-01
The growth of web technology has brought convenience to our life, since it has become the most important communication channel. However, now this merit is threatened by complicated network-based attacks, such as denial of service (DoS) and distributed denial of service (DDoS) attacks. Despite many researchers' efforts, no optimal solution that addresses all sorts of HTTP DoS/DDoS attacks is on offer. Therefore, this research aims to fix this gap by designing an alternative solution called a flexible, collaborative, multilayer, DDoS prevention framework (FCMDPF). The innovative design of the FCMDPF framework handles all aspects of HTTP-based DoS/DDoS attacks through the following three subsequent framework's schemes (layers). Firstly, an outer blocking (OB) scheme blocks attacking IP source if it is listed on the black list table. Secondly, the service traceback oriented architecture (STBOA) scheme is to validate whether the incoming request is launched by a human or by an automated tool. Then, it traces back the true attacking IP source. Thirdly, the flexible advanced entropy based (FAEB) scheme is to eliminate high rate DDoS (HR-DDoS) and flash crowd (FC) attacks. Compared to the previous researches, our framework's design provides an efficient protection for web applications against all sorts of DoS/DDoS attacks.
Saleh, Mohammed A.; Abdul Manaf, Azizah
2015-01-01
The growth of web technology has brought convenience to our life, since it has become the most important communication channel. However, now this merit is threatened by complicated network-based attacks, such as denial of service (DoS) and distributed denial of service (DDoS) attacks. Despite many researchers' efforts, no optimal solution that addresses all sorts of HTTP DoS/DDoS attacks is on offer. Therefore, this research aims to fix this gap by designing an alternative solution called a flexible, collaborative, multilayer, DDoS prevention framework (FCMDPF). The innovative design of the FCMDPF framework handles all aspects of HTTP-based DoS/DDoS attacks through the following three subsequent framework's schemes (layers). Firstly, an outer blocking (OB) scheme blocks attacking IP source if it is listed on the black list table. Secondly, the service traceback oriented architecture (STBOA) scheme is to validate whether the incoming request is launched by a human or by an automated tool. Then, it traces back the true attacking IP source. Thirdly, the flexible advanced entropy based (FAEB) scheme is to eliminate high rate DDoS (HR-DDoS) and flash crowd (FC) attacks. Compared to the previous researches, our framework's design provides an efficient protection for web applications against all sorts of DoS/DDoS attacks. PMID:26065015
Practical security and privacy attacks against biometric hashing using sparse recovery
NASA Astrophysics Data System (ADS)
Topcu, Berkay; Karabat, Cagatay; Azadmanesh, Matin; Erdogan, Hakan
2016-12-01
Biometric hashing is a cancelable biometric verification method that has received research interest recently. This method can be considered as a two-factor authentication method which combines a personal password (or secret key) with a biometric to obtain a secure binary template which is used for authentication. We present novel practical security and privacy attacks against biometric hashing when the attacker is assumed to know the user's password in order to quantify the additional protection due to biometrics when the password is compromised. We present four methods that can reconstruct a biometric feature and/or the image from a hash and one method which can find the closest biometric data (i.e., face image) from a database. Two of the reconstruction methods are based on 1-bit compressed sensing signal reconstruction for which the data acquisition scenario is very similar to biometric hashing. Previous literature introduced simple attack methods, but we show that we can achieve higher level of security threats using compressed sensing recovery techniques. In addition, we present privacy attacks which reconstruct a biometric image which resembles the original image. We quantify the performance of the attacks using detection error tradeoff curves and equal error rates under advanced attack scenarios. We show that conventional biometric hashing methods suffer from high security and privacy leaks under practical attacks, and we believe more advanced hash generation methods are necessary to avoid these attacks.
Cuthbertson, Andrew G. S.; Braham, Mohamed
2018-01-01
The almond bark beetle, Scolytus amygdali Geurin-Meneville, is responsible for significant loss of fruit production in almond orchards throughout the world. Here, we studied the damage and the incidences of S. amygdali attack on two different scales: (1) at the level of a single tree; and (2) in an entire orchard. Our results revealed no differences in attack level among four orientations (east, west, south and north sides) for the whole tree. However, the bark that was facing west side in the direction of the prevailing wind was found to be the most suitable for females to initiate attack in Stratum S2. Attack distribution remains the same among different strata (strata is vertical divisions of the tree from the ground to the uppermost twigs with ~40 cm intervals). More than 50% of attack was observed in the trunk of the tree and upper strata. However, multiplication rate (number of emerged adults/maternal gallery) varies significantly between strata. In addition, we studied attack intensity (holes produced by beetle per tree) comparing it to tree morphology (flowers, leaves and circumferences) and gum deposit. Our results revealed a positive correlation between attack intensity and gum deposits, and a negative correlation between attack intensity and tree morphology. This revealed that gum on the tree was an indicator for attack intensity. A positive correlation between attack intensity and the circumference of the tree revealed that older trees were more susceptible to S. amygdali attack. These results, while preliminary, aim to help in the monitoring of S. amygdali populations before deciding to apply any control measures. PMID:29301271
Birkelund, Gunn Elisabeth; Chan, Tak Wing; Ugreninov, Elisabeth; Midtbøen, Arnfinn H; Rogstad, Jon
2018-01-24
Terrorist attacks are known to influence public opinion. But do they also change behaviour? We address this question by comparing the results of two identical randomized field experiments on ethnic discrimination in hiring that we conducted in Oslo. The first experiment was conducted before the 2011 terrorist attacks in Norway; the second experiment was conducted after the attacks. In both experiments, applicants with a typical Pakistani name were significantly less likely to get a job interview compared to those with a typical Norwegian name. But the ethnic gap in call-back rates were very similar in the two experiments. Thus, Pakistanis in Norway still experienced the same level of discrimination, despite claims that Norwegians have become more positive about migrants after the far-right, anti-migrant terrorist attacks of 2011. © London School of Economics and Political Science 2018.
Peterson, Laurel M; Helweg-Larsen, Marie; Volpp, Kevin G; Kimmel, Stephen E
2012-01-01
Risk biases such as comparative optimism (thinking one is better off than similar others) and risk inaccuracy (misestimating one's risk compared to one's calculated risk) for health outcomes are common. Little research has investigated racial or socioeconomic differences in these risk biases. Results from a survey of individuals with poorly controlled hypertension (N=813) indicated that participants showed (1) comparative optimism for heart attack risk by underestimating their heart attack risk compared to similar others, and (2) risk inaccuracy by overestimating their heart attack risk compared to their calculated heart attack risk. More highly educated participants were more comparatively optimistic because they rated their personal risk as lower; education was not related to risk inaccuracy. Neither race nor the federal poverty level was related to risk biases. Worry partially mediated the relationship between education and personal risk. Results are discussed as they relate to the existing literature on risk perception.
Drenckhan, I; Glöckner-Rist, A; Rist, F; Richter, J; Gloster, A T; Fehm, L; Lang, T; Alpers, G W; Hamm, A O; Fydrich, T; Kircher, T; Arolt, V; Deckert, J; Ströhle, A; Wittchen, H-U; Gerlach, A L
2015-06-01
Previous studies of the dimensional structure of panic attack symptoms have mostly identified a respiratory and a vestibular/mixed somatic dimension. Evidence for additional dimensions such as a cardiac dimension and the allocation of several of the panic attack symptom criteria is less consistent. Clarifying the dimensional structure of the panic attack symptoms should help to specify the relationship of potential risk factors like anxiety sensitivity and fear of suffocation to the experience of panic attacks and the development of panic disorder. In an outpatient multicentre study 350 panic patients with agoraphobia rated the intensity of each of the ten DSM-IV bodily symptoms during a typical panic attack. The factor structure of these data was investigated with nonlinear confirmatory factor analysis (CFA). The identified bodily symptom dimensions were related to panic cognitions, anxiety sensitivity and fear of suffocation by means of nonlinear structural equation modelling (SEM). CFA indicated a respiratory, a vestibular/mixed somatic and a cardiac dimension of the bodily symptom criteria. These three factors were differentially associated with specific panic cognitions, different anxiety sensitivity facets and suffocation fear. Taking into account the dimensional structure of panic attack symptoms may help to increase the specificity of the associations between the experience of panic attack symptoms and various panic related constructs.
Feng, Yi; Wratten, Steve; Sandhu, Harpinder; Keller, Michael
2015-01-01
The light brown apple moth, Epiphyas postvittana is a key pest of wine grapes in Australia. Two parasitoids, Dolichogenidea tasmanica and Therophilus unimaculatus, attack the larval stage of this pest. D. tasmanica is dominant in vineyards, whereas T. unimaculatus is mainly active in native vegetation. We sought to understand why they differ in their use of habitats. Plants are a major component of habitats of parasitoids, and herbivore-infested plants influence parasitoid foraging efficiency by their architecture and emission of volatile chemicals. We investigated how different plant species infested by E. postvittana could affect the foraging success of the two parasitoid species in both laboratory and field experiments. Four common host-plant species were selected for this study. In paired-choice experiments to determine the innate foraging preferences for plants, both parasitoid species showed differences in innate search preferences among plant species. The plant preference of D. tasmanica was altered by oviposition experience with hosts that were feeding on other plant species. In a behavioral assay, the two parasitoid species allocated their times engaged in various types of behavior differently when foraging on different plant species. For both parasitoids, parasitism on Hardenbergia violacea was the highest of the four plant species. Significantly more larvae dropped from Myoporum insulare when attacked than from the other three host-plant species, which indicates that parasitism is also affected by interactions between plants and host insects. In vineyards, parasitism by D. tasmanica was significantly lower on M. insulare than on the other three host-plant species, but the parasitism rates were similar among the other three plant species. Our results indicate that plants play a role in the habitat preferences of these two parasitoid species by influencing their foraging behavior, and are likely to contribute to their distributions among habitats.
Longhurst, Hilary J; Aberer, Werner; Bouillet, Laurence; Caballero, Teresa; Fabien, Vincent; Zanichelli, Andrea; Maurer, Marcus
2015-01-01
Phase 3 icatibant trials showed that most hereditary angioedema (HAE) (C1 inhibitor deficiency) acute attacks were treated successfully with one injection of icatibant, a selective bradykinin B2 receptor antagonist. We conducted a post hoc analysis of icatibant reinjection for HAE type I and II attacks in a real-world setting by using data from the Icatibant Outcome Survey, an ongoing observational study that monitors the safety and effectiveness of icatibant treatment. Descriptive retrospective analyses of icatibant reinjection were performed on Icatibant Outcome Survey data (February 2008 to December 2012). New attacks were defined as the onset of new symptoms after full resolution of the previous attack. Potential associations between the patient and attack characteristics and reinjection were explored by using logistic regression analysis. Icatibant was administered for 652 attacks in 170 patients with HAE type I or II. Most attacks (89.1%) were treated with a single icatibant injection. For attacks that required two or three injections, the second injection was given a median of 11.0 hours after the first injection, with 90.4% of second injections administered ≥6 hours after the first injection. Time to resolution and attack duration were significantly longer for two or three injections versus one icatibant injection (p < 0.0001 and p < 0.05, respectively). Multivariate logistic regression analysis identified sex, attack severity, and laryngeal attacks as significantly correlated with reinjection (all p ≤ 0.05). These factors did not remain predictors for reinjection when two outlier patients with distinct patterns of icatibant use were excluded. In this real-world setting, most HAE attacks resolved with one icatibant injection. There was no distinct profile for patients or attacks that required reinjection when outliers with substantially different patterns of use were excluded. Because new attacks were not distinguished from the recurrence of symptoms, reinjection rates may be slightly higher than shown here. Clinical trial identifier: NCT01034969.
Extended analysis of the Trojan-horse attack in quantum key distribution
NASA Astrophysics Data System (ADS)
Vinay, Scott E.; Kok, Pieter
2018-04-01
The discrete-variable quantum key distribution protocols based on the 1984 protocol of Bennett and Brassard (BB84) are known to be secure against an eavesdropper, Eve, intercepting the flying qubits and performing any quantum operation on them. However, these protocols may still be vulnerable to side-channel attacks. We investigate the Trojan-horse side-channel attack where Eve sends her own state into Alice's apparatus and measures the reflected state to estimate the key. We prove that the separable coherent state is optimal for Eve among the class of multimode Gaussian attack states, even in the presence of thermal noise. We then provide a bound on the secret key rate in the case where Eve may use any separable state.
Olfactory-Triggered Panic Attacks Among Khmer Refugees: A Contextual Approach
Hinton, Devon; Pich, Vuth; Chhean, Dara; Pollack, Mark
2009-01-01
One hundred Khmer refugees attending a psychiatric clinic were surveyed to determine the prevalence of olfactory-triggered panic attacks as well as certain characteristics of the episodes, including trigger (i.e. type of odor), frequency, length, somatic symptoms, and the rate of associated flashbacks and catastrophic cognitions. Forty-five of the 100 patients had experienced an olfactory-triggered panic attack in the last month. Trauma associations and catastrophic cognitions (e.g. fears of a ‘wind attack,’ ‘weakness,’ and ‘weak heart’) were common during events of olfactory panic. Several case examples are presented. A multifactorial model of the generation of olfactory panic is adduced. The therapeutic implications of this model for the treatment of olfactory panic are discussed. PMID:15446720
NASA Astrophysics Data System (ADS)
Zhou, Jian; Guo, Ying
2017-02-01
A continuous-variable measurement-device-independent (CV-MDI) multipartite quantum communication protocol is designed to realize multipartite communication based on the GHZ state analysis using Gaussian coherent states. It can remove detector side attack as the multi-mode measurement is blindly done in a suitable Black Box. The entanglement-based CV-MDI multipartite communication scheme and the equivalent prepare-and-measurement scheme are proposed to analyze the security and guide experiment, respectively. The general eavesdropping and coherent attack are considered for the security analysis. Subsequently, all the attacks are ascribed to coherent attack against imperfect links. The asymptotic key rate of the asymmetric configuration is also derived with the numeric simulations illustrating the performance of the proposed protocol.
Studies On Marine Wood-Borers Of Kali Estuary, Karwar, Karnataka, India
NASA Astrophysics Data System (ADS)
Sanagoudra, S. N.; Neelakanton, K. B.
2008-05-01
The damage caused to underwater timber construction in Marine environment by Molluscan and Crustaceans borers is well known and is of great economic significance to all maritime countries having an expanding shipping and fishing industry. Biodeterioration of marine structure, fishing crafts and living in mangrove vegetation is quite severe along the Karwar coast. The destruction is caused by atleast 14 species and 1 variety of borers belonging to the moluscan and crustacean families of the Teredinidae, Pholadidae and Sphaeromatidae. The following species have been so far recorded: Dicyathifer manni, Lyrodus pedicellaatus, L.Massa, Bankia rochi, B. campanellata, Mausitora hedleyi,Martesia striata, M.NMairi,Sphaeroma terebrans, S.annandalei, S. annandalei travancorensis. These borers, particularly, the molluscs have prodigenous fecundity producing enormous number of young ones in one brood. They have unlimited appetite attacking any type woodly materials exposed in the sea. They attack in heavy intensity and, because of their fast rate of growth, destroy timber with in a short time of few months. All this together with their other highly specialized. Adaptations make marine wood borers man's number one enemy in the sea. Along Karwar costs borer damage to timber structure is heavy throughout the year, highest in September to November and lowest in June and July. Ecological and biological aspects of the borers are also discussed. Ref: L.N.Shantakumaran, Sawant S.G., Nair N.B., Anil Angre, Nagabhushanan R. STUDIES ON MARINE WOOD-BORERS OF KALI ESTUARY, KARWAR, KARNATAKA, INDIA
Park, Hong-Kyun; Kim, Beom Joon; Han, Moon-Ku; Park, Jong-Moo; Kang, Kyusik; Lee, Soo Joo; Kim, Jae Guk; Cha, Jae-Kwan; Kim, Dae-Hyun; Nah, Hyun-Wook; Park, Tai Hwan; Park, Sang-Soon; Lee, Kyung Bok; Lee, Jun; Hong, Keun-Sik; Cho, Yong-Jin; Lee, Byung-Chul; Yu, Kyung-Ho; Oh, Mi-Sun; Kim, Joon-Tae; Choi, Kang-Ho; Kim, Dong-Eog; Ryu, Wi-Sun; Choi, Jay Chol; Johansson, Saga; Lee, Su Jin; Lee, Won Hee; Lee, Ji Sung; Lee, Juneyoung; Bae, Hee-Joon
2017-11-01
Patients with minor ischemic stroke or transient ischemic attack are at high risk of recurrent stroke and vascular events, which are potentially disabling or fatal. This study aimed to evaluate contemporary subsequent vascular event risk after minor ischemic stroke or transient ischemic attack in Korea. Patients with minor ischemic stroke or high-risk transient ischemic attack admitted within 7 days of symptom onset were identified from a Korean multicenter stroke registry database. We estimated 3-month and 1-year event rates of the primary outcome (composite of stroke recurrence, myocardial infarction, or all-cause death), stroke recurrence, a major vascular event (composite of stroke recurrence, myocardial infarction, or vascular death), and all-cause death and explored differences in clinical characteristics and event rates according to antithrombotic strategies at discharge. Of 9506 patients enrolled in this study, 93.8% underwent angiographic assessment and 72.7% underwent cardiac evaluations; 25.1% had symptomatic stenosis or occlusion of intracranial arteries. At discharge, 95.2% of patients received antithrombotics (antiplatelet polytherapy, 37.1%; anticoagulation, 15.3%) and 86.2% received statins. The 3-month cumulative event rate was 5.9% for the primary outcome, 4.3% for stroke recurrence, 4.6% for a major vascular event, and 2.0% for all-cause death. Corresponding values at 1 year were 9.3%, 6.1%, 6.7%, and 4.1%, respectively. Patients receiving nonaspirin antithrombotic strategies or no antithrombotic agent had higher baseline risk profiles and at least 1.5× higher event rates for clinical event outcomes than those with aspirin monotherapy. Contemporary secondary stroke prevention strategies based on thorough diagnostic evaluation may contribute to the low subsequent vascular event rates observed in real-world clinical practice in Korea. © 2017 American Heart Association, Inc.
Lupkovics, Géza; Motyovszki, Akos; Németh, Zoltán; Takács, István; Kenéz, András; Burkali, Bernadett; Menyhárt, Ildikó
2010-04-04
Morbidity and mortality rates of acute heart attack emphasize the significance of this patient group worldwide. The prompt and exact diagnosis and the timing of adequate therapy is crucial for this patients. Modern supply of acute heart attack includes invasive cardiology intervention, primer percutaneous coronary intervention. In year 1999, American and European recommendations suggested primer percutaneous coronary intervention only as an alternative possibility instead of thrombolysis, or in case of cardiogenic shock. 24 hour intervention unit for patients with acute heart attack was first organized in Hungary in Zala County Hospital's Cardiology Department, in year 1998. Our present study confirms, that since the intervention treatment has been introduced, average mortality rate has been reduced considerably in our area comparing to the national average. Mortality rates in West Transdanubian region and in Zalaegerszeg's micro-region were studied and compared for the period between 1997-2004, according to the data of National Public Health and Medical Officer Service. These data were then compared with the national average mortality data of Hungarian Central Statistical Office. With the help of our own computerized database we examined this period and compared the number of the completed invasive interventions to the mortality statistics. In the first full year, in 1998, we completed 82 primer and 283 elective PCIs; these number increased to 318 and 1265 by year 2005. At the same time, significant decrease of acute infarction related mortality was detectable among men of the Zalaegerszeg micro-region, comparing to the national average (p<0.001). The first Hungarian 24 hour acute heart attack intervention care improved the area's mortality statistics significantly, comparing to the national average. The skilled work of the experienced team means an important advantage to the patients in Zalaegerszeg micro-region.
Terrorism, Governance, and Development
2016-01-13
Changes in unemployment are not positively correlated with changes in insurgent attacks in several important conflicts. Data from Afghanistan, Iraq...and the Philippines show no significant relationship between unemployment and the rate of insurgent attacks that kill civilians (Berman, et al...is that gainfully employed young men are less likely to participate in political violence, implying a positive correlation between unemployment and
Güsgen, Christoph; Willms, Arnulf; Richardsen, Ines; Bieler, Dan; Kollig, Erwin; Schwab, Robert
2017-08-01
Much like other countries, Germany has recently seen terrorist attacks being planned, executed or prevented at the last minute. This highlights the need for expertise in the treatment of penetrating torso traumas by bullets or explosions. Data on the treatment of firearm injuries and, even more so, blast injuries often stems from crises or war regions. However, it is difficult to compare injuries from such regions with injuries from civilian terrorist attacks due to the ballistic body protection (protective vests, body armour) worn by soldiers. Methods An analysis was performed based on data from patients who were treated in the German Military Hospital Mazar-e Sharif for gunshots or injuries from explosions in the years 2009 to 2013. The data selection was based on patients with penetrating injuries to the thorax and/or abdomen. For better comparability with civilian attack scenarios, this study only included civilian patients without ballistic body protection (body armour, protective vests). Results Out of 117 analysed patients, 58 were affected by firearms and 59 by explosive injuries of the thorax or abdomen. 60% of patients had a thoracic injury, 69% had an abdominal injury, and 25.6% had combined thoracic-abdominal injuries. Blast injury patients were significantly more affected by thoracic trauma. As regards abdominal injuries, liver, intestinal, and colonic lesions were leading in number. Patients with blast injuries had significantly more injured organs and a significantly higher ISS averaging 29. 26% of the shot patients and 41% of the blast wounded patients received Damage Control Surgery (DCS). Despite a lower ISS, gunshot victims did not have a lower total number of operations per patient. Overall mortality was 13.7% (10.3% gunshot wounds, 16.7% blast injury). The highest mortality rate (25.7%) was recorded for patients with combined thoracoabdominal injuries (vs. 8.3% for thoracic and 8.7% for abdominal injuries). The ISS of deceased patients was significantly higher at 32.9%. Conclusion Patients without ballistic protection of the torso have high mortality rates, especially when suffering thoracoabdominal blast injuries. Blast injuries frequently lead to the DCS indication. The care of firearm and blast injury patients requires knowledge and competence in the damage control procedures for thorax and abdomen. Georg Thieme Verlag KG Stuttgart · New York.
The Aerodynamics of Axisymmetric Blunt Bodies Flying at Angle of Attack
NASA Technical Reports Server (NTRS)
Schoenenberger, Mark; Kutty, Prasad; Queen, Eric; Karlgaard, Chris
2014-01-01
The Mars Science Laboratory entry capsule is used as an example to demonstrate how a blunt body of revolution must be treated as asymmetric in some respects when flying at a non-zero trim angle of attack. A brief description of the axisymmetric moment equations are provided before solving a system of equations describing the lateral-directional moment equations for a blunt body trimming at an angle of attack. Simplifying assumptions are made which allow the solution to the equations to be rearranged to relate the roll and yaw stability with sideslip angle to the frequency of oscillation of the vehicle body rates. The equations show that for a blunt body the roll and yaw rates are in phase and proportional to each other. The ratio of the rates is determined by the static stability coefficients and mass properties about those axes. A trajectory simulation is used to validate the static yaw stability parameter identification equation and a simple method of identifying the oscillation frequency from the body rates. The approach is shown to successfully extract the modeled yaw stability coefficient along a simulated Mars entry in agreement with data earlier analysis of MSL flight data.
A Comparative Study of Anomaly Detection Techniques for Smart City Wireless Sensor Networks.
Garcia-Font, Victor; Garrigues, Carles; Rifà-Pous, Helena
2016-06-13
In many countries around the world, smart cities are becoming a reality. These cities contribute to improving citizens' quality of life by providing services that are normally based on data extracted from wireless sensor networks (WSN) and other elements of the Internet of Things. Additionally, public administration uses these smart city data to increase its efficiency, to reduce costs and to provide additional services. However, the information received at smart city data centers is not always accurate, because WSNs are sometimes prone to error and are exposed to physical and computer attacks. In this article, we use real data from the smart city of Barcelona to simulate WSNs and implement typical attacks. Then, we compare frequently used anomaly detection techniques to disclose these attacks. We evaluate the algorithms under different requirements on the available network status information. As a result of this study, we conclude that one-class Support Vector Machines is the most appropriate technique. We achieve a true positive rate at least 56% higher than the rates achieved with the other compared techniques in a scenario with a maximum false positive rate of 5% and a 26% higher in a scenario with a false positive rate of 15%.
A Comparative Study of Anomaly Detection Techniques for Smart City Wireless Sensor Networks
Garcia-Font, Victor; Garrigues, Carles; Rifà-Pous, Helena
2016-01-01
In many countries around the world, smart cities are becoming a reality. These cities contribute to improving citizens’ quality of life by providing services that are normally based on data extracted from wireless sensor networks (WSN) and other elements of the Internet of Things. Additionally, public administration uses these smart city data to increase its efficiency, to reduce costs and to provide additional services. However, the information received at smart city data centers is not always accurate, because WSNs are sometimes prone to error and are exposed to physical and computer attacks. In this article, we use real data from the smart city of Barcelona to simulate WSNs and implement typical attacks. Then, we compare frequently used anomaly detection techniques to disclose these attacks. We evaluate the algorithms under different requirements on the available network status information. As a result of this study, we conclude that one-class Support Vector Machines is the most appropriate technique. We achieve a true positive rate at least 56% higher than the rates achieved with the other compared techniques in a scenario with a maximum false positive rate of 5% and a 26% higher in a scenario with a false positive rate of 15%. PMID:27304957
Describing a multitrophic plant-herbivore-parasitoid system at four spatial scales
NASA Astrophysics Data System (ADS)
Cuautle, M.; Parra-Tabla, V.
2014-02-01
Herbivore-parasitoid interactions must be studied using a multitrophic and multispecies approach. The strength and direction of multiple effects through trophic levels may change across spatial scales. In this work, we use the herbaceous plant Ruellia nudiflora, its moth herbivore Tripudia quadrifera, and several parasitoid morphospecies that feed on the herbivore to answer the following questions: Do herbivore and parasitoid attack levels vary depending on the spatial scale considered? With which plant characteristics are the parasitoid and the herbivore associated? Do parasitoid morphospecies vary in the magnitude of their positive indirect effect on plant reproduction? We evaluated three approximations of herbivore and parasitoid abundance (raw numbers, ratios, and attack rates) at four spatial scales: regional (three different regions which differ in terms of abiotic and biotic characteristics); population (i.e. four populations within each region); patch (four 1 m2 plots in each population); and plant level (using a number of plant characteristics). Finally, we determined whether parasitoids have a positive indirect effect on plant reproductive success (seed number). Herbivore and parasitoid numbers differed at three of the spatial scales considered. However, herbivore/fruit ratio and attack rates did not differ at the population level. Parasitoid/host ratio and attack rates did not differ at any scale, although there was a tendency of a higher attack in one region. At the plant level, herbivore and parasitoid abundances were related to different plant traits, varying the importance and the direction (positive or negative) of those traits. In addition, only one parasitoid species (Bracon sp.) had a positive effect on plant fitness saving up to 20% of the seeds in a fruit. These results underline the importance of knowing the scales that are relevant to organisms at different trophic levels and distinguish between the specific effects of species.
F-18 HARV yaw rate expansion flight #125 with Inverted Recovery
NASA Technical Reports Server (NTRS)
1991-01-01
NASA's Dryden Flight Research Center, Edwards, CA, used an F-18 Hornet fighter aircraft as its High Angle-of-Attack (Alpha) Research Vehicle (HARV) in a three-phased flight research program lasting from April 1987 until September 1996. The aircraft completed 385 research flights and demonstrated stabilized flight at angles of attack between 65 and 70 degrees using thrust vectoring vanes, a research flight control system, and (eventually) forebody strakes (hinged structures on the forward side of the fuselage to provide control by interacting with vortices, generated at high angles of attack, to create side forces). This combination of technologies provided carefree handling of a fighter aircraft in a part of the flight regime that was otherwise very dangerous. Flight research with the HARV increased our understanding of flight at high angles of attack (angle of the wings with respect to the direction in which the aircraft was heading), enabling designers of U.S. fighter aircraft to design airplanes that will fly safely in portions of the flight envelope that pilots previously had to avoid. Flight 125 with the HARV involved yaw rate expansion up to 50 degrees per second (moving the nose to the left or right at that rate). NASA research pilot Ed Schneider was the pilot, and the purpose of the flight was to look at the spin characteristics of the HARV. The sequence in this particular video clip includes the first and second maneuvers in the flight. On the first maneuver, the pilot attempted to achieve a yaw rate of 40 degrees per second and actually went to 47 degrees. The spin was oscillatory in pitch (up and down) and roll (rotating around the longitudinal axis). Recovery was normal. On the second maneuver of the flight in which Schneider tried to achieve a yaw rate of 40 degrees per second, the aircraft overshot to 54 degrees per second during an oscillatory spin. In the course of the recovery, the aircraft rolled after a large sideslip buildup. Moderate aft stick application to attain a positive angle of attack resulted in an easy recovery.
Vilella, Anna; Serrano, Beatriz; Marcos, Maria A; Serradesanferm, Anna; Mensa, Josep; Hayes, Edward; Anton, Andres; Rios, Jose; Pumarola, Tomas; Trilla, Antoni
2012-01-01
From the beginning of the influenza pandemic until the time the outbreak described here was detected, 77,201 cases of pandemic influenza A(H1N1) with 332 deaths had been reported worldwide, mostly in the United States and Mexico. All of the cases reported in Spain until then had a recent history of travel to Mexico, the Dominican Republic, or Chile. We describe an outbreak of influenza among medical students who traveled from Spain to the Dominican Republic in June 2009. We collected diagnostic samples and clinical histories from consenting medical students who had traveled to the Dominican Republic and from their household contacts after their return to Spain. Of 113 students on the trip, 62 (55%) developed symptoms; 39 (45%) of 86 students tested had laboratory evidence of influenza A(H1N1) infection. Most students developed symptoms either just before departure from the Dominican Republic or within days of returning to Spain. The estimated secondary attack rate of influenza-like illness among residential contacts of ill students after return to Spain was 2.1%. The attack rate of influenza A(H1N1) can vary widely depending on the circumstances of exposure. We report a high attack rate among a group of traveling medical students but a much lower secondary attack rate among their contacts after return from the trip. These findings may aid the development of recommendations to prevent influenza. © 2011 International Society of Travel Medicine.
[Outbreak of whooping cough with a high attack rate in well-vaccinated children and adolescents].
Torres, Joan; Godoy, Pere; Artigues, Antoni; Codina, Gemma; Bach, Pilar; Mòdol, Irma; Duró, Maria Àngels; Trilla, Carme
2011-10-01
Whooping cough is a re-emerging disease. We describe the investigation of an outbreak of whooping cough and the measures of control adopted. The event was reconstructed through a longitudinal study of incidence. In addition to the notified cases, an active search from the list of those who attended summer camps was made through telephone calls. An epidemiological survey was applied to all cases; vaccination history was confirmed with computerised clinical history and the obtaining of samples for analytical confirmation was proposed. The description of the outbreak was made through the epidemic curve, the attack rates, the relative risk and the linear trend by ages and the vaccination coverage. Of the 30 cases that appeared, 22 (73.3%) were among the members of the summer camps. In these, the attack rate was 21.8%, 26.7% among the children and adolescents increasing linearly with the age. The large majority (86.4%) of this last group were correctly vaccinated, including the fifth dose at the age of 4-6 years. Through the meticulous study of the first cases and the telephone calls to those who attended the summer camp, 90% of the cases of the outbreak were detected. The active search of cases allowed an outbreak of whooping cough with a high attack rate to be studied in children and adolescents with a high vaccination coverage, and the application of control measures that contributed to stop the outbreak. Copyright © 2010 Elsevier España, S.L. All rights reserved.
Aversive imagery in panic disorder: agoraphobia severity, comorbidity, and defensive physiology.
McTeague, Lisa M; Lang, Peter J; Laplante, Marie-Claude; Bradley, Margaret M
2011-09-01
Panic is characterized as a disorder of interoceptive physiologic hyperarousal, secondary to persistent anticipation of panic attacks. The novel aim of this research was to investigate whether severity of agoraphobia within panic disorder covaries with the intensity of physiological reactions to imagery of panic attacks and other aversive scenarios. A community sample of principal panic disorder (n = 112; 41 without agoraphobia, 71 with agoraphobia) and control (n = 76) participants imagined threatening and neutral events while acoustic startle probes were presented and the eye-blink response (orbicularis oculi) recorded. Changes in heart rate, skin conductance level, and facial expressivity were also measured. Overall, panic disorder patients exceeded control participants in startle reflex and heart rate during imagery of standard panic attack scenarios, concordant with more extreme ratings of aversion and emotional arousal. Accounting for the presence of agoraphobia revealed that both panic disorder with and without situational apprehension showed the pronounced heart rate increases during standard panic attack imagery observed for the sample as a whole. In contrast, startle potentiation to aversive imagery was more robust in those without versus with agoraphobia. Reflex diminution was most dramatic in those with the most pervasive agoraphobia, coincident with the most extreme levels of comorbid broad negative affectivity, disorder chronicity, and functional impairment. Principal panic disorder may represent initial, heightened interoceptive fearfulness and concomitant defensive hyperactivity, which through progressive generalization of anticipatory anxiety ultimately transitions to a disorder of pervasive agoraphobic apprehension and avoidance, broad dysphoria, and compromised mobilization for defensive action. Copyright © 2011 Society of Biological Psychiatry. Published by Elsevier Inc. All rights reserved.
Aversive imagery in panic disorder: Agoraphobia severity, comorbidity and defensive physiology
McTeague, Lisa M.; Lang, Peter J.; Laplante, Marie-Claude; Bradley, Margaret M.
2011-01-01
Background Panic is characterized as a disorder of interoceptive physiological hyperarousal, secondary to persistent anticipation of panic attacks. The novel aim of the present research was to investigate whether severity of agoraphobia within panic disorder covaries with the intensity of physiological reactions to imagery of panic attacks and other aversive scenarios. Methods A community sample of principal panic disorder (n=112; 41 without agoraphobia, 71 with agoraphobia) and control (n=76) participants imagined threatening and neutral events while acoustic startle probes were presented and the eye-blink response (orbicularis oculi) recorded. Changes in heart rate, skin conductance level, and facial expressivity were also measured. Results Overall panic disorder patients exceeded controls in startle reflex and heart rate during imagery of standard panic attack scenarios, concordant with more extreme ratings of aversion and emotional arousal. Accounting for the presence of agoraphobia revealed that both panic disorder with and without situational apprehension showed the pronounced heart rate increases during standard panic attack imagery observed for the sample as a whole. In contrast, startle potentiation to aversive imagery was more robust in those without versus with agoraphobia. Reflex diminution was most dramatic in those with the most pervasive agoraphobia, coincident with the most extreme levels of comorbid broad negative affectivity, disorder chronicity, and functional impairment. Conclusions Principal panic disorder may represent initial, heightened interoceptive fearfulness and concomitant defensive hyperactivity, which through progressive generalization of anticipatory anxiety, ultimately transitions to a disorder of pervasive agoraphobic apprehension and avoidance, broad dysphoria and compromised mobilization for defensive action. PMID:21550590
Automobile shredded residue valorisation by hydrometallurgical metal recovery.
Granata, Giuseppe; Moscardini, Emanuela; Furlani, Giuliana; Pagnanelli, Francesca; Toro, Luigi
2011-01-15
The aim of this work was developing a hydrometallurgical process to recover metals from automobile shredded residue (or car fluff). Automobile shredded residue (ASR) was characterised by particle size distribution, total metal content and metal speciation in order to guide the choice of target metals and the operating conditions of leaching. Characterisation results showed that Fe is the most abundant metal in the waste, while Zn was the second abundant metal in the fraction with diameter lower than 500 μm. Sequential extractions denoted that Zn was easily extractable by weak acid attack, while Fe and Al required a strong acid attack to be removed. In order to recover zinc from <500 μm fraction leaching tests were operated using acetic acid, sulphuric acid and sodium hydroxide at different concentrations. Sulphuric acid determined the highest zinc extraction yield, while acetic acid determined the highest zinc extractive selectivity. Sodium hydroxide promoted an intermediate situation between sulphuric and acetic acid. Zn recovery by electro winning using acetic leach liquor determined 95% of Zn electro deposition yield in 1h, while using sulphuric leach liquor 40% yield in 1h and 50% yield in 2h were obtained. Simulation results showed that the sulphuric leaching process was more attractive than acetic leaching process. Copyright © 2010 Elsevier B.V. All rights reserved.
NASA Astrophysics Data System (ADS)
Yamaguchi, Keisuke; Ueda, Takao; Nanasawa, Akira
As a new rehabilitation technique for recovery both of loading ability and durability of concrete structures deteriorated by chloride attack, desalination (electrochemical chloride removal technique from concrete) using CFRP composite electrode bonding to concrete has been developed. In this study, basic application was tried using small RC specimens, and also application to the large-scale RC beams deteriorated by the chloride attack through the long-term exposure in the outdoors was investigated. As the result of bending test of treated specimens, the decrease of strengthening effect with the electrochemical treatment was observed in the case of small specimens using low absorption rate resin for bonding, on the other hand, in the case of large-scale RC beam using 20% absorption rate resin for bonding CFRP composite electrode, enough strengthening effect was obtained by the bending failure of RC beam with the fracture of CFRP board.
Experimental quantum key distribution with finite-key security analysis for noisy channels.
Bacco, Davide; Canale, Matteo; Laurenti, Nicola; Vallone, Giuseppe; Villoresi, Paolo
2013-01-01
In quantum key distribution implementations, each session is typically chosen long enough so that the secret key rate approaches its asymptotic limit. However, this choice may be constrained by the physical scenario, as in the perspective use with satellites, where the passage of one terminal over the other is restricted to a few minutes. Here we demonstrate experimentally the extraction of secure keys leveraging an optimal design of the prepare-and-measure scheme, according to recent finite-key theoretical tight bounds. The experiment is performed in different channel conditions, and assuming two distinct attack models: individual attacks or general quantum attacks. The request on the number of exchanged qubits is then obtained as a function of the key size and of the ambient quantum bit error rate. The results indicate that viable conditions for effective symmetric, and even one-time-pad, cryptography are achievable.
Forebody tangential blowing for control at high angles of attack
NASA Technical Reports Server (NTRS)
Kroo, I.; Rock, S.; Roberts, L.
1991-01-01
A feasibility study to determine if the use of tangential leading edge blowing over the forebody could produce effective and practical control of the F-18 HARV aircraft at high angles of attack was conducted. A simplified model of the F-18 configuration using a vortex-lattice model was developed to obtain a better understanding of basic aerodynamic coupling effects and the influence of forebody circulation on lifting surface behavior. The effect of tangential blowing was estimated using existing wind tunnel data on normal forebody blowing and analytical studies of tangential blowing over conical forebodies. Incorporation of forebody blowing into the flight control system was investigated by adding this additional yaw control and sideforce generating actuator into the existing F-18 HARV simulation model. A control law was synthesized using LQG design methods that would schedule blowing rates as a function of vehicle sideslip, angle of attack, and roll and yaw rates.
Variables affecting efficiency of molasses fermentation wastewater ozonation.
Coca, M; Peña, M; González, G
2005-09-01
The main operating variables affecting ozonation efficiencies of wastewater from beet molasses alcoholic fermentation have been studied. Semibatch experiments have been performed in order to analyze the influence of pH, bicarbonate ion, temperature and stirring rate on color and organic matter removals. The efficiencies were similar regardless of the pH, which indicates that direct reactions of ozone with wastewater organics were predominant to radical reactions. Gel permeation chromatography confirmed the reduction in the concentration of organics absorbing light at 475 nm after ozonation. The elimination of bicarbonate ion, strong inhibitor of hydroxyl radical reactions, yielded an improvement in both color and COD reduction efficiencies. Acidification for removing bicarbonate ions produced a shift of colored compounds to smaller molecular weights. The highest efficiencies were achieved at 40 degrees C. Color and COD reductions at 40 degrees C were about 90% and 37%, respectively. In no case, the percentage of TOC removed was higher than 10-15%. Stirring rate had a slightly positive effect during the first stage of the ozonation showing that mass transfer played a role only during the initial reaction phase when direct attack of ozone molecules to aromatic/olefinic structures of colored substances was the predominant pathway.
Magnus effects at high angles of attack and critical Reynolds numbers
NASA Technical Reports Server (NTRS)
Seginer, A.; Ringel, M.
1983-01-01
The Magnus force and moment experienced by a yawed, spinning cylinder were studied experimentally in low speed and subsonic flows at high angles of attack and critical Reynolds numbers. Flow-field visualization aided in describing a flow model that divides the Magnus phenomenon into a subcritical region, where reverse Magnus loads are experienced, and a supercritical region where these loads are not encountered. The roles of the spin rate, angle of attack, and crossflow Reynolds number in determining the boundaries of the subcritical region and the variations of the Magnus loads were studied.
Impingement of Water Droplets on NACA 65A004 Airfoil at 8 deg Angle of Attack
NASA Technical Reports Server (NTRS)
Brun, R. J.; Gallagher, H. M.; Vogt, D. E.
1954-01-01
The trajectories of droplets in the air flowing past an NACA 65AO04 airfoil at an angle of attack of 8 deg were determined.. The amount of water in droplet form impinging on the airfoil, the area of droplet impingement, and the rate of droplet impingement per unit area on the airfoil surface were calculated from the trajectories and presented to cover a large range of flight and atmospheric conditions. These impingement characteristics are compared briefly with those previously reported for the same airfoil at an angle of attack of 4 deg.
Subsonic and transonic dynamic stability characteristics of the space shuttle launch vehicle
NASA Technical Reports Server (NTRS)
Freeman, D. C., Jr.; Boyden, R. P.; Davenport, E. E.
1976-01-01
An investigation has been conducted to determine the subsonic and transonic dynamic stability characteristics of a 0.015 scale model of the space shuttle launch vehicle. These tests were conducted in the Langley 8-foot transonic pressure tunnel over a Mach number range from 0.3 to 1.2. Forced oscillation equipment was used to determine the damping characteristics of several configurations about all three axes. The test results show that the model exhibited positive damping in pitch except at the highest Mach number (1.2) where there was a region of negative damping at 2 deg angle of attack. The yawing oscillation tests show that the model exhibited nonlinearities and negative damping at Mach numbers of 0.3 and 0.6. The model exhibited positive roll damping throughout the test angle of attack and Mach range.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Li, Hong-Wei; Zhengzhou Information Science and Technology Institute, Zhengzhou, 450004; Wang, Shuang
2011-12-15
It is well known that the unconditional security of quantum-key distribution (QKD) can be guaranteed by quantum mechanics. However, practical QKD systems have some imperfections, which can be controlled by the eavesdropper to attack the secret key. With current experimental technology, a realistic beam splitter, made by fused biconical technology, has a wavelength-dependent property. Based on this fatal security loophole, we propose a wavelength-dependent attacking protocol, which can be applied to all practical QKD systems with passive state modulation. Moreover, we experimentally attack a practical polarization encoding QKD system to obtain all the secret key information at the cost ofmore » only increasing the quantum bit error rate from 1.3 to 1.4%.« less
Stall induced instability of a teetered rotor
NASA Astrophysics Data System (ADS)
Glasgow, J. C.; Corrigan, R. D.
Recent tests on the 38m Mod-0 horizontal experimental wind turbine yielded quantitative information on stall induced instability of a teetered rotor. Tests were conducted on rotor blades with NACA 230 series and NACA 643-618 airfoils at low rotor speeds to produce high angles of attack at relatively low wind speeds and power levels. The behavior of the rotor shows good agreement with predicted rotor response based on blade angle of attack calculations and airfoil section properties. The untwisted blades with the 64 series airfoil sections had a slower rate of onset of rotor instability when compared with the twisted 230 series blades, but high teeter angles and teeter stop impacts were experienced with both rotors as wind speeds increased to produce high angles of attack on the outboard portion of the blade. The relative importance of blade twist and airfoil section stall characteristics on the rate of onset of rotor unstability with increasing wind speed was not established however. Blade pitch was shown to be effective in eliminating rotor instability at the expense of some loss in rotor performance near rated wind speed.
Lindstrom, A.; Gill, Robert E.; Jamieson, S.E.; McCaffery, B.; Wennerberg, Liv; Wikelski, M.; Klaassen, M.
2011-01-01
Making a detour can be advantageous to a migrating bird if fuel-deposition rates at stopover sites along the detour are considerably higher than at stopover sites along a more direct route. One example of an extensive migratory detour is that of the Sharp-tailed Sandpiper (Calidris acuminata), of which large numbers of juveniles are found during fall migration in western Alaska. These birds take a detour of 1500-3400 km from the most direct route between their natal range in northeastern Siberia and nonbreeding areas in Australia. We studied the autumnal fueling rates and fuel loads of 357 Sharp-tailed Sandpipers captured in western Alaska. In early September the birds increased in mass at a rate of only 0.5% of lean body mass day?1. Later in September, the rate of mass increase was about 6% of lean body mass day?1, among the highest values found among similar-sized shorebirds around the world. Some individuals more than doubled their body mass because of fuel deposition, allowing nonstop flight of between 7100 and 9800 km, presumably including a trans-oceanic flight to the southern hemisphere. Our observations indicated that predator attacks were rare in our study area, adding another potential benefit of the detour. We conclude that the most likely reason for the Alaskan detour is that it allows juvenile Sharp-tailed Sandpipers to put on large fuel stores at exceptionally high rates. Copyright ?? The Cooper Ornithological Society 2011.
Action mechanism of tyrosinase on meta- and para-hydroxylated monophenols.
Fenoll, L G; Rodríguez-López, J N; Varón, R; García-Ruiz, P A; García-Cánovas, F; Tudela, J
2000-04-01
The relationship between the structure and activity of meta- and para-hydroxylated monophenols was studied during their tyrosinase-catalysed hydroxylation and the rate-limiting steps of the reaction mechanism were identified. The para-hydroxylated substrates permit us to study the effect of a substituent (R) in the carbon-1 position (C-1) of the benzene ring on the nucleophilic attack step, while the meta group permits a similar study of the effect on the electrophilic attack step. Substrates with a -OCH3 group on C-1, as p-hydroxyanisol (4HA) and m-hydroxyanisol (3HA), or with a -CH2OH group, as p-hydroxybenzylalcohol (4HBA) and m-hydroxybenzylalcohol (3HBA), were used because the effect of the substituent (R) size was assumed to be similar. However, the electron-donating effect of the -OCH3 group means that the carbon-4 position (C-4) is favoured for nucleophilic attack (para-hydroxylated substrates) or for electrophilic attack (meta-hydroxylated substrates). The electron-attracting effect of the -CH2OH group has the opposite effect, hindering nucleophilic (para) or electrophilic (meta) attack of C-4. The experimental data point to differences between the maximum steady-state rate (V(M)Max) of the different substrates, the value of this parameter depends on the nucleophilic and electrophilic attack. However, differences are greatest in the Michaelis constants (K(M)m), with the meta-hydroxylated substrates having very large values. The catalytic efficiency k(M)cat/K(M)m is much greater for thepara-hydroxylated substrates although it varies greatly between one substrate and the other. However, it varies much less in the meta-hydroxylated substrates since this parameter describes the power of the nucleophilic attack, which is weaker in the meta OH. The large increase in the K(M)m of the meta-hydroxylated substrates might suggest that the phenolic OH takes part in substrate binding. Since this is a weaker nucleophil than the para-hydroxylated substrates, the binding constant decreases, leading to an increase in K(M)m. The catalytic efficiency of tyrosinase on a monophenol (para or meta) is directly related to the nucleophilic power of the oxygen of the phenolic OH. The oxidation step is not limiting since if this were the case, the para and meta substrates would have the same V(M)max. The small difference between the absolute values of V(M)max suggests that the rate constants of the nucleophilic and electrophilic attacks are on the same order of magnitude.
Regression methods for spatially correlated data: an example using beetle attacks in a seed orchard
Preisler Haiganoush; Nancy G. Rappaport; David L. Wood
1997-01-01
We present a statistical procedure for studying the simultaneous effects of observed covariates and unmeasured spatial variables on responses of interest. The procedure uses regression type analyses that can be used with existing statistical software packages. An example using the rate of twig beetle attacks on Douglas-fir trees in a seed orchard illustrates the...
Aircrew Training Devices: Fidelity Features.
1981-01-01
providing artificial cues for glideslope and lineup . He found that an adaptive strategy for using augmenting cues, where the presence or absence of the...with continuously available sources of augmented information for lineup and glideslope in the simulatot, they performed more poorly on test trials...flown: fighting wing, barrel roll attack, sequential attack, free engagement, aileron roll and loop. Results indicated higher ratings of realism for
Michael I. Haverty; Patrick J. Shea; John M. Wenz
1996-01-01
The effectiveness of registered application rates of the insecticide metasystox-R applied with Mauget tree injectors (INJECT-A-CIDE) was assessed in two strategies: (1) treatment of trees before western pine beetle attack (preventive treatment), and (2) treatment of trees after attack by western pine beetle (remedial treatment) for protection of individual, high-value...
ERIC Educational Resources Information Center
Wise, Meg
Heart attacks are the leading cause of death in the United States, and cardiac rehabilitation, a form of post-MI (myocardial infarction) education, accounts for at most 20% of improved lifestyle behavior that can effectively manage symptoms, delay or prevent subsequent attacks, and lower mortality and morbidity rates. In an attempt to improve…
Blanchard, Edward B; Kuhn, Eric; Rowell, Dianna L; Hickling, Edward J; Wittrock, David; Rogers, Rebecca L; Johnson, Michelle R; Steckler, Debra C
2004-02-01
From mid-October 2001 through the end of November 2001, we collected fairly large sets of questionnaires from undergraduates at three public universities (Albany, NY, n = 507, Augusta, GA, n = 336, Fargo, ND, n = 526 ) to assess rate of acute stress disorder (ASD) and level of ASD symptoms following the September 11th attacks, rate of current posttraumatic stress disorder (PTSD) and level of PTSD symptoms, and current level of depressive symptoms resulting from the September 11th attacks. We also gathered information on exposure to media coverage of the attacks, connectedness to the World Trade Center (WTC) and personnel there, and degree of engagement in reparative acts such as giving blood, attending vigils. We found higher levels of ASD, ASD symptoms, PTSD and PTSD symptoms as a function of geographical proximity to New York City (and within the Albany site, proximity of students' homes) and gender. Exposure (hours of TV watched) was a predictor in some instances as was connectedness to WTC victims. ASD symptoms were the strongest predictor of subsequent PTSD symptoms. Path models accounted for over 60% of the variance in PTSD symptoms.
Skills Associated with Line Breaks in Elite Rugby Union
den Hollander, Steve; Brown, James; Lambert, Michael; Treu, Paul; Hendricks, Sharief
2016-01-01
The ability of the attacking team to break through the defensive line is a key indicator of success as it creates opportunities to score tries. The aim of this study was to analyse line breaks and identify the associated skills and playing characteristics. The 2013 Super Rugby season (125 games) was analysed, in which 362 line breaks were identified and coded using variables that assessed team patterns and non-contact attacking skills in the phases preceding the line break. There was an average of 3 line breaks per game, with 39% of line breaks resulting in a try. Line breaks occurred when the ball-carrier was running fast [61%, x2(4) = 25.784, p = 0.000, Cramer’s v = 0.1922, weak]. At a moderate distance, short lateral passes (19%) and skip passes (15%) attributed to the highest percentage of line breaks [x2(26) = 50.899, p = 0.036, Cramer’s v = 0.2484, moderate]. Faster defensive line speeds resulted in more line breaks [x2(12) = 61.703, p < 0.001, Cramer’s v = 0.3026, moderate]. Line breaks are associated with overall team success and try scoring opportunities. Awareness of the defenders line speed and depth, fast running speed when receiving the ball and quick passing between attackers to the outside backs creates line break opportunities. During training, coaches should emphasise the movement speed of the ball between attackers and manipulate the speed and distance of the defenders. Key points Line breaks are associated with overall team success and try scoring opportunities. Awareness of the defenders line speed and depth, fast running speed when receiving the ball and quick passing between attackers to the outside backs creates line break opportunities During training, coaches should emphasise the movement speed of the ball between attackers and manipulate the speed and distance of the defenders. PMID:27803629
Possible relationships between trichinellosis and abnormal behavior in bears
Worley, David E.; Greer, Kenneth R.; Palmisciano, Daniel A.
1983-01-01
Data compiled from parasite studies of grizzly bears (Ursus arctos) and black bears (U. americanus) in the Yellowstone and Glacier National Park populations and surrounding areas of Montana and Wyoming during 1969-79 are reviewed with reference to the possible influence of infection with the muscleworm Trichinella sp. on bear behavior. In grizzly bears, the high prevalence of this parasite (61% of 254 bears infected), the elevated larval concentrations in sensitive anatomical sites such as the tongue (average, 51 larvae per gram of tissue), and the chronic nature of bear infections as indicated by the tendency for highest infection rates to occur in older age classes (> 16 yrs.), suggest a potential behavior-modifying effect might exist. However, retrospective analysis of recent human attacks by 4 grizzlies and 2 black bears in the northern Rocky Mountain region failed to demonstrate a consistent connection between erratic conduct and levels of Trichinella larvae (trichinae) in bear tissues. Clinical similarities of trichinellosis in bears and humans are hypothesized, and possible behavioral effects of ursine trichinellosis are discussed.
IHEKWEAZU, C.; CARROLL, K.; ADAK, B.; SMITH, G.; PRITCHARD, G. C.; GILLESPIE, I. A.; VERLANDER, N. Q.; HARVEY-VINCE, L.; REACHER, M.; EDEGHERE, O.; SULTAN, B.; COOPER, R.; MORGAN, G.; KINROSS, P. T. N.; BOXALL, N. S.; IVERSEN, A.; BICKLER, G.
2012-01-01
SUMMARY In the summer of 2009, an outbreak of verocytotoxigenic Escherichia coli O157 (VTEC O157) was identified in visitors to a large petting farm in South East England. The peak attack rate was 6/1000 visitors, and highest in those aged <2 years (16/1000). We conducted a case-control study with associated microbiological investigations, on human, animal and environmental samples. We identified 93 cases; 65 primary, 13 secondary and 15 asymptomatic. Cases were more likely to have visited a specific barn, stayed for prolonged periods and be infrequent farm visitors. The causative organism was identified as VTEC O157 PT21/28 with the same VNTR profile as that isolated in faecal specimens from farm animals and the physical environment, mostly in the same barn. Contact with farm livestock, especially ruminants, should be urgently reviewed at the earliest suspicion of a farm-related VTEC O157 outbreak and appropriate risk management procedures implemented without delay. PMID:22093751
Bioconversion of sugar cane crop residues with white-rot fungiPleurotus sp.
Ortega, G M; Martínez, E O; Betancourt, D; González, A E; Otero, M A
1992-07-01
Four mushroom strains ofPleurotus spp. were cultivated on sugar cane crop residues for 30 days at 26°C. Biochemical changes affected the substrate as a result of fungal growth, in terms of nitrogen, lignin, cellulose and hemicellulose contents. All strains showed a strong ligninolytic activity together with variable cellulolytic and xylanolytic action.Pleurotus sajor-caju attacked lignin and cellulose at the same rate, showing a degradation of 47% and 55%, respectively. A better balance was shown by theP. ostreatus-P. pulmonarius hybrid, which exhibited the poorest cellulolytic action (39%) and the highest ligninolytic activity (67%). The average composition of mushroom fruit bodies, in terms of nitrogen, carbohydrates, fats and amino acid profiles, was determined. Crude protein and total carbohydrate varied from 23% to 33% and 36% to 68% of dry matter, respectively. Fat ranged from 3.3% to 4.7% and amino acid content from 12.2% to 22.2%. Slight evidence for a nitrogen fixing capability was encountered in the substrate to fruit body balance.
Morris, J G; Snyder, J D; Wilson, R; Feldman, R A
1983-01-01
Data were obtained for the 96 hospitalized cases of infant botulism reported to the Centers for Disease Control between 1976-1980 from all states other than California. Forty-one cases were associated with Clostridium botulinum type A, 53 with type B, one with type F, and one with a strain of C. botulinum capable of producing both type B and F toxin. Cases occurred in 25 states; the disease was more common in the western part of the United States, with the highest attack rates reported for Utah and New Mexico. Birth-weights of hospitalized infants with infant botulism tended to be high compared with birth-weights in the United States population. Mothers of infants with infant botulism tended to be older and better educated than mothers in the general population. Seventy per cent of infants had been predominantly breast-fed; breast-feeding in type B cases was associated with a significantly older age at onset of illness. Images FIGURE 2 PMID:6638233
Wang, Lei; Chen, Season S; Tsang, Daniel C W; Poon, Chi Sun; Ok, Yong Sik
2017-05-01
Considering the resource waste and environmental burden for timber and plastic materials ending up at landfills, this study proposed upcycling wood and plastic waste into value-added wood-plastic composites (WPCs), complying with the standard requirements of flexural strength, thickness swelling, water absorption and thermal insulation. Biological deterioration is a major concern of WPCs. Bacterial survival, fungal attack and algal growth of bactericide-treated WPCs were holistically analysed. Melamine resin was adopted for impregnating anti-microbial agents on the surface. All the agents showed excellent bactericidal rate (Escherichia coli), yet poly-diallyl-dimethyl-ammonium chloride (PolyDADMAC) and silver had the lowest minimum inhibitory concentrations. In terms of weight loss and strength reduction due to fungal decay (Coriolus versicolor), PolyDADMAC, silver and cetyltrimethylammonium bromide (CTAB) imparted the highest resistance on the WPCs. Moreover, PolyDADMAC and copper provided the most protection against algal growth (Chlorella vulgaris), and the former presented durable inhibitory effect. This study presents a value-added solution to wood/plastic waste recycling.
Ihekweazu, C; Carroll, K; Adak, B; Smith, G; Pritchard, G C; Gillespie, I A; Verlander, N Q; Harvey-Vince, L; Reacher, M; Edeghere, O; Sultan, B; Cooper, R; Morgan, G; Kinross, P T N; Boxall, N S; Iversen, A; Bickler, G
2012-08-01
In the summer of 2009, an outbreak of verocytotoxigenic Escherichia coli O157 (VTEC O157) was identified in visitors to a large petting farm in South East England. The peak attack rate was 6/1000 visitors, and highest in those aged <2 years (16/1000). We conducted a case-control study with associated microbiological investigations, on human, animal and environmental samples. We identified 93 cases; 65 primary, 13 secondary and 15 asymptomatic. Cases were more likely to have visited a specific barn, stayed for prolonged periods and be infrequent farm visitors. The causative organism was identified as VTEC O157 PT21/28 with the same VNTR profile as that isolated in faecal specimens from farm animals and the physical environment, mostly in the same barn. Contact with farm livestock, especially ruminants, should be urgently reviewed at the earliest suspicion of a farm-related VTEC O157 outbreak and appropriate risk management procedures implemented without delay.
Spatio-Temporal Synchrony of Influenza in Cities across Israel: The “Israel Is One City” Hypothesis
Barnea, Oren; Huppert, Amit; Katriel, Guy; Stone, Lewi
2014-01-01
We analysed an 11-year dataset (1998–2009) of Influenza-Like Illness (ILI) that was based on surveillance of ∽23% of Israel's population. We examined whether the level of synchrony of ILI epidemics in Israel's 12 largest cities is high enough to view Israel as a single epidemiological unit. Two methods were developed to assess the synchrony: (1) City-specific attack rates were fitted to a simple model in order to estimate the temporal differences in attack rates and spatial differences in reporting rates of ILI. The model showed good fit to the data (R2 = 0.76) and revealed considerable differences in reporting rates of ILI in different cities (up to a factor of 2.2). (2) A statistical test was developed to examine the null hypothesis (H0) that ILI incidence curves in two cities are essentially identical, and was tested using ILI data. Upon examining all possible pairs of incidence curves, 77.4% of pairs were found not to be different (H0 was not rejected). It was concluded that all cities generally have the same attack rate and follow the same epidemic curve each season, although the attack rate changes from season to season, providing strong support for the “Israel is one city” hypothesis. The cities which were the most out of synchronization were Bnei Brak, Beersheba and Haifa, the latter two being geographically remote from all other cities in the dataset and the former geographically very close to several other cities but socially separate due to being populated almost exclusively by ultra-orthodox Jews. Further evidence of assortative mixing of the ultra-orthodox population can be found in the 2001–2002 season, when ultra-orthodox cities and neighborhoods showed distinctly different incidence curves compared to the general population. PMID:24622820
Knowledge of signs and symptoms of heart attack and stroke among Singapore residents.
Quah, Joy Li Juan; Yap, Susan; Cheah, Si Oon; Ng, Yih Yng; Goh, E Shaun; Doctor, Nausheen; Leong, Benjamin Sieu-Hon; Tiah, Ling; Chia, Michael Yih Chong; Ong, Marcus Eng Hock
2014-01-01
To determine the level of knowledge of signs and symptoms of heart attack and stroke in Singapore resident population, in comparison to the global community. A population based, random sample of 7,840 household addresses was selected from a validated national sampling frame. Each participant was asked eight questions on signs and symptoms of heart attack and 10 questions on stroke. The response rate was 65.2% with 4,192 respondents. The level of knowledge for preselected, common signs and symptoms of heart attack and stroke was 57.8% and 57.1%, respectively. The respondents scored a mean of 5.0 (SD 2.4) out of 8 for heart attack, while they scored a mean of 6.8 (SD 2.9) out of 10 for stroke. Respondents who were ≥ 50 years, with lower educational level, and unemployed/retired had the least knowledge about both conditions. The level of knowledge of signs and symptoms of heart attack and stroke in Singapore is comparable to USA and Canada. We found a comparable knowledge of stroke and heart attack signs and symptoms in the community to countries within the same economic, educational, and healthcare strata. However older persons, those with lower educational level and those who are unemployed/retired, require more public health education efforts.
Geographic Wormhole Detection in Wireless Sensor Networks
Sookhak, Mehdi; Akhundzada, Adnan; Sookhak, Alireza; Eslaminejad, Mohammadreza; Gani, Abdullah; Khurram Khan, Muhammad; Li, Xiong; Wang, Xiaomin
2015-01-01
Wireless sensor networks (WSNs) are ubiquitous and pervasive, and therefore; highly susceptible to a number of security attacks. Denial of Service (DoS) attack is considered the most dominant and a major threat to WSNs. Moreover, the wormhole attack represents one of the potential forms of the Denial of Service (DoS) attack. Besides, crafting the wormhole attack is comparatively simple; though, its detection is nontrivial. On the contrary, the extant wormhole defense methods need both specialized hardware and strong assumptions to defend against static and dynamic wormhole attack. The ensuing paper introduces a novel scheme to detect wormhole attacks in a geographic routing protocol (DWGRP). The main contribution of this paper is to detect malicious nodes and select the best and the most reliable neighbors based on pairwise key pre-distribution technique and the beacon packet. Moreover, this novel technique is not subject to any specific assumption, requirement, or specialized hardware, such as a precise synchronized clock. The proposed detection method is validated by comparisons with several related techniques in the literature, such as Received Signal Strength (RSS), Authentication of Nodes Scheme (ANS), Wormhole Detection uses Hound Packet (WHOP), and Wormhole Detection with Neighborhood Information (WDI) using the NS-2 simulator. The analysis of the simulations shows promising results with low False Detection Rate (FDR) in the geographic routing protocols. PMID:25602616
Craig, Timothy; Shapiro, Ralph; Vegh, Arthur; Baker, James W.; Bernstein, Jonathan A.; Busse, Paula; Magerl, Markus; Martinez-Saguer, Inmaculada; Riedl, Marc A.; Lumry, William; Williams-Herman, Debora; Edelman, Jonathan; Feuersenger, Henrike; Machnig, Thomas
2017-01-01
Background: The plasma-derived, pasteurized, nanofiltered C1-inhibitor concentrate (pnfC1-INH) is approved in the United States as an intravenous (IV) on-demand treatment for hereditary angioedema (HAE) attacks, and, in Europe, as on demand and short-term prophylaxis. Objective: This analysis evaluated Berinert Patient Registry data regarding IV pnfC1-INH used as long-term prophylaxis (LTP). Methods: The international registry (2010–2014) collected prospective and retrospective usage, dosing, and safety data on individuals who used pnfC1-INH for any reason. Results: The registry included data on 47 subjects (80.9% female subjects; mean age, 44.8 years), which reflected 4082 infusions categorized as LTP and a total of 430.2 months of LTP administration. The median absolute dose of pnfC1-INH given for LTP was 1000 IU (range, 500–3000 IU), with a median time interval between infusion and a subsequent pnfC1-INH–treated attack of 72.0 hours (range, 0.0–166.4 hours). Fifteen subjects (31.9%) had no pnfC1-INH–treated HAE attacks within 7 days after pnfC1-INH infusion for LTP; 32 subjects (68.1%) experienced 246 attacks, with rates of 0.06 attacks per infusion and 0.57 attacks per month. A total of 81 adverse events were reported in 16 subjects (34.0%) (0.02 events per infusion; 0.19 events per month); only 3 adverse events were considered related to pnfC1-INH (noncardiac chest pain, postinfusion headache, deep vein thrombosis in a subject with an IV port). Conclusion: In this international registry, IV pnf-C1-INH given as LTP for HAE was safe and efficacious, with a low rate of attacks that required pnfC1-INH treatment, particularly within the first several days after LTP administration. PMID:28381322
Behavioral Strategies of Phorid Parasitoids and Responses of Their Hosts, the Leaf-Cutting Ants
Elizalde, Luciana; Folgarait, Patricia Julia
2012-01-01
Host-searching and oviposition behaviors of parasitoids, and defensive responses of the hosts, are fundamental in shaping the ecology of host-parasitoid interactions. In order to uncover key behavioral features for the little known interactions between phorid parasitoids (Diptera: Phoridae) and their leaf-cutting ant hosts (Formicidae: Attini), host-related behavioral strategies (i.e., host searching and oviposition) for 13 phorid species, and host defensive responses (i.e., hitchhikers and particular body postures) for 11 ant species, were studied. Data was collected at 14 localities, one of them characterized by its high species richness for this host-parasitoid system. Phorid species showed both great variation and specificity in attacking behaviors. Some chose their hosts using either an ambush or an actively searching strategy, while some species attacked ants on different body parts, and specialized on ants performing different tasks, such as when ants were foraging, removing wastes to refuse piles, or repairing the nest. Combining all the behaviors recorded, most phorid species differed in performance in at least one, making it possible to recognize species in the field through their behavior. Phorid species that attacked hosts with greater activity levels showed overall higher attack rates, although there was no significant correlation between attack rates by most phorid species and ant activity outside the nest while parasitoids were attacking. The presence of phorids was a significant determinant for the presence of defensive behaviors by the ants. Although ant species varied in the incidence levels of these defensive behaviors, most ant species reacted against different phorids by utilizing similar behaviors, in contrast to what parasitoids do. General features of the observed phorid-ant interactions were parasitoid specialization and corresponding high interspecific variation in their behaviors, while their hosts showed generalized responses to attacks with high intraspecific variation. Behavioral patterns as well as specific features of these ant-parasitoid interactions are described, and their ecological importance discussed. PMID:23448343
Riedl, Marc A; Aygören-Pürsün, Emel; Baker, James; Farkas, Henriette; Anderson, John; Bernstein, Jonathan A; Bouillet, Laurence; Busse, Paula; Manning, Michael; Magerl, Markus; Gompels, Mark; Huissoon, Aarnoud P; Longhurst, Hillary; Lumry, William; Ritchie, Bruce; Shapiro, Ralph; Soteres, Daniel; Banerji, Aleena; Cancian, Mauro; Johnston, Douglas T; Craig, Timothy J; Launay, David; Li, H Henry; Liebhaber, Myron; Nickel, Timothy; Offenberger, Jacob; Rae, William; Schrijvers, Rik; Triggiani, Massimo; Wedner, H James; Dobo, Sylvia; Cornpropst, Melanie; Clemons, Desiree; Fang, Lei; Collis, Phil; Sheridan, William P; Maurer, Marcus
2018-04-24
Effective inhibition of plasma kallikrein may have significant benefits for patients with hereditary angioedema due to deficiency of C1 inhibitor (C1-INH-HAE) by reducing the frequency of angioedema attacks. Avoralstat is a small molecule inhibitor of plasma kallikrein. This study (OPuS-2) evaluated the efficacy and safety of prophylactic avoralstat 300 or 500 mg compared with placebo. OPuS-2 was a Phase 3, multicenter, randomized, double-blind, placebo-controlled, parallel-group study. Subjects were administered avoralstat 300 mg, avoralstat 500 mg, or placebo orally 3 times per day for 12 weeks. The primary efficacy endpoint was the angioedema attack rate based on adjudicator-confirmed attacks. A total of 110 subjects were randomized and dosed. The least squares (LS) mean attack rates per week were 0.589, 0.675, and 0.593 for subjects receiving avoralstat 500 mg, avoralstat 300 mg, and placebo, respectively. Overall, 1 subject in each of the avoralstat groups and no subjects in the placebo group were attack-free during the 84-day treatment period. The LS mean duration of all confirmed attacks was 25.4, 29.4 and 31.4 hours for the avoralstat 500 mg, avoralstat 300 mg and placebo groups respectively. Using the Angioedema Quality of Life Questionnaire (AE-QoL), improved QoL was observed for the avoralstat 500 mg group compared with placebo. Avoralstat was generally safe and well tolerated. Although this study did not demonstrate efficacy of avoralstat in preventing angioedema attacks in C1-INH-HAE, it provided evidence of shortened angioedema episodes and improved QoL in the avoralstat 500 mg treatment group compared with placebo. This article is protected by copyright. All rights reserved. This article is protected by copyright. All rights reserved.
A method for estimating the rolling moment due to spin rate for arbitrary planform wings
NASA Technical Reports Server (NTRS)
Poppen, W. A., Jr.
1985-01-01
The application of aerodynamic theory for estimating the force and moments acting upon spinning airplanes is of interest. For example, strip theory has been used to generate estimates of the aerodynamic characteristics as a function of spin rate for wing-dominated configurations for angles of attack up to 90 degrees. This work, which had been limited to constant chord wings, is extended here to wings comprised of tapered segments. Comparison of the analytical predictions with rotary balance wind tunnel results shows that large discrepancies remain, particularly for those angles-of-attack greater than 40 degrees.
The incidence of plastic ingestion by fishes: from the prey's perspective.
Carson, Henry S
2013-09-15
One of the primary threats to ocean ecosystems from plastic pollution is ingestion by marine organisms. Well-documented in seabirds, turtles, and marine mammals, ingestion by fish and sharks has received less attention until recently. We suggest that fishes of a variety of sizes attack drifting plastic with high frequency, as evidenced by the apparent bite marks commonly left behind. We examined 5518 plastic items from random plots on Kamilo Point, Hawai'i Island, and found 15.8% to have obvious signs of attack. Extrapolated to the entire amount of debris removed from the 15 km area, over 1.3 tons of plastic is attacked each year. Items with a bottle shape, or those blue or yellow in color, were attacked with a higher frequency. The triangular edges or punctures left by teeth ranged from 1 to 20 mm in width suggesting a variety of species attack plastic items. More research is needed to document the specific fishes and rates of plastic ingestion. Copyright © 2013 Elsevier Ltd. All rights reserved.
A robust trust establishment scheme for wireless sensor networks.
Ishmanov, Farruh; Kim, Sung Won; Nam, Seung Yeob
2015-03-23
Security techniques like cryptography and authentication can fail to protect a network once a node is compromised. Hence, trust establishment continuously monitors and evaluates node behavior to detect malicious and compromised nodes. However, just like other security schemes, trust establishment is also vulnerable to attack. Moreover, malicious nodes might misbehave intelligently to trick trust establishment schemes. Unfortunately, attack-resistance and robustness issues with trust establishment schemes have not received much attention from the research community. Considering the vulnerability of trust establishment to different attacks and the unique features of sensor nodes in wireless sensor networks, we propose a lightweight and robust trust establishment scheme. The proposed trust scheme is lightweight thanks to a simple trust estimation method. The comprehensiveness and flexibility of the proposed trust estimation scheme make it robust against different types of attack and misbehavior. Performance evaluation under different types of misbehavior and on-off attacks shows that the detection rate of the proposed trust mechanism is higher and more stable compared to other trust mechanisms.
Krymchantowski, Abouch Valenty; Bigal, Marcelo Eduardo
2004-01-01
Background Rizatriptan is an effective and fast acting drug for the acute treatment of migraine. Some nonsteroidal anti-inflammatory drugs (NSAID) have also demonstrated efficacy in treating migraine attacks. There is evidence that the combination of a triptan and a NSAID decreases migraine recurrence in clinical practice. The primary aim of this randomized open label study was to assess the recurrence rates in migraine sufferers acutely treated with rizatriptan (RI) alone vs. rizatriptan plus a COX-2 enzyme inhibitor (rofecoxib, RO) vs. rizatriptan plus a traditional NSAID (tolfenamic acid, TO). We were also interested in comparing the efficacy rates within these three groups. Methods We assessed 45 patients from a headache clinic in Rio de Janeiro (35 women and 10 men, ages 18 to 65 years, mean 37 years). Patients with IHS migraine were randomized to one out of 3 groups, where they had to treat 6 consecutive moderate or severe attacks in counterbalanced order. In group 1, patients treated the first two attacks with 10 mg RI, the third and fourth attacks with RI + 50 mg RO and the last attacks with RI + 200 mg of TA. In group 2, we began with RI + TA, followed by RI, and RI + RO. Group 3 treated in the following order: RI + RO, RI + TA, RI alone. The presence of headache, nausea and photophobia at 1, 2 and 4 hours, as well as recurrence and side effects were compared. Results A total of 33 patients finished the study, treating 184 attacks. The pain-free rates at 1 hour were: RI: 15.5%; RI + RO: 22.6%; RI + TA: 20.3%(NS). Pain-free rates at 2 h were: RI: 37.9%; RI + RO: 62.9%, and RI + TA: 40.6% (p = 0.008 for RI vs. RI + RO; p = 0.007 for RI + RO vs. RI + TA, NS for RI vs RI + TA). At 4 h, pain-free rates were: RI: 69%; RI + RO: 82.3%; RI + TA: 78.1% (NS for all comparisons). The combination of RI + RO was superior to RI and to RI + TA in regard of the absense of nausea and photophobia at 4 hours. Recurrence (after being pain-free at 2 h) was observed in 50% of patients treated with RI, in 15,4% of those treated with RI + RO, and in 7,7% of those treated with RI + TA. Conclusions Despite the methodological limitations of this study, the combination of RI and RO revealed a higher response rate at 2 hours. Recurrence was also clearly decreased with both combinations in relation to the use of RI alone. Controlled studies are necessary to provide additional evidence. PMID:15222892
Is stress a trigger factor for migraine?
Schoonman, G G; Evers, D J; Ballieux, B E; de Geus, E J; de Kloet, E R; Terwindt, G M; van Dijk, J G; Ferrari, M D
2007-06-01
Although mental stress is commonly considered to be an important trigger factor for migraine, experimental evidence for this belief is yet lacking. To study the temporal relationship between changes in stress-related parameters (both subjective and objective) and the onset of a migraine attack. This was a prospective, ambulatory study in 17 migraine patients. We assessed changes in perceived stress and objective biological measures for stress (saliva cortisol, heart rate average [HRA], and heart rate variability [low-frequency power and high-frequency power]) over 4 days prior to the onset of spontaneous migraine attacks. Analyses were repeated for subgroups of patients according to whether or not they felt their migraine to be triggered by stress. There were no significant temporal changes over time for the whole group in perceived stress (p=0.50), morning cortisol (p=0.73), evening cortisol (p=0.55), HRA (p=0.83), low-frequency power (p=0.99) and high-frequency power (p=0.97) prior to or during an attack. Post hoc analysis of the subgroup of nine stress-sensitive patients who felt that >2/3 of their migraine attacks were triggered by psychosocial stress, revealed an increase for perceived stress (p=0.04) but no changes in objective stress response measures. At baseline, this group also showed higher scores on the Penn State Worry Questionnaire (p=0.003) and the Cohen Perceived Stress Scale (p=0.001) compared to non-stress-sensitive patients. Although stress-sensitive patients, in contrast to non-stress-sensitive patients, may perceive more stress in the days before an impending migraine attack, we failed to detect any objective evidence for a biological stress response before or during migraine attacks.
Miller, S; Watkins, L; Matharu, M
2017-02-01
Chronic cluster headache is a rare, highly disabling primary headache condition. When medically intractable, occipital nerve stimulation can offer effective treatment. Open-label series have provided data on small cohorts only. We analyzed 51 subjects to evaluate the long-term outcomes of highly intractable chronic cluster headache with occipital nerve stimulation. Patients with intractable chronic cluster headache were implanted with occipital nerve stimulators during the period 2007-2014. The primary endpoint was improvement in daily attack frequency. Secondary endpoints included attack severity, attack duration, quality-of-life measures, headache disability scores and adverse events. We studied 51 patients [35 males; mean age at implant 47.78 (range 31-70) years; mean follow-up 39.17 (range 2-81) months]. Nineteen patients had other chronic headache types in addition in chronic cluster headache. At final follow-up, there was a 46.1% improvement in attack frequency (P < 0001) across all patients, 49.5% (P < 0.001) in those with cluster headache alone and 40.3% (P = 0.036) in those with multiple phenotypes. There were no significant differences in response in those with or without multiple headache types. The overall response rate (defined as at least a 50% improvement in attack frequency) was 52.9%. Significant reductions were also seen in attack duration and severity. Improvements were noted in headache disability scores and quality-of-life measures. Triptan use of responders dropped by 62.56%, resulting in significant cost savings. Adverse event rates were highly favorable. Occipital nerve stimulation appears to be a safe and efficacious treatment for highly intractable chronic cluster headache even after a mean follow-up of over 3 years. © 2016 EAN.
Natarajan, Deepa; Caramaschi, Doretta
2009-01-01
Violence has been observed in humans and animals alike, indicating its evolutionary/biological significance. However, violence in animals has often been confounded with functional forms of aggressive behavior. Currently, violence in animals is identified primarily as either a quantitative behavior (an escalated, pathological and abnormal form of aggression characterized primarily by short attack latencies, and prolonged and frequent harm-oriented conflict behaviors) or a qualitative one (characterized by attack bites aimed at vulnerable parts of the opponent's body and context independent attacks regardless of the environment or the sex and type of the opponent). Identification of an operational definition for violence thus not only helps in understanding its potential differences from adaptive forms of aggression but also in the selection of appropriate animal models for both. We address this issue theoretically by drawing parallels from research on aggression and appeasement in humans and other animals. We also provide empirical evidences for violence in mice selected for high aggression by comparing our findings with other currently available potentially violent rodent models. The following violence-specific features namely (1) Display of low levels of pre-escalatory/ritualistic behaviors. (2) Immediate and escalated offense durations with low withdrawal rates despite the opponent's submissive supine and crouching/defeat postures. (3) Context independent indiscriminate attacks aimed at familiar/unfamiliar females, anaesthetized males and opponents and in neutral environments. (4) Orientation of attack-bites toward vulnerable body parts of the opponent resulting in severe wounding. (5) Low prefrontal serotonin (5-HT) levels upon repeated aggression. (6) Low basal heart rates and hyporesponsive hypothalamus–pituitary–adrenocortical (HPA) axis were identified uniquely in the short attack latency (SAL) mice suggesting a qualitative difference between violence and adaptive aggression in animals. PMID:20407576
Natarajan, Deepa; Caramaschi, Doretta
2010-01-01
Violence has been observed in humans and animals alike, indicating its evolutionary/biological significance. However, violence in animals has often been confounded with functional forms of aggressive behavior. Currently, violence in animals is identified primarily as either a quantitative behavior (an escalated, pathological and abnormal form of aggression characterized primarily by short attack latencies, and prolonged and frequent harm-oriented conflict behaviors) or a qualitative one (characterized by attack bites aimed at vulnerable parts of the opponent's body and context independent attacks regardless of the environment or the sex and type of the opponent). Identification of an operational definition for violence thus not only helps in understanding its potential differences from adaptive forms of aggression but also in the selection of appropriate animal models for both. We address this issue theoretically by drawing parallels from research on aggression and appeasement in humans and other animals. We also provide empirical evidences for violence in mice selected for high aggression by comparing our findings with other currently available potentially violent rodent models. The following violence-specific features namely (1) Display of low levels of pre-escalatory/ritualistic behaviors. (2) Immediate and escalated offense durations with low withdrawal rates despite the opponent's submissive supine and crouching/defeat postures. (3) Context independent indiscriminate attacks aimed at familiar/unfamiliar females, anaesthetized males and opponents and in neutral environments. (4) Orientation of attack-bites toward vulnerable body parts of the opponent resulting in severe wounding. (5) Low prefrontal serotonin (5-HT) levels upon repeated aggression. (6) Low basal heart rates and hyporesponsive hypothalamus-pituitary-adrenocortical (HPA) axis were identified uniquely in the short attack latency (SAL) mice suggesting a qualitative difference between violence and adaptive aggression in animals.
Garfin, Dana Rose; Poulin, Michael J; Blum, Scott; Silver, Roxane Cohen
2018-02-01
Research conducted in the early years after the September 11, 2001 (9/11) terrorist attacks in New York, Pennsylvania, and Washington, DC demonstrated adverse psychological outcomes among residents of the United States who were exposed to the attacks both directly and indirectly via the media. However, less is known about the impact of this collective trauma over time. Beginning at the end of December 2006, a longitudinal study of a nationally representative sample of U.S. residents (Cohort 2, N = 1,613) examined the long-term effects of 9/11, with annual assessments administered every year for 3 years. We assessed rates of 9/11-related posttraumatic stress (PTS) annually during the first 2 years of the study; during the second and third years of the study, we assessed fear and worry regarding future terrorism. Rates of PTS among participants were compared with those assessed annually in a nationally representative sample between 2002 and 2004 (Cohort 1); results indicated a relatively stable pattern of 9/11-related PTS symptoms for 6 years following the attacks. Five to six years after 9/11, we found an association between 9/11-related PTS and both direct, B = 8.45, 95% CI [4.32, 12.59] and media-based (live television), B = 1.78, 95% CI [0.90, 2.65] exposure to the attacks. Six to 7 years post-9/11, fear and worry regarding future terrorism were predicted by 9/11-related PTS symptoms that had been reported approximately 5 years after the attacks, B = 0.04, 95% CI [0.03, 0.05]. The psychological legacy of 9/11 was perceptible among many U.S. residents throughout the decade that followed. Copyright © 2018 International Society for Traumatic Stress Studies.
NASA Technical Reports Server (NTRS)
Kim, Hyun D.; Frate, Franco C.
2001-01-01
A subscale aerodynamic model of the GTX air-breathing launch vehicle was tested at NASA Glenn Research Center's 10- by 10-Foot Supersonic Wind Tunnel from Mach 2.0 to 3.5 at various angles-of-attack. The objective of the test was to investigate the effect of angle-of-attack on inlet mass capture, inlet diverter effectiveness, and the flowfield at the cowl lip plane. The flow-through inlets were tested with and without boundary-layer diverters. Quantitative measurements such as inlet mass flow rates and pitot-pressure distributions in the cowl lip plane are presented. At a 3deg angle-of-attack, the flow rates for the top and side inlets were within 8 percent of the zero angle-of-attack value, and little distortion was evident at the cowl lip plane. Surface oil flow patterns showing the shock/boundary-layer interaction caused by the inlet spikes are shown. In addition to inlet data, vehicle forebody static pressure distributions, boundary-layer profiles, and temperature-sensitive paint images to evaluate the boundary-layer transition are presented. Three-dimensional parabolized Navier-Stokes computational fluid dynamics calculations of the forebody flowfield are presented and show good agreement with the experimental static pressure distributions and boundary-layer profiles. With the boundary-layer diverters installed, no adverse aerodynamic phenomena were found that would prevent the inlets from operating at the required angles-of-attack. We recommend that phase 2 of the test program be initiated, where inlet contraction ratio and diverter geometry variations will be tested.
2014-01-01
Background Evidence indicates that asthma attacks can be triggered by exposure to ambient air pollutants, however, detailed pollution information is missing from asthma action plans. Asthma is commonly associated with four criteria pollutants with standards derived by the United States Environmental Protection Agency. Since multiple pollutants trigger attacks and risks depend upon city-specific mixtures of pollutants, there is lack of specific guidance to reduce exposure. Until multi-pollutant statistical modeling fully addresses this gap, some guidance on pollutant attack risk is required. This study examines the risks from exposure to the asthma-related pollutants in a large metropolitan city and defines the city-specific association between attacks and pollutant mixtures. Our goal is that city-specific pollution risks be incorporated into individual asthma action plans as additional guidance to prevent attacks. Methods Case-crossover analysis and conditional logistic regression were used to measure the association between ozone, fine particulate matter, nitrogen dioxide, sulfur dioxide and carbon monoxide pollution and 11,754 emergency medical service ambulance treated asthma attacks in Houston, Texas from 2004-2011. Both single and multi-pollutant models are presented. Results In Houston, ozone and nitrogen dioxide are important triggers (RR = 1.05; 95% CI: 1.00, 1.09), (RR = 1.10; 95% CI: 1.05, 1.15) with 20 and 8 ppb increase in ozone and nitrogen dioxide, respectively, in a multi-pollutant model. Both pollutants are simultaneously high at certain times of the year. The risk attributed to these pollutants differs when they are considered together, especially as concentrations increase. Cumulative exposure for ozone (0-2 day lag) is of concern, whereas for nitrogen dioxide the concern is with single day exposure. Persons at highest risk are aged 46-66, African Americans, and males. Conclusions Accounting for cumulative and concomitant outdoor pollutant exposure is important to effectively attribute risk for triggering of an asthma attack, especially as concentrations increase. Improved asthma action plans for Houston individuals should warn of these pollutants, their trends, correlation and cumulative effects. Our Houston based study identifies nitrogen dioxide levels and the three-day exposure to ozone to be of concern whereas current single pollutant based national standards do not. PMID:25012280
Panic attacks and panic disorder in a population-based sample of active Canadian military personnel.
Kinley, D Jolene; Walker, John R; Mackenzie, Corey S; Sareen, Jitender
2011-01-01
The factors contributing to psychiatric problems among military personnel, particularly for panic, are unclear. The objective of this study was to examine the prevalence and correlates of panic disorder and panic attacks in the Canadian military. Statistics Canada and the Department of National Defense conducted the Canadian Community Health Survey-Canadian Forces Supplement in 2002 (May to December) with a representative sample of active Canadian military personnel (aged 16-54 years; N = 8,441; response rate, 81.5%). Comparisons were made between respondents with no past-year panic attacks, panic attacks without panic disorder, and panic disorder on measures of DSM-IV mental disorders, as well as validated measures of disability, distress, suicidal ideation, perceived need for mental health treatment, and mental health service use. Lifetime exposure to combat operations, witnessing of atrocities, and deployments were also assessed. Panic disorder and panic attacks were common in the military population, with past-year prevalence estimates of 1.8% and 7.0%, respectively. Both panic disorder and panic attacks were associated with increased odds of all mental disorders assessed, suicidal ideation, 2-week disability, and distress. Perceived need for mental health treatment and service use were common in individuals with panic attacks and panic disorder (perceived need: 46.3% for panic attacks, 89.6% for panic disorder; service use: 32.5% for panic attacks, 74.5% for panic disorder). Panic attacks and panic disorder in the military are associated with outcomes that could be detrimental to well-being and work performance, and early detection of panic in this population could help reduce these negative outcomes. © Copyright 2011 Physicians Postgraduate Press, Inc.
NASA Technical Reports Server (NTRS)
Paulson, John W.; Shanks, Robert E.
1961-01-01
An investigation of the low-subsonic flight characteristics of a thick 70 deg delta reentry configuration having a diamond cross section has been made in the Langley full-scale tunnel over an angle-of-attack range from 20 to 45 deg. Flight tests were also made at angles of attack near maximum lift (alpha = 40 deg) with a radio-controlled model dropped from a helicopter. Static and dynamic force tests were made over an angle-of-attack range from 0 to 90 deg. The longitudinal stability and control characteristics were considered satisfactory when the model had positive static longitudinal stability. It was possible to fly the model with a small amount of static instability, but the longitudinal characteristics were considered unsatisfactory in this condition. At angles of attack above the stall the model developed a large, constant-amplitude pitching oscillation. The lateral stability characteristics were considered to be only fair at angles of attack from about 20 to 35 deg because of a lightly damped Dutch roll oscillation. At higher angles of attack the oscillation was well damped and the lateral stability was generally satisfactory. The Dutch roll damping at the lower angles of attack was increased to satisfactory values by means of a simple rate-type roll damper. The lateral control characteristics were generally satisfactory throughout the angle- of-attack range, but there was some deterioration in aileron effectiveness in the high angle-of-attack range due mainly to a large increase in damping in roll.
Development of mental health first aid guidelines for panic attacks: a Delphi study.
Kelly, Claire M; Jorm, Anthony F; Kitchener, Betty A
2009-08-10
Panic attacks are common, and while they are not life-threatening events, they can lead to the development of panic disorder and agoraphobia. Appropriate help at the time that a panic attack occurs may decrease the fear associated with the attack and reduce the risk of developing an anxiety disorder. However, few people have the knowledge and skills required to assist. Simple first aid guidelines may help members of the public to offer help to people who experience panic attacks. The Delphi method was used to reach consensus in a panel of experts. Experts included 50 professionals and 6 people who had experience of panic attacks and were active in mental health advocacy. Statements about how to assist someone who is having a panic attack were sourced through a systematic search of both professional and lay literature. These statements were rated for importance as first aid guidelines by the expert and consumer panels and guidelines were written using the items most consistently endorsed. Of 144 statements presented to the panels, 27 were accepted. These statements were used to develop the guidelines appended to this paper. There are a number of actions which are considered to be useful for members of the public to do if they encounter someone who is having a panic attack. These guidelines will be useful in revision of curricula of mental health first aid programs. They can also be used by members of the public who want immediate information about how to assist someone who is experiencing panic attacks.
NASA Technical Reports Server (NTRS)
Letko, William
1949-01-01
An investigation has been made in the Langley stability tunnel to determine the low-speed static stability and control characteristics of a model of the Bell MX-776. The results show the model to be longitudinally unstable in the angle-of-attack range around zero angle of attack and to become stable at moderate angles of attack. The results of the present investigation agree reasonably well with results obtained in other facilities at low speed. The present pitching-moment results at low Mach numbers also agree reasonably well with unpublished results of tests of the model at supersonic Mach numbers (up to Mach number 1.86). Unpublished results at moderate and high subsonic speeds, however, indicate considerably greater instability at low angles of attack than is indicated by low-speed results. The results of the present tests also showed that the pitching-moment coefficients for angles of attack up to 12deg remained fairly constant with sideslip angle up to 12deg. The elevators tested produced relatively large pitching moments at zero angle of attack but, as the angle of attack was increased, the elevator effectiveness decreased. The rate of decrease of elevator effectiveness with angle of attack was less for 8deg than for 20deg elevator deflection. Therefore although 8deg deflection caused an appreciable change in longitudinal trim angle and trim lift coefficient a deflection of 20deg caused only a small additional increase in trim angle and trim lift coefficient.
Mass casualty response in the 2008 Mumbai terrorist attacks.
Roy, Nobhojit; Kapil, Vikas; Subbarao, Italo; Ashkenazi, Isaac
2011-12-01
The November 26-29, 2008, terrorist attacks on Mumbai were unique in its international media attention, multiple strategies of attack, and the disproportionate national fear they triggered. Everyone was a target: random members of the general population, iconic targets, and foreigners alike were under attack by the terrorists. A retrospective, descriptive study of the distribution of terror victims to various city hospitals, critical radius, surge capacity, and the nature of specialized medical interventions was gathered through police, legal reports, and interviews with key informants. Among the 172 killed and 304 injured people, about four-fifths were men (average age, 33 years) and 12% were foreign nationals. The case-fatality ratio for this event was 2.75:1, and the mortality rate among those who were critically injured was 12%. A total of 38.5% of patients arriving at the hospitals required major surgical intervention. Emergency surgical operations were mainly orthopedic (external fixation for compound fractures) and general surgical interventions (abdominal explorations for penetrating bullet/shrapnel injuries). The use of heavy-duty automatic weapons, explosives, hostages, and arson in these terrorist attacks alerts us to new challenges to medical counterterrorism response. The need for building central medical control for a coordinated response and for strengthening public hospital capacity are lessons learned for future attacks. These particular terrorist attacks had global consequences, in terms of increased security checks and alerts for and fears of further similar "Mumbai-style" attacks. The resilience of the citizens of Mumbai is a critical measure of the long-term effects of terror attacks.
... to low blood pressure are an abnormally low heart rate ( bradycardia ), problems with heart valves , heart attack and ... occurred. Is low blood pressure related to low heart rate? Find out . This content was last reviewed October ...
Forced Oscillation Wind Tunnel Testing for FASER Flight Research Aircraft
NASA Technical Reports Server (NTRS)
Hoe, Garrison; Owens, Donald B.; Denham, Casey
2012-01-01
As unmanned air vehicles (UAVs) continue to expand their flight envelopes into areas of high angular rate and high angle of attack, modeling the complex unsteady aerodynamics for simulation in these regimes has become more difficult using traditional methods. The goal of this experiment was to improve the current six degree-of-freedom aerodynamic model of a small UAV by replacing the analytically derived damping derivatives with experimentally derived values. The UAV is named the Free-flying Aircraft for Sub-scale Experimental Research, FASER, and was tested in the NASA Langley Research Center 12- Foot Low-Speed Tunnel. The forced oscillation wind tunnel test technique was used to measure damping in the roll and yaw axes. By imparting a variety of sinusoidal motions, the effects of non-dimensional angular rate and reduced frequency were examined over a large range of angle of attack and side-slip combinations. Tests were performed at angles of attack from -5 to 40 degrees, sideslip angles of -30 to 30 degrees, oscillation amplitudes from 5 to 30 degrees, and reduced frequencies from 0.010 to 0.133. Additionally, the effect of aileron or elevator deflection on the damping coefficients was examined. Comparisons are made of two different data reduction methods used to obtain the damping derivatives. The results show that the damping derivatives are mainly a function of angle of attack and have dependence on the non-dimensional rate and reduced frequency only in the stall/post-stall regime
Finite key analysis for symmetric attacks in quantum key distribution
DOE Office of Scientific and Technical Information (OSTI.GOV)
Meyer, Tim; Kampermann, Hermann; Kleinmann, Matthias
2006-10-15
We introduce a constructive method to calculate the achievable secret key rate for a generic class of quantum key distribution protocols, when only a finite number n of signals is given. Our approach is applicable to all scenarios in which the quantum state shared by Alice and Bob is known. In particular, we consider the six state protocol with symmetric eavesdropping attacks, and show that for a small number of signals, i.e., below n{approx}10{sup 4}, the finite key rate differs significantly from the asymptotic value for n{yields}{infinity}. However, for larger n, a good approximation of the asymptotic value is found.more » We also study secret key rates for protocols using higher-dimensional quantum systems.« less
Controlling The Spread of Land-Attack Cruise Missiles.
1995-01-01
propellant additives and agents: (1) Bonding agents as follows: (i) tris(l-(2-methyl)aziridinyl) phosphine oxide (MAPO); (ii) trimesoyl-l(2-ethyl...Triphenyl bismuth (TPB) (ii) Isophorone diisocyanate (IPDI) (3) Burning rate modifiers as follows: (i) Catocene (ii) N-butyl- ferrocene (iii...Butacene (iv) Other ferrocene derivatives 9g Controlling the Spread of Land-Attack Cruise Missiles (4) Nitrate esters and nitrato plasticizers as
Turbulent flow and heat transfer of Water/Al2O3 nanofluid inside a rectangular ribbed channel
NASA Astrophysics Data System (ADS)
Parsaiemehr, Mohammad; Pourfattah, Farzad; Akbari, Omid Ali; Toghraie, Davood; Sheikhzadeh, Ghanbarali
2018-02-01
In present study, the turbulent flow and heat transfer of Water/Al2O3 nanofluid inside a rectangular channel have been numerically simulated. The main purpose of present study is investigating the effect of attack angle of inclined rectangular rib, Reynolds number and volume fraction of nanoparticles on heat transfer enhancement. For this reason, the turbulent flow of nanofluid has been simulated at Reynolds numbers ranging from 15000 to 30000 and volume fractions of nanoparticles from 0 to 4%. The changes attack angle of ribs have been investigated ranging from 0 to 180°. The results show that, the changes of attack angle of ribs, due to the changes of flow pattern and created vortexes inside the channel, have significant effect on fluid mixing. Also, the maximum rate of heat transfer enhancement accomplishes in attack angle of 60°. In Reynolds numbers of 15000, 20000 and 30000 and attack angle of 60°, comparing to the attack angle of 0°, the amount of Nusselt number enhances to 2.37, 1.96 and 2 times, respectively. Also, it can be concluded that, in high Reynolds numbers, by using ribs and nanofluid, the performance evaluation criterion improves.
Quantum key distribution with hacking countermeasures and long term field trial.
Dixon, A R; Dynes, J F; Lucamarini, M; Fröhlich, B; Sharpe, A W; Plews, A; Tam, W; Yuan, Z L; Tanizawa, Y; Sato, H; Kawamura, S; Fujiwara, M; Sasaki, M; Shields, A J
2017-05-16
Quantum key distribution's (QKD's) central and unique claim is information theoretic security. However there is an increasing understanding that the security of a QKD system relies not only on theoretical security proofs, but also on how closely the physical system matches the theoretical models and prevents attacks due to discrepancies. These side channel or hacking attacks exploit physical devices which do not necessarily behave precisely as the theory expects. As such there is a need for QKD systems to be demonstrated to provide security both in the theoretical and physical implementation. We report here a QKD system designed with this goal in mind, providing a more resilient target against possible hacking attacks including Trojan horse, detector blinding, phase randomisation and photon number splitting attacks. The QKD system was installed into a 45 km link of a metropolitan telecom network for a 2.5 month period, during which time the system operated continuously and distributed 1.33 Tbits of secure key data with a stable secure key rate over 200 kbit/s. In addition security is demonstrated against coherent attacks that are more general than the collective class of attacks usually considered.
High-Alpha Handling Qualities Flight Research on the NASA F/A-18 High Alpha Research Vehicle
NASA Technical Reports Server (NTRS)
Wichman, Keith D.; Pahle, Joseph W.; Bahm, Catherine; Davidson, John B.; Bacon, Barton J.; Murphy, Patrick C.; Ostroff, Aaron J.; Hoffler, Keith D.
1996-01-01
A flight research study of high-angle-of-attack handling qualities has been conducted at the NASA Dryden Flight Research Center using the F/A-18 High Alpha Research Vehicle (HARV). The objectives were to create a high-angle-of-attack handling qualities flight database, develop appropriate research evaluation maneuvers, and evaluate high-angle-of-attack handling qualities guidelines and criteria. Using linear and nonlinear simulations and flight research data, the predictions from each criterion were compared with the pilot ratings and comments. Proposed high-angle-of-attack nonlinear design guidelines and proposed handling qualities criteria and guidelines developed using piloted simulation were considered. Recently formulated time-domain Neal-Smith guidelines were also considered for application to high-angle-of-attack maneuvering. Conventional envelope criteria were evaluated for possible extension to the high-angle-of-attack regime. Additionally, the maneuvers were studied as potential evaluation techniques, including a limited validation of the proposed standard evaluation maneuver set. This paper gives an overview of these research objectives through examples and summarizes result highlights. The maneuver development is described briefly, the criteria evaluation is emphasized with example results given, and a brief discussion of the database form and content is presented.
Airborne or Fomite Transmission for Norovirus? A Case Study Revisited.
Xiao, Shenglan; Tang, Julian W; Li, Yuguo
2017-12-14
Norovirus infection, a highly prevalent condition associated with a high rate of morbidity, comprises a significant health issue. Although norovirus transmission mainly occurs via the fecal-oral and vomit-oral routes, airborne transmission has been proposed in recent decades. This paper re-examines a previously described norovirus outbreak in a hotel restaurant wherein airborne transmission was originally inferred. Specifically, the original evidence that suggested airborne transmission was re-analyzed by exploring an alternative hypothesis: could this outbreak instead have occurred via fomite transmission? This re-analysis was based on whether fomite transmission could have yielded similar attack rate distribution patterns. Seven representative serving pathways used by waiters were considered, and the infection risk distributions of the alternative fomite transmission routes were predicted using a multi-agent model. These distributions were compared to the reported attack rate distribution in the original study using a least square methods approach. The results show that with some reasonable assumptions of human behavior patterns and parameter values, the attack rate distribution corresponded well with that of the infection risk via the fomite route. This finding offers an alternative interpretation of the transmission routes that underlay this particular norovirus outbreak and an important consideration in the development of infection control guidelines and the investigation of similar norovirus outbreaks in future.
Ceyhan, Mehmet; Tezer, Hasan; Yildirim, Inci
2009-01-01
Hepatitis A, varicella, and mumps are common in countries without universal immunization against these infections. Information about secondary household attack rates is limited. A prospective study was conducted in children <16 y of age who had household contact with the above infections. History for previous infections and vaccination was obtained from the parents. Specific antibodies in the sera during enrollment and at the end of the longest incubation periods were determined. A total of 113 children who had household contact with cases of varicella, hepatitis A, or mumps were enrolled. Secondary attack rate (SAR) was lower in hepatitis A (43.3%) than those for varicella (75.0%) and mumps (65.3%) (p<0.05). Rate of secondary asymptomatic infections was 25.6% in the hepatitis A group, 3.1% in the varicella group, and 16.6% in the mumps group. Positive predictive value (PPV) of the history was 100% for all 3 diseases and negative predictive value (NPV) was 85% for hepatitis A, 80.0% for varicella, and 56.2% for mumps. In conclusion, asymptomatic infections are important in the calculation of SARs in household contacts. PPV and NPV of medical history taken from parents might be useful when deciding the need for vaccination.
NASA Astrophysics Data System (ADS)
Tsifouti, A.; Triantaphillidou, S.; Larabi, M. C.; Doré, G.; Bilissi, E.; Psarrou, A.
2015-01-01
In this investigation we study the effects of compression and frame rate reduction on the performance of four video analytics (VA) systems utilizing a low complexity scenario, such as the Sterile Zone (SZ). Additionally, we identify the most influential scene parameters affecting the performance of these systems. The SZ scenario is a scene consisting of a fence, not to be trespassed, and an area with grass. The VA system needs to alarm when there is an intruder (attack) entering the scene. The work includes testing of the systems with uncompressed and compressed (using H.264/MPEG-4 AVC at 25 and 5 frames per second) footage, consisting of quantified scene parameters. The scene parameters include descriptions of scene contrast, camera to subject distance, and attack portrayal. Additional footage, including only distractions (no attacks) is also investigated. Results have shown that every system has performed differently for each compression/frame rate level, whilst overall, compression has not adversely affected the performance of the systems. Frame rate reduction has decreased performance and scene parameters have influenced the behavior of the systems differently. Most false alarms were triggered with a distraction clip, including abrupt shadows through the fence. Findings could contribute to the improvement of VA systems.
A review on delayed toxic effects of sulfur mustard in Iranian veterans
2012-01-01
Iranian soldiers were attacked with chemical bombs, rockets and artillery shells 387 times during the 8-years war by Iraq (1980–1988). More than 1,000 tons of sulfur mustard gas was used in the battlefields by the Iraqis against Iranian people. A high rate of morbidities occurred as the result of these attacks. This study aimed to evaluate the delayed toxic effects of sulfur mustard gas on Iranian victims. During a systematic search, a total of 193 (109 more relevant to the main aim) articles on sulfur mustard gas were reviewed using known international and national databases. No special evaluation was conducted on the quality of the articles and their publication in accredited journals was considered sufficient. High rate of morbidities as the result of chemical attacks by sulfur mustard among Iranian people occurred. Iranian researchers found a numerous late complications among the victims which we be listed as wide range of respiratory, ocular, dermatological, psychological, hematological, immunological, gastrointestinal and endocrine complications, all influenced the quality of life of exposed victims. The mortality rate due to this agent was 3%. Although, mortality rate induced by sulfur mustard among Iranian people was low, variety and chronicity of toxic effects and complications of this chemical agent were dramatic. PMID:23351810
NASA Technical Reports Server (NTRS)
Henderson, W. P.
1974-01-01
An investigation has been conducted to determine the effects of canard, canard location, vertical tails, and vertical-tail location on the aerodynamic characteristics of a model having a 59 deg sweptback wing. The investigation was conducted at a Mach number of 0.30, at angles of attack up to 22 deg and at sideslip angles of 0 deg and plus or minus 5 deg. The results of the study indicate that adding the canard to the model had only a slight effect on the lift at the lower angles of attack. At the higher angles of attack there is a significant effect of canard height on lift, canard in the high location (above the wing chord plane) resulting in the highest lifts. The lift drag characteristics are predicted well for the configuration with the mid or high canard locations by combining a potential flow solution on the canard with a potential plus vortex solution on the wing. Variations in the height significantly affect the pitching-moment characteristics of the configuration; the configuration with the low or mid canard location exhibits an increase in stability at the higher lift coefficients, whereas the configuration with the high canard exhibits pitch-up. Adding the vertical tails in the outboard location caused a significant loss in lift at the higher angles of attack; this lift loss was eliminated by moving the vertical tails inboard.
Epidemic of measles following the nationwide mass immunization campaign
2013-01-01
Background A prolonged measles epidemic occurred in Wenzhou City, China after a nationwide measles mass immunization campaign (MMIC) in 2010. We conducted an investigation to identify factors contributing to this epidemic and to provide evidence-based recommendations for measles elimination strategies in China. Methods Measles was diagnosed using the national standard case-definitions. We estimated the population vaccination coverage based on the proportion of measles patients that had been vaccinated. In a case–control investigation, all measles patients who received treatment in The Second Affiliated Hospital of Wenzhou Medical College (Hospital S) during November 1 to December 31, 2010 served as cases; controls were randomly selected among all other patients who received treatment in Hospital S during the same time period, frequency matched by month of hospital visit. We reviewed medical records of case- and control-patients to compare their exposure history at Hospital S and to its intravenous rehydration room (IV room) during the incubation period (7–21 days before their illness onset). Results The attack rate of measles in Wenzhou City was 3.3/100,000 during September 1, 2010 to January 11, 2011. Children aged 8-11 m had the highest attack rate (171/100,000) of all age groups. In children not age-eligible for the MMIC but should have been routinely vaccinated after the MMIC, the vaccination rate was only 52%. In the case–control investigation, 60% (25/42) of case-patients compared with 21% (35/168) of control-patients had visited Hospital S (adjusted ORM-H = 5.5, 95% CI = 2.7–11). Among unvaccinated children who had received treatment in Hospital S, 84% (21/25) of case-patients compared 38% (11/29) of control-patients had visited the IV room (adjusted ORM-H = 9.2, 95% CI = 1.5–59). Conclusion Relaxed routine measles vaccination among children after the MMIC was the main factor responsible for this epidemic. Exposure in the IV room at Hospital S facilitated the epidemic. To reach the goal of measles elimination, the Chinese public health authorities should make greater efforts to improve timely routine measles vaccination, and to reduce nosocomial transmission. PMID:23506461
Epidemic of measles following the nationwide mass immunization campaign.
Gao, Jie; Chen, Enfu; Wang, Zhigang; Shen, Jichuan; He, Hanqing; Ma, Huilai; Zeng, Guang; Zhu, Bao-Ping
2013-03-18
A prolonged measles epidemic occurred in Wenzhou City, China after a nationwide measles mass immunization campaign (MMIC) in 2010. We conducted an investigation to identify factors contributing to this epidemic and to provide evidence-based recommendations for measles elimination strategies in China. Measles was diagnosed using the national standard case-definitions. We estimated the population vaccination coverage based on the proportion of measles patients that had been vaccinated. In a case-control investigation, all measles patients who received treatment in The Second Affiliated Hospital of Wenzhou Medical College (Hospital S) during November 1 to December 31, 2010 served as cases; controls were randomly selected among all other patients who received treatment in Hospital S during the same time period, frequency matched by month of hospital visit. We reviewed medical records of case- and control-patients to compare their exposure history at Hospital S and to its intravenous rehydration room (IV room) during the incubation period (7-21 days before their illness onset). The attack rate of measles in Wenzhou City was 3.3/100,000 during September 1, 2010 to January 11, 2011. Children aged 8-11 m had the highest attack rate (171/100,000) of all age groups. In children not age-eligible for the MMIC but should have been routinely vaccinated after the MMIC, the vaccination rate was only 52%. In the case-control investigation, 60% (25/42) of case-patients compared with 21% (35/168) of control-patients had visited Hospital S (adjusted ORM-H = 5.5, 95% CI = 2.7-11). Among unvaccinated children who had received treatment in Hospital S, 84% (21/25) of case-patients compared 38% (11/29) of control-patients had visited the IV room (adjusted ORM-H = 9.2, 95% CI = 1.5-59). Relaxed routine measles vaccination among children after the MMIC was the main factor responsible for this epidemic. Exposure in the IV room at Hospital S facilitated the epidemic. To reach the goal of measles elimination, the Chinese public health authorities should make greater efforts to improve timely routine measles vaccination, and to reduce nosocomial transmission.
Gao, Jie; He, Han-qing; Shen, Ji-chuan; Huang, Zhi-yong; Ma, Hui-lai; Luo, Shu-ying; Chen, En-fu
2010-10-01
On July 6, 2010, the parents of a patient with confirmed measles reported several suspected measles patients with fever and rash in their village. An investigation was carried out to verify and understand the cause of the outbreak. Several suspected cases had an onset of fever and rash in this and other neighboring villages during June 1 to August 3, 2010. A confirmed case was a suspected case with measles-specific IgM identified in the serum. We conducted door-to-door visits and searched the Chinese Center for Disease Control and Prevention Information System to identify cases, also conducted a retrospective cohort study among migrant children aged 8 months-14 years to identify risk factors related to measles. We identified 19 measles cases (17 confirmed case, 2 suspected cases) in the village, and all of them were migrants. Children aged 1-2 years had the highest attack rate (13%). The primary case-patient had onset on the day she arrived in this village (June 4, 2010). Caretakers from an unlicensed private clinic were providing service in the village but did not report the outbreak to the public health authority. The outbreak was identified only after receiving a report from the parents of one of the patients, by that time the outbreak had lasted for one month. The measles vaccine coverage rate was 81% among the 315 migrant children aged 8 months-14 years. Among the 61 unvaccinated children, those who reportedly being contacted a measles patient had a higher attack rate (14/16, 88%) than those who did not (2/45, 4.4%) (Relative risk = 20, Fisher's exact 95% confidence interval: 5.7-94). The low measles vaccine coverage among migrant children and lack of measures taken on the incident, timely isolation diagnosis/reporting by the caretakers from the unlicensed private clinic etc. had contributed to this prolonged outbreak. Measures need to be taken to improve the immunization services for migrant populations and to enhance measles surveillance programs in the area.
Chu, Chen-Yi; de Silva, U Chandimal; Guo, Jin-Peng; Wang, Yong; Wen, Liang; Lee, Vernon J; Li, Shen-Long; Huang, Liu-Yu
2017-07-01
Many studies have suggested the effectiveness of single control measures in the containment and mitigation of pandemic influenza A (H1N1) 2009. The effects of combined interventions by multiple control measures in reducing the impact of an influenza A (H1N1) 2009 outbreak in a closed physical training camp in Beijing, China were evaluated. Oseltamivir was prescribed for the treatment of confirmed cases and possible cases and as prophylaxis for all other participants in this training camp. Public health control measures were applied simultaneously, including the isolation of patients and possible cases, personal protection and hygiene, and social distancing measures. Symptom surveillance of all participants was initiated, and the actual attack rate was calculated. For comparison, the theoretical attack rate for this outbreak was projected using the Newton-Raphson numerical method. A total of 3256 persons were present at the physical training camp. During the outbreak, 405 (68.3%) possible cases and 26 (4.4%) confirmed cases were reported before the intervention and completed oseltamivir treatment; 162 (27.3%) possible cases were reported after the intervention and received part treatment and part prophylaxis. The other 2663 participants completed oseltamivir prophylaxis. Of the possible cases, 181 with fever ≥38.5°C were isolated. The actual attack rate for this outbreak of pandemic influenza A (H1N1) 2009 was 18.2%, which is much lower than the theoretical attack rate of 80% projected. Combined interventions of large-scale antiviral ring prophylaxis and treatment and public health control measures could be applied to reduce the magnitude of influenza A (H1N1) 2009 outbreaks in closed settings. Copyright © 2017 The Authors. Published by Elsevier Ltd.. All rights reserved.
Does fluoride in drinking water delay tooth eruption?
Jolaoso, Ismail Adeyemi; Kumar, Jayanth; Moss, Mark E
2014-01-01
The objectives of this study are to determine the effect of fluoride exposure on permanent tooth eruption patterns as well as to understand its effect on caries attack rate by accounting for the number of erupted tooth surfaces. We analyzed data from the 1986-1987 National Survey of Oral Health of US Schoolchildren to determine the mean number of erupted permanent teeth and permanent first molars according to fluoride level in drinking water. The analysis included 13,348 children aged 5-17 years with a history of single residence. We also estimated the attack rate (decayed, missing, and filled surfaces/surfaces at risk) for fluoride deficient, suboptimal, and optimally fluoridated areas adjusting for covariates. Multivariable statistical analyses were performed to control for potential confounders. By age 7, almost all permanent first molars had erupted. The adjusted mean number of erupted permanent first molars per child were 3.81, 3.67, and 3.92 in areas with <0.3, 0.3-<0.7, and 0.7-1.2 ppm of fluoride, respectively. The adjusted caries attack rate in the first permanent molars among 5- to 17-year-old children was 93, 81, and 78 per 1,000 surfaces in fluoride deficient, suboptimal, and optimally fluoridated areas, respectively (P < 0.0001). This pattern of higher first molar attack rate among children in the fluoride-deficient communities was also observed in all erupted teeth. Exposure to fluoride in drinking water did not delay the eruption of permanent teeth. The observed difference in dental caries experience among children exposed to different fluoride levels could not be explained by the timing of eruption of permanent teeth. © 2014 American Association of Public Health Dentistry.
Messinger, Susanna M; Ostling, Annette
2013-11-01
Predation interactions are an important element of ecological communities. Population spatial structure has been shown to influence predator evolution, resulting in the evolution of a reduced predator attack rate; however, the evolutionary role of traits governing predator and prey ecology is unknown. The evolutionary effect of spatial structure on a predator's attack rate has primarily been explored assuming a fixed metapopulation spatial structure, and understood in terms of group selection. But endogenously generated, emergent spatial structure is common in nature. Furthermore, the evolutionary influence of ecological traits may be mediated through the spatial self-structuring process. Drawing from theory on pathogens, the evolutionary effect of emergent spatial structure can be understood in terms of self-shading, where a voracious predator limits its long-term invasion potential by reducing local prey availability. Here we formalize the effects of self-shading for predators using spatial moment equations. Then, through simulations, we show that in a spatial context self-shading leads to relationships between predator-prey ecology and the predator's attack rate that are not expected in a non-spatial context. Some relationships are analogous to relationships already shown for host-pathogen interactions, but others represent new trait dimensions. Finally, since understanding the effects of ecology using existing self-shading theory requires simplifications of the emergent spatial structure that do not apply well here, we also develop metrics describing the complex spatial structure of the predator and prey populations to help us explain the evolutionary effect of predator and prey ecology in the context of self-shading. The identification of these metrics may provide a step towards expansion of the predictive domain of self-shading theory to more complex spatial dynamics. Copyright © 2013 Elsevier Inc. All rights reserved.
NASA Technical Reports Server (NTRS)
Kramer, Max
1932-01-01
Wind-tunnel tests are described, in which the angle of attack of a wing model was suddenly increased (producing the effect of a vertical gust) and the resulting forces were measured. It was found that the maximum lift coefficient increases in proportion to the rate of increase in the angle of attack. This fact is important for the determination of the gust stresses of airplanes with low wing loading. The results of the calculation of the corrective factor are given for a high-performance glider and a light sport plane of conventional type.
Histamine poisoning from insect consumption: an outbreak investigation from Thailand.
Chomchai, Summon; Chomchai, Chulathida
2018-02-01
Insect consumption is a common practice in the Asian culture and all over the world. We are reporting an outbreak investigation of histamine poisoning from ingestion of fried insects. On 24 July 2014, a group of students at a seminar presented to Angthong Provincial Hospital, Thailand, with pruritic rash after ingesting snacks consisting of fried insects from a vendor. We initiated an outbreak investigation with retrospective cohort design and collected samples of remaining foods for analyses. Attack rates, relative risks and their confidence intervals (CI) were calculated. Out of 227 students, 28 developed illnesses that were consistent with our case definition which included, flushing, pruritus, urticarial rashes, headache, nausea, vomiting, diarrhea, dyspnea and bronchospasm. Two children were hospitalized for progressive bronchospasm overnight without serious complications. The types of food ingested included a lunch that was provided at the seminar for all students and snacks that 41 students bought from the only vendor in the vicinity. The snacks included fried grasshoppers, silkworm pupae, common green frogs, bamboo borers, crickets and meat balls. The attack rates were highest (82.6 and 85.0%) among students who ingested fried grasshoppers and silkworm pupae and lowest (4.4 and 5.3%) among those who did not ingest them, with relative risk of 18.7 (95% CI 9.6-36.4) for grasshoppers and 16.0 (95% CI 8.8-29.3) for silkworm pupae. Histamine concentrations in the fried grasshoppers and silkworm pupae were 9.73 and 7.66 mg/100g, respectively. Through epidemiological analysis and laboratory confirmation, we have illustrated that histamine poisoning can occur from ingestion of fried insects. We postulate that histidine, which is present in high concentration in grasshoppers and silkworm pupae, is decarboxylated by bacteria to histamine, a heat stable toxin. The ingestion of histamine is responsible for the clinical pictures being reported.
Breda, M O; de Oliveira, J V; Esteves Filho, A B; Barbosa, D R S; de Santana, M F
2016-10-01
Despite the continued efforts on the search for different genotypes, Capsicum annuum (L.) is quite susceptible to attack by pest arthropods, especially the broad mite Polyphagotarsonemus latus Banks. Thus, the host preference, population growth and the injuries assessment of P. latus was studied on six C. annuum genotypes used in Brazil (Atlantis, California Wonder, Impact, Palloma, Rubia and Tendence). Host preference was accessed in choice tests, pairing the several genotypes, and the population growth was observed through non-choice tests in laboratory. The injuries assessments were evaluated in the greenhouse, comparing the injury level among the six genotypes. The results indicate that California Wonder and Palloma genotypes were more preferred by P. latus, and Impact and Tendence were less preferred. P. latus presented positive population growth rates (ri) on all the genotypes, however, Palloma and California Wonder showed the highest values of population growth rate (ri = 0.344 and ri = 0.340, respectively), while Impact had the lowest value (ri = 0.281). All the evaluated C. annuum genotypes showed low tolerance to P. latus and exhibited several injuries, but there was no statistical difference between them. California Wonder had the highest average number of mites/leaf (57.15), while Impact and Tendence obtained the lowest values (36.67 and 35.12, respectively) at the end of the evaluation period. The total average of injuries notes at the end of the bioassay did not differ between the genotypes. The number of mites/leaf was growing for the injury scale to the note 3.0, but when the injury scale approached the note 4.0, there was observed a decrease in the number of mites/leaf for all the genotypes.
Nadi, Aliasghar; Abedi, Ghassem; Isazadeh, Khatoon; Rostami, Farideh; Siamian, Hasan; Hosseini, Mahbobeh; Asadi-Aliabadi, Mehran
2016-12-01
Dysentery is an intestinal inflammation which is created by the microorganisms attacking intestine mucus. Knowing the prevalence of this disease in different societies paves the way for programming and providing treatment and preventive measures. The main purpose of this study is to investigate the epidemiologic pattern and geographical distribution of dysentery based on GIS. This was a cross-sectional and analytical study. The dysentery cases were gathered from the section of contagious diseases in health chancellery of Mazandaran University of medical sciences through a checklist during the years 2008 to 2013. In order to analyze the data, we made use of chi-square test. Then, the GIS software was used to recognize the geographical distribution of the disease. There was reported about 653 cases affected by dysentery and the disease proportion was equal for both men and women. Most of the persons with dysentery was city dwellers. The highest rate of incidents was reported to be in Fereidunkenar in 2011, and the disease was mostly found among farmers, students, and college students. Since dysentery is a disease transmitted from water and food, and in this study, it was found out that the disease sources included using polluted water, vegetables, and lack of appropriate personal hygiene. Therefore, it is essential to take into consideration the health issues. Moreover, the suitable conditions of the geographical area which has the highest rate of incident have paved the way for dysentery occurrence. In addition, using geographic information system (GIS) as a visual instrument can help the stakeholders and officials to elaborate on the death trend and recognize the areas for optimal use of the available resources.
Nadi, Aliasghar; Abedi, Ghassem; Isazadeh, Khatoon; Rostami, Farideh; Siamian, Hasan; Hosseini, Mahbobeh; Asadi-Aliabadi, Mehran
2016-01-01
Introduction: Dysentery is an intestinal inflammation which is created by the microorganisms attacking intestine mucus. Knowing the prevalence of this disease in different societies paves the way for programming and providing treatment and preventive measures. The main purpose of this study is to investigate the epidemiologic pattern and geographical distribution of dysentery based on GIS. Method: This was a cross-sectional and analytical study. The dysentery cases were gathered from the section of contagious diseases in health chancellery of Mazandaran University of medical sciences through a checklist during the years 2008 to 2013. In order to analyze the data, we made use of chi-square test. Then, the GIS software was used to recognize the geographical distribution of the disease. Findings: There was reported about 653 cases affected by dysentery and the disease proportion was equal for both men and women. Most of the persons with dysentery was city dwellers. The highest rate of incidents was reported to be in Fereidunkenar in 2011, and the disease was mostly found among farmers, students, and college students. Conclusion: Since dysentery is a disease transmitted from water and food, and in this study, it was found out that the disease sources included using polluted water, vegetables, and lack of appropriate personal hygiene. Therefore, it is essential to take into consideration the health issues. Moreover, the suitable conditions of the geographical area which has the highest rate of incident have paved the way for dysentery occurrence. In addition, using geographic information system (GIS) as a visual instrument can help the stakeholders and officials to elaborate on the death trend and recognize the areas for optimal use of the available resources. PMID:28144197
Brookes, V J; Barry, S C; Hernández-Jover, M; Ward, M P
2017-04-01
The objective of this study was to trial point of truth calibration (POTCal) as a novel method for disease prioritisation. To illustrate the application of this method, we used a previously described case-study of prioritisation of exotic diseases for the pig industry in Australia. Disease scenarios were constructed from criteria which described potential impact and pig-producers were asked to score the importance of each scenario. POTCal was used to model participants' estimates of disease importance as a function of the criteria, to derive a predictive model to prioritise a range of exotic diseases. The best validation of producers' estimates was achieved using a model derived from all responses. The highest weighted criteria were attack rate, case fatality rate and market loss, and the highest priority diseases were the vesicular diseases followed by swine fevers and zoonotic encephalitides. Comparison of results with a previous study in which probabilistic inversion was used to prioritise diseases for the same group of producers highlighted differences between disease prioritisation methods. Overall, this study demonstrated that POTCal can be used for disease prioritisation. An advantage of POTCal is that valid models can be developed that reflect decision-makers' heuristics. Specifically, this evaluation of the use of POTCal in animal health illustrates how the judgements of participants can be incorporated into a decision-making process. Further research is needed to investigate the influence of scenarios presented to participants during POTCal evaluations, and the robustness of this approach applied to different disease issues (e.g. exotic versus endemic) and production types (e.g. intensive versus extensive). To our knowledge, this is the first report of the use of POTCal for disease prioritisation. Crown Copyright © 2017. Published by Elsevier B.V. All rights reserved.
Ankrah, Daniel N A; Darko, Delese M; Sabblah, George; Mantel-Teeuwisse, Aukje; Leufkens, Hubert M G
2018-01-02
Timely reporting of safety information post vaccination is pivotal for the success of any vaccination program. Reports of adverse events following immunization (AEFI) of 6 different vaccinations from Ghana were analysed for signals. De-identified data from active surveillance for AEFIs after 2009 AH1N1 influenza, yellow fever, meningitis, measles-rubella, pneumococcal-rotavirus and human papilloma virus vaccinations were used. All vaccinations occurred between January 2010 and December 2013. The ten most occurring events for each vaccination were captured and arranged using Medical Dictionary for Regulatory Authorities (MedDRA) Preferred Term (PT) and System Organ Classification (SOC) codes. Adverse event incidence rates were calculated for each vaccine type, and signals were generated using proportional reporting ratios (PRR). A total number of 5,141 reports were analysed ranging from 33 (human papilloma virus) to 1958 (measles-rubella). Between 22% and 55% of all AEFIs per vaccine type were collected on the day of vaccination. For each vaccine type, at least 87% of all reported AEFIs occurred in the first 7 days post-vaccination. Multiple reports were received per vaccine type. For the MR vaccine, urticarial recorded the highest attack rate of 6.6 (95% CI 6.2, 7.1) per 100,000 vaccines. The AEFI with the highest PRR for both human papilloma and measles-rubella vaccines was abdominal pain, recording a PRR of 8.15 (95% CI 3.46, 19.23) and 43.75 (95% CI 17.81, 107.45) respectively. These results underscore the competency of public health systems in sub-Saharan African countries (like Ghana) to identify most frequently occurring and important vaccine related safety issues.
Carling, Christopher; Le Gall, Franck; McCall, Alan; Nédélec, Mathieu; Dupont, Gregory
2015-01-01
Squad management, injury and physical, tactical and technical match performance were investigated in a professional soccer team across five consecutive league seasons (2008-2013, 190 league games) with specific focus on a championship-winning season (2010/11). For each player, match participation and time-loss injuries were recorded, the latter prospectively diagnosed by the team's physician. Defending and attacking tactical and technical performance indicators investigated included ball possession and possession in opponents' half, passes, forward passes, completed passes and forward passes, crosses and completed crosses, goal attempts and goal attempts on target, successful final third entries, free-kicks and 50/50 duels won/lost. Physical performance measures included total distance and distance covered at high-speeds (≥19.1 km/h). Results showed that during the 2010/11 season, squad utilisation was lowest potentially owing to the observed lower match injury occurrence and working days lost to injury thereby increasing player availability. In 2010/11, the team won both its highest number of points and conceded its lowest number of goals especially over the second half of this season. The team also won its highest number of games directly via a goal from a substitute and scored and conceded a goal first on the highest and lowest number of occasions, respectively. While multivariate analysis of variance (MANOVA) detected a significant difference in some attacking and defensive performance indicators across the five seasons, these were generally not distinguishing factors in 2010/11. Similarly, univariate ANOVAs showed a significant difference in running distances covered across seasons, but the trend was for less activity in 2010/11.
Asthma-specific health-related quality of life of people in Great Britain: A national survey.
Upton, Jane; Lewis, Carine; Humphreys, Emily; Price, David; Walker, Samantha
2016-11-01
Although the ultimate goal of asthma treatment is to improve asthma-specific Health-Related Quality-Of-Life (HRQOL), in the UK population this is insufficiently studied. National asthma-specific HRQOL data is needed to inform strategies to address this condition. To benchmark asthma-specific HRQOL in a national survey of adults with asthma, and explore differences in this measure within subsections of the population. We analysed answers to the Marks Asthma Quality-of-Life Questionnaire (AQLQ-M) from a representative sample of 658 adults with asthma. Respondents answered asthma-specific questions to assess control, previous hospital admissions, asthma attacks and an indicator of severity. Higher scores indicate poorer HRQOL (maximum = 60). The highest quintile formed a subgroup 'Poor HRQOL'. Data were weighted to correct for any biases caused by differential non-response. Chi-square analyses were used to determine differences between good and poor quality of life and regression analyses performed to determine what factors are associated with poor HRQOL. The response rate was 49%. AQLQ-M median (IQR) scores were 5 (2-13) for the total sample (poor HRQOL = 21, good HRQOL = 3). Significant differences between good and poor HRQOL were observed in smoking status, SES, employment status and co-morbidities, but no differences were found between age groups. Those with poorly controlled asthma were significantly more likely to have poor HRQOL, ≥1 breathing related hospital admission or ≥1 asthma attack. This article provides benchmarking data on asthma-specific HRQOL. Improved strategies are needed to target interventions towards people experiencing poor HRQOL.
Wang, Wen; Zhang, Lu; Liu, Weiming; Zhu, Qin; Lan, Qing; Zhao, Jizong
2016-05-01
Stroke can cause high morbidity and mortality, and ischemic stroke (IS) and transient ischemic attack (TIA) patients have a high stroke recurrence rate. Antiplatelet agents are the standard therapy for these patients, but it is often difficult for clinicians to select the best therapy from among the multiple treatment options. We therefore performed a network meta-analysis to estimate the efficacy of antiplatelet agents for secondary prevention of recurrent stroke. We systematically searched 3 databases (PubMed, Embase, and Cochrane) for relevant studies published through August 2015. The primary end points of this meta-analysis were overall stroke, hemorrhagic stroke, and fatal stroke. A total of 30 trials were included in our network meta-analysis and abstracted data. Among the therapies evaluated in the included trials, the estimates for overall stroke and hemorrhagic stroke for cilostazol (Cilo) were significantly better than those for aspirin (odds ratio [OR] = .64, 95% credibility interval [CrI], .45-.91; OR = .23, 95% CrI, .08-.58). The estimate for fatal stroke was highest for Cilo plus aspirin combination therapy, followed by Cilo therapy. The results of our meta-analysis indicate that Cilo significantly improves overall stroke and hemorrhagic stroke in IS or TIA patients and reduces fatal stroke, but with low statistical significance. Our results also show that Cilo was significantly more efficient than other therapies in Asian patients; therefore, future trials should focus on Cilo treatment for secondary prevention of recurrent stroke in non-Asian patients. Copyright © 2016 National Stroke Association. Published by Elsevier Inc. All rights reserved.
Huynh, Bich Tram; Tual, Séverine; Turbelin, Clément; Pelat, Camille; Cecchi, Lorenzo; D'Amato, Gennaro; Blanchon, Thierry; Annesi-Maesano, Isabella
2010-09-01
To investigate for the first time the short-term effects of airborne pollen counts on general practitioner (GP) consultations for asthma attacks in the Greater Paris area between 2003-2007. Counts were available for common pollens (Betula, Cupressa, Fraxinus and Poaceae). Weekly data on GP visits for asthma attacks were obtained from the French GP Sentinel Network. A quasi-Poisson regression with generalised additive models was implemented. Short-term effects of pollen counts were assessed using single and multi-pollen models after adjustment for air pollution and influenza. A mean weekly incidence rate of 25.4 cases of asthma attacks per 100,000 inhabitants was estimated during the study period. The strongest significant association between asthma attacks and pollen counts was registered for grass (Poaceae) in the same week of asthma attacks, with a slight reduction of the effect observed in the multi-pollen model. Adjusted relative risk for Poaceae was 1.54 (95% CI: 1.33-1.79) with an inter-quartile range increase of 17.6 grains/m3 during the pollen season. For the first time, a significant short-term association was observed between Poaceae pollen counts and consultations for asthma attacks as seen by GPs. These findings need to be confirmed by more consistent time-series and investigations on a daily basis.
Contextual Factors Among Indiscriminate or Large Attacks on Food or Water Supplies, 1946-2015
Hunter, Paul R.
2016-01-01
This research updates previous inventories of malicious attacks on food and water and includes data from 1946 through mid-2015. A systematic search of news reports, databases, and previous inventories of poisoning events was undertaken. Incidents that threatened or were intended to achieve direct harm to humans and that were either relatively large (more than 4 victims) or indiscriminate in intent or realization were included. Agents could be chemical, biological, or radionuclear. Reports of candidate incidents were subjected to systematic inclusion and exclusion criteria as well as validity analysis (not always clearly undertaken in previous inventories of such attacks). We summarize contextual aspects of the attacks that may be important for scenario prioritization, modelling, and defensive preparedness. Opportunity, and particularly access to dangerous agents, is key to most realized attacks. The most common motives and relative success rate in causing harm were very different between food and water attacks. The likelihood that people were made ill or died also varied by food or water mode and according to motive and opportunity for delivery of the hazardous agent. Deaths and illness associated with attacks during food manufacture and prior to sale have been fewer than those in some other contexts. Valuable opportunities for food defense improvements are identified in other contexts, especially food prepared in private or community settings. PMID:26889577
Knowledge of Signs and Symptoms of Heart Attack and Stroke among Singapore Residents
Quah, Joy Li Juan; Yap, Susan; Cheah, Si Oon; Ng, Yih Yng; Goh, E. Shaun; Doctor, Nausheen; Leong, Benjamin Sieu-Hon; Tiah, Ling; Chia, Michael Yih Chong; Ong, Marcus Eng Hock
2014-01-01
Aim. To determine the level of knowledge of signs and symptoms of heart attack and stroke in Singapore resident population, in comparison to the global community. Methods. A population based, random sample of 7,840 household addresses was selected from a validated national sampling frame. Each participant was asked eight questions on signs and symptoms of heart attack and 10 questions on stroke. Results. The response rate was 65.2% with 4,192 respondents. The level of knowledge for preselected, common signs and symptoms of heart attack and stroke was 57.8% and 57.1%, respectively. The respondents scored a mean of 5.0 (SD 2.4) out of 8 for heart attack, while they scored a mean of 6.8 (SD 2.9) out of 10 for stroke. Respondents who were ≥50 years, with lower educational level, and unemployed/retired had the least knowledge about both conditions. The level of knowledge of signs and symptoms of heart attack and stroke in Singapore is comparable to USA and Canada. Conclusion. We found a comparable knowledge of stroke and heart attack signs and symptoms in the community to countries within the same economic, educational, and healthcare strata. However older persons, those with lower educational level and those who are unemployed/retired, require more public health education efforts. PMID:24812623
Diarrhoeal problems in Southeast Asia.
Sunoto
1982-09-01
Diarrhoea up till now is still a major problem in Southeast Asia with high morbidity and mortality, particularly among children under 5 years of age, with the peak in children between 6 - 24 months. In Indonesia, in 1981, it was estimated that there are 60 million episodes with 300,000 - 500,000 deaths. In the Philippines, diarrhoea ranks as a second cause of morbidity (600 per 100,000 in 1974) and second cause of infant mortality (5 per 1,000 in 1974). In Thailand, in 1980, the morbidity rate was 524 per 100,000 and the mortality rate 14 per 100,000. In Malaysia, in 1976, diarrhoea was still ranking number 5 (3.1%) as a cause of total admission and number 9 (2.2%) as a cause of total deaths. In Singapore, diarrhoea still ranks number 3 as a cause of deaths (4% of total deaths). In Bangladesh, the overall attack rates imply a prevalence of 2.0% for the entire population, with the highest for under 5 groups i.e. 4.1%. The diarrhoea episode in rural population is 85.4%, 39% of them are children under 5. The most common enteropathogens found in all countries are rotavirus followed by Enterotoxigenic E. coli, Vibrio spp., Salmonella spp., Shigella spp. and Campylobacter. Malnutrition and decline of giving breast-feeding play an important role in causing high morbidity, besides socio-economic, socio-cultural and poor environmental sanitation.
Autonomic changes after treatment of agoraphobia with panic attacks.
Roth, W T; Telch, M J; Taylor, C B; Agras, W S
1988-04-01
Twenty-three patients meeting DSM-III criteria for agoraphobia with panic attacks and 14 age-, race-, and sex-matched nonanxious controls were tested in the laboratory and on a test walk in a shopping mall. The patients were tested before and after about 15 weeks of treatment with placebo and exposure therapy, imipramine and exposure therapy, or imipramine and initial antiexposure instructions. Controls were tested twice at a similar interval, but without any treatment. On test day 1, patients compared to controls showed higher average heart rate and skin conductance levels and greater numbers of skin conductance fluctuations in the laboratory, and higher heart rates before and during the test walk. Between pretreatment and posttreatment tests, clinical ratings improved and skin conductance levels decreased in all treatment groups. Heart rate levels in the laboratory, on the other hand, decreased in patients on placebo and rose in patients on imipramine. Thus, imipramine compromises the usefulness of heart rate as a measure of emotional arousal. Higher pretreatment heart rates predicted greater clinical improvement.
Side-channel-free quantum key distribution.
Braunstein, Samuel L; Pirandola, Stefano
2012-03-30
Quantum key distribution (QKD) offers the promise of absolutely secure communications. However, proofs of absolute security often assume perfect implementation from theory to experiment. Thus, existing systems may be prone to insidious side-channel attacks that rely on flaws in experimental implementation. Here we replace all real channels with virtual channels in a QKD protocol, making the relevant detectors and settings inside private spaces inaccessible while simultaneously acting as a Hilbert space filter to eliminate side-channel attacks. By using a quantum memory we find that we are able to bound the secret-key rate below by the entanglement-distillation rate computed over the distributed states.
Hrcek, Jan; Miller, Scott E; Whitfield, James B; Shima, Hiroshi; Novotny, Vojtech
2013-10-01
The processes maintaining the enormous diversity of herbivore-parasitoid food webs depend on parasitism rate and parasitoid host specificity. The two parameters have to be evaluated in concert to make conclusions about the importance of parasitoids as natural enemies and guide biological control. We document parasitism rate and host specificity in a highly diverse caterpillar-parasitoid food web encompassing 266 species of lepidopteran hosts and 172 species of hymenopteran or dipteran parasitoids from a lowland tropical forest in Papua New Guinea. We found that semi-concealed hosts (leaf rollers and leaf tiers) represented 84% of all caterpillars, suffered a higher parasitism rate than exposed caterpillars (12 vs. 5%) and their parasitoids were also more host specific. Semi-concealed hosts may therefore be generally more amenable to biological control by parasitoids than exposed ones. Parasitoid host specificity was highest in Braconidae, lower in Diptera: Tachinidae, and, unexpectedly, the lowest in Ichneumonidae. This result challenges the long-standing view of low host specificity in caterpillar-attacking Tachinidae and suggests higher suitability of Braconidae and lower suitability of Ichneumonidae for biological control of caterpillars. Semi-concealed hosts and their parasitoids are the largest, yet understudied component of caterpillar-parasitoid food webs. However, they still remain much closer in parasitism patterns to exposed hosts than to what literature reports on fully concealed leaf miners. Specifically, semi-concealed hosts keep an equally low share of idiobionts (2%) as exposed caterpillars.
Analysis of Wind Tunnel Lateral Oscillatory Data of the F-16XL Aircraft
NASA Technical Reports Server (NTRS)
Klein, Vladislav; Murphy, Patrick C.; Szyba, Nathan M.
2004-01-01
Static and dynamic wind tunnel tests were performed on an 18% scale model of the F-16XL aircraft. These tests were performed over a wide range of angles of attack and sideslip with oscillation amplitudes from 5 deg. to 30 deg. and reduced frequencies from 0.073 to 0.269. Harmonic analysis was used to estimate Fourier coefficients and in-phase and out-of-phase components. For frequency dependent data from rolling oscillations, a two-step regression method was used to obtain unsteady models (indicial functions), and derivatives due to sideslip angle, roll rate and yaw rate from in-phase and out-of-phase components. Frequency dependence was found for angles of attack between 20 deg. and 50 deg. Reduced values of coefficient of determination and increased values of fit error were found for angles of attack between 35 deg. and 45 deg. An attempt to estimate model parameters from yaw oscillations failed, probably due to the low number of test cases at different frequencies.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Liu, Jun; Qiu, Qiwen; Chen, Xiaochi
An experimental study is carried out with the aim to understand the interacted mechanism between carbonation and chloride aerosol attack in ordinary Portland cement (OPC) concrete. Effects of carbonation on the chloride profile, the chloride binding capacity and the chloride diffusion coefficient are evaluated. Besides, effect of chloride aerosol attack on the carbonation rate is investigated. Concrete specimens with three water-to-cement ratios (0.38, 0.47 and 0.53) are fabricated in this work. Tested results demonstrate that carbonation remarkably affects the chloride profile, reduces the chloride binding capacity, and also accelerates the rate of chloride ion diffusion of concrete. Besides, the presencemore » of chloride aerosol can lead to lower the carbonation depth and increase the pH value of carbonated concrete. Microscopic properties such as morphology, porosity, and pore size distribution for the contaminated concretes are explored by scanning electron microscope and mercury intrusion porosimetry, which provide strong evidence to these research findings.« less
Erosion of aluminum 6061-T6 under cavitation attack in mineral oil and water
NASA Technical Reports Server (NTRS)
Rao, B. C. S.; Buckley, D. H.
1985-01-01
Studies of the erosion of aluminum 6061-T6 under cavitation attack in distilled water, ordinary tap water and a viscous mineral oil are presented. The mean depth of penetration for the mineral oil was about 40 percent of that for water at the end of a 40 min test. The mean depth of penetration and its rate did not differ significantly for distilled and tap water. The mean depth of penetration rate for both distilled and tap water increased to a maximum and then decreased with test duration, while that for mineral oil had a maximum during the initial period. The ratio h/2a of the pit depth h to the pit diameter 2a varied from 0.04 to 0.13 in water and from 0.06 to 0.20 in mineral oil. Scanning electron microscopy indicates that the pits are initially formed over the grain boundaries and precipitates while the surface grains are deformed under cavitation attack.
USDA-ARS?s Scientific Manuscript database
We evaluated the susceptibility of 15 mango cultivars to the attack of Anastrepha ludens and A. obliqua, the main Tephritid pests of this crop in Mexico. In a field experiment, bagged, fruit-bearing branches were exposed to gravid females of both fly species. Infestation rates, developmental time,...
A Trustworthy Key Generation Prototype Based on DDR3 PUF for Wireless Sensor Networks
Liu, Wenchao; Zhang, Zhenhua; Li, Miaoxin; Liu, Zhenglin
2014-01-01
Secret key leakage in wireless sensor networks (WSNs) is a high security risk especially when sensor nodes are deployed in hostile environment and physically accessible to attackers. With nowadays semi/fully-invasive attack techniques attackers can directly derive the cryptographic key from non-volatile memory (NVM) storage. Physically Unclonable Function (PUF) is a promising technology to resist node capture attacks, and it also provides a low cost and tamper-resistant key provisioning solution. In this paper, we designed a PUF based on double-data-rate SDRAM Type 3 (DDR3) memory by exploring its memory decay characteristics. We also described a prototype of 128-bit key generation based on DDR3 PUF with integrated fuzzy extractor. Due to the wide adoption of DDR3 memory in WSN, our proposed DDR3 PUF technology with high security levels and no required hardware changes is suitable for a wide range of WSN applications. PMID:24984058
Romón, Pedro; Aparicio, Domitila; Palacios, Francisco; Iturrondobeitia, Juan Carlos; Hance, Thierry
2017-01-01
Abstract Concentrations of four monoterpenes were determined in needles of Pinus radiata (D.Don) (Pinales: Pinaceae) trees that were attacked or nonattacked by Tomicus piniperda (L.) (Coleoptera: Scolytinae). Compounds were identified and quantified by gas chromatography–mass spectrometry. The mean ambient temperature was obtained using climate-recording data loggers. The effect of limonene on field aggregation was also evaluated at three limonene release rates using Lindgren attractant-baited traps and trap logs. Attacked trees produced less α-pinene in March, July, and November than nonattacked trees, less β-pinene in July and November, and less limonene from May to November. Limonene reduced the attraction of T. piniperda to attractant-baited traps and trap logs. Results were linked to better responses to high temperatures, with respect to terpene contents, by the nonattacked trees after the spring attack. PMID:29117373
Bruce-Chwatt, L. J.; Southgate, B. A.; Draper, C. C.
1974-01-01
Over the past decade the United Kingdom had the second highest number of cases of imported malaria among European countries. There has been a substantial rise in recorded cases of malaria during the past three years though some of it may be due to improved notification. Fatal cases of malaria in visitors to Africa have averaged 6.5% of reported infections due to Plasmodium falciparum. Attacks of vivax malaria may occur several months after travellers return from a malarious country. PMID:4604717
NASA Astrophysics Data System (ADS)
Fernández-Marín, Hermógenes; Zimmerman, Jess K.; Wcislo, William T.
2006-01-01
New World diapriine wasps are abundant and diverse, but the biology of most species is unknown. We provide the first description of the biology of diapriine wasps, Acanthopria spp. and Mimopriella sp., which attack the larvae of Cyphomyrmex fungus-growing ants. In Puerto Rico, the koinobiont parasitoids Acanthopria attack Cyphomyrmex minutus, while in Panama at least four morphospecies of Acanthopria and one of Mimopriella attack Cyphomyrmex rimosus. Of the total larvae per colony, 0 100% were parasitized, and 27 70% of the colonies per population were parasitized. Parasitism rate and colony size were negatively correlated for C. rimosus but not for C. minutus. Worker ants grasped at, bit, and in some cases, killed adult wasps that emerged in artificial nests or tried to enter natural nests. Parasitoid secondary sex ratios were female-biased for eclosing wasps, while field collections showed a male-biased sex ratio. Based on their abundance and success in attacking host ants, these minute wasps present excellent opportunities to explore how natural enemies impact ant colony demography and population biology.
Comparison of pitch rate history effects on dynamic stall
NASA Technical Reports Server (NTRS)
Chandrasekhara, M. S.; Carr, Lawrence W.; Ahmed, S.
1992-01-01
Dynamic stall of an airfoil is a classic case of forced unsteady separated flow. Flow separation is brought about by large incidences introduced by the large amplitude unsteady pitching motion of an airfoil. One of the parameters that affects the dynamic stall process is the history of the unsteady motion. In addition, the problem is complicated by the effects of compressibility that rapidly appear over the airfoil even at low Mach numbers at moderately high angles of attack. Consequently, it is of interest to know the effects of pitch rate history on the dynamic stall process. This abstract compares the results of a flow visualization study of the problem with two different pitch rate histories, namely, oscillating airfoil motion and a linear change in the angle of attack due to a transient pitching motion.
NASA Astrophysics Data System (ADS)
Li, Fang-Yi; Yin, Zhen-Qiang; Li, Hong-Wei; Chen, Wei; Wang, Shuang; Wen, Hao; Zhao, Yi-Bo; Han, Zheng-Fu
2014-07-01
Although some ideal quantum key distribution protocols have been proved to be secure, there have been some demonstrations that practical quantum key distribution implementations were hacked due to some real-life imperfections. Among these attacks, detector side channel attacks may be the most serious. Recently, a measurement device independent quantum key distribution protocol [Phys. Rev. Lett. 108 (2012) 130503] was proposed and all detector side channel attacks are removed in this scheme. Here a new security proof based on quantum information theory is given. The eavesdropper's information of the sifted key bits is bounded. Then with this bound, the final secure key bit rate can be obtained.
[Allergology and clinical immunology].
Coattrenec, Yann; Harr, Thomas; Chizzolini, Carlo; Jandus, Peter
2018-01-10
Hereditary angioedema (HA) is a disabling and potentially fatal condition. The management of HA includes treatment of acute attacks, short-term prophylaxis to prevent an attack, and long-term prophylaxis to minimize the frequency and severity of recurrent attacks. In this article, we will present new therapeutic alternatives for long term prophylaxis. Glucocorticoids (GC) usage leads to a number of severe side-effects. In giant cell arteritis, the use of tocilizumab in conjunction with low doses of GC reduces the number of relapses. In ANCA-associated vasculitis the use of an anti-C5R (avacopan) alone or in conjunction with low doses of GC results in similar remission rates to those induced by high dose GC.
Furrer, F; Franz, T; Berta, M; Leverrier, A; Scholz, V B; Tomamichel, M; Werner, R F
2012-09-07
We provide a security analysis for continuous variable quantum key distribution protocols based on the transmission of two-mode squeezed vacuum states measured via homodyne detection. We employ a version of the entropic uncertainty relation for smooth entropies to give a lower bound on the number of secret bits which can be extracted from a finite number of runs of the protocol. This bound is valid under general coherent attacks, and gives rise to keys which are composably secure. For comparison, we also give a lower bound valid under the assumption of collective attacks. For both scenarios, we find positive key rates using experimental parameters reachable today.
Prevention of Hereditary Angioedema Attacks with a Subcutaneous C1 Inhibitor.
Longhurst, Hilary; Cicardi, Marco; Craig, Timothy; Bork, Konrad; Grattan, Clive; Baker, James; Li, Huamin H; Reshef, Avner; Bonner, James; Bernstein, Jonathan A; Anderson, John; Lumry, William R; Farkas, Henriette; Katelaris, Constance H; Sussman, Gordon L; Jacobs, Joshua; Riedl, Marc; Manning, Michael E; Hebert, Jacques; Keith, Paul K; Kivity, Shmuel; Neri, Sergio; Levy, Donald S; Baeza, Maria L; Nathan, Robert; Schwartz, Lawrence B; Caballero, Teresa; Yang, William; Crisan, Ioana; Hernandez, María D; Hussain, Iftikhar; Tarzi, Michael; Ritchie, Bruce; Králíčková, Pavlina; Guilarte, Mar; Rehman, Syed M; Banerji, Aleena; Gower, Richard G; Bensen-Kennedy, Debra; Edelman, Jonathan; Feuersenger, Henrike; Lawo, John-Philip; Machnig, Thomas; Pawaskar, Dipti; Pragst, Ingo; Zuraw, Bruce L
2017-03-23
Hereditary angioedema is a disabling, potentially fatal condition caused by deficiency (type I) or dysfunction (type II) of the C1 inhibitor protein. In a phase 2 trial, the use of CSL830, a nanofiltered C1 inhibitor preparation that is suitable for subcutaneous injection, resulted in functional levels of C1 inhibitor activity that would be expected to provide effective prophylaxis of attacks. We conducted an international, prospective, multicenter, randomized, double-blind, placebo-controlled, dose-ranging, phase 3 trial to evaluate the efficacy and safety of self-administered subcutaneous CSL830 in patients with type I or type II hereditary angioedema who had had four or more attacks in a consecutive 2-month period within 3 months before screening. We randomly assigned the patients to one of four treatment sequences in a crossover design, each involving two 16-week treatment periods: either 40 IU or 60 IU of CSL830 per kilogram of body weight twice weekly followed by placebo, or vice versa. The primary efficacy end point was the number of attacks of angioedema. Secondary efficacy end points were the proportion of patients who had a response (≥50% reduction in the number of attacks with CSL830 as compared with placebo) and the number of times that rescue medication was used. Of the 90 patients who underwent randomization, 79 completed the trial. Both doses of CSL830, as compared with placebo, reduced the rate of attacks of hereditary angioedema (mean difference with 40 IU, -2.42 attacks per month; 95% confidence interval [CI], -3.38 to -1.46; and mean difference with 60 IU, -3.51 attacks per month; 95% CI, -4.21 to -2.81; P<0.001 for both comparisons). Response rates were 76% (95% CI, 62 to 87) in the 40-IU group and 90% (95% CI, 77 to 96) in the 60-IU group. The need for rescue medication was reduced from 5.55 uses per month in the placebo group to 1.13 uses per month in the 40-IU group and from 3.89 uses in the placebo group to 0.32 uses per month in the 60-IU group. Adverse events (most commonly mild and transient local site reactions) occurred in similar proportions of patients who received CSL830 and those who received placebo. In patients with hereditary angioedema, the prophylactic use of a subcutaneous C1 inhibitor twice weekly significantly reduced the frequency of acute attacks. (Funded by CSL Behring; COMPACT EudraCT number, 2013-000916-10 , and ClinicalTrials.gov number, NCT01912456 .).
Outbreaks of influenza-like illness in long-term care facilities in Winnipeg, Canada.
Mahmud, Salaheddin M; Thompson, Laura H; Nowicki, Deborah L; Plourde, Pierre J
2013-11-01
Outbreaks of influenza-like illness (ILI) are common in long-term care facilities (LTCFs) and result in significant morbidity and mortality among residents. We describe patterns of reported ILI outbreaks in LTCFs in Winnipeg, Canada, and examine LTCF and outbreak characteristics that influence the clinical outcomes of these outbreaks. We analyzed the electronic records of all ILI outbreaks reported by LTCFs in Winnipeg from 2003 to 2011. Outbreak duration, ILI attack rates among staff and residents, and residents' death rates were calculated by presumed viral etiology, staff vaccination rates, type of influenza chemoprophylaxis used, and time to notification to public health. Of a total of 154 reported outbreaks, most (N=80) were attributed to influenza, and these outbreaks tended to have higher attack and death rates among LTCF residents compared with outbreaks caused by other respiratory viruses (12) or those of unknown etiology (62). About 92% of residents and 38% of staff of the average LTCFs were vaccinated. Chemoprophylaxis was used in 57·5% of influenza outbreaks. Regardless of presumed viral etiology, outbreaks reported within 3 days of onset ended sooner and had lower attack and mortality rates among residents. Influenza-like illness outbreaks still occur among highly immunized LTCF residents, so in addition to vaccination of staff and residents, it is important to maintain competent infection control practices. Early identification and notification to public health authorities and possibly early initiation of control measures could improve clinical outcomes of ILI outbreaks. © 2012 John Wiley & Sons Ltd.
Gaul, C; Christmann, N; Schröder, D; Weber, R; Shanib, H; Diener, H C; Holle, D
2012-05-01
Data on clinical differences between episodic (eCH) and chronic cluster headache (cCH) and accompanying migraine features are limited. History and clinical features of 209 consecutive cluster headache patients (144 eCH, 65 cCH; male:female ratio 3.4 : 1) were obtained in a tertiary headache centre by face-to-face interviews. Relationship between occurrence of accompanying symptoms, pain intensity, comorbid migraine, and circannual and circadian rhythmicity was analysed. 99.5% of patients reported a minimum of one ipsilateral cranial autonomic symptom (CAS); 80% showed at least three CAS. A seasonal rhythmicity was observed in both eCH and cCH. A comorbid headache disorder occurred in 25%. No significant difference was detected between patients with comorbid migraine and without regarding occurrence of phonophobia, photophobia or nausea during cluster attacks. Patients with comorbid migraine reported allodynia significantly (p = 0.022) more often during cluster attacks than patients without comorbid migraine. Occurrence of CAS and attack frequency, as well as periodic patterns of attacks, are relatively uniform in eCH and cCH. Multiple CAS are not related to pain intensity. Allodynia during cluster attacks is a frequent symptom. The unexpectedly high rate of accompanying migrainous features during cluster attacks cannot be explained by comorbid migraine.
Habitat-specific foraging of prothonotary warblers: Deducing habitat quality
Lyons, J.E.
2005-01-01
Foraging behavior often reflects food availability in predictable ways. For example, in habitats where food availability is high, predators should attack prey more often and move more slowly than in habitats where food availability is low. To assess relative food availability and habitat quality, I studied the foraging behavior of breeding Prothonotary Warblers (Protonotaria citrea) in two forest habitat types, cypress-gum swamp forest and coastal-plain levee forest. I quantified foraging behavior with focal animal sampling and continuous recording during foraging bouts. I measured two aspects of foraging behavior: 1) prey attack rate (attacks per minute), using four attack maneuvers (glean, sally, hover, strike), and 2) foraging speed (movements per minute), using three types of movement (hop, short flight [???1 m], long flight [>1 m]). Warblers attacked prey more often in cypress-gum swamp forest than in coastal-plain levee forest. Foraging speed, however, was not different between habitats. I also measured foraging effort (% time spent foraging) and relative frequency of attack maneuvers employed in each habitat; neither of these variables was influenced by forest type. I conclude that Prothonotary Warblers encounter more prey when foraging in cypress-gum swamps than in coastal-plain levee forest, and that greater food availability results in higher density and greater reproductive success for birds breeding in cypress-gum swamp.
Madenjian, C.P.; Chipman, B.D.; Marsden, J.E.
2008-01-01
Sea lamprey (Petromyzon marinus) control in North America costs millions of dollars each year, and control measures are guided by assessment of lamprey-induced damage to fisheries. The favored prey of sea lamprey in freshwater ecosystems has been lake trout (Salvelinus namaycush). A key parameter in assessing sea lamprey damage, as well as managing lake trout fisheries, is the probability of an adult lake trout surviving a lamprey attack. The conventional value for this parameter has been 0.55, based on laboratory experiments. In contrast, based on catch curve analysis, mark-recapture techniques, and observed wounding rates, we estimated that adult lake trout in Lake Champlain have a 0.74 probability of surviving a lamprey attack. Although sea lamprey growth in Lake Champlain was lower than that observed in Lake Huron, application of an individual-based model to both lakes indicated that the probability of surviving an attack in Lake Champlain was only 1.1 times higher than that in Lake Huron. Thus, we estimated that lake trout survive a lamprey attack in Lake Huron with a probability of 0.66. Therefore, our results suggested that lethality of a sea lamprey attack on lake trout has been overestimated in previous model applications used in fisheries management. ?? 2008 NRC.
East Europe Report, Political, Sociological and Military Affairs
1984-10-09
those of a probing attack. The object of this article was to call attention to the many opportunities of the Warsaw Pact ground forces to form combat... attention has been paid to middle-aged men, the group most vulnerable to health problems, their mortality rate has risen. Infant mortality, while lower than...up areas: The unit was divided into reconnaissance, attack, and security troops. The security group took up a position, a couple of reconnaissance
B. J. Bentz; S. Kegley; K. Gibson; R. Their
2005-01-01
The effcacy of verbenone as a stand-level protectant against mountain pine beetle, Dendroctonus ponderosae Hopkins, attacks was tested in lodgepole and whitebark pine stands at five geographically separated sites, including three consecutive years at one site. Forty and 20 high-dose pouches, with a verbenone emission rate up to 50 mg/d per pouch, were spaced in a grid...
2008-01-01
current filovirus threats in the event of natural hemorrhagic fever outbreak or biological attack. Ebola virus (EBOV) and Marburg virus (MARV) are mem...lethal, causing severe hemorrhagic fever disease in humans and apes with high mortality rates (up to 90%). The recent description of massive gorilla...threats in the event of natural hemorrhagic fever outbreak or biological attack. 15. SUBJECT TERMS filovirus, Ebola, Marburg, adenovirus-based vaccine
NASA Technical Reports Server (NTRS)
Suarez, Carlos J.; Ng, T. Terry; Ong, Lih-Yenn; Malcolm, Gerald N.
1993-01-01
Water tunnel tests were conducted on a NASP-type configuration to evaluate different pneumatic Forebody Vortex Control (FVC) methods. Flow visualization and yawing moment measurements were performed at angles of attack from 0 deg to 30 deg. The pneumatic techniques tested included jet and slot blowing. In general, blowing can be used efficiently to manipulate the forebody vortices at angles of attack greater than 20 deg. These vortices are naturally symmetric up to alpha = 25 deg and asymmetric between 25 deg and 30 deg angle of attack. Results indicate that tangential aft jet blowing is the most promising method for this configuration. Aft jet blowing produces a yawing moment towards the blowing side and the trends with blowing rate are well behaved. The size of the nozzle is not the dominant factor in the blowing process; the change in the blowing 'momentum,' i.e., the product of the mass flow rate and the velocity of the jet, appears to be the important parameter in the water tunnel (incompressible and unchoked flow at the nozzle exit). Forward jet blowing is very unpredictable and sensitive to mass flow rate changes. Slot blowing (with the exception of very low blowing rates) acts as a flow 'separator'; it promotes early separation on the blow side, producing a yawing moment toward the non-blowing side for the C(sub mu) range investigated.
Stage-structured infection transmission and a spatial epidemic: a model for Lyme disease.
Caraco, Thomas; Glavanakov, Stephan; Chen, Gang; Flaherty, Joseph E; Ohsumi, Toshiro K; Szymanski, Boleslaw K
2002-09-01
A greater understanding of the rate at which emerging disease advances spatially has both ecological and applied significance. Analyzing the spread of vector-borne disease can be relatively complex when the vector's acquisition of a pathogen and subsequent transmission to a host occur in different life stages. A contemporary example is Lyme disease. A long-lived tick vector acquires infection during the larval blood meal and transmits it as a nymph. We present a reaction-diffusion model for the ecological dynamics governing the velocity of the current epidemic's spread. We find that the equilibrium density of infectious tick nymphs (hence the risk of human disease) can depend on density-independent survival interacting with biotic effects on the tick's stage structure. The local risk of infection reaches a maximum at an intermediate level of adult tick mortality and at an intermediate rate of juvenile tick attacks on mammalian hosts. If the juvenile tick attack rate is low, an increase generates both a greater density of infectious nymphs and an increased spatial velocity. However, if the juvenile attack rate is relatively high, nymph density may decline while the epidemic's velocity still increases. Velocities of simulated two-dimensional epidemics correlate with the model pathogen's basic reproductive number (R0), but calculating R0 involves parameters of both host infection dynamics and the vector's stage-structured dynamics.
Gérardin, Patrick; Guernier, Vanina; Perrau, Joëlle; Fianu, Adrian; Le Roux, Karin; Grivard, Philippe; Michault, Alain; de Lamballerie, Xavier; Flahault, Antoine; Favier, François
2008-01-01
Background Chikungunya virus (CHIKV) caused a major two-wave seventeen-month-long outbreak in La Réunion Island in 2005–2006. The aim of this study was to refine clinical estimates provided by a regional surveillance-system using a two-stage serological assessment as gold standard. Methods Two serosurveys were implemented: first, a rapid survey using stored sera of pregnant women, in order to assess the attack rate at the epidemic upsurge (s1, February 2006; n = 888); second, a population-based survey among a random sample of the community, to assess the herd immunity in the post-epidemic era (s2, October 2006; n = 2442). Sera were screened for anti-CHIKV specific antibodies (IgM and IgG in s1, IgG only in s2) using enzyme-linked immunosorbent assays. Seroprevalence rates were compared to clinical estimates of attack rates. Results In s1, 18.2% of the pregnant women were tested positive for CHIKV specific antibodies (13.8% for both IgM and IgG, 4.3% for IgM, 0.1% for IgG only) which provided a congruent estimate with the 16.5% attack rate calculated from the surveillance-system. In s2, the seroprevalence in community was estimated to 38.2% (95% CI, 35.9 to 40.6%). Extrapolations of seroprevalence rates led to estimate, at 143,000 and at 300,000 (95% CI, 283,000 to 320,000), the number of people infected in s1 and in s2, respectively. In comparison, the surveillance-system estimated at 130,000 and 266,000 the number of people infected for the same periods. Conclusion A rapid serosurvey in pregnant women can be helpful to assess the attack rate when large seroprevalence studies cannot be done. On the other hand, a population-based serosurvey is useful to refine the estimate when clinical diagnosis underestimates it. Our findings give valuable insights to assess the herd immunity along the course of epidemics. PMID:18662384
DOE Office of Scientific and Technical Information (OSTI.GOV)
Silva, Consuelo Juanita
Recent amendments to the Safe Drinking Water Act emphasize efforts toward safeguarding our nation's water supplies against attack and contamination. Specifically, the Public Health Security and Bioterrorism Preparedness and Response Act of 2002 established requirements for each community water system serving more than 3300 people to conduct an assessment of the vulnerability of its system to a terrorist attack or other intentional acts. Integral to evaluating system vulnerability is the threat assessment, which is the process by which the credibility of a threat is quantified. Unfortunately, full probabilistic assessment is generally not feasible, as there is insufficient experience and/or datamore » to quantify the associated probabilities. For this reason, an alternative approach is proposed based on Markov Latent Effects (MLE) modeling, which provides a framework for quantifying imprecise subjective metrics through possibilistic or fuzzy mathematics. Here, an MLE model for water systems is developed and demonstrated to determine threat assessments for different scenarios identified by the assailant, asset, and means. Scenario assailants include terrorists, insiders, and vandals. Assets include a water treatment plant, water storage tank, node, pipeline, well, and a pump station. Means used in attacks include contamination (onsite chemicals, biological and chemical), explosives and vandalism. Results demonstrated highest threats are vandalism events and least likely events are those performed by a terrorist.« less
Samson, M; Monnet, T; Bernard, A; Lacouture, P; David, L
2018-01-23
The propulsive forces generated by the hands and arms of swimmers have so far been determined essentially by quasi-steady approaches. This study aims to quantify the temporal dependence of the hydrodynamic forces for a simple translation movement: an impulsive start from rest. The study, carried out in unsteady numerical simulation, couples the calculation of the lift and the drag on an expert swimmer hand-forearm model with visualizations of the flow and flow vortex structure analysis. The results of these simulations show that the hand and forearm hydrodynamic forces should be studied from an unsteady approach because the quasi-steady model is inadequate. It also appears that the delayed stall effect generates higher circulatory forces during a short translation at high angle of attack than forces calculated under steady state conditions. During this phase the hand force coefficients are approximately twice as large as those of the forearm. The total force coefficients are highest for angles of attack between 40° and 60°. For the same angle of attack, the forces produced when the leading edge is the thumb side are slightly greater than those produced when the leading edge is the little finger side. Copyright © 2017 Elsevier Ltd. All rights reserved.
A virus spreading model for cognitive radio networks
NASA Astrophysics Data System (ADS)
Hou, L.; Yeung, K. H.; Wong, K. Y.
2012-12-01
Since cognitive radio (CR) networks could solve the spectrum scarcity problem, they have drawn much research in recent years. Artificial intelligence(AI) is introduced into CRs to learn from and adapt to their environment. Nonetheless, AI brings in a new kind of attacks specific to CR networks. The most powerful one is a self-propagating AI virus. And no spreading properties specific to this virus have been reported in the literature. To fill this research gap, we propose a virus spreading model of an AI virus by considering the characteristics of CR networks and the behavior of CR users. Several important observations are made from the simulation results based on the model. Firstly, the time taken to infect the whole network increases exponentially with the network size. Based on this result, CR network designers could calculate the optimal network size to slow down AI virus propagation rate. Secondly, the anti-virus performance of static networks to an AI virus is better than dynamic networks. Thirdly, if the CR devices with the highest degree are initially infected, the AI virus propagation rate will be increased substantially. Finally, it is also found that in the area with abundant spectrum resource, the AI virus propagation speed increases notably but the variability of the spectrum does not affect the propagation speed much.
Stress reaction of school-age children to the bombardment by SCUD missiles.
Schwarzwald, J; Weisenberg, M; Waysman, M; Solomon, Z; Klingman, A
1993-08-01
Stress reactions of 5th-, 7th-, and 10th-grade children (N = 492) exposed to missile attacks during the Persian Gulf War were examined a month after the war by a questionnaire that assessed level of exposure to trauma and psychological symptoms. Higher stress responses were obtained in areas hit and were influenced by proximity to sites or individuals involved in actual damage. Gender, age, and region interacted such that 5th-grade boys reported the highest stress reactions regardless of region, whereas 5th-grade girls reported the highest stress responses only in regions hit. Gender, age, and objective and subjective stress correctly identified 75% of the children as potential clinical or nonclinical candidates. The possible mediating coping responses and applications for high-risk groups are discussed.
Santer, Roger D.; Rind, F. Claire; Simmons, Peter J.
2012-01-01
Many arthropods possess escape-triggering neural mechanisms that help them evade predators. These mechanisms are important neuroethological models, but they are rarely investigated using predator-like stimuli because there is often insufficient information on real predator attacks. Locusts possess uniquely identifiable visual neurons (the descending contralateral movement detectors, DCMDs) that are well-studied looming motion detectors. The DCMDs trigger ‘glides’ in flying locusts, which are hypothesised to be appropriate last-ditch responses to the looms of avian predators. To date it has not been possible to study glides in response to stimuli simulating bird attacks because such attacks have not been characterised. We analyse video of wild black kites attacking flying locusts, and estimate kite attack speeds of 10.8±1.4 m/s. We estimate that the loom of a kite’s thorax towards a locust at these speeds should be characterised by a relatively low ratio of half size to speed (l/|v|) in the range 4–17 ms. Peak DCMD spike rate and gliding response occurrence are known to increase as l/|v| decreases for simple looming shapes. Using simulated looming discs, we investigate these trends and show that both DCMD and behavioural responses are strong to stimuli with kite-like l/|v| ratios. Adding wings to looming discs to produce a more realistic stimulus shape did not disrupt the overall relationships of DCMD and gliding occurrence to stimulus l/|v|. However, adding wings to looming discs did slightly reduce high frequency DCMD spike rates in the final stages of object approach, and slightly delay glide initiation. Looming discs with or without wings triggered glides closer to the time of collision as l/|v| declined, and relatively infrequently before collision at very low l/|v|. However, the performance of this system is in line with expectations for a last-ditch escape response. PMID:23209660
Öztürk, Vesile; Ertaş, Mustafa; Baykan, Betül; Sirin, Hadiye; Özge, Aynur
2013-03-01
We aimed to determine the efficacy and safety of etodolac, in acute migraine attacks in comparison with paracetamol (acetaminophen). We designed a randomized, double-blind, crossover phase III clinical trial for patients diagnosed with migraine for at least 1 year, according to ICHD-II criteria. Two hundred and twenty-nine adult patients having 2 to 8 attacks monthly from 17 centers were included. The patients were instructed to use 3 attack treatment packages consisting of 1,000 mg paracetamol, 400 mg etodolac, and 800 mg etodolac on 3 migraine attacks of moderate-severe intensity each in a 3-month treatment period, interchangeably. Any pain medication was used in 1,570 migraine attacks while study treatments were used in 1,047 attacks. The results for 1,000 mg paracetamol, 400 mg etodolac, and 800 mg etodolac were as follows: response of headache at 2 hours 44.9%, 48.3% and 46.1%; pain-free at 2 hours 19.2%, 19.3% and 24.1%; sustained pain-free from 2 to 24 hours 34.3%, 38.3% and 41.1%; relapse rates in 2 to 24 hours 7.3%, 14.3% and 9.7%. There were no statistically significant differences between the groups regarding the headache response, pain-free, sustained pain-free, and relapse rates. Nausea, vomiting, phonophobia, or photophobia decreased similarly in all groups within 24 hours of treatment administration. Drug-related adverse events were noted in 8 patients with 1,000 mg paracetamol, in 9 patients with 400 mg etodolac and in 9 patients for 800 mg etodolac during the study. Our study showed that etodolac is a safe and effective alternative in acute migraine treatment and showed comparable efficacy to paracetamol 1,000 mg. Etodolac may be considered as an alternative option for acute treatment of migraine. © 2012 The Authors. Pain Practice © 2012 World Institute of Pain.
Lantry, Brian F.; Adams, Jean; Christie, Gavin; Schaner, Teodore; Bowlby, James; Keir, Michael; Lantry, Jana; Sullivan, Paul; Bishop, Daniel; Treska, Ted; Morrison, Bruce
2015-01-01
We examined how attack frequency by sea lampreys on fishes in Lake Ontario varied in response to sea lamprey abundance and preferred host abundance (lake trout > 433 mm). For this analysis we used two gill net assessment surveys, one angler creel survey, three salmonid spawning run datasets, one adult sea lamprey assessment, and a bottom trawl assessment of dead lake trout. The frequency of fresh sea lamprey marks observed on lake trout from assessment surveys was strongly related to the frequency of sea lamprey attacks observed on salmon and trout from the creel survey and spawning migrations. Attack frequencies on all salmonids examined were related to the ratio between the abundances of adult sea lampreys and lake trout. Reanalysis of the susceptibility to sea lamprey attack for lake trout strains stocked into Lake Ontario reaffirmed that Lake Superior strain lake trout were among the most and Seneca Lake strain among the least susceptible and that Lewis Lake strain lake trout were even more susceptible than the Superior strain. Seasonal attack frequencies indicated that as the number of observed sea lamprey attacks decreased during June–September, the ratio of healing to fresh marks also decreased. Simulation of the ratios of healing to fresh marks indicated that increased lethality of attacks by growing sea lampreys contributed to the decline in the ratios and supported laboratory studies about wound healing duration.
Lantry, Brian F.; Adams, Jean V.; Christie, Gavin; Schaner, Teodore; Bowlby, James; Keir, Michael; Lantry, Jana; Sullivan, Paul; Bishop, Daniel; Treska, Ted; Morrison, Bruce
2015-01-01
We examined how attack frequency by sea lampreys on fishes in Lake Ontario varied in response to sea lamprey abundance and preferred host abundance (lake trout > 433 mm). For this analysis we used two gill net assessment surveys, one angler creel survey, three salmonid spawning run datasets, one adult sea lamprey assessment, and a bottom trawl assessment of dead lake trout. The frequency of fresh sea lamprey marks observed on lake trout from assessment surveys was strongly related to the frequency of sea lamprey attacks observed on salmon and trout from the creel survey and spawning migrations. Attack frequencies on all salmonids examined were related to the ratio between the abundances of adult sea lampreys and lake trout. Reanalysis of the susceptibility to sea lamprey attack for lake trout strains stocked into Lake Ontario reaffirmed that Lake Superior strain lake trout were among the most and Seneca Lake strain among the least susceptible and that Lewis Lake strain lake trout were even more susceptible than the Superior strain. Seasonal attack frequencies indicated that as the number of observed sea lamprey attacks decreased during June–September, the ratio of healing to fresh marks also decreased. Simulation of the ratios of healing to fresh marks indicated that increased lethality of attacks by growing sea lampreys contributed to the decline in the ratios and supported laboratory studies about wound healing duration.
Chatignoux, Edouard; Gabet, Amélie; Moutengou, Elodie; Pirard, Philippe; Motreff, Yvon; Bonaldi, Christophe; Olié, Valérie
2018-01-01
The terrorist attacks in Paris and Nice in 2015 and 2016 generated widespread emotional stress in France. Given that acute emotional stress is a well-known trigger for cardiovascular disease, we investigated whether these attacks had any short-term impact on hospitalizations for acute cardiovascular disease in France. Annual hospital discharge data from 2009 to 2016 were extracted from the French Hospital Discharge Database. All hospitalizations with a primary diagnosis of acute coronary syndrome, heart failure, or stroke were selected. Generalized additive Poisson models were used to differentiate "unusual" variations in daily hospitalization numbers in the 15 days following the attacks from the expected background hospitalization rate. The average daily number of hospitalizations was 396.4 for acute coronary syndrome, 598.6 for heart failure, and 334.6 for stroke. The daily mean number of hospitalizations for heart failure and stroke was higher in the 15 days following each attack compared with the reference periods. However, multivariate analysis showed no significant variation in the risk of hospitalization in the days following the attacks. Watching events unfold on television, no matter how dramatic, was not a sufficiently potent trigger for cardiovascular disease, although it may have led to an increase in hospitalizations for stress or anxiety. The 2015 and 2016 terrorist attacks do not seem to have had any measurable short-term impact on hospitalizations for cardiovascular disease either in the Paris and Nice regions or in the rest of France.
Anti-spoofing for display and print attacks on palmprint verification systems
NASA Astrophysics Data System (ADS)
Kanhangad, Vivek; Bhilare, Shruti; Garg, Pragalbh; Singh, Pranjalya; Chaudhari, Narendra
2015-05-01
A number of approaches for personal authentication using palmprint features have been proposed in the literature, majority of which focus on improving the matching performance. However, of late, preventing potential attacks on biometric systems has become a major concern as more and more biometric systems get deployed for wide range of applications. Among various types of attacks, sensor level attack, commonly known as spoof attack, has emerged as the most common attack due to simplicity in its execution. In this paper, we present an approach for detection of display and print based spoof attacks on palmprint verifcation systems. The approach is based on the analysis of acquired hand images for estimating surface re ectance. First and higher order statistical features computed from the distributions of pixel intensities and sub-band wavelet coeefficients form the feature set. A trained binary classifier utilizes the discriminating information to determine if the acquired image is of real hand or a fake one. Experiments are performed on a publicly available hand image dataset, containing 1300 images corresponding to 230 subjects. Experimental results show that the real hand biometrics samples can be substituted by the fake digital or print copies with an alarming spoof acceptance rate as high as 79.8%. Experimental results also show that the proposed spoof detection approach is very effective for discriminating between real and fake palmprint images. The proposed approach consistently achieves over 99% average 10-fold cross validation classification accuracy in our experiments.
State variation in rates of cesarean and VBAC delivery: 1989 and 1993.
Clarke, S C; Taffel, S M
1996-01-01
There is wide variation among states in rates of cesarean and vaginal births after cesarean (VBAC) deliveries. In general, states in the South have the highest cesarean rates, states in the West have the lowest, and states in the Northeast and Midwest are intermediate. Louisiana had the highest overall rate in 1993 (27.7 per 100 births) while Alaska had the lowest rate (15.2). The majority of states had declines in their cesarean rate between 1989 and 1993. Patterns in primary cesarean rates are similar to those of the overall rate-states in the South generally have the highest rates while states in the West have the lowest rates. Primary cesarean rates ranged between a high of 19.6 in Louisiana to a low of 10.6 in Wisconsin. In general, states with low cesarean rates have among the highest rates of VBAC delivery. Alaska had the highest VBAC rate (40.0), which was almost quadruple the rate of Louisiana (11.2), the state with the lowest rate. Most states had substantial increases in VBAC rates between 1989 and 1993. When examining cesarean rates by maternal age and birth order, states with the highest overall rates also have among the highest age/birth order-specific rates. Cesarean rates were lowest for mothers under 25 years of age having a second or higher order birth in Alaska, 10.4, and highest for mothers 35 years of age or over having a first birth in Mississippi, 51.3. Standardized cesarean rates which were adjusted for differences between states in maternal age and birth order distributions did not diminish the variation among areas.
A Weak Value Based QKD Protocol Robust Against Detector Attacks
NASA Astrophysics Data System (ADS)
Troupe, James
2015-03-01
We propose a variation of the BB84 quantum key distribution protocol that utilizes the properties of weak values to insure the validity of the quantum bit error rate estimates used to detect an eavesdropper. The protocol is shown theoretically to be secure against recently demonstrated attacks utilizing detector blinding and control and should also be robust against all detector based hacking. Importantly, the new protocol promises to achieve this additional security without negatively impacting the secure key generation rate as compared to that originally promised by the standard BB84 scheme. Implementation of the weak measurements needed by the protocol should be very feasible using standard quantum optical techniques.
Deterministic MDI QKD with two secret bits per shared entangled pair
NASA Astrophysics Data System (ADS)
Zebboudj, Sofia; Omar, Mawloud
2018-03-01
Although quantum key distribution schemes have been proven theoretically secure, they are based on assumptions about the devices that are not yet satisfied with today's technology. The measurement-device-independent scheme has been proposed to shorten the gap between theory and practice by removing all detector side-channel attacks. On the other hand, two-way quantum key distribution schemes have been proposed to raise the secret key generation rate. In this paper, we propose a new quantum key distribution scheme able to achieve a relatively high secret key generation rate based on two-way quantum key distribution that also inherits the robustness of the measurement-device-independent scheme against detector side-channel attacks.
New rotation-balance apparatus for measuring airplane spin aerodynamics in the wind tunnel
NASA Technical Reports Server (NTRS)
Malcolm, G. N.
1978-01-01
An advanced rotation-balance apparatus has been developed for the Ames 12-ft pressure tunnel to study the effects of spin rate, angles of attack and sideslip, and, particularly, Reynolds number on the aerodynamics of fighter and general aviation aircraft in a steady spin. Angles of attack to 100 deg and angles of sideslip to 30 deg are possible with spin rates to 42 rad/sec (400 rpm) and Reynolds numbers to 30 million/m on fighter models with wing spans that are typically 0.7 m. A complete description of the new rotation-balance apparatus, the sting/balance/model assembly, and the operational capabilities is given.
Economics of Employer-Sponsored Workplace Vaccination to Prevent Pandemic and Seasonal Influenza
Lee, Bruce Y.; Bailey, Rachel R.; Wiringa, Ann E.; Afriyie, Abena; Wateska, Angela R.; Smith, Kenneth J.; Zimmerman, Richard K.
2010-01-01
Employers may be loath to fund vaccination programs without understanding the economic consequences. We developed a decision analytic computational simulation model including dynamic transmission elements that determined the cost-benefit of employer-sponsored workplace vaccination from the employer's perspective. Implementing such programs was relatively inexpensive (<$35/vaccinated employee) and, in many cases, cost saving across diverse occupational groups in all seasonal influenza scenarios. Such programs were cost-saving for a 20% serologic attack rate pandemic scenario (−$15 to −$995) per vaccinated employee) and a 30% serologic attack rate pandemic scenario (range −$39 to −$1,494 per vaccinated employee) across all age and major occupational groups. PMID:20620168
Biosynthesis of Pyocyanine by a Paraffin Hydrocarbon-oxidizing Strain of Pseudomonas aeruginosa
Lee, E. G.-H.; Walden, C. C.
1969-01-01
A paraffin-oxidizing bacterium, designated as Pseudomonas aeruginosa ATS-14, was isolated from soil samples obtained from the Athabasca “tar sands.” This strain utilized kerosene as the only carbon source of energy and produced a high concentration of pyocyanine in the culture medium. Aromatic carbons were not attacked, but C10 to C17n-alkanes were readily oxidized by the pseudomonad and formed pyocyanine. The highest yield of the pigment was obtained from hexadecane and heptadecane. PMID:4977219
Johansen, J L; Jones, G P
2013-09-01
Sedimentation is a substantial threat to aquatic ecosystems and a primary cause of habitat degradation on near-shore coral reefs. Although numerous studies have demonstrated major impacts of sedimentation and turbidity on corals, virtually nothing is known of the sensitivity of reef fishes. Planktivorous fishes are an important trophic group that funnels pelagic energy sources into reef ecosystems. These fishes are visual predators whose foraging is likely to be impaired by turbidity, but the threshold for such effects and their magnitude are unknown. This study examined the effect of sediment-induced turbidity on foraging in four species of planktivorous damselfishes (Pomacentridae) of the Great Barrier Reef, including inshore and offshore species that potentially differ in tolerance for turbidity. An experimental flow tunnel was used to quantify their ability to catch mobile and immobile planktonic prey under different levels of turbidity and velocity in the range encountered on natural and disturbed reefs. Turbidity of just 4 NTU (nephelometric turbidity units) reduced average attack success by up to 56%, with higher effect sizes for species with offshore distributions. Only the inshore species (Neopomacentrus bankieri), which frequently encounters this turbidity on coastal reefs, could maintain high prey capture success. At elevated turbidity similar to that found on disturbed reefs (8 NTU), attack success was reduced in all species examined by up to 69%. These reductions in attack success led to a 21-24% decrease in foraging rates for all mid to outer-shelf species, in spite of increasing attack rates at high turbidity. Although effects of turbidity varied among species, it always depended heavily on prey mobility and ambient velocity. Attack success was up to 14 times lower on mobile prey, leaving species relatively incapable of foraging on anything but immobile prey at high turbidity. Effects of turbidity were particularly prominent at higher velocities, as attack success was overall 20-fold lower and foraging rates 3.3-fold lower at flow velocities > 30 cm/s relative to < or = 10 cm/s. Given that many planktivorous reef fishes predominantly occupy exposed, high-flow habitats, these results provide a reasonable explanation for the lack of planktivores on inshore coral reefs and warn that the performance of visual predators could be impaired at turbidity levels of only 4 NTU.
Bonanno, George A; Rennicke, Courtney; Dekel, Sharon
2005-06-01
The authors examined self-enhancing bias as a predictor of adjustment among individuals in or near the World Trade Center during the September 11, 2001, terrorist attacks. Resilience was defined from categorical and continuous analyses of both participant self-report and friend and relative ratings of adjustment. Self-enhancement was associated with a resilient outcome, ratings of better adjustment prior to September 11th, greater positive affect, and reduced perceptions of social constraints. Additional analyses indicated that self-enhancers' reduced symptom levels were fully mediated by their low perceived social constraints. However, consistent with previous evidence suggesting a social cost to self-enhancement, at 18 months post-September 11th, self-enhancers' friends and relatives also rated them as decreasing in social adjustment and as being less honest.
E. Matthew Hansen; A. Steven Munson; Darren C. Blackford; Andrew D. Graves; Tom W. Coleman; L. Scott Baggett
2017-01-01
We tested 3-methylcyclohex-2-en-1-one (MCH) and an Acer kairomone blend (AKB) as repellent semiochemicals for area and single tree protection to prevent spruce beetle (Dendroctonus rufipennis Kirby) attacks at locations in Utah and New Mexico. In the area protection study, we compared host infestation rates of MCH applications at three densities (20, 40, and 80 g MCH...
Mortality, mauling, and maiming by vicious dogs.
Bini, John K; Cohn, Stephen M; Acosta, Shirley M; McFarland, Marilyn J; Muir, Mark T; Michalek, Joel E
2011-04-01
Maiming and death due to dog bites are uncommon but preventable tragedies. We postulated that patients admitted to a level I trauma center with dog bites would have severe injuries and that the gravest injuries would be those caused by pit bulls. We reviewed the medical records of patients admitted to our level I trauma center with dog bites during a 15-year period. We determined the demographic characteristics of the patients, their outcomes, and the breed and characteristics of the dogs that caused the injuries. Our Trauma and Emergency Surgery Services treated 228 patients with dog bite injuries; for 82 of those patients, the breed of dog involved was recorded (29 were injured by pit bulls). Compared with attacks by other breeds of dogs, attacks by pit bulls were associated with a higher median Injury Severity Scale score (4 vs. 1; P = 0.002), a higher risk of an admission Glasgow Coma Scale score of 8 or lower (17.2% vs. 0%; P = 0.006), higher median hospital charges ($10,500 vs. $7200; P = 0.003), and a higher risk of death (10.3% vs. 0%; P = 0.041). Attacks by pit bulls are associated with higher morbidity rates, higher hospital charges, and a higher risk of death than are attacks by other breeds of dogs. Strict regulation of pit bulls may substantially reduce the US mortality rates related to dog bites.
Ranak, M S A Noman; Azad, Saiful; Nor, Nur Nadiah Hanim Binti Mohd; Zamli, Kamal Z
2017-01-01
Due to recent advancements and appealing applications, the purchase rate of smart devices is increasing at a higher rate. Parallely, the security related threats and attacks are also increasing at a greater ratio on these devices. As a result, a considerable number of attacks have been noted in the recent past. To resist these attacks, many password-based authentication schemes are proposed. However, most of these schemes are not screen size independent; whereas, smart devices come in different sizes. Specifically, they are not suitable for miniature smart devices due to the small screen size and/or lack of full sized keyboards. In this paper, we propose a new screen size independent password-based authentication scheme, which also offers an affordable defense against shoulder surfing, brute force, and smudge attacks. In the proposed scheme, the Press Touch (PT)-a.k.a., Force Touch in Apple's MacBook, Apple Watch, ZTE's Axon 7 phone; 3D Touch in iPhone 6 and 7; and so on-is transformed into a new type of code, named Press Touch Code (PTC). We design and implement three variants of it, namely mono-PTC, multi-PTC, and multi-PTC with Grid, on the Android Operating System. An in-lab experiment and a comprehensive survey have been conducted on 105 participants to demonstrate the effectiveness of the proposed scheme.
Hazin, Fábio H V; Afonso, André S; De Castilho, Pedro C; Ferreira, Luciana C; Rocha, Bruno C L M
2013-09-01
An abnormally high shark attack rate verified off Recife could be related to migratory behavior of tiger sharks. This situation started after the construction of the Suape port to the south of Recife. A previous study suggested that attacking sharks could be following northward currents and that they were being attracted shoreward by approaching vessels. In this scenario, such northward movement pattern could imply a higher probability of sharks accessing the littoral area of Recife after leaving Suape. Pop-up satellite archival tags were deployed on five tiger sharks caught off Recife to assess their movement patterns off northeastern Brazil. All tags transmitted from northward latitudes after 7-74 days of freedom. The shorter, soak distance between deployment and pop-up locations ranged between 33-209 km and implied minimum average speeds of 0.02-0.98 km.h-1. Both pop-up locations and depth data suggest that tiger shark movements were conducted mostly over the continental shelf. The smaller sharks moved to deeper waters within 24 hours after releasing, but they assumed a shallower (< 50 m) vertical distribution for most of the monitoring period. While presenting the first data on tiger shark movements in the South Atlantic, this study also adds new information for the reasoning of the high shark attack rate verified in this region.
Ranak, M. S. A. Noman; Nor, Nur Nadiah Hanim Binti Mohd; Zamli, Kamal Z.
2017-01-01
Due to recent advancements and appealing applications, the purchase rate of smart devices is increasing at a higher rate. Parallely, the security related threats and attacks are also increasing at a greater ratio on these devices. As a result, a considerable number of attacks have been noted in the recent past. To resist these attacks, many password-based authentication schemes are proposed. However, most of these schemes are not screen size independent; whereas, smart devices come in different sizes. Specifically, they are not suitable for miniature smart devices due to the small screen size and/or lack of full sized keyboards. In this paper, we propose a new screen size independent password-based authentication scheme, which also offers an affordable defense against shoulder surfing, brute force, and smudge attacks. In the proposed scheme, the Press Touch (PT)—a.k.a., Force Touch in Apple’s MacBook, Apple Watch, ZTE’s Axon 7 phone; 3D Touch in iPhone 6 and 7; and so on—is transformed into a new type of code, named Press Touch Code (PTC). We design and implement three variants of it, namely mono-PTC, multi-PTC, and multi-PTC with Grid, on the Android Operating System. An in-lab experiment and a comprehensive survey have been conducted on 105 participants to demonstrate the effectiveness of the proposed scheme. PMID:29084262
Bahreini Moghadam, Seyed Ali; Hamzeh Pour, Siavash; Toorchi, Mahmoud; Sefidi Heris, Youssof
2016-01-01
Bioterrorism is a worldwide problem and has been the focus of attention during recent decades. There is no precise information on the knowledge, attitude, and preparedness of Iranian Red Crescent volunteers in dealing with bioterrorism. Therefore, the present study aimed to evaluate the above-mentioned parameters in Mahabad Red Crescent Society volunteers. In this prospective cross-sectional study, the knowledge of 120 volunteers was evaluated and rated as poor, moderate, and good. In addition, attitude of the volunteers and preparedness of Mahabad Red Crescent Society was rated as inappropriate and appropriate using a questionnaire. The mean age of volunteers was 32.0 ± 8.2 years (62.5% male). 2 (1.7%) volunteers had good knowledge while 94 (78.3%) had no knowledge regarding bioterrorist attack management. Only 1 (0.8%) volunteer had appropriate attitude and 6 (5.0%) stated their preparedness for being sent out to the crisis zone. 116 volunteers (96.7%) indicated that Mahabad Red Crescent Society has an inappropriate level of preparedness to encounter bioterrorist attacks. The findings of the present study showed poor knowledge and inappropriate attitude of Mahabad Red Crescent Society volunteers in encountering probable bioterrorist attacks. Furthermore, the Red Crescent Society of this town had an inappropriate level of preparedness in the field of bioterrorism from the viewpoint of the studied volunteers.
Nifong, James C.; Nifong, Rachel L.; Silliman, Brian R.; Lowers, Russell H.; Guillette, Louis J.; Ferguson, Jake M.; Welsh, Matthew; Abernathy, Kyler; Marshall, Greg
2014-01-01
Large-bodied, top- and apex predators (e.g., crocodilians, sharks, wolves, killer whales) can exert strong top-down effects within ecological communities through their interactions with prey. Due to inherent difficulties while studying the behavior of these often dangerous predatory species, relatively little is known regarding their feeding behaviors and activity patterns, information that is essential to understanding their role in regulating food web dynamics and ecological processes. Here we use animal-borne imaging systems (Crittercam) to study the foraging behavior and activity patterns of a cryptic, large-bodied predator, the American alligator (Alligator mississippiensis) in two estuaries of coastal Florida, USA. Using retrieved video data we examine the variation in foraging behaviors and activity patterns due to abiotic factors. We found the frequency of prey-attacks (mean = 0.49 prey attacks/hour) as well as the probability of prey-capture success (mean = 0.52 per attack) were significantly affected by time of day. Alligators attempted to capture prey most frequently during the night. Probability of prey-capture success per attack was highest during morning hours and sequentially lower during day, night, and sunset, respectively. Position in the water column also significantly affected prey-capture success, as individuals’ experienced two-fold greater success when attacking prey while submerged. These estimates are the first for wild adult American alligators and one of the few examples for any crocodilian species worldwide. More broadly, these results reveal that our understandings of crocodilian foraging behaviors are biased due to previous studies containing limited observations of cryptic and nocturnal foraging interactions. Our results can be used to inform greater understanding regarding the top-down effects of American alligators in estuarine food webs. Additionally, our results highlight the importance and power of using animal-borne imaging when studying the behavior of elusive large-bodied, apex predators, as it provides critical insights into their trophic and behavioral interactions. PMID:24454711
Nifong, James C; Nifong, Rachel L; Silliman, Brian R; Lowers, Russell H; Guillette, Louis J; Ferguson, Jake M; Welsh, Matthew; Abernathy, Kyler; Marshall, Greg
2014-01-01
Large-bodied, top- and apex predators (e.g., crocodilians, sharks, wolves, killer whales) can exert strong top-down effects within ecological communities through their interactions with prey. Due to inherent difficulties while studying the behavior of these often dangerous predatory species, relatively little is known regarding their feeding behaviors and activity patterns, information that is essential to understanding their role in regulating food web dynamics and ecological processes. Here we use animal-borne imaging systems (Crittercam) to study the foraging behavior and activity patterns of a cryptic, large-bodied predator, the American alligator (Alligator mississippiensis) in two estuaries of coastal Florida, USA. Using retrieved video data we examine the variation in foraging behaviors and activity patterns due to abiotic factors. We found the frequency of prey-attacks (mean = 0.49 prey attacks/hour) as well as the probability of prey-capture success (mean = 0.52 per attack) were significantly affected by time of day. Alligators attempted to capture prey most frequently during the night. Probability of prey-capture success per attack was highest during morning hours and sequentially lower during day, night, and sunset, respectively. Position in the water column also significantly affected prey-capture success, as individuals' experienced two-fold greater success when attacking prey while submerged. These estimates are the first for wild adult American alligators and one of the few examples for any crocodilian species worldwide. More broadly, these results reveal that our understandings of crocodilian foraging behaviors are biased due to previous studies containing limited observations of cryptic and nocturnal foraging interactions. Our results can be used to inform greater understanding regarding the top-down effects of American alligators in estuarine food webs. Additionally, our results highlight the importance and power of using animal-borne imaging when studying the behavior of elusive large-bodied, apex predators, as it provides critical insights into their trophic and behavioral interactions.
Temporal variation in black-caiman-nest predation in varzea of central Brazilian amazonia
2017-01-01
On the Amazon floodplain, the main predators of black caiman (Melanosuchus niger) eggs are jaguars (Panthera onca), tegu lizards (Tupinambis teguixim), capuchin monkeys (Sapajus macrocephalus) and humans (Homo sapiens). In this study, we investigated the relationship between predator attacks on nests and incubation period, and evaluated the influence of initial predation on subsequent predation in the Mamirauá Sustainable Development Reserve. We also evaluated the influence of presence of females near the nests and manipulation of nests on the occurrence of attacks. We compared results from data obtained with camera traps and vestiges left by predators on estimates of rates of predation by different predators. Egg predation was recorded in 32% of the 658 black caiman nests monitored during two years. Our results suggest that the probability of predation on black caiman eggs is relatively constant throughout the incubation period and that predation on eggs was lower when adults, presumably females, were present. Careful opening of nests and handling of eggs did not increase the number of attacks on black caiman nests. Nest opening by a predator appeared to increase the chances of a subsequent attack because most of the attacks on nests occurred soon after a predator first opened the nest. However, attacks by another species of predator do not appear to be necessary to initiate attacks by any other species of predator. Results based on camera traps and vestiges differed, but use of vestiges was adequate for identifying the principal predators on eggs in black caiman nests and, in many circumstances, the vestiges may be better for estimating predation by humans. In this study, opening nests and handling eggs did not increase the number of attacks on black caiman nests. PMID:28854258
Lane, Andrew M; Godfrey, Richard
2010-01-01
This case study reports on changes in emotions before and during an unexpected heart rate in a young, apparently healthy male with a life-long history of exercise in the absence of family history of heart problems. He completed the Brunel Mood Scale (Terry et al. , 2003) to assess emotions before, during, and after the heart attack, and also describing his thoughts during these periods. Results indicate he experienced unpleasant emotions in the build up to the heart attack, feelings he attributed at the time to frustration to achieve fitness goals. He maintained an exercise regime prior to having a heart attack, a finding consistent with previous research suggesting that early diagnosis, although vital for survival, is not likely to be identified among seemingly healthy individuals. During the heart attack, he experienced a rapid emotional change characterised by a rapid increase in anger coupled with thoughts of needing to survive. The intensity of emotions and regulation strategies employed before and during the heart attack provide insight this experience, and we suggest future research should investigate emotional change during adverse conditions. Key pointsThe present case study details emotions experienced and attempts to regulate these emotions before, during and post a heart attack. Unpleasant emotions experienced before the heart were attributed to lack of progress toward fitness goals, a perception that is plausible as he was a regular exerciser.Early identification of heart attack is critical as "Time is Muscle" (Whyte et al., 2009) and therefore even people perceived to be at low risk should consider the possibility of such an eventuality, and seek medical treatment early in the process.
Was there unmet mental health need after the September 11, 2001 terrorist attacks?
Stuber, Jennifer; Galea, Sandro; Boscarino, Joseph A; Schlesinger, Mark
2006-03-01
This study examined the use of professionals for mental health problems among New York City residents who were directly affected by the September 11, 2001 terrorist attacks on the World Trade Center (WTC) or had a probable diagnosis of post-traumatic stress disorder (PTSD) or depression in its aftermath. Correlates of help seeking from professionals for mental health problems after the attacks and barriers to care were also assessed. Data were from a random digit dial telephone survey of 2,752 adults representative of the Greater New York Metropolitan area conducted 6 months after the September 11 terrorist attacks. Fifteen percent of those directly affected and 36% of those with probable PTSD or depression sought help from a professional for a mental health problem after the attacks. There was little new utilization of professionals for mental health problems after the attacks among persons who were not already receiving care prior to September 11. Barriers that prevented people from seeking help for mental health problems 6 months after the September 11 attacks included traditional barriers to care (e.g., cost) and barriers that are unique to the post-disaster context (e.g., the belief that others need the services more than oneself). This study suggests that there was potential unmet mental health need in New York City 6 months after the September 11 attacks on the WTC, but these findings should be tempered by research showing an apparent decrease in population-rates of PTSD. In the aftermath of a disaster, interventions should target persons with mental health needs who were not previously seeking help from a professional for a mental health problem.
Modeling Cyber Conflicts Using an Extended Petri Net Formalism
DOE Office of Scientific and Technical Information (OSTI.GOV)
Zakrzewska, Anita N; Ferragut, Erik M
2011-01-01
When threatened by automated attacks, critical systems that require human-controlled responses have difficulty making optimal responses and adapting protections in real- time and may therefore be overwhelmed. Consequently, experts have called for the development of automatic real-time reaction capabilities. However, a technical gap exists in the modeling and analysis of cyber conflicts to automatically understand the repercussions of responses. There is a need for modeling cyber assets that accounts for concurrent behavior, incomplete information, and payoff functions. Furthermore, we address this need by extending the Petri net formalism to allow real-time cyber conflicts to be modeled in a way thatmore » is expressive and concise. This formalism includes transitions controlled by players as well as firing rates attached to transitions. This allows us to model both player actions and factors that are beyond the control of players in real-time. We show that our formalism is able to represent situational aware- ness, concurrent actions, incomplete information and objective functions. These factors make it well-suited to modeling cyber conflicts in a way that allows for useful analysis. MITRE has compiled the Common Attack Pattern Enumera- tion and Classification (CAPEC), an extensive list of cyber attacks at various levels of abstraction. CAPEC includes factors such as attack prerequisites, possible countermeasures, and attack goals. These elements are vital to understanding cyber attacks and to generating the corresponding real-time responses. We demonstrate that the formalism can be used to extract precise models of cyber attacks from CAPEC. Several case studies show that our Petri net formalism is more expressive than other models, such as attack graphs, for modeling cyber conflicts and that it is amenable to exploring cyber strategies.« less
Temporal variation in black-caiman-nest predation in varzea of central Brazilian amazonia.
Torralvo, Kelly; Botero-Arias, Robinson; Magnusson, William E
2017-01-01
On the Amazon floodplain, the main predators of black caiman (Melanosuchus niger) eggs are jaguars (Panthera onca), tegu lizards (Tupinambis teguixim), capuchin monkeys (Sapajus macrocephalus) and humans (Homo sapiens). In this study, we investigated the relationship between predator attacks on nests and incubation period, and evaluated the influence of initial predation on subsequent predation in the Mamirauá Sustainable Development Reserve. We also evaluated the influence of presence of females near the nests and manipulation of nests on the occurrence of attacks. We compared results from data obtained with camera traps and vestiges left by predators on estimates of rates of predation by different predators. Egg predation was recorded in 32% of the 658 black caiman nests monitored during two years. Our results suggest that the probability of predation on black caiman eggs is relatively constant throughout the incubation period and that predation on eggs was lower when adults, presumably females, were present. Careful opening of nests and handling of eggs did not increase the number of attacks on black caiman nests. Nest opening by a predator appeared to increase the chances of a subsequent attack because most of the attacks on nests occurred soon after a predator first opened the nest. However, attacks by another species of predator do not appear to be necessary to initiate attacks by any other species of predator. Results based on camera traps and vestiges differed, but use of vestiges was adequate for identifying the principal predators on eggs in black caiman nests and, in many circumstances, the vestiges may be better for estimating predation by humans. In this study, opening nests and handling eggs did not increase the number of attacks on black caiman nests.
DeSilva, M B; Schafer, S; Kendall Scott, M; Robinson, B; Hills, A; Buser, G L; Salis, K; Gargano, J; Yoder, J; Hill, V; Xiao, L; Roellig, D; Hedberg, K
2016-01-01
Cryptosporidium, a parasite known to cause large drinking and recreational water outbreaks, is tolerant of chlorine concentrations used for drinking water treatment. Human laboratory-based surveillance for enteric pathogens detected a cryptosporidiosis outbreak in Baker City, Oregon during July 2013 associated with municipal drinking water. Objectives of the investigation were to confirm the outbreak source and assess outbreak extent. The watershed was inspected and city water was tested for contamination. To determine the community attack rate, a standardized questionnaire was administered to randomly sampled households. Weighted attack rates and confidence intervals (CIs) were calculated. Water samples tested positive for Cryptosporidium species; a Cryptosporidium parvum subtype common in cattle was detected in human stool specimens. Cattle were observed grazing along watershed borders; cattle faeces were observed within watershed barriers. The city water treatment facility chlorinated, but did not filter, water. The community attack rate was 28·3% (95% CI 22·1-33·6), sickening an estimated 2780 persons. Watershed contamination by cattle probably caused this outbreak; water treatments effective against Cryptosporidium were not in place. This outbreak highlights vulnerability of drinking water systems to pathogen contamination and underscores the need for communities to invest in system improvements to maintain multiple barriers to drinking water contamination.
Li, Weicong; Almeida, André; Smith, John; Wolfe, Joe
2016-02-01
Articulation, including initial and final note transients, is important to tasteful music performance. Clarinettists' tongue-reed contact, the time variation of the blowing pressure P¯mouth, the mouthpiece pressure, the pressure in the instrument bore, and the radiated sound were measured for normal articulation, accents, sforzando, staccato, and for minimal attack, i.e., notes started very softly. All attacks include a phase when the amplitude of the fundamental increases exponentially, with rates r ∼1000 dB s(-1) controlled by varying both the rate of increase in P¯mouth and the timing of tongue release during this increase. Accented and sforzando notes have shorter attacks (r∼1300 dB s(-1)) than normal notes. P¯mouth reaches a higher peak value for accented and sforzando notes, followed by a steady decrease for accented notes or a rapid fall to a lower, nearly steady value for sforzando notes. Staccato notes are usually terminated by tongue contact, producing an exponential decrease in sound pressure with rates similar to those calculated from the bandwidths of the bore resonances: ∼400 dB s(-1). In all other cases, notes are stopped by decreasing P¯mouth. Notes played with different dynamics are qualitatively similar, but louder notes have larger P¯mouth and larger r.
Emergence of norovirus GI.2 outbreaks in military camps in Singapore.
Ho, Zheng Jie Marc; Vithia, Gunalan; Ng, Ching Ging; Maurer-Stroh, Sebastian; Tan, Clive M; Loh, Jimmy; Lin, Tzer Pin Raymond; Lee, Jian Ming Vernon
2015-02-01
Simultaneous acute gastroenteritis (AGE) outbreaks occurred at two military camps. This study details the epidemiological findings, explores possible origins, and discusses preventive measures. Investigations included attack rate surveys, symptom surveys, hygiene inspections, and the testing of water, food, and stool samples. DNA/RNA was extracted from stool samples and amplified via real-time reverse transcription PCR (RT-PCR). Partial and full-length capsid nucleotide sequences were obtained, phylogenetic relationships inferred, and homology modelling of antigenic sites performed. The military outbreaks involved 775 persons and were preceded by two AGE outbreaks at restaurants in the local community. The outbreak was longer and larger in the bigger camp (21 days, attack rate 15.0%) than the smaller camp (6 days, attack rate 8.3%). Of 198 stool samples, norovirus GI.2 was detected in 32.5% (larger camp) and 28.6% (smaller camp). These were essentially identical to preceding community outbreaks. Antigenic site homology modelling also showed differences between identified and more common AGE outbreak strains (norovirus GII.4). Differences observed highlight difficulties in controlling person-to-person outbreaks among large groups in close proximity (e.g., military trainees). Distinct differences in antigenic sites may have contributed to increased immunological susceptibility of the soldiers to infection. Copyright © 2014 The Authors. Published by Elsevier Ltd.. All rights reserved.
Liu, Li; Guo, Fen-Zhuo; Wen, Qiao-Yan
2017-09-12
Measurement-device-independent quantum key distribution (MDI-QKD) with the active decoy state method can remove all detector loopholes, and resist the imperfections of sources. But it may lead to side channel attacks and break the security of QKD system. In this paper, we apply the passive decoy state method to the MDI-QKD based on polarization encoding mode. Not only all attacks on detectors can be removed, but also the side channel attacks on sources can be overcome. We get that the MDI-QKD with our passive decoy state method can have a performance comparable to the protocol with the active decoy state method. To fit for the demand of practical application, we discuss intensity fluctuation in the security analysis of MDI-QKD protocol using passive decoy state method, and derive the key generation rate for our protocol with intensity fluctuation. It shows that intensity fluctuation has an adverse effect on the key generation rate which is non-negligible, especially in the case of small data size of total transmitting signals and long distance transmission. We give specific simulations on the relationship between intensity fluctuation and the key generation rate. Furthermore, the statistical fluctuation due to the finite length of data is also taken into account.
Results from flight and simulator studies of a Mach 3 cruise longitudinal autopilot
NASA Technical Reports Server (NTRS)
Gilyard, G. B.; Smith, J. W.
1978-01-01
At Mach numbers of approximately 3.0 and altitudes greater than 21,300 meters, the original altitude and Mach hold modes of the YF-12 autopilot produced aircraft excursions that were erratic or divergent, or both. Flight data analysis and simulator studies showed that the sensitivity of the static pressure port to angle of attack had a detrimental effect on the performance of the altitude and Mach hold modes. Good altitude hold performance was obtained when a high passed pitch rate feedback was added to compensate for angle of attack sensitivity and the altitude error and integral altitude gains were reduced. Good Mach hold performance was obtained when the angle of attack sensitivity was removed; however, the ride qualities remained poor.
Composable security proof for continuous-variable quantum key distribution with coherent States.
Leverrier, Anthony
2015-02-20
We give the first composable security proof for continuous-variable quantum key distribution with coherent states against collective attacks. Crucially, in the limit of large blocks the secret key rate converges to the usual value computed from the Holevo bound. Combining our proof with either the de Finetti theorem or the postselection technique then shows the security of the protocol against general attacks, thereby confirming the long-standing conjecture that Gaussian attacks are optimal asymptotically in the composable security framework. We expect that our parameter estimation procedure, which does not rely on any assumption about the quantum state being measured, will find applications elsewhere, for instance, for the reliable quantification of continuous-variable entanglement in finite-size settings.
Liu, Kuan-Liang; Lee, Hsin-Fu; Chou, Shing-Hsien; Lin, Yen-Chen; Lin, Chia-Pin; Wang, Chun-Li; Chang, Chi-Jen; Hsu, Lung-An
2014-01-01
Large epidemiologic studies have associated gouty arthritis with the risk of coronary heart disease. However, there has been a lack of information regarding the outcomes for patients who have gout attacks during hospitalization for acute myocardial infarction. We reviewed the data of 444 consecutive patients who were admitted to our hospital between 2005 and 2008 due to acute ST elevation myocardial infarction (STEMI). The clinical outcomes were compared between patients with gout attack and those without. Of the 444, 48 patients with acute STEMI developed acute gouty arthritis during hospitalization. The multivariate analysis identified prior history of gout and estimated glomerular filtration rate as independent risk factors of gout attack for patients with acute STEMI (odds ratio (OR) 21.02, 95 % CI 2.96-149.26, p = 0.002; OR 0.92, 95 % CI 0.86-0.99, p = 0.035, respectively). The in-hospital mortality and duration of hospital stay did not differ significantly between the gouty group and the non-gouty group (controls). During a mean follow-up of 49 ± 28 months, all-cause mortality and stroke were similar for both groups. Multivariate Cox regression showed that gout attack was independently associated with short- and long-term adverse non-fatal cardiac events (hazard ratio (HR) 1.88, 95 % CI 1.09-3.24, p = 0.024; HR 1.82, 95 % CI 1.09-3.03, p = 0.022, respectively). Gout attack among patients hospitalized due to acute STEMI was independently associated with short-term and long-term rates of adverse non-fatal cardiac events.
Sandrini, G; Cerbo, R; Del Bene, E; Ferrari, A; Genco, S; Grazioli, I; Martelletti, P; Nappi, G; Pinessi, L; Sarchielli, P; Tamburro, P; Uslenghi, C; Zanchin, G
2007-01-01
Aims and methods: In this double-blind, double-dummy, randomised, parallel group, multicentre study, the efficacy of dosing and re-dosing of a fixed combination of indomethacin, prochlorperazine and caffeine (Indoprocaf) was compared with encapsulated sumatriptan in the acute treatment of two migraine attacks. Additionally, in the group taking Indoprocaf, two different oral formulations were tested: effervescent tablets and encapsulated coated tablets. Results: Of 297 patients randomised (150 assigned to Indoprocaf and 147 to sumatriptan), 281 were included in the intention-to-treat efficacy analysis. The initial dosing of Indoprocaf and sumatriptan was similarly effective with pain-free rates higher than 30% (95% CI of odds-ratio: 0.57–1.28) and headache relief rates of about 60% (95% CI of odds-ratio: 0.82–1.84) with both the drugs. The efficacy of re-dosing of Indoprocaf as rescue medication was more effective than that of sumatriptan with pain-free values of 47% vs. 27% in the total attacks with a statistically significant difference in the first migraine attack in favour of Indoprocaf. The efficacy of re-dosing to treat a recurrence/relapse was very high without differences between the drugs (pain-free: 60% with Indoprocaf and 50% with sumatriptan in the total attacks). Indoprocaf and sumatriptan were well-tolerated. Conclusion: The study demonstrated that the efficacy of the initial dosing of Indoprocaf was not higher than that of sumatriptan, but that the strategy to use the lowest effective dose as soon as the headache occurred, followed by a second dose if the headache has not relieved or to treat a relapse, was very effective, especially with Indoprocaf. PMID:17627707
Sick-leave and help seeking among rescue workers after the terror attacks in Norway, 2011.
Gjerland, Astrid; Pedersen, May Janne Botha; Ekeberg, Øivind; Skogstad, Laila
2015-12-01
Several studies have addressed psychological problems after terror attacks, especially among victims. Fewer have addressed possible health consequences among rescue workers involved with terror attacks. This study's aim was to investigate the levels of sick-leave and psychological help seeking among rescue workers involved in the terror attacks in Norway on July 22, 2011, and to identify associations between sick-leave and background-, exposure- and work-related variables. This cross-sectional study included five groups of professional rescue personnel and one group of unaffiliated volunteers. The questionnaire was distributed approximately 10 months after the terror attacks, with a response rate of 61.3 % (N = 1790). A total of 9.7 % of participants self-reported sick-leave. The rate varied from 2.4 % among police officers to 14.5 % among unaffiliated volunteers, p < .001. There were 0.0-1.2 % of the professionals who were on sick-leave for more than 2 weeks and 5.5 % among the unaffiliated volunteers. More unaffiliated volunteers (42.6 %) and psychosocial personnel (16.3 %) consulted a psychologist or psychiatrist compared to other groups (3-9 %), p < .001. General healthcare providers (OR 6.1), psychosocial personnel (OR 6.3) and unaffiliated volunteers (OR 5.7) were associated with sick-leave, together with unwanted stress reactions (OR 1.6) and starting work on July 22 (OR 1.6). A small minority of professional rescue workers reported sick-leave for more than 2 weeks, and few had sought psychological help. Unaffiliated volunteers reported more stress symptoms, longer sick-leave duration and more psychological help seeking. This group may benefit from more support.
Sweet smells prepare plants for future stress: airborne induction of plant disease immunity.
Yi, Hwe-Su; Ryu, Choong-Min; Heil, Martin
2010-05-01
Plants require protection against a wide range of attackers such as insects and pathogens. The adequate plant defense responses are regulated via sophisticated signal cascades, which are activated following the perception of specific cues of the attackers. Plants might, however, gain a significant fitness advantage when pre-empting enemy attack before it actually occurs. Monitoring cues from attacked neighbors can permit plants to reach this goal. We have recently found airborne disease resistance against a bacterial pathogen in uninfected lima bean plants when these were located close to conspecific, resistance-expressing neighbors. The emitters could be chemically induced with benzothiadiazole or biologically with an avirulent pathogen. Unexpectedly, receiver plants, although expressing a functioning resistance, did not show reduced growth rates, which represent a common side-effect of directly induced pathogen resistance. Nonanal was identified as an active volatile and, rather than directly inducing full resistance, primed defense gene expression, which became fully activated only when the plants were subsequently challenged by a virulent pathogen. Priming by airborne signals allows for a more efficient and less costly preparation of plants for future attack and airborne signaling can affect resistance against both major groups of plant enemies: herbivores and pathogens.
Vural, Mutlu; Akbas, Befru; Acer, Mehmet; Karabay, Ocal
2007-04-25
Blood pro-B-type natriuretic peptide (pro-BNP) level increases in case of myocardial ischemia and myocardial volume or pressure overload. The aim of this study is to measure changes in blood pro-BNP level during the course of panic attack with symptoms of chest pain and/or dyspnea. Patients who were admitted to the emergency room with panic attack have been regarded as the study group. Blood pro-BNP level has been measured during follow-up of the patients upon admission and 2h later. Systolic and diastolic blood pressure and pulse rate were significantly decreased (p<0.0001) during follow-up of the patients (ages between 18 and 43 years; mean 26+/-6.13 years). Paradoxically, blood pro-BNP level of patients was significantly increased during the same period (52.86+/-59.73 versus 50.97+/-57.42 U/L; p<0.0001). Blood pro-BNP level has increased among patients who have complained chest pain and/or dyspnea as symptoms of panic attack. It is thought that chest pain and dyspnea in the course of panic attack may not be purely psychological.
Rare primary headaches: clinical insights.
Casucci, G; d'Onofrio, F; Torelli, P
2004-10-01
So-called "rare" headaches, whose prevalence rate is lower than 1% or is not known at all and have been reported in only a few dozen cases to date, constitute a very heterogeneous group. Those that are best characterised from the clinical point of view can be classified into forms with prominent autonomic features and forms with sparse or no autonomic features. Among the former are trigeminal autonomic cephalalgias (TACs) and hemicrania continua, while the latter comprise classical trigeminal neuralgia, hypnic headache, primary thunderclap headache, and exploding head syndrome. The major clinical discriminating factor for the differential diagnosis of TACs is the relationship between duration and frequency of attacks: the forms in which pain is shorter lived are those with the higher frequency of daily attacks. Other aspects to be considered are the time pattern of symptoms, intensity and timing of attacks, the patient's behaviour during the attacks, the presence of any triggering factors and of the refractory period after an induced attack, and response to therapy, especially with indomethacin. Often these are little known clinical entities, which are not easily detected in clinical practice. For some of them, e. g., thunderclap headache, it is always necessary to perform instrumental tests to exclude the presence of underlying organic diseases.
Palgi, Yuval; Gelkopf, Marc; Berger, Rony
2015-06-30
Relatively little research have addressed the effect of prolonged exposure to rocket attacks with a lifespan perspective and only a handful of these studies focused on the effect of this exposure as a function of aging. The present study examined the effects of seven years of rocket attacks fired toward the south of Israel on adult participants of different ages. We examined whether potentially traumatic life events (PTLEs) unrelated to rocket attacks moderated the association between post-traumatic stress (PTS) symptoms and age. Data were obtained from a 2007 telephone survey using the Random Digit Dialing method and including 343 individuals (76.7% participation rate). Exposure to rockets, PTLEs, global distress, and post-traumatic symptomatology were assessed. Older age was associated with a higher level of PTS symptoms. Higher PTLE levels attenuated the association between age and PTS symptoms. Our results suggest that age is a risk factor for developing PTS symptoms under prolonged exposure to rocket attacks. However, previous levels of exposure to other negative events, as well as gender, appear to inoculate a person to stress, thus modulating the age-PTS association. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.
Novel Duplicate Address Detection with Hash Function
Song, GuangJia; Ji, ZhenZhou
2016-01-01
Duplicate address detection (DAD) is an important component of the address resolution protocol (ARP) and the neighbor discovery protocol (NDP). DAD determines whether an IP address is in conflict with other nodes. In traditional DAD, the target address to be detected is broadcast through the network, which provides convenience for malicious nodes to attack. A malicious node can send a spoofing reply to prevent the address configuration of a normal node, and thus, a denial-of-service attack is launched. This study proposes a hash method to hide the target address in DAD, which prevents an attack node from launching destination attacks. If the address of a normal node is identical to the detection address, then its hash value should be the same as the “Hash_64” field in the neighboring solicitation message. Consequently, DAD can be successfully completed. This process is called DAD-h. Simulation results indicate that address configuration using DAD-h has a considerably higher success rate when under attack compared with traditional DAD. Comparative analysis shows that DAD-h does not require third-party devices and considerable computing resources; it also provides a lightweight security resolution. PMID:26991901
Passive Faraday-mirror attack in a practical two-way quantum-key-distribution system
NASA Astrophysics Data System (ADS)
Sun, Shi-Hai; Jiang, Mu-Sheng; Liang, Lin-Mei
2011-06-01
The Faraday mirror (FM) plays a very important role in maintaining the stability of two-way plug-and-play quantum key distribution (QKD) systems. However, the practical FM is imperfect, which will not only introduce an additional quantum bit error rate (QBER) but also leave a loophole for Eve to spy the secret key. In this paper we propose a passive Faraday mirror attack in two-way QKD system based on the imperfection of FM. Our analysis shows that if the FM is imperfect, the dimension of Hilbert space spanned by the four states sent by Alice is three instead of two. Thus Eve can distinguish these states with a set of Positive Operator Valued Measure (POVM) operators belonging to three-dimension space, which will reduce the QBER induced by her attack. Furthermore, a relationship between the degree of the imperfection of FM and the transmittance of the practical QKD system is obtained. The results show that the probability that Eve loads her attack successfully depends on the degree of the imperfection of FM rapidly, but the QBER induced by Eve’s attack changes slightly with the degree of the FM imperfection.
Effect of a rotating propeller on the separation angle of attack
NASA Technical Reports Server (NTRS)
Boldman, D. R.; Iek, C.; Hwang, D. P.; Larkin, M.; Schweiger, P.
1993-01-01
The present study represents an extension of an earlier wind tunnel experiment performed with the P&W 17-in. Advanced Ducted Propeller (ADP) Simulator operating at Mach 0.2. In order to study the effects of a rotating propeller on the inlet flow, data were obtained in the UTRC 10- by 15-Foot Large Subsonic Wind Tunnel with the same hardware and instrumentation, but with the propellar removed. These new tests were performed over a range of flow rates which duplicated flow rates in the powered simulator program. The flow through the inlet was provided by a remotely located vacuum source. A comparison of the results of this flow-through study with the previous data from the powered simulator indicated that in the conventional inlet the propeller produced an increase in the separation angle of attack between 4.0 deg at a specific flow of 22.4 lb/sec-sq ft to 2.7 deg at a higher specific flow of 33.8 lb/sec-sq ft. A similar effect on separation angle of attack was obtained by using stationary blockage rather than a propeller.
Wang, Yongjun; Minematsu, Kazuo; Wong, Ka Sing Lawrence; Amarenco, Pierre; Albers, Gregory W; Denison, Hans; Easton, J Donald; Evans, Scott R; Held, Peter; Jonasson, Jenny; Molina, Carlos A; Johnston, S Claiborne
2017-01-01
In the SOCRATES trial (Acute Stroke or Transient Ischemic Attack Treated With Aspirin or Ticagrelor and Patient Outcomes), ticagrelor was not superior to aspirin. Because of differences in patient demographics and stroke disease pattern in Asia, outcomes of ticagrelor versus aspirin were assessed among Asian patients in a prespecified exploratory analysis. Baseline demographics, treatment effects, and safety of ticagrelor and aspirin were assessed among Asian patients. Differences in outcomes between groups were assessed using Cox proportional hazard model. A total of 3858 (29.2%) SOCRATES participants were recruited in Asia. Among the Asian patients, the primary end point event occurred in 186 (9.6%) of the 1933 patients treated with ticagrelor, versus 224 (11.6%) of the 1925 patients treated with aspirin (hazard ratio, 0.81; 95% confidence interval, 0.67-0.99). The exploratory P value for treatment-by-region interaction was 0.27. The primary end point event rate in the Asian subgroup was numerically higher than that in the non-Asian group (10.6% versus 5.7%; nominal P<0.01). Among the Asian patients, the rate of PLATO (Platelet Inhibition and Patient Outcomes)-defined major bleeding was similar in the ticagrelor group and the aspirin group (0.6% versus 0.8%; hazard ratio, 0.76; 95% confidence interval, 0.36-1.61). The event rates were numerically higher in the Asian patients. Among the Asian patients with acute stroke or transient ischemic attacks, there was a trend toward a lower hazard ratio in reducing risk of the primary end point of stroke, myocardial infarction, or death in the ticagrelor group. URL: http://www.clinicaltrials.gov. Unique identifier: NCT01994720. © 2016 American Heart Association, Inc.
Calculation of key reduction for B92 QKD protocol
NASA Astrophysics Data System (ADS)
Mehic, Miralem; Partila, Pavol; Tovarek, Jaromir; Voznak, Miroslav
2015-05-01
It is well known that Quantum Key Distribution (QKD) can be used with the highest level of security for distribution of the secret key, which is further used for symmetrical encryption. B92 is one of the oldest QKD protocols. It uses only two non-orthogonal states, each one coding for one bit-value. It is much faster and simpler when compared to its predecessors, but with the idealized maximum efficiencies of 25% over the quantum channel. B92 consists of several phases in which initial key is significantly reduced: secret key exchange, extraction of the raw key (sifting), error rate estimation, key reconciliation and privacy amplification. QKD communication is performed over two channels: the quantum channel and the classical public channel. In order to prevent a man-in-the-middle attack and modification of messages on the public channel, authentication of exchanged values must be performed. We used Wegman-Carter authentication because it describes an upper bound for needed symmetric authentication key. We explained the reduction of the initial key in each of QKD phases.
Exposure to nitrogen dioxide in an indoor ice arena - New Hampshire, 2011.
2012-03-02
In January 2011, the New Hampshire Department of Health and Human Services (NHDHHS) investigated acute respiratory symptoms in a group of ice hockey players. The symptoms, which included cough, shortness of breath, hemoptysis, and chest pain or tightness, were consistent with exposure to nitrogen dioxide gas (NO), a byproduct of combustion. Environmental and epidemiologic investigations were begun to determine the source of the exposure and identify potentially exposed persons. This report summarizes the results of those investigations, which implicated a local indoor ice arena that had hosted two hockey practice sessions during a 24-hour period when the arena ventilation system was not functioning. A total of 43 exposed persons were interviewed, of whom 31 (72.1%) reported symptoms consistent with NO exposure. The highest attack rate was among the hockey players (87.9%). After repair of the ventilation system, no additional cases were identified. To prevent similar episodes, ice arena operators should ensure ventilation systems and alarms are operating properly and that levels of NO and carbon monoxide (CO) are monitored continuously for early detection of increased gas levels.
Seroepidemiologic Effects of Influenza A(H1N1)pdm09 in Australia, New Zealand, and Singapore
Bandaranayake, Don; Booy, Robert; Chen, Mark I.; Cretikos, Michelle; Dowse, Gary K.; Dwyer, Dominic E.; Greenberg, Michael E.; Huang, Q. Sue; Khandaker, Gulam; Kok, Jen; Laurie, Karen L.; Lee, Vernon J.; McVernon, Jodie; Walter, Scott; Markey, Peter G.
2013-01-01
To estimate population attack rates of influenza A(H1N1)pdm2009 in the Southern Hemisphere during June–August 2009, we conducted several serologic studies. We pooled individual-level data from studies using hemagglutination inhibition assays performed in Australia, New Zealand, and Singapore. We determined seropositive proportions (titer >40) for each study region by age-group and sex in pre- and postpandemic phases, as defined by jurisdictional notification data. After exclusions, the pooled database consisted of, 4,414 prepandemic assays and 7,715 postpandemic assays. In the prepandemic phase, older age groups showed greater seropositive proportions, with age-standardized, community-based proportions ranging from 3.5% in Singapore to 11.9% in New Zealand. In the postpandemic phase, seropositive proportions ranged from 17.5% in Singapore to 30.8% in New Zealand, with highest proportions seen in school-aged children. Pregnancy and residential care were associated with lower postpandemic seropositivity, whereas Aboriginal and Torres Strait Islander Australians and Pacific Peoples of New Zealand had greater postpandemic seropositivity. PMID:23260059
Romón, Pedro; Aparicio, Domitila; Palacios, Francisco; Iturrondobeitia, Juan Carlos; Hance, Thierry; Goldarazena, Arturo
2017-09-01
Concentrations of four monoterpenes were determined in needles of Pinus radiata (D.Don) (Pinales: Pinaceae) trees that were attacked or nonattacked by Tomicus piniperda (L.) (Coleoptera: Scolytinae). Compounds were identified and quantified by gas chromatography-mass spectrometry. The mean ambient temperature was obtained using climate-recording data loggers. The effect of limonene on field aggregation was also evaluated at three limonene release rates using Lindgren attractant-baited traps and trap logs. Attacked trees produced less α-pinene in March, July, and November than nonattacked trees, less β-pinene in July and November, and less limonene from May to November. Limonene reduced the attraction of T. piniperda to attractant-baited traps and trap logs. Results were linked to better responses to high temperatures, with respect to terpene contents, by the nonattacked trees after the spring attack. © The Author 2017. Published by Oxford University Press on behalf of Entomological Society of America.
Efficient Web Vulnerability Detection Tool for Sleeping Giant-Cross Site Request Forgery
NASA Astrophysics Data System (ADS)
Parimala, G.; Sangeetha, M.; AndalPriyadharsini, R.
2018-04-01
Now day’s web applications are very high in the rate of usage due to their user friendly environment and getting any information via internet but these web applications are affected by lot of threats. CSRF attack is one of the serious threats to web applications which is based on the vulnerabilities present in the normal web request and response of HTTP protocol. It is hard to detect but hence still it is present in most of the existing web applications. In CSRF attack, without user knowledge the unwanted actions on a reliable websites are forced to happen. So it is placed in OWASP’s top 10 Web Application attacks list. My proposed work is to do a real time scan of CSRF vulnerability attack in given URL of the web applications as well as local host address for any organization using python language. Client side detection of CSRF is depended on Form count which is presented in that given web site.
NASA Astrophysics Data System (ADS)
Zeitz, Christian; Scheidat, Tobias; Dittmann, Jana; Vielhauer, Claus; González Agulla, Elisardo; Otero Muras, Enrique; García Mateo, Carmen; Alba Castro, José L.
2008-02-01
Beside the optimization of biometric error rates the overall security system performance in respect to intentional security attacks plays an important role for biometric enabled authentication schemes. As traditionally most user authentication schemes are knowledge and/or possession based, firstly in this paper we present a methodology for a security analysis of Internet-based biometric authentication systems by enhancing known methodologies such as the CERT attack-taxonomy with a more detailed view on the OSI-Model. Secondly as proof of concept, the guidelines extracted from this methodology are strictly applied to an open source Internet-based biometric authentication system (BioWebAuth). As case studies, two exemplary attacks, based on the found security leaks, are investigated and the attack performance is presented to show that during the biometric authentication schemes beside biometric error performance tuning also security issues need to be addressed. Finally, some design recommendations are given in order to ensure a minimum security level.
An attack aimed at active phase compensation in one-way phase-encoded QKD systems
NASA Astrophysics Data System (ADS)
Dong, Zhao-Yue; Yu, Ning-Na; Wei, Zheng-Jun; Wang, Jin-Dong; Zhang, Zhi-Ming
2014-08-01
Phase drift is an inherent problem in one-way phase-encoded quantum key distribution (QKD) systems. Although combining passive with active phase compensation (APC) processes can effectively compensate for the phase drift, the security problems brought about by these processes are rarely considered. In this paper, we point out a security hole in the APC process and put forward a corresponding attack scheme. Under our proposed attack, the quantum bit error rate (QBER) of the QKD can be close to zero for some conditions. However, under the same conditions the ratio r of the key "0" and the key "1" which Bob (the legal communicators Alice and Bob) gets is no longer 1:1 but 2:1, which may expose Eve (the eavesdropper). In order to solve this problem, we modify the resend strategy of the attack scheme, which can force r to reach 1 and the QBER to be lower than the tolerable QBER.
Bioterriorism: from threat to reality.
Atlas, Ronald M
2002-01-01
The fears and predictions of attacks with biological weapons, which were increasing at the close of the twentieth century, were transformed into reality not long after September 11, 2001, when several anthrax-laden letters were sent through the U.S. postal system. The attack challenged our medical preparedness and scientific understanding of the epidemiology of biothreat agents. It is fortunate that this was not a massive aerosol release that could have exposed hundreds of thousands. Rapid diagnoses and medical treatments limited casualties and increased survival rates, but tragically some individuals died of inhalational anthrax. Even as physicians tested new treatment regimes and scientists employed new ways of detecting anthrax and decontaminating the mail, new predictions were made for potentially even more devastating attacks with anthrax, smallpox, plague, tularemia, botulism, or hemorrhagic fever viruses. Fear gripped the nation. Law enforcement sought to find the villain(s) who sent the anthrax letters and to deter future bioterrorist attacks. The biomedical community began to seek new ways of protecting against such future threats of bioterrorism.
Classifier fusion for VoIP attacks classification
NASA Astrophysics Data System (ADS)
Safarik, Jakub; Rezac, Filip
2017-05-01
SIP is one of the most successful protocols in the field of IP telephony communication. It establishes and manages VoIP calls. As the number of SIP implementation rises, we can expect a higher number of attacks on the communication system in the near future. This work aims at malicious SIP traffic classification. A number of various machine learning algorithms have been developed for attack classification. The paper presents a comparison of current research and the use of classifier fusion method leading to a potential decrease in classification error rate. Use of classifier combination makes a more robust solution without difficulties that may affect single algorithms. Different voting schemes, combination rules, and classifiers are discussed to improve the overall performance. All classifiers have been trained on real malicious traffic. The concept of traffic monitoring depends on the network of honeypot nodes. These honeypots run in several networks spread in different locations. Separation of honeypots allows us to gain an independent and trustworthy attack information.
Rogers, M Brooke; Amlôt, Richard; Rubin, G James; Wessely, Simon; Krieger, Kristian
2007-06-01
The public's understanding of chemical, biological, radiological and nuclear (CBRN) related issues and their likely actions following a CBRN incident is an issue of great concern, as public psychological and behavioural responses will help determine subsequent morbidity and mortality rates. This paper explores the role of effective government communication with the public and its role in mediating the social and psychological impact of terrorist attacks. We examine the importance of effective communication in reducing morbidity and mortality in the event of a terrorist attack and explore the impact of risk perceptions in determining the success or failure of risk communication strategies. This includes the examination of the role of fear as a health risk, and the identification of factors relevant to public trust in risk communication. Finally, an investigation of the type of information desired by members of the public leads the authors to make risk communication recommendations targeted at the promotion of more adaptive behaviours in response to CBRN attacks.
Brunner, J. F.; Beers, E. H.; Dunley, J. E.; Doerr, M.; Granger, K.
2005-01-01
Three neonicotinyl insecticides, acetamiprid, thiacloprid and clothianidin, were evaluated for their impact on four species of lepidopteran pests of apple in Washington, the codling moth, Cydia pomonella (L.), the Pandemis leafroller, Pandemis pyrusana Kearfott, and the obliquebanded leafroller, Choristoneura rosaceana (Harris), and Lacanobia subjuncta (Grote & Robinson). None of the neonicotinyl insecticides demonstrated sufficient activity against P. pyrusana, C. rosaceana, or L. subjuncta to warrant field trials. Conversely, all had some activity against one or more stages of C. pomonella. Acetamiprid was highly toxic to larvae in laboratory bioassays, and had relatively long activity of field-aged residues (21 days). It also showed some toxicity to C. pomonella eggs (via topical exposure) and adults. Acetamiprid provided the highest level of fruit protection from C. pomonella attack in field trials conducted over five years in experimental orchards with extremely high codling moth pressure. Thiacloprid performed similarly in bioassays, but fruit protection in field trials was slightly lower than acetamiprid. Clothianidin showed moderate to high toxicity in bioassays, depending on the C. pomonella stage tested, but poor fruit protection from attack in field trials. None of the neonicotinyl insecticides were as toxic to larvae or effective in protecting fruit as the current standard organophosphate insecticide used for C. pomonella control, azinphosmethyl. However, both acetamiprid and thiacloprid should provide acceptable levels of C. pomonella control in commercial orchards where densities are much lower than in the experimental orchards used for our trials. The advantages and disadvantages of the neonicotinyl insecticides as replacements for the organophosphate insecticides and their role in a pest management system for Washington apple orchards are discussed. Abbreviation: MFR Maximum field rate PMID:16341246
Risk of Wheezing Attacks in Infants With Transient Tachypnea Newborns.
Golshantafti, Mohammad; Yavari, Tahereh; Afrand, Mohammadhosain
2016-02-01
The most common reason of respiratory distress in the newborn is transient tachypnea of the newborn (TTN). There are some reports saying that TTN is associated with increased frequencies of wheezing attacks. The aims of this study were to determine the risk factors associated with TTN and to determine the association between TTN and the development of wheezing syndromes in early life. In a historical cohort study, we recorded the characteristics of 70 infants born at the Shohadaye Kargar Hospital in Yazd between March 2005 and March 2009 and who were hospitalized because of TTN in the neonatal intensive-care unit. We called their parents at least four years after the infants were discharged from the hospital and asked about any wheezing attacks. Seventy other infants with no health problems during the newborn period were included in the study as the control group. The rate of wheezing attacks in newborns with TTN was more than patients with no TTN diagnosis (P = 0.014). TTN was found to be an independent risk factor for later wheezing attacks (relative risk [RR] = 2.8). The most obvious finding of this study was that TTN was an independent risk factor for wheezing attacks. So long-term medical care is suggested for these patients who may be at risk, because TTN may not be as transient as has been previously thought.
Air pollution sources and childhood asthma attacks in Catano, Puerto Rico.
Loyo-Berríos, Nilsa I; Irizarry, Rafael; Hennessey, Joseph G; Tao, Xuguang Grant; Matanoski, Genevieve
2007-04-15
Asthma prevalence in the Cataño Air Basin of Puerto Rico is 27% for children aged 13-14 years and 45% for children aged 5-6 years. There is concern that these rates are related to air pollution. The authors conducted a nested case-control study to evaluate whether proximity to air pollution point sources was associated with increased risk of asthma attacks. For 1997-2001, 1,382 asthma-related medical visits (International Classification of Diseases, Ninth Revision, codes 493 and 493.9) in children under 17 were identified through health insurance claims. Controls were children with no asthma attacks who were randomly selected from enrollees in two health insurance companies by incidence density sampling (1:5) and matched to cases on gender, age, insurance company, and event date. The distance from a point source to the subject's residence area represented a surrogate exposure measurement. Odds ratios for a 1-km decrease in distance were obtained by conditional logistic regression. Risk of asthma attack was associated with residing near a grain mill (odds ratio (OR) = 1.35), petroleum refinery (OR = 1.44), asphalt plant (OR = 1.23), or power plant (OR = 1.28) (all p's < 0.05). Residence near major air emissions sources (>100 tons/year) increased asthma attack risk by 108% (p < 0.05). These results showed that proximity to some air pollution sources is associated with increased risks of asthma attacks.
Micro air vehicle motion tracking and aerodynamic modeling
NASA Astrophysics Data System (ADS)
Uhlig, Daniel V.
Aerodynamic performance of small-scale fixed-wing flight is not well understood, and flight data are needed to gain a better understanding of the aerodynamics of micro air vehicles (MAVs) flying at Reynolds numbers between 10,000 and 30,000. Experimental studies have shown the aerodynamic effects of low Reynolds number flow on wings and airfoils, but the amount of work that has been conducted is not extensive and mostly limited to tests in wind and water tunnels. In addition to wind and water tunnel testing, flight characteristics of aircraft can be gathered through flight testing. The small size and low weight of MAVs prevent the use of conventional on-board instrumentation systems, but motion tracking systems that use off-board triangulation can capture flight trajectories (position and attitude) of MAVs with minimal onboard instrumentation. Because captured motion trajectories include minute noise that depends on the aircraft size, the trajectory results were verified in this work using repeatability tests. From the captured glide trajectories, the aerodynamic characteristics of five unpowered aircraft were determined. Test results for the five MAVs showed the forces and moments acting on the aircraft throughout the test flights. In addition, the airspeed, angle of attack, and sideslip angle were also determined from the trajectories. Results for low angles of attack (less than approximately 20 deg) showed the lift, drag, and moment coefficients during nominal gliding flight. For the lift curve, the results showed a linear curve until stall that was generally less than finite wing predictions. The drag curve was well described by a polar. The moment coefficients during the gliding flights were used to determine longitudinal and lateral stability derivatives. The neutral point, weather-vane stability and the dihedral effect showed some variation with different trim speeds (different angles of attack). In the gliding flights, the aerodynamic characteristics exhibited quasi-steady effects caused by small variations in the angle of attack. The quasi-steady effects, or small unsteady effects, caused variations in the aerodynamic characteristics (particularly incrementing the lift curve), and the magnitude of the influence depended on the angle-of-attack rate. In addition to nominal gliding flight, MAVs in general are capable of flying over a wide flight envelope including agile maneuvers such as perching, hovering, deep stall and maneuvering in confined spaces. From the captured motion trajectories, the aerodynamic characteristics during the numerous unsteady flights were gathered without the complexity required for unsteady wind tunnel tests. Experimental results for the MAVs show large flight envelopes that included high angles of attack (on the order of 90 deg) and high angular rates, and the aerodynamic coefficients had dynamic stall hysteresis loops and large values. From the large number of unsteady high angle-of-attack flights, an aerodynamic modeling method was developed and refined for unsteady MAV flight at high angles of attack. The method was based on a separation parameter that depended on the time history of the angle of attack and angle-of-attack rate. The separation parameter accounted for the time lag inherit in the longitudinal characteristics during dynamic maneuvers. The method was applied to three MAVs and showed general agreement with unsteady experimental results and with nominal gliding flight results. The flight tests with the MAVs indicate that modern motion tracking systems are capable of capturing the flight trajectories, and the captured trajectories can be used to determine the aerodynamic characteristics. From the captured trajectories, low Reynolds number MAV flight is explored in both nominal gliding flight and unsteady high angle-of-attack flight. Building on the experimental results, a modeling method for the longitudinal characteristics is developed that is applicable to the full flight envelope.
Physical Fitness as a Moderator of Cognitive Degradation During Sleep Deprivation
1983-06-03
PROGRAM ELEMENT, PROJECT, TASK AREA & WORK UNIT NUMBERS 11. CONTROLLING OFFICE NAME AND ADDRESS 12. REPORT DATE HQ TRADOC, ATTN: ATCS-D, Fort Monroe, 3...June 83 VA235 23651 13. NUMBER OF PAGES 164 14. MONITORING AGENCY NAME & ADDRESS(iI different from Controlling Office) 1S. SECURITY CLASS. (of this...with troops. b. An attack designed to produce an overwhelming and sustained rate of advance by using two or more echelons in the attacking force. These
Caffeine challenge test in panic disorder and depression with panic attacks.
Nardi, Antonio E; Lopes, Fabiana L; Valença, Alexandre M; Freire, Rafael C; Veras, André B; de-Melo-Neto, Valfrido L; Nascimento, Isabella; King, Anna Lucia; Mezzasalma, Marco A; Soares-Filho, Gastão L; Zin, Walter A
2007-01-01
Our aim was to observe if patients with panic disorder (PD) and patients with major depression with panic attacks (MDP) (Diagnostic and Statistical Manual of Mental Disorders, Fourth Edition criteria) respond in a similar way to the induction of panic attacks by an oral caffeine challenge test. We randomly selected 29 patients with PD, 27 with MDP, 25 with major depression without panic attacks (MD), and 28 healthy volunteers. The patients had no psychotropic drug for at least a 4-week period. In a randomized double-blind experiment performed in 2 occasions 7 days apart, 480 mg caffeine and a caffeine-free (placebo) solution were administered in a coffee form and anxiety scales were applied before and after each test. A total of 58.6% (n = 17) of patients with PD, 44.4% (n = 12) of patients with MDP, 12.0% (n = 3) of patients with MD, and 7.1% (n= 2) of control subjects had a panic attack after the 480-mg caffeine challenge test (chi(2)(3) = 16.22, P = .001). The patients with PD and MDP were more sensitive to caffeine than were patients with MD and healthy volunteers. No panic attack was observed after the caffeine-free solution intake. The patients with MD had a lower heart rate response to the test than all the other groups (2-way analysis of variance, group by time interaction with Greenhouse-Geisser correction: F(3,762) = 2.85, P = .026). Our data suggest that there is an association between panic attacks, no matter if associated with PD or MDP, and hyperreactivity to an oral caffeine challenge test.
Digital watermarking for color images in hue-saturation-value color space
NASA Astrophysics Data System (ADS)
Tachaphetpiboon, Suwat; Thongkor, Kharittha; Amornraksa, Thumrongrat; Delp, Edward J.
2014-05-01
This paper proposes a new watermarking scheme for color images, in which all pixels of the image are used for embedding watermark bits in order to achieve the highest amount of embedding. For watermark embedding, the S component in the hue-saturation-value (HSV) color space is used to carry the watermark bits, while the V component is used in accordance with a human visual system model to determine the proper watermark strength. In the proposed scheme, the number of watermark bits equals the number of pixels in the host image. Watermark extraction is accomplished blindly based on the use of a 3×3 spatial domain Wiener filter. The efficiency of our proposed image watermarking scheme depends mainly on the accuracy of the estimate of the original S component. The experimental results show that the performance of the proposed scheme, under no attacks and against various types of attacks, was superior to the previous existing watermarking schemes.
Injury rates during the 1988 US Olympic Team Trials for taekwondo.
Zemper, E D; Pieter, W
1989-01-01
Injury rates were recorded during the 1988 US Olympic Team Trials for taekwondo involving 48 men and 48 women. The injury rate for men (12.74/100 athlete-exposures) was about 40 per cent higher than the rate for women (9.01/100 athlete-exposures). The foot and the head were the most frequently injured body parts. Contusions were the predominant type of injury, and concussions were recorded for both men and women. A large proportion (41 per cent) of the men's injuries were the result of receiving a blow from an unblocked attack. For the women the most common injury situation (40 per cent) was while attacking with a kick. For both men and women, 15 per cent of the reported injuries were time-loss injuries. The head injuries found in this study are discussed with reference to the high impact velocities and momentum levels generated during taekwondo kicking. Recommendations are made with regard to protective equipment testing and rule changes to reduce the possibility of cerebral injury. PMID:2620229
Epidemiology of the Zika Virus Outbreak in the Cabo Verde Islands, West Africa.
Lourenço, José; de Lourdes Monteiro, Maria; Valdez, Tomás; Monteiro Rodrigues, Júlio; Pybus, Oliver; Rodrigues Faria, Nuno
2018-03-15
The Zika virus (ZIKV) outbreak in the island nation of Cabo Verde was of unprecedented magnitude in Africa and the first to be associated with microcephaly in the continent. Using a simple mathematical framework we present a first epidemiological assessment of attack and observation rates from 7,580 ZIKV notified cases and 18 microcephaly reports between July 2015 and May 2016. In line with observations from the Americas and elsewhere, the single-wave Cabo Verdean ZIKV epidemic was characterized by a basic reproductive number of 1.85 (95% CI, 1.5 - 2.2), with overall the attack rate of 51.1% (range 42.1 - 61.1) and observation rate of 2.7% (range 2.29 - 3.33). Current herd-immunity may not be sufficient to prevent future small-to-medium epidemics in Cabo Verde. Together with a small observation rate, these results highlight the need for rapid and integrated epidemiological, molecular and genomic surveillance to tackle forthcoming outbreaks of ZIKV and other arboviruses.
Epidemiology of the Zika Virus Outbreak in the Cabo Verde Islands, West Africa
Lourenço, José; de Lourdes Monteiro, Maria; Valdez, Tomás; Monteiro Rodrigues, Júlio; Pybus, Oliver; Rodrigues Faria, Nuno
2018-01-01
Introduction: The Zika virus (ZIKV) outbreak in the island nation of Cabo Verde was of unprecedented magnitude in Africa and the first to be associated with microcephaly in the continent. Methods: Using a simple mathematical framework we present a first epidemiological assessment of attack and observation rates from 7,580 ZIKV notified cases and 18 microcephaly reports between July 2015 and May 2016. Results: In line with observations from the Americas and elsewhere, the single-wave Cabo Verdean ZIKV epidemic was characterized by a basic reproductive number of 1.85 (95% CI, 1.5 - 2.2), with overall the attack rate of 51.1% (range 42.1 - 61.1) and observation rate of 2.7% (range 2.29 - 3.33). Conclusion: Current herd-immunity may not be sufficient to prevent future small-to-medium epidemics in Cabo Verde. Together with a small observation rate, these results highlight the need for rapid and integrated epidemiological, molecular and genomic surveillance to tackle forthcoming outbreaks of ZIKV and other arboviruses. PMID:29637009
Glynn, Judith R; Bower, Hilary; Johnson, Sembia; Turay, Cecilia; Sesay, Daniel; Mansaray, Saidu H; Kamara, Osman; Kamara, Alie Joshua; Bangura, Mohammed S; Checchi, Francesco
2018-01-04
Transmission between family members accounts for most Ebola virus transmission, but little is known about determinants of intrahousehold spread. From detailed exposure histories, intrahousehold transmission chains were created for 94 households of Ebola survivors in Sierra Leone: 109 (co-)primary cases gave rise to 317 subsequent cases (0-100% of those exposed). Larger households were more likely to have subsequent cases, and the proportion of household members affected depended on individual and household-level factors. More transmissions occurred from older than from younger cases, and from those with more severe disease. The estimated household secondary attack rate was 18%. © The Author(s) 2017. Published by Oxford University Press for the Infectious Diseases Society of America.
NASA Astrophysics Data System (ADS)
Diamanti, Eleni; Takesue, Hiroki; Langrock, Carsten; Fejer, M. M.; Yamamoto, Yoshihisa
2006-12-01
We present a quantum key distribution experiment in which keys that were secure against all individual eavesdropping attacks allowed by quantum mechanics were distributed over 100 km of optical fiber. We implemented the differential phase shift quantum key distribution protocol and used low timing jitter 1.55 µm single-photon detectors based on frequency up-conversion in periodically poled lithium niobate waveguides and silicon avalanche photodiodes. Based on the security analysis of the protocol against general individual attacks, we generated secure keys at a practical rate of 166 bit/s over 100 km of fiber. The use of the low jitter detectors also increased the sifted key generation rate to 2 Mbit/s over 10 km of fiber.
Bech, Mickael; Christiansen, Terkel; Dunham, Kelly; Lauridsen, Jørgen; Lyttkens, Carl Hampus; McDonald, Kathryn; McGuire, Alistair
2009-10-01
The Technological Change in Health Care Research Network collected unique patient-level data on three procedures for treatment of heart attack patients (catheterization, coronary artery bypass grafts and percutaneous transluminal coronary angioplasty) for 17 countries over a 15-year period to examine the impact of economic and institutional factors on technology adoption. Specific institutional factors are shown to be important to the uptake of these technologies. Health-care systems characterized as public contract systems and reimbursement systems have higher adoption rates than public-integrated health-care systems. Central control of funding of investments is negatively associated with adoption rates and the impact is of the same magnitude as the overall health-care system classification. GDP per capita also has a strong role in initial adoption. The impact of income and institutional characteristics on the utilization rates of the three procedures diminishes over time.
Epidemiological and ecological determinants of Zika virus transmission in an urban setting.
Lourenço, José; Maia de Lima, Maricelia; Faria, Nuno Rodrigues; Walker, Andrew; Kraemer, Moritz Ug; Villabona-Arenas, Christian Julian; Lambert, Ben; Marques de Cerqueira, Erenilde; Pybus, Oliver G; Alcantara, Luiz Cj; Recker, Mario
2017-09-09
The Zika virus has emerged as a global public health concern. Its rapid geographic expansion is attributed to the success of Aedes mosquito vectors, but local epidemiological drivers are still poorly understood. Feira de Santana played a pivotal role in the Chikungunya epidemic in Brazil and was one of the first urban centres to report Zika infections. Using a climate-driven transmission model and notified Zika case data, we show that a low observation rate and high vectorial capacity translated into a significant attack rate during the 2015 outbreak, with a subsequent decline in 2016 and fade-out in 2017 due to herd-immunity. We find a potential Zika-related, low risk for microcephaly per pregnancy, but with significant public health impact given high attack rates. The balance between the loss of herd-immunity and viral re-importation will dictate future transmission potential of Zika in this urban setting.
Epidemiological and ecological determinants of Zika virus transmission in an urban setting
Maia de Lima, Maricelia; Faria, Nuno Rodrigues; Walker, Andrew; Kraemer, Moritz UG; Villabona-Arenas, Christian Julian; Lambert, Ben; Marques de Cerqueira, Erenilde; Pybus, Oliver G; Alcantara, Luiz CJ; Recker, Mario
2017-01-01
The Zika virus has emerged as a global public health concern. Its rapid geographic expansion is attributed to the success of Aedes mosquito vectors, but local epidemiological drivers are still poorly understood. Feira de Santana played a pivotal role in the Chikungunya epidemic in Brazil and was one of the first urban centres to report Zika infections. Using a climate-driven transmission model and notified Zika case data, we show that a low observation rate and high vectorial capacity translated into a significant attack rate during the 2015 outbreak, with a subsequent decline in 2016 and fade-out in 2017 due to herd-immunity. We find a potential Zika-related, low risk for microcephaly per pregnancy, but with significant public health impact given high attack rates. The balance between the loss of herd-immunity and viral re-importation will dictate future transmission potential of Zika in this urban setting. PMID:28887877
Bloch, Yuval H; Leiba, Adi; Veaacnin, Nurit; Paizer, Yohanan; Schwartz, Dagan; Kraskas, Ahuva; Weiss, Gali; Goldberg, Avishay; Bar-Dayan, Yaron
2007-01-01
Mildly injured and "worried well" patients can have profound effects on the management of a mass-casualty incident. The objective of this study is to describe the characteristics and lessons learned from an event that occurred on 28 August 2005 near the central bus station in Beer-Sheva, Israel. The unique profile of injuries allows for the examination of the medical and operational aspects of the management of mild casualties. Data were collected during and after the event, using patient records and formal debriefings. They were processed focusing on the characteristics of patient complaints, medical response, and the dynamics of admission. A total of 64 patients presented to the local emergency department, including two critical casualties. The remaining 62 patients were mildly injured or suffered from stress. Patient presentation to the emergency department was bi-phasic; during the first two hours following the attack (i.e., early phase), the rate of arrival was high (one patient every three minutes), and anxiety was the most frequent chief complaint. During the second phase, the rate of arrival was lower (one patient every 27 minutes), and the typical chief complaint was somatic. Additionally, tinnitus and complaints related to minor trauma also were recorded frequently. Psychiatric consultation was obtained for 58 (91%) of the patients. Social services were involved in the care of 47 of the patients (73%). Otolaryngology and surgery consultations were obtained for 45% and 44%, respectively. The need for some medical specialties (e.g., surgery and orthopedics) mainly was during the first phase, whereas others, mainly psychiatry and otolaryngology, were needed during both phases. Only 13 patients (20%) needed a consultation from internal medicine. Following a terrorist attack, a large number of mildly injured victims and those experiencing stress are to be expected, without a direct relation to the effectiveness of the attack. Mildly injured patients tend to appear in two phases. In the first phase, the rate of admission is expected to be higher. Due to the high incidence of anxiety and other stress-related phenomena, many mildly injured patients will require psychiatric evaluation. In the case of a bombing attack, many of the victims must be evaluated by an otolaryngologist.
Detecting Heap-Spraying Code Injection Attacks in Malicious Web Pages Using Runtime Execution
NASA Astrophysics Data System (ADS)
Choi, Younghan; Kim, Hyoungchun; Lee, Donghoon
The growing use of web services is increasing web browser attacks exponentially. Most attacks use a technique called heap spraying because of its high success rate. Heap spraying executes a malicious code without indicating the exact address of the code by copying it into many heap objects. For this reason, the attack has a high potential to succeed if only the vulnerability is exploited. Thus, attackers have recently begun using this technique because it is easy to use JavaScript to allocate the heap memory area. This paper proposes a novel technique that detects heap spraying attacks by executing a heap object in a real environment, irrespective of the version and patch status of the web browser. This runtime execution is used to detect various forms of heap spraying attacks, such as encoding and polymorphism. Heap objects are executed after being filtered on the basis of patterns of heap spraying attacks in order to reduce the overhead of the runtime execution. Patterns of heap spraying attacks are based on analysis of how an web browser accesses benign web sites. The heap objects are executed forcibly by changing the instruction register into the address of them after being loaded into memory. Thus, we can execute the malicious code without having to consider the version and patch status of the browser. An object is considered to contain a malicious code if the execution reaches a call instruction and then the instruction accesses the API of system libraries, such as kernel32.dll and ws_32.dll. To change registers and monitor execution flow, we used a debugger engine. A prototype, named HERAD(HEap spRAying Detector), is implemented and evaluated. In experiments, HERAD detects various forms of exploit code that an emulation cannot detect, and some heap spraying attacks that NOZZLE cannot detect. Although it has an execution overhead, HERAD produces a low number of false alarms. The processing time of several minutes is negligible because our research focuses on detecting heap spraying. This research can be applied to existing systems that collect malicious codes, such as Honeypot.
Air tankers in Southern California Fires...effectiveness in delivering retardants rated
Theodore G. Storey; Leon W. Cooley
1967-01-01
Eleven air attack experts were asked to rate 12 models of fixed-wing tankers and light helitankers for effectiveness ill delivering chemical fire retardants under 21 typical situations. They rated fixed-wing tankers as more effective in strong wind crosswinds, and downwind approaches, but helitankers as more effective in narrow canyons and on steep slopes. Certain...
Lyons, Terence J; Ercoline, William; O'Toole, Kevin; Grayson, Kevin
2006-07-01
Previous studies have determined that spatial disorientation (SD) causes 0.5-23% of aircraft crashes, but SD-related crash and fatality rates in different aircraft types have not been systematically studied. SD crashes for the fiscal years 1990 to 2004 and aircraft sortie numbers for all U.S. Air Force (USAF) aircraft were obtained from the USAF Safety Center. Contingency table analysis and Chi-squared tests were used to evaluate differences in SD rates. SD accounted for 11% of USAF crashes with an overall rate of 2.9 per million sorties and a crash fatality rate of 69%. The SD rate was higher in fighter/attack aircraft and helicopters than in training and transport aircraft. The risk of SD was increased at night with 23% of night crashes being caused by SD. But the SD rate and crash fatality rate were not higher in single-crewmember aircraft. SD risk is significantly increased in helicopters and fighter/attack aircraft and at night. The data suggest that a second crewmember does not protect against SD. Further study of specific SD scenarios could lead to focused interventions for SD prevention.
Discrimination of fungal infections on grape berries via spectral signatures
NASA Astrophysics Data System (ADS)
Molitor, Daniel; Griesser, Michaela; Schütz, Erich; Khuen, Marie-Therese; Schefbeck, Christa; Ronellenfitsch, Franz Kai; Schlerf, Martin; Beyer, Marco; Schoedl-Hummel, Katharina; Anhalt, Ulrike; Forneck, Astrid
2016-04-01
The fungal pathogens Botrytis cinerea and Penicillium expansum are causing economic damages on grapevine worldwide. Especially the simultaneous occurrence of both often results in off-flavours highly threatening wine quality. For the classification of grape quality as well as for the determination of targeted enological treatments, the knowledge of the level of fungal attack is of highest interest. However, visual assessment and pathogen discrimination are cost-intensive. Consequently, a pilot laboratory study aimed at (i) detecting differences in spectral signatures between grape berry lots with different levels of infected berries (B. cinerea and/or P. expansum) and (ii) detecting links between spectral signatures and biochemical as well as quantitative molecular markers for fungal attack. To this end, defined percentages (infection levels) of table grape berries were inoculated with fungal spore suspensions. Spectral measurements were taken using a FieldSpec 3 Max spectroradiometer (ASD Inc., Boulder/Colorado, USA) in regular intervals after inoculation. In addition, fungal attack was determined enzymatically) and quantitatively (real-time PCR). In addition, gluconic acid concentrations (as a potential markers for fungal attack) were determined photometrically. Results indicate that based on spectral signatures, a discrimination of P. expansum and B. cinerea infections as well as of different B. cinerea infection levels is possible. Real-time PCR analyses, detecting DNA levels of both fungi, showed yet a low detection level. Whereas the gluconic acid concentrations turned out to be specific for the two fungi tested (B. cinerea vs. P. expansum) and thus may serve as a differentiating biochemical marker. Correlation analyses between spectral measurements and biological data (gluconic acid concentrations, fungi DNA) as well as further common field and laboratory trials are targeted.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Priyotomo, Gadang, E-mail: gada001@lipi.go.id; Nuraini, Lutviasari, E-mail: Lutviasari@gmail.com; Kaneno, Yasuyuki, E-mail: kaneno@mtr.osakafu-u.ac.id
The corrosion behavior of the intermetallic compounds, Ni{sub 3}(Si,Ti) (L1{sub 2}: single phase) and Ni{sub 3}(Si,Ti) + 2Mo (L1{sub 2} and (L12 + Ni{sub ss}) mixture region), has been investigated using an immersion test, electrochemical method and surface analytical method (SEM; scanning electron microscope and EDAX: Energy Dispersive X-ray) in 0.5 kmol/m{sup 3} NaCl solutions at various pH. The corrosion behavior of nickel alloy C-276 was studied under the same experimental conditions as a reference. It was found that the uniform attack was observed on Ni{sub 3}(Si,Ti) for the immersion test at lower pH, while the pitting attack was observedmore » on this compound for this test at neutral solution. Furthermore, Ni{sub 3}(Si,Ti)+2Mo had the preferential dissolution of L1{sub 2} compared to (L1{sub 2} + Ni{sub ss}) mixture region at lower pH, while pitting attack occurred in (L1{sub 2} + Ni{sub ss}) mixture region at neutral solution. For both intermetallic compounds, the magnitude of pitting and uniform attack decrease with increasing pH of solutions. From the immersion test and polarization curves, the corrosion resistance of Ni{sub 3}(Si,Ti)+2Mo is lower than that of Ni{sub 3}(Si,Ti), while the nickel alloy C-276 is the highest one at various pH of solutions. On the other hand, in the lower pH of solutions, the corrosion resistance of tested materials decreased significantly compared to those in neutral and higher pH of solutions.« less
Improved statistical analysis of moclobemide dose effects on panic disorder treatment.
Ross, Donald C; Klein, Donald F; Uhlenhuth, E H
2010-04-01
Clinical trials with several measurement occasions are frequently analyzed using only the last available observation as the dependent variable [last observation carried forward (LOCF)]. This ignores intermediate observations. We reanalyze, with complete data methods, a clinical trial previously reported using LOCF, comparing placebo and five dosage levels of moclobemide in the treatment of outpatients with panic disorder to illustrate the superiority of methods using repeated observations. We initially analyzed unprovoked and situational, major and minor attacks as the four dependent variables, by repeated measures maximum likelihood methods. The model included parameters for linear and curvilinear time trends and regression of measures during treatment on baseline measures. Significance tests using this method take into account the structure of the error covariance matrix. This makes the sphericity assumption irrelevant. Missingness is assumed to be unrelated to eventual outcome and the residuals are assumed to have a multivariate normal distribution. No differential treatment effects for limited attacks were found. Since similar results were obtained for both types of major attack, data for the two types of major attack were combined. Overall downward linear and negatively accelerated downward curvilinear time trends were found. There were highly significant treatment differences in the regression slopes of scores during treatment on baseline observations. For major attacks, all treatment groups improved over time. The flatter regression slopes, obtained with higher doses, indicated that higher doses result in uniformly lower attack rates regardless of initial severity. Lower doses do not lower the attack rate of severely ill patients to those achieved in the less severely ill. The clinical implication is that more severe patients require higher doses to attain best benefit. Further, the significance levels obtained by LOCF analyses were only in the 0.05-0.01 range, while significance levels of <0.00001 were obtained by these repeated measures analyses indicating increased power. The greater sensitivity to treatment effect of this complete data method is illustrated. To increase power, it is often recommended to increase sample size. However, this is often impractical since a major proportion of the cost per subject is due to the initial evaluation. Increasing the number of repeated observations increases power economically and also allows detailed longitudinal trajectory analyses.
Control definition study for advanced vehicles
NASA Technical Reports Server (NTRS)
Lapins, M.; Martorella, R. P.; Klein, R. W.; Meyer, R. C.; Sturm, M. J.
1983-01-01
The low speed, high angle of attack flight mechanics of an advanced, canard-configured, supersonic tactical aircraft designed with moderate longitudinal relaxed static stability (Static Margin, SM = 16% C sub W at M = 0.4) was investigated. Control laws were developed for the longitudinal axis (""G'' or maneuver and angle of attack command systems) and for the lateral/directional axes. The performance of these control laws was examined in engineering simulation. A canard deflection/rate requirement study was performed as part of the ""G'' command law evaluation at low angles of attack. Simulated coupled maneuvers revealed the need for command limiters in all three aircraft axes to prevent departure from controlled flight. When modified with command/maneuver limiters, the control laws were shown to be adequate to prevent aircraft departure during aggressive air combat maneuvering.
5 CFR 532.405 - Use of highest previous rate.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 5 Administrative Personnel 1 2010-01-01 2010-01-01 false Use of highest previous rate. 532.405 Section 532.405 Administrative Personnel OFFICE OF PERSONNEL MANAGEMENT CIVIL SERVICE REGULATIONS PREVAILING RATE SYSTEMS Pay Administration § 532.405 Use of highest previous rate. (a)(1) Subject to the...
Maani, Christopher V; Hoffman, Hunter G; Morrow, Michelle; Maiers, Alan; Gaylord, Kathryn; McGhee, Laura L; DeSocio, Peter A
2011-07-01
This is the first controlled study to explore whether adjunctive immersive virtual reality (VR) can reduce excessive pain of soldiers with combat-related burn injuries during wound debridement. Patients were US soldiers burned in combat attacks involving explosive devices in Iraq or Afghanistan. During the same wound care session using a within-subject experimental design, 12 patients received half of their severe burn wound cleaning procedure (~6 minutes) with standard of care pharmacologies and half while in VR (treatment order randomized). Three 0 to 10 Graphic Rating Scale pain scores for each of the treatment conditions served as the primary variables. Patients reported significantly less pain when distracted with VR. "Worst pain" (pain intensity) dropped from 6.25 of 10 to 4.50 of 10. "Pain unpleasantness" ratings dropped from "moderate" (6.25 of 10) to "mild" (2.83 of 10). "Time spent thinking about pain" dropped from 76% during no VR to 22% during VR. Patients rated "no VR" as "no fun at all" (<1 of 10) and rated VR as "pretty fun" (7.5 of 10). Follow-up analyses showed VR was especially effective for the six patients who scored 7 of 10 or higher (severe to excruciating) on the "worst pain" (pain intensity) ratings. These preliminary results provide the first evidence from a controlled study that adjunctive immersive VR reduced pain of patients with combat-related burn injuries during severe burn wound debridement. Pain reduction during VR was greatest in patients with the highest pain during no VR. These patients were the first to use a unique custom robot-like arm mounted VR goggle system.
Maani, Christopher V.; Hoffman, Hunter G.; Morrow, Michelle; Maiers, Alan; Gaylord, Kathryn; McGhee, Laura L.; DeSocio, Peter A.
2015-01-01
Background This is the first controlled study to explore whether adjunctive immersive virtual reality (VR) can reduce excessive pain of soldiers with combat-related burn injuries during wound debridement. Methods Patients were US soldiers burned in combat attacks involving explosive devices in Iraq or Afghanistan. During the same wound care session using a within-subject experimental design, 12 patients received half of their severe burn wound cleaning procedure (∼6 minutes) with standard of care pharmacologies and half while in VR (treatment order randomized). Three 0 to 10 Graphic Rating Scale pain scores for each of the treatment conditions served as the primary variables. Results Patients reported significantly less pain when distracted with VR. “Worst pain” (pain intensity) dropped from 6.25 of 10 to 4.50 of 10. “Pain unpleasantness” ratings dropped from “moderate” (6.25 of 10) to “mild” (2.83 of 10). “Time spent thinking about pain” dropped from 76% during no VR to 22% during VR. Patients rated “no VR” as “no fun at all” (<1 of 10) and rated VR as “pretty fun” (7.5 of 10). Follow-up analyses showed VR was especially effective for the six patients who scored 7 of 10 or higher (severe to excruciating) on the “worst pain” (pain intensity) ratings. Conclusions These preliminary results provide the first evidence from a controlled study that adjunctive immersive VR reduced pain of patients with combat-related burn injuries during severe burn wound debridement. Pain reduction during VR was greatest in patients with the highest pain during no VR. These patients were the first to use a unique custom robot-like arm mounted VR goggle system. PMID:21795888
13 CFR 123.603 - What is the interest rate on an economic injury disaster loan under this subpart?
Code of Federal Regulations, 2010 CFR
2010-01-01
... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false What is the interest rate on an... September 11, 2001 Terrorist Attacks § 123.603 What is the interest rate on an economic injury disaster loan under this subpart? Your economic injury disaster loan under this subpart will have an interest rate of...
NASA Technical Reports Server (NTRS)
Dejarnette, F. R.
1972-01-01
A relatively simple method is presented for including the effect of variable entropy at the boundary-layer edge in a heat transfer method developed previously. For each inviscid surface streamline an approximate shockwave shape is calculated using a modified form of Maslen's method for inviscid axisymmetric flows. The entropy for the streamline at the edge of the boundary layer is determined by equating the mass flux through the shock wave to that inside the boundary layer. Approximations used in this technique allow the heating rates along each inviscid surface streamline to be calculated independent of the other streamlines. The shock standoff distances computed by the present method are found to compare well with those computed by Maslen's asymmetric method. Heating rates are presented for blunted circular and elliptical cones and a typical space shuttle orbiter at angles of attack. Variable entropy effects are found to increase heating rates downstream of the nose significantly higher than those computed using normal-shock entropy, and turbulent heating rates increased more than laminar rates. Effects of Reynolds number and angles of attack are also shown.
NASA Astrophysics Data System (ADS)
Nedoma, Jan; Fajkus, Marcel; Martinek, Radek; Cubik, Jakub; Kepak, Stanislav; Vanus, Jan; Zboril, Ondrej; Vasinek, Vladimir
2017-10-01
Authors of this article focused on the analysis of the influence location of the fiber-optic sensor on the measurement and determination the heart rate of the human body. The sensor uses a Fiber Bragg Grating (FBG) and is encapsulated in the polymer polydimethylsiloxane (PDMS). The combination of fiber-optic technology and its encapsulation in a polymer PDMS allows the use of the sensor e.g. in magnetic resonance environments (MRI). Among currently solved doctors requirements belongs field focusing on the study of hyperventilation and panic attacks of patients during MRI examination due to their very frequent occurrence. Proposed FBG sensor can help doctors to predict (based on heart rate) hyperventilation and panic attacks of patients during MRI examinations. For the most accurate determination of the heart rate, it is necessary to know the influence location of the sensor on the human body. The sensor functionality and analysis of the sensor placement on the heart rate has been verified by a series of real experimental measurements of test subjects in laboratory environment.
Cascading failures in complex networks with community structure
NASA Astrophysics Data System (ADS)
Lin, Guoqiang; di, Zengru; Fan, Ying
2014-12-01
Much empirical evidence shows that when attacked with cascading failures, scale-free or even random networks tend to collapse more extensively when the initially deleted node has higher betweenness. Meanwhile, in networks with strong community structure, high-betweenness nodes tend to be bridge nodes that link different communities, and the removal of such nodes will reduce only the connections among communities, leaving the networks fairly stable. Understanding what will affect cascading failures and how to protect or attack networks with strong community structure is therefore of interest. In this paper, we have constructed scale-free Community Networks (SFCN) and Random Community Networks (RCN). We applied these networks, along with the Lancichinett-Fortunato-Radicchi (LFR) benchmark, to the cascading-failure scenario to explore their vulnerability to attack and the relationship between cascading failures and the degree distribution and community structure of a network. The numerical results show that when the networks are of a power-law distribution, a stronger community structure will result in the failure of fewer nodes. In addition, the initial removal of the node with the highest betweenness will not lead to the worst cascading, i.e. the largest avalanche size. The Betweenness Overflow (BOF), an index that we developed, is an effective indicator of this tendency. The RCN, however, display a different result. In addition, the avalanche size of each node can be adopted as an index to evaluate the importance of the node.
A hierarchical detection method in external communication for self-driving vehicles based on TDMA.
Alheeti, Khattab M Ali; Al-Ani, Muzhir Shaban; McDonald-Maier, Klaus
2018-01-01
Security is considered a major challenge for self-driving and semi self-driving vehicles. These vehicles depend heavily on communications to predict and sense their external environment used in their motion. They use a type of ad hoc network termed Vehicular ad hoc networks (VANETs). Unfortunately, VANETs are potentially exposed to many attacks on network and application level. This paper, proposes a new intrusion detection system to protect the communication system of self-driving cars; utilising a combination of hierarchical models based on clusters and log parameters. This security system is designed to detect Sybil and Wormhole attacks in highway usage scenarios. It is based on clusters, utilising Time Division Multiple Access (TDMA) to overcome some of the obstacles of VANETs such as high density, high mobility and bandwidth limitations in exchanging messages. This makes the security system more efficient, accurate and capable of real time detection and quick in identification of malicious behaviour in VANETs. In this scheme, each vehicle log calculates and stores different parameter values after receiving the cooperative awareness messages from nearby vehicles. The vehicles exchange their log data and determine the difference between the parameters, which is utilised to detect Sybil attacks and Wormhole attacks. In order to realize efficient and effective intrusion detection system, we use the well-known network simulator (ns-2) to verify the performance of the security system. Simulation results indicate that the security system can achieve high detection rates and effectively detect anomalies with low rate of false alarms.
Budson, Andrew E; Simons, Jon S; Waring, Jill D; Sullivan, Alison L; Hussoin, Trisha; Schacter, Daniel L
2007-10-01
Although there are many opportunities to study memory in patients with Alzheimer's disease (AD) in the laboratory, there are few opportunities to study memory for real world events in these patients. The September 11, 2001 terrorist attacks provided one such opportunity. Patients with AD, patients with mild cognitive impairment (MCI), and healthy older adults were given a telephone questionnaire in the initial weeks after the event, again three to four months later, and finally one year afterwards to evaluate their memory for the September 11, 2001 terrorist attacks. We were particularly interested in using the attacks as an opportunity to examine the decline of episodic memory in patients with AD, patients with MCI, and older adult controls over a period of months. We found that compared to healthy older adults, patients with AD and MCI showed impaired memory at the initial time point, more rapid forgetting from the initial to the three-month time point, and very similar changes in memory from the three-month to the one-year time point. We speculated that these findings were consistent with patients with AD and MCI showing initial impaired encoding and a more rapid rate of forgetting compared with healthy older adults, but that once the memories had been consolidated, their decay rate became similar to that of healthy older adults. Lastly, although memory distortions were common among all groups, they were greatest in the patients with AD.
Johnson, Kirsten A; Farris, Samantha G; Schmidt, Norman B; Smits, Jasper A J; Zvolensky, Michael J
2013-01-01
Empirical research has found that panic attacks are related to increased risk of more severe nicotine withdrawal and poor cessation outcome. Anxiety sensitivity (AS; fear of anxiety and related sensations) has similarly been found to be related to an increased risk of acute nicotine withdrawal and poorer cessation outcome. However, research has yet to examine the relative contributions of panic attacks and AS in terms of cognitive-based smoking processes (e.g., negative reinforcement smoking expectancies, addictive and negative affect-based reduction smoking motives, barriers to cessation, problem symptoms experienced while quitting). Participants (n = 242; 57.4% male; M (age) = 38.1) were daily smokers recruited as a part of a larger randomized control trial for smoking cessation. It was hypothesized that both panic attacks and AS would uniquely and independently predict the studied cognitive-based smoking processes. As hypothesized, AS was uniquely and positively associated with all smoking processes after controlling for average number of cigarettes smoked per day, current Axis I diagnosis, and participant sex. However, panic attack history was only significantly related to problem symptoms experienced while quitting smoking. Although past research has demonstrated significant associations between panic attacks and certain aspects of cigarette smoking (e.g., severity of nicotine withdrawal; lower abstinence rates, and negative affect reduction motives), the present findings suggest that AS may be more relevant to understanding beliefs about and motives for smoking behavior as well as perceptions of cessation-related difficulties.
Guidance, steering, load relief and control of an asymmetric launch vehicle. M.S. Thesis - MIT
NASA Technical Reports Server (NTRS)
Boelitz, Frederick W.
1989-01-01
A new guidance, steering, and control concept is described and evaluated for the Third Phase of an asymmetrical configuration of the Advanced Launch System (ALS). The study also includes the consideration of trajectory shaping issues and trajectory design as well as the development of angular rate, angular acceleration, angle of attack, and dynamic pressure estimators. The Third Phase guidance, steering and control system is based on controlling the acceleration-direction of the vehicle after an initial launch maneuver. Unlike traditional concepts, the alignment of the estimated and commanded acceleration-directions is unimpaired by an add-on load relief. Instead, the acceleration-direction steering-control system features a control override that limits the product of estimated dynamic pressure and estimated angle of attack. When this product is not being limited, control is based exclusively on the commanded acceleration-direction without load relief. During limiting, control is based on nulling the error between the limited angle of attack and the estimated angle of attack. This limiting feature provides full freedom to the acceleration-direction steering and control to shape the trajectory within the limit, and also gives full priority to the limiting of angle of attack when necessary. The flight software concepts were analyzed on the basis of their effects on pitch plane motion.
Tracing Potential School Shooters in the Digital Sphere
NASA Astrophysics Data System (ADS)
Veijalainen, Jari; Semenov, Alexander; Kyppö, Jorma
There are over 300 known school shooting cases in the world and over ten known cases where the perpetrator(s) have been prohibited to perform the attack at the last moment or earlier. Interesting from our point of view is that in many cases the perpetrators have expressed their views in social media or on their web page well in advance, and often also left suicide messages in blogs and other forums before their attack, along the planned date and place. This has become more common towards the end of this decennium. In some cases this has made it possible to prevent the attack. In this paper we will look at the possibilities to find commonalities of the perpetrators, beyond the fact that they are all males from eleven to roughly 25 years old, and possibilities to follow their traces in the digital sphere in order to cut the dangerous development towards an attack. Should this not be possible, then an attack should be averted before it happens. We are especially interested in the multimedia data mining methods and social network mining and analysis that can be used to detect the possible perpetrators in time. We also present in this paper a probabilistic model that can be used to evaluate the success/failure rate of the detection of the possible perpetrators.
Bernik, M; Ramos, R T; Hetem, L A B; Graeff, F
2017-11-04
The effects of the 5-HT 1A receptor blocker pindolol and the 5-HT releasing and uptake blocking agent d-fenfluramine, both used as indirect serotonin agonists, on flumazenil-induced acute anxiety reactions were studied in panic disorder patients to test the hypothesis that serotonin (5-HT) inhibits neural systems mediating panic attacks. Thirty never treated or drug free PD patients (16 females) aged 22-49 y (mean±SD, 32.9±8) received single doses of d-fenfluramine (n=10; 30mg, p.o.), pindolol (n=10; 5mg, p.o.), or placebo (n=10) 90 and 45min before a challenge test with flumazenil (1.5mg, i.v., in 10min), under double-blind conditions. Panic attacks occurred in 5 control subjects (placebo-flumazenil group), 5 subjects in the pindolol group and in 7 in the d-fenluramine pre-treated patients. Patients experiencing anxiety attacks following flumazenil reported higher increases in anxiety scores. Respiratory rate increases were not different between patients experiencing or not a panic attack. Despite sample size limitation, this study suggests that flumazenil induced anxiety reaction is not a good pharmacological model of panic attacks, considering the absence of serotonergic modulation of its effects. Copyright © 2017. Published by Elsevier B.V.
McCutcheon, Vivia V; Heath, Andrew C; Nelson, Elliot C; Bucholz, Kathleen K; Madden, Pamela A F; Martin, Nicholas G
2010-02-01
Individuals who experience one type of trauma often experience other types, yet few studies have examined the clustering of trauma. This study examines the clustering of traumatic events and associations of trauma with risk for single and co-occurring major depressive disorder (MDD) and panic attack for 20 years after first trauma. Lifetime histories of MDD, panic attack, and traumatic events were obtained from participants in an Australian twin sample. Latent class analysis was used to derive trauma classes based on each respondent's trauma history. Associations of the resulting classes and of parental alcohol problems and familial effects with risk for a first onset of single and co-occurring MDD and panic attack were examined from the year of first trauma to 20 years later. Traumatic events clustered into three distinct classes characterized by endorsement of little or no trauma, primarily nonassaultive, and primarily assaultive events. Individuals in the assaultive class were characterized by a younger age at first trauma, a greater number of traumatic events, and high rates of parental alcohol problems. Members of the assaultive trauma class had the strongest and most enduring risk for single and co-occurring lifetime MDD and panic attack. Assaultive trauma outweighed associations of familial effects and nonassaultive trauma with risk for 10 years following first trauma.
Panic disorder: a different perspective.
Ranganathan, A; Beitman, B D
1998-02-01
Panic disorder is a chronic and debilitating illness. In this article, we present an algorithm of the diagnosis and treatment of the illness. We place much importance upon the patient variables associated with the treatment decisions. We emphasize strong patient involvement in treatment as a way to become panic free and improve level of functioning. Panic disorder is defined in DSM-IV1 as "The presence of recurrent panic attacks followed by at least one month of persistent concern about having another panic attack, worry about the possible implications or consequences of the panic attack, or a significant behavioral change related to the attacks." A panic attack is defined as "a discrete period of intense fear or discomfort, in which four or more of the following symptoms developed abruptly and reached a peak within 10 minutes." 1) Palpitations, pounding heart or accelerated heart rate; 2) sweating; 3) trembling or shaking; 4) sensations of shortness of breath or smothering; 5) feeling of choking; 6) chest pain or discomfort; 7) nausea or abdominal distress; 8) feeling dizzy, unsteady, light-headed or faint; 9) derealization or depersonalization; 10) fear of losing control or going crazy; 11) fear of dying; 12) paresthesias; 13) chills or hot flashes. The following hypotheses have been used to conceptualize panic disorder from a psychiatrist's perspective.