Sample records for initial attack success

  1. Predicting the effect of climate change on wildfire behavior and initial attack success

    Treesearch

    Jeremy S. Fried; J. Keith Gilless; William J. Riley; Tadashi J. Moody; Clara Simon de Blas; Katharine Hayhoe; Max Mortiz; Scott Stephens; Margaret Torn

    2008-01-01

    This study focused on how climate change-induced effects on weather will translate into changes in wildland fire severity and outcomes in California, particularly on the effectiveness of initial attack at limiting the number of fires that escape initial attack. The results indicate that subtle shifts in fire behavior of the sort that might be induced by the climate...

  2. Minimizing Expected Maximum Risk from Cyber-Attacks with Probabilistic Attack Success

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bhuiyan, Tanveer H.; Nandi, Apurba; Medal, Hugh

    The goal of our work is to enhance network security by generating partial cut-sets, which are a subset of edges that remove paths from initially vulnerable nodes (initial security conditions) to goal nodes (critical assets), on an attack graph given costs for cutting an edge and a limited overall budget.

  3. Efficient initial attacks: analysis of capacity and funding provides insights to wildfire protection planning

    Treesearch

    Jeremy Fried; Paul Meznarich

    2014-01-01

    Large wildfires in the United States pose significant challenges to fire management agencies charged with protecting lives, property, and natural resources. A vigorous initial response to a wildfire, a process referred to as "initial attack," can greatly reduce the likelihood of the fire becoming larger and causing substantial damage. Successful...

  4. Fast WEP-Key Recovery Attack Using Only Encrypted IP Packets

    NASA Astrophysics Data System (ADS)

    Teramura, Ryoichi; Asakura, Yasuo; Ohigashi, Toshihiro; Kuwakado, Hidenori; Morii, Masakatu

    Conventional efficient key recovery attacks against Wired Equivalent Privacy (WEP) require specific initialization vectors or specific packets. Since it takes much time to collect the packets sufficiently, any active attack should be performed. An Intrusion Detection System (IDS), however, will be able to prevent the attack. Since the attack logs are stored at the servers, it is possible to prevent such an attack. This paper proposes an algorithm for recovering a 104-bit WEP key from any IP packets in a realistic environment. This attack needs about 36, 500 packets with a success probability 0.5, and the complexity of our attack is equivalent to about 220 computations of the RC4 key setups. Since our attack is passive, it is difficult for both WEP users and administrators to detect our attack.

  5. Extended Password Recovery Attacks against APOP, SIP, and Digest Authentication

    NASA Astrophysics Data System (ADS)

    Sasaki, Yu; Wang, Lei; Ohta, Kazuo; Kunihiro, Noboru

    In this paper, we propose password recovery attacks against challenge-response authentication protocols. Our attacks use a message difference for a MD5 collision attack proposed in IEICE 2008. First, we show how to efficiently find a message pair that collides with the above message difference. Second, we show that a password used in authenticated post office protocol (APOP) can be recovered practically. We also show that the password recovery attack can be applied to a session initiation protocol (SIP) and digest authentication. Our attack can recover up to the first 31 password characters in a short time and up to the first 60 characters faster than the naive search method. We have implemented our attack and confirmed that 31 characters can be successfully recovered.

  6. The influence of the depth of k-core layers on the robustness of interdependent networks against cascading failures

    NASA Astrophysics Data System (ADS)

    Dong, Zhengcheng; Fang, Yanjun; Tian, Meng; Kong, Zhengmin

    The hierarchical structure, k-core, is common in various complex networks, and the actual network always has successive layers from 1-core layer (the peripheral layer) to km-core layer (the core layer). The nodes within the core layer have been proved to be the most influential spreaders, but there is few work about how the depth of k-core layers (the value of km) can affect the robustness against cascading failures, rather than the interdependent networks. First, following the preferential attachment, a novel method is proposed to generate the scale-free network with successive k-core layers (KCBA network), and the KCBA network is validated more realistic than the traditional BA network. Then, with KCBA interdependent networks, the effect of the depth of k-core layers is investigated. Considering the load-based model, the loss of capacity on nodes is adopted to quantify the robustness instead of the number of functional nodes in the end. We conduct two attacking strategies, i.e. the RO-attack (Randomly remove only one node) and the RF-attack (Randomly remove a fraction of nodes). Results show that the robustness of KCBA networks not only depends on the depth of k-core layers, but also is slightly influenced by the initial load. With RO-attack, the networks with less k-core layers are more robust when the initial load is small. With RF-attack, the robustness improves with small km, but the improvement is getting weaker with the increment of the initial load. In a word, the lower the depth is, the more robust the networks will be.

  7. Deploying wildland fire suppression resources with a scenario-based standard response model.

    Treesearch

    Robert G. Haight; Jeremy S. Fried

    2007-01-01

    Wildland fire managers deploy suppression resources to bases and dispatch them to fires to maximize the percentage of fires that are successfully contained before unacceptable costs and losses occur. Deployment is made with budget constraints and uncertainty about the daily number, location, and intensity of fires, all of which affect initial-attack success. To address...

  8. Deploying wildland fire suppression resources with a scenario-based standard response model

    Treesearch

    Robert G. Haight; Jeremy S. Fried

    2007-01-01

    Wildland fire managers deploy suppression resources to bases and dispatch them to fires to maximize the percentage of fires that are successfully contained before unacceptable costs and losses occur. Deployment is made with budget constraints and uncertainty about the daily number, location, and intensity of fires, all of which affect initial-attack success. To address...

  9. Resisting persuasion by the skin of one's teeth: the hidden success of resisted persuasive messages.

    PubMed

    Tormala, Zakary L; Clarkson, Joshua J; Petty, Richard E

    2006-09-01

    Recent research has suggested that when people resist persuasion they can perceive this resistance and, under specifiable conditions, become more certain of their initial attitudes (e.g., Z. L. Tormala & R. E. Petty, 2002). Within the same metacognitive framework, the present research provides evidence for the opposite phenomenon--that is, when people resist persuasion, they sometimes become less certain of their initial attitudes. Four experiments demonstrate that when people perceive that they have done a poor job resisting persuasion (e.g., they believe they generated weak arguments against a persuasive message), they lose attitude certainty, show reduced attitude-behavioral intention correspondence, and become more vulnerable to subsequent persuasive attacks. These findings suggest that resisted persuasive attacks can sometimes have a hidden yet important success by reducing the strength of the target attitude. ((c) 2006 APA, all rights reserved).

  10. Cooperating attackers in neural cryptography.

    PubMed

    Shacham, Lanir N; Klein, Einat; Mislovaty, Rachel; Kanter, Ido; Kinzel, Wolfgang

    2004-06-01

    A successful attack strategy in neural cryptography is presented. The neural cryptosystem, based on synchronization of neural networks by mutual learning, has been recently shown to be secure under different attack strategies. The success of the advanced attacker presented here, called the "majority-flipping attacker," does not decay with the parameters of the model. This attacker's outstanding success is due to its using a group of attackers which cooperate throughout the synchronization process, unlike any other attack strategy known. An analytical description of this attack is also presented, and fits the results of simulations.

  11. A graph-based system for network-vulnerability analysis

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Swiler, L.P.; Phillips, C.

    1998-06-01

    This paper presents a graph-based approach to network vulnerability analysis. The method is flexible, allowing analysis of attacks from both outside and inside the network. It can analyze risks to a specific network asset, or examine the universe of possible consequences following a successful attack. The graph-based tool can identify the set of attack paths that have a high probability of success (or a low effort cost) for the attacker. The system could be used to test the effectiveness of making configuration changes, implementing an intrusion detection system, etc. The analysis system requires as input a database of common attacks,more » broken into atomic steps, specific network configuration and topology information, and an attacker profile. The attack information is matched with the network configuration information and an attacker profile to create a superset attack graph. Nodes identify a stage of attack, for example the class of machines the attacker has accessed and the user privilege level he or she has compromised. The arcs in the attack graph represent attacks or stages of attacks. By assigning probabilities of success on the arcs or costs representing level-of-effort for the attacker, various graph algorithms such as shortest-path algorithms can identify the attack paths with the highest probability of success.« less

  12. A graph-based network-vulnerability analysis system

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Swiler, L.P.; Phillips, C.; Gaylor, T.

    1998-05-03

    This paper presents a graph based approach to network vulnerability analysis. The method is flexible, allowing analysis of attacks from both outside and inside the network. It can analyze risks to a specific network asset, or examine the universe of possible consequences following a successful attack. The analysis system requires as input a database of common attacks, broken into atomic steps, specific network configuration and topology information, and an attacker profile. The attack information is matched with the network configuration information and an attacker profile to create a superset attack graph. Nodes identify a stage of attack, for example themore » class of machines the attacker has accessed and the user privilege level he or she has compromised. The arcs in the attack graph represent attacks or stages of attacks. By assigning probabilities of success on the arcs or costs representing level of effort for the attacker, various graph algorithms such as shortest path algorithms can identify the attack paths with the highest probability of success.« less

  13. A graph-based network-vulnerability analysis system

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Swiler, L.P.; Phillips, C.; Gaylor, T.

    1998-01-01

    This report presents a graph-based approach to network vulnerability analysis. The method is flexible, allowing analysis of attacks from both outside and inside the network. It can analyze risks to a specific network asset, or examine the universe of possible consequences following a successful attack. The analysis system requires as input a database of common attacks, broken into atomic steps, specific network configuration and topology information, and an attacker profile. The attack information is matched with the network configuration information and an attacker profile to create a superset attack graph. Nodes identify a stage of attack, for example the classmore » of machines the attacker has accessed and the user privilege level he or she has compromised. The arcs in the attack graph represent attacks or stages of attacks. By assigning probabilities of success on the arcs or costs representing level-of-effort for the attacker, various graph algorithms such as shortest-path algorithms can identify the attack paths with the highest probability of success.« less

  14. Predator-prey interactions in the plankton: larval fish feeding on evasive copepods

    PubMed Central

    Jackson, James M.; Lenz, Petra H.

    2016-01-01

    Capture success and prey selectivity were investigated in clownfish Amphiprion ocellaris larvae using videography. Three prey types were tested using developmental stages (nauplii, copepodites and adults) of the copepod Parvocalanus crassirostris. Predatory abilities improved rapidly between days 1 and 14 post-hatch. Initially, capture success was limited to nauplii with few attacks on larger stages. Captures of copepodites were first observed at 3 dph, and of adults at 8 dph. Consistent strikes at the larger prey were observed on the day prior to successful captures (2 dph for copepodites, 7 dph for adults). Difference in capture success between nauplii and adults at 8 dph was an order of magnitude. Differences in capture success among prey types persisted but decreased to three-fold by 14 dph. Younger A. ocellaris attacked nauplii preferentially and avoided adult prey. Strike selectivity declined with age, and no selectivity was observed after 10 dph. However, numerically 50% of the ingested prey were still nauplii at 14 dph under the experimental conditions. PMID:27658849

  15. Predator-prey interactions in the plankton: larval fish feeding on evasive copepods.

    PubMed

    Jackson, James M; Lenz, Petra H

    2016-09-23

    Capture success and prey selectivity were investigated in clownfish Amphiprion ocellaris larvae using videography. Three prey types were tested using developmental stages (nauplii, copepodites and adults) of the copepod Parvocalanus crassirostris. Predatory abilities improved rapidly between days 1 and 14 post-hatch. Initially, capture success was limited to nauplii with few attacks on larger stages. Captures of copepodites were first observed at 3 dph, and of adults at 8 dph. Consistent strikes at the larger prey were observed on the day prior to successful captures (2 dph for copepodites, 7 dph for adults). Difference in capture success between nauplii and adults at 8 dph was an order of magnitude. Differences in capture success among prey types persisted but decreased to three-fold by 14 dph. Younger A. ocellaris attacked nauplii preferentially and avoided adult prey. Strike selectivity declined with age, and no selectivity was observed after 10 dph. However, numerically 50% of the ingested prey were still nauplii at 14 dph under the experimental conditions.

  16. Predator-prey interactions in the plankton: larval fish feeding on evasive copepods

    NASA Astrophysics Data System (ADS)

    Jackson, James M.; Lenz, Petra H.

    2016-09-01

    Capture success and prey selectivity were investigated in clownfish Amphiprion ocellaris larvae using videography. Three prey types were tested using developmental stages (nauplii, copepodites and adults) of the copepod Parvocalanus crassirostris. Predatory abilities improved rapidly between days 1 and 14 post-hatch. Initially, capture success was limited to nauplii with few attacks on larger stages. Captures of copepodites were first observed at 3 dph, and of adults at 8 dph. Consistent strikes at the larger prey were observed on the day prior to successful captures (2 dph for copepodites, 7 dph for adults). Difference in capture success between nauplii and adults at 8 dph was an order of magnitude. Differences in capture success among prey types persisted but decreased to three-fold by 14 dph. Younger A. ocellaris attacked nauplii preferentially and avoided adult prey. Strike selectivity declined with age, and no selectivity was observed after 10 dph. However, numerically 50% of the ingested prey were still nauplii at 14 dph under the experimental conditions.

  17. Mountain Pine Beetle Dynamics and Reproductive Success in Post-Fire Lodgepole and Ponderosa Pine Forests in Northeastern Utah

    PubMed Central

    Lerch, Andrew P.; Pfammatter, Jesse A.

    2016-01-01

    Fire injury can increase tree susceptibility to some bark beetles (Curculionidae, Scolytinae), but whether wildfires can trigger outbreaks of species such as mountain pine beetle (Dendroctonus ponderosae Hopkins) is not well understood. We monitored 1173 lodgepole (Pinus contorta var. latifolia Doug.) and 599 ponderosa (Pinus ponderosa Doug. ex Law) pines for three years post-wildfire in the Uinta Mountains of northeastern Utah in an area with locally endemic mountain pine beetle. We examined how the degree and type of fire injury influenced beetle attacks, brood production, and subsequent tree mortality, and related these to beetle population changes over time. Mountain pine beetle population levels were high the first two post-fire years in lodgepole pine, and then declined. In ponderosa pine, populations declined each year after initial post-fire sampling. Compared to trees with strip or failed attacks, mass attacks occurred on trees with greater fire injury, in both species. Overall, a higher degree of damage to crowns and boles was associated with higher attack rates in ponderosa pines, but additional injury was more likely to decrease attack rates in lodgepole pines. In lodgepole pine, attacks were initially concentrated on fire-injured trees, but during subsequent years beetles attacked substantial numbers of uninjured trees. In ponderosa pine, attacks were primarily on injured trees each year, although these stands were more heavily burned and had few uninjured trees. In total, 46% of all lodgepole and 56% of ponderosa pines underwent some degree of attack. Adult brood emergence within caged bole sections decreased with increasing bole char in lodgepole pine but increased in ponderosa pine, however these relationships did not scale to whole trees. Mountain pine beetle populations in both tree species four years post-fire were substantially lower than the year after fire, and wildfire did not result in population outbreaks. PMID:27783632

  18. Mountain Pine Beetle Dynamics and Reproductive Success in Post-Fire Lodgepole and Ponderosa Pine Forests in Northeastern Utah.

    PubMed

    Lerch, Andrew P; Pfammatter, Jesse A; Bentz, Barbara J; Raffa, Kenneth F

    2016-01-01

    Fire injury can increase tree susceptibility to some bark beetles (Curculionidae, Scolytinae), but whether wildfires can trigger outbreaks of species such as mountain pine beetle (Dendroctonus ponderosae Hopkins) is not well understood. We monitored 1173 lodgepole (Pinus contorta var. latifolia Doug.) and 599 ponderosa (Pinus ponderosa Doug. ex Law) pines for three years post-wildfire in the Uinta Mountains of northeastern Utah in an area with locally endemic mountain pine beetle. We examined how the degree and type of fire injury influenced beetle attacks, brood production, and subsequent tree mortality, and related these to beetle population changes over time. Mountain pine beetle population levels were high the first two post-fire years in lodgepole pine, and then declined. In ponderosa pine, populations declined each year after initial post-fire sampling. Compared to trees with strip or failed attacks, mass attacks occurred on trees with greater fire injury, in both species. Overall, a higher degree of damage to crowns and boles was associated with higher attack rates in ponderosa pines, but additional injury was more likely to decrease attack rates in lodgepole pines. In lodgepole pine, attacks were initially concentrated on fire-injured trees, but during subsequent years beetles attacked substantial numbers of uninjured trees. In ponderosa pine, attacks were primarily on injured trees each year, although these stands were more heavily burned and had few uninjured trees. In total, 46% of all lodgepole and 56% of ponderosa pines underwent some degree of attack. Adult brood emergence within caged bole sections decreased with increasing bole char in lodgepole pine but increased in ponderosa pine, however these relationships did not scale to whole trees. Mountain pine beetle populations in both tree species four years post-fire were substantially lower than the year after fire, and wildfire did not result in population outbreaks.

  19. Modeling Resources Allocation in Attacker-Defender Games with "Warm Up" CSF.

    PubMed

    Guan, Peiqiu; Zhuang, Jun

    2016-04-01

    Like many other engineering investments, the attacker's and defender's investments may have limited impact without initial capital to "warm up" the systems. This article studies such "warm up" effects on both the attack and defense equilibrium strategies in a sequential-move game model by developing a class of novel and more realistic contest success functions. We first solve a single-target attacker-defender game analytically and provide numerical solutions to a multiple-target case. We compare the results of the models with and without consideration of the investment "warm up" effects, and find that the defender would suffer higher expected damage, and either underestimate the attacker effort or waste defense investment if the defender falsely believes that no investment "warm up" effects exist. We illustrate the model results with real data, and compare the results of the models with and without consideration of the correlation between the "warm up" threshold and the investment effectiveness. Interestingly, we find that the defender is suggested to give up defending all the targets when the attack or the defense "warm up" thresholds are sufficiently high. This article provides new insights and suggestions on policy implications for homeland security resource allocation. © 2015 Society for Risk Analysis.

  20. Risk Management

    DTIC Science & Technology

    2011-06-02

    actively attack the risks, they will actively attack you.” -Tom Gib Why do Risk Management? 8 “The first step in the risk management process is to...opportunities to manage and improve our chances of success. - Roger Vanscoy “If you do not actively attack the risks, they will actively attack ...our risks provides opportunities to manage and improve our chances of success. - Roger Vanscoy “If you do not actively attack the risks, they will

  1. An Audit of the Use of Gonadorelin Analogues to Prevent Recurrent Acute Symptoms in Patients with Acute Porphyria in the United Kingdom.

    PubMed

    Schulenburg-Brand, Danja; Gardiner, Tricia; Guppy, Simon; Rees, David C; Stein, Penelope; Barth, Julian; Felicity Stewart, M; Badminton, Michael

    2017-01-01

    Severe recurrent acute attacks of porphyria have traditionally been treated with either prophylactic human haemin or gonadorelin analogues (GnA) in females. Evidence on the most effective treatment for this patient subgroup is lacking. This audit surveyed the use of prophylactic GnA in the UK.Twenty female patients (who experienced between 2 and 45 acute attacks of porphyria requiring hospitalisation and treatment with human haemin prior to GnA prophylaxis) were included in the audit. Data was retrospectively collected based on patient history and case review.Twenty three treatment courses were given lasting a median period of 12 months. Monthly subcutaneous Goserelin was most commonly used. In three patients in whom timing with the menstrual cycle was not considered, an acute attack occurred after initiation of the first dose. The majority of patients experienced oestrogen deficiency symptoms during treatment. Fifty percent of the prescribed courses of GnA resulted in a degree of clinical benefit. This successfully treated group experienced between 3 and 20 acute attacks prior to and between 0 and 6 acute attacks during GnA treatment.The audit revealed large variation in practice in the United Kingdom regarding indication, duration of treatment, specific drug used and management of side effects. In view of the limited treatment options available for this cohort and the mixed outcome successes reported, we believe it is reasonable for porphyria specialists to continue offering GnA treatment to women with severe recurrent debilitating acute attacks of porphyria associated with the menstrual cycle, and we propose best practice guidelines to standardise management.

  2. Exogenous factors in panic disorder: clinical and research implications.

    PubMed

    Roy-Byrne, P P; Uhde, T W

    1988-02-01

    Because panic disorder has an underlying biologic and probably genetic basis, the role of factors outside the organism in initiating and sustaining panic is often overlooked. The authors review certain exogenous factors that seem capable of triggering attacks and/or increasing their frequency and intensity: self-administered pharmacologic agents (caffeine, alcohol, nicotine, over-the-counter cold preparations, cannabis, cocaine); habits (sleep deprivation, diet, exercise, relaxation, hyperventilation); and aspects of the environment (fluorescent lighting, life stressors). There may be a specificity to the action of some of these factors, because certain factors previously thought to trigger panic attacks (e.g., pain, hypoglycemia) have been proved not to have this effect. Although the clinical significance of many of the exogenous factors discussed still awaits empirical confirmation, attention to such factors during the initial evaluation of a patient with panic disorder may be helpful in formulating a successful treatment plan.

  3. Trajectory Control for Vehicles Entering the Earth's Atmosphere at Small Flight Path Angles

    NASA Technical Reports Server (NTRS)

    Eggleston, John M.

    1959-01-01

    Methods of controlling the trajectories of high-drag-low-lift vehicles entering the earth's atmosphere at angles of attack near 90 deg and at initial entry angles up to 3 deg are studied. The trajectories are calculated for vehicles whose angle of attack can be held constant at some specified value or can be perfectly controlled as a function of some measured quantity along the trajectory. The results might be applied in the design of automatic control systems or in the design of instruments which will give the human pilot sufficient information to control his trajectory properly during an atmospheric entry. Trajectory data are compared on the basis of the deceleration, range, angle of attack, and, in some cases, the rate of descent. The aerodynamic heat-transfer rate and skin temperature of a vehicle with a simple heat-sink type of structure are calculated for trajectories made with several types of control functions. For the range of entry angles considered, it is found that the angle of attack can be controlled to restrict the deceleration down to an arbitrarily chosen level of 3g. All the control functions tried are successful in reducing the maximum deceleration to the desired level. However, in order to avoid a tendency for the deceleration to reach an initial peak decrease, and then reach a second peak, some anticipation is required in the control function so that the change in angle of attack will lead the change in deceleration. When the angle of attack is controlled in the aforementioned manner, the maximum rate of aerodynamic heat transfer to the skin is reduced, the maximum skin temperature of the vehicle is virtually unaffected, and the total heat absorbed is slightly increased. The increase in total heat can be minimized, however, by maintaining the maximum desired deceleration for as much of the trajectory as possible. From an initial angle of attack of 90 deg, the angle-of-attack requirements necessary to maintain constant values of deceleration (1g to 4g) and constant values of rate of descent (450 to 1,130 ft/sec) as long as it is aerodynamically practical are calculated and are found to be moderate in both magnitude and rate. Entry trajectories made with these types of control are presented and discussed.

  4. Quantitative variation and biosynthesis of hindgut volatiles associated with the red turpentine beetle, Dendroctonus valens LeConte, at different attack phases.

    PubMed

    Shi, Z-H; Sun, J-H

    2010-06-01

    The red turpentine beetle (RTB), Dendroctonus valens LeConte, is a destructive invasive forest pest in China. For such tree-killing species, how to initiate a volatile-mediated mass attack is of great importance during the course of establishment. To understand the hindgut volatile production mechanism underlying mass attack initiated by RTB, coupled gas chromatography-mass spectrometry and 13C-labelled precursors were applied to explore the quantitative variation and biosynthesis of volatiles associated with RTB at different attack phases. Five previously described volatiles, trans-verbenol, myrtenol, cis-verbenol, myrtenal and verbenone, were identified and quantified from extracts of female and male hindguts, with the first two compounds as the major components and the latter three as minor constituents. In newly emerged females and males, only minute amounts of these compounds were detected. The quantity of volatiles from female adults significantly increased after they fed on bolts. Male adults also yielded larger quantities of volatiles after they joined females in galleries, which suggested that RTB males could accelerate the mass colonization on host trees. We also confirmed that RTB produced the five volatiles through oxidizing the major host monoterpene, alpha-pinene, but not synthesized de novo since products were labeled without 13C. The implication of this study in understanding the successful invasion of RTB is discussed.

  5. Case report: Pig attack with successful postexposure prophylaxis management.

    PubMed

    Hall, A Brad; Smith, David; Palmer, Jillian

    2014-05-01

    The domesticated pig or boar is ubiquitous to agriculture around the world and is an important food product in most countries. The males that are able to grow tusks that can approach 5 in are the primary contributor to morbidity and mortality from boar attacks. Literature surrounding domesticated boar attacks is sparse. There are no published cases of domesticated boar attacks that describe successful bacterial postexposure prophylaxis. We present a case report of an attack on an adult female by a domesticated boar.

  6. A Novel Mobile Testing Equipment for Rock Cuttability Assessment: Vertical Rock Cutting Rig (VRCR)

    NASA Astrophysics Data System (ADS)

    Yasar, Serdar; Yilmaz, Ali Osman

    2017-04-01

    In this study, a new mobile rock cutting testing apparatus was designed and produced for rock cuttability assessment called vertical rock cutting rig (VRCR) which was designed specially to fit into hydraulic press testing equipment which are available in almost every rock mechanics laboratory. Rock cutting trials were initiated just after the production of VRCR along with calibration of the measuring load cell with an external load cell to validate the recorded force data. Then, controlled rock cutting tests with both relieved and unrelieved cutting modes were implemented on five different volcanic rock samples with a standard simple-shaped wedge tool. Additionally, core cutting test which is an important approach for roadheader performance prediction was simulated with VRCR. Mini disc cutters and point attack tools were used for execution of experimental trials. Results clearly showed that rock cutting tests were successfully realized and measuring system is delicate to rock strength, cutting depth and other variables. Core cutting test was successfully simulated, and it was also shown that rock cutting tests with mini disc cutters and point attack tools are also successful with VRCR.

  7. On the security of compressed encryption with partial unitary sensing matrices embedding a secret keystream

    NASA Astrophysics Data System (ADS)

    Yu, Nam Yul

    2017-12-01

    The principle of compressed sensing (CS) can be applied in a cryptosystem by providing the notion of security. In this paper, we study the computational security of a CS-based cryptosystem that encrypts a plaintext with a partial unitary sensing matrix embedding a secret keystream. The keystream is obtained by a keystream generator of stream ciphers, where the initial seed becomes the secret key of the CS-based cryptosystem. For security analysis, the total variation distance, bounded by the relative entropy and the Hellinger distance, is examined as a security measure for the indistinguishability. By developing upper bounds on the distance measures, we show that the CS-based cryptosystem can be computationally secure in terms of the indistinguishability, as long as the keystream length for each encryption is sufficiently large with low compression and sparsity ratios. In addition, we consider a potential chosen plaintext attack (CPA) from an adversary, which attempts to recover the key of the CS-based cryptosystem. Associated with the key recovery attack, we show that the computational security of our CS-based cryptosystem is brought by the mathematical intractability of a constrained integer least-squares (ILS) problem. For a sub-optimal, but feasible key recovery attack, we consider a successive approximate maximum-likelihood detection (SAMD) and investigate the performance by developing an upper bound on the success probability. Through theoretical and numerical analyses, we demonstrate that our CS-based cryptosystem can be secure against the key recovery attack through the SAMD.

  8. Proximal detection of energetic materials on fabrics by UV-Raman spectroscopy

    NASA Astrophysics Data System (ADS)

    Chirico, R.; Almaviva, S.; Colao, F.; Fiorani, L.; Nuvoli, M.; Schweikert, W.; Schnürer, F.; Cassioli, L.; Grossi, S.; Mariani, L.; Angelini, F.; Menicucci, I.; Palucci, A.

    2014-05-01

    In the last decades there have been several terroristic attacks with improvised explosive devices (IED) that have raised the need for new instrumentation, for homeland security applications, to obtain a reliable and effective fight against terrorism. Public transportation has been around for about 150 years, but terroristic attacks against buses, trains, subways, etc., is a relatively recent phenomenon [1]. Since 1970, transportation has been an increasingly attractive target for terrorists. Most of the attacks to transport infrastructures take place in countries where public transportation is the primary way to move. Terrorists prefer to execute a smaller-scale attack with certainty of success rather than a complex and demanding operation to cause massive death and destruction. [1]. Many commonly available materials, such as fertilizer, gunpowder, and hydrogen peroxide, can be used as explosives and other materials, such as nails, glass, or metal fragments, can be used to increase the amount of shrapnel propelled by the explosion. The majority of substances that are classified as chemical explosives generally contain oxygen, nitrogen and oxidable elements such as carbon and hydrogen [2]. The most common functional group in military explosives is NO2. That functionality can be attached to oxygen (ONO2) in the nitrate esters (PETN), to carbon (C-NO2) in the nitroarenes (TNT) and nitroalkanes (Nitromethane), and to nitrogen (N-NO2) as in the nitramines (RDX). Some organic peroxides, such as TATP and HMTD, are popular amongst terrorists because they are powerful initiators that can be easily prepared from easily available ingredients. Azides are also powerful primary explosives commonly used as initiators (commercial detonators) in civilian and military operations, therefore they could be potentially used by terrorists as initiators for IEDs.

  9. The Role of Initial Attack and Performer Expertise on Instrument Identification

    ERIC Educational Resources Information Center

    Cassidy, Jane W.; Schlegel, Amanda L.

    2016-01-01

    The purpose of this study was to examine the role initial attack and expertise play in the identification of instrumental tones. A stimulus CD was made of 32 excerpts of instrumental tones. Sixteen possible combinations of the variables of initial attack (present or absent), expertise (beginner versus professional), and timbre (flute, clarinet,…

  10. Attacking 22 entries in rugby union: running demands and differences between successful and unsuccessful entries.

    PubMed

    Tierney, P; Tobin, D P; Blake, C; Delahunt, E

    2017-12-01

    Global Positioning System (GPS) technology is commonly utilized in team sports, including rugby union. It has been used to describe the average running demands of rugby union. This has afforded an enhanced understanding of the physical fitness requirements for players. However, research in team sports has suggested that training players relative to average demands may underprepare them for certain scenarios within the game. To date, no research has investigated the running demands of attacking 22 entries in rugby union. Additionally, no research has been undertaken to determine whether differences exist in the running intensity of successful and unsuccessful attacking 22 entries in rugby union. The first aim of this study was to describe the running intensity of attacking 22 entries. The second aim of this study was to investigate whether differences exist in the running intensity of successful and unsuccessful attacking 22 entries. Running intensity was measured using meters per minute (m min -1 ) for (a) total distance, (b) running distance, (c) high-speed running distance, and (d) very high-speed running distance. This study provides normative data for the running intensity of attacking 22 entries in rugby union. Forwards achieved greater high-speed running intensity in successful (3.6 m min -1 ) compared to unsuccessful (1.8 m min -1 ) attacking 22 entries. Forwards should try and achieve greater high-speed running intensity in attacking 22 entries to increase the likelihood of successful outcomes during this period of gameplay. © 2016 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.

  11. Using the Domain Name System to Thwart Automated Client-Based Attacks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Taylor, Curtis R; Shue, Craig A

    2011-09-01

    On the Internet, attackers can compromise systems owned by other people and then use these systems to launch attacks automatically. When attacks such as phishing or SQL injections are successful, they can have negative consequences including server downtime and the loss of sensitive information. Current methods to prevent such attacks are limited in that they are application-specific, or fail to block attackers. Phishing attempts can be stopped with email filters, but if the attacker manages to successfully bypass these filters, then the user must determine if the email is legitimate or not. Unfortunately, they often are unable to do so.more » Since attackers have a low success rate, they attempt to compensate for it in volume. In order to have this high throughput, attackers take shortcuts and break protocols. We use this knowledge to address these issues by implementing a system that can detect malicious activity and use it to block attacks. If the client fails to follow proper procedure, they can be classified as an attacker. Once an attacker has been discovered, they will be isolated and monitored. This can be accomplished using existing software in Ubuntu Linux applications, along with our custom wrapper application. After running the system and seeing its performance on three popular Web browsers Chromium, Firefox and Internet Explorer as well as two popular email clients, Thunderbird and Evolution, we found that not only is this system conceivable, it is effective and has low overhead.« less

  12. Results of SEI Independent Research and Development Projects

    DTIC Science & Technology

    2007-07-01

    have established the following success criteria for our project : • developing a formal framework for systematically measuring a system’s attack...characteristics may change, depending on the current stage of the project development . During the initial stages of a project , one might see, for example...was based on the Siemens Global Studio project , which exists to provide a test bed for studying global development practices. The qualitative path

  13. INDUCIBLE TRANSIENT CENTRAL RETINAL ARTERY VASOSPASM: A CASE REPORT.

    PubMed

    Mishulin, Aleksey; Ghandi, Sachin; Apple, Daniel; Lin, Xihui; Hu, Jonathan; Abrams, Gary W

    2017-09-27

    To report a case of inducible transient central retinal artery vasospasm with associated imaging. Observational case report. A 51-year-old man presented for outpatient follow-up for recurrent inducible transient vision loss in his right eye. He experienced an episode during examination and was found to have central retinal artery vasospasm. Fundus photography and fluorescein angiography obtained during his vasospastic attack confirmed retinal arterial vasospasm. Treatment with a calcium-channel blocker (nifedipine) has been effective in preventing recurrent attacks. Idiopathic primary vasospasm is a rare cause of transient vision loss that is difficult to confirm because of the transient nature. We obtained imaging showing the initiation and resolution of the vasospastic event. The patient was then successfully treated with a calcium-channel blocker.

  14. Designing seasonal initial attack resource deployment and dispatch rules using a two-stage stochastic programming procedure

    Treesearch

    Yu Wei; Michael Bevers; Erin J. Belval

    2015-01-01

    Initial attack dispatch rules can help shorten fire suppression response times by providing easy-to-follow recommendations based on fire weather, discovery time, location, and other factors that may influence fire behavior and the appropriate response. A new procedure is combined with a stochastic programming model and tested in this study for designing initial attack...

  15. Does the initiation of urate-lowering treatment during an acute gout attack prolong the current episode and precipitate recurrent attacks: a systematic literature review.

    PubMed

    Eminaga, Fatma; La-Crette, Jonathan; Jones, Adrian; Abhishek, A

    2016-12-01

    The aim of this study was to systematically review the literature on effect of initiating urate-lowering treatment (ULT) during an acute attack of gout on duration of index attack and persistence on ULT. OVID (Medline), EMBASE and AMED were searched to identify randomized controlled trials (RCTs) of ULT initiation during acute gout attack published in English language. Two reviewers appraised the study quality and extracted data independently. Standardized mean difference (SMD) and relative risk (RR) were used to pool continuous and categorical data. Meta-analysis was carried out using STATA version 14. A total of 537 studies were selected. A total of 487 titles and abstracts were reviewed after removing duplicates. Three RCTs were identified. There was evidence from two high-quality studies that early initiation of allopurinol did not increase pain severity at days 10-15 [SMD pooled (95 % CI) 0.18 (-0.58, 0.93)]. Data from three studies suggested that initiation of ULT during an acute attack of gout did not associate with dropouts [RR pooled (95 % CI) 1.16 (0.58, 2.31)]. There is moderate-quality evidence that the initiation of ULT during an acute attack of gout does not increase pain severity and risk of ULT discontinuation. Larger studies are required to confirm these findings so that patients with acute gout can be initiated on ULT with confidence.

  16. An infanticide attempt by a free-roaming feral stallion (Equus caballus)

    PubMed Central

    Gray, Meeghan E.

    2008-01-01

    Infanticide by adult males occurs in a variety of species. While infanticidal attacks have been documented in several equid species in captivity, it has never been witnessed in free-roaming feral horses. I report an infanticide attempt by a free-living feral stallion on a recently born female foal. The stallion picked up the foal by the shoulders, tossed it around twice and bit in on the neck several times. The dam of the foal charged the stallion and successfully protected her foal from additional attacks. The foal survived the attack and later weaned successfully. The stallion recently took over the band and was excluded as the sire through genetic analysis. While this type of attack is rare, this case lends support to the sexual selection hypothesis and further demonstrates that equids have evolved with the risk of infanticide. Furthermore, it shows that maternal protectiveness can be successful against attacks by infanticidal males. PMID:19019779

  17. Effectiveness of the call in beach volleyball attacking play.

    PubMed

    Künzell, Stefan; Schweikart, Florian; Köhn, Daniel; Schläppi-Lienhard, Olivia

    2014-12-09

    In beach volleyball the setter has the opportunity to give her or his hitter a "call". The call intends that the setter suggests to her or his partner where to place the attack in the opponent's court. The effectiveness of a call is still unknown. We investigated the women's and men's Swiss National Beach Volleyball Championships in 2011 and analyzed 2185 attacks. We found large differences between female and male players. While men called in only 38.4% of attacks, women used calls in 85.5% of attacks. If the male players followed a given call, 63% of the attacks were successful. The success rate of attacks without any call was 55.8% and 47.6% when the call was ignored. These differences were not significant (χ(2)(2) = 4.55, p = 0.103). In women's beach volleyball, the rate of successful attacks was 61.5% when a call was followed, 35% for attacks without a call, and 42.6% when a call was ignored. The differences were highly significant (χ(2)(2) = 23.42, p < 0.0005). Taking into account the findings of the present study, we suggested that the call was effective in women's beach volleyball, while its effect in men's game was unclear. Considering the quality of calls we indicate that there is a significant potential to increase the effectiveness of a call.

  18. Enhancing Electromagnetic Side-Channel Analysis in an Operational Environment

    NASA Astrophysics Data System (ADS)

    Montminy, David P.

    Side-channel attacks exploit the unintentional emissions from cryptographic devices to determine the secret encryption key. This research identifies methods to make attacks demonstrated in an academic environment more operationally relevant. Algebraic cryptanalysis is used to reconcile redundant information extracted from side-channel attacks on the AES key schedule. A novel thresholding technique is used to select key byte guesses for a satisfiability solver resulting in a 97.5% success rate despite failing for 100% of attacks using standard methods. Two techniques are developed to compensate for differences in emissions from training and test devices dramatically improving the effectiveness of cross device template attacks. Mean and variance normalization improves same part number attack success rates from 65.1% to 100%, and increases the number of locations an attack can be performed by 226%. When normalization is combined with a novel technique to identify and filter signals in collected traces not related to the encryption operation, the number of traces required to perform a successful attack is reduced by 85.8% on average. Finally, software-defined radios are shown to be an effective low-cost method for collecting side-channel emissions in real-time, eliminating the need to modify or profile the target encryption device to gain precise timing information.

  19. VoIP attacks detection engine based on neural network

    NASA Astrophysics Data System (ADS)

    Safarik, Jakub; Slachta, Jiri

    2015-05-01

    The security is crucial for any system nowadays, especially communications. One of the most successful protocols in the field of communication over IP networks is Session Initiation Protocol. It is an open-source project used by different kinds of applications, both open-source and proprietary. High penetration and text-based principle made SIP number one target in IP telephony infrastructure, so security of SIP server is essential. To keep up with hackers and to detect potential malicious attacks, security administrator needs to monitor and evaluate SIP traffic in the network. But monitoring and following evaluation could easily overwhelm the security administrator in networks, typically in networks with a number of SIP servers, users and logically or geographically separated networks. The proposed solution lies in automatic attack detection systems. The article covers detection of VoIP attacks through a distributed network of nodes. Then the gathered data analyze aggregation server with artificial neural network. Artificial neural network means multilayer perceptron network trained with a set of collected attacks. Attack data could also be preprocessed and verified with a self-organizing map. The source data is detected by distributed network of detection nodes. Each node contains a honeypot application and traffic monitoring mechanism. Aggregation of data from each node creates an input for neural networks. The automatic classification on a centralized server with low false positive detection reduce the cost of attack detection resources. The detection system uses modular design for easy deployment in final infrastructure. The centralized server collects and process detected traffic. It also maintains all detection nodes.

  20. Step to improve neural cryptography against flipping attacks.

    PubMed

    Zhou, Jiantao; Xu, Qinzhen; Pei, Wenjiang; He, Zhenya; Szu, Harold

    2004-12-01

    Synchronization of neural networks by mutual learning has been demonstrated to be possible for constructing key exchange protocol over public channel. However, the neural cryptography schemes presented so far are not the securest under regular flipping attack (RFA) and are completely insecure under majority flipping attack (MFA). We propose a scheme by splitting the mutual information and the training process to improve the security of neural cryptosystem against flipping attacks. Both analytical and simulation results show that the success probability of RFA on the proposed scheme can be decreased to the level of brute force attack (BFA) and the success probability of MFA still decays exponentially with the weights' level L. The synchronization time of the parties also remains polynomial with L. Moreover, we analyze the security under an advanced flipping attack.

  1. Entanglement-secured single-qubit quantum secret sharing

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Scherpelz, P.; Resch, R.; Berryrieser, D.

    In single-qubit quantum secret sharing, a secret is shared between N parties via manipulation and measurement of one qubit at a time. Each qubit is sent to all N parties in sequence; the secret is encoded in the first participant's preparation of the qubit state and the subsequent participants' choices of state rotation or measurement basis. We present a protocol for single-qubit quantum secret sharing using polarization entanglement of photon pairs produced in type-I spontaneous parametric downconversion. We investigate the protocol's security against eavesdropping attack under common experimental conditions: a lossy channel for photon transmission, and imperfect preparation of themore » initial qubit state. A protocol which exploits entanglement between photons, rather than simply polarization correlation, is more robustly secure. We implement the entanglement-based secret-sharing protocol with 87% secret-sharing fidelity, limited by the purity of the entangled state produced by our present apparatus. We demonstrate a photon-number splitting eavesdropping attack, which achieves no success against the entanglement-based protocol while showing the predicted rate of success against a correlation-based protocol.« less

  2. Predation by the Dwarf Seahorse on Copepods: Quantifying Motion and Flows Using 3D High Speed Digital Holographic Cinematography - When Seahorses Attack!

    NASA Astrophysics Data System (ADS)

    Gemmell, Brad; Sheng, Jian; Buskey, Ed

    2008-11-01

    Copepods are an important planktonic food source for most of the world's fish species. This high predation pressure has led copepods to evolve an extremely effective escape response, with reaction times to hydrodynamic disturbances of less than 4 ms and escape speeds of over 500 body lengths per second. Using 3D high speed digital holographic cinematography (up to 2000 frames per second) we elucidate the role of entrainment flow fields generated by a natural visual predator, the dwarf seahorse (Hippocampus zosterae) during attacks on its prey, Acartia tonsa. Using phytoplankton as a tracer, we recorded and reconstructed 3D flow fields around the head of the seahorse and its prey during both successful and unsuccessful attacks to better understand how some attacks lead to capture with little or no detection from the copepod while others result in failed attacks. Attacks start with a slow approach to minimize the hydro-mechanical disturbance which is used by copepods to detect the approach of a potential predator. Successful attacks result in the seahorse using its pipette-like mouth to create suction faster than the copepod's response latency. As these characteristic scales of entrainment increase, a successful escape becomes more likely.

  3. Economic cost of initial attack and large-fire suppression

    Treesearch

    Armando González-Cabán

    1983-01-01

    A procedure has been developed for estimating the economic cost of initial attack and large-fire suppression. The procedure uses a per-unit approach to estimate total attack and suppression costs on an input-by-input basis. Fire management inputs (FMIs) are the production units used. All direct and indirect costs are charged to the FMIs. With the unit approach, all...

  4. Limb-shaking transient ischemic attack masquerading as lumbar radiculopathy from pericallosal artery stenosis treated successfully with intracranial angioplasty and stenting.

    PubMed

    Kalia, Junaid; Wolfe, Thomas; Zaidat, Osama O

    2010-03-01

    The pericallosal artery is rarely associated with intracranial atherosclerotic disease and, until recently, was usually not amenable to endovascular therapy with balloon angioplasty and stenting. We present an elderly patient with postural left leg-shaking episodes secondary to pericallosal artery stenosis, which was treated initially with primary intracranial balloon angioplasty, and subsequently, angioplasty and stenting as a result of recurrent stenosis. Both procedures were preformed without complications, and the patient remained free of symptoms on 6-month follow-up. This case demonstrates unique clinical and neuroendovascular aspects; the isolated postural leg-shaking transient ischemic attacks, initially mistaken for radiculopathy and local joint etiology, were found later to be cerebrovascular ischemic in origin. Moreover, the correlation between the findings of computed tomography perfusion and angiography localized the lesion into the medial frontal lobe and pericallosal artery territory. In addition, the technical aspect provides insight into the current state of neuroendovascular techniques, addressing the difficulty of access into very small and distal intracranial arteries affected by stenosis. Copyright 2010 National Stroke Association. Published by Elsevier Inc. All rights reserved.

  5. Colonization of disturbed trees by the southern pine bark beetle guild (Coleoptera: Scolytidae)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Flamm, R.O.; Pulley, P.E.; Coulson, R.N.

    1993-02-01

    The southern pine bark beetle guild [Dendroctonus frontalis Zimmermann, D. terebrans (Olivier), Ips calligraphus (Germar), I. grandicollis (Eichhoff), and I. avulsus (Eichhoff)] uses disturbed hosts as habitat for establishment of within-tree populations. The process of colonization of disturbed hosts was examined. Using a procedure designed to emulate effects of a lightning strike, pines were severely disturbed. Response was characterized by measuring beetle populations that (1) arrived at the trees and (2) successfully attacked the trees. Establishment of within-tree populations was characterized by measuring length of egg gallery excavated by attacking adults. The time delay between arrival and attack for D.more » frontalis and I. calligraphus was also calculated. Attack densities of both species became asymptotic as arrival increased. The percentage of arriving beetles that attacked ranged from 9 to 41 for D. frontalis and from 8 to 59 for I. calligraphus. Numbers of beetles that arrived at the tree but did not attack ranged from 2.7 to 50.2 beetles per dm[sup 2] for D. frontalis and from 0.2 to 10.0 beetles per dm[sup 2] for I. calligraphus. Most D. frontalis and I. calligraphus attacked on the day they arrived. The delay between arrival and attack was longer for I. calligraphus than the D. frontalis. Egg gallery excavated by D. frontalis increased throughout the study. Eventually, the Ips species were excluded from the lower half of the hole. The low attack densities observed in this study illustrate the significance of disturbed trees in providing refuges for enzootic levels of bark beetles. The aggregation behavior of beetle populations colonizing disturbed hosts supported the contention that these trees serve as foci for initiation of infestations. Furthermore, in disturbed pines, small numbers of beetles were capable of overcoming host defense systems.« less

  6. Evaluation of risk from acts of terrorism :the adversary/defender model using belief and fuzzy sets.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Darby, John L.

    Risk from an act of terrorism is a combination of the likelihood of an attack, the likelihood of success of the attack, and the consequences of the attack. The considerable epistemic uncertainty in each of these three factors can be addressed using the belief/plausibility measure of uncertainty from the Dempster/Shafer theory of evidence. The adversary determines the likelihood of the attack. The success of the attack and the consequences of the attack are determined by the security system and mitigation measures put in place by the defender. This report documents a process for evaluating risk of terrorist acts using anmore » adversary/defender model with belief/plausibility as the measure of uncertainty. Also, the adversary model is a linguistic model that applies belief/plausibility to fuzzy sets used in an approximate reasoning rule base.« less

  7. Heavy-Ion Microbeam Fault Injection into SRAM-Based FPGA Implementations of Cryptographic Circuits

    NASA Astrophysics Data System (ADS)

    Li, Huiyun; Du, Guanghua; Shao, Cuiping; Dai, Liang; Xu, Guoqing; Guo, Jinlong

    2015-06-01

    Transistors hit by heavy ions may conduct transiently, thereby introducing transient logic errors. Attackers can exploit these abnormal behaviors and extract sensitive information from the electronic devices. This paper demonstrates an ion irradiation fault injection attack experiment into a cryptographic field-programmable gate-array (FPGA) circuit. The experiment proved that the commercial FPGA chip is vulnerable to low-linear energy transfer carbon irradiation, and the attack can cause the leakage of secret key bits. A statistical model is established to estimate the possibility of an effective fault injection attack on cryptographic integrated circuits. The model incorporates the effects from temporal, spatial, and logical probability of an effective attack on the cryptographic circuits. The rate of successful attack calculated from the model conforms well to the experimental results. This quantitative success rate model can help evaluate security risk for designers as well as for the third-party assessment organizations.

  8. Non-Native Ambrosia Beetles as Opportunistic Exploiters of Living but Weakened Trees

    PubMed Central

    Ranger, Christopher M.; Schultz, Peter B.; Frank, Steven D.; Chong, Juang H.; Reding, Michael E.

    2015-01-01

    Exotic Xylosandrus spp. ambrosia beetles established in non-native habitats have been associated with sudden and extensive attacks on a diverse range of living trees, but factors driving their shift from dying/dead hosts to living and healthy ones are not well understood. We sought to characterize the role of host physiological condition on preference and colonization by two invaders, Xylosandrus germanus and Xylosandrus crassiusculus. When given free-choice under field conditions among flooded and non-flooded deciduous tree species of varying intolerance to flooding, beetles attacked flood-intolerant tree species over more tolerant species within 3 days of initiating flood stress. In particular, flood-intolerant flowering dogwood (Cornus florida) sustained more attacks than flood-tolerant species, including silver maple (Acer saccharinum) and swamp white oak (Quercus bicolor). Ethanol, a key host-derived attractant, was detected at higher concentrations 3 days after initiating flooding within stems of flood intolerant species compared to tolerant and non-flooded species. A positive correlation was also detected between ethanol concentrations in stem tissue and cumulative ambrosia beetle attacks. When adult X. germanus and X. crassiusculus were confined with no-choice to stems of flood-stressed and non-flooded C. florida, more ejected sawdust resulting from tunneling activity was associated with the flood-stressed trees. Furthermore, living foundresses, eggs, larvae, and pupae were only detected within galleries created in stems of flood-stressed trees. Despite a capability to attack diverse tree genera, X. germanus and X. crassiusculus efficiently distinguished among varying host qualities and preferentially targeted trees based on their intolerance of flood stress. Non-flooded trees were not preferred or successfully colonized. This study demonstrates the host-selection strategy exhibited by X. germanus and X. crassiusculus in non-native habitats involves detection of stress-induced ethanol emission and early colonization of living but weakened trees. PMID:26134522

  9. Non-Native Ambrosia Beetles as Opportunistic Exploiters of Living but Weakened Trees.

    PubMed

    Ranger, Christopher M; Schultz, Peter B; Frank, Steven D; Chong, Juang H; Reding, Michael E

    2015-01-01

    Exotic Xylosandrus spp. ambrosia beetles established in non-native habitats have been associated with sudden and extensive attacks on a diverse range of living trees, but factors driving their shift from dying/dead hosts to living and healthy ones are not well understood. We sought to characterize the role of host physiological condition on preference and colonization by two invaders, Xylosandrus germanus and Xylosandrus crassiusculus. When given free-choice under field conditions among flooded and non-flooded deciduous tree species of varying intolerance to flooding, beetles attacked flood-intolerant tree species over more tolerant species within 3 days of initiating flood stress. In particular, flood-intolerant flowering dogwood (Cornus florida) sustained more attacks than flood-tolerant species, including silver maple (Acer saccharinum) and swamp white oak (Quercus bicolor). Ethanol, a key host-derived attractant, was detected at higher concentrations 3 days after initiating flooding within stems of flood intolerant species compared to tolerant and non-flooded species. A positive correlation was also detected between ethanol concentrations in stem tissue and cumulative ambrosia beetle attacks. When adult X. germanus and X. crassiusculus were confined with no-choice to stems of flood-stressed and non-flooded C. florida, more ejected sawdust resulting from tunneling activity was associated with the flood-stressed trees. Furthermore, living foundresses, eggs, larvae, and pupae were only detected within galleries created in stems of flood-stressed trees. Despite a capability to attack diverse tree genera, X. germanus and X. crassiusculus efficiently distinguished among varying host qualities and preferentially targeted trees based on their intolerance of flood stress. Non-flooded trees were not preferred or successfully colonized. This study demonstrates the host-selection strategy exhibited by X. germanus and X. crassiusculus in non-native habitats involves detection of stress-induced ethanol emission and early colonization of living but weakened trees.

  10. Febrile neutropenia in children with acute lymphoblastic leukemia: single center experience

    PubMed Central

    Özdemir, Nihal; Tüysüz, Gülen; Çelik, Nigar; Yantri, Leman; Erginöz, Ethem; Apak, Hilmi; Özkan, Alp; Yıldız, İnci; Celkan, Tiraje

    2016-01-01

    Aim: An important life-threatening complication of intensive chemotherapy administered in children with leukemia is febrile neutropenia. The objective of this study was to evaluate the clinical features and consequences of febrile neutropenia attacks in children who were treated for acute lymphoblastic leukemia. Material and Methods: Nighty-six children who received chemotherapy for acute lymphoblastic leukemia in our center between January 1995 and December 2010 were included in the study. The data related to demographic characteristics, treatment features, relapse and febrile neutropenia incidences, risk factors, culture results and prognosis were retrospectively evaluated from the patients’ files. Results: A total of two hundred-ninety nine febrile neutropenia attacks observed in the patients during initial treatment and relapse treatment were evaluated. When the incidence of febrile neutropenia was evaluated by years, it was observed that the patients treated after year 2000 had statistically significantly more febrile neutopenia attacks compared to the patients treated before year 2000. When the incidences of febrile neutropenia during initial treatment and during relapse treatment were compared, it was observed that more febrile neutropenia attacks occured during relapse treatment. Fifty-nine percent of all febrile neutropenia attacks were fever of unknown origin. Eighty microorganisms grew in cultures during febrile neutropenia throughout treatment in 75 patients; 86% were bacterial infections (50% gram positive and 50% gram negative), 8% were viral infections and 6% were fungal infections. Coagulase negative staphylococcus (n=17) was the most frequent gram positive pathogen; E. Coli (n=17) was the most commonly grown gram negative pathogen. Conclusions: In this study, it was found that an increase in the incidence of febrile neutropenia occured in years. Increments in treatment intensities increase the incidence of febrile neutropenia while improving survival. Evaluation of febrile neutropenia results by hematology-oncology units in years will be directive in early and successful treatment. PMID:27489464

  11. Towards a Strategic Approach to Special Events Management in the Post-9/11 World

    DTIC Science & Technology

    2005-09-01

    George Nesterczuk, “A Successful Start for the Department of Homeland Security Requires Management Flexibility,” The Heritage Foundation...attacks in sport since Munich.22 Not all attacks have been successful . Two weeks prior to the 1998 World Cup tournament in France, European police

  12. Angular relationships regulate coordination tendencies of performers in attacker-defender dyads in team sports.

    PubMed

    Esteves, Pedro T; Araújo, Duarte; Vilar, Luís; Travassos, Bruno; Davids, Keith; Esteves, Carlos

    2015-04-01

    This study examined the continuous interpersonal interactions of performers in dyadic systems in team sports, as a function of changing information constraints. As a task vehicle, we investigated how attackers attained success in 1v1 sub-phases of basketball by exploring angular relations with immediate opponents and the basket. We hypothesized that angular relations would convey information for the attackers to dribble past defenders. Four basketball players performed as an attacker and defender in 1v1 sub-phases of basketball, in which the co-positioning and orientation of participants relative to the basket was manipulated. After video recording performance behaviors, we digitized participant movement displacement trajectories and categorized trials as successful or unsuccessful (from the attackers' viewpoint). Results revealed that, to successfully dribble past a defender, attackers tended to explore the left hand side of the space by defenders by increasing their angular velocity and decreasing their angular variability, especially in the center of the court. Interpersonal interactions and goal-achievement in attacker-defender dyads appear to have been constrained by the angular relations sustained between participants relative to the scoring target. Results revealed the functionality of exploratory behaviors of participants attempting re-align spatial relations with an opponent in 1v1 sub-phases of team games. Copyright © 2015 Elsevier B.V. All rights reserved.

  13. The epidemiology of physical attack and rape among crack-using women.

    PubMed

    Falck, R S; Wang, J; Carlson, R G; Siegal, H A

    2001-02-01

    This prospective study examines the epidemiology of physical attack and rape among a sample of 171 not-in-treatment, crack-cocaine using women. Since initiating crack use, 62% of the women reported suffering a physical attack. The annual rate of victimization by physical attack was 45%. Overall, more than half of the victims sought medical care subsequent to an attack. The prevalence of rape since crack use was initiated was 32%, and the annual rate was 11%. Among those women having been raped since they initiated crack use, 83% reported they were high on crack when the crime occurred as were an estimated 57% of the perpetrators. Logistic regression analyses showed that duration of crack use, arrest for prostitution, and some college education were predictors of having experienced a physical attack. Duration of crack use and a history of prostitution were predictors of suffering a rape. Drug abuse treatment programs must be sensitive to high levels of violence victimization experienced by crack-cocaine using women. Screening women for victimization, and treating the problems that emanate from it, may help make drug abuse treatment more effective.

  14. Protecting complex infrastructures against multiple strategic attackers

    NASA Astrophysics Data System (ADS)

    Hausken, Kjell

    2011-01-01

    Infrastructures are analysed subject to defence by a strategic defender and attack by multiple strategic attackers. A framework is developed where each agent determines how much to invest in defending versus attacking each of multiple targets. A target can have economic, human and symbolic values, which generally vary across agents. Investment expenditure functions for each agent can be linear in the investment effort, concave, convex, logistic, can increase incrementally, or can be subject to budget constraints. Contest success functions (e.g., ratio and difference forms) determine the probability of a successful attack on each target, dependent on the relative investments of the defender and attackers on each target, and on characteristics of the contest. Targets can be in parallel, in series, interlinked, interdependent or independent. The defender minimises the expected damage plus the defence expenditures. Each attacker maximises the expected damage minus the attack expenditures. The number of free choice variables equals the number of agents times the number of targets, or lower if there are budget constraints. Each agent is interested in how his investments vary across the targets, and the impact on his utilities. Alternative optimisation programmes are discussed, together with repeated games, dynamic games and incomplete information. An example is provided for illustration.

  15. A decision framework for managing risk to airports from terrorist attack.

    PubMed

    Shafieezadeh, Abdollah; Cha, Eun J; Ellingwood, Bruce R

    2015-02-01

    This article presents an asset-level security risk management framework to assist stakeholders of critical assets with allocating limited budgets for enhancing their safety and security against terrorist attack. The proposed framework models the security system of an asset, considers various threat scenarios, and models the sequential decision framework of attackers during the attack. Its novel contributions are the introduction of the notion of partial neutralization of attackers by defenders, estimation of total loss from successful, partially successful, and unsuccessful actions of attackers at various stages of an attack, and inclusion of the effects of these losses on the choices made by terrorists at various stages of the attack. The application of the proposed method is demonstrated in an example dealing with security risk management of a U.S. commercial airport, in which a set of plausible threat scenarios and risk mitigation options are considered. It is found that a combination of providing blast-resistant cargo containers and a video surveillance system on the airport perimeter fence is the best option based on minimum expected life-cycle cost considering a 10-year service period. © 2014 Society for Risk Analysis.

  16. [First chemical mass attack in history of wars, Bolimów, January 31, 1915].

    PubMed

    Zieliński, Andrzej

    2010-01-01

    World War I was the conflict, during which it was first used chemical warfare on a massive scale. The earliest chemical attack occurred on the Western Front in October 1914 in Neuve Chapelle, but its effects were so minimal that the Allies learned about it only after the war from German documents. The attack in the area Bolimow, made by the Germans against the Russian army with artillery shells containing gas T (xylyl and benzyl bromides), was therefore the first attack on a massive scale recorded on the victim side. The attack, which occurred after it made it possible to obtain some tactical success, but without a strategic breakthrough. Some of the later German attacks on the eastern front where chlorine was used proved to be more effective, but despite the many victims there was not any major strategic success achieved. The Russians did not take attempts to use chemical weapons in the First World War.

  17. Genetic attack on neural cryptography.

    PubMed

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  18. Genetic attack on neural cryptography

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka

    2006-03-15

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold formore » the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.« less

  19. Genetic attack on neural cryptography

    NASA Astrophysics Data System (ADS)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  20. Preventing Terrorism Using Information Sharing Networks

    DTIC Science & Technology

    2006-09-01

    in fusing information and providing valuable intelligence that thwarted a terrorist attack at Disneyland . A videotape was received that contained a...creditable threat of a Sarin gas attack at Disneyland . The LA TEW conducted the initial analysis of the tape and the initial investigation that

  1. False Positive and False Negative Effects on Network Attacks

    NASA Astrophysics Data System (ADS)

    Shang, Yilun

    2018-01-01

    Robustness against attacks serves as evidence for complex network structures and failure mechanisms that lie behind them. Most often, due to detection capability limitation or good disguises, attacks on networks are subject to false positives and false negatives, meaning that functional nodes may be falsely regarded as compromised by the attacker and vice versa. In this work, we initiate a study of false positive/negative effects on network robustness against three fundamental types of attack strategies, namely, random attacks (RA), localized attacks (LA), and targeted attack (TA). By developing a general mathematical framework based upon the percolation model, we investigate analytically and by numerical simulations of attack robustness with false positive/negative rate (FPR/FNR) on three benchmark models including Erdős-Rényi (ER) networks, random regular (RR) networks, and scale-free (SF) networks. We show that ER networks are equivalently robust against RA and LA only when FPR equals zero or the initial network is intact. We find several interesting crossovers in RR and SF networks when FPR is taken into consideration. By defining the cost of attack, we observe diminishing marginal attack efficiency for RA, LA, and TA. Our finding highlights the potential risk of underestimating or ignoring FPR in understanding attack robustness. The results may provide insights into ways of enhancing robustness of network architecture and improve the level of protection of critical infrastructures.

  2. Method and tool for network vulnerability analysis

    DOEpatents

    Swiler, Laura Painton [Albuquerque, NM; Phillips, Cynthia A [Albuquerque, NM

    2006-03-14

    A computer system analysis tool and method that will allow for qualitative and quantitative assessment of security attributes and vulnerabilities in systems including computer networks. The invention is based on generation of attack graphs wherein each node represents a possible attack state and each edge represents a change in state caused by a single action taken by an attacker or unwitting assistant. Edges are weighted using metrics such as attacker effort, likelihood of attack success, or time to succeed. Generation of an attack graph is accomplished by matching information about attack requirements (specified in "attack templates") to information about computer system configuration (contained in a configuration file that can be updated to reflect system changes occurring during the course of an attack) and assumed attacker capabilities (reflected in "attacker profiles"). High risk attack paths, which correspond to those considered suited to application of attack countermeasures given limited resources for applying countermeasures, are identified by finding "epsilon optimal paths."

  3. Effects of Motivation: Rewarding Hackers for Undetected Attacks Cause Analysts to Perform Poorly.

    PubMed

    Maqbool, Zahid; Makhijani, Nidhi; Pammi, V S Chandrasekhar; Dutt, Varun

    2017-05-01

    The aim of this study was to determine how monetary motivations influence decision making of humans performing as security analysts and hackers in a cybersecurity game. Cyberattacks are increasing at an alarming rate. As cyberattacks often cause damage to existing cyber infrastructures, it is important to understand how monetary rewards may influence decision making of hackers and analysts in the cyber world. Currently, only limited attention has been given to this area. In an experiment, participants were randomly assigned to three between-subjects conditions ( n = 26 for each condition): equal payoff, where the magnitude of monetary rewards for hackers and defenders was the same; rewarding hacker, where the magnitude of monetary reward for hacker's successful attack was 10 times the reward for analyst's successful defense; and rewarding analyst, where the magnitude of monetary reward for analyst's successful defense was 10 times the reward for hacker's successful attack. In all conditions, half of the participants were human hackers playing against Nash analysts and half were human analysts playing against Nash hackers. Results revealed that monetary rewards for human hackers and analysts caused a decrease in attack and defend actions compared with the baseline. Furthermore, rewarding human hackers for undetected attacks made analysts deviate significantly from their optimal behavior. If hackers are rewarded for their undetected attack actions, then this causes analysts to deviate from optimal defend proportions. Thus, analysts need to be trained not become overenthusiastic in defending networks. Applications of our results are to networks where the influence of monetary rewards may cause information theft and system damage.

  4. Plants under stress by parasitic plants.

    PubMed

    Hegenauer, Volker; Körner, Max; Albert, Markus

    2017-08-01

    In addition to other biotic stresses, parasitic plants pose an additional threat to plants and cause crop losses, worldwide. Plant parasites directly connect to the vasculature of host plants thereby stealing water, nutrients, and carbohydrates consequently leading to tremendously reduced biomass and losses in seed yields of the infected host plants. Initial steps to understand the molecular resistance mechanisms and the successes in ancient and recent breeding efforts will provide fundamental knowledge to further generate crop plants that will resist attacks by plant parasites. Copyright © 2017 Elsevier Ltd. All rights reserved.

  5. Identification of Successive ``Unobservable'' Cyber Data Attacks in Power Systems Through Matrix Decomposition

    NASA Astrophysics Data System (ADS)

    Gao, Pengzhi; Wang, Meng; Chow, Joe H.; Ghiocel, Scott G.; Fardanesh, Bruce; Stefopoulos, George; Razanousky, Michael P.

    2016-11-01

    This paper presents a new framework of identifying a series of cyber data attacks on power system synchrophasor measurements. We focus on detecting "unobservable" cyber data attacks that cannot be detected by any existing method that purely relies on measurements received at one time instant. Leveraging the approximate low-rank property of phasor measurement unit (PMU) data, we formulate the identification problem of successive unobservable cyber attacks as a matrix decomposition problem of a low-rank matrix plus a transformed column-sparse matrix. We propose a convex-optimization-based method and provide its theoretical guarantee in the data identification. Numerical experiments on actual PMU data from the Central New York power system and synthetic data are conducted to verify the effectiveness of the proposed method.

  6. Distinguishing attack and second-preimage attack on encrypted message authentication codes (EMAC)

    NASA Astrophysics Data System (ADS)

    Ariwibowo, Sigit; Windarta, Susila

    2016-02-01

    In this paper we show that distinguisher on CBC-MAC can be applied to Encrypted Message Authentication Code (EMAC) scheme. EMAC scheme in general is vulnerable to distinguishing attack and second preimage attack. Distinguishing attack simulation on AES-EMAC using 225 message modifications, no collision have been found. According to second preimage attack simulation on AES-EMAC no collision found between EMAC value of S1 and S2, i.e. no second preimage found for messages that have been tested. Based on distinguishing attack simulation on truncated AES-EMAC we found collision in every message therefore we cannot distinguish truncated AES-EMAC with random function. Second-preimage attack is successfully performed on truncated AES-EMAC.

  7. Go Ahead of Malware’s Infections and Controls: Towards New Techniques for Proactive Cyber Defense

    DTIC Science & Technology

    2016-12-08

    in SDN (such as topology poisoning attacks and data-to-control plan saturation attacks) and developed new defense for SDN (such as TopoGuard and... Poisoning Network Visibility in Software-Defined Networks: New Attacks and Countermeasures As part of our research on discovering new vulnerabilities...future network- ing paradigm. We demonstrate that this new attacks can effectively poison the network topology information, then further successfully

  8. Defensive responses by a social caterpillar are tailored to different predators and change with larval instar and group size

    NASA Astrophysics Data System (ADS)

    McClure, Melanie; Despland, Emma

    2011-05-01

    Gregariousness in animals is widely accepted as a behavioral adaptation for protection from predation. However, predation risk and the effectiveness of a prey's defense can be a function of several other factors, including predator species and prey size or age. The objective of this study was to determine if the gregarious habit of Malacosoma disstria caterpillars is advantageous against invertebrate natural enemies, and whether it is through dilution or cooperative defenses. We also examined the effects of larval growth and group size on the rate and success of attacks. Caterpillars of M. disstria responded with predator-specific behaviors, which led to increased survival. Evasive behaviors were used against stinkbugs, while thrashing by fourth instar caterpillars and holding on to the silk mat by second instar caterpillars was most efficient against spider attacks. Collective head flicking and biting by groups of both second and fourth instar caterpillars were observed when attacked by parasitoids. Increased larval size decreased the average number of attacks by spiders but increased the number of attacks by both stinkbugs and parasitoids. However, increased body size decreased the success rate of attacks by all three natural enemies and increased handling time for both predators. Larger group sizes did not influence the number of attacks from predators but increased the number of attacks and the number of successful attacks from parasitoids. In all cases, individual risk was lower in larger groups. Caterpillars showed collective defenses against parasitoids but not against the walking predators. These results show that caterpillars use different tactics against different natural enemies. Overall, these tactics are both more diverse and more effective in fourth instar than in second instar caterpillars, confirming that growth reduces predation risk. We also show that grouping benefits caterpillars through dilution of risk, and, in the case of parasitoids, through group defenses. The decreased tendency to aggregate in the last larval instar may therefore be linked to decreasing predation risk.

  9. The spectrum of medical errors: when patients sue

    PubMed Central

    Kels, Barry D; Grant-Kels, Jane M

    2012-01-01

    Inarguably medical errors constitute a serious, dangerous, and expensive problem for the twenty-first-century US health care system. This review examines the incidence, nature, and complexity of alleged medical negligence and medical malpractice. The authors hope this will constitute a road map to medical providers so that they can better understand the present climate and hopefully avoid the “Scylla and Charybdis” of medical errors and medical malpractice. Despite some documented success in reducing medical errors, adverse events and medical errors continue to represent an indelible stain upon the practice, reputation, and success of the US health care industry. In that regard, what may be required to successfully attack the unacceptably high severity and volume of medical errors is a locally directed and organized initiative sponsored by individual health care organizations that is coordinated, supported, and guided by state and federal governmental and nongovernmental agencies. PMID:22924008

  10. Optimizing the robustness of electrical power systems against cascading failures.

    PubMed

    Zhang, Yingrui; Yağan, Osman

    2016-06-21

    Electrical power systems are one of the most important infrastructures that support our society. However, their vulnerabilities have raised great concern recently due to several large-scale blackouts around the world. In this paper, we investigate the robustness of power systems against cascading failures initiated by a random attack. This is done under a simple yet useful model based on global and equal redistribution of load upon failures. We provide a comprehensive understanding of system robustness under this model by (i) deriving an expression for the final system size as a function of the size of initial attacks; (ii) deriving the critical attack size after which system breaks down completely; (iii) showing that complete system breakdown takes place through a first-order (i.e., discontinuous) transition in terms of the attack size; and (iv) establishing the optimal load-capacity distribution that maximizes robustness. In particular, we show that robustness is maximized when the difference between the capacity and initial load is the same for all lines; i.e., when all lines have the same redundant space regardless of their initial load. This is in contrast with the intuitive and commonly used setting where capacity of a line is a fixed factor of its initial load.

  11. Advanced Cyber Industrial Control System Tactics, Techniques, and Procedures (ACI TTP) for Department of Defense (DOD) Industrial Control Systems (ICS)

    DTIC Science & Technology

    2016-08-10

    enable JCS managers to detect advanced cyber attacks, mitigate the effects of those attacks, and recover their networks following an attack. It also... managers of ICS networks to Detect, Mitigate, and Recover from nation-state-level cyber attacks (strategic, deliberate, well-trained, and funded...Successful Detection of cyber anomalies is best achieved when IT and ICS managers remain in close coordination. The Integrity Checks Table

  12. The Killer Fly Hunger Games: Target Size and Speed Predict Decision to Pursuit

    PubMed Central

    Wardill, Trevor J.; Knowles, Katie; Barlow, Laura; Tapia, Gervasio; Nordström, Karin; Olberg, Robert M.; Gonzalez-Bellido, Paloma T.

    2015-01-01

    Predatory animals have evolved to optimally detect their prey using exquisite sensory systems such as vision, olfaction and hearing. It may not be so surprising that vertebrates, with large central nervous systems, excel at predatory behaviors. More striking is the fact that many tiny insects, with their miniscule brains and scaled down nerve cords, are also ferocious, highly successful predators. For predation, it is important to determine whether a prey is suitable before initiating pursuit. This is paramount since pursuing a prey that is too large to capture, subdue or dispatch will generate a substantial metabolic cost (in the form of muscle output) without any chance of metabolic gain (in the form of food). In addition, during all pursuits, the predator breaks its potential camouflage and thus runs the risk of becoming prey itself. Many insects use their eyes to initially detect and subsequently pursue prey. Dragonflies, which are extremely efficient predators, therefore have huge eyes with relatively high spatial resolution that allow efficient prey size estimation before initiating pursuit. However, much smaller insects, such as killer flies, also visualize and successfully pursue prey. This is an impressive behavior since the small size of the killer fly naturally limits the neural capacity and also the spatial resolution provided by the compound eye. Despite this, we here show that killer flies efficiently pursue natural (Drosophila melanogaster) and artificial (beads) prey. The natural pursuits are initiated at a distance of 7.9 ± 2.9 cm, which we show is too far away to allow for distance estimation using binocular disparities. Moreover, we show that rather than estimating absolute prey size prior to launching the attack, as dragonflies do, killer flies attack with high probability when the ratio of the prey's subtended retinal velocity and retinal size is 0.37. We also show that killer flies will respond to a stimulus of an angular size that is smaller than that of the photoreceptor acceptance angle, and that the predatory response is strongly modulated by the metabolic state. Our data thus provide an exciting example of a loosely designed matched filter to Drosophila, but one which will still generate successful pursuits of other suitable prey. PMID:26398293

  13. Identifying ponderosa pines infested with mountain pine beetles

    Treesearch

    William F. McCambridge

    1974-01-01

    Trees successfully and unsuccessfully attacked by mountain pine beetles have several symptoms in common, so that proper diagnosis is not always easy. Guidelines presented here enable the observer to correctly distinguish nearly all attacked trees.

  14. Detecting Man-in-the-Middle Attacks against Transport Layer Security Connections with Timing Analysis

    DTIC Science & Technology

    2011-09-15

    Networks (VPNs), TLS protects massive amounts of private information, and protecting this data from Man-in-the-Middle ( MitM ) attacks is imperative to...keeping the information secure. This thesis illustrates how an attacker can successfully perform a MitM attack against a TLS connection without alerting...mechanism a user has against a MitM . The goal for this research is to determine if a time threshold exists that can indicate the presence of a MitM in this

  15. Weather, logging, and tree growth associated with fir engraver attack scars in white fir

    Treesearch

    George T. Ferrell

    1973-01-01

    The boles of 32 recently killed, and 41 living, white fir were examined for embedded fir engraver (Scolytus ventralis) attack scars. Of 287 scars found in annual rings for the years 1934-69, only 2 to 3 percent represented reproductively successful attacks. Trends in scar abundance were directly correlated with trends in white fir killed by ...

  16. ADDJUST-A View of the First 25 Years

    NASA Technical Reports Server (NTRS)

    Nieberding, Joe; Williams, Craig H.

    2015-01-01

    Various technologies and innovative launch operations were developed during the 50 years of the Centaur upper stage—the first launch vehicle to use high performing liquid hydrogen fuel. One innovation was “ADDJUST”, which enabled the successful negotiation of upper level winds measured only hours before launch. Initial causes for its creation, development, and operation during countdown are detailed. Problem definition, wind measuring/monitoring process, pitch and yaw steering coefficient generation, loads analysis, angle of attack, major risks/concerns, and anecdotal recollections are provided. Launch availability improved from as low as 55 to 95 percent due to ADDJUST, which is still in use.

  17. Analysing initial attack on wildland fires using stochastic simulation.

    Treesearch

    Jeremy S. Fried; J. Keith Gilless; James Spero

    2006-01-01

    Stochastic simulation models of initial attack on wildland fire can be designed to reflect the complexity of the environmental, administrative, and institutional context in which wildland fire protection agencies operate, but such complexity may come at the cost of a considerable investment in data acquisition and management. This cost may be well justified when it...

  18. Computing arrival times of firefighting resources for initial attack

    Treesearch

    Romain M. Mees

    1978-01-01

    Dispatching of firefighting resources requires instantaneous or precalculated decisions. A FORTRAN computer program has been developed that can provide a list of resources in order of computed arrival time for initial attack on a fire. The program requires an accurate description of the existing road system and a list of all resources available on a planning unit....

  19. Allocation model for air tanker initial attack in firefighting

    Treesearch

    Francis E. Greulich; William G. O' Regan

    1975-01-01

    Timely and appropriate use of air tankers in firefighting can bring high returns, but their misuse can be expensive when measured in operating and other costs. An allocation model has been developed for identifying superior strategies-for air tanker initial attack, and for choosing an optimum set of allocations among airbases. Data are presented for a representative...

  20. Kinetic model of water disinfection using peracetic acid including synergistic effects.

    PubMed

    Flores, Marina J; Brandi, Rodolfo J; Cassano, Alberto E; Labas, Marisol D

    2016-01-01

    The disinfection efficiencies of a commercial mixture of peracetic acid against Escherichia coli were studied in laboratory scale experiments. The joint and separate action of two disinfectant agents, hydrogen peroxide and peracetic acid, were evaluated in order to observe synergistic effects. A kinetic model for each component of the mixture and for the commercial mixture was proposed. Through simple mathematical equations, the model describes different stages of attack by disinfectants during the inactivation process. Based on the experiments and the kinetic parameters obtained, it could be established that the efficiency of hydrogen peroxide was much lower than that of peracetic acid alone. However, the contribution of hydrogen peroxide was very important in the commercial mixture. It should be noted that this improvement occurred only after peracetic acid had initiated the attack on the cell. This synergistic effect was successfully explained by the proposed scheme and was verified by experimental results. Besides providing a clearer mechanistic understanding of water disinfection, such models may improve our ability to design reactors.

  1. Design and Implementation of a New Real-Time Frequency Sensor Used as Hardware Countermeasure

    PubMed Central

    Jiménez-Naharro, Raúl; Gómez-Galán, Juan Antonio; Sánchez-Raya, Manuel; Gómez-Bravo, Fernando; Pedro-Carrasco, Manuel

    2013-01-01

    A new digital countermeasure against attacks related to the clock frequency is –presented. This countermeasure, known as frequency sensor, consists of a local oscillator, a transition detector, a measurement element and an output block. The countermeasure has been designed using a full-custom technique implemented in an Application-Specific Integrated Circuit (ASIC), and the implementation has been verified and characterized with an integrated design using a 0.35 μm standard Complementary Metal Oxide Semiconductor (CMOS) technology (Very Large Scale Implementation—VLSI implementation). The proposed solution is configurable in resolution time and allowed range of period, achieving a minimum resolution time of only 1.91 ns and an initialization time of 5.84 ns. The proposed VLSI implementation shows better results than other solutions, such as digital ones based on semi-custom techniques and analog ones based on band pass filters, all design parameters considered. Finally, a counter has been used to verify the good performance of the countermeasure in avoiding the success of an attack. PMID:24008285

  2. Drought stress leads to systemic induced susceptibility to a nectrotrophic fungus associated with mountain pine beetle in Pinus banksiana seedlings.

    PubMed

    Klutsch, Jennifer G; Shamoun, Simon Francis; Erbilgin, Nadir

    2017-01-01

    Conifers have complex defense responses to initial attacks by insects and pathogens that can have cascading effects on success of subsequent colonizers. However, drought can affect a plant's ability to respond to biotic agents by potentially altering the resources needed for the energetically costly production of induced defense chemicals. We investigated the impact of reduced water on induced chemical defenses of jack pine (Pinus banksiana) seedlings from initial attack by biotic agents and resistance to subsequent challenge inoculation with a pathogenic fungal associate of mountain pine beetle (Dendroctonus ponderosae), Grosmannia clavigera. Applications of phytohormones (methyl salicylate and methyl jasmonate) and G. clavigera were used for initial induction of defenses. Monoterpene concentrations varied with initial induction from fungal and phytohormone application while watering treatment had no effect. Seedlings treated with G. clavigera and methyl jasmonate had the greatest monoterpene concentrations compared to the control and methyl salicylate-treated seedlings. However, the monoterpene response to the challenge inoculation varied with watering treatments, not with prior induction treatments, with lower monoterpene concentrations in fungal lesions on seedlings in the low to moderate watering treatments compared to normal watering treatment. Furthermore, prior induction from phytohormones resulted in systemic cross-induction of resistance to G. clavigera under normal watering treatment but susceptibility under low watering treatment. Seedlings stressed by low water conditions, which also had lower stomatal conductance than seedlings in the normal watering treatment, likely allocated resources to initial defense response but were left unable to acquire further resources for subsequent responses. Our results demonstrate that drought can affect interactions among tree-infesting organisms through systemic cross-induction of susceptibility.

  3. Drought stress leads to systemic induced susceptibility to a nectrotrophic fungus associated with mountain pine beetle in Pinus banksiana seedlings

    PubMed Central

    Shamoun, Simon Francis; Erbilgin, Nadir

    2017-01-01

    Conifers have complex defense responses to initial attacks by insects and pathogens that can have cascading effects on success of subsequent colonizers. However, drought can affect a plant’s ability to respond to biotic agents by potentially altering the resources needed for the energetically costly production of induced defense chemicals. We investigated the impact of reduced water on induced chemical defenses of jack pine (Pinus banksiana) seedlings from initial attack by biotic agents and resistance to subsequent challenge inoculation with a pathogenic fungal associate of mountain pine beetle (Dendroctonus ponderosae), Grosmannia clavigera. Applications of phytohormones (methyl salicylate and methyl jasmonate) and G. clavigera were used for initial induction of defenses. Monoterpene concentrations varied with initial induction from fungal and phytohormone application while watering treatment had no effect. Seedlings treated with G. clavigera and methyl jasmonate had the greatest monoterpene concentrations compared to the control and methyl salicylate-treated seedlings. However, the monoterpene response to the challenge inoculation varied with watering treatments, not with prior induction treatments, with lower monoterpene concentrations in fungal lesions on seedlings in the low to moderate watering treatments compared to normal watering treatment. Furthermore, prior induction from phytohormones resulted in systemic cross-induction of resistance to G. clavigera under normal watering treatment but susceptibility under low watering treatment. Seedlings stressed by low water conditions, which also had lower stomatal conductance than seedlings in the normal watering treatment, likely allocated resources to initial defense response but were left unable to acquire further resources for subsequent responses. Our results demonstrate that drought can affect interactions among tree-infesting organisms through systemic cross-induction of susceptibility. PMID:29216258

  4. Facelock: familiarity-based graphical authentication.

    PubMed

    Jenkins, Rob; McLachlan, Jane L; Renaud, Karen

    2014-01-01

    Authentication codes such as passwords and PIN numbers are widely used to control access to resources. One major drawback of these codes is that they are difficult to remember. Account holders are often faced with a choice between forgetting a code, which can be inconvenient, or writing it down, which compromises security. In two studies, we test a new knowledge-based authentication method that does not impose memory load on the user. Psychological research on face recognition has revealed an important distinction between familiar and unfamiliar face perception: When a face is familiar to the observer, it can be identified across a wide range of images. However, when the face is unfamiliar, generalisation across images is poor. This contrast can be used as the basis for a personalised 'facelock', in which authentication succeeds or fails based on image-invariant recognition of faces that are familiar to the account holder. In Study 1, account holders authenticated easily by detecting familiar targets among other faces (97.5% success rate), even after a one-year delay (86.1% success rate). Zero-acquaintance attackers were reduced to guessing (<1% success rate). Even personal attackers who knew the account holder well were rarely able to authenticate (6.6% success rate). In Study 2, we found that shoulder-surfing attacks by strangers could be defeated by presenting different photos of the same target faces in observed and attacked grids (1.9% success rate). Our findings suggest that the contrast between familiar and unfamiliar face recognition may be useful for developers of graphical authentication systems.

  5. An Approach for Assessing Consequences of Potential Supply Chain and Insider Contributed Cyber Attacks on Nuclear Power Plants

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chu, Tsong L.

    The Stuxnet attack at the Natanz facility is an example of a targeted and successful cyber attack on a nuclear facility. Snowden's release of National Security Agency documents demonstrated the consequences of the insider threat. More recently, the United States tried to attack North Korea but failed, South Korea was attempting to attack North Korea, and both applied Stuxnet-like approaches. These sophisticated targeted attacks differ from web-site hacking events that are reported almost daily in the news mainly because targeted attacks require detailed design and operation information of the systems attacked and/or are often carried out by insiders. For instance,more » in order to minimize disruption of facilities around the world, Stuxnet remained idle until it recognized the specific configuration of the Natanz facility, demonstrating that the attackers possessed extremely detailed information about the facility. Such targeted cyber attacks could become a national-level military weapon and be used in coercion of hostile countries.« less

  6. Operational Test and Evaluation Handbook for Aircrew Training Devices. Volume II. Operational Effectiveness Evaluation

    DTIC Science & Technology

    1982-02-01

    should also convey an understanding of the differ- ences in learning behavior between initial learning activity and later skill maintenance and...refinement might then be, ATTACK MANEUVERS * Pop-up attack # Loft/ LADO type attack * Level/laydown attack Figure 5-4 showe diagrammatically the...sensitive to differ- ences in performance. Severai criteria should be used to guide the selection/development of performance measures, i.e., measure validity

  7. Passive Fingerprinting Of Computer Network Reconnaissance Tools

    DTIC Science & Technology

    2009-09-01

    v6 for version 6 MITM : Man-In-The-Middle Attack MSS: Maximum Segment Size NOP: No Operation Performed NPS: Naval Postgraduate School OS...specific, or man-in-the- middle ( MITM ) attacks. Depending on the attacker’s position to access the targeted network, the attacker may be able to...identification numbers. Both are ordinarily supposed to be initialized as a random number to make it difficult for an attacker to perform an injection MITM

  8. Low concentration of lindane plus induced attraction traps mountain pine beetle

    Treesearch

    Richard H. Smith

    1976-01-01

    Mountain pine beetles were induced to attack lodgepole pine sprayed with 0.2 percent or 0.3 percent lindane emulsion. Large numbers of beetles were killed and fell into traps at the base of the tree. The few successfully attacking beetles caused the sprayed trees to remain attractive to beetles for about two months. The incidence of attacked trees in the immediate area...

  9. Deploying initial attack resources for wildfire suppression: spatial coordination, budget constraints, and capacity constraints

    Treesearch

    Yohan Lee; Jeremy S. Fried; Heidi J. Albers; Robert G. Haight

    2013-01-01

    We combine a scenario-based, standard-response optimization model with stochastic simulation to improve the efficiency of resource deployment for initial attack on wildland fires in three planning units in California. The optimization model minimizes the expected number of fires that do not receive a standard response--defined as the number of resources by type that...

  10. A chance-constrained programming model to allocate wildfire initial attack resources for a fire season

    Treesearch

    Yu Wei; Michael Bevers; Erin Belval; Benjamin Bird

    2015-01-01

    This research developed a chance-constrained two-stage stochastic programming model to support wildfire initial attack resource acquisition and location on a planning unit for a fire season. Fire growth constraints account for the interaction between fire perimeter growth and construction to prevent overestimation of resource requirements. We used this model to examine...

  11. Split-second escape decisions in blue tits (Parus caeruleus)

    NASA Astrophysics Data System (ADS)

    Lind, Johan; Kaby, Ulrika; Jakobsson, Sven

    2002-07-01

    Bird mortality is heavily affected by birds of prey. Under attack, take-off is crucial for survival and even minor mistakes in initial escape response can have devastating consequences. Birds may respond differently depending on the character of the predator's attack and these split-second decisions were studied using a model merlin (Falco columbarius) that attacked feeding blue tits (Parus caeruleus) from two different attack angles in two different speeds. When attacked from a low attack angle they took off more steeply than when attacked from a high angle. This is the first study to show that escape behaviour also depends on predator attack speed. The blue tits responded to a high-speed attack by dodging sideways more often than when attacked at a low speed. Escape speed was not significantly affected by the different treatments. Although they have only a split-second before escaping an attack, blue tits do adjust their escape strategy to the prevailing attack conditions.

  12. Sediment-induced turbidity impairs foraging performance and prey choice of planktivorous coral reef fishes.

    PubMed

    Johansen, J L; Jones, G P

    2013-09-01

    Sedimentation is a substantial threat to aquatic ecosystems and a primary cause of habitat degradation on near-shore coral reefs. Although numerous studies have demonstrated major impacts of sedimentation and turbidity on corals, virtually nothing is known of the sensitivity of reef fishes. Planktivorous fishes are an important trophic group that funnels pelagic energy sources into reef ecosystems. These fishes are visual predators whose foraging is likely to be impaired by turbidity, but the threshold for such effects and their magnitude are unknown. This study examined the effect of sediment-induced turbidity on foraging in four species of planktivorous damselfishes (Pomacentridae) of the Great Barrier Reef, including inshore and offshore species that potentially differ in tolerance for turbidity. An experimental flow tunnel was used to quantify their ability to catch mobile and immobile planktonic prey under different levels of turbidity and velocity in the range encountered on natural and disturbed reefs. Turbidity of just 4 NTU (nephelometric turbidity units) reduced average attack success by up to 56%, with higher effect sizes for species with offshore distributions. Only the inshore species (Neopomacentrus bankieri), which frequently encounters this turbidity on coastal reefs, could maintain high prey capture success. At elevated turbidity similar to that found on disturbed reefs (8 NTU), attack success was reduced in all species examined by up to 69%. These reductions in attack success led to a 21-24% decrease in foraging rates for all mid to outer-shelf species, in spite of increasing attack rates at high turbidity. Although effects of turbidity varied among species, it always depended heavily on prey mobility and ambient velocity. Attack success was up to 14 times lower on mobile prey, leaving species relatively incapable of foraging on anything but immobile prey at high turbidity. Effects of turbidity were particularly prominent at higher velocities, as attack success was overall 20-fold lower and foraging rates 3.3-fold lower at flow velocities > 30 cm/s relative to < or = 10 cm/s. Given that many planktivorous reef fishes predominantly occupy exposed, high-flow habitats, these results provide a reasonable explanation for the lack of planktivores on inshore coral reefs and warn that the performance of visual predators could be impaired at turbidity levels of only 4 NTU.

  13. Design and implementation of dynamic hybrid Honeypot network

    NASA Astrophysics Data System (ADS)

    Qiao, Peili; Hu, Shan-Shan; Zhai, Ji-Qiang

    2013-05-01

    The method of constructing a dynamic and self-adaptive virtual network is suggested to puzzle adversaries, delay and divert attacks, exhaust attacker resources and collect attacking information. The concepts of Honeypot and Honeyd, which is the frame of virtual Honeypot are introduced. The techniques of network scanning including active fingerprint recognition are analyzed. Dynamic virtual network system is designed and implemented. A virtual network similar to real network topology is built according to the collected messages from real environments in this system. By doing this, the system can perplex the attackers when Hackers attack and can further analyze and research the attacks. The tests to this system prove that this design can successfully simulate real network environment and can be used in network security analysis.

  14. Robustness of coevolution in resolving prisoner's dilemma games on interdependent networks subject to attack

    NASA Astrophysics Data System (ADS)

    Liu, Penghui; Liu, Jing

    2017-08-01

    Recently, coevolution between strategy and network structure has been established as a rule to resolve social dilemmas and reach optimal situations for cooperation. Many follow-up researches have focused on studying how coevolution helps networks reorganize to deter the defectors and many coevolution methods have been proposed. However, the robustness of the coevolution rules against attacks have not been studied much. Since attacks may directly influence the original evolutionary process of cooperation, the robustness should be an important index while evaluating the quality of a coevolution method. In this paper, we focus on investigating the robustness of an elementary coevolution method in resolving the prisoner's dilemma game upon the interdependent networks. Three different types of time-independent attacks, named as edge attacks, instigation attacks and node attacks have been employed to test its robustness. Through analyzing the simulation results obtained, we find this coevolution method is relatively robust against the edge attack and the node attack as it successfully maintains cooperation in the population over the entire attack range. However, when the instigation probability of the attacked individuals is large or the attack range of instigation attack is wide enough, coevolutionary rule finally fails in maintaining cooperation in the population.

  15. A foundation for initial attack simulation: the Fried and Fried fire containment model

    Treesearch

    Jeremy S. Fried; Burton D. Fried

    2010-01-01

    The Fried and Fried containment algorithm, which models the effect of suppression efforts on fire growth, allows simulation of any mathematically representable fire shape, provides for "head" and "tail" attack tactics as well as parallel attack (building fireline parallel to but at some offset distance from the free-burning fire perimeter, alone and...

  16. Exploiting Small Leakages in Masks to Turn a Second-Order Attack into a First-Order Attack and Improved Rotating Substitution Box Masking with Linear Code Cosets.

    PubMed

    DeTrano, Alexander; Karimi, Naghmeh; Karri, Ramesh; Guo, Xiaofei; Carlet, Claude; Guilley, Sylvain

    2015-01-01

    Masking countermeasures, used to thwart side-channel attacks, have been shown to be vulnerable to mask-extraction attacks. State-of-the-art mask-extraction attacks on the Advanced Encryption Standard (AES) algorithm target S-Box recomputation schemes but have not been applied to scenarios where S-Boxes are precomputed offline. We propose an attack targeting precomputed S-Boxes stored in nonvolatile memory. Our attack targets AES implemented in software protected by a low entropy masking scheme and recovers the masks with 91% success rate. Recovering the secret key requires fewer power traces (in fact, by at least two orders of magnitude) compared to a classical second-order attack. Moreover, we show that this attack remains viable in a noisy environment or with a reduced number of leakage points. Eventually, we specify a method to enhance the countermeasure by selecting a suitable coset of the masks set.

  17. Exploiting Small Leakages in Masks to Turn a Second-Order Attack into a First-Order Attack and Improved Rotating Substitution Box Masking with Linear Code Cosets

    PubMed Central

    DeTrano, Alexander; Karimi, Naghmeh; Karri, Ramesh; Guo, Xiaofei; Carlet, Claude; Guilley, Sylvain

    2015-01-01

    Masking countermeasures, used to thwart side-channel attacks, have been shown to be vulnerable to mask-extraction attacks. State-of-the-art mask-extraction attacks on the Advanced Encryption Standard (AES) algorithm target S-Box recomputation schemes but have not been applied to scenarios where S-Boxes are precomputed offline. We propose an attack targeting precomputed S-Boxes stored in nonvolatile memory. Our attack targets AES implemented in software protected by a low entropy masking scheme and recovers the masks with 91% success rate. Recovering the secret key requires fewer power traces (in fact, by at least two orders of magnitude) compared to a classical second-order attack. Moreover, we show that this attack remains viable in a noisy environment or with a reduced number of leakage points. Eventually, we specify a method to enhance the countermeasure by selecting a suitable coset of the masks set. PMID:26491717

  18. The Icatibant Outcome Survey: treatment of laryngeal angioedema attacks

    PubMed Central

    Aberer, Werner; Bouillet, Laurence; Caballero, Teresa; Maurer, Marcus; Fabien, Vincent; Zanichelli, Andrea

    2016-01-01

    Objective To characterize the management and outcomes of life-threatening laryngeal attacks of hereditary angioedema (HAE) treated with icatibant in the observational Icatibant Outcome Survey (NCT01034969) registry. Methods This retrospective analysis was based on data from patients with HAE type I/II who received healthcare professional-administered or self-administered icatibant to treat laryngeal attacks between September 2008 and May 2013. Results Twenty centers in seven countries contributed data. Overall, 42 patients with HAE experienced 67 icatibant-treated laryngeal attacks. Icatibant was self-administered for 62.3% of attacks (healthcare professional-administered, 37.7%). One icatibant injection was used for 87.9% of attacks, with rescue or concomitant medication used for 9.0%. The median time to treatment was 2.0 h (n=31 attacks) and the median time to resolution was 6.0 h (n=35 attacks). Conclusions This analysis describes successful use of icatibant for the treatment of laryngeal HAE attacks in a real-world setting. PMID:27116379

  19. An entangling-probe attack on Shor's algorithm for factorization

    NASA Astrophysics Data System (ADS)

    Azuma, Hiroo

    2018-02-01

    We investigate how to attack Shor's quantum algorithm for factorization with an entangling probe. We show that an attacker can steal an exact solution of Shor's algorithm outside an institute where the quantum computer is installed if he replaces its initialized quantum register with entangled qubits, namely the entangling probe. He can apply arbitrary local operations to his own probe. Moreover, we assume that there is an unauthorized person who helps the attacker to commit a crime inside the institute. He tells garbage data obtained from measurements of the quantum register to the attacker secretly behind a legitimate user's back. If the attacker succeeds in cracking Shor's algorithm, the legitimate user obtains a random answer and does not notice the attacker's illegal acts. We discuss how to detect the attacker. Finally, we estimate a probability that the quantum algorithm inevitably makes an error, of which the attacker can take advantage.

  20. Facelock: familiarity-based graphical authentication

    PubMed Central

    McLachlan, Jane L.; Renaud, Karen

    2014-01-01

    Authentication codes such as passwords and PIN numbers are widely used to control access to resources. One major drawback of these codes is that they are difficult to remember. Account holders are often faced with a choice between forgetting a code, which can be inconvenient, or writing it down, which compromises security. In two studies, we test a new knowledge-based authentication method that does not impose memory load on the user. Psychological research on face recognition has revealed an important distinction between familiar and unfamiliar face perception: When a face is familiar to the observer, it can be identified across a wide range of images. However, when the face is unfamiliar, generalisation across images is poor. This contrast can be used as the basis for a personalised ‘facelock’, in which authentication succeeds or fails based on image-invariant recognition of faces that are familiar to the account holder. In Study 1, account holders authenticated easily by detecting familiar targets among other faces (97.5% success rate), even after a one-year delay (86.1% success rate). Zero-acquaintance attackers were reduced to guessing (<1% success rate). Even personal attackers who knew the account holder well were rarely able to authenticate (6.6% success rate). In Study 2, we found that shoulder-surfing attacks by strangers could be defeated by presenting different photos of the same target faces in observed and attacked grids (1.9% success rate). Our findings suggest that the contrast between familiar and unfamiliar face recognition may be useful for developers of graphical authentication systems. PMID:25024913

  1. Epidemics of panic during a bioterrorist attack--a mathematical model.

    PubMed

    Radosavljevic, Vladan; Radunovic, Desanka; Belojevic, Goran

    2009-09-01

    A bioterrorist attacks usually cause epidemics of panic in a targeted population. We have presented epidemiologic aspect of this phenomenon as a three-component model--host, information on an attack and social network. We have proposed a mathematical model of panic and counter-measures as the function of time in a population exposed to a bioterrorist attack. The model comprises ordinary differential equations and graphically presented combinations of the equations parameters. Clinically, we have presented a model through a sequence of psychic conditions and disorders initiated by an act of bioterrorism. This model might be helpful for an attacked community to timely and properly apply counter-measures and to minimize human mental suffering during a bioterrorist attack.

  2. In-flight flow visualization results from the X-29A aircraft at high angles of attack

    NASA Technical Reports Server (NTRS)

    Delfrate, John H.; Saltzman, John A.

    1992-01-01

    Flow visualization techniques were used on the X-29A aircraft at high angles of attack to study the vortical flow off the forebody and the surface flow on the wing and tail. The forebody vortex system was studied because asymmetries in the vortex system were suspected of inducing uncommanded yawing moments at zero sideslip. Smoke enabled visualization of the vortex system and correlation of its orientation with flight yawing moment data. Good agreement was found between vortex system asymmetries and the occurrence of yawing moments. Surface flow on the forward-swept wing of the X-29A was studied using tufts and flow cones. As angle of attack increased, separated flow initiated at the root and spread outboard encompassing the full wing by 30 deg angle of attack. In general, the progression of the separated flow correlated well with subscale model lift data. Surface flow on the vertical tail was also studied using tufts and flow cones. As angle of attack increased, separated flow initiated at the root and spread upward. The area of separated flow on the vertical tail at angles of attack greater than 20 deg correlated well with the marked decrease in aircraft directional stability.

  3. Using Reputation Based Trust to Overcome Malfunctions and Malicious Failures in Electric Power Protection Systems

    DTIC Science & Technology

    2011-09-01

    concert with a physical attack. Additionally, the importance of preventive measures implemented by a social human network to counteract a cyber attack...integrity of the data stored on specific computers. This coordinated cyber attack would have been successful if not for the trusted social network...established by Mr. Hillar Aarelaid, head of the Estonian computer 6 emergency response team (CERT). This social network consisted of Mr. Hillar Aarelaid

  4. Improving Resource Allocation Decisions to Reduce the Risk of Terrorist Attacks on Passenger Rail Systems

    DTIC Science & Technology

    2016-12-01

    theory, passenger rail bombing , attacker-defender methodology 15. NUMBER OF PAGES 103 16. PRICE CODE 17. SECURITY CLASSIFICATION OF REPORT...bombers carried out a successful coordinated attack against the London mass transit system in July 2005. Three suicide bombings occurred on trains and...iron rods to make shrapnel. The precise timing indicates the terrorists themselves detonated their own devices. In March 2016, a suicide bomb

  5. Risk Due to Radiological Terror Attacks With Natural Radionuclides

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Friedrich, Steinhaeusler; Lyudmila, Zaitseva; Stan, Rydell

    The naturally occurring radionuclides radium (Ra-226) and polonium (Po-210) have the potential to be used for criminal acts. Analysis of international incident data contained in the Database on Nuclear Smuggling, Theft and Orphan Radiation Sources (CSTO), operated at the University of Salzburg, shows that several acts of murder and terrorism with natural radionuclides have already been carried out in Europe and Russia. Five different modes of attack (T) are possible: (1) Covert irradiation of an individual in order to deliver a high individual dose; (2) Covert irradiation of a group of persons delivering a large collective dose; (3) Contamination ofmore » food or drink; (4) Generation of radioactive aerosols or solutions; (5) Combination of Ra-226 with conventional explosives (Dirty Bomb).This paper assesses the risk (R) of such criminal acts in terms of: (a) Probability of terrorist motivation deploying a certain attack mode T; (b) Probability of success by the terrorists for the selected attack mode T; (c) Primary damage consequence (C) to the attacked target (activity, dose); (d) Secondary damage consequence (C') to the attacked target (psychological and socio-economic effects); (e) Probability that the consequences (C, C') cannot be brought under control, resulting in a failure to manage successfully the emergency situation due to logistical and/or technical deficits in implementing adequate countermeasures. Extensive computer modelling is used to determine the potential impact of such a criminal attack on directly affected victims and on the environment.« less

  6. Risk Due to Radiological Terror Attacks With Natural Radionuclides

    NASA Astrophysics Data System (ADS)

    Friedrich, Steinhäusler; Stan, Rydell; Lyudmila, Zaitseva

    2008-08-01

    The naturally occurring radionuclides radium (Ra-226) and polonium (Po-210) have the potential to be used for criminal acts. Analysis of international incident data contained in the Database on Nuclear Smuggling, Theft and Orphan Radiation Sources (CSTO), operated at the University of Salzburg, shows that several acts of murder and terrorism with natural radionuclides have already been carried out in Europe and Russia. Five different modes of attack (T) are possible: (1) Covert irradiation of an individual in order to deliver a high individual dose; (2) Covert irradiation of a group of persons delivering a large collective dose; (3) Contamination of food or drink; (4) Generation of radioactive aerosols or solutions; (5) Combination of Ra-226 with conventional explosives (Dirty Bomb). This paper assesses the risk (R) of such criminal acts in terms of: (a) Probability of terrorist motivation deploying a certain attack mode T; (b) Probability of success by the terrorists for the selected attack mode T; (c) Primary damage consequence (C) to the attacked target (activity, dose); (d) Secondary damage consequence (C') to the attacked target (psychological and socio-economic effects); (e) Probability that the consequences (C, C') cannot be brought under control, resulting in a failure to manage successfully the emergency situation due to logistical and/or technical deficits in implementing adequate countermeasures. Extensive computer modelling is used to determine the potential impact of such a criminal attack on directly affected victims and on the environment.

  7. Monitoring of continuous-variable quantum key distribution system in real environment.

    PubMed

    Liu, Weiqi; Peng, Jinye; Huang, Peng; Huang, Duan; Zeng, Guihua

    2017-08-07

    How to guarantee the practical security of continuous-variable quantum key distribution (CVQKD) system has been an important issue in the quantum cryptography applications. In contrast to the previous practical security strategies, which focus on the intercept-resend attack or the Gaussian attack, we investigate the practical security strategy based on a general attack, i.e., an arbitrated individual attack or collective attack on the system by Eve in this paper. The low bound of intensity disturbance of the local oscillator signal for eavesdropper successfully concealing herself is obtained, considering all noises can be used by Eve in the practical environment. Furthermore, we obtain an optimal monitoring condition for the practical CVQKD system so that legitimate communicators can monitor the general attack in real-time. As examples, practical security of two special systems, i.e., the Gaussian modulated coherent state CVQKD system and the middle-based CVQKD system, are investigated under the intercept-resend attacks.

  8. Sandia National Laboratories: Malware Technical Exchange Meeting (MTEM)

    Science.gov Websites

    Cyber & Infrastructure Security Global Security Remote Sensing & Verification Research Research Against Malware Detection of Malware Malware Research Malware in Mobile Devices Malware Attack Trends Malware Malware Research Malware in Mobile Devices Malware Attack Trends Success Stories of COTS Products

  9. Death feigning in the face of sexual cannibalism

    PubMed Central

    Bilde, Trine; Tuni, Cristina; Elsayed, Rehab; Pekár, Stano; Toft, Søren

    2005-01-01

    Pre-copulatory sexual cannibalism by females affects male and female reproductive success in profoundly different ways, with the females benefiting from a meal and the male facing the risk of not reproducing at all. This sexual conflict predicts evolution of traits to avoid cannibalism and ensure male reproductive success. We show that males of the nuptial gift-giving spider Pisaura mirabilis display a remarkable death feigning behaviour—thanatosis—as part of the courtship prior to mating with potentially cannibalistic females. Thanatosis is a widespread anti-predator strategy; however, it is exceptional in the context of sexual selection. When the female approached a gift-displaying male, she usually showed interest in the gift but would sometimes attack the male, and at this potentially dangerous moment the male could ‘drop dead’. When entering thanatosis, the male would collapse and remain completely motionless while retaining hold of the gift so it was held simultaneously by both mates. When the female initiated consumption of the gift, the male cautiously ‘came to life’ and initiated copulation. Death feigning males were more successful in gaining copulations, but did not have prolonged copulations. We propose that death feigning evolved as an adaptive male mating strategy in conjunction with nuptial gift giving under the risk of being victimized by females. PMID:17148316

  10. Known-plaintext attack on a joint transform correlator encrypting system.

    PubMed

    Barrera, John Fredy; Vargas, Carlos; Tebaldi, Myrian; Torroba, Roberto; Bolognini, Nestor

    2010-11-01

    We demonstrate in this Letter that a joint transform correlator shows vulnerability to known-plaintext attacks. An unauthorized user, who intercepts both an object and its encrypted version, can obtain the security key code mask. In this contribution, we conduct a hybrid heuristic attack scheme merge to a Gerchberg-Saxton routine to estimate the encrypting key to decode different ciphertexts encrypted with that same key. We also analyze the success of this attack for different pairs of plaintext-ciphertext used to get the encrypting code. We present simulation results for the decrypting procedure to demonstrate the validity of our analysis.

  11. Spatial variability in oviposition damage by periodical cicadas in a fragmented landscape.

    PubMed

    Cook, William M; Holt, Robert D; Yao, Jin

    2001-03-01

    Effects of the periodical cicada (Magicicada spp.) on forest dynamics are poorly documented. A 1998 emergence of M. cassini in eastern Kansas led to colonization of a fragmented experimental landscape undergoing secondary succession. We hypothesized that per-tree rates of oviposition damage by cicadas would reflect: (1) distance from the source of the emergence, (2) patch size, and (3) local tree density. Ovipositing females displayed clear preferences for host species and damage incidence showed predictable spatial patterns. Two species (smooth sumac, Rhus glabra, and eastern red cedar, Juniperus virginiana) were rarely attacked, whereas others (rough-leaved dogwood, Cornus drummondii; slippery elm, Ulmus rubra; box elder, Acer negundo, and honey locust, Gleditsia triacanthos) were strongly attacked. The dominant early successional tree, dogwood, received on average the most attacks. As predicted, attacks per stem declined strongly with distance from the emergence source, and with local stem density (a "dilution" effect). Contrary to expectations, there were more attacks per stem on larger patches. Because ovipositing cicadas cut damaging slits in host tree branches, potentially affecting tree growth rate, competitive ability, and capacity to reproduce, cicada damage could potentially influence spatial variation in secondary succession.

  12. Novel Duplicate Address Detection with Hash Function

    PubMed Central

    Song, GuangJia; Ji, ZhenZhou

    2016-01-01

    Duplicate address detection (DAD) is an important component of the address resolution protocol (ARP) and the neighbor discovery protocol (NDP). DAD determines whether an IP address is in conflict with other nodes. In traditional DAD, the target address to be detected is broadcast through the network, which provides convenience for malicious nodes to attack. A malicious node can send a spoofing reply to prevent the address configuration of a normal node, and thus, a denial-of-service attack is launched. This study proposes a hash method to hide the target address in DAD, which prevents an attack node from launching destination attacks. If the address of a normal node is identical to the detection address, then its hash value should be the same as the “Hash_64” field in the neighboring solicitation message. Consequently, DAD can be successfully completed. This process is called DAD-h. Simulation results indicate that address configuration using DAD-h has a considerably higher success rate when under attack compared with traditional DAD. Comparative analysis shows that DAD-h does not require third-party devices and considerable computing resources; it also provides a lightweight security resolution. PMID:26991901

  13. Oral clonidine for proctalgia fugax.

    PubMed

    Swain, R

    1987-08-01

    A report is made of the successful use of oral clonidine for proctalgia fugax by the author on himself. The author, a 30 year old otherwise healthy man, has been having attacks of proctalgia fugax for several years. He had hitherto left the condition untreated. Last year, in a severe attack, he tried oral clonidine 150 micrograms twice a day and found it to be dramatically effective. He was completely relieved in three days and tapered off the drug thereafter. A further attack of proctalgia fugax after a month was again treated successfully with oral clonidine. The presumed aetiology of proctalgia fugax is discussed and the possible mechanism of action of clonidine in this condition is outlined. Further trials of clonidine appear to be worthwhile for this condition which has been described as incurable.

  14. Oral clonidine for proctalgia fugax.

    PubMed Central

    Swain, R

    1987-01-01

    A report is made of the successful use of oral clonidine for proctalgia fugax by the author on himself. The author, a 30 year old otherwise healthy man, has been having attacks of proctalgia fugax for several years. He had hitherto left the condition untreated. Last year, in a severe attack, he tried oral clonidine 150 micrograms twice a day and found it to be dramatically effective. He was completely relieved in three days and tapered off the drug thereafter. A further attack of proctalgia fugax after a month was again treated successfully with oral clonidine. The presumed aetiology of proctalgia fugax is discussed and the possible mechanism of action of clonidine in this condition is outlined. Further trials of clonidine appear to be worthwhile for this condition which has been described as incurable. PMID:3666555

  15. Aboveground predation by an American badger (Taxidea taxus) on black-tailed prairie dogs (Cynomys ludovicianus)

    USGS Publications Warehouse

    Eads, D.A.; Biggins, D.E.

    2008-01-01

    During research on black-tailed prairie dogs (Cynomys ludovicianus), we repeatedly observed a female American badger (Taxidea taxus) hunting prairie dogs on a colony in southern Phillips County, Montana. During 1-14 June 2006, we observed 7 aboveground attacks (2 successful) and 3 successful excavations of prairie dogs. The locations and circumstances of aboveground attacks suggested that the badger improved her probability of capturing prairie dogs by planning the aboveground attacks based on perceptions of speeds, angles, distances, and predicted escape responses of prey. Our observations add to previous reports on the complex and varied predatory methods and cognitive capacities of badgers. These observations also underscore the individuality of predators and support the concept that predators are active participants in predator-prey interactions.

  16. Application of stochastic discrete event system framework for detection of induced low rate TCP attack.

    PubMed

    Barbhuiya, F A; Agarwal, Mayank; Purwar, Sanketh; Biswas, Santosh; Nandi, Sukumar

    2015-09-01

    TCP is the most widely accepted transport layer protocol. The major emphasis during the development of TCP was its functionality and efficiency. However, not much consideration was given on studying the possibility of attackers exploiting the protocol, which has lead to several attacks on TCP. This paper deals with the induced low rate TCP attack. Since the attack is relatively new, only a few schemes have been proposed to mitigate it. However, the main issues with these schemes are scalability, change in TCP header, lack of formal frameworks, etc. In this paper, we have adapted the stochastic DES framework for detecting the attack, which addresses most of these issues. We have successfully deployed and tested the proposed DES based IDS on a test bed. Copyright © 2015 ISA. Published by Elsevier Ltd. All rights reserved.

  17. Network overload due to massive attacks

    NASA Astrophysics Data System (ADS)

    Kornbluth, Yosef; Barach, Gilad; Tuchman, Yaakov; Kadish, Benjamin; Cwilich, Gabriel; Buldyrev, Sergey V.

    2018-05-01

    We study the cascading failure of networks due to overload, using the betweenness centrality of a node as the measure of its load following the Motter and Lai model. We study the fraction of survived nodes at the end of the cascade pf as a function of the strength of the initial attack, measured by the fraction of nodes p that survive the initial attack for different values of tolerance α in random regular and Erdös-Renyi graphs. We find the existence of a first-order phase-transition line pt(α ) on a p -α plane, such that if p pt , pf is large and the giant component of the network is still present. Exactly at pt, the function pf(p ) undergoes a first-order discontinuity. We find that the line pt(α ) ends at a critical point (pc,αc) , in which the cascading failures are replaced by a second-order percolation transition. We find analytically the average betweenness of nodes with different degrees before and after the initial attack, we investigate their roles in the cascading failures, and we find a lower bound for pt(α ) . We also study the difference between localized and random attacks.

  18. Chess therapy: A new approach to curing panic attack.

    PubMed

    Barzegar, Kazem; Barzegar, Somayeh

    2017-12-01

    To study the effect of playing cell phone chess game on treating panic attack. The chess game on an android cell phone was played by the researcher who was affected by panic attack as a post-traumatic disorder immediately after or before feeling of the start of symptoms. The right level of difficulty, i.e., levels 2-4, was selected for optimal results. Playing chess game on the android cell phone prevented the manifestation of panic attack and led to the cure of this traumatic condition. Chess therapy with the right level of difficulty can be recommended as a very effective non-pharmaceutical method for the successful treatment of panic attacks. Copyright © 2017 Elsevier B.V. All rights reserved.

  19. Sleep Quantity and Quality of Ontario Wildland Firefighters Across a Low-Hazard Fire Season

    PubMed Central

    McGillis, Zachary; Dorman, Sandra C.; Robertson, Ayden; Larivière, Michel; Leduc, Caleb; Eger, Tammy; Oddson, Bruce E.; Larivière, Céline

    2017-01-01

    Objective: The aim of the study was to assess the sleep quality, quantity, and fatigue levels of Canadian wildland firefighters while on deployment. Methods: Objective and subjective sleep and fatigue measures were collected using actigraphy and questionnaires during non-fire (Base) and fire (Initial Attack and Project) deployments. Results: Suboptimal sleep quality and quantity were more frequently observed during high-intensity, Initial Attack fire deployments. Suboptimal sleep was also exhibited during non-fire (Base) work periods, which increases the risk of prefire deployment sleep debt. Self-reported, morning fatigue scores were low-to-moderate and highest for Initial Attack fire deployments. Conclusions: The study highlights the incidence of suboptimal sleep patterns in wildland firefighters during non-fire and fire suppression work periods. These results have implications for the health and safety practices of firefighters given the link between sleep and fatigue, in a characteristically hazardous occupation. PMID:29216017

  20. Forcing attacks of western pine beetles to test resistance of pines

    Treesearch

    Richard H. Smith

    1967-01-01

    Success--defined as oviposition or tree-killing--was obtained by attracting western pine beetles to groups of pines with natural attractants and by en-massed forced attacks on individual trees combined with either physical or biological stress. Preliminary results show considerable agreement with laboratory tests of vapor toxicity.

  1. Behavioral Treatment of Mucous Colitis

    ERIC Educational Resources Information Center

    Youell, Katherine J.; McCullough, James P.

    1975-01-01

    A 22-year-old female graduate student who suffered colitis attacks at the onset of therapy was apparently successfully treated by a procedure in which the therapist labeled antecedent stress events that appeared to be precipitating the attacks. The client was then taught a behavioral coping strategy to counter the stress events. (Author)

  2. Designing, Implementing, and Evaluating Secure Web Browsers

    ERIC Educational Resources Information Center

    Grier, Christopher L.

    2009-01-01

    Web browsers are plagued with vulnerabilities, providing hackers with easy access to computer systems using browser-based attacks. Efforts that retrofit existing browsers have had limited success since modern browsers are not designed to withstand attack. To enable more secure web browsing, we design and implement new web browsers from the ground…

  3. Breakthrough attacks in patients with hereditary angioedema receiving long-term prophylaxis are responsive to icatibant: findings from the Icatibant Outcome Survey.

    PubMed

    Aberer, Werner; Maurer, Marcus; Bouillet, Laurence; Zanichelli, Andrea; Caballero, Teresa; Longhurst, Hilary J; Perrin, Amandine; Andresen, Irmgard

    2017-01-01

    Patients with hereditary angioedema (HAE) due to C1-inhibitor deficiency (C1-INH-HAE) experience recurrent attacks of cutaneous or submucosal edema that may be frequent and severe; prophylactic treatments can be prescribed to prevent attacks. However, despite the use of long-term prophylaxis (LTP), breakthrough attacks are known to occur. We used data from the Icatibant Outcome Survey (IOS) to evaluate the characteristics of breakthrough attacks and the effectiveness of icatibant as a treatment option. Data on LTP use, attacks, and treatments were recorded. Attack characteristics, treatment characteristics, and outcomes (time to treatment, time to resolution, and duration of attack) were compared for attacks that occurred with versus without LTP. Data on 3228 icatibant-treated attacks from 448 patients with C1-INH-HAE were analyzed; 30.1% of attacks occurred while patients were using LTP. Attack rate, attack severity, and the distribution of attack sites were similar across all types of LTP used, and were comparable to the results found in patients who did not receive LTP. Attacks were successfully treated with icatibant; 82.5% of all breakthrough attacks were treated with a single icatibant injection without C1-INH rescue medication. Treatment outcomes were comparable for breakthrough attacks across all LTP types, and for attacks without LTP. Patients who use LTP should be aware that breakthrough attacks can occur, and such attacks can be severe. Thus, patients with C1-INH-HAE using LTP should have emergency treatment readily available. Data from IOS show that icatibant is effective for the treatment of breakthrough attacks. Trial Registration NCT01034969.

  4. Flow Structure along the 1303 UCAV

    NASA Astrophysics Data System (ADS)

    Kosoglu, Mehmet A.; Rockwell, Donald

    2007-11-01

    The 1303 Unmanned Combat Air Vehicle is representative of a variety of UCAVs with blended wing-body configurations. Flow structure along a scale model of this configuration was investigated using dye visualization and particle image velocimetry for variations of Reynolds number and angle-of-attack. Both of these parameters substantially influence onset and structure of the leading-edge vortex (LEV) and a separation bubble/stall region along the tip. The onset of formation of the LEV initially occurs at a location well downstream of the apex and moves upstream for increasing values of either Reynolds number or angle-of-attack. In cases where a separation bubble or stall region exists, quantitative information on its structure was obtained via PIV imaging on a plane nearly parallel to the surface of the wing. By acquiring images on planes at successively larger elevations from the surface, it was possible to gain insight into the space-time features of the three-dimensional and highly time-dependent structure of the bubble or stall region. Time-averaged images indicate that maximum velocity defect decreases in magnitude and moves downstream with increasing elevation from the surface.

  5. An attack of the plant parasite Cuscuta reflexa induces the expression of attAGP, an attachment protein of the host tomato.

    PubMed

    Albert, Markus; Belastegui-Macadam, Xana; Kaldenhoff, Ralf

    2006-11-01

    Dodder or Cuscutaceae are holoparasitic plants subsisting on other dicotyledonous plants. The infection process is initiated by adherence of Cuscuta prehaustoria to the host surface, followed by penetration attempts by hyphae. In the case of a successful infection, these organs connect the parasite's vascular tissue to that of the host. Here we show that contact of Cuscuta reflexa prehaustoria to tomato induces the expression of a new arabinogalactan protein (AGP), attAGP, in the tomato precisely at the site of dodder attack. We show that attAGP is a plasma membrane-bound cell wall-localized protein. Using the RNAi technique and attAGP-targeted virus-induced gene silencing, we observed a correlation between attAGP expression level and force of attachment of the parasite to host tomatoes. If the expression level of attAGP was reduced, the C. reflexa attachment capability was significantly reduced, too. We conclude that C. reflexa infection induced a signal in the host leading to expression of tomato attAGP, which promotes the parasite's adherence.

  6. Design of Bi-Directional Hydrofoils for Tidal Current Turbines

    NASA Astrophysics Data System (ADS)

    Nedyalkov, Ivaylo; Wosnik, Martin

    2015-11-01

    Tidal Current Turbines operate in flows which reverse direction. Bi-directional hydrofoils have rotational symmetry and allow such turbines to operate without the need for pitch or yaw control, decreasing the initial and maintenance costs. A numerical test-bed was developed to automate the simulations of hydrofoils in OpenFOAM and was utilized to simulate the flow over eleven classes of hydrofoils comprising a total of 700 foil shapes at different angles of attack. For promising candidate foil shapes physical models of 75 mm chord and 150 mm span were fabricated and tested in the University of New Hampshire High-Speed Cavitation Tunnel (HiCaT). The experimental results were compared to the simulations for model validation. The numerical test-bed successfully generated simulations for a wide range of foil shapes, although, as expected, the k - ω - SST turbulence model employed here was not adequate for some of the foils and for large angles of attack at which separation occurred. An optimization algorithm is currently being coupled with the numerical test-bed and additional turbulence models will be implemented in the future.

  7. Physical-enhanced secure strategy in an OFDM-PON.

    PubMed

    Zhang, Lijia; Xin, Xiangjun; Liu, Bo; Yu, Jianjun

    2012-01-30

    The physical layer of optical access network is vulnerable to various attacks. As the dramatic increase of users and network capacity, the issue of physical-layer security becomes more and more important. This paper proposes a physical-enhanced secure strategy for orthogonal frequency division multiplexing passive optical network (OFDM-PON) by employing frequency domain chaos scrambling. The Logistic map is adopted for the chaos mapping. The chaos scrambling strategy can dynamically allocate the scrambling matrices for different OFDM frames according to the initial condition, which enhance the confidentiality of the physical layer. A mathematical model of this secure system is derived firstly, which achieves a secure transmission at physical layer in OFDM-PON. The results from experimental implementation using Logistic mapped chaos scrambling are also given to further demonstrate the efficiency of this secure strategy. An 10.125 Gb/s 64QAM-OFDM data with Logistic mapped chaos scrambling are successfully transmitted over 25-km single mode fiber (SMF), and the experimental results show that proposed security scheme can protect the system from eavesdropper and attacker, while keep a good performance for the legal ONU.

  8. Posttraumatic stress disorder, alcohol use, and perceived safety after the terrorist attack on the pentagon.

    PubMed

    Grieger, Thomas A; Fullerton, Carol S; Ursano, Robert J

    2003-10-01

    The authors examined posttraumatic stress disorder (PTSD), alcohol use, and perceptions of safety in a sample of survivors of the September 11, 2001, terrorist attack on the Pentagon. Analyses were conducted to examine the effect of past traumatic experience, trauma exposure, initial emotional response, and peritraumatic dissociation on probable PTSD, substance use, and perceived safety among 77 survivors seven months after the attack. Eleven respondents (14 percent) had PTSD. Those with PTSD reported higher levels of initial emotional response and peritraumatic dissociation. Ten respondents (13 percent) reported increased use of alcohol. Women were more than five times as likely as men to have PTSD and almost seven times as likely to report increased use of alcohol. Persons with higher peritraumatic dissociation were more likely to develop PTSD and report increased alcohol use. Those with lower perceived safety at seven months had higher initial emotional response and greater peritraumatic dissociation and were more likely to have PTSD, to have increased alcohol use, and to be female. The association of perceived safety with gender, the presence of PTSD, and increased alcohol use among survivors of the terrorist attack on the Pentagon warrants further study.

  9. Automated Software Vulnerability Analysis

    NASA Astrophysics Data System (ADS)

    Sezer, Emre C.; Kil, Chongkyung; Ning, Peng

    Despite decades of research, software continues to have vulnerabilities. Successful exploitations of these vulnerabilities by attackers cost millions of dollars to businesses and individuals. Unfortunately, most effective defensive measures, such as patching and intrusion prevention systems, require an intimate knowledge of the vulnerabilities. Many systems for detecting attacks have been proposed. However, the analysis of the exploited vulnerabilities is left to security experts and programmers. Both the human effortinvolved and the slow analysis process are unfavorable for timely defensive measure to be deployed. The problem is exacerbated by zero-day attacks.

  10. Successful attack on permutation-parity-machine-based neural cryptography.

    PubMed

    Seoane, Luís F; Ruttor, Andreas

    2012-02-01

    An algorithm is presented which implements a probabilistic attack on the key-exchange protocol based on permutation parity machines. Instead of imitating the synchronization of the communicating partners, the strategy consists of a Monte Carlo method to sample the space of possible weights during inner rounds and an analytic approach to convey the extracted information from one outer round to the next one. The results show that the protocol under attack fails to synchronize faster than an eavesdropper using this algorithm.

  11. Biometrics based authentication scheme for session initiation protocol.

    PubMed

    Xie, Qi; Tang, Zhixiong

    2016-01-01

    Many two-factor challenge-response based session initiation protocol (SIP) has been proposed, but most of them are vulnerable to smart card stolen attacks and password guessing attacks. In this paper, we propose a novel three-factor SIP authentication scheme using biometrics, password and smart card, and utilize the pi calculus-based formal verification tool ProVerif to prove that the proposed protocol achieves security and authentication. Furthermore, our protocol is highly efficient when compared to other related protocols.

  12. Understanding the dynamics of terrorism events with multiple-discipline datasets and machine learning approach

    PubMed Central

    Ding, Fangyu; Ge, Quansheng; Fu, Jingying; Hao, Mengmeng

    2017-01-01

    Terror events can cause profound consequences for the whole society. Finding out the regularity of terrorist attacks has important meaning for the global counter-terrorism strategy. In the present study, we demonstrate a novel method using relatively popular and robust machine learning methods to simulate the risk of terrorist attacks at a global scale based on multiple resources, long time series and globally distributed datasets. Historical data from 1970 to 2015 was adopted to train and evaluate machine learning models. The model performed fairly well in predicting the places where terror events might occur in 2015, with a success rate of 96.6%. Moreover, it is noteworthy that the model with optimized tuning parameter values successfully predicted 2,037 terrorism event locations where a terrorist attack had never happened before. PMID:28591138

  13. Understanding the dynamics of terrorism events with multiple-discipline datasets and machine learning approach.

    PubMed

    Ding, Fangyu; Ge, Quansheng; Jiang, Dong; Fu, Jingying; Hao, Mengmeng

    2017-01-01

    Terror events can cause profound consequences for the whole society. Finding out the regularity of terrorist attacks has important meaning for the global counter-terrorism strategy. In the present study, we demonstrate a novel method using relatively popular and robust machine learning methods to simulate the risk of terrorist attacks at a global scale based on multiple resources, long time series and globally distributed datasets. Historical data from 1970 to 2015 was adopted to train and evaluate machine learning models. The model performed fairly well in predicting the places where terror events might occur in 2015, with a success rate of 96.6%. Moreover, it is noteworthy that the model with optimized tuning parameter values successfully predicted 2,037 terrorism event locations where a terrorist attack had never happened before.

  14. The use of new facility by means internal balance with sting support for wide range Angle of Attack aircraft

    NASA Astrophysics Data System (ADS)

    Subagyo; Daryanto, Yanto; Risnawan, Novan

    2018-04-01

    The development of facilities for the testing of wide range angle of attack aircraft in the wind tunnel at subsonic regime has done and implemented. Development required to meet the test at an angle of attack from -20 ° to 40 °. Testing the wide range angle of attack aircraft with a wide variation of the angle of attack become important needs. This can be done simply by using the sting support-equipped by internal balance to measure the forces and moments component aerodynamics. The results of development and use on the wide range angle of attack aircraft testing are aerodynamics characteristics in the form of the coefficient three components forces and the three components of the moment. A series of test aircraft was successfully carried out and the results are shown in the form of graphs of characteristic of aerodynamics at wind speed 70 m/s.

  15. Correlates of nest-defense behavior of common terns

    USGS Publications Warehouse

    Erwin, R.M.

    1988-01-01

    Nest-defense behavior was studied at seven Common Tern (Sterna hirundo) colonies in southern coastal New Jersey during June and July 1981. Data were collected weekly on numbers of adults, nests, eggs, and young in relation to the frequency and intensity of dive attacks on a human intruder by nesting terns. I explored the relationships between attack behavior and colony size/density, seasonality, and brood survival. The results provide little support for social facilitation since neither colony size (range 30-250 nests) nor density was related to mean attack frequency; however, in larger colonies, fewer birds participated in dive attacks. Although the intensity of attacks was strongly seasonal, patterns were very different among colonies and peak attack rates did not always coincide with peak hatching periods. Defense levels declined late in the season in most colonies regardless of whether brood survival was high or low. Colonies with individuals that attacked early in the season had higher overall nesting success than in colonies where individuals showed little early season aggression.

  16. Wolf Attack Probability: A Theoretical Security Measure in Biometric Authentication Systems

    NASA Astrophysics Data System (ADS)

    Une, Masashi; Otsuka, Akira; Imai, Hideki

    This paper will propose a wolf attack probability (WAP) as a new measure for evaluating security of biometric authentication systems. The wolf attack is an attempt to impersonate a victim by feeding “wolves” into the system to be attacked. The “wolf” means an input value which can be falsely accepted as a match with multiple templates. WAP is defined as a maximum success probability of the wolf attack with one wolf sample. In this paper, we give a rigorous definition of the new security measure which gives strength estimation of an individual biometric authentication system against impersonation attacks. We show that if one reestimates using our WAP measure, a typical fingerprint algorithm turns out to be much weaker than theoretically estimated by Ratha et al. Moreover, we apply the wolf attack to a finger-vein-pattern based algorithm. Surprisingly, we show that there exists an extremely strong wolf which falsely matches all templates for any threshold value.

  17. A study of roll attractor and wing rock of delta wings at high angles of attack

    NASA Technical Reports Server (NTRS)

    Niranjana, T.; Rao, D. M.; Pamadi, Bandu N.

    1993-01-01

    Wing rock is a high angle of attack dynamic phenomenon of limited cycle motion predominantly in roll. The wing rock is one of the limitations to combat effectiveness of the fighter aircraft. Roll Attractor is the steady state or equilibrium trim angle (phi(sub trim)) attained by the free-to-roll model, held at some angle of attack, and released form rest at a given initial roll (bank) angle (phi(sub O)). Multiple roll attractors are attained at different trim angles depending on initial roll angle. The test facility (Vigyan's low speed wind tunnel) and experimental work is presented here along with mathematical modelling of roll attractor phenomenon and analysis and comparison of predictions with experimental data.

  18. Applying the Scientific Method of Cybersecurity Research

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Tardiff, Mark F.; Bonheyo, George T.; Cort, Katherine A.

    The cyber environment has rapidly evolved from a curiosity to an essential component of the contemporary world. As the cyber environment has expanded and become more complex, so have the nature of adversaries and styles of attacks. Today, cyber incidents are an expected part of life. As a result, cybersecurity research emerged to address adversarial attacks interfering with or preventing normal cyber activities. Historical response to cybersecurity attacks is heavily skewed to tactical responses with an emphasis on rapid recovery. While threat mitigation is important and can be time critical, a knowledge gap exists with respect to developing the sciencemore » of cybersecurity. Such a science will enable the development and testing of theories that lead to understanding the broad sweep of cyber threats and the ability to assess trade-offs in sustaining network missions while mitigating attacks. The Asymmetric Resilient Cybersecurity Initiative at Pacific Northwest National Laboratory is a multi-year, multi-million dollar investment to develop approaches for shifting the advantage to the defender and sustaining the operability of systems under attack. The initiative established a Science Council to focus attention on the research process for cybersecurity. The Council shares science practices, critiques research plans, and aids in documenting and reporting reproducible research results. The Council members represent ecology, economics, statistics, physics, computational chemistry, microbiology and genetics, and geochemistry. This paper reports the initial work of the Science Council to implement the scientific method in cybersecurity research. The second section describes the scientific method. The third section in this paper discusses scientific practices for cybersecurity research. Section four describes initial impacts of applying the science practices to cybersecurity research.« less

  19. Animal-Borne Imaging Reveals Novel Insights into the Foraging Behaviors and Diel Activity of a Large-Bodied Apex Predator, the American Alligator (Alligator mississippiensis)

    PubMed Central

    Nifong, James C.; Nifong, Rachel L.; Silliman, Brian R.; Lowers, Russell H.; Guillette, Louis J.; Ferguson, Jake M.; Welsh, Matthew; Abernathy, Kyler; Marshall, Greg

    2014-01-01

    Large-bodied, top- and apex predators (e.g., crocodilians, sharks, wolves, killer whales) can exert strong top-down effects within ecological communities through their interactions with prey. Due to inherent difficulties while studying the behavior of these often dangerous predatory species, relatively little is known regarding their feeding behaviors and activity patterns, information that is essential to understanding their role in regulating food web dynamics and ecological processes. Here we use animal-borne imaging systems (Crittercam) to study the foraging behavior and activity patterns of a cryptic, large-bodied predator, the American alligator (Alligator mississippiensis) in two estuaries of coastal Florida, USA. Using retrieved video data we examine the variation in foraging behaviors and activity patterns due to abiotic factors. We found the frequency of prey-attacks (mean = 0.49 prey attacks/hour) as well as the probability of prey-capture success (mean = 0.52 per attack) were significantly affected by time of day. Alligators attempted to capture prey most frequently during the night. Probability of prey-capture success per attack was highest during morning hours and sequentially lower during day, night, and sunset, respectively. Position in the water column also significantly affected prey-capture success, as individuals’ experienced two-fold greater success when attacking prey while submerged. These estimates are the first for wild adult American alligators and one of the few examples for any crocodilian species worldwide. More broadly, these results reveal that our understandings of crocodilian foraging behaviors are biased due to previous studies containing limited observations of cryptic and nocturnal foraging interactions. Our results can be used to inform greater understanding regarding the top-down effects of American alligators in estuarine food webs. Additionally, our results highlight the importance and power of using animal-borne imaging when studying the behavior of elusive large-bodied, apex predators, as it provides critical insights into their trophic and behavioral interactions. PMID:24454711

  20. Animal-borne imaging reveals novel insights into the foraging behaviors and Diel activity of a large-bodied apex predator, the American alligator (Alligator mississippiensis).

    PubMed

    Nifong, James C; Nifong, Rachel L; Silliman, Brian R; Lowers, Russell H; Guillette, Louis J; Ferguson, Jake M; Welsh, Matthew; Abernathy, Kyler; Marshall, Greg

    2014-01-01

    Large-bodied, top- and apex predators (e.g., crocodilians, sharks, wolves, killer whales) can exert strong top-down effects within ecological communities through their interactions with prey. Due to inherent difficulties while studying the behavior of these often dangerous predatory species, relatively little is known regarding their feeding behaviors and activity patterns, information that is essential to understanding their role in regulating food web dynamics and ecological processes. Here we use animal-borne imaging systems (Crittercam) to study the foraging behavior and activity patterns of a cryptic, large-bodied predator, the American alligator (Alligator mississippiensis) in two estuaries of coastal Florida, USA. Using retrieved video data we examine the variation in foraging behaviors and activity patterns due to abiotic factors. We found the frequency of prey-attacks (mean = 0.49 prey attacks/hour) as well as the probability of prey-capture success (mean = 0.52 per attack) were significantly affected by time of day. Alligators attempted to capture prey most frequently during the night. Probability of prey-capture success per attack was highest during morning hours and sequentially lower during day, night, and sunset, respectively. Position in the water column also significantly affected prey-capture success, as individuals' experienced two-fold greater success when attacking prey while submerged. These estimates are the first for wild adult American alligators and one of the few examples for any crocodilian species worldwide. More broadly, these results reveal that our understandings of crocodilian foraging behaviors are biased due to previous studies containing limited observations of cryptic and nocturnal foraging interactions. Our results can be used to inform greater understanding regarding the top-down effects of American alligators in estuarine food webs. Additionally, our results highlight the importance and power of using animal-borne imaging when studying the behavior of elusive large-bodied, apex predators, as it provides critical insights into their trophic and behavioral interactions.

  1. Lightning Strike Simula tion for Studying Southern Pine Bark and Engraver Beetle Attacks

    Treesearch

    Mitchel C. Miller

    1983-01-01

    Endemic populations of the southern pine beetle (Dendroctonus frontalis Zimm.) and Ips spp. attacked loblolly pines (Pinus taeda L.) on which lightning strikes were simulated with detonating cord in the field. Southern pine beetles were reared in successive generations in these trees from fall 1981 through spring 1982; only

  2. Countermeasure against blinding attacks on low-noise detectors with a background-noise-cancellation scheme

    NASA Astrophysics Data System (ADS)

    Lee, Min Soo; Park, Byung Kwon; Woo, Min Ki; Park, Chang Hoon; Kim, Yong-Su; Han, Sang-Wook; Moon, Sung

    2016-12-01

    We developed a countermeasure against blinding attacks on low-noise detectors with a background-noise-cancellation scheme in quantum key distribution (QKD) systems. Background-noise cancellation includes self-differencing and balanced avalanche photon diode (APD) schemes and is considered a promising solution for low-noise APDs, which are critical components in high-performance QKD systems. However, its vulnerability to blinding attacks has been recently reported. In this work, we propose a countermeasure that prevents this potential security loophole from being used in detector blinding attacks. An experimental QKD setup is implemented and various tests are conducted to verify the feasibility and performance of the proposed method. The obtained measurement results show that the proposed scheme successfully detects occurring blinding-attack-based hacking attempts.

  3. Random Visitor: Defense against Identity Attacks in P2P Networks

    NASA Astrophysics Data System (ADS)

    Gu, Jabeom; Nah, Jaehoon; Kwon, Hyeokchan; Jang, Jonsoo; Park, Sehyun

    Various advantages of cooperative peer-to-peer networks are strongly counterbalanced by the open nature of a distributed, serverless network. In such networks, it is relatively easy for an attacker to launch various attacks such as misrouting, corrupting, or dropping messages as a result of a successful identifier forgery. The impact of an identifier forgery is particularly severe because the whole network can be compromised by attacks such as Sybil or Eclipse. In this paper, we present an identifier authentication mechanism called random visitor, which uses one or more randomly selected peers as delegates of identity proof. Our scheme uses identity-based cryptography and identity ownership proof mechanisms collectively to create multiple, cryptographically protected indirect bindings between two peers, instantly when needed, through the delegates. Because of these bindings, an attacker cannot achieve an identifier forgery related attack against interacting peers without breaking the bindings. Therefore, our mechanism limits the possibility of identifier forgery attacks efficiently by disabling an attacker's ability to break the binding. The design rationale and framework details are presented. A security analysis shows that our scheme is strong enough against identifier related attacks and that the strength increases if there are many peers (more than several thousand) in the network.

  4. Factors affecting aggressive behaviour of spawning migratory males towards mature male parr in masu salmon Oncorhynchus masou.

    PubMed

    Watanabe, M; Maekawa, K

    2010-07-01

    This study examined whether dominant migratory males (adopting fighter tactics) of the masu salmon Oncorhynchus masou would more aggressively attack large mature male parr (adopting sneaker tactics) as large mature male parr are expected to have the potential to cause a greater decrease in fertilization success. The frequency of aggressive behaviour was not related to the body size of males, and it increased with the frequency of interactions with mature male parr. The fertilization success of mature male parr was much lower than migratory males, and no relationship was observed between fertilization success and aggressive behaviour. The low fertilization success of mature male parr, despite infrequent aggressive behaviour by migratory males, indicates that there might be little benefit for migratory males to attack mature male parr more aggressively according to their body size.

  5. Skills Associated with Line Breaks in Elite Rugby Union

    PubMed Central

    den Hollander, Steve; Brown, James; Lambert, Michael; Treu, Paul; Hendricks, Sharief

    2016-01-01

    The ability of the attacking team to break through the defensive line is a key indicator of success as it creates opportunities to score tries. The aim of this study was to analyse line breaks and identify the associated skills and playing characteristics. The 2013 Super Rugby season (125 games) was analysed, in which 362 line breaks were identified and coded using variables that assessed team patterns and non-contact attacking skills in the phases preceding the line break. There was an average of 3 line breaks per game, with 39% of line breaks resulting in a try. Line breaks occurred when the ball-carrier was running fast [61%, x2(4) = 25.784, p = 0.000, Cramer’s v = 0.1922, weak]. At a moderate distance, short lateral passes (19%) and skip passes (15%) attributed to the highest percentage of line breaks [x2(26) = 50.899, p = 0.036, Cramer’s v = 0.2484, moderate]. Faster defensive line speeds resulted in more line breaks [x2(12) = 61.703, p < 0.001, Cramer’s v = 0.3026, moderate]. Line breaks are associated with overall team success and try scoring opportunities. Awareness of the defenders line speed and depth, fast running speed when receiving the ball and quick passing between attackers to the outside backs creates line break opportunities. During training, coaches should emphasise the movement speed of the ball between attackers and manipulate the speed and distance of the defenders. Key points Line breaks are associated with overall team success and try scoring opportunities. Awareness of the defenders line speed and depth, fast running speed when receiving the ball and quick passing between attackers to the outside backs creates line break opportunities During training, coaches should emphasise the movement speed of the ball between attackers and manipulate the speed and distance of the defenders. PMID:27803629

  6. 'Heart attack' symptoms and decision-making: the case of older rural women.

    PubMed

    Jackson, M N G; McCulloch, B J

    2014-01-01

    Women are just as vulnerable to 'heart attacks' (used throughout this study to mean 'myocardial infarction') as men and are often unaware of many associated symptoms. Researchers have illustrated that women have difficulty identifying the symptoms of cardiovascular disease, with patients often delaying treatment after the onset of symptoms. Some individuals wait hours or even days before seeking medical care. This is particularly concerning for older rural women because the rates of death from cardiovascular disease and cancer are higher in some rural areas. Despite idealistic views of country life as being active, less stressful, and possessing strong social and community support, rural Americans are more likely than their urban counterparts to face challenges to maintaining health.
    The purpose of this paper is to utilize information gathered from a qualitative study exploring older rural women's identification of symptoms and health decision-making specific to heart attack vignettes. Snowball sampling was the main approach utilized to access participants; after an initial contact was successful, participants contacted additional older rural women to see if they might be willing to participate in an interview. This resulted in a final sample of 33 women who resided in rural Midwestern areas of the USA, were 65 years or older, lived in a county defined as rural by the US Census, and were willing to participate in a face-to-face interview. Each interview included a demographic questionnaire, a health questionnaire, and three health vignettes with follow-up questions. Vignettes provided a way of initiating discussions about health decisions without invading the privacy known to be important to rural residents. The term 'heart attack' was used in the interviews because it was thought to be better recognised than the medical term 'myocardial infarction'. All data were audio taped, transcribed, and coded using line-by-line coding. Data were analyzed using content analysis. The study showed that women had difficulty identifying heart attack symptoms when they did not have previous exposure to the symptoms either through personal experience or educational programs. Individuals incorrectly identified symptoms of a heart attack by associating symptoms with sleep problems, stroke, arthritis, stiffness in the neck, influenza, nerve damage, osteoporosis, bone cancer, tooth infection, and a pulled muscle. Misdiagnosis of symptoms most often led to a delay in seeking treatment in these women. Additionally, the women in this study discussed a reluctance to access care because of concerns related to maintaining their privacy, belief that the ambulance would take too long to reach them, and they did not want to bother their relatives for help. The findings of this study suggest implications for educational programs and interventions in rural environments and provide information that can facilitate better-informed communication between healthcare professionals and rural women.

  7. Do ICBMs Have a Future

    DTIC Science & Technology

    2015-06-01

    21st century signaled the beginning of a cultural shift towards stopping terror organizations. The initial problem was how to stop the attacks from...hardly deter militias such as the Taliban, or terrorists such as those who attacked New York, Washington, London, Madrid, and Mumbai in recent

  8. An Exploration of Hypotheses that Explain Herbivore and Pathogen Attack in Restored Plant Communities

    PubMed Central

    Blaisdell, G. Kai; Roy, Bitty A.; Pfeifer-Meister, Laurel; Bridgham, Scott D.

    2015-01-01

    Many hypotheses address the associations of plant community composition with natural enemies, including: (i) plant species diversity may reduce enemy attack, (ii) attack may increase as host abundance increases, (iii) enemy spillover may lead to increased attack on one host species due to transmission from another host species, or enemy dilution may lead to reduced attack on a host that would otherwise have more attack, (iv) physical characteristics of the plant community may influence attack, and (v) plant vigor may affect attack. Restoration experiments with replicated plant communities provide an exceptional opportunity to explore these hypotheses. To explore the relative predictive strengths of these related hypotheses and to investigate the potential effect of several restoration site preparation techniques, we surveyed arthropod herbivore and fungal pathogen attack on the six most common native plant species in a restoration experiment. Multi-model inference revealed a weak but consistent negative correlation with pathogen attack and host diversity across the plant community, and no correlation between herbivory and host diversity. Our analyses also revealed host species-specific relationships between attack and abundance of the target host species, other native plant species, introduced plant species, and physical community characteristics. We found no relationship between enemy attack and plant vigor. We found minimal differences in plant community composition among several diverse site preparation techniques, and limited effects of site preparation techniques on attack. The strongest associations of community characteristics with attack varied among plant species with no community-wide patterns, suggesting that no single hypothesis successfully predicts the dominant community-wide trends in enemy attack. PMID:25699672

  9. Fabricating niobium test loops for the SP-100 space reactor

    NASA Technical Reports Server (NTRS)

    Bryhan, Anthony J.; Chan, Ricky C.

    1993-01-01

    This article describes the successful fabrication, operation, and evaluation of a series of niobium-alloy (Nb-1 Zr and PWC-11) thermal convection loops designed to contain and circulate molten lithium at 1,350 K. These loops were used to establish the fabrication variables of significance for a nuclear power supply for space. Approximately 200 weldments were evaluated for their tendency to be attacked by lithium as a function of varying atmospheric contamination. No attack occurred for any weldment free of contamination, with or without heat treatment, and no welds accidentally deviated from purity. The threshold oxygen content for weldment attack was determined to be 170-200 ppm. Attack varied directly with weldment oxygen and nitrogen contents.

  10. Efficacy of "Verbenone Plus" for protecting ponderosa pine trees and stands from Dendroctonus brevicomis (Coleoptera: Curculionidae) attack in British Columbia and California.

    PubMed

    Fettig, Christopher J; McKelvey, Stephen R; Dabney, Christopher P; Huber, Dezene P W; Lait, Cameron G; Fowler, Donald L; Borden, John H

    2012-10-01

    The western pine beetle, Dendroctonus brevicomis LeConte (Coleoptera: Curculionidae, Scolytinae), is a major cause of ponderosa pine, Pinus ponderosa Douglas ex Lawson, mortality in much of western North America. We review several years of research that led to the identification of Verbenone Plus, a novel four-component semiochemcial blend [acetophenone, (E)-2-hexen-1-ol + (Z)-2-hexen-1-ol, and (-)-verbenone] that inhibits the response of D. brevicomis to attractant-baited traps, and examine the efficacy of Verbenone Plus for protecting individual trees and forest stands from D. brevicomis infestations in British Columbia and California. In all experiments, semiochemicals were stapled around the bole of treated trees at approximately equal to 2 m in height. (-)-Verbenone alone had no effect on the density of total attacks and successful attacks by D. brevicomis on attractant-baited P. ponderosa, but significantly increased the percentage of pitchouts (unsuccessful D. brevicomis attacks). Verbenone Plus significantly reduced the density of D. brevicomis total attacks and D. brevicomis successful attacks on individual trees. A significantly higher percentage of pitchouts occurred on Verbenone Plus-treated trees. The application of Verbenone Plus to attractant-baited P. ponderosa significantly reduced levels of tree mortality. In stand protection studies, Verbenone Plus significantly reduced the percentage of trees mass attacked by D. brevicomis in one study, but in a second study no significant treatment effect was observed. Future research should concentrate on determining optimal release rates and spacings of release devices in stand protection studies, and expansion of Verbenone Plus into other systems where verbenone alone has not provided adequate levels of tree protection.

  11. Chemical facility vulnerability assessment project.

    PubMed

    Jaeger, Calvin D

    2003-11-14

    Sandia National Laboratories, under the direction of the Office of Science and Technology, National Institute of Justice, conducted the chemical facility vulnerability assessment (CFVA) project. The primary objective of this project was to develop, test and validate a vulnerability assessment methodology (VAM) for determining the security of chemical facilities against terrorist or criminal attacks (VAM-CF). The project also included a report to the Department of Justice for Congress that in addition to describing the VAM-CF also addressed general observations related to security practices, threats and risks at chemical facilities and chemical transport. In the development of the VAM-CF Sandia leveraged the experience gained from the use and development of VAs in other areas and the input from the chemical industry and Federal agencies. The VAM-CF is a systematic, risk-based approach where risk is a function of the severity of consequences of an undesired event, the attack potential, and the likelihood of adversary success in causing the undesired event. For the purpose of the VAM-CF analyses Risk is a function of S, L(A), and L(AS), where S is the severity of consequence of an event, L(A) is the attack potential and L(AS) likelihood of adversary success in causing a catastrophic event. The VAM-CF consists of 13 basic steps. It involves an initial screening step, which helps to identify and prioritize facilities for further analysis. This step is similar to the prioritization approach developed by the American Chemistry Council (ACC). Other steps help to determine the components of the risk equation and ultimately the risk. The VAM-CF process involves identifying the hazardous chemicals and processes at a chemical facility. It helps chemical facilities to focus their attention on the most critical areas. The VAM-CF is not a quantitative analysis but, rather, compares relative security risks. If the risks are deemed too high, recommendations are developed for measures to reduce the risk. This paper will briefly discuss the CFVA project and VAM-CF process.

  12. Creative Persuasion: A Study on Adversarial Behaviors and Strategies in Phishing Attacks

    PubMed Central

    Rajivan, Prashanth; Gonzalez, Cleotilde

    2018-01-01

    Success of phishing attacks depend on effective exploitation of human weaknesses. This research explores a largely ignored, but crucial aspect of phishing: the adversarial behavior. We aim at understanding human behaviors and strategies that adversaries use, and how these may determine the end-user response to phishing emails. We accomplish this through a novel experiment paradigm involving two phases. In the adversarial phase, 105 participants played the role of a phishing adversary who were incentivized to produce multiple phishing emails that would evade detection and persuade end-users to respond. In the end-user phase, 340 participants performed an email management task, where they examined and classified phishing emails generated by participants in phase-one along with benign emails. Participants in the adversary role, self-reported the strategies they employed in each email they created, and responded to a test of individual creativity. Data from both phases of the study was combined and analyzed, to measure the effect of adversarial behaviors on end-user response to phishing emails. We found that participants who persistently used specific attack strategies (e.g., sending notifications, use of authoritative tone, or expressing shared interest) in all their attempts were overall more successful, compared to others who explored different strategies in each attempt. We also found that strategies largely determined whether an end-user was more likely to respond to an email immediately, or delete it. Individual creativity was not a reliable predictor of adversarial performance, but it was a predictor of an adversary's ability to evade detection. In summary, the phishing example provided initially, the strategies used, and the participants' persistence with some of the strategies led to higher performance in persuading end-users to respond to phishing emails. These insights may be used to inform tools and training procedures to detect phishing strategies in emails. PMID:29515478

  13. Physics-based simulations of aerial attacks by peregrine falcons reveal that stooping at high speed maximizes catch success against agile prey.

    PubMed

    Mills, Robin; Hildenbrandt, Hanno; Taylor, Graham K; Hemelrijk, Charlotte K

    2018-04-01

    The peregrine falcon Falco peregrinus is renowned for attacking its prey from high altitude in a fast controlled dive called a stoop. Many other raptors employ a similar mode of attack, but the functional benefits of stooping remain obscure. Here we investigate whether, when, and why stooping promotes catch success, using a three-dimensional, agent-based modeling approach to simulate attacks of falcons on aerial prey. We simulate avian flapping and gliding flight using an analytical quasi-steady model of the aerodynamic forces and moments, parametrized by empirical measurements of flight morphology. The model-birds' flight control inputs are commanded by their guidance system, comprising a phenomenological model of its vision, guidance, and control. To intercept its prey, model-falcons use the same guidance law as missiles (pure proportional navigation); this assumption is corroborated by empirical data on peregrine falcons hunting lures. We parametrically vary the falcon's starting position relative to its prey, together with the feedback gain of its guidance loop, under differing assumptions regarding its errors and delay in vision and control, and for three different patterns of prey motion. We find that, when the prey maneuvers erratically, high-altitude stoops increase catch success compared to low-altitude attacks, but only if the falcon's guidance law is appropriately tuned, and only given a high degree of precision in vision and control. Remarkably, the optimal tuning of the guidance law in our simulations coincides closely with what has been observed empirically in peregrines. High-altitude stoops are shown to be beneficial because their high airspeed enables production of higher aerodynamic forces for maneuvering, and facilitates higher roll agility as the wings are tucked, each of which is essential to catching maneuvering prey at realistic response delays.

  14. Using agility to combat cyber attacks.

    PubMed

    Anderson, Kerry

    2017-06-01

    Some incident response practitioners feel that they have been locked in a battle with cyber criminals since the popular adoption of the internet. Initially, organisations made great inroads in preventing and containing cyber attacks. In the last few years, however, cyber criminals have become adept at eluding defence security technologies and rapidly modifying their exploit strategies for financial or political gains. Similar to changes in military combat tactics, cyber criminals utilise distributed attack cells, real-time communications, and rapidly mutating exploits to minimise the potential for detection. Cyber criminals have changed their attack paradigm. This paper describes a new incident response paradigm aimed at combating the new model of cyber attacks with an emphasis on agility to increase the organisation's ability to respond rapidly to these new challenges.

  15. When Zealots Wage War.

    ERIC Educational Resources Information Center

    Dennis, Bruce L.

    1997-01-01

    Since Spring 1995, a Bedford, New York superintendent and her district have been virulently attacked by two parents who initially accused them of promoting Satanism, exemplified in an after-school game called Magic: The Gathering. These parents are now attacking drug prevention programs, various homework assignments, and literature selections. The…

  16. Temporal variation in black-caiman-nest predation in varzea of central Brazilian amazonia

    PubMed Central

    2017-01-01

    On the Amazon floodplain, the main predators of black caiman (Melanosuchus niger) eggs are jaguars (Panthera onca), tegu lizards (Tupinambis teguixim), capuchin monkeys (Sapajus macrocephalus) and humans (Homo sapiens). In this study, we investigated the relationship between predator attacks on nests and incubation period, and evaluated the influence of initial predation on subsequent predation in the Mamirauá Sustainable Development Reserve. We also evaluated the influence of presence of females near the nests and manipulation of nests on the occurrence of attacks. We compared results from data obtained with camera traps and vestiges left by predators on estimates of rates of predation by different predators. Egg predation was recorded in 32% of the 658 black caiman nests monitored during two years. Our results suggest that the probability of predation on black caiman eggs is relatively constant throughout the incubation period and that predation on eggs was lower when adults, presumably females, were present. Careful opening of nests and handling of eggs did not increase the number of attacks on black caiman nests. Nest opening by a predator appeared to increase the chances of a subsequent attack because most of the attacks on nests occurred soon after a predator first opened the nest. However, attacks by another species of predator do not appear to be necessary to initiate attacks by any other species of predator. Results based on camera traps and vestiges differed, but use of vestiges was adequate for identifying the principal predators on eggs in black caiman nests and, in many circumstances, the vestiges may be better for estimating predation by humans. In this study, opening nests and handling eggs did not increase the number of attacks on black caiman nests. PMID:28854258

  17. Temporal variation in black-caiman-nest predation in varzea of central Brazilian amazonia.

    PubMed

    Torralvo, Kelly; Botero-Arias, Robinson; Magnusson, William E

    2017-01-01

    On the Amazon floodplain, the main predators of black caiman (Melanosuchus niger) eggs are jaguars (Panthera onca), tegu lizards (Tupinambis teguixim), capuchin monkeys (Sapajus macrocephalus) and humans (Homo sapiens). In this study, we investigated the relationship between predator attacks on nests and incubation period, and evaluated the influence of initial predation on subsequent predation in the Mamirauá Sustainable Development Reserve. We also evaluated the influence of presence of females near the nests and manipulation of nests on the occurrence of attacks. We compared results from data obtained with camera traps and vestiges left by predators on estimates of rates of predation by different predators. Egg predation was recorded in 32% of the 658 black caiman nests monitored during two years. Our results suggest that the probability of predation on black caiman eggs is relatively constant throughout the incubation period and that predation on eggs was lower when adults, presumably females, were present. Careful opening of nests and handling of eggs did not increase the number of attacks on black caiman nests. Nest opening by a predator appeared to increase the chances of a subsequent attack because most of the attacks on nests occurred soon after a predator first opened the nest. However, attacks by another species of predator do not appear to be necessary to initiate attacks by any other species of predator. Results based on camera traps and vestiges differed, but use of vestiges was adequate for identifying the principal predators on eggs in black caiman nests and, in many circumstances, the vestiges may be better for estimating predation by humans. In this study, opening nests and handling eggs did not increase the number of attacks on black caiman nests.

  18. The Evaluation of Post-Exposure Prophylaxis Models for Use in the Event of an Aerosolized Anthrax Attack

    DTIC Science & Technology

    2014-09-01

    exercise conducted in the Chicago metropolitan area revealed that the initiation of PEP on Day 5 after an attack, as opposed to on Day 2, resulted in an...Scale Anthrax Attack on the Chicago Metropolitan Area: Impact of Timing and Surge Capacity,” Biosecurity and Bioterrorism: Biodefense Strategy, Practice... Chicago Metropolitan Area, also concluded that the optimal cost effective response strategy is to provide antibiotic prophylaxis and vaccination for all

  19. Testing Dialog-Verification of SIP Phones with Single-Message Denial-of-Service Attacks

    NASA Astrophysics Data System (ADS)

    Seedorf, Jan; Beckers, Kristian; Huici, Felipe

    The Session Initiation Protocol (SIP) is widely used for signaling in multimedia communications. However, many SIP implementations are still in their infancy and vulnerable to malicious messages. We investigate flaws in the SIP implementations of eight phones, showing that the deficient verification of SIP dialogs further aggravates the problem by making it easier for attacks to succeed. Our results show that the majority of the phones we tested are susceptible to these attacks.

  20. Memory for the September 11, 2001, terrorist attacks one year later in patients with Alzheimer's disease, patients with mild cognitive impairment, and healthy older adults.

    PubMed

    Budson, Andrew E; Simons, Jon S; Waring, Jill D; Sullivan, Alison L; Hussoin, Trisha; Schacter, Daniel L

    2007-10-01

    Although there are many opportunities to study memory in patients with Alzheimer's disease (AD) in the laboratory, there are few opportunities to study memory for real world events in these patients. The September 11, 2001 terrorist attacks provided one such opportunity. Patients with AD, patients with mild cognitive impairment (MCI), and healthy older adults were given a telephone questionnaire in the initial weeks after the event, again three to four months later, and finally one year afterwards to evaluate their memory for the September 11, 2001 terrorist attacks. We were particularly interested in using the attacks as an opportunity to examine the decline of episodic memory in patients with AD, patients with MCI, and older adult controls over a period of months. We found that compared to healthy older adults, patients with AD and MCI showed impaired memory at the initial time point, more rapid forgetting from the initial to the three-month time point, and very similar changes in memory from the three-month to the one-year time point. We speculated that these findings were consistent with patients with AD and MCI showing initial impaired encoding and a more rapid rate of forgetting compared with healthy older adults, but that once the memories had been consolidated, their decay rate became similar to that of healthy older adults. Lastly, although memory distortions were common among all groups, they were greatest in the patients with AD.

  1. Early Rivaroxaban Use After Cardioembolic Stroke May Not Result in Hemorrhagic Transformation: A Prospective Magnetic Resonance Imaging Study.

    PubMed

    Gioia, Laura C; Kate, Mahesh; Sivakumar, Leka; Hussain, Dulara; Kalashyan, Hayrapet; Buck, Brian; Bussiere, Miguel; Jeerakathil, Thomas; Shuaib, Ashfaq; Emery, Derek; Butcher, Ken

    2016-07-01

    Early anticoagulation after cardioembolic stroke remains controversial because of the potential for hemorrhagic transformation (HT). We tested the safety and feasibility of initiating rivaroxaban ≤14 days after cardioembolic stroke/transient ischemic attack. A prospective, open-label study of patients with atrial fibrillation treated with rivaroxaban ≤14 days of transient ischemic attack or ischemic stroke (National Institute of Health Stroke Scale <9). All patients underwent magnetic resonance imaging <24 hours of rivaroxaban initiation and day 7. The primary end point was symptomatic HT at day 7. Sixty patients (mean±SD age 71±19 years, 82% stroke/18% transient ischemic attack) were enrolled. Median (interquartile range) time from onset to rivaroxaban was 3 (5) days. At treatment initiation, median National Institute of Health Stroke Scale was 2 (4), and median diffusion-weighted imaging volume was 7.9 (13.7) mL. At baseline, HT was present in 25 (42%) patients (hemorrhagic infarct [HI]1=19, HI2=6). On follow-up magnetic resonance imaging, no patients developed symptomatic HT. New asymptomatic HI1 developed in 3 patients, and asymptomatic progression from HI1 to HI2 occurred in 5 patients; otherwise, HT remained unchanged at day 7. These data support the safety of rivaroxaban initiation ≤14 days of mild-moderate cardioembolic stroke/transient ischemic attack. Magnetic resonance imaging evidence of petechial HT, which is common, does not appear to increase the risk of symptomatic HT. © 2016 American Heart Association, Inc.

  2. The RAS Initiative

    Cancer.gov

    NCI established the RAS Initiative to explore innovative approaches for attacking the proteins encoded by mutant forms of RAS genes and to ultimately create effective, new therapies for RAS-related cancers.

  3. The robustness of multiplex networks under layer node-based attack

    PubMed Central

    Zhao, Da-wei; Wang, Lian-hai; Zhi, Yong-feng; Zhang, Jun; Wang, Zhen

    2016-01-01

    From transportation networks to complex infrastructures, and to social and economic networks, a large variety of systems can be described in terms of multiplex networks formed by a set of nodes interacting through different network layers. Network robustness, as one of the most successful application areas of complex networks, has attracted great interest in a myriad of research realms. In this regard, how multiplex networks respond to potential attack is still an open issue. Here we study the robustness of multiplex networks under layer node-based random or targeted attack, which means that nodes just suffer attacks in a given layer yet no additional influence to their connections beyond this layer. A theoretical analysis framework is proposed to calculate the critical threshold and the size of giant component of multiplex networks when nodes are removed randomly or intentionally. Via numerous simulations, it is unveiled that the theoretical method can accurately predict the threshold and the size of giant component, irrespective of attack strategies. Moreover, we also compare the robustness of multiplex networks under multiplex node-based attack and layer node-based attack, and find that layer node-based attack makes multiplex networks more vulnerable, regardless of average degree and underlying topology. PMID:27075870

  4. The robustness of multiplex networks under layer node-based attack.

    PubMed

    Zhao, Da-wei; Wang, Lian-hai; Zhi, Yong-feng; Zhang, Jun; Wang, Zhen

    2016-04-14

    From transportation networks to complex infrastructures, and to social and economic networks, a large variety of systems can be described in terms of multiplex networks formed by a set of nodes interacting through different network layers. Network robustness, as one of the most successful application areas of complex networks, has attracted great interest in a myriad of research realms. In this regard, how multiplex networks respond to potential attack is still an open issue. Here we study the robustness of multiplex networks under layer node-based random or targeted attack, which means that nodes just suffer attacks in a given layer yet no additional influence to their connections beyond this layer. A theoretical analysis framework is proposed to calculate the critical threshold and the size of giant component of multiplex networks when nodes are removed randomly or intentionally. Via numerous simulations, it is unveiled that the theoretical method can accurately predict the threshold and the size of giant component, irrespective of attack strategies. Moreover, we also compare the robustness of multiplex networks under multiplex node-based attack and layer node-based attack, and find that layer node-based attack makes multiplex networks more vulnerable, regardless of average degree and underlying topology.

  5. Theoretical Analysis of the Longitudinal Behavior of an Automatically Controlled Supersonic Interceptor During the Attack Phase

    NASA Technical Reports Server (NTRS)

    Gates, Ordway B., Jr.; Woodling, C. H.

    1959-01-01

    Theoretical analysis of the longitudinal behavior of an automatically controlled supersonic interceptor during the attack phase against a nonmaneuvering target is presented. Control of the interceptor's flight path is obtained by use of a pitch rate command system. Topics lift, and pitching moment, effects of initial tracking errors, discussion of normal acceleration limited, limitations of control surface rate and deflection, and effects of neglecting forward velocity changes of interceptor during attack phase.

  6. Sleep bruxism possibly triggered by multiple sclerosis attacks and treated successfully with botulinum toxin: Report of three cases.

    PubMed

    Sevim, Serhan; Kaleağası, Hakan; Fidancı, Halit

    2015-09-01

    Sleep bruxism refers to a nocturnal parafunctional activity including the clenching, grinding or gnashing of teeth. While most of the nocturnal bruxism cases seen in the general population are apparently idiopathic, it has been reported to be associated with a range of neurological diseases such as Huntington's disease, cranio-cervical dystonia and post-anoxic brain damage, but not multiple sclerosis (MS). We describe three cases of MS patients who have had moderate to severe complaints of bruxism in the two weeks following their relevant MS attacks. None of the three patients had a diagnosis of bruxism prior to her attack. The diagnosis was confirmed in one out of three by a polysomnography. One patient did not have any complaints related to bruxism previous to her attack, whereas two had mild and infrequent complaints. The symptoms of the relevant attacks were left hemihypesthesia in all and hemiparesis in two. None of the patients had spasticity that could result in severe teeth clenching. All three patients presented with morning headaches and jaw pain or tightness and were treated successfully with botulinum toxin (Btx) injections applied to their masseter and temporalis muscles. The cause of bruxism is controversial but lesions of the cortico-basalganglia-thalamo-cotrical loops are thought to be most likely. However, acute or chronic lesions in those pathways were not demonstrated in the 3 patients. It is feasible that they had normal appearing white matter interruptions in their cortico-basalganglia-thalamocortical loops along with their relevant attack. Copyright © 2015 Elsevier B.V. All rights reserved.

  7. Robust ECC-based authenticated key agreement scheme with privacy protection for Telecare medicine information systems.

    PubMed

    Zhang, Liping; Zhu, Shaohui

    2015-05-01

    To protect the transmission of the sensitive medical data, a secure and efficient authenticated key agreement scheme should be deployed when the healthcare delivery session is established via Telecare Medicine Information Systems (TMIS) over the unsecure public network. Recently, Islam and Khan proposed an authenticated key agreement scheme using elliptic curve cryptography for TMIS. They claimed that their proposed scheme is provably secure against various attacks in random oracle model and enjoys some good properties such as user anonymity. In this paper, however, we point out that any legal but malicious patient can reveal other user's identity. Consequently, their scheme suffers from server spoofing attack and off-line password guessing attack. Moreover, if the malicious patient performs the same time of the registration as other users, she can further launch the impersonation attack, man-in-the-middle attack, modification attack, replay attack, and strong replay attack successfully. To eliminate these weaknesses, we propose an improved ECC-based authenticated key agreement scheme. Security analysis demonstrates that the proposed scheme can resist various attacks and enables the patient to enjoy the remote healthcare services with privacy protection. Through the performance evaluation, we show that the proposed scheme achieves a desired balance between security and performance in comparisons with other related schemes.

  8. Moving Target Techniques: Leveraging Uncertainty for Cyber Defense

    DTIC Science & Technology

    2015-08-24

    vulnerability (a flaw or bug that an attacker can exploit to penetrate or disrupt a system) to successfully compromise systems. Defenders, however...device drivers, numerous software applications, and hardware components. Within the cyberspace, this imbalance between a simple, one- bug attack...parsing code itself could have security-relevant software bugs . Dynamic  Network   Techniques in the dynamic network domain change the properties

  9. Do proinflammatory cytokine levels predict serious complication risk of infection in pediatric cancer patients?

    PubMed

    Karakurt, Deniz Guven; Demirsoy, Ugur; Corapcioglu, Funda; Oncel, Selim; Karadogan, Meriban; Arisoy, Emin Sami

    2014-08-01

    Determination of risk of severe bacterial infection complication in children with cancer is important to diminish the cost of hospitalization and therapy. In this study, children with cancer (leukemia excluded) were evaluated for risk of severe infection complication, success of therapy and the relation between clinical and inflammatory parameters during neutropenic fever attacks. Children who fulfilled the criteria of neutropenic fever with cancer were enrolled in the study. During admission, together with clinical and laboratory parameters; interleukin-6, interleukin-8, soluble tumor necrosis factor receptor II, and soluble interleukin 2 reseptor ve procalcitonin levels were detected. Empirical therapy was started with piperacillin/tazobactam and relation between the inflammatory cytokine levels and therapy response parameters were evaluated. The study population included 31 children and 50 neutropenic attacks were studied. In 48% of the attacks, absolute neutrophile count was >100/mm(3) and infectious agents were shown microbiologically in 12% of the attacks. In the study group with piperacillin/tazobactam monotherapy, the success rate without modification was 58%. In the therapy modified group mean duration of fever, antibiotherapy and hospitalization were significantly longer than the group without modification. Inflammatory cytokines' levels during admission (interleukin-6, interleukin-8, soluble tumor necrosis factor reseptor II) were higher in patients with fever >3 days and in multiple regression analysis, it has been shown that they have a determinative role on fever control time. Other cytokines did not show any significant relationship with risk of severe bacterial infection complication and success of therapy.

  10. A Traceability Attack against e-Passports

    NASA Astrophysics Data System (ADS)

    Chothia, Tom; Smirnov, Vitaliy

    Since 2004, many nations have started issuing "e-passports" containing an RFID tag that, when powered, broadcasts information. It is claimed that these passports are more secure and that our data will be protected from any possible unauthorised attempts to read it. In this paper we show that there is a flaw in one of the passport's protocols that makes it possible to trace the movements of a particular passport, without having to break the passport's cryptographic key. All an attacker has to do is to record one session between the passport and a legitimate reader, then by replaying a particular message, the attacker can distinguish that passport from any other. We have implemented our attack and tested it successfully against passports issued by a range of nations.

  11. A Blind Reversible Robust Watermarking Scheme for Relational Databases

    PubMed Central

    Chang, Chin-Chen; Nguyen, Thai-Son; Lin, Chia-Chen

    2013-01-01

    Protecting the ownership and controlling the copies of digital data have become very important issues in Internet-based applications. Reversible watermark technology allows the distortion-free recovery of relational databases after the embedded watermark data are detected or verified. In this paper, we propose a new, blind, reversible, robust watermarking scheme that can be used to provide proof of ownership for the owner of a relational database. In the proposed scheme, a reversible data-embedding algorithm, which is referred to as “histogram shifting of adjacent pixel difference” (APD), is used to obtain reversibility. The proposed scheme can detect successfully 100% of the embedded watermark data, even if as much as 80% of the watermarked relational database is altered. Our extensive analysis and experimental results show that the proposed scheme is robust against a variety of data attacks, for example, alteration attacks, deletion attacks, mix-match attacks, and sorting attacks. PMID:24223033

  12. A blind reversible robust watermarking scheme for relational databases.

    PubMed

    Chang, Chin-Chen; Nguyen, Thai-Son; Lin, Chia-Chen

    2013-01-01

    Protecting the ownership and controlling the copies of digital data have become very important issues in Internet-based applications. Reversible watermark technology allows the distortion-free recovery of relational databases after the embedded watermark data are detected or verified. In this paper, we propose a new, blind, reversible, robust watermarking scheme that can be used to provide proof of ownership for the owner of a relational database. In the proposed scheme, a reversible data-embedding algorithm, which is referred to as "histogram shifting of adjacent pixel difference" (APD), is used to obtain reversibility. The proposed scheme can detect successfully 100% of the embedded watermark data, even if as much as 80% of the watermarked relational database is altered. Our extensive analysis and experimental results show that the proposed scheme is robust against a variety of data attacks, for example, alteration attacks, deletion attacks, mix-match attacks, and sorting attacks.

  13. On the designing of a tamper resistant prescription RFID access control system.

    PubMed

    Safkhani, Masoumeh; Bagheri, Nasour; Naderi, Majid

    2012-12-01

    Recently, Chen et al. have proposed a novel tamper resistant prescription RFID access control system, published in the Journal of Medical Systems. In this paper we consider the security of the proposed protocol and identify some existing weaknesses. The main attack is a reader impersonation attack which allows an active adversary to impersonate a legitimate doctor, e.g. the patient's doctor, to access the patient's tag and change the patient prescription. The presented attack is quite efficient. To impersonate a doctor, the adversary should eavesdrop one session between the doctor and the patient's tag and then she can impersonate the doctor with the success probability of '1'. In addition, we present efficient reader-tag to back-end database impersonation, de-synchronization and traceability attacks against the protocol. Finally, we propose an improved version of protocol which is more efficient compared to the original protocol while provides the desired security against the presented attacks.

  14. Destruction of 4-phenolsulfonic acid in water by anodic contact glow discharge electrolysis.

    PubMed

    Yang, Haiming; An, Baigang; Wang, Shaoyan; Li, Lixiang; Jin, Wenjie; Li, Lihua

    2013-06-01

    Destruction of 4-phenolsulfonic acid (4-PSA) in water was carried out using anodic contact glow discharge electrolysis. Accompanying the decay of 4-PSA, the amount of total organic carbon (TOC) in water correspondingly decreased, while the sulfonate group of 4-PSA was released as sulfate ion. Oxalate and formate were obtained as minor by-products. Additionally, phenol, 1,4-hydroquinone, hydroxyquinol and 1,4-benzoquinone were detected as primary intermediates in the initial stages of decomposition of 4-PSA. A reaction pathway involving successive attacks of hydroxyl and hydrogen radicals was assumed on the basis of the observed products and kinetics. It was revealed that the decay of both 4-PSA and TOC obeyed a first-order rate law. The effects of different Fe ions and initial concentrations of 4-PSA on the degradation rate were investigated. It was found that the presence of Fe ions could increase the degradation rate of 4-PSA, while initial concentrations lower than 80 mmol/L had no significant effect on kinetic behaviour. The disappearance rate of 4-PSA was significantly affected by pH.

  15. Serial agonistic attacks by greylag goose families, Anser anser, against the same opponent

    PubMed Central

    Scheiber, Isabella B.R.; Kotrschal, Kurt; Weiß, Brigitte M.

    2011-01-01

    It is known from primates that alliance partners may support each other’s interests in competition with others, for example, through repeated agonistic attacks against a particular individual. We examined serial aggressive interactions between greylag goose families and other flock members. We found that repeated attacks towards the same individual were common and that up to five serial attacks by family members followed an initial attack. Family size did not affect the frequency of such serial attacks. Juvenile geese evidently benefited most from active social support through serial attacks. About 60% of the juveniles’ lost primary interactions were subsequently reversed by another family member. This may be one of the reasons why juveniles rank higher in the social hierarchy than would be expected from their age and size alone. Losses in serial attacks predominantly occurred against other, presumably higher-ranking, family geese and ganders. We propose three major functions/consequences of serial attacks. Analogous to primates, serial attacks in greylag geese may serve to reinforce a losing experience of an opponent defeated in a preceding attack. On the side of the winning family, serial attacks may reinforce the experience of winning. Both winning and losing experiences are linked with physiological consequences in higher vertebrates, affecting the future social performance of winners or losers. Finally, serial attacks may signal the agonistic potential of a family to other flock members. This is supported by heart rate data, which indicate that greylags are competent to interpret third-party relationships. PMID:21984838

  16. DOE Office of Scientific and Technical Information (OSTI.GOV)

    John Homer; Ashok Varikuti; Xinming Ou

    Various tools exist to analyze enterprise network systems and to produce attack graphs detailing how attackers might penetrate into the system. These attack graphs, however, are often complex and difficult to comprehend fully, and a human user may find it problematic to reach appropriate configuration decisions. This paper presents methodologies that can 1) automatically identify portions of an attack graph that do not help a user to understand the core security problems and so can be trimmed, and 2) automatically group similar attack steps as virtual nodes in a model of the network topology, to immediately increase the understandability ofmore » the data. We believe both methods are important steps toward improving visualization of attack graphs to make them more useful in configuration management for large enterprise networks. We implemented our methods using one of the existing attack-graph toolkits. Initial experimentation shows that the proposed approaches can 1) significantly reduce the complexity of attack graphs by trimming a large portion of the graph that is not needed for a user to understand the security problem, and 2) significantly increase the accessibility and understandability of the data presented in the attack graph by clearly showing, within a generated visualization of the network topology, the number and type of potential attacks to which each host is exposed.« less

  17. Marine Exposure of Preservative-Treated Small Wood Panels.

    DTIC Science & Technology

    1981-04-01

    southern noria attack and that creosote impedes teredine attack, pine sapwood , 0.24 to 0.39 growth rings per mm (6-8/in.), a study was initiated in 1969...whereas in piling, wave action and abrasion from The column showing "months exposure to index below floating debris must break away surface areas to

  18. Estimating the Attack Ratio of Dengue Epidemics under Time-varying Force of Infection using Aggregated Notification Data

    NASA Astrophysics Data System (ADS)

    Coelho, Flavio Codeço; Carvalho, Luiz Max De

    2015-12-01

    Quantifying the attack ratio of disease is key to epidemiological inference and public health planning. For multi-serotype pathogens, however, different levels of serotype-specific immunity make it difficult to assess the population at risk. In this paper we propose a Bayesian method for estimation of the attack ratio of an epidemic and the initial fraction of susceptibles using aggregated incidence data. We derive the probability distribution of the effective reproductive number, Rt, and use MCMC to obtain posterior distributions of the parameters of a single-strain SIR transmission model with time-varying force of infection. Our method is showcased in a data set consisting of 18 years of dengue incidence in the city of Rio de Janeiro, Brazil. We demonstrate that it is possible to learn about the initial fraction of susceptibles and the attack ratio even in the absence of serotype specific data. On the other hand, the information provided by this approach is limited, stressing the need for detailed serological surveys to characterise the distribution of serotype-specific immunity in the population.

  19. Controlled vortical flow on delta wings through unsteady leading edge blowing

    NASA Technical Reports Server (NTRS)

    Lee, K. T.; Roberts, Leonard

    1990-01-01

    The vortical flow over a delta wing contributes an important part of the lift - the so called nonlinear lift. Controlling this vortical flow with its favorable influence would enhance aircraft maneuverability at high angle of attack. Several previous studies have shown that control of the vortical flow field is possible through the use of blowing jets. The present experimental research studies vortical flow control by applying a new blowing scheme to the rounded leading edge of a delta wing; this blowing scheme is called Tangential Leading Edge Blowing (TLEB). Vortical flow response both to steady blowing and to unsteady blowing is investigated. It is found that TLEB can redevelop stable, strong vortices even in the post-stall angle of attack regime. Analysis of the steady data shows that the effect of leading edge blowing can be interpreted as an effective change in angle of attack. The examination of the fundamental time scales for vortical flow re-organization after the application of blowing for different initial states of the flow field is studied. Different time scales for flow re-organization are shown to depend upon the effective angle of attack. A faster response time can be achieved at angles of attack beyond stall by a suitable choice of the initial blowing momentum strength. Consequently, TLEB shows the potential of controlling the vortical flow over a wide range of angles of attack; i.e., in both for pre-stall and post-stall conditions.

  20. Strategies for the prevention of a successful biological warfare aerosol attack.

    PubMed

    Wiener, S L

    1996-05-01

    Biological warfare (BW) aerosol attacks are different from chemical attacks in that they may provide no warning/all clear signals that allow the soldier to put on or remove his M17/M40 protective mask. Methods are now being perfected to detect a BW aerosol cloud using an airborne (helicopter) pulsed laser system to scan the lower altitudes upwind from a troop concentration of corps size, and to sample and analyze the nature of the aerosol within a brief time interval. This system has certain limitations and vulnerabilities, since it is designed specifically to detect a line-type aerosol attack. Provision of, training with, and field use of a lightweight dust mist or HEPA filter respirator for each soldier is proposed for protection against undetected aerosol attacks. This particulate filter respirator would be issued in addition to the M17/M40 mask. Such a BW respirator will be able to purify the soldier's air by removing particles in the 0.3- to 15-micro m-diameter range with an efficiency of 98 to 100%. Particle size of BW aerosols is in the same range, with an optimum size for high-efficiency casualty production of 1 to 5 micro m mass median diameter. The proposed BW respirator will be lightweight; will require low inhalation pressures; will be comfortable to wear for prolonged periods; will not interfere with vision, hearing, and communication; and will not degrade overall effectiveness and performance to the degree observed with the M17/M40 masks. Such respirators would be worn as part of a contingency defense against an enemy likely to use BW agents. This respirator could be worn for prolonged periods when under threat of an undetectable BW attack during weather conditions favorable to the success of such an attack (i.e., low wind velocity and temperature inversion in the target area). In addition, tactically important assets such as command and control centers and missile batteries can also be protected continuously by air filtration systems powered by electricity (modular collective protection equipment). Vaccinations against anthrax, botulism, Q fever, plague, and tularemia are now available and immune protection against ricin and staphylococcal toxins appears feasible in the near future. Chemotherapy can also be provided for prophylaxis of infectious agents released on the battlefield. The vaccines and antibiotics can provide back-up protection against an unexpected BW attack during a period when the BW respirator is not in use or malfunctions due to a poor seal or filter leak. Enemy sites of biological weapon production, assembly, testing, and storage, and delivery vehicles can be targeted for destruction by bombs and/or missiles. An integrated, well-planned, BW defense with multiple components can decrease the likelihood of a successful enemy BW aerosol attack.

  1. Involuntary psychiatric examinations for danger to others in Florida after the attacks of September 11, 2001.

    PubMed

    Catalano, Ralph A; Kessell, Eric; Christy, Annette; Monahan, John

    2005-07-01

    Theories of perceived risk state that when people feel threatened, they will react more strongly than they would otherwise. This study tested the hypothesis that evaluations for involuntary psychiatric hospitalizations that were initiated by law enforcement personnel in Florida increased in the weeks after the attacks of September 11, 2001. The authors applied interrupted time-series designs to determine whether there was a relationship between the number of involuntary psychiatric examinations initiated by law enforcement officials and the attacks of September 11, 2001. They examined the number of psychiatric evaluations of men and women who were considered to be mentally ill and harmful to others by law enforcement personnel in Florida during seven-day periods ("areal" weeks) that began with Tuesday, July 6, 1999, and ended with Monday, December 31, 2001 (because September 11, 2001, fell on a Tuesday). Over the 130 weeks of the study, law enforcement officials initiated examinations of an average of 25.96 men and 13.47 women per areal week. Law enforcement officials initiated examinations of approximately 14 more women than expected in the areal week that began with September 11, 2001. During the three areal weeks that began with September 18, 2001, a total of 34 more men than expected were presented for evaluation. These findings cannot be attributed to trends, seasonality, other cycles, or the tendency of the examination time series to remain elevated or depressed after high or low values in the series. Perceived general risk in a community may increase the likelihood that law enforcement personnel and the persons who summon them perceive persons with mental illness as imminently harmful. The public health response to any future terror attacks should include efforts to alert psychiatric service providers to the possibility of lower community tolerance for mental illness in the aftermath of an attack.

  2. Similarities and Differences in Patterns and Geolocation of SSH Attack Data

    DTIC Science & Technology

    2015-09-01

    failed inputs. ..................................................................................14  Figure 7.  Latest “ passwd ” commands entered by...also has fake file contents to allow an attacker to “cat” files like /etc/ passwd [12]. Kippo saves all downloaded files for later inspection. The...overall post-compromise activity, human activity inside the honeypot, top 10 inputs (overall), top 10 successful inputs, top 10 failed inputs, passwd

  3. Perineal evisceration secondary to a bite injury in a dog with an untreated perineal hernia

    PubMed Central

    McCarthy, Daniel; Lux, Cassie; Seibert, Rachel

    2016-01-01

    Emergency surgery was performed on a 6-year-old castrated male springer spaniel dog with evisceration of most of the small intestinal tract through the perineal region, secondary to a dog attack. This is the first report describing successful treatment of perineal evisceration secondary to dog attack at an untreated perineal hernia, employing abdominal and perineal approaches. PMID:27708442

  4. Has successful terror gone to ground?

    PubMed

    Barnett, Arnold

    2015-04-01

    This article considers all 87 attacks worldwide against air and rail transport systems that killed at least two passengers over the 30-year period of 1982-2011. The data offer strong and statistically significant evidence that successful acts of terror have "gone to ground" in recent years: attacks against aviation were concentrated early in the three decades studied whereas those against rail were concentrated later. Recent data are used to make estimates of absolute and comparative risk for frequent flyers and subway/rail commuters. Point estimates in the "status quo" case imply that mortality risk from successful acts of terror was very low on both modes of transportation and that, whereas risk per trip is higher for air travelers than subway/rail commuters, the rail commuters experience greater risk per year than the frequent flyers. © 2015 Society for Risk Analysis.

  5. Defense of Cyber Infrastructures Against Cyber-Physical Attacks Using Game-Theoretic Models

    DOE PAGES

    Rao, Nageswara S. V.; Poole, Stephen W.; Ma, Chris Y. T.; ...

    2015-04-06

    The operation of cyber infrastructures relies on both cyber and physical components, which are subject to incidental and intentional degradations of different kinds. Within the context of network and computing infrastructures, we study the strategic interactions between an attacker and a defender using game-theoretic models that take into account both cyber and physical components. The attacker and defender optimize their individual utilities expressed as sums of cost and system terms. First, we consider a Boolean attack-defense model, wherein the cyber and physical sub-infrastructures may be attacked and reinforced as individual units. Second, we consider a component attack-defense model wherein theirmore » components may be attacked and defended, and the infrastructure requires minimum numbers of both to function. We show that the Nash equilibrium under uniform costs in both cases is computable in polynomial time, and it provides high-level deterministic conditions for the infrastructure survival. When probabilities of successful attack and defense, and of incidental failures are incorporated into the models, the results favor the attacker but otherwise remain qualitatively similar. This approach has been motivated and validated by our experiences with UltraScience Net infrastructure, which was built to support high-performance network experiments. In conclusion, the analytical results, however, are more general, and we apply them to simplified models of cloud and high-performance computing infrastructures.« less

  6. Securing Cooperative Spectrum Sensing Against Collusive SSDF Attack using XOR Distance Analysis in Cognitive Radio Networks

    PubMed Central

    Feng, Jingyu; Zhang, Man; Xiao, Yun; Yue, Hongzhou

    2018-01-01

    Cooperative spectrum sensing (CSS) is considered as a powerful approach to improve the utilization of scarce spectrum resources. However, if CSS assumes that all secondary users (SU) are honest, it may offer opportunities for attackers to conduct a spectrum sensing data falsification (SSDF) attack. To suppress such a threat, recent efforts have been made to develop trust mechanisms. Currently, some attackers can collude with each other to form a collusive clique, and thus not only increase the power of SSDF attack but also avoid the detection of a trust mechanism. Noting the duality of sensing data, we propose a defense scheme called XDA from the perspective of XOR distance analysis to suppress a collusive SSDF attack. In the XDA scheme, the XOR distance calculation in line with the type of “0” and “1” historical sensing data is used to measure the similarity between any two SUs. Noting that collusive SSDF attackers hold high trust value and the minimum XOR distance, the algorithm to detect collusive SSDF attackers is designed. Meanwhile, the XDA scheme can perfect the trust mechanism to correct collusive SSDF attackers’ trust value. Simulation results show that the XDA scheme can enhance the accuracy of trust evaluation, and thus successfully reduce the power of collusive SSDF attack against CSS. PMID:29382061

  7. Defense of Cyber Infrastructures Against Cyber-Physical Attacks Using Game-Theoretic Models

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Rao, Nageswara S. V.; Poole, Stephen W.; Ma, Chris Y. T.

    The operation of cyber infrastructures relies on both cyber and physical components, which are subject to incidental and intentional degradations of different kinds. Within the context of network and computing infrastructures, we study the strategic interactions between an attacker and a defender using game-theoretic models that take into account both cyber and physical components. The attacker and defender optimize their individual utilities expressed as sums of cost and system terms. First, we consider a Boolean attack-defense model, wherein the cyber and physical sub-infrastructures may be attacked and reinforced as individual units. Second, we consider a component attack-defense model wherein theirmore » components may be attacked and defended, and the infrastructure requires minimum numbers of both to function. We show that the Nash equilibrium under uniform costs in both cases is computable in polynomial time, and it provides high-level deterministic conditions for the infrastructure survival. When probabilities of successful attack and defense, and of incidental failures are incorporated into the models, the results favor the attacker but otherwise remain qualitatively similar. This approach has been motivated and validated by our experiences with UltraScience Net infrastructure, which was built to support high-performance network experiments. In conclusion, the analytical results, however, are more general, and we apply them to simplified models of cloud and high-performance computing infrastructures.« less

  8. Defense of Cyber Infrastructures Against Cyber-Physical Attacks Using Game-Theoretic Models.

    PubMed

    Rao, Nageswara S V; Poole, Stephen W; Ma, Chris Y T; He, Fei; Zhuang, Jun; Yau, David K Y

    2016-04-01

    The operation of cyber infrastructures relies on both cyber and physical components, which are subject to incidental and intentional degradations of different kinds. Within the context of network and computing infrastructures, we study the strategic interactions between an attacker and a defender using game-theoretic models that take into account both cyber and physical components. The attacker and defender optimize their individual utilities, expressed as sums of cost and system terms. First, we consider a Boolean attack-defense model, wherein the cyber and physical subinfrastructures may be attacked and reinforced as individual units. Second, we consider a component attack-defense model wherein their components may be attacked and defended, and the infrastructure requires minimum numbers of both to function. We show that the Nash equilibrium under uniform costs in both cases is computable in polynomial time, and it provides high-level deterministic conditions for the infrastructure survival. When probabilities of successful attack and defense, and of incidental failures, are incorporated into the models, the results favor the attacker but otherwise remain qualitatively similar. This approach has been motivated and validated by our experiences with UltraScience Net infrastructure, which was built to support high-performance network experiments. The analytical results, however, are more general, and we apply them to simplified models of cloud and high-performance computing infrastructures. © 2015 Society for Risk Analysis.

  9. Use of Deception to Improve Client Honeypot Detection of Drive-by-Download Attacks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Popovsky, Barbara; Narvaez Suarez, Julia F.; Seifert, Christian

    2009-07-24

    This paper presents the application of deception theory to improve the success of client honeypots at detecting malicious web page attacks from infected servers programmed by online criminals to launch drive-by-download attacks. The design of honeypots faces three main challenges: deception, how to design honeypots that seem real systems; counter-deception, techniques used to identify honeypots and hence defeating their deceiving nature; and counter counter-deception, how to design honeypots that deceive attackers. The authors propose the application of a deception model known as the deception planning loop to identify the current status on honeypot research, development and deployment. The analysis leadsmore » to a proposal to formulate a landscape of the honeypot research and planning of steps ahead.« less

  10. Flood Stress as a Technique to Assess Preventive Insecticide and Fungicide Treatments for Protecting Trees against Ambrosia Beetles

    PubMed Central

    Ranger, Christopher M.; Schultz, Peter B.; Reding, Michael E.; Frank, Steven D.; Palmquist, Debra E.

    2016-01-01

    Ambrosia beetles tunnel into the heartwood of trees where they cultivate and feed upon a symbiotic fungus. We assessed the effectiveness of flood stress for making Cercis canadensis L. and Cornus florida L. trees attractive to attack as part of insecticide and fungicide efficacy trials conducted in Ohio and Virginia. Since female ambrosia beetles will not begin ovipositing until their symbiotic fungus is established within the host, we also assessed pre-treatment of trees with permethrin, azoxystrobin, and potassium phosphite on fungal establishment and beetle colonization success. Permethrin reduced attacks on flooded trees, yet no attacks occurred on any of the non-flooded trees. Fewer galleries created within flooded trees pre-treated with permethrin, azoxystrobin, and potassium phosphite contained the purported symbiotic fungus; foundress’ eggs were only detected in flooded but untreated trees. While pre-treatment with permethrin, azoxystrobin, and potassium phosphite can disrupt colonization success, maintaining tree health continues to be the most effective and sustainable management strategy. PMID:27548230

  11. Peripheral nerve blocks for the treatment of short-lasting unilateral neuralgiform headache with conjunctival injection and tearing (SUNCT) during pregnancy.

    PubMed

    Yalın, Osman Özgür; Uludüz, Derya; Özge, Aynur

    2018-01-01

    Short-lasting unilateral neuralgiform headache attacks with conjunctival injection and tearing (SUNCT) is a rare, primary headache syndrome, which is classified as a subtype of trigeminal autonomic cephalalgias. Although SUNCT is usually refractory to treatment, several antiepileptic drugs have recently shown promising results for its treatment. However, there is a lack of evidence regarding the course of SUNCT during pregnancy and the available treatment options. Here, we present a 30-week pregnant female with SUNCT who was successfully treated with infra- and supraorbital nerve blocks. Headache attacks completely diminished after the injection, and recurrence was not observed. Although lamotrigine may be relatively safe in pregnant patients with SUNCT attacks, peripheral nerve block may be a feasible technique and can be considered as a safe and effective treatment option. This is the first SUNCT case in the literature that was successfully treated with infra- and supraorbital nerve blocks during pregnancy.

  12. Security analysis and improvement of a privacy authentication scheme for telecare medical information systems.

    PubMed

    Wu, Fan; Xu, Lili

    2013-08-01

    Nowadays, patients can gain many kinds of medical service on line via Telecare Medical Information Systems(TMIS) due to the fast development of computer technology. So security of communication through network between the users and the server is very significant. Authentication plays an important part to protect information from being attacked by malicious attackers. Recently, Jiang et al. proposed a privacy enhanced scheme for TMIS using smart cards and claimed their scheme was better than Chen et al.'s. However, we have showed that Jiang et al.'s scheme has the weakness of ID uselessness and is vulnerable to off-line password guessing attack and user impersonation attack if an attacker compromises the legal user's smart card. Also, it can't resist DoS attack in two cases: after a successful impersonation attack and wrong password input in Password change phase. Then we propose an improved mutual authentication scheme used for a telecare medical information system. Remote monitoring, checking patients' past medical history record and medical consultant can be applied in the system where information transmits via Internet. Finally, our analysis indicates that the suggested scheme overcomes the disadvantages of Jiang et al.'s scheme and is practical for TMIS.

  13. Mining IP to Domain Name Interactions to Detect DNS Flood Attacks on Recursive DNS Servers.

    PubMed

    Alonso, Roberto; Monroy, Raúl; Trejo, Luis A

    2016-08-17

    The Domain Name System (DNS) is a critical infrastructure of any network, and, not surprisingly a common target of cybercrime. There are numerous works that analyse higher level DNS traffic to detect anomalies in the DNS or any other network service. By contrast, few efforts have been made to study and protect the recursive DNS level. In this paper, we introduce a novel abstraction of the recursive DNS traffic to detect a flooding attack, a kind of Distributed Denial of Service (DDoS). The crux of our abstraction lies on a simple observation: Recursive DNS queries, from IP addresses to domain names, form social groups; hence, a DDoS attack should result in drastic changes on DNS social structure. We have built an anomaly-based detection mechanism, which, given a time window of DNS usage, makes use of features that attempt to capture the DNS social structure, including a heuristic that estimates group composition. Our detection mechanism has been successfully validated (in a simulated and controlled setting) and with it the suitability of our abstraction to detect flooding attacks. To the best of our knowledge, this is the first time that work is successful in using this abstraction to detect these kinds of attacks at the recursive level. Before concluding the paper, we motivate further research directions considering this new abstraction, so we have designed and tested two additional experiments which exhibit promising results to detect other types of anomalies in recursive DNS servers.

  14. Mining IP to Domain Name Interactions to Detect DNS Flood Attacks on Recursive DNS Servers

    PubMed Central

    Alonso, Roberto; Monroy, Raúl; Trejo, Luis A.

    2016-01-01

    The Domain Name System (DNS) is a critical infrastructure of any network, and, not surprisingly a common target of cybercrime. There are numerous works that analyse higher level DNS traffic to detect anomalies in the DNS or any other network service. By contrast, few efforts have been made to study and protect the recursive DNS level. In this paper, we introduce a novel abstraction of the recursive DNS traffic to detect a flooding attack, a kind of Distributed Denial of Service (DDoS). The crux of our abstraction lies on a simple observation: Recursive DNS queries, from IP addresses to domain names, form social groups; hence, a DDoS attack should result in drastic changes on DNS social structure. We have built an anomaly-based detection mechanism, which, given a time window of DNS usage, makes use of features that attempt to capture the DNS social structure, including a heuristic that estimates group composition. Our detection mechanism has been successfully validated (in a simulated and controlled setting) and with it the suitability of our abstraction to detect flooding attacks. To the best of our knowledge, this is the first time that work is successful in using this abstraction to detect these kinds of attacks at the recursive level. Before concluding the paper, we motivate further research directions considering this new abstraction, so we have designed and tested two additional experiments which exhibit promising results to detect other types of anomalies in recursive DNS servers. PMID:27548169

  15. Situational awareness of a coordinated cyber attack

    NASA Astrophysics Data System (ADS)

    Sudit, Moises; Stotz, Adam; Holender, Michael

    2005-03-01

    As technology continues to advance, services and capabilities become computerized, and an ever increasing amount of business is conducted electronically the threat of cyber attacks gets compounded by the complexity of such attacks and the criticality of the information which must be secured. A new age of virtual warfare has dawned in which seconds can differentiate between the protection of vital information and/or services and a malicious attacker attaining their goal. In this paper we present a novel approach in the real-time detection of multistage coordinated cyber attacks and the promising initial testing results we have obtained. We introduce INFERD (INformation Fusion Engine for Real-time Decision-making), an adaptable information fusion engine which performs fusion at levels zero, one, and two to provide real-time situational assessment and its application to the cyber domain in the ECCARS (Event Correlation for Cyber Attack Recognition System) system. The advantages to our approach are fourfold: (1) The complexity of the attacks which we consider, (2) the level of abstraction in which the analyst interacts with the attack scenarios, (3) the speed at which the information fusion is presented and performed, and (4) our disregard for ad-hoc rules or a priori parameters.

  16. The psychological impact of terrorism: an epidemiologic study of posttraumatic stress disorder and associated factors in victims of the 1995-1996 bombings in France.

    PubMed

    Verger, Pierre; Dab, William; Lamping, Donna L; Loze, Jean-Yves; Deschaseaux-Voinet, Céline; Abenhaim, Lucien; Rouillon, Frédéric

    2004-08-01

    A wave of bombings struck France in 1995 and 1996, killing 12 people and injuring more than 200. The authors conducted follow-up evaluations with the victims in 1998 to determine the prevalence of and factors associated with posttraumatic stress disorder (PTSD). Victims directly exposed to the bombings (N=228) were recruited into a retrospective, cross-sectional study. Computer-assisted telephone interviews were conducted to evaluate PTSD, per DSM-IV criteria, and to assess health status before the attack, initial injury severity and perceived threat at the time of attack, and psychological symptoms, cosmetic impairment, hearing problems, and health service use at the time of the follow-up evaluation. Factors associated with PTSD were investigated with univariate logistic regression followed by multiple logistic regression analyses. A total of 196 respondents (86%) participated in the study. Of these, 19% had severe initial physical injuries (hospitalization exceeding 1 week). Problems reported at the follow-up evaluation included attack-related hearing problems (51%), cosmetic impairment (33%), and PTSD (31%) (95% confidence interval=24.5%-37.5%). Results of logistic regression analyses indicated that the risk of PTSD was significantly higher among women (odds ratio=2.54), participants age 35-54 (odds ratio=2.83), and those who had severe initial injuries (odds ratio=2.79) or cosmetic impairment (odds ratio=2.74) or who perceived substantial threat during the attack (odds ratio=3.99). The high prevalence of PTSD 2.6 years on average after a terrorist attack emphasizes the need for improved health services to address the intermediate and long-term consequences of terrorism.

  17. Measurement of Aerodynamic Forces for Various Mean Angles of Attack on an Airfoil Oscillating in Pitch and on Two Finite-span Wings Oscillating in Bending with Emphasis on Damping in the Stall

    NASA Technical Reports Server (NTRS)

    Rainey, A Gerald

    1957-01-01

    The oscillating air forces on a two-dimensional wing oscillating in pitch about the midchord have been measured at various mean angles of attack and at Mach numbers of 0.35 and 0.7. The magnitudes of normal-force and pitching-moment coefficients were much higher at high angles of attack than at low angles of attack for some conditions. Large regions of negative damping in pitch were found, and it was shown that the effect of increasing the Mach number 0.35 to 0.7 was to decrease the initial angle of attack at which negative damping occurred. Measurements of the aerodynamic damping of a 10-percent-thick and of a 3-percent-thick finite-span wing oscillating in the first bending mode indicate no regions of negative damping for this type of motion over the range of variables covered. The damping measured at high angles of attack was generally larger than that at low angles of attack. (author)

  18. Terrorism in Spain: emergency medical aspects.

    PubMed

    García-Castrillo Riesgo, Luis; García Merino, Antonio

    2003-01-01

    A terrorism movement has been active in Spain during the last 20 years, with a painful number of victims. Civil Defense is in charge of the coordination of all the structures that are implicated in a terrorist incident. There are three typical patterns of attacks: (1) individual attacks; (2) group attacks; and (3) mass attacks. The individual attacks are done with guns, usually 9 mm, fired from a short distance; victims die from serious intracranial damage. Collective attacks are done using explosives under vehicles, tramp bombs, or "bomb vehicles;" victims are of different severity with wounds, burns, and blast injuries. With mass attacks with "bomb vehicles" in buildings or crowded public places, the numbers of victims are elevated and produce brutal social consequences. Emergency Medical Services integrated in to "Civil Defense" try to minimize the damage by initializing treatment on-scene and with the rapid provision of definitive care. During the last year, post-traumatic stress disorder treatment groups have been providing care to the victims and personnel. Chemical or biological weapons have not been used, although this is a great concern to the authorities.

  19. Robustness analysis of interdependent networks under multiple-attacking strategies

    NASA Astrophysics Data System (ADS)

    Gao, Yan-Li; Chen, Shi-Ming; Nie, Sen; Ma, Fei; Guan, Jun-Jie

    2018-04-01

    The robustness of complex networks under attacks largely depends on the structure of a network and the nature of the attacks. Previous research on interdependent networks has focused on two types of initial attack: random attack and degree-based targeted attack. In this paper, a deliberate attack function is proposed, where six kinds of deliberate attacking strategies can be derived by adjusting the tunable parameters. Moreover, the robustness of four types of interdependent networks (BA-BA, ER-ER, BA-ER and ER-BA) with different coupling modes (random, positive and negative correlation) is evaluated under different attacking strategies. Interesting conclusions could be obtained. It can be found that the positive coupling mode can make the vulnerability of the interdependent network to be absolutely dependent on the most vulnerable sub-network under deliberate attacks, whereas random and negative coupling modes make the vulnerability of interdependent network to be mainly dependent on the being attacked sub-network. The robustness of interdependent network will be enhanced with the degree-degree correlation coefficient varying from positive to negative. Therefore, The negative coupling mode is relatively more optimal than others, which can substantially improve the robustness of the ER-ER network and ER-BA network. In terms of the attacking strategies on interdependent networks, the degree information of node is more valuable than the betweenness. In addition, we found a more efficient attacking strategy for each coupled interdependent network and proposed the corresponding protection strategy for suppressing cascading failure. Our results can be very useful for safety design and protection of interdependent networks.

  20. Dispersal flight and attack of the spruce beetle, Dendroctonus rufipennis, in south-central Alaska.

    Treesearch

    Edward H. Holsten; John S. Hard

    2001-01-01

    Data from 1999 and 2000 field studies regarding the dispersal flight and initial attack behavior of the spruce beetle (Dendroctonus rufipennis Kirby) are summarized. More dispersing beetles were trapped in flight near the middle to upper tree bole than the lower bole. There were no significant differences between trap location and ambient...

  1. Deformation and erosion of f.c.c. metals and alloys under cavitation attack

    NASA Technical Reports Server (NTRS)

    Rao, B. C. S.; Buckley, D. H.

    1984-01-01

    Experimental investigations have been conducted to determine the early stages of cavitation attack on 6061-T6 aluminum alloy, electrolytic tough pitch copper, brass, and bronze, all having polycrystalline fcc matrices. The surface profiles and scanning electron micrographs show that the pits are initially formed at the grain boundaries, while the grain surfaces are progressively roughened by multiple slip and twinning. The initial erosion is noted to have occurred from the material in the grain boundaries, as well as by fragmentation of part of the grains. Further erosion occurred by shearing and necking of the surface undulations caused by plastic deformation. The mean penetration depth, computed on the basis of mass loss, was lowest on the bronze and greatest on the copper. Attention is given to the relation of cavitation attack to grain size, glide stress and stacking fault energy.

  2. Jet transport energy management for minimum fuel consumption and noise impact in the terminal area

    NASA Technical Reports Server (NTRS)

    Bull, J. S.; Foster, J. D.

    1974-01-01

    Significant reductions in both noise and fuel consumption can be gained through careful tailoring of approach flightpath and airspeed profile, and the point at which the landing gear and flaps are lowered. For example, the noise problem has been successfully attacked in recent years with development of the 'two-segment' approach, which brings the aircraft in at a steeper angle initially, thereby achieving noise reduction through lower thrust settings and higher altitudes. A further reduction in noise and a significant reduction in fuel consumption can be achieved with the 'decelerating approach' concept. In this case, the approach is initiated at high airspeed and in a drag configuration that allows for low thrust. The landing flaps are then lowered at the appropriate time so that the airspeed slowly decelerates to V sub r at touchdown. The decelerating approach concept can be applied to constant glideslope flightpaths or segmented flightpaths such as the two-segment approach.

  3. Effect of Angle of Attack on Slope Climbing Performance

    NASA Technical Reports Server (NTRS)

    Creager, Colin M.; Jones, Lucas; Smith, Lauren M.

    2017-01-01

    Ascending steep slopes is often a very difficult challenge for off-road vehicles, whether on Earth or on extraterrestrial bodies. This challenge is even greater if the surface consists of loose granular soil that does not provide much shear strength. This study investigated how the path at which a vehicle traverses a slope, specifically the angle that it is commanded to drive relative to the base of the hill (the angle of attack), can affect its performance. A vehicle was driven in loose sand at slope angles up to 15 degrees and angles of attack ranging from 10 to 90 degrees. A novel photogrammetry technique was implemented to both track vehicle motion and create a three-dimensional profile of the terrain. This allowed for true wheel sinkage measurements. The study showed that though low angles of attack result in lower wheel slip and sinkage, the efficiency of the vehicles uphill motion increased at higher angles of attack. For slopes up to 15 degrees, a 90 degree angle of attack provided the greatest likelihood of successful ascent.

  4. Physics-based simulations of aerial attacks by peregrine falcons reveal that stooping at high speed maximizes catch success against agile prey

    PubMed Central

    Hildenbrandt, Hanno

    2018-01-01

    The peregrine falcon Falco peregrinus is renowned for attacking its prey from high altitude in a fast controlled dive called a stoop. Many other raptors employ a similar mode of attack, but the functional benefits of stooping remain obscure. Here we investigate whether, when, and why stooping promotes catch success, using a three-dimensional, agent-based modeling approach to simulate attacks of falcons on aerial prey. We simulate avian flapping and gliding flight using an analytical quasi-steady model of the aerodynamic forces and moments, parametrized by empirical measurements of flight morphology. The model-birds’ flight control inputs are commanded by their guidance system, comprising a phenomenological model of its vision, guidance, and control. To intercept its prey, model-falcons use the same guidance law as missiles (pure proportional navigation); this assumption is corroborated by empirical data on peregrine falcons hunting lures. We parametrically vary the falcon’s starting position relative to its prey, together with the feedback gain of its guidance loop, under differing assumptions regarding its errors and delay in vision and control, and for three different patterns of prey motion. We find that, when the prey maneuvers erratically, high-altitude stoops increase catch success compared to low-altitude attacks, but only if the falcon’s guidance law is appropriately tuned, and only given a high degree of precision in vision and control. Remarkably, the optimal tuning of the guidance law in our simulations coincides closely with what has been observed empirically in peregrines. High-altitude stoops are shown to be beneficial because their high airspeed enables production of higher aerodynamic forces for maneuvering, and facilitates higher roll agility as the wings are tucked, each of which is essential to catching maneuvering prey at realistic response delays. PMID:29649207

  5. Invasive plant species and the new bioeconomy

    USDA-ARS?s Scientific Manuscript database

    Simulation models of management effects on weed demography and the experience of successful organic and low-external-input farmers point in the same direction: long-term weed management success depends on diversified strategies that attack multiple weed life stages. In an era of declining research b...

  6. Aircraft Survivability: Survivability 2000, On A Heading for Success, Spring 2000

    DTIC Science & Technology

    2000-01-01

    susceptibility to attack, vulnerability from attack, and overall combat effective - ness as the legislation establishing LFT&E requires. Our goal now is to set the...Munitions Effectiveness (JTCG/ME) to the Office of the Director, Operational Test and Evaluation (DOT&E), with management oversight from the Deputy...reduction—combined with standoff jamming, electromagnetic countermeasures (ECM) to degrade threat effective n e s s, and platform vulnerability reduc

  7. Continuous Security Metrics for Prevalent Network Threats: Introduction and First Four Metrics

    DTIC Science & Technology

    2012-05-22

    cyber at- tack. Recently, high -prole successful attacks have been detected against the International Mon- etary Fund, Citibank, Lockheed Martin, Google...RSA Security, Sony, and Oak Ridge National Laboratory[13]. These and other attacks have heightened securing networks as a high priority for many...of high -severity vulnerabilities found by network vulnerability scanners (e.g., [40]) and the numbers or percentages of hosts that are are not

  8. Responding to Terrorism: Challenges for Democracy. Teacher's Resource Book [and Student Text]. Public Policy Debate in the Classroom. Choices for the 21st Century Education Program.

    ERIC Educational Resources Information Center

    Blackadar, Andy

    This curriculum material, part of a continuing series on current and historical international issues, addresses the issues arising from the September 11, 2001, attacks on the World Trade Center and the Pentagon. On the morning of September 11, 2001, as people watched in horror, terrorist attacks were successfully launched against the United…

  9. Space occupation near the basket shapes collective behaviours in youth basketball.

    PubMed

    Esteves, Pedro T; Silva, Pedro; Vilar, Luís; Travassos, Bruno; Duarte, Ricardo; Arede, Jorge; Sampaio, Jaime

    2016-08-01

    This study aimed to analyse how youth basketball players explored numerical overloads during shot attempts by measuring their space occupation across specific court areas. Four process-tracing variables measured how the number of attackers (NA), number of defenders (ND), interpersonal distance between attacker and the closest defender (ID) and distance between attacker and the basket (DBkt) impacted on the performance outcome (converted shot; missed shot; ball possession lost). Ten competitive games involving 13 U14 teams were video recorded and players' displacements were digitised. The associations between performance outcomes and the process-tracing measures were assessed using standardised mean differences and a cross-correlation function. A multinomial logistic regression was used to calculate the odds ratio (OR) for each of the three possible outcomes. Results revealed that when shot attempts occurred at larger ID and at smaller DBkt, the possibilities to obtain a converted shot increased. The numerical overload of defenders near the scoring target was predominantly associated with offensive success. Also, the possibility of attackers to lead the spatial relation of movements with the defenders, near the scoring target, appeared as a prominent strategy to succeed. In sum, basketball teams that exhibit potential to adapt their collective behaviours to local changes in the environment might be closer to achieving successful outcomes.

  10. A stab in the dark: Design and construction of a novel device for conducting incised knife trauma investigations and its initial test.

    PubMed

    Humphrey, Caitlin; Kumaratilake, Jaliya; Henneberg, Maciej

    2016-05-01

    Knife attacks are commonly seen in Australia and other countries. During forensic investigations the force with which a wound was inflicted is often questioned. The ability to examine resultant trauma and particular weapons at different forces with an experimental device may lead to better interpretations of knife wounds. The objective of this study is to design, construct and test a device to analyse the characteristics and forces involved in knife attacks, particularly incised wounds. The mechanical variables (e.g. force, angle, knife geometry) involved in knife attacks have been considered to design and construct a suitable device which allows these variables to be systematically controlled and varied. A device was designed and constructed from mild steel. This included a pivoting arm and instrumented knife holder. The arm has adjustable angle and weight so that knives can be operated at different calculated forces. A device was successfully constructed and the repeatability of incised knife trauma and its characteristics in skeletal tissues were investigated. A device which allows reproducible and controlled experiments with knife wounds will be advantageous to forensic investigations. In particular, in determining forces and types of weapons associated with particular wounds, identifying or eliminating suspected weapons and more accurately answering the common question: How much force would be required to cause that particular wound. This could help to characterise the perpetrator. The device can be altered to be used in the future to investigate trauma caused by other weapons. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  11. A Novel Friendly Jamming Scheme in Industrial Crowdsensing Networks against Eavesdropping Attack.

    PubMed

    Li, Xuran; Wang, Qiu; Dai, Hong-Ning; Wang, Hao

    2018-06-14

    Eavesdropping attack is one of the most serious threats in industrial crowdsensing networks. In this paper, we propose a novel anti-eavesdropping scheme by introducing friendly jammers to an industrial crowdsensing network. In particular, we establish a theoretical framework considering both the probability of eavesdropping attacks and the probability of successful transmission to evaluate the effectiveness of our scheme. Our framework takes into account various channel conditions such as path loss, Rayleigh fading, and the antenna type of friendly jammers. Our results show that using jammers in industrial crowdsensing networks can effectively reduce the eavesdropping risk while having no significant influence on legitimate communications.

  12. Security in MANETs using reputation-adjusted routing

    NASA Astrophysics Data System (ADS)

    Ondi, Attila; Hoffman, Katherine; Perez, Carlos; Ford, Richard; Carvalho, Marco; Allen, William

    2009-04-01

    Mobile Ad-Hoc Networks enable communication in various dynamic environments, including military combat operations. Their open and shared communication medium enables new forms of attack that are not applicable for traditional wired networks. Traditional security mechanisms and defense techniques are not prepared to cope with the new attacks and the lack of central authorities make identity verifications difficult. This work extends our previous work in the Biologically Inspired Tactical Security Infrastructure to provide a reputation-based weighing mechanism for linkstate routing protocols to protect the network from attackers that are corrupting legitimate network traffic. Our results indicate that the approach is successful in routing network traffic around compromised computers.

  13. Microbial control of arthropod pests of tropical tree fruits.

    PubMed

    Dolinski, Claudia; Lacey, Lawrence A

    2007-01-01

    A multitude of insects and mites attack fruit crops throughout the tropics. The traditional method for controlling most of these pests is the application of chemical pesticides. Growing concern on the negative environmental effects has encouraged the development of alternatives. Inundatively and inoculatively applied microbial control agents (virus, bacteria, fungi, and entomopathogenic nematodes) have been developed as alternative control methods of a wide variety of arthropods including tropical fruit pests. The majority of the research and applications in tropical fruit agroecosystems has been conducted in citrus, banana, coconut, and mango. Successful microbial control initiatives of citrus pests and mites have been reported. Microbial control of arthropod pests of banana includes banana weevil, Cosmopolites sordidus Germar (Coleoptera: Curculionidae) (with EPNs and fungi) among others Oryctes rhinoceros (L.) is one of the most important pests of coconut and one of the most successful uses of non-occluded virus for classical biological control. Key pests of mango that have been controlled with microbial control agents include fruit flies (Diptera: Tephritidae) (with EPNs and fungi), and other pests. Also successful is the microbial control of arthropod pests of guava, papaya and pineapple. The challenge towards a broader application of entomopathogens is the development of successful combinations of entomopathogens, predators, and parasitoids along with other interventions to produce effective and sustainable pest management.

  14. Remote damage control during the attacks on Paris: Lessons learned by the Paris Fire Brigade and evolutions in the rescue system.

    PubMed

    Lesaffre, Xavier; Tourtier, Jean-Pierre; Violin, Yann; Frattini, Benoit; Rivet, Catherine; Stibbe, Olivier; Faure, Florian; Godefroy, Anne; Gallet, Jean-Claude; Ausset, Sylvain

    2017-06-01

    On November 13, 2015, in 40 minutes, Paris suffered four suicide bombers attacks; shootings at three different restaurant terraces; and an attack on the Bataclan concert hall, resulting in 130 dead and 495 wounded. How did the Parisian rescue system respond and how did it evolve since?We proved we could deploy quickly wide prehospital and hospital resources and teams' equipment and preparedness is being further developed. To secure a swifter initial response, we need a better integration of the operators of the rescue chain with a simpler and more robust organization as well as improved communications channels. We must continue to anticipate and prepare for possible future attacks.

  15. A Secured Authentication Protocol for SIP Using Elliptic Curves Cryptography

    NASA Astrophysics Data System (ADS)

    Chen, Tien-Ho; Yeh, Hsiu-Lien; Liu, Pin-Chuan; Hsiang, Han-Chen; Shih, Wei-Kuan

    Session initiation protocol (SIP) is a technology regularly performed in Internet Telephony, and Hyper Text Transport Protocol (HTTP) as digest authentication is one of the major methods for SIP authentication mechanism. In 2005, Yang et al. pointed out that HTTP could not resist server spoofing attack and off-line guessing attack and proposed a secret authentication with Diffie-Hellman concept. In 2009, Tsai proposed a nonce based authentication protocol for SIP. In this paper, we demonstrate that their protocol could not resist the password guessing attack and insider attack. Furthermore, we propose an ECC-based authentication mechanism to solve their issues and present security analysis of our protocol to show that ours is suitable for applications with higher security requirement.

  16. An experimental study of the effects of aft blowing on a 3.0 caliber tangent ogive body at high angles of attack

    NASA Technical Reports Server (NTRS)

    Gittner, Nathan M.; Chokani, Ndaona

    1991-01-01

    An experimental study of the effects of aft blowing on the forebody vortex asymmetry over a 3.0 caliber tangent ogive body at high angles of attack was conducted. The tip of the ogive body was equipped with a single blowing nozzle whose position could be adjusted. The tests were conducted in a subsonic wind tunnel at laminar flow conditions. The effects of model roll, angle of attack, blowing coefficient, and blowing nozzle axial position were independently studied. Surface pressure measurements and flow visualization results were obtained. Aft blowing was observed to alleviate the degree of vortex asymmetry at all angles of attack. The blowing was found to be more effective at the higher angles of attack. However, proportional control of the degree of vortex asymmetry was not observed, because the initial flowfield was highly asymmetric.

  17. An efficient collaborative approach for black hole attack discovery and mitigating its impact in manet

    NASA Astrophysics Data System (ADS)

    Devipriya, K.; Ivy, B. Persis Urbana; Prabha, D.

    2018-04-01

    A mobile ad hoc network (MANET) is an assemblage of nodes composed of mobile devices coupled in various ways wirelessly which do not have any central administration. Each node in MANET cooperates in forwarding packets in the network. This type of collaboration incurs high cost but there exits nodes that declines to cooperate leading to selfish conduct of nodes which effects overall network performance. To discover the attacks caused by such nodes, a renowned mechanism using watchdog can be deployed. In infrastructure less network attack detection and reaction and high false positives, false negatives initiating black hole attack becomes major issue in watchdog. This paper put forward a collaborative approach for identifying such attacks in MANET. Through abstract analysis and extensive simulation of this approach, the detection time of misbehaved nodes is reduced and substantial enhancement in overhead and throughput is witnessed.

  18. A macro-economic framework for evaluation of cyber security risks related to protection of intellectual property.

    PubMed

    Andrijcic, Eva; Horowitz, Barry

    2006-08-01

    The article is based on the premise that, from a macro-economic viewpoint, cyber attacks with long-lasting effects are the most economically significant, and as a result require more attention than attacks with short-lasting effects that have historically been more represented in literature. In particular, the article deals with evaluation of cyber security risks related to one type of attack with long-lasting effects, namely, theft of intellectual property (IP) by foreign perpetrators. An International Consequence Analysis Framework is presented to determine (1) the potential macro-economic consequences of cyber attacks that result in stolen IP from companies in the United States, and (2) the likely sources of such attacks. The framework presented focuses on IP theft that enables foreign companies to make economic gains that would have otherwise benefited the U.S. economy. Initial results are presented.

  19. Vulnerability Assessment of IPv6 Websites to SQL Injection and Other Application Level Attacks

    PubMed Central

    Cho, Ying-Chiang; Pan, Jen-Yi

    2013-01-01

    Given the proliferation of internet connected devices, IPv6 has been proposed to replace IPv4. Aside from providing a larger address space which can be assigned to internet enabled devices, it has been suggested that the IPv6 protocol offers increased security due to the fact that with the large number of addresses available, standard IP scanning attacks will no longer become feasible. However, given the interest in attacking organizations rather than individual devices, most initial points of entry onto an organization's network and their attendant devices are visible and reachable through web crawling techniques, and, therefore, attacks on the visible application layer may offer ways to compromise the overall network. In this evaluation, we provide a straightforward implementation of a web crawler in conjunction with a benign black box penetration testing system and analyze the ease at which SQL injection attacks can be carried out. PMID:24574863

  20. A Unique Fatal Moose Attack Mimicking Homicide.

    PubMed

    Gudmannsson, Petur; Berge, Johan; Druid, Henrik; Ericsson, Göran; Eriksson, Anders

    2018-03-01

    Fatalities caused by animal attacks are rare, but have the potential to mimic homicide. We present a case in which a moose attacked and killed a woman who was walking her dog in a forest. Autopsy showed widespread blunt trauma with a large laceration on one leg in which blades of grass were embedded. Flail chest was the cause of death. The case was initially conceived as homicide by means of a riding lawn mower. A review of the case by moose experts and analyses of biological trace material that proved to originate from moose, established the true source of injury. The dog probably provoked a moose, which, in response, stomped and gored the victim to death. The injuries resembled those previously reported from attacks by cattle and water buffalo. Fatal moose attacks constitute an extremely rare threat in boreal areas, but can be considered in traumatic deaths of unknown cause. © 2017 American Academy of Forensic Sciences.

  1. Vulnerability assessment of IPv6 websites to SQL injection and other application level attacks.

    PubMed

    Cho, Ying-Chiang; Pan, Jen-Yi

    2013-01-01

    Given the proliferation of internet connected devices, IPv6 has been proposed to replace IPv4. Aside from providing a larger address space which can be assigned to internet enabled devices, it has been suggested that the IPv6 protocol offers increased security due to the fact that with the large number of addresses available, standard IP scanning attacks will no longer become feasible. However, given the interest in attacking organizations rather than individual devices, most initial points of entry onto an organization's network and their attendant devices are visible and reachable through web crawling techniques, and, therefore, attacks on the visible application layer may offer ways to compromise the overall network. In this evaluation, we provide a straightforward implementation of a web crawler in conjunction with a benign black box penetration testing system and analyze the ease at which SQL injection attacks can be carried out.

  2. DMP: Detouring Using Multiple Paths against Jamming Attack for Ubiquitous Networking System

    PubMed Central

    Kim, Mihui; Chae, Kijoon

    2010-01-01

    To successfully realize the ubiquitous network environment including home automation or industrial control systems, it is important to be able to resist a jamming attack. This has recently been considered as an extremely threatening attack because it can collapse the entire network, despite the existence of basic security protocols such as encryption and authentication. In this paper, we present a method of jamming attack tolerant routing using multiple paths based on zones. The proposed scheme divides the network into zones, and manages the candidate forward nodes of neighbor zones. After detecting an attack, detour nodes decide zones for rerouting, and detour packets destined for victim nodes through forward nodes in the decided zones. Simulation results show that our scheme increases the PDR (Packet Delivery Ratio) and decreases the delay significantly in comparison with rerouting by a general routing protocol on sensor networks, AODV (Ad hoc On Demand Distance Vector), and a conventional JAM (Jammed Area Mapping) service with one reroute. PMID:22319316

  3. DMP: detouring using multiple paths against jamming attack for ubiquitous networking system.

    PubMed

    Kim, Mihui; Chae, Kijoon

    2010-01-01

    To successfully realize the ubiquitous network environment including home automation or industrial control systems, it is important to be able to resist a jamming attack. This has recently been considered as an extremely threatening attack because it can collapse the entire network, despite the existence of basic security protocols such as encryption and authentication. In this paper, we present a method of jamming attack tolerant routing using multiple paths based on zones. The proposed scheme divides the network into zones, and manages the candidate forward nodes of neighbor zones. After detecting an attack, detour nodes decide zones for rerouting, and detour packets destined for victim nodes through forward nodes in the decided zones. Simulation results show that our scheme increases the PDR (Packet Delivery Ratio) and decreases the delay significantly in comparison with rerouting by a general routing protocol on sensor networks, AODV (Ad hoc On Demand Distance Vector), and a conventional JAM (Jammed Area Mapping) service with one reroute.

  4. Effects of spanwise blowing on the pressure field and vortex-lift characteristics of a 44 deg swept trapezoidal wing. [wind tunnel stability tests - aircraft models

    NASA Technical Reports Server (NTRS)

    Campbell, J. F.

    1975-01-01

    Wind-tunnel data were obtained at a free-stream Mach number of 0.26 for a range of model angle of attack, jet thrust coefficient, and jet location. Results of this study show that the sectional effects to spanwise blowing are strongly dependent on angle of attack, jet thrust coefficient, and span location; the largest effects occur at the highest angles of attack and thrust coefficients and on the inboard portion of the wing. Full vortex lift was achieved at the inboard span station with a small blowing rate, but successively higher blowing rates were necessary to achieve full vortex lift at increased span distances. It is shown that spanwise blowing increases lift throughout the angle-of-attack range, delays wing stall to higher angles of attack, and improves the induced-drag polars. The leading-edge suction analogy can be used to estimate the section and total lifts resulting from spanwise blowing.

  5. Cytoskeleton reorganization/disorganization is a key feature of induced inaccessibility for defence to successive pathogen attacks.

    PubMed

    Moral, Juan; Montilla-Bascón, Gracia; Canales, Francisco J; Rubiales, Diego; Prats, Elena

    2017-06-01

    In this work, we investigated the involvement of the long-term dynamics of cytoskeletal reorganization on the induced inaccessibility phenomenon by which cells that successfully defend against a previous fungal attack become highly resistant to subsequent attacks. This was performed on pea through double inoculation experiments using inappropriate (Blumeria graminis f. sp. avenae, Bga) and appropriate (Erysiphe pisi, Ep) powdery mildew fungi. Pea leaves previously inoculated with Bga showed a significant reduction of later Ep infection relative to leaves inoculated only with Ep, indicating that cells had developed induced inaccessibility. This reduction in Ep infection was higher when the time interval between Bga and Ep inoculation ranged between 18 and 24 h, although increased penetration resistance in co-infected cells was observed even with time intervals of 24 days between inoculations. Interestingly, this increase in resistance to Ep following successful defence to the inappropriate Bga was associated with an increase in actin microfilament density that reached a maximum at 18-24 h after Bga inoculation and very slowly decreased afterwards. The putative role of cytoskeleton reorganization/disorganization leading to inaccessibility is supported by the suppression of the induced resistance mediated by specific actin (cytochalasin D, latrunculin B) or general protein (cycloheximide) inhibitors. © 2016 BSPP AND JOHN WILEY & SONS LTD.

  6. Analysis of characteristics associated with reinjection of icatibant: Results from the icatibant outcome survey.

    PubMed

    Longhurst, Hilary J; Aberer, Werner; Bouillet, Laurence; Caballero, Teresa; Fabien, Vincent; Zanichelli, Andrea; Maurer, Marcus

    2015-01-01

    Phase 3 icatibant trials showed that most hereditary angioedema (HAE) (C1 inhibitor deficiency) acute attacks were treated successfully with one injection of icatibant, a selective bradykinin B2 receptor antagonist. We conducted a post hoc analysis of icatibant reinjection for HAE type I and II attacks in a real-world setting by using data from the Icatibant Outcome Survey, an ongoing observational study that monitors the safety and effectiveness of icatibant treatment. Descriptive retrospective analyses of icatibant reinjection were performed on Icatibant Outcome Survey data (February 2008 to December 2012). New attacks were defined as the onset of new symptoms after full resolution of the previous attack. Potential associations between the patient and attack characteristics and reinjection were explored by using logistic regression analysis. Icatibant was administered for 652 attacks in 170 patients with HAE type I or II. Most attacks (89.1%) were treated with a single icatibant injection. For attacks that required two or three injections, the second injection was given a median of 11.0 hours after the first injection, with 90.4% of second injections administered ≥6 hours after the first injection. Time to resolution and attack duration were significantly longer for two or three injections versus one icatibant injection (p < 0.0001 and p < 0.05, respectively). Multivariate logistic regression analysis identified sex, attack severity, and laryngeal attacks as significantly correlated with reinjection (all p ≤ 0.05). These factors did not remain predictors for reinjection when two outlier patients with distinct patterns of icatibant use were excluded. In this real-world setting, most HAE attacks resolved with one icatibant injection. There was no distinct profile for patients or attacks that required reinjection when outliers with substantially different patterns of use were excluded. Because new attacks were not distinguished from the recurrence of symptoms, reinjection rates may be slightly higher than shown here. Clinical trial identifier: NCT01034969.

  7. Environmental Assessment, Los Angeles AFB Parking Structure

    DTIC Science & Technology

    2007-08-01

    signed legislation that defined the Anti - Terrorism and Force Protection requirements for military installations. Based on these requirements, surface...11, 2001 terrorist attacks occurred. Following these attacks, Congress passed, and the President signed, legislation that defined the Anti Terrorism ...and to provide the necessary anti - terrorism security, LAAFB has initiated a project to consolidate the surface parking at the Raytheon site into a

  8. Analysis of brute-force break-ins of a palmprint authentication system.

    PubMed

    Kong, Adams W K; Zhang, David; Kamel, Mohamed

    2006-10-01

    Biometric authentication systems are widely applied because they offer inherent advantages over classical knowledge-based and token-based personal-identification approaches. This has led to the development of products using palmprints as biometric traits and their use in several real applications. However, as biometric systems are vulnerable to replay, database, and brute-force attacks, such potential attacks must be analyzed before biometric systems are massively deployed in security systems. This correspondence proposes a projected multinomial distribution for studying the probability of successfully using brute-force attacks to break into a palmprint system. To validate the proposed model, we have conducted a simulation. Its results demonstrate that the proposed model can accurately estimate the probability. The proposed model indicates that it is computationally infeasible to break into the palmprint system using brute-force attacks.

  9. Coptoborus ochromactonus, n. sp. (Coleoptera: Curculionidae: Scolytinae), an emerging pest of cultivated balsa (Malvales: Malvaceae) in Ecuador.

    PubMed

    Stilwell, Abby R; Smith, Sarah M; Cognato, Anthony I; Martinez, Malena; Flowers, R Wills

    2014-04-01

    A new species of xyleborine ambrosia beetle has been found to attack balsa, Ochroma pyramidale (Cavanilles ex Lamarck) Urban, in Ecuador. Coptoborus ochromactonus Smith & Cognato is described and its biology is reported. Large-scale surveys were conducted between 2006 and 2009, and observational studies were carried out between 2010 and 2013 in Ecuadorian commercial plantations to determine life history and host preference characteristics. C. ochromactonus attacked balsa between 1.5 and 3 yr in age. Successful attacks were more prevalent in smaller diameter trees and unhealthy trees. In general, attacks and beetle-caused mortality were more prevalent during the dry summer months when trees were under more moisture and light stress. Fungal mycelia were consistently observed coating beetle galleries and are likely the true damaging agent to balsa trees.

  10. Protecting against cyber threats in networked information systems

    NASA Astrophysics Data System (ADS)

    Ertoz, Levent; Lazarevic, Aleksandar; Eilertson, Eric; Tan, Pang-Ning; Dokas, Paul; Kumar, Vipin; Srivastava, Jaideep

    2003-07-01

    This paper provides an overview of our efforts in detecting cyber attacks in networked information systems. Traditional signature based techniques for detecting cyber attacks can only detect previously known intrusions and are useless against novel attacks and emerging threats. Our current research at the University of Minnesota is focused on developing data mining techniques to automatically detect attacks against computer networks and systems. This research is being conducted as a part of MINDS (Minnesota Intrusion Detection System) project at the University of Minnesota. Experimental results on live network traffic at the University of Minnesota show that the new techniques show great promise in detecting novel intrusions. In particular, during the past few months our techniques have been successful in automatically identifying several novel intrusions that could not be detected using state-of-the-art tools such as SNORT.

  11. Aromatic hydrocarbon nitration under tropospheric and combustion conditions. A theoretical mechanistic study.

    PubMed

    Ghigo, Giovanni; Causà, Mauro; Maranzana, Andrea; Tonachini, Glauco

    2006-12-14

    The viability of some nitration pathways is explored for benzene (B), naphthalene (N), and in part pyrene (P). In principle, functionalization can either take place by direct nitration (NO2 or N2O5 attack) or be initiated by more reactive species, as the nitrate and hydroxyl radicals. The direct attack of the NO2 radical on B and N, followed by abstraction of the H geminal to the nitro group (most likely accomplished by 3O2) could yield the final nitro-derivatives. Nevertheless, the initial step (NO2 attack) involves significant free energy barriers. N2O5 proves to be an even worst nitrating agent. These results rule out direct nitration at room temperature. Instead, NO3 and, even more easily, HO can form pi-delocalized nitroxy- or hydroxycyclohexadienyl radicals. A subsequent NO2 attack can produce several regio- and diastereoisomers of nitroxy-nitro or hydroxy-nitro cyclohexadienes. In this respect, the competition between NO2 and O2 is considered: the rate ratios are such to indicate that the NO3 and HO initiated pathways are the major source of nitroarenes. Finally, if the two substituents are 1,2-trans, either a HNO3 or a H2O concerted elimination can give the nitro-derivatives. Whereas HNO3 elimination is feasible, H2O elimination presents, by contrast, a high barrier. Under combustion conditions the NO2 direct nitration pathway is more feasible, but remains a minor channel.

  12. Is the truth in the details? Extended narratives help distinguishing false "memories" from false "reports".

    PubMed

    Sjödén, Björn; Granhag, Pär Anders; Ost, James; Roos Af Hjelmsäter, Emma

    2009-06-01

    The present study examined the effects of fantasy proneness on false "reports" and false "memories", of existent and non-existent footage of a public event. We predicted that highly fantasy prone individuals would be more likely to stand by their initial claim of having seen a film of the event than low fantasy prone participants when prompted for more details about their experiences. Eighty creative arts students and 80 other students were asked whether they had seen CCTV footage preceding the attack on Swedish foreign minister Anna Lindh up to, and including, non-existent footage of the actual moment of the attack. If affirmative, they were probed for extended narratives of what they claimed to have seen. Overall, 64% of participants provided a false "report" by answering yes to the initial question. Of these, 30% provided no explicit details of the attack, and a further 15% retracted their initial answer in their narratives. This left 19% of the sample who appeared to have false "memories" because they provided explicit details of the actual moment of the attack. Women scored higher than men and art students scored higher than other students on fantasy proneness, but there was no effect on levels of false reporting or false "memory". Memories were rated more vivid and clear for existent compared to non-existent aspects of the event. In sum, these data suggest a more complex relationship between memory distortions and fantasy proneness than previously observed.

  13. An Attack on Inclusive Education in Secondary Education. Limitations in Initial Teacher Training in Spain

    ERIC Educational Resources Information Center

    López-Torrijo, Manuel; Mengual-Andrés, Santiago

    2015-01-01

    Inclusive education is hard to implement in secondary schools. Probably, one of the determining factors lies in teachers' initial training that determines their attitude, identity and professional practice. This research analyses the initial teacher education programmes for Secondary Education, Higher Secondary Education, called…

  14. An ontology of geo-reasoning to support medical response to attacks with weapons of mass destruction.

    PubMed

    Kirsh, David; Peterson, Nichole; Lenert, Leslie A

    2005-01-01

    We study how Metropolitan Medical Response System units conceptualize the physical space of a disaster and their organized response. Using a variety of ethnographic methods before, during, and after a disaster drill, we have developed an initial ontology for geospatial and context-aware technology. The conceptual map of first responders is far more complex than a geographical map. Zones and Areas are used to describe documented concepts critical to MMRS operations. Ad hoc locations also play a critical role, helping first responders communicate tactics in spatial terms. Such distinctions play an important role in the way our experts think about their activity. Successful geoaware alerting systems must incorporate these notions if they are to seamlessly fit into the work flow of first responders.

  15. Structural Investigation of Fluoridated POSS Cages Using Ion Mobility Mass Spectrometry and Molecular Mechanics (Preprint)

    DTIC Science & Technology

    2008-01-09

    organic polymer. For example, the low surface energy properties of fluorinated POSS compounds have been used to augment both fluorinated and non... fluorinated polymers.10-13 Many POSS monomers have been successfully characterized using MALDI techniques14-16 in conjunction with ion mobility mass...nucleophilic attack, are shown in blue. Negative contours, showing susceptibility to electrophilic attack, are shown in red. The positive contour of

  16. Construction of a Cyber Attack Model for Nuclear Power Plants

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Varuttamaseni, Athi; Bari, Robert A.; Youngblood, Robert

    The consideration of how one compromised digital equipment can impact neighboring equipment is critical to understanding the progression of cyber attacks. The degree of influence that one component may have on another depends on a variety of factors, including the sharing of resources such as network bandwidth or processing power, the level of trust between components, and the inclusion of segmentation devices such as firewalls. The interactions among components via mechanisms that are unique to the digital world are not usually considered in traditional PRA. This means potential sequences of events that may occur during an attack may be missedmore » if one were to only look at conventional accident sequences. This paper presents a method where, starting from the initial attack vector, the progression of a cyber attack can be modeled. The propagation of the attack is modeled by considering certain attributes of the digital components in the system. These attributes determine the potential vulnerability of a component to a class of attack and the capability gained by the attackers once they are in control of the equipment. The use of attributes allows similar components (components with the same set of attributes) to be modeled in the same way, thereby reducing the computing resources required for analysis of large systems.« less

  17. Improved statistical analysis of moclobemide dose effects on panic disorder treatment.

    PubMed

    Ross, Donald C; Klein, Donald F; Uhlenhuth, E H

    2010-04-01

    Clinical trials with several measurement occasions are frequently analyzed using only the last available observation as the dependent variable [last observation carried forward (LOCF)]. This ignores intermediate observations. We reanalyze, with complete data methods, a clinical trial previously reported using LOCF, comparing placebo and five dosage levels of moclobemide in the treatment of outpatients with panic disorder to illustrate the superiority of methods using repeated observations. We initially analyzed unprovoked and situational, major and minor attacks as the four dependent variables, by repeated measures maximum likelihood methods. The model included parameters for linear and curvilinear time trends and regression of measures during treatment on baseline measures. Significance tests using this method take into account the structure of the error covariance matrix. This makes the sphericity assumption irrelevant. Missingness is assumed to be unrelated to eventual outcome and the residuals are assumed to have a multivariate normal distribution. No differential treatment effects for limited attacks were found. Since similar results were obtained for both types of major attack, data for the two types of major attack were combined. Overall downward linear and negatively accelerated downward curvilinear time trends were found. There were highly significant treatment differences in the regression slopes of scores during treatment on baseline observations. For major attacks, all treatment groups improved over time. The flatter regression slopes, obtained with higher doses, indicated that higher doses result in uniformly lower attack rates regardless of initial severity. Lower doses do not lower the attack rate of severely ill patients to those achieved in the less severely ill. The clinical implication is that more severe patients require higher doses to attain best benefit. Further, the significance levels obtained by LOCF analyses were only in the 0.05-0.01 range, while significance levels of <0.00001 were obtained by these repeated measures analyses indicating increased power. The greater sensitivity to treatment effect of this complete data method is illustrated. To increase power, it is often recommended to increase sample size. However, this is often impractical since a major proportion of the cost per subject is due to the initial evaluation. Increasing the number of repeated observations increases power economically and also allows detailed longitudinal trajectory analyses.

  18. Security attack detection algorithm for electric power gis system based on mobile application

    NASA Astrophysics Data System (ADS)

    Zhou, Chao; Feng, Renjun; Wang, Liming; Huang, Wei; Guo, Yajuan

    2017-05-01

    Electric power GIS is one of the key information technologies to satisfy the power grid construction in China, and widely used in power grid construction planning, weather, and power distribution management. The introduction of electric power GIS based on mobile applications is an effective extension of the geographic information system that has been widely used in the electric power industry. It provides reliable, cheap and sustainable power service for the country. The accurate state estimation is the important conditions to maintain the normal operation of the electric power GIS. Recent research has shown that attackers can inject the complex false data into the power system. The injection attack of this new type of false data (load integrity attack LIA) can successfully bypass the routine detection to achieve the purpose of attack, so that the control center will make a series of wrong decision. Eventually, leading to uneven distribution of power in the grid. In order to ensure the safety of the electric power GIS system based on mobile application, it is very important to analyze the attack mechanism and propose a new type of attack, and to study the corresponding detection method and prevention strategy in the environment of electric power GIS system based on mobile application.

  19. Spatiotemporal Patterns and Predictability of Cyberattacks

    PubMed Central

    Chen, Yu-Zhong; Huang, Zi-Gang; Xu, Shouhuai; Lai, Ying-Cheng

    2015-01-01

    A relatively unexplored issue in cybersecurity science and engineering is whether there exist intrinsic patterns of cyberattacks. Conventional wisdom favors absence of such patterns due to the overwhelming complexity of the modern cyberspace. Surprisingly, through a detailed analysis of an extensive data set that records the time-dependent frequencies of attacks over a relatively wide range of consecutive IP addresses, we successfully uncover intrinsic spatiotemporal patterns underlying cyberattacks, where the term “spatio” refers to the IP address space. In particular, we focus on analyzing macroscopic properties of the attack traffic flows and identify two main patterns with distinct spatiotemporal characteristics: deterministic and stochastic. Strikingly, there are very few sets of major attackers committing almost all the attacks, since their attack “fingerprints” and target selection scheme can be unequivocally identified according to the very limited number of unique spatiotemporal characteristics, each of which only exists on a consecutive IP region and differs significantly from the others. We utilize a number of quantitative measures, including the flux-fluctuation law, the Markov state transition probability matrix, and predictability measures, to characterize the attack patterns in a comprehensive manner. A general finding is that the attack patterns possess high degrees of predictability, potentially paving the way to anticipating and, consequently, mitigating or even preventing large-scale cyberattacks using macroscopic approaches. PMID:25992837

  20. Spatiotemporal patterns and predictability of cyberattacks.

    PubMed

    Chen, Yu-Zhong; Huang, Zi-Gang; Xu, Shouhuai; Lai, Ying-Cheng

    2015-01-01

    A relatively unexplored issue in cybersecurity science and engineering is whether there exist intrinsic patterns of cyberattacks. Conventional wisdom favors absence of such patterns due to the overwhelming complexity of the modern cyberspace. Surprisingly, through a detailed analysis of an extensive data set that records the time-dependent frequencies of attacks over a relatively wide range of consecutive IP addresses, we successfully uncover intrinsic spatiotemporal patterns underlying cyberattacks, where the term "spatio" refers to the IP address space. In particular, we focus on analyzing macroscopic properties of the attack traffic flows and identify two main patterns with distinct spatiotemporal characteristics: deterministic and stochastic. Strikingly, there are very few sets of major attackers committing almost all the attacks, since their attack "fingerprints" and target selection scheme can be unequivocally identified according to the very limited number of unique spatiotemporal characteristics, each of which only exists on a consecutive IP region and differs significantly from the others. We utilize a number of quantitative measures, including the flux-fluctuation law, the Markov state transition probability matrix, and predictability measures, to characterize the attack patterns in a comprehensive manner. A general finding is that the attack patterns possess high degrees of predictability, potentially paving the way to anticipating and, consequently, mitigating or even preventing large-scale cyberattacks using macroscopic approaches.

  1. Interpersonal coordination tendencies shape 1-vs-1 sub-phase performance outcomes in youth soccer.

    PubMed

    Duarte, Ricardo; Araújo, Duarte; Davids, Keith; Travassos, Bruno; Gazimba, Vítor; Sampaio, Jaime

    2012-05-01

    This study investigated the influence of interpersonal coordination tendencies on performance outcomes of 1-vs-1 sub-phases in youth soccer. Eight male developing soccer players (age: 11.8 ± 0.4 years; training experience: 3.6 ± 1.1 years) performed an in situ simulation of a 1-vs-1 sub-phase of soccer. Data from 82 trials were obtained with motion-analysis techniques, and relative phase used to measure the space-time coordination tendencies of attacker-defender dyads. Approximate entropy (ApEn) was then used to quantify the unpredictability of interpersonal interactions over trials. Results revealed how different modes of interpersonal coordination emerging from attacker-defender dyads influenced the 1-vs-1 performance outcomes. High levels of space-time synchronisation (47%) and unpredictability in interpersonal coordination processes (ApEn: 0.91 ± 0.34) were identified as key features of an attacking player's success. A lead-lag relation attributed to a defending player (34% around -30° values) and a more predictable coordination mode (ApEn: 0.65 ± 0.27, P < 0.001), demonstrated the coordination tendencies underlying the success of defending players in 1-vs-1 sub-phases. These findings revealed how the mutual influence of each player on the behaviour of dyadic systems shaped emergent performance outcomes. More specifically, the findings showed that attacking players should be constrained to exploit the space-time synchrony with defenders in an unpredictable and creative way, while defenders should be encouraged to adopt postures and behaviours that actively constrain the attacker's actions.

  2. Monitoring the Attack Incidences and Damage Caused by the Almond Bark Beetle, Scolytus amygdali, in Almond Orchards

    PubMed Central

    Cuthbertson, Andrew G. S.; Braham, Mohamed

    2018-01-01

    The almond bark beetle, Scolytus amygdali Geurin-Meneville, is responsible for significant loss of fruit production in almond orchards throughout the world. Here, we studied the damage and the incidences of S. amygdali attack on two different scales: (1) at the level of a single tree; and (2) in an entire orchard. Our results revealed no differences in attack level among four orientations (east, west, south and north sides) for the whole tree. However, the bark that was facing west side in the direction of the prevailing wind was found to be the most suitable for females to initiate attack in Stratum S2. Attack distribution remains the same among different strata (strata is vertical divisions of the tree from the ground to the uppermost twigs with ~40 cm intervals). More than 50% of attack was observed in the trunk of the tree and upper strata. However, multiplication rate (number of emerged adults/maternal gallery) varies significantly between strata. In addition, we studied attack intensity (holes produced by beetle per tree) comparing it to tree morphology (flowers, leaves and circumferences) and gum deposit. Our results revealed a positive correlation between attack intensity and gum deposits, and a negative correlation between attack intensity and tree morphology. This revealed that gum on the tree was an indicator for attack intensity. A positive correlation between attack intensity and the circumference of the tree revealed that older trees were more susceptible to S. amygdali attack. These results, while preliminary, aim to help in the monitoring of S. amygdali populations before deciding to apply any control measures. PMID:29301271

  3. Flowing water affects fish fast-starts: escape performance of the Hawaiian stream goby, Sicyopterus stimpsoni.

    PubMed

    Diamond, Kelly M; Schoenfuss, Heiko L; Walker, Jeffrey A; Blob, Richard W

    2016-10-01

    Experimental measurements of escape performance in fishes have typically been conducted in still water; however, many fishes inhabit environments with flow that could impact escape behavior. We examined the influences of flow and predator attack direction on the escape behavior of fish, using juveniles of the amphidromous Hawaiian goby Sicyopterus stimpsoni In nature, these fish must escape ambush predation while moving through streams with high-velocity flow. We measured the escape performance of juvenile gobies while exposing them to a range of water velocities encountered in natural streams and stimulating fish from three different directions. Frequency of response across treatments indicated strong effects of flow conditions and attack direction. Juvenile S. stimpsoni had uniformly high response rates for attacks from a caudal direction (opposite flow); however, response rates for attacks from a cranial direction (matching flow) decreased dramatically as flow speed increased. Mechanical stimuli produced by predators attacking in the same direction as flow might be masked by the flow environment, impairing the ability of prey to detect attacks. Thus, the likelihood of successful escape performance in fishes can depend critically on environmental context. © 2016. Published by The Company of Biologists Ltd.

  4. Three tenets for secure cyber-physical system design and assessment

    NASA Astrophysics Data System (ADS)

    Hughes, Jeff; Cybenko, George

    2014-06-01

    This paper presents a threat-driven quantitative mathematical framework for secure cyber-physical system design and assessment. Called The Three Tenets, this originally empirical approach has been used by the US Air Force Research Laboratory (AFRL) for secure system research and development. The Tenets were first documented in 2005 as a teachable methodology. The Tenets are motivated by a system threat model that itself consists of three elements which must exist for successful attacks to occur: - system susceptibility; - threat accessibility and; - threat capability. The Three Tenets arise naturally by countering each threat element individually. Specifically, the tenets are: Tenet 1: Focus on What's Critical - systems should include only essential functions (to reduce susceptibility); Tenet 2: Move Key Assets Out-of-Band - make mission essential elements and security controls difficult for attackers to reach logically and physically (to reduce accessibility); Tenet 3: Detect, React, Adapt - confound the attacker by implementing sensing system elements with dynamic response technologies (to counteract the attackers' capabilities). As a design methodology, the Tenets mitigate reverse engineering and subsequent attacks on complex systems. Quantified by a Bayesian analysis and further justified by analytic properties of attack graph models, the Tenets suggest concrete cyber security metrics for system assessment.

  5. Detection of abnormal item based on time intervals for recommender systems.

    PubMed

    Gao, Min; Yuan, Quan; Ling, Bin; Xiong, Qingyu

    2014-01-01

    With the rapid development of e-business, personalized recommendation has become core competence for enterprises to gain profits and improve customer satisfaction. Although collaborative filtering is the most successful approach for building a recommender system, it suffers from "shilling" attacks. In recent years, the research on shilling attacks has been greatly improved. However, the approaches suffer from serious problem in attack model dependency and high computational cost. To solve the problem, an approach for the detection of abnormal item is proposed in this paper. In the paper, two common features of all attack models are analyzed at first. A revised bottom-up discretized approach is then proposed based on time intervals and the features for the detection. The distributions of ratings in different time intervals are compared to detect anomaly based on the calculation of chi square distribution (χ(2)). We evaluated our approach on four types of items which are defined according to the life cycles of these items. The experimental results show that the proposed approach achieves a high detection rate with low computational cost when the number of attack profiles is more than 15. It improves the efficiency in shilling attacks detection by narrowing down the suspicious users.

  6. External Threat Risk Assessment Algorithm (ExTRAA)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Powell, Troy C.

    Two risk assessment algorithms and philosophies have been augmented and combined to form a new algorit hm, the External Threat Risk Assessment Algorithm (ExTRAA), that allows for effective and statistically sound analysis of external threat sources in relation to individual attack methods . In addition to the attack method use probability and the attack method employment consequence, t he concept of defining threat sources is added to the risk assessment process. Sample data is tabulated and depicted in radar plots and bar graphs for algorithm demonstration purposes. The largest success of ExTRAA is its ability to visualize the kind ofmore » r isk posed in a given situation using the radar plot method.« less

  7. Explaining rapid reinfections in multiple-wave influenza outbreaks: Tristan da Cunha 1971 epidemic as a case study

    PubMed Central

    Camacho, Anton; Ballesteros, Sébastien; Graham, Andrea L.; Carrat, Fabrice; Ratmann, Oliver; Cazelles, Bernard

    2011-01-01

    Influenza usually spreads through the human population in multiple-wave outbreaks. Successive reinfection of individuals over a short time interval has been explicitly reported during past pandemics. However, the causes of rapid reinfection and the role of reinfection in driving multiple-wave outbreaks remain poorly understood. To investigate these issues, we focus on a two-wave influenza A/H3N2 epidemic that occurred on the remote island of Tristan da Cunha in 1971. Over 59 days, 273 (96%) of 284 islanders experienced at least one attack and 92 (32%) experienced two attacks. We formulate six mathematical models invoking a variety of antigenic and immunological reinfection mechanisms. Using a maximum-likelihood analysis to confront model predictions with the reported incidence time series, we demonstrate that only two mechanisms can be retained: some hosts with either a delayed or deficient humoral immune response to the primary influenza infection were reinfected by the same strain, thus initiating the second epidemic wave. Both mechanisms are supported by previous empirical studies and may arise from a combination of genetic and ecological causes. We advocate that a better understanding and account of heterogeneity in the human immune response are essential to analysis of multiple-wave influenza outbreaks and pandemic planning. PMID:21525058

  8. Bagworm bags as portable armour against invertebrate predators.

    PubMed

    Sugiura, Shinji

    2016-01-01

    Some animals have evolved the use of environmental materials as "portable armour" against natural enemies. Portable bags that bagworm larvae (Lepidoptera: Psychidae) construct using their own silk and plant parts are generally believed to play an important role as a physical barrier against natural enemies. However, no experimental studies have tested the importance of bags as portable armour against predators. To clarify the defensive function, I studied the bagworm Eumeta minuscula and a potential predator Calosoma maximoviczi (Coleoptera: Carabidae). Under laboratory conditions, all bagworm larvae were attacked by carabid adults, but successfully defended themselves against the predators' mandibles using their own bags. The portable bags, which are composed mainly of host plant twigs, may function as a physical barrier against predator mandibles. To test this hypothesis, I removed the twig bags and replaced some with herb leaf bags; all bag-removed larvae were easily caught and predated by carabids, while all bag-replaced larvae could successfully defend themselves against carabid attacks. Therefore, various types of portable bags can protect bagworm larvae from carabid attacks. This is the first study to test the defensive function of bagworm portable bags against invertebrate predators.

  9. Lessons learned from the New York State mental health response to the September 11, 2001, attacks.

    PubMed

    Sederer, Lloyd I; Lanzara, Carol B; Essock, Susan M; Donahue, Sheila A; Stone, James L; Galea, Sandro

    2011-09-01

    In the aftermath of the September 11, 2001, attacks on the World Trade Center, the public mental health system in New York City mounted the largest mental health disaster response in history, called Project Liberty. The successes and challenges of Project Liberty are evaluated. The development of Project Liberty is summarized and analyzed from the perspective of the New York State and New York City officials and scientists who led the disaster response. Lessons learned that have implications for mental health support in future disaster responses are offered. A high level of interagency collaboration, engagement of nongovernmental organizations to provide services, media education efforts, and ongoing program evaluation all contributed to the program's successes. Mental health professionals' limited experiences with trauma, options for funding treatment, duration of clinical program, and existing needs assessments methodologies all proved challenging. Project Liberty was a massive and invaluable resource during the years of rebuilding in New York City in the wake of the attacks. Challenges faced have led to lessons of generalizable import for other mental health responses to large-scale events.

  10. Colonization of weakened trees by mass-attacking bark beetles: no penalty for pioneers, scattered initial distributions and final regular patterns

    PubMed Central

    Gabriel, Edith; Louis, Marceau; Deneubourg, Jean-Louis; Grégoire, Jean-Claude

    2018-01-01

    Bark beetles use aggregation pheromones to promote group foraging, thus increasing the chances of an individual to find a host and, when relevant, to overwhelm the defences of healthy trees. When a male beetle finds a suitable host, it releases pheromones that attract potential mates as well as other ‘spying’ males, which result in aggregations on the new host. To date, most studies have been concerned with the use of aggregation pheromones by bark beetles to overcome the defences of living, well-protected trees. How insects behave when facing undefended or poorly defended hosts remains largely unknown. The spatio-temporal pattern of resource colonization by the European eight-toothed spruce bark beetle, Ips typographus, was quantified when weakly defended hosts (fallen trees) were attacked. In many of the replicates, colonization began with the insects rapidly scattering over the available surface and then randomly filling the gaps until a regular distribution was established, which resulted in a constant decrease in nearest-neighbour distances to a minimum below which attacks were not initiated. The scattered distribution of the first attacks suggested that the trees were only weakly defended. A minimal theoretical distance of 2.5 cm to the earlier settlers (corresponding to a density of 3.13 attacks dm−2) was calculated, but the attack density always remained lower, between 0.4 and 1.2 holes dm−2, according to our observations. PMID:29410791

  11. Effects of Angle of Attack and Velocity on Trailing Edge Noise

    NASA Technical Reports Server (NTRS)

    Hutcheson, Florence V.; Brooks, Thomas F.

    2006-01-01

    Trailing edge (TE) noise measurements for a NACA 63-215 airfoil model are presented, providing benchmark experimental data for a cambered airfoil. The effects of flow Mach number and angle of attack of the airfoil model with different TE bluntnesses are shown. Far-field noise spectra and directivity are obtained using a directional microphone array. Standard and diagonal removal beamforming techniques are evaluated employing tailored weighting functions for quantitatively accounting for the distributed line character of TE noise. Diagonal removal processing is used for the primary database as it successfully removes noise contaminates. Some TE noise predictions are reported to help interpret the data, with respect to flow speed, angle of attack, and TE bluntness on spectral shape and peak levels. Important findings include the validation of a TE noise directivity function for different airfoil angles of attack and the demonstration of the importance of the directivity function s convective amplification terms.

  12. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hoette, Trisha Marie

    Throughout history, as new chemical threats arose, strategies for the defense against chemical attacks have also evolved. As a part of an Early Career Laboratory Directed Research and Development project, a systems analysis of past, present, and future chemical terrorism scenarios was performed to understand how the chemical threats and attack strategies change over time. For the analysis, the difficulty in executing chemical attack was evaluated within a framework of three major scenario elements. First, historical examples of chemical terrorism were examined to determine how the use of chemical threats, versus other weapons, contributed to the successful execution of themore » attack. Using the same framework, the future of chemical terrorism was assessed with respect to the impact of globalization and new technologies. Finally, the efficacy of the current defenses against contemporary chemical terrorism was considered briefly. The results of this analysis justify the need for continued diligence in chemical defense.« less

  13. [Kurschmann-Steinert myotonic dystrophia and Adams-Stoke attacks. Successful treatment of arrhythmia by means of pacemaker implantation].

    PubMed

    Bieler, M; Sefidpar, M; Engel, U R; Reutter, F W

    1976-11-20

    The case is reported of a 39-year-old male with Steinert's dystrophia myotonica complicated by cardiac arrhythmias manifested by high-degree a-v block with Stokes-Adams attacks. Implantation of a demand-type cardiac pacemaker brought prompt relief from cardiac symptoms and the patient was able to resume work. The pathologico-anatomical findings in dystrophia myotonica are discussed, together with their possible connection with the type of arrhythmias described.

  14. The Coast Artillery Journal. Volume 74, Number 6, September-October 1931

    DTIC Science & Technology

    1931-10-01

    Towns with the Primary Mission of Denying Such Towns to the Bandits This form of occupation became necessary in Nicar- agua in the summer and fall of 1927...such never materialized. Surprise Attacks on Bandit Camps Our first successful attack of this nature in Nicar- agua occurred in the first part of...complete reorganization of her military forces. Com- pulsory training is abolished. How difficult her situ - ation has become may be realized from the

  15. From Successful Defense to Problematic Offense: The Devolution of Unconventional Warfare

    DTIC Science & Technology

    2016-12-01

    elections.37 Utilizing a $10 million budget, the SPG began laundering money and delivering it to anti-communist political organizations,38 while also...worst long-term consequences of any UW campaign. After the Soviets invaded Afghanistan, the U.S. started funneling money , weapons, and training to...to be used as a planning base for the 9/11 attacks. Fifteen years after those attacks, the U.S. remains engaged in Afghanistan, spending money and

  16. A model for warfare in stratified small-scale societies: The effect of within-group inequality.

    PubMed

    Pandit, Sagar; Pradhan, Gauri; van Schaik, Carel

    2017-01-01

    In order to predict the features of non-raiding human warfare in small-scale, socially stratified societies, we study a coalitionary model of war that assumes that individuals participate voluntarily because their decisions serve to maximize fitness. Individual males join the coalition if war results in a net economic and thus fitness benefit. Within the model, viable offensive war ensues if the attacking coalition of males can overpower the defending coalition. We assume that the two groups will eventually fuse after a victory, with ranks arranged according to the fighting abilities of all males and that the new group will adopt the winning group's skew in fitness payoffs. We ask whether asymmetries in skew, group size and the amount of resources controlled by a group affect the likelihood of successful war. The model shows, other things being equal, that (i) egalitarian groups are more likely to defeat their more despotic enemies, even when these are stronger, (ii) defection to enemy groups will be rare, unless the attacked group is far more despotic than the attacking one, and (iii) genocidal war is likely under a variety of conditions, in particular when the group under attack is more egalitarian. This simple optimality model accords with several empirically observed correlations in human warfare. Its success underlines the important role of egalitarianism in warfare.

  17. A model for warfare in stratified small-scale societies: The effect of within-group inequality

    PubMed Central

    Pandit, Sagar; van Schaik, Carel

    2017-01-01

    In order to predict the features of non-raiding human warfare in small-scale, socially stratified societies, we study a coalitionary model of war that assumes that individuals participate voluntarily because their decisions serve to maximize fitness. Individual males join the coalition if war results in a net economic and thus fitness benefit. Within the model, viable offensive war ensues if the attacking coalition of males can overpower the defending coalition. We assume that the two groups will eventually fuse after a victory, with ranks arranged according to the fighting abilities of all males and that the new group will adopt the winning group’s skew in fitness payoffs. We ask whether asymmetries in skew, group size and the amount of resources controlled by a group affect the likelihood of successful war. The model shows, other things being equal, that (i) egalitarian groups are more likely to defeat their more despotic enemies, even when these are stronger, (ii) defection to enemy groups will be rare, unless the attacked group is far more despotic than the attacking one, and (iii) genocidal war is likely under a variety of conditions, in particular when the group under attack is more egalitarian. This simple optimality model accords with several empirically observed correlations in human warfare. Its success underlines the important role of egalitarianism in warfare. PMID:29228014

  18. Erosion of aluminum 6061-T6 under cavitation attack in mineral oil and water

    NASA Technical Reports Server (NTRS)

    Rao, B. C. S.; Buckley, D. H.

    1985-01-01

    Studies of the erosion of aluminum 6061-T6 under cavitation attack in distilled water, ordinary tap water and a viscous mineral oil are presented. The mean depth of penetration for the mineral oil was about 40 percent of that for water at the end of a 40 min test. The mean depth of penetration and its rate did not differ significantly for distilled and tap water. The mean depth of penetration rate for both distilled and tap water increased to a maximum and then decreased with test duration, while that for mineral oil had a maximum during the initial period. The ratio h/2a of the pit depth h to the pit diameter 2a varied from 0.04 to 0.13 in water and from 0.06 to 0.20 in mineral oil. Scanning electron microscopy indicates that the pits are initially formed over the grain boundaries and precipitates while the surface grains are deformed under cavitation attack.

  19. Mathematical modeling of Avian Influenza epidemic with bird vaccination in constant population

    NASA Astrophysics Data System (ADS)

    Kharis, M.; Amidi

    2018-03-01

    The development of the industrial world and human life is increasingly modern and less attention to environmental sustainability causes the virus causes the epidemic has a high tendency to mutate so that the virus that initially only attack animals, is also found to have the ability to attack humans. The epidemics that lasted some time were bird flu epidemics and swine flu epidemics. The flu epidemic led to several deaths and many people admitted to the hospital. Strain (derivatives) of H5N1 virus was identified as the cause of the bird flu epidemic while the H1N1 strain of the virus was identified as the cause of the swine flu epidemic. The symptoms are similar to seasonal flu caused by H3N2 strain of the virus. Outbreaks of bird flu and swine flu initially only attacked animals, but over time some people were found to be infected with the virus.

  20. Leachability of uranium and other elements from freshly erupted volcanic ash

    USGS Publications Warehouse

    Smith, D.B.; Zielinski, R.A.; Rose, W.I.

    1982-01-01

    A study of leaching of freshly erupted basaltic and dacitic air-fall ash and bomb fragment samples, unaffected by rain, shows that glass dissolution is the dominant process by which uranium is initially mobilized from air-fall volcanic ash. Si, Li, and V are also preferentially mobilized by glass dissolution. Gaseous transfer followed by fixation of soluble uranium species on volcanic-ash particles is not an important process affecting uranium mobility. Gaseous transfer, however, may be important in forming water-soluble phases, adsorbed to ash surfaces, enriched in the economically and environmentally important elements Zn, Cu, Cd, Pb, B, F, and Ba. Quick removal of these adsorbed elements by the first exposure of freshly erupted ash to rain and surface water may pose short-term hazards to certain forms of aquatic and terrestrial life. Such rapid release of material may also represent the first step in transportation of economically important elements to environments favorable for precipitation into deposits of commercial interest. Ash samples collected from the active Guatemalan volcanoes Fuego and Pacaya (high-Al basalts) and Santiaguito (hornblende-hypersthene dacite); bomb fragments from Augustine volcano (andesite-dacite), Alaska, and Heimaey (basalt), Vestmann Islands, Iceland; and fragments of "rhyolitic" pumice from various historic eruptions were subjected to three successive leaches with a constant water-to-ash weight ratio of 4:1. The volcanic material was successively leached by: (1) distilled-deionized water (pH = 5.0-5.5) at room temperature for 24 h, which removes water-soluble gases and salts adsorbed on ash surfaces during eruption; (2) dilute HCl solution (pH = 3.5-4.0) at room temperature for 24 h, which continues the attack initiated by the water and also attacks acid-soluble sulfides and oxides; (3) a solution 0.05 M in both Na,CO, and NaHCO, (pH = 9.9) at 80°C for one week, which preferentially dissolves volcanic glass. The first two leaches mimic interaction of ash with rain produced in the vicinity of an active eruption. The third leach accelerates the effect of prolonged contact of volcanic ash with alkaline ground water present during ash diagenesis.

  1. Analyzing Cyber-Physical Threats on Robotic Platforms.

    PubMed

    Ahmad Yousef, Khalil M; AlMajali, Anas; Ghalyon, Salah Abu; Dweik, Waleed; Mohd, Bassam J

    2018-05-21

    Robots are increasingly involved in our daily lives. Fundamental to robots are the communication link (or stream) and the applications that connect the robots to their clients or users. Such communication link and applications are usually supported through client/server network connection. This networking system is amenable of being attacked and vulnerable to the security threats. Ensuring security and privacy for robotic platforms is thus critical, as failures and attacks could have devastating consequences. In this paper, we examine several cyber-physical security threats that are unique to the robotic platforms; specifically the communication link and the applications. Threats target integrity, availability and confidential security requirements of the robotic platforms, which use MobileEyes/arnlServer client/server applications. A robot attack tool (RAT) was developed to perform specific security attacks. An impact-oriented approach was adopted to analyze the assessment results of the attacks. Tests and experiments of attacks were conducted in simulation environment and physically on the robot. The simulation environment was based on MobileSim; a software tool for simulating, debugging and experimenting on MobileRobots/ActivMedia platforms and their environments. The robot platform PeopleBot TM was used for physical experiments. The analysis and testing results show that certain attacks were successful at breaching the robot security. Integrity attacks modified commands and manipulated the robot behavior. Availability attacks were able to cause Denial-of-Service (DoS) and the robot was not responsive to MobileEyes commands. Integrity and availability attacks caused sensitive information on the robot to be hijacked. To mitigate security threats, we provide possible mitigation techniques and suggestions to raise awareness of threats on the robotic platforms, especially when the robots are involved in critical missions or applications.

  2. Analyzing Cyber-Physical Threats on Robotic Platforms †

    PubMed Central

    2018-01-01

    Robots are increasingly involved in our daily lives. Fundamental to robots are the communication link (or stream) and the applications that connect the robots to their clients or users. Such communication link and applications are usually supported through client/server network connection. This networking system is amenable of being attacked and vulnerable to the security threats. Ensuring security and privacy for robotic platforms is thus critical, as failures and attacks could have devastating consequences. In this paper, we examine several cyber-physical security threats that are unique to the robotic platforms; specifically the communication link and the applications. Threats target integrity, availability and confidential security requirements of the robotic platforms, which use MobileEyes/arnlServer client/server applications. A robot attack tool (RAT) was developed to perform specific security attacks. An impact-oriented approach was adopted to analyze the assessment results of the attacks. Tests and experiments of attacks were conducted in simulation environment and physically on the robot. The simulation environment was based on MobileSim; a software tool for simulating, debugging and experimenting on MobileRobots/ActivMedia platforms and their environments. The robot platform PeopleBotTM was used for physical experiments. The analysis and testing results show that certain attacks were successful at breaching the robot security. Integrity attacks modified commands and manipulated the robot behavior. Availability attacks were able to cause Denial-of-Service (DoS) and the robot was not responsive to MobileEyes commands. Integrity and availability attacks caused sensitive information on the robot to be hijacked. To mitigate security threats, we provide possible mitigation techniques and suggestions to raise awareness of threats on the robotic platforms, especially when the robots are involved in critical missions or applications. PMID:29883403

  3. Multifunctional gold nanoparticles for targeted imaging of angiotensin converting enzyme design, characterization, and application

    NASA Astrophysics Data System (ADS)

    Ghann, William Emmanuel

    Cardiovascular diseases (CVD) are the leading cause of morbidity and mortality in the United States with approximately one in every three death being attributed to these diseases. The overarching problem with heart diseases is that once a person has suffered from an attack, there is a high likelihood of a recurrent attack. According to the American Heart Association, approximately 785,000 Americans per year suffer from heart attacks for the first time and about half of the aforementioned experience an ensuing attack. The second attack is often fatal, and therefore relapse prevention is crucial. One of the possible ways of averting the recurrence of such an attack is through the precise monitoring of the preceding biomarkers or risk indicators. This project encompasses the design, synthesis, characterization, and application of nanoparticle-based contrast agents that can potentially be used in the monitoring of the reemergence of a biomarker expressed after a person has suffered myocardial infarction. The overexpression of this biomarker, angiotensin converting enzyme (ACE), is also associated with development of cardiac and pulmonary fibrosis. To this end, highly concentrated gold nanoparticles have been synthesized and conjugated to Lisinopril, an ACE inhibitor, for the molecular imaging of ACE using X-ray CT. Various stabilities studies were conducted to verify the resistance of this gold nanoprobe in biological relevant media. They have also been successfully used in X-ray computed tomography to visualize tissue ACE and thus render them potentially versatile in the monitoring of cardiovascular diseases. An MRI tag was also conjugated to the gold nanoparticle affording the opportunity for bimodal imaging of ACE. This contrast agent could further be used for the quantification using K-edge CT of the relationship between the amount of the said marker and its role in predicting the possibility of a successive heart attack. The prepared nanoparticle-based contrast agent could ultimately be used to monitor the levels of this biomarker in people predisposed to cardiovascular diseases due to genetic biases. It is anticipated that the targeted gold nanoparticle system could be applied in the design of similar multifunctional nanoparticles through the use of other disease-specific imaging nanoprobes.

  4. An Optimal Algorithm towards Successive Location Privacy in Sensor Networks with Dynamic Programming

    NASA Astrophysics Data System (ADS)

    Zhao, Baokang; Wang, Dan; Shao, Zili; Cao, Jiannong; Chan, Keith C. C.; Su, Jinshu

    In wireless sensor networks, preserving location privacy under successive inference attacks is extremely critical. Although this problem is NP-complete in general cases, we propose a dynamic programming based algorithm and prove it is optimal in special cases where the correlation only exists between p immediate adjacent observations.

  5. Large-scale wind tunnel tests of a sting-supported V/STOL fighter model at high angles of attack

    NASA Technical Reports Server (NTRS)

    Stoll, F.; Minter, E. A.

    1981-01-01

    A new sting model support has been developed for the NASA/Ames 40- by 80-Foot Wind Tunnel. This addition to the facility permits testing of relatively large models to large angles of attack or angles of yaw depending on model orientation. An initial test on the sting is described. This test used a 0.4-scale powered V/STOL model designed for testing at angles of attack to 90 deg and greater. A method for correcting wake blockage was developed and applied to the force and moment data. Samples of this data and results of surface-pressure measurements are presented.

  6. Shark attack: review of 86 consecutive cases.

    PubMed

    Woolgar, J D; Cliff, G; Nair, R; Hafez, H; Robbs, J V

    2001-05-01

    On average there are approximately 50 confirmed shark attacks worldwide annually. Despite their rarity, such incidents often generate much public and media attention. The injuries of 86 consecutive victims of shark attack were reviewed from 1980 to 1999. Clinical data retrieved from the South African Shark Attack Files, maintained by the Natal Sharks Board, were retrospectively analyzed to determine the nature, treatment, and outcome of injuries. The majority of victims (n = 68 [81%]) had relatively minor injuries that required simple primary suture. Those patients (n = 16 [19%]) with more extensive limb lacerations longer than 20 cm or with soft-tissue loss of more than one myofascial compartment were associated with higher morbidity and limb loss. In 8 of the 10 fatalities, death occurred as a result of exsanguinating hemorrhage from a limb vascular injury. Victims of shark attack usually sustain only minor injuries. In more serious cases, particularly if associated with a major vascular injury, hemorrhage control and early resuscitation are of utmost importance during the initial management if these patients are to survive.

  7. ART OF THE POSSIBLE: SECURING AIR FORCE SPACE COMMAND MISSION SYSTEMS FOR THE WARFIGHTER

    DTIC Science & Technology

    2016-10-23

    Initiation (Adversarial)…….…17 Table 2. Assessment Scale-Likelihood of Threat Event Occurrence ( Non -Adversarial).17 Table 3. Assessment Scale...action to thwart the attacks from adversarial nation states and non -state actors alike. While there are numerous cybersecurity concerns, or non ...compliant cybersecurity controls across all weapon systems, not all non -compliant controls contribute equally to the cyber-attack surface and overall

  8. A Secure Region-Based Geographic Routing Protocol (SRBGR) for Wireless Sensor Networks

    PubMed Central

    Adnan, Ali Idarous; Hanapi, Zurina Mohd; Othman, Mohamed; Zukarnain, Zuriati Ahmad

    2017-01-01

    Due to the lack of dependency for routing initiation and an inadequate allocated sextant on responding messages, the secure geographic routing protocols for Wireless Sensor Networks (WSNs) have attracted considerable attention. However, the existing protocols are more likely to drop packets when legitimate nodes fail to respond to the routing initiation messages while attackers in the allocated sextant manage to respond. Furthermore, these protocols are designed with inefficient collection window and inadequate verification criteria which may lead to a high number of attacker selections. To prevent the failure to find an appropriate relay node and undesirable packet retransmission, this paper presents Secure Region-Based Geographic Routing Protocol (SRBGR) to increase the probability of selecting the appropriate relay node. By extending the allocated sextant and applying different message contention priorities more legitimate nodes can be admitted in the routing process. Moreover, the paper also proposed the bound collection window for a sufficient collection time and verification cost for both attacker identification and isolation. Extensive simulation experiments have been performed to evaluate the performance of the proposed protocol in comparison with other existing protocols. The results demonstrate that SRBGR increases network performance in terms of the packet delivery ratio and isolates attacks such as Sybil and Black hole. PMID:28121992

  9. A Secure Region-Based Geographic Routing Protocol (SRBGR) for Wireless Sensor Networks.

    PubMed

    Adnan, Ali Idarous; Hanapi, Zurina Mohd; Othman, Mohamed; Zukarnain, Zuriati Ahmad

    2017-01-01

    Due to the lack of dependency for routing initiation and an inadequate allocated sextant on responding messages, the secure geographic routing protocols for Wireless Sensor Networks (WSNs) have attracted considerable attention. However, the existing protocols are more likely to drop packets when legitimate nodes fail to respond to the routing initiation messages while attackers in the allocated sextant manage to respond. Furthermore, these protocols are designed with inefficient collection window and inadequate verification criteria which may lead to a high number of attacker selections. To prevent the failure to find an appropriate relay node and undesirable packet retransmission, this paper presents Secure Region-Based Geographic Routing Protocol (SRBGR) to increase the probability of selecting the appropriate relay node. By extending the allocated sextant and applying different message contention priorities more legitimate nodes can be admitted in the routing process. Moreover, the paper also proposed the bound collection window for a sufficient collection time and verification cost for both attacker identification and isolation. Extensive simulation experiments have been performed to evaluate the performance of the proposed protocol in comparison with other existing protocols. The results demonstrate that SRBGR increases network performance in terms of the packet delivery ratio and isolates attacks such as Sybil and Black hole.

  10. Defend Science: The Attack on Scientific Thinking and What Must Be Done

    NASA Astrophysics Data System (ADS)

    Curtis, Jason

    2006-03-01

    ``In the United States today science, as science, is under attack as never before (Defend Science, defendscience.org).'' Beyond, and underlying, the many particular attacks and outrages in different spheres and policy areas is the question of the scientific method and whether it is going to be upheld and applied, or whether -- even in the realm of science itself -- that method is going to be replaced by something antagonistically opposed to the scientific method. These attacks are increasingly coming from powerful forces, in and out of the Bush administration, with an extreme right-wing political agenda, a Biblical-literalist ideological agenda, and theocratic aspirations for society. Individual scientists may be atheists, agnostics, or may hold various religious beliefs, but if religious and theistic elements are forced into the definition of science, then the scientific process is undermined and science cannot really be practiced. We can and must develop a society wide battle, initiated by scientists, but involving ever growing masses of people to defend science and scientific thinking. Scientists from various fields must be mobilized to issue a public call to millions with this urgent message as the beginning of this effort. I will discuss the necessity, possibility, and some initial efforts toward developing this kind of societal movement in defense of science.

  11. Defend Science: The Attack on Scientific Thinking and What Must Be Done

    NASA Astrophysics Data System (ADS)

    Curtis, Jason

    2006-04-01

    ``In the United States today science, as science, is under attack as never before (Defend Science, defendscience.org).'' Beyond, and underlying, the many particular attacks and outrages in different spheres and policy areas is the question of the scientific method and whether it is going to be upheld and applied, or whether -- even in the realm of science itself -- that method is going to be replaced by something antagonistically opposed to the scientific method. These attacks are increasingly coming from powerful forces, in and out of the Bush administration, with an extreme right-wing political agenda, a Biblical-literalist ideological agenda, and theocratic aspirations for society. Individual scientists may be atheists, agnostics, or may hold various religious beliefs, but if religious and theistic elements are forced into the definition of science, then the scientific process is undermined and science cannot really be practiced. We can and must develop a society wide battle, initiated by scientists, but involving ever growing masses of people to defend science and scientific thinking. Scientists from various fields must be mobilized to issue a public call to millions with this urgent message as the beginning of this effort. I will discuss the necessity, possibility, and some initial efforts toward developing this kind of societal movement in defense of science.

  12. Using Discrete Event Simulation to Model Attacker Interactions with Cyber and Physical Security Systems

    DOE PAGES

    Perkins, Casey; Muller, George

    2015-10-08

    The number of connections between physical and cyber security systems is rapidly increasing due to centralized control from automated and remotely connected means. As the number of interfaces between systems continues to grow, the interactions and interdependencies between them cannot be ignored. Historically, physical and cyber vulnerability assessments have been performed independently. This independent evaluation omits important aspects of the integrated system, where the impacts resulting from malicious or opportunistic attacks are not easily known or understood. Here, we describe a discrete event simulation model that uses information about integrated physical and cyber security systems, attacker characteristics and simple responsemore » rules to identify key safeguards that limit an attacker's likelihood of success. Key features of the proposed model include comprehensive data generation to support a variety of sophisticated analyses, and full parameterization of safeguard performance characteristics and attacker behaviours to evaluate a range of scenarios. Lastly, we also describe the core data requirements and the network of networks that serves as the underlying simulation structure.« less

  13. Acanthopria and Mimopriella parasitoid wasps (Diapriidae) attack Cyphomyrmex fungus-growing ants (Formicidae, Attini)

    NASA Astrophysics Data System (ADS)

    Fernández-Marín, Hermógenes; Zimmerman, Jess K.; Wcislo, William T.

    2006-01-01

    New World diapriine wasps are abundant and diverse, but the biology of most species is unknown. We provide the first description of the biology of diapriine wasps, Acanthopria spp. and Mimopriella sp., which attack the larvae of Cyphomyrmex fungus-growing ants. In Puerto Rico, the koinobiont parasitoids Acanthopria attack Cyphomyrmex minutus, while in Panama at least four morphospecies of Acanthopria and one of Mimopriella attack Cyphomyrmex rimosus. Of the total larvae per colony, 0 100% were parasitized, and 27 70% of the colonies per population were parasitized. Parasitism rate and colony size were negatively correlated for C. rimosus but not for C. minutus. Worker ants grasped at, bit, and in some cases, killed adult wasps that emerged in artificial nests or tried to enter natural nests. Parasitoid secondary sex ratios were female-biased for eclosing wasps, while field collections showed a male-biased sex ratio. Based on their abundance and success in attacking host ants, these minute wasps present excellent opportunities to explore how natural enemies impact ant colony demography and population biology.

  14. Using Discrete Event Simulation to Model Attacker Interactions with Cyber and Physical Security Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Perkins, Casey; Muller, George

    The number of connections between physical and cyber security systems is rapidly increasing due to centralized control from automated and remotely connected means. As the number of interfaces between systems continues to grow, the interactions and interdependencies between them cannot be ignored. Historically, physical and cyber vulnerability assessments have been performed independently. This independent evaluation omits important aspects of the integrated system, where the impacts resulting from malicious or opportunistic attacks are not easily known or understood. Here, we describe a discrete event simulation model that uses information about integrated physical and cyber security systems, attacker characteristics and simple responsemore » rules to identify key safeguards that limit an attacker's likelihood of success. Key features of the proposed model include comprehensive data generation to support a variety of sophisticated analyses, and full parameterization of safeguard performance characteristics and attacker behaviours to evaluate a range of scenarios. Lastly, we also describe the core data requirements and the network of networks that serves as the underlying simulation structure.« less

  15. Public knowledge of heart attack symptoms in Beijing residents.

    PubMed

    Zhang, Qing-Tan; Hu, Da-Yi; Yang, Jin-Gang; Zhang, Shou-Yan; Zhang, Xin-Quan; Liu, Shu-Shan

    2007-09-20

    Definitive treatment for heart attack is early reperfusion with either angioplasty or thrombolytic therapy, and the benefit is strictly time-dependent. Patient outcomes are improved with either therapy when initiated as soon as possible. Recognition of heart attack symptoms is logically tied to taking action to receive prompt emergency care. Inadequate knowledge of heart attack symptoms may prolong delay. The purpose of this study was to document knowledge about heart attack symptoms in Beijing residents and to identify the characteristics associated with increased knowledge of heart attack. A structured survey was conducted in 18 communities in Beijing from March 1 through June 10 in 2006. Addresses and participants were selected randomly following a stratification. The survey was designed to collect knowledge of heart attack symptoms from sampled adults in each community. A total of 4627 respondents completed the questionnaires correctly, and 50.29% of them were female. Totally 64.15% of the respondents reported chest pain or discomfort (common symptoms) as a symptom of heart attack; 75.38% reported at least one of the following eight symptoms as a symptom of heart attack: back pain, shortness of breath, arm pain or numbness, nausea or vomiting, neck, jaw or shoulder pain, epigastric pain, sweating, weakness (less common symptoms); 20.36% correctly reported four or more heart attack symptoms, only 7.4% knew all the correct heart attack symptoms, and 28.94% knew about reperfusion therapy for heart attack; 31.7% reported to call 120 or 999 while having a heart attack themselves; however 89.6% reported to call 120 or 999 when someone else is suffering from a heart attack. Very old persons and those with health insurance coverage, high education level, high household income, longer living in Beijing and previous experience with heart disease had greater knowledge of heart attack symptoms. Public knowledge of common heart attack symptoms as well as less common heart attack symptoms is deficient in Beijing residents. But their knowledge of calling emergency medical services when someone is having a heart attack is relatively adequate. Public health efforts are needed to increase the recognition of the major heart attack symptoms in both the general public and groups at high risk for an acute cardiac event, especially in socioeconomically disadvantaged subgroups, including persons with low education level, low household income, and no health insurance coverage.

  16. A hybrid protection approaches for denial of service (DoS) attacks in wireless sensor networks

    NASA Astrophysics Data System (ADS)

    Gunasekaran, Mahalakshmi; Periakaruppan, Subathra

    2017-06-01

    Wireless sensor network (WSN) contains the distributed autonomous devices with the sensing capability of physical and environmental conditions. During the clustering operation, the consumption of more energy causes the draining in battery power that leads to minimum network lifetime. Hence, the WSN devices are initially operated on low-power sleep mode to maximise the lifetime. But, the attacks arrival cause the disruption in low-power operating called denial of service (DoS) attacks. The conventional intrusion detection (ID) approaches such as rule-based and anomaly-based methods effectively detect the DoS attacks. But, the energy consumption and false detection rate are more. The absence of attack information and broadcast of its impact to the other cluster head (CH) leads to easy DoS attacks arrival. This article combines the isolation and routing tables to detect the attack in the specific cluster and broadcasts the information to other CH. The intercommunication between the CHs prevents the DoS attacks effectively. In addition, the swarm-based defence approach is proposed to migrate the fault channel to normal operating channel through frequency hop approaches. The comparative analysis between the proposed table-based intrusion detection systems (IDSs) and swarm-based defence approaches with the traditional IDS regarding the parameters of transmission overhead/efficiency, energy consumption, and false positive/negative rates proves the capability of DoS prediction/prevention in WSN.

  17. Treatment of cataplexy in Niemann-Pick disease type C with the use of miglustat.

    PubMed

    Zarowski, Marcin; Steinborn, Barbara; Gurda, Barbara; Dvorakova, Lenka; Vlaskova, Hana; Kothare, Sanjeev V

    2011-01-01

    Cataplexy is the sudden muscle weakness brought on by strong emotions, particularly joking, laughter, or anger. Cataplexy may involve only certain group of muscles or the entire voluntary musculature. In rare cases, symptoms of cataplexy can be seen during the course of some inherited diseases (Niemann-Pick type C (NPC), Prader-Willi syndrome, myotonic dystrophy, Norrie disease). We report the successful use of miglustat, a reversible inhibitor of the enzyme glucosylceramide synthase, approved for use in Gaucher's disease, and which catalyses the first step in the biosynthesis of most glycosphingolipid, in a boy with NPC with cataplexy. A 9-year-old boy was admitted for assessments of frequent "drop attacks" while laughing. The filipin fluorescence tests of cultured skin fibroblasts revealed massive accumulation of unesterified cholesterol, confirming the diagnosis of NPC disease. Molecular studies confirmed the diagnosis of NPC too. After approval from the bioethics committee, miglustat was initiated on the child at 100mg three times a day. Cataplectic attacks disappeared completely after 6 months on treatment, and patient continues to be in remission from the cataplectic attacks at 16 months follow-up. There was no further progression of neurological signs or symptoms or splenomegaly, with some improvement in cognitive function as well as social, affective and attention problems, up-gaze, and gait. Miglustat was well tolerated with no side effects observed. In summary, this is the first report of miglustat treatment of cataplexy in NPC. Long-term follow-up for continuing efficacy and tolerability in a larger cohort with NPC is needed to substantiate our observation. © 2010 European Paediatric Neurology Society. Published by Elsevier Ltd. All rights reserved.

  18. Contextual Factors Among Indiscriminate or Large Attacks on Food or Water Supplies, 1946-2015

    PubMed Central

    Hunter, Paul R.

    2016-01-01

    This research updates previous inventories of malicious attacks on food and water and includes data from 1946 through mid-2015. A systematic search of news reports, databases, and previous inventories of poisoning events was undertaken. Incidents that threatened or were intended to achieve direct harm to humans and that were either relatively large (more than 4 victims) or indiscriminate in intent or realization were included. Agents could be chemical, biological, or radionuclear. Reports of candidate incidents were subjected to systematic inclusion and exclusion criteria as well as validity analysis (not always clearly undertaken in previous inventories of such attacks). We summarize contextual aspects of the attacks that may be important for scenario prioritization, modelling, and defensive preparedness. Opportunity, and particularly access to dangerous agents, is key to most realized attacks. The most common motives and relative success rate in causing harm were very different between food and water attacks. The likelihood that people were made ill or died also varied by food or water mode and according to motive and opportunity for delivery of the hazardous agent. Deaths and illness associated with attacks during food manufacture and prior to sale have been fewer than those in some other contexts. Valuable opportunities for food defense improvements are identified in other contexts, especially food prepared in private or community settings. PMID:26889577

  19. Facial injuries following hyena attack in rural eastern Ethiopia.

    PubMed

    Fell, M J; Ayalew, Y; McClenaghan, F C; McGurk, M

    2014-12-01

    Hyenas are effective hunters and will consider humans as potential prey if the need and opportunity arise. This study describes the circumstances of hyena attacks, the patterns of injuries sustained, and reconstruction in a resource-poor setting. As part of a charitable surgical mission to Ethiopia in 2012, 45 patients with facial deformities were reviewed, of whom four were victims of hyena attacks. A semi-structured interview was performed to ascertain the circumstances of the attack and the subsequent consequences. The age of the victims at the time of attack varied from 5 to 50 years. The attacks occurred when the victims were alone and vulnerable and took place in outdoor open spaces, during the evening or at night. The initial lunge was made to the facial area; if the jaws closed on the facial bones they were crushed, but in all cases the soft tissues were grasped and torn from the underlying bone. Reconstruction was dictated by the extent of soft tissue loss but could normally be obtained by use of local or regional flaps. Hyenas have been shown to attack humans in a predictable way and cause injuries that typically involve the soft tissues of the face. Copyright © 2014 International Association of Oral and Maxillofacial Surgeons. Published by Elsevier Ltd. All rights reserved.

  20. Impact modeling and prediction of attacks on cyber targets

    NASA Astrophysics Data System (ADS)

    Khalili, Aram; Michalk, Brian; Alford, Lee; Henney, Chris; Gilbert, Logan

    2010-04-01

    In most organizations, IT (information technology) infrastructure exists to support the organization's mission. The threat of cyber attacks poses risks to this mission. Current network security research focuses on the threat of cyber attacks to the organization's IT infrastructure; however, the risks to the overall mission are rarely analyzed or formalized. This connection of IT infrastructure to the organization's mission is often neglected or carried out ad-hoc. Our work bridges this gap and introduces analyses and formalisms to help organizations understand the mission risks they face from cyber attacks. Modeling an organization's mission vulnerability to cyber attacks requires a description of the IT infrastructure (network model), the organization mission (business model), and how the mission relies on IT resources (correlation model). With this information, proper analysis can show which cyber resources are of tactical importance in a cyber attack, i.e., controlling them enables a large range of cyber attacks. Such analysis also reveals which IT resources contribute most to the organization's mission, i.e., lack of control over them gravely affects the mission. These results can then be used to formulate IT security strategies and explore their trade-offs, which leads to better incident response. This paper presents our methodology for encoding IT infrastructure, organization mission and correlations, our analysis framework, as well as initial experimental results and conclusions.

  1. Nuclear terrorism - Threat or not?

    NASA Astrophysics Data System (ADS)

    Pomper, Miles A.; Tarini, Gabrielle

    2017-11-01

    A terrorist attack using nuclear or radiological materials is a low-probability event, but if executed, would lead to unprecedented socio-economic, material, and psychological disruption and damage. This chapter seeks to provide a sound assessment of the scope and nature of the threat by examining the different types of nuclear terrorism, each of which poses different risks, involves different barriers to success, and requires different terrorist capabilities. In addition, the chapter aims to provide an overview of the sources and nature of terrorists' motivations to employ a nuclear attack.

  2. Application of non-invasive mechanical ventilation in an asthmatic pregnant woman in respiratory failure: a case report

    PubMed Central

    Caner, Hanife; Eryuksel, Emel; Kosar, Filiz

    2013-01-01

    The use of non-invasive mechanical ventilation (NIV) during an asthma attack is controversial. We report a case of a 28-year-old female patient in her 16th week of pregnancy with community-acquired pneumonia who presented during an asthma attack, which led to hypoxic respiratory failure. She was successfully treated using NIV. This case is worth discussing as it includes two clinical conditions in which NIV is often considered contraindicated. PMID:23372957

  3. Data modeling of network dynamics

    NASA Astrophysics Data System (ADS)

    Jaenisch, Holger M.; Handley, James W.; Faucheux, Jeffery P.; Harris, Brad

    2004-01-01

    This paper highlights Data Modeling theory and its use for text data mining as a graphical network search engine. Data Modeling is then used to create a real-time filter capable of monitoring network traffic down to the port level for unusual dynamics and changes in business as usual. This is accomplished in an unsupervised fashion without a priori knowledge of abnormal characteristics. Two novel methods for converting streaming binary data into a form amenable to graphics based search and change detection are introduced. These techniques are then successfully applied to 1999 KDD Cup network attack data log-on sessions to demonstrate that Data Modeling can detect attacks without prior training on any form of attack behavior. Finally, two new methods for data encryption using these ideas are proposed.

  4. Patients' perceptions of their heart attack and recovery: the influence of epidemiological "evidence" and personal experience.

    PubMed

    Wiles, R

    1998-06-01

    Secondary prevention of heart disease is widely viewed as likely to be more successful and cost effective than primary prevention. However, people's willingness to adopt lifestyle change is a complex issue in which people's perceptions of disease causation and risk as well as a range of socio-economic factors are important. This paper reports on a qualitative study of people following heart attack which examines their understandings of heart attack and the salience that lifestyle advice has in the light of these understandings. In-depth, qualitative interviews were conducted with 25 people recovering from heart attack. Each person was interviewed twice: at around two weeks and five months following their heart attack. The study found that information about recovery provided by health professionals was based on a simplified version of epidemiological evidence. This information played a central role in people's understandings about the nature of heart attack and their future risk in the early weeks following heart attack. However, as interviewees came to terms with the shock of the event, they tended to lose their trust in "official" accounts of cause and recovery and evidence from lay epidemiology that contradicted official accounts tended to emerge. This evidence encouraged interviewees to question the explanatory power of official accounts and to view the adoption of long-term lifestyle change as an action that would not guarantee protection from a further heart attack. This was true whether or not people's experiences of recovery reflected those "predicted" by health professionals although those awaiting further surgery or tests tended to maintain trust in official accounts over a longer period. It is concluded that the failure of official accounts to acknowledge the random nature of the occurrence of heart attack, the severity of heart attack and the level of recovery from heart attack is a central feature in people's reluctance to view lifestyle change as a rational action to take to prevent a further cardiac event.

  5. Viral replication. Structural basis for RNA replication by the hepatitis C virus polymerase.

    PubMed

    Appleby, Todd C; Perry, Jason K; Murakami, Eisuke; Barauskas, Ona; Feng, Joy; Cho, Aesop; Fox, David; Wetmore, Diana R; McGrath, Mary E; Ray, Adrian S; Sofia, Michael J; Swaminathan, S; Edwards, Thomas E

    2015-02-13

    Nucleotide analog inhibitors have shown clinical success in the treatment of hepatitis C virus (HCV) infection, despite an incomplete mechanistic understanding of NS5B, the viral RNA-dependent RNA polymerase. Here we study the details of HCV RNA replication by determining crystal structures of stalled polymerase ternary complexes with enzymes, RNA templates, RNA primers, incoming nucleotides, and catalytic metal ions during both primed initiation and elongation of RNA synthesis. Our analysis revealed that highly conserved active-site residues in NS5B position the primer for in-line attack on the incoming nucleotide. A β loop and a C-terminal membrane-anchoring linker occlude the active-site cavity in the apo state, retract in the primed initiation assembly to enforce replication of the HCV genome from the 3' terminus, and vacate the active-site cavity during elongation. We investigated the incorporation of nucleotide analog inhibitors, including the clinically active metabolite formed by sofosbuvir, to elucidate key molecular interactions in the active site. Copyright © 2015, American Association for the Advancement of Science.

  6. Habitat-specific foraging of prothonotary warblers: Deducing habitat quality

    USGS Publications Warehouse

    Lyons, J.E.

    2005-01-01

    Foraging behavior often reflects food availability in predictable ways. For example, in habitats where food availability is high, predators should attack prey more often and move more slowly than in habitats where food availability is low. To assess relative food availability and habitat quality, I studied the foraging behavior of breeding Prothonotary Warblers (Protonotaria citrea) in two forest habitat types, cypress-gum swamp forest and coastal-plain levee forest. I quantified foraging behavior with focal animal sampling and continuous recording during foraging bouts. I measured two aspects of foraging behavior: 1) prey attack rate (attacks per minute), using four attack maneuvers (glean, sally, hover, strike), and 2) foraging speed (movements per minute), using three types of movement (hop, short flight [???1 m], long flight [>1 m]). Warblers attacked prey more often in cypress-gum swamp forest than in coastal-plain levee forest. Foraging speed, however, was not different between habitats. I also measured foraging effort (% time spent foraging) and relative frequency of attack maneuvers employed in each habitat; neither of these variables was influenced by forest type. I conclude that Prothonotary Warblers encounter more prey when foraging in cypress-gum swamps than in coastal-plain levee forest, and that greater food availability results in higher density and greater reproductive success for birds breeding in cypress-gum swamp.

  7. Robust and Blind 3D Mesh Watermarking in Spatial Domain Based on Faces Categorization and Sorting

    NASA Astrophysics Data System (ADS)

    Molaei, Amir Masoud; Ebrahimnezhad, Hossein; Sedaaghi, Mohammad Hossein

    2016-06-01

    In this paper, a 3D watermarking algorithm in spatial domain is presented with blind detection. In the proposed method, a negligible visual distortion is observed in host model. Initially, a preprocessing is applied on the 3D model to make it robust against geometric transformation attacks. Then, a number of triangle faces are determined as mark triangles using a novel systematic approach in which faces are categorized and sorted robustly. In order to enhance the capability of information retrieval by attacks, block watermarks are encoded using Reed-Solomon block error-correcting code before embedding into the mark triangles. Next, the encoded watermarks are embedded in spherical coordinates. The proposed method is robust against additive noise, mesh smoothing and quantization attacks. Also, it is stout next to geometric transformation, vertices and faces reordering attacks. Moreover, the proposed algorithm is designed so that it is robust against the cropping attack. Simulation results confirm that the watermarked models confront very low distortion if the control parameters are selected properly. Comparison with other methods demonstrates that the proposed method has good performance against the mesh smoothing attacks.

  8. Omen: identifying potential spear-phishing targets before the email is sent.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wendt, Jeremy Daniel.

    2013-07-01

    We present the results of a two year project focused on a common social engineering attack method called "spear phishing". In a spear phishing attack, the user receives an email with information specifically focused on the user. This email contains either a malware-laced attachment or a link to download the malware that has been disguised as a useful program. Spear phishing attacks have been one of the most effective avenues for attackers to gain initial entry into a target network. This project focused on a proactive approach to spear phishing. To create an effective, user-specific spear phishing email, the attackermore » must research the intended recipient. We believe that much of the information used by the attacker is provided by the target organization's own external website. Thus when researching potential targets, the attacker leaves signs of his research in the webserver's logs. We created tools and visualizations to improve cybersecurity analysts' abilities to quickly understand a visitor's visit patterns and interests. Given these suspicious visitors and log-parsing tools, analysts can more quickly identify truly suspicious visitors, search for potential spear-phishing targeted users, and improve security around those users before the spear phishing email is sent.« less

  9. Radiological threat assessment and the Federal Response Plan--a gap analysis.

    PubMed

    Conklin, W Craig; Liotta, Philip L

    2005-11-01

    The ability of the federal government to effectively and efficiently respond to nuclear or radiological terrorist attacks has been the subject of intense discussion and analysis for many years. Because of recent terrorist activities and intelligence information, there is strong sentiment that it is not a question of if, but when, a radiological or nuclear terrorist attack will occur. As a result, there is considerable concern that the federal government may not be adequately prepared to respond to an attack involving a radiological dispersal device or improvised nuclear device. In response to these concerns, federal departments and agencies have initiated actions to develop a better understanding of the magnitude of the radiological/nuclear terrorist threat, assess the ability of the federal government to support state and local responses to such attacks, and improve the Nation's ability to prepare for, respond to, and recover from these types of attacks. In an era of limited fiscal growth and competing priorities, the federal government will have to enhance its collaboration with state and local governments, the private sector, and academia to ensure that the Nation is capable of responding to a terrorist attack involving radioactive or nuclear material.

  10. Gait biometrics under spoofing attacks: an experimental investigation

    NASA Astrophysics Data System (ADS)

    Hadid, Abdenour; Ghahramani, Mohammad; Kellokumpu, Vili; Feng, Xiaoyi; Bustard, John; Nixon, Mark

    2015-11-01

    Gait is a relatively biometric modality which has a precious advantage over other modalities, such as iris and voice, in that it can be easily captured from a distance. Although it has recently become a topic of great interest in biometric research, there has been little investigation into gait spoofing attacks where a person tries to imitate the clothing or walking style of someone else. We recently analyzed for the first time the effects of spoofing attacks on silhouette-based gait biometric systems and showed that it was indeed possible to spoof gait biometric systems by clothing impersonation and the deliberate selection of a target that has a similar build to the attacker. To gain deeper insight into the performance of current gait biometric systems under spoofing attacks, we provide a thorough investigation on how clothing can be used to spoof a target and evaluate the performance of two state-of-the-art recognition methods on a gait spoofing database recorded at the University of Southampton. Furthermore, we describe and evaluate an initial solution coping with gait spoofing attacks. The obtained results are very promising and point out interesting findings which can be used for future investigations.

  11. Nature's Ballistic Missile.

    PubMed

    Robb, E J; Barron, G L

    1982-12-17

    The parasitic fungus Haptoglossa mirabilis infects its rotifer host by means of a gun-shaped attack cell. The anterior end of the cell is elongated to form a barrel; the wall at the mouth is invaginated deep into the cell to form a bore. A walled chamber at the base of the bore houses a complex, missile-like attack apparatus. The projectile is fired from the gun cell at high speed to accomplish initial penetration of the host.

  12. Effects of the World Trade Center Attack on NYC Public School Students: Initial Report to the New York City Board of Education.

    ERIC Educational Resources Information Center

    2002

    This study investigated the mental health needs of New York City (NYC) public school students 6 months after the September 11, 2001 attack. A needs assessment survey was conducted on 8,266 students in grades 4-12 from 94 schools in the Ground Zero area, other presumed high risk areas, and the remainder of NYC. The survey assessed such factors as…

  13. Achieving the Dream: A Look at Hispanic Student Success at Community Colleges in Texas

    ERIC Educational Resources Information Center

    Williams, Audrey R.

    2013-01-01

    In the last decade, higher education institutions have come under attack for their inability to enhance graduation rates. Although community colleges are known for their open-door enrollment policy, they are currently challenged to improve student success. This study was designed to determine which strategies have been most effective in…

  14. Navy Virginia (SSN-774) Class Attack Submarine Procurement: Background and Issues for Congress

    DTIC Science & Technology

    2015-12-17

    Engineers Journal, No. 4, 2009: 79-94; and John D. Butler, “The Sweet Smell of Acquisition Success,” U.S. Naval Institute Proceedings, June 2011: 22...update cost estimates soon based on the final concept design, but so far the program has been successful in sticking to its cost goals. The program

  15. A two-dimensional air-to-air combat game - Toward an air-combat advisory system

    NASA Technical Reports Server (NTRS)

    Neuman, Frank

    1987-01-01

    Air-to-air combat is modeled as a discrete differential game, and by constraining the game to searching for the best guidance laws from the sets of those considered for each opponent, feedback and outcome charts are obtained which can be used to turn one of the automatic opponents into an intelligent opponent against a human pilot. A one-on-one two-dimensional fully automatic, or manned versus automatic, air-to-air combat game has been designed which includes both attack and evasion alternatives for both aircraft. Guidance law selection occurs by flooding the initial-condition space with four simulated fights for each initial condition, depicting the various attack/evasion strategies for the two opponents, and recording the outcomes. For each initial condition, the minimax method from differential games is employed to determine the best choice from the available strategies.

  16. Security Measures to Protect Mobile Agents

    NASA Astrophysics Data System (ADS)

    Dadhich, Piyanka; Govil, M. C.; Dutta, Kamlesh

    2010-11-01

    The security issues of mobile agent systems have embarrassed its widespread implementation. Mobile agents that move around the network are not safe because the remote hosts that accommodate the agents initiates all kinds of attacks. These hosts try to analyze the agent's decision logic and their accumulated data. So, mobile agent security is the most challenging unsolved problems. The paper analyzes various security measures deeply. Security especially the attacks performed by hosts to the visiting mobile agent (the malicious hosts problem) is a major obstacle that prevents mobile agent technology from being widely adopted. Being the running environment for mobile agent, the host has full control over them and could easily perform many kinds of attacks against them.

  17. Resilience 2.0: social media use and (self-)care during the 2011 Norway attacks

    PubMed Central

    2015-01-01

    Departing from the understanding that resilience is a technique of self-organization during emergencies, this article provides a study on the way in which the use of social media influenced and engendered societal resilience practices during the 2011 Norway attacks. It builds on the concepts of governmentality and mediality to discuss how the interplay between social media and its users created new forms of self-initiated and mediated emergency governance. Empirically, it draws on material from 20 in-depth interviews with Norwegians who explained and reflected upon their social media use during the attacks. The article presents an overview of the different functions that social media assumed in the process of dealing with the attacks and discusses these vis-à-vis their related challenges. It draws conclusions about the way in which resilience practices and the resilient subject are influenced by the networked character of 2.0 technologies. PMID:29708120

  18. Resilience 2.0: social media use and (self-)care during the 2011 Norway attacks.

    PubMed

    Kaufmann, Mareile

    2015-10-01

    Departing from the understanding that resilience is a technique of self-organization during emergencies, this article provides a study on the way in which the use of social media influenced and engendered societal resilience practices during the 2011 Norway attacks. It builds on the concepts of governmentality and mediality to discuss how the interplay between social media and its users created new forms of self-initiated and mediated emergency governance. Empirically, it draws on material from 20 in-depth interviews with Norwegians who explained and reflected upon their social media use during the attacks. The article presents an overview of the different functions that social media assumed in the process of dealing with the attacks and discusses these vis-à-vis their related challenges. It draws conclusions about the way in which resilience practices and the resilient subject are influenced by the networked character of 2.0 technologies.

  19. Investigation of High-alpha Lateral-directional Control Power Requirements for High-performance Aircraft

    NASA Technical Reports Server (NTRS)

    Foster, John V.; Ross, Holly M.; Ashley, Patrick A.

    1993-01-01

    Designers of the next-generation fighter and attack airplanes are faced with the requirements of good high-angle-of-attack maneuverability as well as efficient high speed cruise capability with low radar cross section (RCS) characteristics. As a result, they are challenged with the task of making critical design trades to achieve the desired levels of maneuverability and performance. This task has highlighted the need for comprehensive, flight-validated lateral-directional control power design guidelines for high angles of attack. A joint NASA/U.S. Navy study has been initiated to address this need and to investigate the complex flight dynamics characteristics and controls requirements for high-angle-of-attack lateral-directional maneuvering. A multi-year research program is underway which includes ground-based piloted simulation and flight validation. This paper will give a status update of this program that will include a program overview, description of test methodology and preliminary results.

  20. Investigation of high-alpha lateral-directional control power requirements for high-performance aircraft

    NASA Technical Reports Server (NTRS)

    Foster, John V.; Ross, Holly M.; Ashley, Patrick A.

    1993-01-01

    Designers of the next-generation fighter and attack airplanes are faced with the requirements of good high angle-of-attack maneuverability as well as efficient high speed cruise capability with low radar cross section (RCS) characteristics. As a result, they are challenged with the task of making critical design trades to achieve the desired levels of maneuverability and performance. This task has highlighted the need for comprehensive, flight-validated lateral-directional control power design guidelines for high angles of attack. A joint NASA/U.S. Navy study has been initiated to address this need and to investigate the complex flight dynamics characteristics and controls requirements for high angle-of-attack lateral-directional maneuvering. A multi-year research program is underway which includes groundbased piloted simulation and flight validation. This paper will give a status update of this program that will include a program overview, description of test methodology and preliminary results.

  1. Gray Matter Is Targeted in First-Attack Multiple Sclerosis

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Schutzer, Steven E.; Angel, Thomas E.; Liu, Tao

    The cause of multiple sclerosis (MS), its driving pathogenesis at the earliest stages, and what factors allow the first clinical attack to manifest remain unknown. Some imaging studies suggest gray rather than white matter may be involved early, and some postulate this may be predictive of developing MS. Other imaging studies are in conflict. To determine if there was objective molecular evidence of gray matter involvement in early MS we used high-resolution mass spectrometry to identify proteins in the cerebrospinal fluid (CSF) of first-attack MS patients (two independent groups) compared to established relapsing remitting (RR) MS and controls. We foundmore » that the CSF proteins in first-attack patients were differentially enriched for gray matter components (axon, neuron, synapse). Myelin components did not distinguish these groups. The results support that gray matter dysfunction is involved early in MS, and also may be integral for the initial clinical presentation.« less

  2. Eyespots deflect predator attack increasing fitness and promoting the evolution of phenotypic plasticity

    PubMed Central

    Prudic, Kathleen L.; Stoehr, Andrew M.; Wasik, Bethany R.; Monteiro, Antónia

    2015-01-01

    Some eyespots are thought to deflect attack away from the vulnerable body, yet there is limited empirical evidence for this function and its adaptive advantage. Here, we demonstrate the conspicuous ventral hindwing eyespots found on Bicyclus anynana butterflies protect against invertebrate predators, specifically praying mantids. Wet season (WS) butterflies with larger, brighter eyespots were easier for mantids to detect, but more difficult to capture compared to dry season (DS) butterflies with small, dull eyespots. Mantids attacked the wing eyespots of WS butterflies more frequently resulting in greater butterfly survival and reproductive success. With a reciprocal eyespot transplant, we demonstrated the fitness benefits of eyespots were independent of butterfly behaviour. Regardless of whether the butterfly was WS or DS, large marginal eyespots pasted on the hindwings increased butterfly survival and successful oviposition during predation encounters. In previous studies, DS B. anynana experienced delayed detection by vertebrate predators, but both forms suffered low survival once detected. Our results suggest predator abundance, identity and phenology may all be important selective forces for B. anynana. Thus, reciprocal selection between invertebrate and vertebrate predators across seasons may contribute to the evolution of the B. anynana polyphenism. PMID:25392465

  3. Bagworm bags as portable armour against invertebrate predators

    PubMed Central

    2016-01-01

    Some animals have evolved the use of environmental materials as “portable armour” against natural enemies. Portable bags that bagworm larvae (Lepidoptera: Psychidae) construct using their own silk and plant parts are generally believed to play an important role as a physical barrier against natural enemies. However, no experimental studies have tested the importance of bags as portable armour against predators. To clarify the defensive function, I studied the bagworm Eumeta minuscula and a potential predator Calosoma maximoviczi (Coleoptera: Carabidae). Under laboratory conditions, all bagworm larvae were attacked by carabid adults, but successfully defended themselves against the predators’ mandibles using their own bags. The portable bags, which are composed mainly of host plant twigs, may function as a physical barrier against predator mandibles. To test this hypothesis, I removed the twig bags and replaced some with herb leaf bags; all bag-removed larvae were easily caught and predated by carabids, while all bag-replaced larvae could successfully defend themselves against carabid attacks. Therefore, various types of portable bags can protect bagworm larvae from carabid attacks. This is the first study to test the defensive function of bagworm portable bags against invertebrate predators. PMID:26893969

  4. Survey of subterranean termites (Isoptera: Rhinotermitidae) in a managed silvicultural plantation in Portugal, using a line-intersection method (LIS).

    PubMed

    Nobre, T; Nunes, L; Bignell, D E

    2009-02-01

    Subterranean termites (Reticulitermes grassei) were surveyed over successive seasons in a managed eucalyptus plantation in southeastern Portugal for 26 months. Termite activity in seven diameter categories of lying dead wood was investigated by a modified line intersection method (LIS). Each item sampled was inspected and assessed for termite attack and for general (i.e. fungal) decay status using standard protocols. Line intersection is quantitative to the extent that it can link foraging and decay parameters to woody biovolume. It was found that termites selected items with larger diameter, the observed trend showing an exponential character with greater termite attack as diameter increased. Attack by termites was positively associated with prior decay by fungi. A clear positive relationship was shown between rainfall and total woody biovolume containing live termites, underlining the importance of moisture for termite activity. Subterranean termites appeared to be important wood decomposers in the woodland studied, with an average of 30% of lying dead wood branches showing signs of termite attack.

  5. Classifier fusion for VoIP attacks classification

    NASA Astrophysics Data System (ADS)

    Safarik, Jakub; Rezac, Filip

    2017-05-01

    SIP is one of the most successful protocols in the field of IP telephony communication. It establishes and manages VoIP calls. As the number of SIP implementation rises, we can expect a higher number of attacks on the communication system in the near future. This work aims at malicious SIP traffic classification. A number of various machine learning algorithms have been developed for attack classification. The paper presents a comparison of current research and the use of classifier fusion method leading to a potential decrease in classification error rate. Use of classifier combination makes a more robust solution without difficulties that may affect single algorithms. Different voting schemes, combination rules, and classifiers are discussed to improve the overall performance. All classifiers have been trained on real malicious traffic. The concept of traffic monitoring depends on the network of honeypot nodes. These honeypots run in several networks spread in different locations. Separation of honeypots allows us to gain an independent and trustworthy attack information.

  6. Mediating the social and psychological impacts of terrorist attacks: the role of risk perception and risk communication.

    PubMed

    Rogers, M Brooke; Amlôt, Richard; Rubin, G James; Wessely, Simon; Krieger, Kristian

    2007-06-01

    The public's understanding of chemical, biological, radiological and nuclear (CBRN) related issues and their likely actions following a CBRN incident is an issue of great concern, as public psychological and behavioural responses will help determine subsequent morbidity and mortality rates. This paper explores the role of effective government communication with the public and its role in mediating the social and psychological impact of terrorist attacks. We examine the importance of effective communication in reducing morbidity and mortality in the event of a terrorist attack and explore the impact of risk perceptions in determining the success or failure of risk communication strategies. This includes the examination of the role of fear as a health risk, and the identification of factors relevant to public trust in risk communication. Finally, an investigation of the type of information desired by members of the public leads the authors to make risk communication recommendations targeted at the promotion of more adaptive behaviours in response to CBRN attacks.

  7. Kinetic and mechanistic study of microcystin-LR degradation by nitrous acid under ultraviolet irradiation.

    PubMed

    Ma, Qingwei; Ren, Jing; Huang, Honghui; Wang, Shoubing; Wang, Xiangrong; Fan, Zhengqiu

    2012-05-15

    Degradation of microcystin-LR (MC-LR) in the presence of nitrous acid (HNO(2)) under irradiation of 365nm ultraviolet (UV) was studied for the first time. The influence of initial conditions including pH value, NaNO(2) concentration, MC-LR concentration and UV intensity were studied. MC-LR was degraded in the presence of HNO(2); enhanced degradation of MC-LR was observed with 365nm UV irradiation, caused by the generation of hydroxyl radicals through the photolysis of HNO(2). The degradation processes of MC-LR could well fit the pseudo-first-order kinetics. Mass spectrometry was applied for identification of the byproducts and the analysis of degradation mechanisms. Major degradation pathways were proposed according to the results of LC-MS analysis. The degradation of MC-LR was initiated via three major pathways: attack of hydroxyl radicals on the conjugated carbon double bonds of Adda, attack of hydroxyl radicals on the benzene ring of Adda, and attack of nitrosonium ion on the benzene ring of Adda. Copyright © 2012 Elsevier B.V. All rights reserved.

  8. An enhanced password authentication scheme for session initiation protocol with perfect forward secrecy.

    PubMed

    Qiu, Shuming; Xu, Guoai; Ahmad, Haseeb; Guo, Yanhui

    2018-01-01

    The Session Initiation Protocol (SIP) is an extensive and esteemed communication protocol employed to regulate signaling as well as for controlling multimedia communication sessions. Recently, Kumari et al. proposed an improved smart card based authentication scheme for SIP based on Farash's scheme. Farash claimed that his protocol is resistant against various known attacks. But, we observe some accountable flaws in Farash's protocol. We point out that Farash's protocol is prone to key-compromise impersonation attack and is unable to provide pre-verification in the smart card, efficient password change and perfect forward secrecy. To overcome these limitations, in this paper we present an enhanced authentication mechanism based on Kumari et al.'s scheme. We prove that the proposed protocol not only overcomes the issues in Farash's scheme, but it can also resist against all known attacks. We also provide the security analysis of the proposed scheme with the help of widespread AVISPA (Automated Validation of Internet Security Protocols and Applications) software. At last, comparing with the earlier proposals in terms of security and efficiency, we conclude that the proposed protocol is efficient and more secure.

  9. The lesbian custody project.

    PubMed

    Radford, J

    1992-01-01

    In the United Kingdom the backlash against feminism in the late 1980s was initially directed at lesbians and was specifically focused on lesbians who are mothers, lesbians engaged in parenting, or lesbians wishing to do so. This backlash was initially orchestrated by a small group of far right politicians, well to the right of the Thatcher government, and was not contained in any political consensus but was developed into a major public issue by the media. This paper documents its effect in terms of a systematic legal attack on lesbian parenting. The aim of the paper is to alert readers to the backlash with a view to resistance. Our argument is that the backlash against lesbians is a first line of attack against all women as mothers.

  10. Technique Selectively Represses Immune System

    MedlinePlus

    ... from attacking myelin in a mouse model of multiple sclerosis. Dr David Furness, Wellcome Images. All rights reserved ... devised a way to successfully treat symptoms resembling multiple sclerosis in a mouse model. With further development, the ...

  11. The correlation between subordinate fish eye colour and received attacks: a negative social feedback mechanism for the reduction of aggression during the formation of dominance hierarchies.

    PubMed

    Miyai, Caio A; Carretero Sanches, Fábio H; Costa, Tânia M; Colpo, Karine Delevati; Volpato, Gilson L; Barreto, Rodrigo E

    2011-12-01

    Eye darkening has been linked to social status in fish. The subordinate's eyes darken, while the eyes of the dominant fish become pale. Although this phenomenon has been described in salmonid fishes and in the African cichlid Nile tilapia Oreochromis niloticus, it is unclear whether eye darkening correlates with a reduction in aggressive behaviour. Thus, we evaluated the link between social status and eye darkening. We evaluated whether the eye colours of subordinate fish correlate with the frequency of received attacks in a neotropical fish, the pearl cichlid Geophagus brasiliensis. We paired pearl cichlids and quantified both the aggressive behaviour and the eye darkening of each fish. As has been described for Nile tilapia and Atlantic salmon, a clear-cut hierarchical relationship formed, where dominance and subordination were associated with pale and dark eye colours, respectively. Initially, eye colour darkening was positively correlated with the frequency of received attacks; however, a negative association occurred following eye darkening, in which the intensity of aggressive interactions decreased. Thus, fish that initially received a high number of attacks signalled subordination more rapidly and intensely (rapid and dramatic eye darkening), thereby inducing a negative social feedback mechanism that led to reduced aggression. Copyright © 2011 Elsevier GmbH. All rights reserved.

  12. Hot Corrosion of Single-Crystal NiAl-X Alloys

    NASA Technical Reports Server (NTRS)

    Nesbitt, James A.

    1998-01-01

    Several single-crystal NiAl-X alloys (X=Hf, Ti, Cr, Ga) underwent hot corrosion testing in a Mach 0.3 burner rig at 900 deg. C for 300 1-hr cycles. The surface morphology after testing consisted of either mounds or an inward, uniform-type of attack which preserved surface features. It was observed that the surface morphology was affected by the surface preparation treatments. Microstructurally, the hot corrosion attack initiated as pits but evolved to a rampant attack consisting of the rapid inward growth of Al2O3. Electropolishing and chemical milling produced many pits and grooves on the surface. However, the presence of pits and grooves did not appear to strongly influence the hot corrosion response. Attack on many samples was strongly localized which was attributed to compositional inhomogeneity within the samples. It was found that increasing the Ti content from 1% to 5 % degraded the hot corrosion response of these alloys. In contrast, the addition of 1-2% Cr reduced the susceptibility of these alloys to hot corrosion attack and negated the deleterious effect of the 4-5% Ti addition.

  13. Impulsive artistic creativity as a presentation of transient cognitive alterations.

    PubMed

    Finkelstein, Y; Vardi, J; Hod, I

    1991-01-01

    A 27-year-old right-handed male mosaic artisan who had not shown any interest in drawing or artistic activity was admitted to the Department of Neurology for attacks of bizarre behavior and convulsive disorder. The patient reported feeling "waves" engulfing him during the attacks, leaving him floating helplessly. During some attacks, the patient impulsively initiated drawing activity. Interictal sleep-deprivation EEG showed a left frontotemporal focus of paroxysmal discharge. Brain tomography with SPECT showed low 99Tc-HMPAO uptake in the left frontoparietal region. Psychodiagnostic tests gave evidence of dysfunction of the left frontal region, with preference of the right hemisphere. It is suggested that the attacks of altered cognitive state were, in this case, provoked by spreading depression of the left hemisphere, while the integrative functions of the right hemisphere remained intact. Thus, the impulsive artistic creativity during the attacks may represent a "release phenomenon" of the complex visuospatial skills of the right (subdominant) hemisphere. This symptomatology of transient cognitive alterations is unique and, to the best of our knowledge, has not been previously reported.

  14. An Efficient and Adaptive Mutual Authentication Framework for Heterogeneous Wireless Sensor Network-Based Applications

    PubMed Central

    Kumar, Pardeep; Ylianttila, Mika; Gurtov, Andrei; Lee, Sang-Gon; Lee, Hoon-Jae

    2014-01-01

    Robust security is highly coveted in real wireless sensor network (WSN) applications since wireless sensors' sense critical data from the application environment. This article presents an efficient and adaptive mutual authentication framework that suits real heterogeneous WSN-based applications (such as smart homes, industrial environments, smart grids, and healthcare monitoring). The proposed framework offers: (i) key initialization; (ii) secure network (cluster) formation (i.e., mutual authentication and dynamic key establishment); (iii) key revocation; and (iv) new node addition into the network. The correctness of the proposed scheme is formally verified. An extensive analysis shows the proposed scheme coupled with message confidentiality, mutual authentication and dynamic session key establishment, node privacy, and message freshness. Moreover, the preliminary study also reveals the proposed framework is secure against popular types of attacks, such as impersonation attacks, man-in-the-middle attacks, replay attacks, and information-leakage attacks. As a result, we believe the proposed framework achieves efficiency at reasonable computation and communication costs and it can be a safeguard to real heterogeneous WSN applications. PMID:24521942

  15. An efficient and adaptive mutual authentication framework for heterogeneous wireless sensor network-based applications.

    PubMed

    Kumar, Pardeep; Ylianttila, Mika; Gurtov, Andrei; Lee, Sang-Gon; Lee, Hoon-Jae

    2014-02-11

    Robust security is highly coveted in real wireless sensor network (WSN) applications since wireless sensors' sense critical data from the application environment. This article presents an efficient and adaptive mutual authentication framework that suits real heterogeneous WSN-based applications (such as smart homes, industrial environments, smart grids, and healthcare monitoring). The proposed framework offers: (i) key initialization; (ii) secure network (cluster) formation (i.e., mutual authentication and dynamic key establishment); (iii) key revocation; and (iv) new node addition into the network. The correctness of the proposed scheme is formally verified. An extensive analysis shows the proposed scheme coupled with message confidentiality, mutual authentication and dynamic session key establishment, node privacy, and message freshness. Moreover, the preliminary study also reveals the proposed framework is secure against popular types of attacks, such as impersonation attacks, man-in-the-middle attacks, replay attacks, and information-leakage attacks. As a result, we believe the proposed framework achieves efficiency at reasonable computation and communication costs and it can be a safeguard to real heterogeneous WSN applications.

  16. Regional Variation in Causes of Injuries among Terrorism Victims for Mass Casualty Events

    PubMed Central

    Regens, James L.; Schultheiss, Amy; Mould, Nick

    2015-01-01

    The efficient allocation of medical resources to prepare for and respond to mass casualty events (MCEs) attributable to intentional acts of terrorism is a major challenge confronting disaster planners and emergency personnel. This research article examines variation in regional patterns in the causes of injures associated with 77,258 successful terrorist attacks that occurred between 1970 and 2013 involving the use of explosives, firearms, and/or incendiaries. The objective of this research is to estimate regional variation in the use of different conventional weapons in successful terrorist attacks in each world region on variation in injury cause distributions. Indeed, we find that the distributions of the number of injuries attributable to specific weapons types (i.e., by cause) vary greatly among the 13 world regions identified within the Global Terrorism Database. PMID:26347857

  17. The History of Attack and Success of Emerald Ash Borer (Coleoptera: Buprestidae) on White Fringetree in Southwestern Ohio.

    PubMed

    Thiemann, Danielle; Lopez, Vanessa; Ray, Ann M; Cipollini, Don

    2016-08-01

    Emerald ash borer, Agrilus planipennis Fairmaire, is an invasive insect that has caused widespread mortality of ash species in North America. The ability of emerald ash borer to utilize white fringetree as an alternate host was reported recently. We aimed to determine how long white fringetree has been under attack from emerald ash borer, the degree of attack, and the overall success of this beetle on this novel host. Stems from three of nine infested white fringetrees collected from the Dayton and Cincinnati, OH, areas in the winter of 2015 yielded four live adult emerald ash borers after being held in rearing containers, and numerous older exit holes were observed. Measurement and aging of feeding galleries on these stems indicated that emerald ash borer has been using this species since 2011, at least, with peak gallery densities reached in 2012 and 2013 on most of the harvested trees. On average, 32 galleries per square meter were found in these stems with about one-third of them being indicative of fourth-instar larvae. This supports the assertion that emerald ash borer has been using white fringetree as a host plant with moderate to good success for as long as ash species in these particular areas have been utilized. © The Authors 2016. Published by Oxford University Press on behalf of Entomological Society of America. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  18. Neural Synchronization and Cryptography

    NASA Astrophysics Data System (ADS)

    Ruttor, Andreas

    2007-11-01

    Neural networks can synchronize by learning from each other. In the case of discrete weights full synchronization is achieved in a finite number of steps. Additional networks can be trained by using the inputs and outputs generated during this process as examples. Several learning rules for both tasks are presented and analyzed. In the case of Tree Parity Machines synchronization is much faster than learning. Scaling laws for the number of steps needed for full synchronization and successful learning are derived using analytical models. They indicate that the difference between both processes can be controlled by changing the synaptic depth. In the case of bidirectional interaction the synchronization time increases proportional to the square of this parameter, but it grows exponentially, if information is transmitted in one direction only. Because of this effect neural synchronization can be used to construct a cryptographic key-exchange protocol. Here the partners benefit from mutual interaction, so that a passive attacker is usually unable to learn the generated key in time. The success probabilities of different attack methods are determined by numerical simulations and scaling laws are derived from the data. They show that the partners can reach any desired level of security by just increasing the synaptic depth. Then the complexity of a successful attack grows exponentially, but there is only a polynomial increase of the effort needed to generate a key. Further improvements of security are possible by replacing the random inputs with queries generated by the partners.

  19. Post-Stall Aerodynamic Modeling and Gain-Scheduled Control Design

    NASA Technical Reports Server (NTRS)

    Wu, Fen; Gopalarathnam, Ashok; Kim, Sungwan

    2005-01-01

    A multidisciplinary research e.ort that combines aerodynamic modeling and gain-scheduled control design for aircraft flight at post-stall conditions is described. The aerodynamic modeling uses a decambering approach for rapid prediction of post-stall aerodynamic characteristics of multiple-wing con.gurations using known section data. The approach is successful in bringing to light multiple solutions at post-stall angles of attack right during the iteration process. The predictions agree fairly well with experimental results from wind tunnel tests. The control research was focused on actuator saturation and .ight transition between low and high angles of attack regions for near- and post-stall aircraft using advanced LPV control techniques. The new control approaches maintain adequate control capability to handle high angle of attack aircraft control with stability and performance guarantee.

  20. Tofacitinib suppresses disease activity and febrile attacks in a patient with coexisting rheumatoid arthritis and familial Mediterranean fever.

    PubMed

    Gök, Kevser; Cengiz, Gizem; Erol, Kemal; Ozgocmen, Salih

    2017-01-01

    Familial Mediterranean fever (FMF) is the most common hereditary auto-inflammatory (periodic fever) syndrome, and usually successfully treated with colchicine. However, nearly 5-10% of FMF cases are resistant or intolerant to colchicine and treatment options are highly restricted in these cases. Biologics including anakinra, canakinumab, rilonacept, etanercept, infliximab, interferon-alpha, and tocilizumab are shown to have efficacy to control FMF attacks. Tofacitinib, a Janus kinase (JAK) inhibitor, is an orally administered non-biologic disease modifying anti-rheumatic drug for the treatment of rheumatoid arthritis (RA). Herein we report a female patient with coexisting RA and colchicine resistant FMF whose FMF attacks and disease activity were completely controlled after treatment with tofacitinib, a small-molecule JAK3 inhibitor.

  1. Familial paroxysmal nonkinesigenic dyskinesia: clinical and genetic analysis of a Taiwanese family.

    PubMed

    Yeh, Tu-Hsueh; Lin, Juei-Jueng; Lai, Szu-Chia; Wu-Chou, Yah-Huei; Chen, An-Chih; Yueh, Kuo-Chu; Chen, Rou-Shayn; Lu, Chin-Song

    2012-12-15

    Paroxysmal nonkinesigenic dyskinesia (PNKD) is a rare disorder in autosomal dominant inheritance. The clinical features and genetic findings of PNKD, rarely described in the Asians, were mostly delineated from European families. The present study characterized the clinical and genetic findings of a Taiwanese PNKD family. The clinical features of our five patients in successive three generations included onset age less than 10 years, attack duration between 3 min and 4h, and a variety of aura symptoms. The attacks were provoked not by sudden action but by emotional stress, caffeine, fatigue, heavy exercise and sleep deprivation. Sleep could abolish or diminish the attack and the attacks responded well to clonazepam. Sequencing the whole coding region of PNKD/MR-1 gene identified a heterozygous c.20 C>T (p.Ala7Val) mutation which was clearly segregated in the five affected patients. Comparing our patients with previously reported 18 families with PNKD/MR-1 mutations, the majority of the patients exhibited quite similar manifestations in attack patterns and precipitating factors. The recurrent conservative mutations in different ethnicities indicate importance in the pathogenesis of PNKD. Copyright © 2012 Elsevier B.V. All rights reserved.

  2. Passive Faraday-mirror attack in a practical two-way quantum-key-distribution system

    NASA Astrophysics Data System (ADS)

    Sun, Shi-Hai; Jiang, Mu-Sheng; Liang, Lin-Mei

    2011-06-01

    The Faraday mirror (FM) plays a very important role in maintaining the stability of two-way plug-and-play quantum key distribution (QKD) systems. However, the practical FM is imperfect, which will not only introduce an additional quantum bit error rate (QBER) but also leave a loophole for Eve to spy the secret key. In this paper we propose a passive Faraday mirror attack in two-way QKD system based on the imperfection of FM. Our analysis shows that if the FM is imperfect, the dimension of Hilbert space spanned by the four states sent by Alice is three instead of two. Thus Eve can distinguish these states with a set of Positive Operator Valued Measure (POVM) operators belonging to three-dimension space, which will reduce the QBER induced by her attack. Furthermore, a relationship between the degree of the imperfection of FM and the transmittance of the practical QKD system is obtained. The results show that the probability that Eve loads her attack successfully depends on the degree of the imperfection of FM rapidly, but the QBER induced by Eve’s attack changes slightly with the degree of the FM imperfection.

  3. Risk assessment for physical and cyber attacks on critical infrastructures.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Smith, Bryan J.; Sholander, Peter E.; Phelan, James M.

    2005-08-01

    Assessing the risk of malevolent attacks against large-scale critical infrastructures requires modifications to existing methodologies. Existing risk assessment methodologies consider physical security and cyber security separately. As such, they do not accurately model attacks that involve defeating both physical protection and cyber protection elements (e.g., hackers turning off alarm systems prior to forced entry). This paper presents a risk assessment methodology that accounts for both physical and cyber security. It also preserves the traditional security paradigm of detect, delay and respond, while accounting for the possibility that a facility may be able to recover from or mitigate the results ofmore » a successful attack before serious consequences occur. The methodology provides a means for ranking those assets most at risk from malevolent attacks. Because the methodology is automated the analyst can also play 'what if with mitigation measures to gain a better understanding of how to best expend resources towards securing the facilities. It is simple enough to be applied to large infrastructure facilities without developing highly complicated models. Finally, it is applicable to facilities with extensive security as well as those that are less well-protected.« less

  4. STIDP: A U.S. Department of Homeland Security program for countering explosives attacks at large public events and mass transit facilities

    NASA Astrophysics Data System (ADS)

    Knudson, Christa K.; Kemp, Michael C.; Lombardo, Nicholas J.

    2009-05-01

    The U.S. Department of Homeland Security's Standoff Technology Integration and Demonstration Program is designed to accelerate the development and integration of technologies, concepts of operations, and training to defeat explosives attacks at large public events and mass transit facilities. The program will address threats posed by suicide bombers, vehicle-borne improvised explosive devices, and leave-behind bombs. The program is focused on developing and testing explosives countermeasure architectures using commercial off-the-shelf and near-commercial standoff and remotely operated detection technologies in prototypic operational environments. An important part of the program is the integration of multiple technologies and systems to protect against a wider range of threats, improve countermeasure performance, increase the distance from the venue at which screening is conducted, and reduce staffing requirements. The program will routinely conduct tests in public venues involving successively more advanced technology, higher levels of system integration, and more complex scenarios. This paper describes the initial field test of an integrated countermeasure system that included infrared, millimeter-wave, and video analytics technologies for detecting person-borne improvised explosive devices at a public arena. The test results are being used to develop a concept for the next generation of integrated countermeasures, to refine technical and operational requirements for architectures and technologies, and engage industry and academia in solution development.

  5. STIDP: A US Department of Homeland Security program for countering explosives attacks at large public events and mass transit facilities

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Knudson, Christa K.; Kemp, Michael C.; Lombardo, Nicholas J.

    The Department of Homeland Security’s Standoff Technology Integration and Demonstration Program is designed to accelerate the development and integration of technologies, concepts of operations, and training to prevent explosives attacks at large public events and mass transit facilities. The program will address threats posed by suicide bombers, vehicle-borne improvised explosive devices, and leave-behind bombs. The program is focused on developing and testing explosives countermeasure architectures using commercial off-the-shelf and near-commercial standoff and remotely operated detection technologies in prototypic operational environments. An important part of the program is the integration of multiple technologies and systems to protect against a wider rangemore » of threats, improve countermeasure performance, increase the distance from the venue at which screening is conducted, and reduce staffing requirements. The program will routinely conduct tests in public venues involving successively more advanced technology, higher levels of system integration, and more complex scenarios. This paper describes the initial field test of an integrated countermeasure system that included infrared, millimeter-wave, and video analytics technologies for detecting person-borne improvised explosive devices at a public arena. The test results are being used to develop a concept for the next generation of integrated countermeasures, to refine technical and operational requirements for architectures and technologies, and engage industry and academia in solution development.« less

  6. Cryptographic salting for security enhancement of double random phase encryption schemes

    NASA Astrophysics Data System (ADS)

    Velez Zea, Alejandro; Fredy Barrera, John; Torroba, Roberto

    2017-10-01

    Security in optical encryption techniques is a subject of great importance, especially in light of recent reports of successful attacks. We propose a new procedure to reinforce the ciphertexts generated in double random phase encrypting experimental setups. This ciphertext is protected by multiplexing with a ‘salt’ ciphertext coded with the same setup. We present an experimental implementation of the ‘salting’ technique. Thereafter, we analyze the resistance of the ‘salted’ ciphertext under some of the commonly known attacks reported in the literature, demonstrating the validity of our proposal.

  7. Efficacy of dosing and re-dosing of two oral fixed combinations of indomethacin, prochlorperazine and caffeine compared with oral sumatriptan in the acute treatment of multiple migraine attacks: a double-blind, double-dummy, randomised, parallel group, multicentre study

    PubMed Central

    Sandrini, G; Cerbo, R; Del Bene, E; Ferrari, A; Genco, S; Grazioli, I; Martelletti, P; Nappi, G; Pinessi, L; Sarchielli, P; Tamburro, P; Uslenghi, C; Zanchin, G

    2007-01-01

    Aims and methods: In this double-blind, double-dummy, randomised, parallel group, multicentre study, the efficacy of dosing and re-dosing of a fixed combination of indomethacin, prochlorperazine and caffeine (Indoprocaf) was compared with encapsulated sumatriptan in the acute treatment of two migraine attacks. Additionally, in the group taking Indoprocaf, two different oral formulations were tested: effervescent tablets and encapsulated coated tablets. Results: Of 297 patients randomised (150 assigned to Indoprocaf and 147 to sumatriptan), 281 were included in the intention-to-treat efficacy analysis. The initial dosing of Indoprocaf and sumatriptan was similarly effective with pain-free rates higher than 30% (95% CI of odds-ratio: 0.57–1.28) and headache relief rates of about 60% (95% CI of odds-ratio: 0.82–1.84) with both the drugs. The efficacy of re-dosing of Indoprocaf as rescue medication was more effective than that of sumatriptan with pain-free values of 47% vs. 27% in the total attacks with a statistically significant difference in the first migraine attack in favour of Indoprocaf. The efficacy of re-dosing to treat a recurrence/relapse was very high without differences between the drugs (pain-free: 60% with Indoprocaf and 50% with sumatriptan in the total attacks). Indoprocaf and sumatriptan were well-tolerated. Conclusion: The study demonstrated that the efficacy of the initial dosing of Indoprocaf was not higher than that of sumatriptan, but that the strategy to use the lowest effective dose as soon as the headache occurred, followed by a second dose if the headache has not relieved or to treat a relapse, was very effective, especially with Indoprocaf. PMID:17627707

  8. Interpersonal coordination tendencies supporting the creation/prevention of goal scoring opportunities in futsal.

    PubMed

    Vilar, Luís; Araújo, Duarte; Davids, Keith; Travassos, Bruno; Duarte, Ricardo; Parreira, João

    2014-01-01

    Research on 1vs1 sub-phases in team sports has shown how one player coordinates his/her actions with his/her opponent and the location of a target/goal to attain performance objectives. In this study, we extended this approach to analysis of 5vs5 competitive performance in the team sport of futsal to provide a performance analysis framework that explains how players coordinate their actions to create/prevent opportunities to score goals. For this purpose, we recorded all 10 futsal matches of the 2009 Lusophony Games held in Lisbon. We analysed the displacement trajectories of a shooting attacker and marking defender in plays ending in a goal, a goalkeeper's save, and a defender's interception, at four specific moments during performance: (1) assisting attacker's ball reception and (2) moment of passing, (3) shooter's ball reception, and (4), shot on goal. Statistical analysis showed that when a goal was scored, the defender's angle to the goal and to the attacker tended to decrease, the attacker was able to move to the same distance to the goal alongside the defender, and the attacker was closer to the defender and moving at the same velocity (at least) as the defender. This study identified emergent patterns of coordination between attackers and defenders under key competitive task constraints, such as the location of the goal, which supported successful performance in futsal.

  9. Thermal acclimation of interactions: differential responses to temperature change alter predator-prey relationship.

    PubMed

    Grigaltchik, Veronica S; Ward, Ashley J W; Seebacher, Frank

    2012-10-07

    Different species respond differently to environmental change so that species interactions cannot be predicted from single-species performance curves. We tested the hypothesis that interspecific difference in the capacity for thermal acclimation modulates predator-prey interactions. Acclimation of locomotor performance in a predator (Australian bass, Macquaria novemaculeata) was qualitatively different to that of its prey (eastern mosquitofish, Gambusia holbrooki). Warm (25°C) acclimated bass made more attacks than cold (15°C) acclimated fish regardless of acute test temperatures (10-30°C), and greater frequency of attacks was associated with increased prey capture success. However, the number of attacks declined at the highest test temperature (30°C). Interestingly, escape speeds of mosquitofish during predation trials were greater than burst speeds measured in a swimming arena, whereas attack speeds of bass were lower than burst speeds. As a result, escape speeds of mosquitofish were greater at warm temperatures (25°C and 30°C) than attack speeds of bass. The decline in the number of attacks and the increase in escape speed of prey means that predation pressure decreases at high temperatures. We show that differential thermal responses affect species interactions even at temperatures that are within thermal tolerance ranges. This thermal sensitivity of predator-prey interactions can be a mechanism by which global warming affects ecological communities.

  10. Thermal acclimation of interactions: differential responses to temperature change alter predator–prey relationship

    PubMed Central

    Grigaltchik, Veronica S.; Ward, Ashley J. W.; Seebacher, Frank

    2012-01-01

    Different species respond differently to environmental change so that species interactions cannot be predicted from single-species performance curves. We tested the hypothesis that interspecific difference in the capacity for thermal acclimation modulates predator–prey interactions. Acclimation of locomotor performance in a predator (Australian bass, Macquaria novemaculeata) was qualitatively different to that of its prey (eastern mosquitofish, Gambusia holbrooki). Warm (25°C) acclimated bass made more attacks than cold (15°C) acclimated fish regardless of acute test temperatures (10–30°C), and greater frequency of attacks was associated with increased prey capture success. However, the number of attacks declined at the highest test temperature (30°C). Interestingly, escape speeds of mosquitofish during predation trials were greater than burst speeds measured in a swimming arena, whereas attack speeds of bass were lower than burst speeds. As a result, escape speeds of mosquitofish were greater at warm temperatures (25°C and 30°C) than attack speeds of bass. The decline in the number of attacks and the increase in escape speed of prey means that predation pressure decreases at high temperatures. We show that differential thermal responses affect species interactions even at temperatures that are within thermal tolerance ranges. This thermal sensitivity of predator–prey interactions can be a mechanism by which global warming affects ecological communities. PMID:22859598

  11. Robust multiple frequency multiple power localization schemes in the presence of multiple jamming attacks

    PubMed Central

    2017-01-01

    Localization of the wireless sensor network is a vital area acquiring an impressive research concern and called upon to expand more with the rising of its applications. As localization is gaining prominence in wireless sensor network, it is vulnerable to jamming attacks. Jamming attacks disrupt communication opportunity among the sender and receiver and deeply impact the localization process, leading to a huge error of the estimated sensor node position. Therefore, detection and elimination of jamming influence are absolutely indispensable. Range-based techniques especially Received Signal Strength (RSS) is facing severe impact of these attacks. This paper proposes algorithms based on Combination Multiple Frequency Multiple Power Localization (C-MFMPL) and Step Function Multiple Frequency Multiple Power Localization (SF-MFMPL). The algorithms have been tested in the presence of multiple types of jamming attacks including capture and replay, random and constant jammers over a log normal shadow fading propagation model. In order to overcome the impact of random and constant jammers, the proposed method uses two sets of frequencies shared by the implemented anchor nodes to obtain the averaged RSS readings all over the transmitted frequencies successfully. In addition, three stages of filters have been used to cope with the replayed beacons caused by the capture and replay jammers. In this paper the localization performance of the proposed algorithms for the ideal case which is defined by without the existence of the jamming attack are compared with the case of jamming attacks. The main contribution of this paper is to achieve robust localization performance in the presence of multiple jamming attacks under log normal shadow fading environment with a different simulation conditions and scenarios. PMID:28493977

  12. Techniques for Combined Arms for Air Defense

    DTIC Science & Technology

    2016-07-29

    rockets can be expected on the initial attack run, while cannon and machine - gun fire will likely be used in the follow- on attack. THREAT...wing aircraft with 8 stinger missiles and an M3P .50 caliber machine gun . This system is highly mobile and can be used to provide SHORAD security for...position. If cover and concealment are less substantial, use the low kneeling position. When using the M240 machine gun , the gunner will also fire from a

  13. U.S. Marine Corps Operations in Iraq, 2003-2006

    DTIC Science & Technology

    2009-01-01

    Medina . The initial assignment for 11th MEU was the smoldering city of an-Najaf. After unloading from its shipping at Kuwait, Colonel Haslam sent...ron, 7th Cavalry) launch limited attacks to occupy the cemetery and the old city zone south of the Medina . The 1st Battalion, 4th Marines attacks in...Michael R. Ramos ) with attachments and most of MEU Service Support Group 31 of (commanded by Lieutenant Colonel James A. Vohr) reported on 24 October

  14. Increasing Effectiveness of U.S. Counterintelligence: Domestic and International Micro-Restructuring Initiatives to Mitigate Cyberespionage

    DTIC Science & Technology

    2012-06-01

    keys: Data Breach at the Pentagon’s Largest Supplier,” ITNEWS (30 May 2011). 116 Christopher Drew and John Markoff, “ Data Breach at Security Firm...117 Drew and Markoff, “ Data Breach at Security Firm Linked to Attack on Lockheed Martin.” 118 Hjortdal, “China’s Use of Cyber...John Markoff. “ Data Breach at Security Firm Linked to Attack on Lockheed Martin.” The New York Times, 27 May 2011. http://www.nytimes.com/2011/05/28

  15. Sexual minorities, human rights and public health strategies in Africa.

    PubMed

    Epprecht, Marc

    2012-01-01

    Remarkable progress has been made towards the recognition of sexual minority rights in Africa. At the same time, a marked increase in attacks, rhetorical abuse, and restrictive legislation against sexual minorities or ‘homosexuality’ makes activism for sexual rights a risky endeavour in many African countries. Campaigns for sexual rights and ‘coming out’ are frequently perceived as a form of Western cultural imperialism, leading to an exportation of Western gay identities and provoking a patriotic defensiveness. Cultures of quiet acceptance of same-sex relationships or secretive bisexuality are meanwhile also problematic given the high rate of HIV prevalence on much of the continent. This article examines specific initiatives that are using subtle, somewhat covert means to negotiate a path between rights activism and secretive bisexuality. It argues that strategies primarily focused on health concerns that simultaneously yet discreetly promote sexual rights are having some success in challenging prevalent homophobic or ‘silencing’ cultures and discourses.

  16. On future's doorstep: RNA interference and the pharmacopeia of tomorrow.

    PubMed

    Gewirtz, Alan M

    2007-12-01

    Small molecules and antibodies have revolutionized the treatment of malignant diseases and appear promising for the treatment of many others. Nonetheless, there are many candidate therapeutic targets that are not amenable to attack by the current generation of targeted therapies, and in a small but growing number of patients, resistance to initially successful treatments evolves. This Review Series on the medicinal promise of posttranscriptional gene silencing with small interfering RNA and other molecules capable of inducing RNA interference (RNAi) is motivated by the hypothesis that effectors of RNAi can be developed into effective drugs for treating malignancies as well as many other types of disease. As this Review Series points out, there is still much to do, but many in the field now hope that the time has finally arrived when "antisense" therapies will finally come of age and fulfill their promise as the magic bullets of the 21st century.

  17. The design and realisation of the IXV Mission Analysis and Flight Mechanics

    NASA Astrophysics Data System (ADS)

    Haya-Ramos, Rodrigo; Blanco, Gonzalo; Pontijas, Irene; Bonetti, Davide; Freixa, Jordi; Parigini, Cristina; Bassano, Edmondo; Carducci, Riccardo; Sudars, Martins; Denaro, Angelo; Angelini, Roberto; Mancuso, Salvatore

    2016-07-01

    The Intermediate eXperimental Vehicle (IXV) is a suborbital re-entry demonstrator successfully launched in February 2015 focusing on the in-flight demonstration of a lifting body system with active aerodynamic control surfaces. This paper presents an overview of the Mission Analysis and Flight Mechanics of the IXV vehicle, which comprises computation of the End-to-End (launch to splashdown) design trajectories, characterisation of the Entry Corridor, assessment of the Mission Performances through Monte Carlo campaigns, contribution to the aerodynamic database, analysis of the Visibility and link budget from Ground Stations and GPS, support to safety analyses (off nominal footprints), specification of the Centre of Gravity box, selection of the Angle of Attack trim line to be flown and characterisation of the Flying Qualities performances. An initial analysis and comparison with the raw flight data obtained during the flight will be discussed and first lessons learned derived.

  18. Airbus windshear warning and guidance system

    NASA Technical Reports Server (NTRS)

    Bonafe, J. L.

    1990-01-01

    From its first designed airplane, Airbus considered mandatory a help in the crew's decision-making process to initiate an escape maneuver and help to successfully realize it. All the Airbus airplanes designed since 1975 included an alpha-floor function and a speed reference control law imbedded in the speed reference system (SRS) box for A 300 and FAC and FCC for A 310, A300/600 and the A 320. Alpha-Floor function takes into account the airplane energy situation considering angle of attack and observed longitudinal situation in order to apply immediately the full power without any pilot action. Speed reference managers control airspeed and/or ground speed in order to survive a maximum in shear situation. In order to comply with the new FAA regulation: Aerospatiale and Airbus developed more efficient systems. A comparison between 1975 and a newly developed system is given. It is explained how the new system improves the situation.

  19. Phaeochromocytoma presenting as an acute coronary syndrome.

    PubMed

    Imam, Towhid; Finny, Philip; Choo-Kang, Alan; Khan, Rehman

    2016-10-26

    A 44-year-old Caucasian man presented to the emergency department in acute cardiogenic shock, with pulmonary oedema, secondary to an acute myocardial infarction and in a hyperosmolar hyperglycaemic state. The previous day he had undergone a colonoscopy, which revealed features of colitis, and was started on prednisolone. He had been previously diagnosed with type 2 diabetes, migraine and anxiety attacks. While awaiting a coronary angiogram he developed abdominal pain and a CT scan was performed and found a large right adrenal mass. Plasma-free metadrenaline levels were elevated. After 4 months, a right adrenalectomy was performed successfully. He made a good recovery with normalisation of his heart function and resolution of his diabetes. The diagnosis was delayed for years due to his episodic symptoms being attributed to other more common diagnoses. Although a rare diagnosis in itself, there are case reports of phaeochromocytoma initially presenting with an acute coronary syndrome. 2016 BMJ Publishing Group Ltd.

  20. Why marine phytoplankton calcify.

    PubMed

    Monteiro, Fanny M; Bach, Lennart T; Brownlee, Colin; Bown, Paul; Rickaby, Rosalind E M; Poulton, Alex J; Tyrrell, Toby; Beaufort, Luc; Dutkiewicz, Stephanie; Gibbs, Samantha; Gutowska, Magdalena A; Lee, Renee; Riebesell, Ulf; Young, Jeremy; Ridgwell, Andy

    2016-07-01

    Calcifying marine phytoplankton-coccolithophores- are some of the most successful yet enigmatic organisms in the ocean and are at risk from global change. To better understand how they will be affected, we need to know "why" coccolithophores calcify. We review coccolithophorid evolutionary history and cell biology as well as insights from recent experiments to provide a critical assessment of the costs and benefits of calcification. We conclude that calcification has high energy demands and that coccolithophores might have calcified initially to reduce grazing pressure but that additional benefits such as protection from photodamage and viral/bacterial attack further explain their high diversity and broad spectrum ecology. The cost-benefit aspect of these traits is illustrated by novel ecosystem modeling, although conclusive observations remain limited. In the future ocean, the trade-off between changing ecological and physiological costs of calcification and their benefits will ultimately decide how this important group is affected by ocean acidification and global warming.

  1. Why marine phytoplankton calcify

    PubMed Central

    Monteiro, Fanny M.; Bach, Lennart T.; Brownlee, Colin; Bown, Paul; Rickaby, Rosalind E. M.; Poulton, Alex J.; Tyrrell, Toby; Beaufort, Luc; Dutkiewicz, Stephanie; Gibbs, Samantha; Gutowska, Magdalena A.; Lee, Renee; Riebesell, Ulf; Young, Jeremy; Ridgwell, Andy

    2016-01-01

    Calcifying marine phytoplankton—coccolithophores— are some of the most successful yet enigmatic organisms in the ocean and are at risk from global change. To better understand how they will be affected, we need to know “why” coccolithophores calcify. We review coccolithophorid evolutionary history and cell biology as well as insights from recent experiments to provide a critical assessment of the costs and benefits of calcification. We conclude that calcification has high energy demands and that coccolithophores might have calcified initially to reduce grazing pressure but that additional benefits such as protection from photodamage and viral/bacterial attack further explain their high diversity and broad spectrum ecology. The cost-benefit aspect of these traits is illustrated by novel ecosystem modeling, although conclusive observations remain limited. In the future ocean, the trade-off between changing ecological and physiological costs of calcification and their benefits will ultimately decide how this important group is affected by ocean acidification and global warming. PMID:27453937

  2. [A bomb attack in the Netherlands; how would we provide hospital care?

    PubMed

    Haverkort, J J M; de Jong, M B; van Spengler, L L; Leenen, L P H

    2017-01-01

    - There is an ever-present threat of large-scale incidents and disasters, such as terrorism and natural disasters.- Preparation and planning are the key to successful response to major incidents and disasters, which is why education, training sessions and exercises take place in the Netherlands.- Analysis of recent large-scale incidents in Europe and the USA emphasises the importance of adequate distribution of the wounded to centres where the correct care can be provided.- A major step has been taken in the Netherlands to provide for such an eventuality with the introduction of distribution plans for the wounded, and other initiatives such as a regional hospital disaster plan.- If a large-scale incident should take place the Netherlands also has a Major Incident Hospital at its disposal; this is a unique facility that can guarantee availability of 200 spare beds to the Netherlands healthcare system within 30 minutes.

  3. Writing and Computing across the USM Chemistry Curriculum

    NASA Astrophysics Data System (ADS)

    Gordon, Nancy R.; Newton, Thomas A.; Rhodes, Gale; Ricci, John S.; Stebbins, Richard G.; Tracy, Henry J.

    2001-01-01

    The faculty of the University of Southern Maine believes the ability to communicate effectively is one of the most important skills required of successful chemists. To help students achieve that goal, the faculty has developed a Writing and Computer Program consisting of writing and computer assignments of gradually increasing sophistication for all our laboratory courses. The assignments build in complexity until, at the junior level, students are writing full journal-quality laboratory reports. Computer assignments also increase in difficulty as students attack more complicated subjects. We have found the program easy to initiate and our part-time faculty concurs as well. The Writing and Computing across the Curriculum Program also serves to unite the entire chemistry curriculum. We believe the program is helping to reverse what the USM chemistry faculty and other educators have found to be a steady deterioration in the writing skills of many of today's students.

  4. Arms Control and the Strategic Defense Initiative: Three Perspectives. Occasional Paper 36.

    ERIC Educational Resources Information Center

    Hough, Jerry F.; And Others

    Three perspectives on President Ronald Reagan's Strategic Defense Initiative (SDI), which is intended to defend U.S. targets from a Soviet nuclear attack, are presented in separate sections. In the first section, "Soviet Interpretation and Response," Jerry F. Hough examines possible reasons for Soviet preoccupation with SDI. He discusses…

  5. 'Parental Rights:' The Trojan Horse of the Religious Right Attack on Public Education.

    ERIC Educational Resources Information Center

    People for the American Way, Washington, DC.

    The potential intended and unintended impact of parental rights initiatives on public education and child welfare agencies and on existing laws demands further scrutiny of the legislation and of its proponents and their motivations. Proponents assert that parental rights initiatives would guarantee parents' rights to direct the upbringing of their…

  6. Commando Raids: 1946-1983.

    DTIC Science & Technology

    1985-10-01

    excluded, the success rate of elite forces declines to 33 percent. Nevertheless, commando and commando-type warfare possesses a number of advantages: * It...operations took place. When these two operations are excluded, the rate of success of elite forces declines significantly (to 33 percent). Commando units...102-103. 1°. -53- (68) Operation Aztec : attack on Jorge do Limpopo, Mapai, and Madulo Pan, Mozambique, May/June 1977: Cross-border operation

  7. Toward effectiveness and agility of network security situational awareness using moving target defense (MTD)

    NASA Astrophysics Data System (ADS)

    Ge, Linqiang; Yu, Wei; Shen, Dan; Chen, Genshe; Pham, Khanh; Blasch, Erik; Lu, Chao

    2014-06-01

    Most enterprise networks are built to operate in a static configuration (e.g., static software stacks, network configurations, and application deployments). Nonetheless, static systems make it easy for a cyber adversary to plan and launch successful attacks. To address static vulnerability, moving target defense (MTD) has been proposed to increase the difficulty for the adversary to launch successful attacks. In this paper, we first present a literature review of existing MTD techniques. We then propose a generic defense framework, which can provision an incentive-compatible MTD mechanism through dynamically migrating server locations. We also present a user-server mapping mechanism, which not only improves system resiliency, but also ensures network performance. We demonstrate a MTD with a multi-user network communication and our data shows that the proposed framework can effectively improve the resiliency and agility of the system while achieving good network timeliness and throughput performance.

  8. How moths escape bats: predicting outcomes of predator-prey interactions.

    PubMed

    Corcoran, Aaron J; Conner, William E

    2016-09-01

    What determines whether fleeing prey escape from attacking predators? To answer this question, biologists have developed mathematical models that incorporate attack geometries, pursuit and escape trajectories, and kinematics of predator and prey. These models have rarely been tested using data from actual predator-prey encounters. To address this problem, we recorded multi-camera infrared videography of bat-insect interactions in a large outdoor enclosure. We documented 235 attacks by four Myotis volans bats on a variety of moths. Bat and moth flight trajectories from 50 high-quality attacks were reconstructed in 3-D. Despite having higher maximum velocity, deceleration and overall turning ability, bats only captured evasive prey in 69 of 184 attacks (37.5%); bats captured nearly all moths not evading attack (50 of 51; 98%). Logistic regression indicated that prey radial acceleration and escape angle were the most important predictors of escape success (44 of 50 attacks correctly classified; 88%). We found partial support for the turning gambit mathematical model; however, it underestimated the escape threshold by 25% of prey velocity and did not account for prey escape angle. Whereas most prey escaping strikes flee away from predators, moths typically escaped chasing bats by turning with high radial acceleration toward 'safety zones' that flank the predator. This strategy may be widespread in prey engaged in chases. Based on these findings, we developed a novel geometrical model of predation. We discuss implications of this model for the co-evolution of predator and prey kinematics and pursuit and escape strategies. © 2016. Published by The Company of Biologists Ltd.

  9. Network Anomaly Detection Based on Wavelet Analysis

    NASA Astrophysics Data System (ADS)

    Lu, Wei; Ghorbani, Ali A.

    2008-12-01

    Signal processing techniques have been applied recently for analyzing and detecting network anomalies due to their potential to find novel or unknown intrusions. In this paper, we propose a new network signal modelling technique for detecting network anomalies, combining the wavelet approximation and system identification theory. In order to characterize network traffic behaviors, we present fifteen features and use them as the input signals in our system. We then evaluate our approach with the 1999 DARPA intrusion detection dataset and conduct a comprehensive analysis of the intrusions in the dataset. Evaluation results show that the approach achieves high-detection rates in terms of both attack instances and attack types. Furthermore, we conduct a full day's evaluation in a real large-scale WiFi ISP network where five attack types are successfully detected from over 30 millions flows.

  10. Airborne Use of Night Vision Systems

    NASA Astrophysics Data System (ADS)

    Mepham, S.

    1990-04-01

    Mission Management Department of the Royal Aerospace Establishment has won a Queen's Award for Technology, jointly with GEC Sensors, in recognition of innovation and success in the development and application of night vision technology for fixed wing aircraft. This work has been carried out to satisfy the operational needs of the Royal Air Force. These are seen to be: - Operations in the NATO Central Region - To have a night as well as a day capability - To carry out low level, high speed penetration - To attack battlefield targets, especially groups of tanks - To meet these objectives at minimum cost The most effective way to penetrate enemy defences is at low level and survivability would be greatly enhanced with a first pass attack. It is therefore most important that not only must the pilot be able to fly at low level to the target but also he must be able to detect it in sufficient time to complete a successful attack. An analysis of the average operating conditions in Central Europe during winter clearly shows that high speed low level attacks can only be made for about 20 per cent of the 24 hours. Extending this into good night conditions raises the figure to 60 per cent. Whilst it is true that this is for winter conditions and in summer the situation is better, the overall advantage to be gained is clear. If our aircraft do not have this capability the potential for the enemy to advance his troops and armour without hinderance for considerable periods is all too obvious. There are several solutions to providing such a capability. The one chosen for Tornado GR1 is to use Terrain Following Radar (TFR). This system is a complete 24 hour capability. However it has two main disadvantages, it is an active system which means it can be jammed or homed into, and is useful in attacking pre-planned targets. Second it is an expensive system which precludes fitting to other than a small number of aircraft.

  11. Treatment strategies in the acute therapy of migraine: stratified care and early intervention.

    PubMed

    D'Amico, D; Moschiano, F; Usai, S; Bussone, G

    2006-05-01

    Various treatment strategies have been proposed to help clinicians provide the most effective acute treatment for migraine patients. Stratified care is based on the concept that the most appropriate initial treatment can be prescribed after evaluation of each patient's headache characteristics. The results of a large multicentre trial showed that when patients were stratified according to disability grade, clinical outcomes were significantly better than with step-care approaches. Prospective studies have shown that treating migraines with triptans when pain is mild (early intervention) considerably increases success rates for endpoints (pain-free at 2 h, sustained pain-free state) for which triptans had relatively poor efficacy in pivotal trials, and which contribute most to patient satisfaction. Stratified care and early treatment are also cost-effective. However these strategies are not suitable for all patients. Stratified care may be rendered difficult by medication contraindications and changes in attack characteristics over time. Early triptan intervention carries a risk of medication overuse and might not be indicated in patients with lack of pain progression. Successful implementation of both strategies requires that physicians are well informed, and that they elicit an exhaustive headache history from each patient.

  12. Microsurgical scalp reconstruction after a mountain lion attack.

    PubMed

    Hazani, Ron; Buntic, Rudolf F; Brooks, Darrell

    2008-09-01

    Mountain lion attacks on humans are rare and potentially fatal. Although few victims experience minor injuries, permanent disfigurement and disability is common among survivors of these assaults. Since 1986, a steady number of mountain lion attacks have been noted in California. We report a recent attack of a cougar on a couple hiking in California's Prairie Creek Redwoods State Park. The victim sustained a significant scalp injury that led to a life-threatening soft-tissue infection. We present an analysis of the injury pattern as it relates to the bite marks, the resulting degloving injury, and the surgical reconstruction. We also offer a current survey of the pathogens often found in cats' and mountain lions' bite wounds and the appropriate antibiotic treatment. Given the infrequency at which clinicians encounter mountain lion injuries, we recommend that after initial management and exclusion of life threatening injuries patients be transferred to a tertiary care facility capable of managing the various reconstructive challenges such as the one presented in this case.

  13. Lesson of the month 2: The limitations of steroid therapy in bradykinin-mediated angioedema attacks.

    PubMed

    Ismail, Sharif; Cheng, Leo; Grigoriadou, Sofia; Laffan, James; Menon, Manoj

    2015-02-01

    Acute angioedema attacks are conventionally treated with antihistamines and steroids, in line with a presumed mechanism of disease involving overwhelming mast-cell degranulation. This approach overlooks a small but important minority of cases in which attacks are bradykinin driven and exhibit poor responsiveness to steroid or anti-histamine therapy. These patients may have a family history of angioedema (hereditary angioedema), or a past medical history including B-cell lymphoproliferative disorders or autoimmune disease (acquired angioedema). Rather than steroid therapy, they respond to administration of a bradykinin inhibitor, or more commonly, a C1 esterase inhibitor substitute, to control acute symptoms and reduce the probability of invasive airway insertion. In the long-term, they require C1 esterase inhibitor sparing therapy and a treat-the-cause approach to reduce the risk of recurrent attacks. We present here a case of a middle-aged woman who presented with recurrent angioedema of initially uncertain aetiology. © 2015 Royal College of Physicians.

  14. Hyperthyroidism with Periodic Paralysis

    PubMed Central

    Feldman, David L.; Goldberg, W. M.

    1969-01-01

    Hyperthyroidism may be associated with hypokalemic periodic paralysis. Two cases are presented demonstrating intermittent attacks of flaccid paralysis associated with clinical symptoms, signs and laboratory findings of hyperthyroidism. During an attack, one patient had a serum potassium of 2.1 mEq. per litre. Various factors such as trauma, exposure to cold, excessive carbohydrate ingestion and certain medications have been stated to precipitate an episode of paralysis. Attacks may range from mild weakness to generalized flaccid paralysis with loss of deep tendon reflexes. Several reported patients have died owing to cardiac arrest or respiratory paralysis. During attacks, the serum potassium is usually in the range of 2.2 to 3.2 mEq. per litre. It is postulated that a metabolic abnormality affecting the muscle-cell membrane can occur in the hyperthyroid state resulting in a shift of potassium to the intracellular position, thus producing a situation of hyperpolarization of the muscle-cell membrane which in turn alters the muscle contractibility. The importance of recognizing the unusual association of hypokalemic periodic paralysis with hyperthyroidism is stressed because, with successful treatment of the hyperthyroidism, the episodes of paralysis disappear. PMID:5353150

  15. Defence against Black Hole and Selective Forwarding Attacks for Medical WSNs in the IoT †

    PubMed Central

    Mathur, Avijit; Newe, Thomas; Rao, Muzaffar

    2016-01-01

    Wireless sensor networks (WSNs) are being used to facilitate monitoring of patients in hospital and home environments. These systems consist of a variety of different components/sensors and many processes like clustering, routing, security, and self-organization. Routing is necessary for medical-based WSNs because it allows remote data delivery and it facilitates network scalability in large hospitals. However, routing entails several problems, mainly due to the open nature of wireless networks, and these need to be addressed. This paper looks at two of the problems that arise due to wireless routing between the nodes and access points of a medical WSN (for IoT use): black hole and selective forwarding (SF) attacks. A solution to the former can readily be provided through the use of cryptographic hashes, while the latter makes use of a neighbourhood watch and threshold-based analysis to detect and correct SF attacks. The scheme proposed here is capable of detecting a selective forwarding attack with over 96% accuracy and successfully identifying the malicious node with 83% accuracy. PMID:26797620

  16. Identification of concrete deteriorating minerals by polarizing and scanning electron microscopy

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Gregerova, Miroslava, E-mail: mirka@sci.muni.cz; Vsiansky, Dalibor, E-mail: daliborv@centrum.cz

    2009-07-15

    The deterioration of concrete represents one of the most serious problems of civil engineering worldwide. Besides other processes, deterioration of concrete consists of sulfate attack and carbonation. Sulfate attack results in the formation of gypsum, ettringite and thaumasite in hardened concrete. Products of sulfate attack may cause a loss of material strength and a risk of collapse of the concrete constructions. The authors focused especially on the microscopical research of sulfate attack. Concrete samples were taken from the Charles Bridge in Prague, Czech Republic. A succession of degrading mineral formation was suggested. Microscope methods represent a new approach to solvingmore » the deterioration problems. They enable evaluation of the state of concrete constructions and in cooperation with hydro-geochemistry, mathematics and statistics permit prediction of the durability of a structure. Considering the number of concrete constructions and their age, research of concrete deterioration has an increasing importance. The results obtained can also be useful for future construction, because they identify the risk factors associated with formation of minerals known to degrade structures.« less

  17. Defence against Black Hole and Selective Forwarding Attacks for Medical WSNs in the IoT.

    PubMed

    Mathur, Avijit; Newe, Thomas; Rao, Muzaffar

    2016-01-19

    Wireless sensor networks (WSNs) are being used to facilitate monitoring of patients in hospital and home environments. These systems consist of a variety of different components/sensors and many processes like clustering, routing, security, and self-organization. Routing is necessary for medical-based WSNs because it allows remote data delivery and it facilitates network scalability in large hospitals. However, routing entails several problems, mainly due to the open nature of wireless networks, and these need to be addressed. This paper looks at two of the problems that arise due to wireless routing between the nodes and access points of a medical WSN (for IoT use): black hole and selective forwarding (SF) attacks. A solution to the former can readily be provided through the use of cryptographic hashes, while the latter makes use of a neighbourhood watch and threshold-based analysis to detect and correct SF attacks. The scheme proposed here is capable of detecting a selective forwarding attack with over 96% accuracy and successfully identifying the malicious node with 83% accuracy.

  18. Distributed reinforcement learning for adaptive and robust network intrusion response

    NASA Astrophysics Data System (ADS)

    Malialis, Kleanthis; Devlin, Sam; Kudenko, Daniel

    2015-07-01

    Distributed denial of service (DDoS) attacks constitute a rapidly evolving threat in the current Internet. Multiagent Router Throttling is a novel approach to defend against DDoS attacks where multiple reinforcement learning agents are installed on a set of routers and learn to rate-limit or throttle traffic towards a victim server. The focus of this paper is on online learning and scalability. We propose an approach that incorporates task decomposition, team rewards and a form of reward shaping called difference rewards. One of the novel characteristics of the proposed system is that it provides a decentralised coordinated response to the DDoS problem, thus being resilient to DDoS attacks themselves. The proposed system learns remarkably fast, thus being suitable for online learning. Furthermore, its scalability is successfully demonstrated in experiments involving 1000 learning agents. We compare our approach against a baseline and a popular state-of-the-art throttling technique from the network security literature and show that the proposed approach is more effective, adaptive to sophisticated attack rate dynamics and robust to agent failures.

  19. A Probabilistic Approach to Mitigate Composition Attacks on Privacy in Non-Coordinated Environments

    PubMed Central

    Sarowar Sattar, A.H.M.; Li, Jiuyong; Liu, Jixue; Heatherly, Raymond; Malin, Bradley

    2014-01-01

    Organizations share data about individuals to drive business and comply with law and regulation. However, an adversary may expose confidential information by tracking an individual across disparate data publications using quasi-identifying attributes (e.g., age, geocode and sex) associated with the records. Various studies have shown that well-established privacy protection models (e.g., k-anonymity and its extensions) fail to protect an individual’s privacy against this “composition attack”. This type of attack can be thwarted when organizations coordinate prior to data publication, but such a practice is not always feasible. In this paper, we introduce a probabilistic model called (d, α)-linkable, which mitigates composition attack without coordination. The model ensures that d confidential values are associated with a quasi-identifying group with a likelihood of α. We realize this model through an efficient extension to k-anonymization and use extensive experiments to show our strategy significantly reduces the likelihood of a successful composition attack and can preserve more utility than alternative privacy models, such as differential privacy. PMID:25598581

  20. SDN-based path hopping communication against eavesdropping attack

    NASA Astrophysics Data System (ADS)

    Zhang, Chuanhao; Bu, Youjun; Zhao, Zheng

    2016-10-01

    Network eavesdropping is one of the most popular means used by cyber attackers, which has been a severe threat to network communication security. Adversaries could capture and analyze network communication data from network nodes or links, monitor network status and steal sensitive data such as username and password etc. Traditional network usually uses static network configuration, and existing defense methods, including firewall, IDS, IPS etc., cannot prevent eavesdropping, which has no distinguishing characteristic. Network eavesdropping become silent during most of the time of the attacking process, which is why it is difficult to discover and to defend. But A successful eavesdropping attack also has its' precondition, which is the target path should be relatively stable and has enough time of duration. So, In order to resolve this problem, it has to work on the network architecture. In this paper, a path hopping communication(PHC) mechanism based on Software Define Network (SDN) was proposed to solve this problem. In PHC, Ends in communication packets as well as the routing paths were changed dynamically. Therefore, the traffic would be distributed to multiple flows and transmitted along different paths. so that Network eavesdropping attack could be prevented effectively. It was concluded that PHC was able to increase the overhead of Network eavesdropping, as well as the difficulty of communication data recovery.

  1. Tracing Potential School Shooters in the Digital Sphere

    NASA Astrophysics Data System (ADS)

    Veijalainen, Jari; Semenov, Alexander; Kyppö, Jorma

    There are over 300 known school shooting cases in the world and over ten known cases where the perpetrator(s) have been prohibited to perform the attack at the last moment or earlier. Interesting from our point of view is that in many cases the perpetrators have expressed their views in social media or on their web page well in advance, and often also left suicide messages in blogs and other forums before their attack, along the planned date and place. This has become more common towards the end of this decennium. In some cases this has made it possible to prevent the attack. In this paper we will look at the possibilities to find commonalities of the perpetrators, beyond the fact that they are all males from eleven to roughly 25 years old, and possibilities to follow their traces in the digital sphere in order to cut the dangerous development towards an attack. Should this not be possible, then an attack should be averted before it happens. We are especially interested in the multimedia data mining methods and social network mining and analysis that can be used to detect the possible perpetrators in time. We also present in this paper a probabilistic model that can be used to evaluate the success/failure rate of the detection of the possible perpetrators.

  2. Understanding the Role of Autoimmune Disorders on the Initial Presentation of Cardiovascular Disease

    ClinicalTrials.gov

    2015-04-20

    Myocardial Infarction; Ischemic Stroke; Stroke; Subarachnoid Haemorrhage; Venous Thrombosis; Transient Ischemic Attack; Stable Angina Pectoris; Unstable Angina; Heart Failure; Peripheral Arterial Disease; Abdominal Aortic Aneurysm

  3. A robust ECC based mutual authentication protocol with anonymity for session initiation protocol.

    PubMed

    Mehmood, Zahid; Chen, Gongliang; Li, Jianhua; Li, Linsen; Alzahrani, Bander

    2017-01-01

    Over the past few years, Session Initiation Protocol (SIP) is found as a substantial application-layer protocol for the multimedia services. It is extensively used for managing, altering, terminating and distributing the multimedia sessions. Authentication plays a pivotal role in SIP environment. Currently, Lu et al. presented an authentication protocol for SIP and profess that newly proposed protocol is protected against all the familiar attacks. However, the detailed analysis describes that the Lu et al.'s protocol is exposed against server masquerading attack and user's masquerading attack. Moreover, it also fails to protect the user's identity as well as it possesses incorrect login and authentication phase. In order to establish a suitable and efficient protocol, having ability to overcome all these discrepancies, a robust ECC-based novel mutual authentication mechanism with anonymity for SIP is presented in this manuscript. The improved protocol contains an explicit parameter for user to cope the issues of security and correctness and is found to be more secure and relatively effective to protect the user's privacy, user's masquerading and server masquerading as it is verified through the comprehensive formal and informal security analysis.

  4. An enhanced password authentication scheme for session initiation protocol with perfect forward secrecy

    PubMed Central

    2018-01-01

    The Session Initiation Protocol (SIP) is an extensive and esteemed communication protocol employed to regulate signaling as well as for controlling multimedia communication sessions. Recently, Kumari et al. proposed an improved smart card based authentication scheme for SIP based on Farash’s scheme. Farash claimed that his protocol is resistant against various known attacks. But, we observe some accountable flaws in Farash’s protocol. We point out that Farash’s protocol is prone to key-compromise impersonation attack and is unable to provide pre-verification in the smart card, efficient password change and perfect forward secrecy. To overcome these limitations, in this paper we present an enhanced authentication mechanism based on Kumari et al.’s scheme. We prove that the proposed protocol not only overcomes the issues in Farash’s scheme, but it can also resist against all known attacks. We also provide the security analysis of the proposed scheme with the help of widespread AVISPA (Automated Validation of Internet Security Protocols and Applications) software. At last, comparing with the earlier proposals in terms of security and efficiency, we conclude that the proposed protocol is efficient and more secure. PMID:29547619

  5. THE NEWEST CHAPTER IN COUNTERINSURGENCY OPERATIONS: DEFEATING THE ISLAMIC STATE OF IRAQ AND THE LEVANT EXPLORING HOW TO SUCCEED IN LIGHT OF RECENT COUNTERINSURGENCY OPERATIONS THAT YIELDED LIMITED OR NO SUCCESS

    DTIC Science & Technology

    2015-10-01

    concerns. Third, insurgent support bases and activities in Pakistan needed be eliminated. In every Afghanistan insurgency since 1979 , insurgents have...Vinograd, “ISIS Attacks Soared in Past 3 Months: HIS Jane’s Database”, web 136. Vinograd, “Are the Airstrike Against ISIS Working?”, web...Attacks Soared in Past 3 Months: IHS Jane’s Database.” NBC News, 21 Oct 2015. Web. 24 Oct 2015. Welna, David. “After A Year of Bombing ISIS

  6. Secure multi-party quantum summation based on quantum Fourier transform

    NASA Astrophysics Data System (ADS)

    Yang, Hui-Yi; Ye, Tian-Yu

    2018-06-01

    In this paper, we propose a novel secure multi-party quantum summation protocol based on quantum Fourier transform, where the traveling particles are transmitted in a tree-type mode. The party who prepares the initial quantum states is assumed to be semi-honest, which means that she may misbehave on her own but will not conspire with anyone. The proposed protocol can resist both the outside attacks and the participant attacks. Especially, one party cannot obtain other parties' private integer strings; and it is secure for the colluding attack performed by at most n - 2 parties, where n is the number of parties. In addition, the proposed protocol calculates the addition of modulo d and implements the calculation of addition in a secret-by-secret way rather than a bit-by-bit way.

  7. Psychosocial predictors of resilience after the September 11, 2001 terrorist attacks.

    PubMed

    Butler, Lisa D; Koopman, Cheryl; Azarow, Jay; Blasey, Christine M; Magdalene, Juliette C; DiMiceli, Sue; Seagraves, David A; Hastings, T Andrew; Chen, Xin-Hua; Garlan, Robert W; Kraemer, Helena C; Spiegel, David

    2009-04-01

    The terrorist attacks of September 11, 2001 inflicted distress beyond those directly exposed, thereby providing an opportunity to examine the contributions of a range of factors (cognitive, emotional, social support, coping) to psychological resilience for those indirectly exposed. In an Internet convenience sample of 1281, indices of resilience (higher well-being, lower distress) at baseline (2.5-12 weeks post-attack) were each associated with less emotional suppression, denial and self-blame, and fewer negative worldview changes. After controlling for initial outcomes, baseline negative worldview changes and aspects of social support and coping all remained significant predictors of 6-month outcomes, with worldview changes bearing the strongest relationship to each. These findings highlight the role of emotional, coping, social support, and particularly, cognitive variables in adjustment after terrorism.

  8. Cyber-physical security of Wide-Area Monitoring, Protection and Control in a smart grid environment

    PubMed Central

    Ashok, Aditya; Hahn, Adam; Govindarasu, Manimaran

    2013-01-01

    Smart grid initiatives will produce a grid that is increasingly dependent on its cyber infrastructure in order to support the numerous power applications necessary to provide improved grid monitoring and control capabilities. However, recent findings documented in government reports and other literature, indicate the growing threat of cyber-based attacks in numbers and sophistication targeting the nation’s electric grid and other critical infrastructures. Specifically, this paper discusses cyber-physical security of Wide-Area Monitoring, Protection and Control (WAMPAC) from a coordinated cyber attack perspective and introduces a game-theoretic approach to address the issue. Finally, the paper briefly describes how cyber-physical testbeds can be used to evaluate the security research and perform realistic attack-defense studies for smart grid type environments. PMID:25685516

  9. Cyber-physical security of Wide-Area Monitoring, Protection and Control in a smart grid environment.

    PubMed

    Ashok, Aditya; Hahn, Adam; Govindarasu, Manimaran

    2014-07-01

    Smart grid initiatives will produce a grid that is increasingly dependent on its cyber infrastructure in order to support the numerous power applications necessary to provide improved grid monitoring and control capabilities. However, recent findings documented in government reports and other literature, indicate the growing threat of cyber-based attacks in numbers and sophistication targeting the nation's electric grid and other critical infrastructures. Specifically, this paper discusses cyber-physical security of Wide-Area Monitoring, Protection and Control (WAMPAC) from a coordinated cyber attack perspective and introduces a game-theoretic approach to address the issue. Finally, the paper briefly describes how cyber-physical testbeds can be used to evaluate the security research and perform realistic attack-defense studies for smart grid type environments.

  10. Previous exposure to the World Trade Center terrorist attack and posttraumatic symptoms among older adults following Hurricane Sandy.

    PubMed

    Shrira, Amit; Palgi, Yuval; Hamama-Raz, Yaira; Goodwin, Robin; Ben-Ezra, Menachem

    2014-01-01

    The present study tested the maturation and inoculation hypotheses by examining whether age and previous exposure to the September 11, 2001, World Trade Center (WTC) terrorist attack moderated the relationship between degree of exposure to Hurricane Sandy and related posttraumatic stress disorder (PTSD) symptoms. An online sample of 1,000 participants from affected states completed self-report questionnaires one month after Hurricane Sandy hit the East Coast. Participants reported their degree of exposure to the WTC terrorist attack and to Hurricane Sandy, and their posttraumatic stress disorder (PTSD) symptoms following Hurricane Sandy. The positive relationship between degree of exposure to Hurricane Sandy and level of PTSD symptoms was weaker among older adults. An additional significant three-way interaction suggested that both age and previous exposure to the WTC terrorist attack moderated the relationship between degree of exposure to Hurricane Sandy and level of PTSD symptoms. Previous high degree of exposure to the WTC terrorist attack was related to a weaker effect of current exposure to Hurricane Sandy on PTSD symptoms among older adults. However, among younger adults, previous high degree of exposure to the WTC terrorist attack was related to a stronger effect of current exposure on PTSD symptoms. When confronted by a natural disaster, American older adults are generally resilient. Supporting the inoculation hypothesis, resilience of older adults may be partly related to the strength successfully extracted from previous exposure to adverse events.

  11. Transmissibility and persistence of oral polio vaccine viruses: implications for the global poliomyelitis eradication initiative.

    PubMed

    Fine, P E; Carneiro, I A

    1999-11-15

    The global poliomyelitis eradication initiative has been a tremendous success, with current evidence suggesting that wild poliovirus will cease to circulate anywhere in the world soon after the year 2000. As the goal of wild poliovirus eradication is approached, concern has been raised about the potential for persistent transmission of oral polio vaccine (OPV) viruses, as these viruses are known to revert toward wild-type neurovirulence. This paper has been extracted from a document prepared for the World Health Organization on the implications of OPV transmissibility for the strategy of stopping OPV vaccination after global eradication of wild polioviruses. The authors review the empirical evidence on OPV transmissibility available from household and community transmission studies and from mass-vaccination experiences. They then consider theoretical measures of transmissibility and persistence for wild and OPV viruses (secondary attack rate, basic reproduction number, and critical populations' size), to assess whether transmissibility of OPV viruses is sufficient to allow persistence of these viruses after cessation of vaccination. The findings indicate that OPV viruses could persist under various plausible circumstances, and that this potential should be a major consideration when planning the cessation of OPV vaccination.

  12. Cooperative Strategies to Develop Effective Stroke and Heart Attack Awareness Messages in Rural American Indian Communities, 2009–2010

    PubMed Central

    Gohdes, Dorothy; Fogle, Crystelle C.; Tadios, Fawn; Doore, Velva; Bell, Doreen S.; Harwell, Todd S.; Helgerson, Steven D.

    2013-01-01

    Introduction National initiatives to improve the recognition of heart attack and stroke warning signs have encouraged symptomatic people to seek early treatment, but few have shown significant effects in rural American Indian (AI) communities. Methods During 2009 and 2010, the Montana Cardiovascular Health Program, in collaboration with 2 tribal health departments, developed and conducted culturally specific public awareness campaigns for signs and symptoms of heart attack and stroke via local media. Telephone surveys were conducted before and after each campaign to evaluate the effectiveness of the campaigns. Results Knowledge of 3 or more heart attack warning signs and symptoms increased significantly on 1 reservation from 35% at baseline to 47% postcampaign. On the second reservation, recognition of 2 or more stroke signs and symptoms increased from 62% at baseline to 75% postcampaign, and the level of awareness remained at 73% approximately 4 months after the high-intensity campaign advertisements ended. Intent to call 9-1-1 did not increase in the heart attack campaign but did improve in the stroke campaign for specific symptoms. Recall of media campaigns on both reservations increased significantly from baseline to postcampaign for both media outlets (ie, radio and newspaper). Conclusion Carefully designed, culturally specific campaigns may help eliminate disparities in the recognition of heart attack and stroke warning signs in AI communities. PMID:23680509

  13. Cooperative strategies to develop effective stroke and heart attack awareness messages in rural american Indian communities, 2009-2010.

    PubMed

    Oser, Carrie S; Gohdes, Dorothy; Fogle, Crystelle C; Tadios, Fawn; Doore, Velva; Bell, Doreen S; Harwell, Todd S; Helgerson, Steven D

    2013-05-16

    National initiatives to improve the recognition of heart attack and stroke warning signs have encouraged symptomatic people to seek early treatment, but few have shown significant effects in rural American Indian (AI) communities. During 2009 and 2010, the Montana Cardiovascular Health Program, in collaboration with 2 tribal health departments, developed and conducted culturally specific public awareness campaigns for signs and symptoms of heart attack and stroke via local media. Telephone surveys were conducted before and after each campaign to evaluate the effectiveness of the campaigns. Knowledge of 3 or more heart attack warning signs and symptoms increased significantly on 1 reservation from 35% at baseline to 47% postcampaign. On the second reservation, recognition of 2 or more stroke signs and symptoms increased from 62% at baseline to 75% postcampaign, and the level of awareness remained at 73% approximately 4 months after the high-intensity campaign advertisements ended. Intent to call 9-1-1 did not increase in the heart attack campaign but did improve in the stroke campaign for specific symptoms. Recall of media campaigns on both reservations increased significantly from baseline to postcampaign for both media outlets (ie, radio and newspaper). Carefully designed, culturally specific campaigns may help eliminate disparities in the recognition of heart attack and stroke warning signs in AI communities.

  14. Detecting Heap-Spraying Code Injection Attacks in Malicious Web Pages Using Runtime Execution

    NASA Astrophysics Data System (ADS)

    Choi, Younghan; Kim, Hyoungchun; Lee, Donghoon

    The growing use of web services is increasing web browser attacks exponentially. Most attacks use a technique called heap spraying because of its high success rate. Heap spraying executes a malicious code without indicating the exact address of the code by copying it into many heap objects. For this reason, the attack has a high potential to succeed if only the vulnerability is exploited. Thus, attackers have recently begun using this technique because it is easy to use JavaScript to allocate the heap memory area. This paper proposes a novel technique that detects heap spraying attacks by executing a heap object in a real environment, irrespective of the version and patch status of the web browser. This runtime execution is used to detect various forms of heap spraying attacks, such as encoding and polymorphism. Heap objects are executed after being filtered on the basis of patterns of heap spraying attacks in order to reduce the overhead of the runtime execution. Patterns of heap spraying attacks are based on analysis of how an web browser accesses benign web sites. The heap objects are executed forcibly by changing the instruction register into the address of them after being loaded into memory. Thus, we can execute the malicious code without having to consider the version and patch status of the browser. An object is considered to contain a malicious code if the execution reaches a call instruction and then the instruction accesses the API of system libraries, such as kernel32.dll and ws_32.dll. To change registers and monitor execution flow, we used a debugger engine. A prototype, named HERAD(HEap spRAying Detector), is implemented and evaluated. In experiments, HERAD detects various forms of exploit code that an emulation cannot detect, and some heap spraying attacks that NOZZLE cannot detect. Although it has an execution overhead, HERAD produces a low number of false alarms. The processing time of several minutes is negligible because our research focuses on detecting heap spraying. This research can be applied to existing systems that collect malicious codes, such as Honeypot.

  15. A New Triage Support Tool in Case of Explosion.

    PubMed

    Yavari-Sartakhti, Olivier; Briche, Frédérique; Jost, Daniel; Michaud, Nicolas; Bignand, Michel; Tourtier, Jean-Pierre

    2018-04-01

    Deafness frequently observed in explosion victims, currently following terrorist attack, is a barrier to communication between victims and first responders. This may result in a delay in the initial triage and evacuation. In such situations, Paris Fire Brigade (Paris, France) proposes the use of assistance cards to help conscious, but deafened patients at the site of an attack where there may be numerous victims. Yavari-Sartakhti O , Briche F , Jost D , Michaud N , Bignand M , Tourtier JP . A new triage support tool in case of explosion. Prehosp Disaster Med. 2018;33(2):213-214.

  16. Emergency care centers--an efficient method for mitigation of consequences after a dirty bomb attack.

    PubMed

    Miska, Horst

    2012-08-01

    For emergency preparedness and response with respect to nuclear power plant accidents, the concept of Emergency Care Centers has been developed in Germany. This setup aims at monitoring contamination, to decontaminate if needed, assess the dose, and perform an initial medical evaluation of people who might have been affected by the accident. The concept has been tested in many exercises. In response to a terrorist attack involving a dirty bomb, this concept may prove useful for attending contaminated people who are not severely injured.

  17. Acidic attack of perfluorinated alkyl ether lubricant molecules by metal oxide surfaces

    NASA Technical Reports Server (NTRS)

    Zehe, Michael J.; Faut, Owen D.

    1990-01-01

    The reactions of linear perfluoropolyalkylether (PFAE) lubricants with alpha-Fe203 and Fe203-based solid superacids were studied. The reaction with alpha-Fe203 proceeds in two stages. The first stage is an initial slow catalytic decomposition of the fluid. This reaction releases reactive gaseous products which attach the metal oxide and convert it to FeF3. The second stage is a more rapid decomposition of the fluid, effected by the surface FeF3. A study of the initial breakdown step was performed using alpha-Fe203, alpha-Fe203 preconverted to FeF3, and sulfate-promoted alpha-Fe203 superacids. The results indicate that the breakdown reaction involves acidic attack at fluorine atoms on acetal carbons in the linear PFAE. Possible approaches to combat the problem are outlined.

  18. Characteristics of pediatric multiple sclerosis: The Turkish pediatric multiple sclerosis database.

    PubMed

    Yılmaz, Ünsal; Anlar, Banu; Gücüyener, Kıvılcım

    2017-11-01

    To document the clinical and paraclinical features of pediatric multiple sclerosis (MS) in Turkey. Data of MS patients with onset before age 18 years (n = 193) were collected from 27 pediatric neurology centers throughout Turkey. Earlier-onset (<12 years) and later-onset (≥12 years) groups were compared. There were 123 (63.7%) girls and 70 (36.3%) boys aged 4-17 years, median 14 years at disease onset. Family history of MS was 6.5%. The first presentation was polysymptomatic in 55.4% of patients, with brainstem syndromes (50.3%), sensory disturbances (44%), motor symptoms (33.2%), and optic neuritis (26.4%) as common initial manifestations. Nineteen children had facial paralysis and 10 had epileptic seizures at first attack; 21 (11%) were initially diagnosed with acute disseminated encephalomyelitis (ADEM). Oligoclonal bands were identified in 68% of patients. Magnetic resonance imaging revealed periventricular (96%), cortical/juxtacortical (64.2%), brainstem (63%), cerebellum (51.4%), and spinal cord (67%) involvement. Visual evoked potentials (VEP) were abnormal in 52%; serum 25-hydroxyvitamin D levels were low in 68.5% of patients. The earlier-onset group had a higher rate of infection/vaccination preceding initial attack, initial diagnosis of ADEM, longer interval between first 2 attacks, and more disability accumulating in the first 3 years of the disease. Brainstem and cerebellum are common sites of clinical and radiological involvement in pediatric-onset MS. VEP abnormalities are frequent even in patients without history of optic neuropathy. Vitamin D status does not appear to affect the course in early disease. MS beginning before 12 years of age has certain characteristics in history and course. Copyright © 2017 European Paediatric Neurology Society. Published by Elsevier Ltd. All rights reserved.

  19. Analysis of Forgery Attack on One-Time Proxy Signature and the Improvement

    NASA Astrophysics Data System (ADS)

    Wang, Tian-Yin; Wei, Zong-Li

    2016-02-01

    In a recent paper, Yang et al. (Quant. Inf. Process. 13(9), 2007-2016, 2014) analyzed the security of one-time proxy signature scheme Wang and Wei (Quant. Inf. Process. 11(2), 455-463, 2012) and pointed out that it cannot satisfy the security requirements of unforgeability and undeniability because an eavesdropper Eve can forge a valid proxy signature on a message chosen by herself. However, we find that the so-called proxy message-signature pair forged by Eve is issued by the proxy signer in fact, and anybody can obtain it as a requester, which means that the forgery attack is not considered as a successful attack. Therefore, the conclusion that this scheme cannot satisfy the security requirements of proxy signature against forging and denying is not appropriate in this sense. Finally, we study the reason for the misunderstanding and clarify the security requirements for proxy signatures.

  20. Collaboration Between Public Health and Law Enforcement: New Paradigms and Partnerships for Bioterrorism Planning and Response

    PubMed Central

    Cohen, Mitchell L.; Friedman, Cindy R.; Scripp, Robert M.; Watz, Craig G.

    2002-01-01

    The biological attacks with powders containing Bacillus anthracis sent through the mail during September and October 2001 led to unprecedented public health and law enforcement investigations, which involved thousands of investigators from federal, state, and local agencies. Following recognition of the first cases of anthrax in Florida in early October 2001, investigators from Centers for Disease Control and Prevention (CDC) and the Federal Bureau of Investigation (FBI) were mobilized to assist investigators from state and local public health and law enforcement agencies. Although public health and criminal investigations have been conducted in concert in the past, the response to the anthrax attacks required close collaboration because of the immediate and ongoing threat to public safety. We describe the collaborations between CDC and FBI during the investigation of the 2001 anthrax attacks and highlight the challenges and successes of public health and law enforcement collaborations in general. PMID:12396931

  1. Anthrax vaccines: present status and future prospects.

    PubMed

    Kaur, Manpreet; Singh, Samer; Bhatnagar, Rakesh

    2013-08-01

    The management of anthrax remains a top priority among the biowarfare/bioterror agents. It was the Bacillus anthracis spore attack through the US mail system after the September 11, 2001, terrorist attacks in the USA that highlighted the potential of B. anthracis as a bioterrorism agent and the threat posed by its deliberate dissemination. These attacks invigorated the efforts toward understanding the anthrax pathogenesis and development of more comprehensive medical intervention strategies for its containment in case of both natural disease and manmade, accidental or deliberate infection of a non-suspecting population. Currently, efforts are directed toward the development of safe and efficacious vaccines as well as intervention tools for controlling the disease in the advanced fulminant stage when toxemia has already developed. This work presents an overview of the current understanding of anthrax pathogenesis and recent advances made, particularly after 2001, for the successful management of anthrax and outlines future perspectives.

  2. A Bitslice Implementation of Anderson's Attack on A5/1

    NASA Astrophysics Data System (ADS)

    Bulavintsev, Vadim; Semenov, Alexander; Zaikin, Oleg; Kochemazov, Stepan

    2018-03-01

    The A5/1 keystream generator is a part of Global System for Mobile Communications (GSM) protocol, employed in cellular networks all over the world. Its cryptographic resistance was extensively analyzed in dozens of papers. However, almost all corresponding methods either employ a specific hardware or require an extensive preprocessing stage and significant amounts of memory. In the present study, a bitslice variant of Anderson's Attack on A5/1 is implemented. It requires very little computer memory and no preprocessing. Moreover, the attack can be made even more efficient by harnessing the computing power of modern Graphics Processing Units (GPUs). As a result, using commonly available GPUs this method can quite efficiently recover the secret key using only 64 bits of keystream. To test the performance of the implementation, a volunteer computing project was launched. 10 instances of A5/1 cryptanalysis have been successfully solved in this project in a single week.

  3. Piscivore-prey fish interactions: mechanisms behind diurnal patterns in prey selectivity in brown and clear water.

    PubMed

    Ranåker, Lynn; Persson, Jens; Jönsson, Mikael; Nilsson, P Anders; Brönmark, Christer

    2014-01-01

    Environmental change may affect predator-prey interactions in lakes through deterioration of visual conditions affecting foraging success of visually oriented predators. Environmental change in lakes includes an increase in humic matter causing browner water and reduced visibility, affecting the behavioural performance of both piscivores and prey. We studied diurnal patterns of prey selection in piscivorous pikeperch (Sander lucioperca) in both field and laboratory investigations. In the field we estimated prey selectivity and prey availability during day and night in a clear and a brown water lake. Further, prey selectivity during day and night conditions was studied in the laboratory where we manipulated optical conditions (humic matter content) of the water. Here, we also studied the behaviours of piscivores and prey, focusing on foraging-cycle stages such as number of interests and attacks by the pikeperch as well as the escape distance of the prey fish species. Analyses of gut contents from the field study showed that pikeperch selected perch (Perca fluviatilis) over roach (Rutilus rutilus) prey in both lakes during the day, but changed selectivity towards roach in both lakes at night. These results were corroborated in the selectivity experiments along a brown-water gradient in day and night light conditions. However, a change in selectivity from perch to roach was observed when the optical condition was heavily degraded, from either brown-stained water or light intensity. At longer visual ranges, roach initiated escape at distances greater than pikeperch attack distances, whereas perch stayed inactive making pikeperch approach and attack at the closest range possible. Roach anti-predatory behaviour decreased in deteriorated visual conditions, altering selectivity patterns. Our results highlight the importance of investigating both predator and prey responses to visibility conditions in order to understand the effects of degrading optical conditions on piscivore-prey interaction strength and thereby ecosystem responses to brownification of waters.

  4. Hypersonic boundary-layer transition measurements at Mach 10 on a large seven-degree cone at angle of attack

    NASA Astrophysics Data System (ADS)

    Moraru, Ciprian G.

    The ability to predict the onset of boundary-layer transition is critical for hypersonic flight vehicles. The development of prediction methods depends on a thorough comprehension of the mechanisms that cause transition. In order to improve the understanding of hypersonic boundary-layer transition, tests were conducted on a large 7° half-angle cone at Mach 10 in the Arnold Engineering Development Complex Wind Tunnel 9. Twenty-four runs were performed at varying unit Reynolds numbers and angles of attack for sharp and blunt nosetip configurations. Heat-transfer measurements were used to determine the start of transition on the cone. Increasing the unit Reynolds number caused a forward movement of transition on the sharp cone at zero angle of attack. Increasing nosetip radius delayed transition up to a radius of 12.7 mm. Larger nose radii caused the start of transition to move forward. At angles of attack up to 10°, transition was leeside forward for nose radii up to 12.7 mm and windside forward for nose radii of 25.4 mm and 50.8 mm. Second-mode instability waves were measured on the sharp cone and cones with small nose radii. At zero angle of attack, waves at a particular streamwise location on the sharp cone were in earlier stages of development as the unit Reynolds number was decreased. The same trend was observed as the nosetip radius was increased. No second-mode waves were apparent for the cones with large nosetip radii. As the angle of attack was increased, waves at a particular streamwise location on the sharp cone moved to earlier stages of growth on the windward ray and later stages of growth on the leeward ray. RMS amplitudes of second-mode waves were computed. Comparison between maximum second-mode amplitudes and edge Mach numbers showed good correlation for various nosetip radii and unit Reynolds numbers. Using the e N method, initial amplitudes were estimated and compared to freestream noise in the second-mode frequency band. Correlations indicate that freestream noise likely has a significant influence on initial second-mode amplitudes.

  5. An Energy-Efficient Secure Routing and Key Management Scheme for Mobile Sinks in Wireless Sensor Networks Using Deployment Knowledge

    PubMed Central

    Hung, Le Xuan; Canh, Ngo Trong; Lee, Sungyoung; Lee, Young-Koo; Lee, Heejo

    2008-01-01

    For many sensor network applications such as military or homeland security, it is essential for users (sinks) to access the sensor network while they are moving. Sink mobility brings new challenges to secure routing in large-scale sensor networks. Previous studies on sink mobility have mainly focused on efficiency and effectiveness of data dissemination without security consideration. Also, studies and experiences have shown that considering security during design time is the best way to provide security for sensor network routing. This paper presents an energy-efficient secure routing and key management for mobile sinks in sensor networks, called SCODEplus. It is a significant extension of our previous study in five aspects: (1) Key management scheme and routing protocol are considered during design time to increase security and efficiency; (2) The network topology is organized in a hexagonal plane which supports more efficiency than previous square-grid topology; (3) The key management scheme can eliminate the impacts of node compromise attacks on links between non-compromised nodes; (4) Sensor node deployment is based on Gaussian distribution which is more realistic than uniform distribution; (5) No GPS or like is required to provide sensor node location information. Our security analysis demonstrates that the proposed scheme can defend against common attacks in sensor networks including node compromise attacks, replay attacks, selective forwarding attacks, sinkhole and wormhole, Sybil attacks, HELLO flood attacks. Both mathematical and simulation-based performance evaluation show that the SCODEplus significantly reduces the communication overhead, energy consumption, packet delivery latency while it always delivers more than 97 percent of packets successfully. PMID:27873956

  6. An Energy-Efficient Secure Routing and Key Management Scheme for Mobile Sinks in Wireless Sensor Networks Using Deployment Knowledge.

    PubMed

    Hung, Le Xuan; Canh, Ngo Trong; Lee, Sungyoung; Lee, Young-Koo; Lee, Heejo

    2008-12-03

    For many sensor network applications such as military or homeland security, it is essential for users (sinks) to access the sensor network while they are moving. Sink mobility brings new challenges to secure routing in large-scale sensor networks. Previous studies on sink mobility have mainly focused on efficiency and effectiveness of data dissemination without security consideration. Also, studies and experiences have shown that considering security during design time is the best way to provide security for sensor network routing. This paper presents an energy-efficient secure routing and key management for mobile sinks in sensor networks, called SCODE plus . It is a significant extension of our previous study in five aspects: (1) Key management scheme and routing protocol are considered during design time to increase security and efficiency; (2) The network topology is organized in a hexagonal plane which supports more efficiency than previous square-grid topology; (3) The key management scheme can eliminate the impacts of node compromise attacks on links between non-compromised nodes; (4) Sensor node deployment is based on Gaussian distribution which is more realistic than uniform distribution; (5) No GPS or like is required to provide sensor node location information. Our security analysis demonstrates that the proposed scheme can defend against common attacks in sensor networks including node compromise attacks, replay attacks, selective forwarding attacks, sinkhole and wormhole, Sybil attacks, HELLO flood attacks. Both mathematical and simulation-based performance evaluation show that the SCODE plus significantly reduces the communication overhead, energy consumption, packet delivery latency while it always delivers more than 97 percent of packets successfully.

  7. Critical analysis of the Bennett-Riedel attack on secure cryptographic key distributions via the Kirchhoff-Law-Johnson-noise scheme.

    PubMed

    Kish, Laszlo B; Abbott, Derek; Granqvist, Claes G

    2013-01-01

    Recently, Bennett and Riedel (BR) (http://arxiv.org/abs/1303.7435v1) argued that thermodynamics is not essential in the Kirchhoff-law-Johnson-noise (KLJN) classical physical cryptographic exchange method in an effort to disprove the security of the KLJN scheme. They attempted to demonstrate this by introducing a dissipation-free deterministic key exchange method with two batteries and two switches. In the present paper, we first show that BR's scheme is unphysical and that some elements of its assumptions violate basic protocols of secure communication. All our analyses are based on a technically unlimited Eve with infinitely accurate and fast measurements limited only by the laws of physics and statistics. For non-ideal situations and at active (invasive) attacks, the uncertainly principle between measurement duration and statistical errors makes it impossible for Eve to extract the key regardless of the accuracy or speed of her measurements. To show that thermodynamics and noise are essential for the security, we crack the BR system with 100% success via passive attacks, in ten different ways, and demonstrate that the same cracking methods do not function for the KLJN scheme that employs Johnson noise to provide security underpinned by the Second Law of Thermodynamics. We also present a critical analysis of some other claims by BR; for example, we prove that their equations for describing zero security do not apply to the KLJN scheme. Finally we give mathematical security proofs for each BR-attack against the KLJN scheme and conclude that the information theoretic (unconditional) security of the KLJN method has not been successfully challenged.

  8. Critical Analysis of the Bennett–Riedel Attack on Secure Cryptographic Key Distributions via the Kirchhoff-Law–Johnson-Noise Scheme

    PubMed Central

    Kish, Laszlo B.; Abbott, Derek; Granqvist, Claes G.

    2013-01-01

    Recently, Bennett and Riedel (BR) (http://arxiv.org/abs/1303.7435v1) argued that thermodynamics is not essential in the Kirchhoff-law–Johnson-noise (KLJN) classical physical cryptographic exchange method in an effort to disprove the security of the KLJN scheme. They attempted to demonstrate this by introducing a dissipation-free deterministic key exchange method with two batteries and two switches. In the present paper, we first show that BR's scheme is unphysical and that some elements of its assumptions violate basic protocols of secure communication. All our analyses are based on a technically unlimited Eve with infinitely accurate and fast measurements limited only by the laws of physics and statistics. For non-ideal situations and at active (invasive) attacks, the uncertainly principle between measurement duration and statistical errors makes it impossible for Eve to extract the key regardless of the accuracy or speed of her measurements. To show that thermodynamics and noise are essential for the security, we crack the BR system with 100% success via passive attacks, in ten different ways, and demonstrate that the same cracking methods do not function for the KLJN scheme that employs Johnson noise to provide security underpinned by the Second Law of Thermodynamics. We also present a critical analysis of some other claims by BR; for example, we prove that their equations for describing zero security do not apply to the KLJN scheme. Finally we give mathematical security proofs for each BR-attack against the KLJN scheme and conclude that the information theoretic (unconditional) security of the KLJN method has not been successfully challenged. PMID:24358129

  9. Signs and symptoms preceding acute attacks of hereditary angioedema: results of three recent surveys.

    PubMed

    Reshef, Avner; Prematta, Michael J; Craig, Timothy J

    2013-01-01

    In patients with hereditary angioedema (HAE), premonitory symptoms ("prodromes") may appear hours to days before attack onset. It remains to be determined if prodromes could be useful indicators for early treatment initiation. Most published reports of prodromes have been limited to case reports or small case series. The common objective of several recent survey-based studies was to collect information relevant to prodromal patterns in patients with HAE. Three separate surveys solicited prodromal data from HAE patients. Although differences in survey methodologies permit only descriptive analysis of data, responses to the surveys provide the largest compilation of observational data on this topic to date. Prodromes were reported by 82.5-95.7% of patients surveyed. In one survey, about two-thirds of subjects reported experiencing prodromes before all or most acute HAE attacks, and only 6% of subjects noted the appearance of prodromes in <10% of all attacks. The most common types of prodromal symptoms were related to skin/soft tissue and gastrointestinal tract. Most prodromes were experienced hours to days before the onset of angioedema. A large percentage of surveyed subjects indicated being able to predict an impending HAE attack all or most of the time; <10% reported being rarely or never able to predict an attack. Although insufficient to establish the clinical role of prodromal symptoms, results of these surveys provide additional data on the scope of prodromes and could stimulate further research into the potential efficacy and cost-effectiveness of HAE attack prediction and prodrome-triggered interventions.

  10. A Brief Interview to Detect Panic Attacks and Panic Disorder in Emergency Department Patients with Cardiopulmonary Complaints.

    PubMed

    Sung, Sharon C; Rush, A John; Earnest, Arul; Lim, Leslie E C; Pek, Maeve P P; Choi, Joen M F; Ng, Magdalene P K; Ong, Marcus E H

    2018-01-01

    Patients with panic-related anxiety often initially present to the emergency department (ED) complaining of respiratory or cardiac symptoms, but rates of detection of panic symptoms by ED physicians remain low. This study was undertaken to evaluate the relevance of panic attacks and panic disorder in ED patients who present with cardiopulmonary symptoms and to determine whether a brief symptom-based tool could be constructed to assist in rapid recognition of panic-related anxiety in the ED setting. English-speaking adult ED patients with a chief complaint of palpitations, chest pain, dizziness, or difficulty breathing were evaluated for the presence of panic attacks and panic disorder with the Structured Clinical Interview for DSM-IV Axis I Disorders. Participants completed self-report measures to assess panic-related symptoms, comorbid psychiatric conditions, health-related disability, and health service use. In this sample (N=200), 23.5% had panic attacks and 23.0% had panic disorder. Both groups reported higher rates of panic attack symptoms, greater psychiatric comorbidity, greater health-related disability, and higher rates of ED and mental health service use compared with those without either condition. A brief 7-item tool consisting of panic symptoms identified patients with panic attacks or panic disorder with 85% accuracy (area under the curve=0.90, sensitivity=82%, specificity=88%). Patients with panic attacks or panic disorder commonly present to the ED, but often go unrecognized. A brief 7-item clinician rating scale accurately identifies these patients among those ED patients presenting with cardiopulmonary complaints.

  11. Depletion-of-Battery Attack: Specificity, Modelling and Analysis.

    PubMed

    Shakhov, Vladimir; Koo, Insoo

    2018-06-06

    The emerging Internet of Things (IoT) has great potential; however, the societal costs of the IoT can outweigh its benefits. To unlock IoT potential, there needs to be improvement in the security of IoT applications. There are several standardization initiatives for sensor networks, which eventually converge with the Internet of Things. As sensor-based applications are deployed, security emerges as an essential requirement. One of the critical issues of wireless sensor technology is limited sensor resources, including sensor batteries. This creates a vulnerability to battery-exhausting attacks. Rapid exhaustion of sensor battery power is not only explained by intrusions, but can also be due to random failure of embedded sensor protocols. Thus, most wireless sensor applications, without tools to defend against rash battery exhausting, would be unable to function during prescribed times. In this paper, we consider a special type of threat, in which the harm is malicious depletion of sensor battery power. In contrast to the traditional denial-of-service attack, quality of service under the considered attack is not necessarily degraded. Moreover, the quality of service can increase up to the moment of the sensor set crashes. We argue that this is a distinguishing type of attack. Hence, the application of a traditional defense mechanism against this threat is not always possible. Therefore, effective methods should be developed to counter the threat. We first discuss the feasibility of rash depletion of battery power. Next, we propose a model for evaluation of energy consumption when under attack. Finally, a technique to counter the attack is discussed.

  12. Assessing Terrorist Motivations for Attacking Critical Infrastructure

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ackerman, G; Abhayaratne, P; Bale, J

    Certain types of infrastructure--critical infrastructure (CI)--play vital roles in underpinning our economy, security and way of life. These complex and often interconnected systems have become so ubiquitous and essential to day-to-day life that they are easily taken for granted. Often it is only when the important services provided by such infrastructure are interrupted--when we lose easy access to electricity, health care, telecommunications, transportation or water, for example--that we are conscious of our great dependence on these networks and of the vulnerabilities that stem from such dependence. Unfortunately, it must be assumed that many terrorists are all too aware that CImore » facilities pose high-value targets that, if successfully attacked, have the potential to dramatically disrupt the normal rhythm of society, cause public fear and intimidation, and generate significant publicity. Indeed, revelations emerging at the time of this writing about Al Qaida's efforts to prepare for possible attacks on major financial facilities in New York, New Jersey, and the District of Columbia remind us just how real and immediate such threats to CI may be. Simply being aware that our nation's critical infrastructure presents terrorists with a plethora of targets, however, does little to mitigate the dangers of CI attacks. In order to prevent and preempt such terrorist acts, better understanding of the threats and vulnerabilities relating to critical infrastructure is required. The Center for Nonproliferation Studies (CNS) presents this document as both a contribution to the understanding of such threats and an initial effort at ''operationalizing'' its findings for use by analysts who work on issues of critical infrastructure protection. Specifically, this study focuses on a subsidiary aspect of CI threat assessment that has thus far remained largely unaddressed by contemporary terrorism research: the motivations and related factors that determine whether a terrorist organization will attack critical infrastructure. In other words, this research investigates: (1) why terrorists choose to attack critical infrastructure rather than other targets; (2) how groups make such decisions; (3) what, if any, types of groups are most inclined to attack critical infrastructure targets; and (4) which types of critical infrastructure terrorists prefer to attack and why. In an effort to address the above questions as comprehensively as possible, the project team employed four discrete investigative approaches in its research design. These include: (1) a review of existing terrorism and threat assessment literature to glean expert consensus regarding terrorist target selection, as well as to identify theoretical approaches that might be valuable to analysts and decision-makers who are seeking to understand such terrorist group decision-making processes; (2) the preparation of several concise case studies to help identify internal group factors and contextual influences that have played significant roles in leading some terrorist groups to attack critical infrastructure; (3) the creation of a new database--the Critical Infrastructure Terrorist Incident Catalog (CrITC)--to capture a large sample of empirical CI attack data that might be used to illuminate the nature of such attacks to date; and (4) the development of a new analytical framework--the Determinants Effecting Critical Infrastructure Decisions (DECIDe) Framework--designed to make the factors and dynamics identified by the study more ''usable'' in any future efforts to assess terrorist intentions to target critical infrastructure. Although each is addressed separately in the following chapters, none of the four aspects of this study were developed in isolation. Rather, all the constituent elements of the project informed--and were informed by--the others. For example, the review of the available literature on terrorist target selection made possible the identification of several target selection factors that were both important in the development of the analytical framework and subsequently validated by the case studies. Similarly, statistical analysis of the CrITIC data yielded measurable evidence that supported hypotheses derived from the framework, the case studies, and the writings of various experts. Besides providing an important mechanism of self-reinforcement and validation, the project's multifaceted nature made it possible to discern aspects of CI attack motivations that would likely have been missed if any single approach had been adopted.« less

  13. Use of Outpatient Cardiac Rehabilitation Among Heart Attack Survivors - 20 States and the District of Columbia, 2013 and Four States, 2015.

    PubMed

    Fang, Jing; Ayala, Carma; Luncheon, Cecily; Ritchey, Matthew; Loustalot, Fleetwood

    2017-08-25

    Heart disease is the leading cause of death in the United States (1). Each year, approximately 790,000 adults have a myocardial infarction (heart attack), including 210,000 that are recurrent heart attacks (2). Cardiac rehabilitation (rehab) includes exercise counseling and training, education for heart-healthy living, and counseling to reduce stress. Cardiac rehab provides patients with education regarding the causes of heart attacks and tools to initiate positive behavior change, and extends patients' medical management after a heart attack to prevent future negative sequelae (3). A systematic review has shown that after a heart attack, patients using cardiac rehab were 53% (95% confidence interval [CI] = 41%-62%) less likely to die from any cause and 57% (95% CI = 21%-77%) less likely to experience cardiac-related mortality than were those who did not use cardiac rehab (3). However, even with long-standing national recommendations encouraging use of cardiac rehab (4), the intervention has been underutilized. An analysis of 2005 Behavioral Risk Factor Surveillance System (BRFSS) data found that only 34.7% of adults who reported a history of a heart attack also reported subsequent use of cardiac rehab (5). To update these estimates, CDC used the most recent BRFSS data from 2013 and 2015 to assess the use of cardiac rehab among adults following a heart attack. Overall use of cardiac rehab was 33.7% in 20 states and the District of Columbia (DC) in 2013 and 35.5% in four states in 2015. Cardiac rehab use was underutilized overall and differences were evident by sex, age, race/ethnicity, level of education, cardiovascular risk status, and by state. Increasing use of cardiac rehab after a heart attack should be encouraged by health systems and supported by the public health community.

  14. Research on the water-entry attitude of a submersible aircraft.

    PubMed

    Xu, BaoWei; Li, YongLi; Feng, JinFu; Hu, JunHua; Qi, Duo; Yang, Jian

    2016-01-01

    The water entry of a submersible aircraft, which is transient, highly coupled, and nonlinear, is complicated. After analyzing the mechanics of this process, the change rate of every variable is considered. A dynamic model is build and employed to study vehicle attitude and overturn phenomenon during water entry. Experiments are carried out and a method to organize experiment data is proposed. The accuracy of the method is confirmed by comparing the results of simulation of dynamic model and experiment under the same condition. Based on the analysis of the experiment and simulation, the initial attack angle and angular velocity largely influence the water entry of vehicle. Simulations of water entry with different initial and angular velocities are completed, followed by an analysis, and the motion law of vehicle is obtained. To solve the problem of vehicle stability and control during water entry, an approach is proposed by which the vehicle sails with a zero attack angle after entering water by controlling the initial angular velocity. With the dynamic model and optimization research algorithm, calculation is performed, and the optimal initial angular velocity of water-entry is obtained. The outcome of simulations confirms that the effectiveness of the propose approach by which the initial water-entry angular velocity is controlled.

  15. An investigation of the initiation stage of hot corrosion in Ni-base alloys

    NASA Technical Reports Server (NTRS)

    Huang, T. T.; Meier, G. H.

    1979-01-01

    The commercial nickel base alloy, IN-738, and high purity laboratory alloys were prepared to simulate the effects of the major elements in IN-738. Results indicate that the initiation of hot corrosion attack of IN-738 and other similar alloys is the result of local penetration of molten salt through the protective oxide scale.

  16. EPA Healthy Heart Program Webinar

    EPA Pesticide Factsheets

    EPA is raising awareness of heart disease and its link to air pollution and other environmental factors as a partner in the Million Hearts, a national initiative to prevent 1 million heart attacks and strokes by 2017.

  17. EPA Science Matters: February 13, 2018

    EPA Pesticide Factsheets

    February is American Heart Month. EPA is raising awareness of heart disease and its link to air pollution and other environmental factors as a partner in Million Hearts, a national initiative to prevent heart attacks and strokes.

  18. Recurrent convulsions in a thoroughbred foal: management and treatment.

    PubMed

    May, C J; Greenwood, R E

    1977-07-23

    A thoroughbred foal had a convulsive attack 12 hours after birth followed by further convulsions on the 10th, 11th and 12th days after birth. It was treated successfully by medication with primidone, feeding by stomach tube and careful nursing.

  19. Interactions between microbial agents and gypsy moth parasites

    Treesearch

    Ronald M. Weseloh

    1985-01-01

    The parasite Cotesia melanoscelus attacks small gypsy moth larvae more successfully than large ones, and Bacillus thuringiensis retards the growth of caterpillars it does not kill. Together, both factors lead to higher parasitism by C. melanoscelus in areas sprayed with B. thuringiensis than...

  20. Evaluation of insecticides for protecting Southwestern ponderosa pines from attack by engraver beetles (Coleoptera: Curculionidae: Scolytinae).

    PubMed

    DeGomez, Tom E; Hayes, Christopher J; Anhold, John A; McMillin, Joel D; Clancy, Karen M; Bosu, Paul P

    2006-04-01

    Insecticides that might protect pine trees from attack by engraver beetles (Ips spp.) have not been rigorously tested in the southwestern United States. We conducted two field experiments to evaluate the efficacy of several currently and potentially labeled preventative insecticides for protecting high-value ponderosa pine, Pinus ponderosa Dougl ex. Laws., from attack by engraver beetles. Preventative sprays (0.19% permethrin [Permethrin Plus C]; 0.03, 0.06, and 0.12% bifenthrin [Onyx]; and 1.0 and 2.0% carbaryl [Sevin SL] formulations) and systemic implants (0.875 g per capsule acephate [Acecap] and 0.650 g per capsule dinotefuran) were assessed on bolts (sections of logs) as a surrogate for live trees for a period of 13 mo posttreatment. The pine engraver, Ips pini (Say), was the most common bark beetle found attacking control and treated bolts, but sixspined ips, Ips calligraphus (Germar), and Ips lecontei Swain also were present. After approximately 13 mo posttreatment in one experiment, the spray treatments with 2.0% carbaryl, 0.19% permethrin, and 0.06 or 0.12% bifenthrin prevented Ips attack on the bolts at a protection level of > or = 70%. The acephate and dinotefuran systemic insecticides, and the 0.03% bifenthrin spray, provided inadequate (< or = 36%) protection in this experiment. For the other experiment, sprayed applications of 1.0% carbaryl, 0.19% permethrin, and 0.06% bifenthrin prevented beetle attack at protection levels of > or = 90, > or = 80, and > or = 70%, respectively, when bolts were exposed to Ips beetle attack for approximately 9-15 wk posttreatment. The sprays with 0.19% permethrin and 0.06% bifenthrin also provided > or = 90% protection when bolts were exposed for approximately 15-54 wk posttreatment. We concluded that under the conditions tested, 1.0 and 2.0% carbaryl, 0.19% permethrin, and 0.06 and 0.12% binfenthrin were acceptable preventative treatments for protecting ponderosa pine from successful engraver beetle attack for one entire flight season in the U.S. Southwest.

  1. A systematic review of re-identification attacks on health data.

    PubMed

    El Emam, Khaled; Jonker, Elizabeth; Arbuckle, Luk; Malin, Bradley

    2011-01-01

    Privacy legislation in most jurisdictions allows the disclosure of health data for secondary purposes without patient consent if it is de-identified. Some recent articles in the medical, legal, and computer science literature have argued that de-identification methods do not provide sufficient protection because they are easy to reverse. Should this be the case, it would have significant and important implications on how health information is disclosed, including: (a) potentially limiting its availability for secondary purposes such as research, and (b) resulting in more identifiable health information being disclosed. Our objectives in this systematic review were to: (a) characterize known re-identification attacks on health data and contrast that to re-identification attacks on other kinds of data, (b) compute the overall proportion of records that have been correctly re-identified in these attacks, and (c) assess whether these demonstrate weaknesses in current de-identification methods. Searches were conducted in IEEE Xplore, ACM Digital Library, and PubMed. After screening, fourteen eligible articles representing distinct attacks were identified. On average, approximately a quarter of the records were re-identified across all studies (0.26 with 95% CI 0.046-0.478) and 0.34 for attacks on health data (95% CI 0-0.744). There was considerable uncertainty around the proportions as evidenced by the wide confidence intervals, and the mean proportion of records re-identified was sensitive to unpublished studies. Two of fourteen attacks were performed with data that was de-identified using existing standards. Only one of these attacks was on health data, which resulted in a success rate of 0.00013. The current evidence shows a high re-identification rate but is dominated by small-scale studies on data that was not de-identified according to existing standards. This evidence is insufficient to draw conclusions about the efficacy of de-identification methods.

  2. A Systematic Review of Re-Identification Attacks on Health Data

    PubMed Central

    El Emam, Khaled; Jonker, Elizabeth; Arbuckle, Luk; Malin, Bradley

    2011-01-01

    Background Privacy legislation in most jurisdictions allows the disclosure of health data for secondary purposes without patient consent if it is de-identified. Some recent articles in the medical, legal, and computer science literature have argued that de-identification methods do not provide sufficient protection because they are easy to reverse. Should this be the case, it would have significant and important implications on how health information is disclosed, including: (a) potentially limiting its availability for secondary purposes such as research, and (b) resulting in more identifiable health information being disclosed. Our objectives in this systematic review were to: (a) characterize known re-identification attacks on health data and contrast that to re-identification attacks on other kinds of data, (b) compute the overall proportion of records that have been correctly re-identified in these attacks, and (c) assess whether these demonstrate weaknesses in current de-identification methods. Methods and Findings Searches were conducted in IEEE Xplore, ACM Digital Library, and PubMed. After screening, fourteen eligible articles representing distinct attacks were identified. On average, approximately a quarter of the records were re-identified across all studies (0.26 with 95% CI 0.046–0.478) and 0.34 for attacks on health data (95% CI 0–0.744). There was considerable uncertainty around the proportions as evidenced by the wide confidence intervals, and the mean proportion of records re-identified was sensitive to unpublished studies. Two of fourteen attacks were performed with data that was de-identified using existing standards. Only one of these attacks was on health data, which resulted in a success rate of 0.00013. Conclusions The current evidence shows a high re-identification rate but is dominated by small-scale studies on data that was not de-identified according to existing standards. This evidence is insufficient to draw conclusions about the efficacy of de-identification methods. PMID:22164229

  3. Two fatal tiger attacks in zoos.

    PubMed

    Tantius, Britta; Wittschieber, Daniel; Schmidt, Sven; Rothschild, Markus A; Banaschak, Sibylle

    2016-01-01

    Two captive tiger attacks are presented that took place in Cologne and Münster zoos. Both attacks occurred when the handlers, intent on cleaning the enclosures, entered whilst the tigers accidently retained access to the location, and thus defended their territory against the perceived intruders. Both victims suffered fatal neck injuries from the bites. At Münster, colleagues managed to lure the tiger away from its victim to enable treatment, whilst the Cologne zoo tiger had to be shot in order to allow access to be gained. Whilst it was judged that human error led to the deaths of the experienced zookeepers, the investigation in Münster was closed as no third party was found to be at fault, whereas the Cologne zoo director was initially charged with being negligent. These charges were subsequently dismissed as safety regulations were found to be up to date.

  4. Patent foramen ovale and migraine attacks: a systematic review.

    PubMed

    Lip, Philomena Z Y; Lip, Gregory Y H

    2014-05-01

    Migraine headache and the presence of a patent foramen ovale have been associated with each other, although the precise pathophysiological mechanism(s) are uncertain. The purpose of this systematic review was to identify the extent of patent foramen ovale prevalence in migraineurs and to determine whether closure of a patent foramen ovale would improve migraine headache. An electronic literature search was performed to select studies between January 1980 and February 2013 that were relevant to the prevalence of patent foramen ovale and migraine, and the effects of intervention(s) on migraine attacks. Of the initial 368 articles presented by the initial search, 20 satisfied the inclusion criteria assessing patent foramen ovale prevalence in migraineurs and 21 presented data on patent foramen ovale closure. In case series and cohort studies, patent foramen ovale prevalence in migraineurs ranged from 14.6% to 66.5%. Case-control studies reported a prevalence ranging from 16.0% to 25.7% in controls, compared with 26.8% to 96.0% for migraine with aura. The extent of improvement or resolution of migraine headache attack symptoms was variable. In case series, intervention ameliorated migraine headache attack in 13.6% to 92.3% of cases. One single randomized trial did not show any benefit from patent foramen ovale closure. The data overall do not exclude the possibility of a placebo effect for resolving migraine following patent foramen ovale closure. This systematic review demonstrates firstly that migraine headache attack is associated with a higher prevalence of patent foramen ovale than among the general population. Observational data suggest that some improvement of migraine would be observed if the patent foramen ovale were to be closed. A proper assessment of any interventions for patent foramen ovale closure would require further large randomized trials to be conducted given uncertainties from existing trial data. Copyright © 2014 Elsevier Inc. All rights reserved.

  5. Herbivory Rapidly Activates MAPK Signaling in Attacked and Unattacked Leaf Regions but Not between Leaves of Nicotiana attenuata[W

    PubMed Central

    Wu, Jianqiang; Hettenhausen, Christian; Meldau, Stefan; Baldwin, Ian T.

    2007-01-01

    Mitogen-activated protein kinase (MAPK) signaling plays a central role in transducing extracellular stimuli into intracellular responses, but its role in mediating plant responses to herbivore attack remains largely unexplored. When Manduca sexta larvae attack their host plant, Nicotiana attenuata, the plant's wound response is reconfigured at transcriptional, phytohormonal, and defensive levels due to the introduction of oral secretions (OS) into wounds during feeding. We show that OS dramatically amplify wound-induced MAPK activity and that fatty acid–amino acid conjugates in M. sexta OS are the elicitors. Virus-induced gene silencing of salicylic acid–induced protein kinase (SIPK) and wound-induced protein kinase revealed their importance in mediating wound and OS-elicited hormonal responses and transcriptional regulation of defense-related genes. We found that after applying OS to wounds created in one portion of a leaf, SIPK is activated in both wounded and specific unwounded regions of the leaf but not in phylotactically connected adjacent leaves. We propose that M. sexta attack elicits a mobile signal that travels to nonwounded regions of the attacked leaf where it activates MAPK signaling and, thus, downstream responses; subsequently, a different signal is transported by the vascular system to systemic leaves to initiate defense responses without activating MAPKs in systemic leaves. PMID:17400894

  6. Guidance, steering, load relief and control of an asymmetric launch vehicle. M.S. Thesis - MIT

    NASA Technical Reports Server (NTRS)

    Boelitz, Frederick W.

    1989-01-01

    A new guidance, steering, and control concept is described and evaluated for the Third Phase of an asymmetrical configuration of the Advanced Launch System (ALS). The study also includes the consideration of trajectory shaping issues and trajectory design as well as the development of angular rate, angular acceleration, angle of attack, and dynamic pressure estimators. The Third Phase guidance, steering and control system is based on controlling the acceleration-direction of the vehicle after an initial launch maneuver. Unlike traditional concepts, the alignment of the estimated and commanded acceleration-directions is unimpaired by an add-on load relief. Instead, the acceleration-direction steering-control system features a control override that limits the product of estimated dynamic pressure and estimated angle of attack. When this product is not being limited, control is based exclusively on the commanded acceleration-direction without load relief. During limiting, control is based on nulling the error between the limited angle of attack and the estimated angle of attack. This limiting feature provides full freedom to the acceleration-direction steering and control to shape the trajectory within the limit, and also gives full priority to the limiting of angle of attack when necessary. The flight software concepts were analyzed on the basis of their effects on pitch plane motion.

  7. [Prevention of migraine with flunarizine and acetylsalicylic acid. A double-blind study].

    PubMed

    Pothmann, R

    1987-09-01

    30 children between 7 and 17 years suffering from at least 2 attacks/month of common or classical migraine since more than 1 year were studied. After clinical exclusion of symptomatic headache 4 weeks were documented by means of a migraine diary. Prophylaxis with Calcium entry blocker Flunarizine (Sibelium) or Thromboxane A inhibitor Acetylsalicylic acid (ASS) was carried out in a double blind design for 3 months. Medication was given as one dosage in the evening: 2-5 mg/kg KG ASS or 5-10 mg Flunarizine. Documented attack frequency and duration were controlled at monthly physical examinations. Final results showed no differences in significant reduction of attack frequency or symptoms between both different therapeutic principals. 72.4% (ASS 73.3%; Flunarizine 71.4%) of patients were attack-free or had at least a 50% reduction. Migraine frequency of initially 7-8 was reduced to 1-2 attacks/month. Duration remained constant in both groups (1-3 h). Side effects were slight body weight gain or abdominal pain after intake, prophylaxis had not to be interrupted therefore. Longtime prognosis is not yet possible because the time of observation is too short so far. Both substances are definitely useful and have few side effects in childhood migraine. If the response to one is insufficient the other substance should be tried.

  8. Community-acquired pneumonia in the age of bio-terrorism.

    PubMed

    Dattwyler, Raymond J

    2005-01-01

    The post September 11th anthrax attacks demonstrated just how vulnerable we are to biologic attack. In the first days of the attack, there was confusion and miscommunication. Patients presented to emergency rooms and to their primary care physicians with severe pneumonia. Days passed and a person died before the cause of pneumonia was recognized as Bacillus anthracis. In a biologic attack, the prompt recognition of the biologic agent is key to the outcome for both individual patients and potentially even our society. The three category A bacterial agents, anthrax, tularemia, and plague, can all present as a necrotizing pneumonia. If an attack occurred during flu season when there is already an increase in pneumonia, most physicians will initially have a great deal of difficulty determining that these cases are different. Yet, considering the nature of the world today every physician must be suspicious that the next pneumonia he or she sees could be the index case of anthrax, tularemia, or plague. The challenge for the clinician evaluating a patient presenting with the presumptive diagnosis of community-acquired pneumonia is differentiating between the various possible etiologies that can cause this clinical picture. Each of these three class A agents has it own microbiologic and clinical characteristics. They are discussed here.

  9. [Prophylactic drug treatment of migraine].

    PubMed

    Massiou, H; Bousser, M-G

    2005-07-01

    Prophylactic treatment is mainly intended to reduce the frequency of migraine attacks. Based on the results of published controlled trials, the main prophylactic drugs are some beta-blockers, methysergide, pizotifene, oxetorone, flunarizine, amitriptyline, NSAIDs, sodium valproate and topiramate. With these drugs, the frequency of attacks can be reduced by half in 50 percent of patients. Some less evaluated substances such as aspirin, DHE, indoramine, and angiotensin II inhibitors may be useful. The decision to treat with drugs and the choice of a prophylactic drug are made together with the patient. The superiority of one major drug over another has never been demonstrated in a comparative trial, thus the choice of the drug to start with depends on the possible side effects and contraindications, the characteristics of the migraine attacks, and the associated morbidities and possible interactions with abortive medications. Doses should be increased gradually, in order to reach the recommended daily dose, only if tolerance permits. Treatment efficacy has to be assessed after 2 or 3 months, and in case of failure or poor tolerance, another treatment should be started. If the treatment is successful, it should be continued for 6 to 12 months, and then tapered off. The moderate efficacy and the frequency of the side effects observed with prophylactic drugs explain the high rate of withdrawals. Some patients nevertheless dramatically improve, warranting trying several drugs successively in order to find the most appropriate one.

  10. Data security issues arising from integration of wireless access into healthcare networks.

    PubMed

    Frenzel, John C

    2003-04-01

    The versatility of having Ethernet speed connectivity without wires is rapidly driving adoption of wireless data networking by end users across all types of industry. Designed to be easy to configure and work among diverse platforms, wireless brings online data to mobile users. This functionality is particularly useful in modern clinical medicine. Wireless presents operators of networks containing or transmitting sensitive and confidential data with several new types of security vulnerabilities, and potentially opens previously protected core network resources to outside attack. Herein, we review the types of vulnerabilities, the tools necessary to exploit them, and strategies to thwart a successful attack.

  11. Experimental measurement-device-independent quantum digital signatures over a metropolitan network

    NASA Astrophysics Data System (ADS)

    Yin, Hua-Lei; Wang, Wei-Long; Tang, Yan-Lin; Zhao, Qi; Liu, Hui; Sun, Xiang-Xiang; Zhang, Wei-Jun; Li, Hao; Puthoor, Ittoop Vergheese; You, Li-Xing; Andersson, Erika; Wang, Zhen; Liu, Yang; Jiang, Xiao; Ma, Xiongfeng; Zhang, Qiang; Curty, Marcos; Chen, Teng-Yun; Pan, Jian-Wei

    2017-04-01

    Quantum digital signatures (QDSs) provide a means for signing electronic communications with information-theoretic security. However, all previous demonstrations of quantum digital signatures assume trusted measurement devices. This renders them vulnerable against detector side-channel attacks, just like quantum key distribution. Here we exploit a measurement-device-independent (MDI) quantum network, over a metropolitan area, to perform a field test of a three-party MDI QDS scheme that is secure against any detector side-channel attack. In so doing, we are able to successfully sign a binary message with a security level of about 10-7. Remarkably, our work demonstrates the feasibility of MDI QDSs for practical applications.

  12. [Erythromycin in therapy of cyclic vomiting syndrome].

    PubMed

    Pavlović, Momcilo; Radlović, Nedeljko; Leković, Zoran; Berenji, Karolina

    2007-01-01

    Cyclic vomiting syndrome is an insufficiently understood disorder which manifests itself in stereotypical episodes of vomiting with no detectable organic cause. Considering its unknown aetiology, drugs borrowed from various medication classes are applied in the therapy of this disorder, with variable success. Among other medicaments, erythromycin is also used in treatment of cyclic vomiting syndrome. This is a case study in which the application of erythromycin led to the prevention of attacks of cyclic vomiting syndrome. Our case report presents how periodical erythromycin therapy in two-week intervals at expected attack periods in a girl led to disappearance of cyclic vomiting. Adverse effects of erythromycin did not show up.

  13. Robustness of network of networks under targeted attack.

    PubMed

    Dong, Gaogao; Gao, Jianxi; Du, Ruijin; Tian, Lixin; Stanley, H Eugene; Havlin, Shlomo

    2013-05-01

    The robustness of a network of networks (NON) under random attack has been studied recently [Gao et al., Phys. Rev. Lett. 107, 195701 (2011)]. Understanding how robust a NON is to targeted attacks is a major challenge when designing resilient infrastructures. We address here the question how the robustness of a NON is affected by targeted attack on high- or low-degree nodes. We introduce a targeted attack probability function that is dependent upon node degree and study the robustness of two types of NON under targeted attack: (i) a tree of n fully interdependent Erdős-Rényi or scale-free networks and (ii) a starlike network of n partially interdependent Erdős-Rényi networks. For any tree of n fully interdependent Erdős-Rényi networks and scale-free networks under targeted attack, we find that the network becomes significantly more vulnerable when nodes of higher degree have higher probability to fail. When the probability that a node will fail is proportional to its degree, for a NON composed of Erdős-Rényi networks we find analytical solutions for the mutual giant component P(∞) as a function of p, where 1-p is the initial fraction of failed nodes in each network. We also find analytical solutions for the critical fraction p(c), which causes the fragmentation of the n interdependent networks, and for the minimum average degree k[over ¯](min) below which the NON will collapse even if only a single node fails. For a starlike NON of n partially interdependent Erdős-Rényi networks under targeted attack, we find the critical coupling strength q(c) for different n. When q>q(c), the attacked system undergoes an abrupt first order type transition. When q≤q(c), the system displays a smooth second order percolation transition. We also evaluate how the central network becomes more vulnerable as the number of networks with the same coupling strength q increases. The limit of q=0 represents no dependency, and the results are consistent with the classical percolation theory of a single network under targeted attack.

  14. Attack to AN Image Encryption Based on Chaotic Logistic Map

    NASA Astrophysics Data System (ADS)

    Wang, Xing-Yuan; Chen, Feng; Wang, Tian; Xu, Dahai; Ma, Yutian

    2013-10-01

    This paper offers two different attacks on a freshly proposed image encryption based on chaotic logistic map. The cryptosystem under study first uses a secret key of 80-bit and employed two chaotic logistic maps. We derived the initial conditions of the logistic maps from using the secret key by providing different weights to all its bits. Additionally, in this paper eight different types of procedures are used to encrypt the pixels of an image in the proposed encryption process of which one of them will be used for a certain pixel which is determined by the product of the logistic map. The secret key is revised after encrypting each block which consisted of 16 pixels of the image. The encrypting process have weakness, worst of which is that every byte of plaintext is independent when substituted, so the cipher text of the byte will not change even the other bytes have changed. As a result of weakness, a chosen plaintext attack and a chosen cipher text attack can be completed without any knowledge of the key value to recuperate the ciphered image.

  15. Bells, bomas and beefsteak: complex patterns of human-predator conflict at the wildlife-agropastoral interface in Zimbabwe.

    PubMed

    Loveridge, Andrew J; Kuiper, Timothy; Parry, Roger H; Sibanda, Lovemore; Hunt, Jane Hunt; Stapelkamp, Brent; Sebele, Lovelater; Macdonald, David W

    2017-01-01

    Reports of livestock depredation by large predators were systematically collected at three study sites in northwestern Zimbabwe from 2008-2013. We recorded 1,527 incidents (2,039 animals killed and 306 injured). Lions ( Panthera leo ) and spotted hyaenas ( Crocuta crocuta ) were mostly responsible, and cattle and donkeys most frequently attacked. Patterns of predation were variable among study sites. Nevertheless, some overall patterns were apparent. Predators selected livestock close to the size of their preferred wild prey, suggesting behaviours evolved to optimise foraging success may determine the domestic species primarily preyed upon. Most attacks occurred when livestock were roaming outside and away from their 'home' protective enclosures at night. Hyaena attacks were largely nocturnal; lions and leopards ( Panthera pardus ) were more flexible, with attacks occurring by day and at night. Livestock fitted with bells suffered a disproportionate number of attacks; the sound of bells appears to have conditioned predators to associate the sound with foraging opportunities. Lion and hyaena attacks on cattle were more frequent in the wet season suggesting that seasonal herding practices may result in cattle vulnerability. Only a small proportion of conflict incidents were reported to wildlife management officials with a bias towards lion predation events, potentially prejudicing conflict management policies. Predation on domestic stock involves an intricate interplay between predator behaviour and ecology on the one hand and human behaviour and husbandry practices on the other. Our data suggest that improved livestock husbandry (supervision of grazing animals, protection at night in strong enclosures) would greatly reduce livestock depredation.

  16. Bells, bomas and beefsteak: complex patterns of human-predator conflict at the wildlife-agropastoral interface in Zimbabwe

    PubMed Central

    Kuiper, Timothy; Parry, Roger H.; Sibanda, Lovemore; Hunt, Jane Hunt; Stapelkamp, Brent; Sebele, Lovelater; Macdonald, David W.

    2017-01-01

    Reports of livestock depredation by large predators were systematically collected at three study sites in northwestern Zimbabwe from 2008–2013. We recorded 1,527 incidents (2,039 animals killed and 306 injured). Lions (Panthera leo) and spotted hyaenas (Crocuta crocuta) were mostly responsible, and cattle and donkeys most frequently attacked. Patterns of predation were variable among study sites. Nevertheless, some overall patterns were apparent. Predators selected livestock close to the size of their preferred wild prey, suggesting behaviours evolved to optimise foraging success may determine the domestic species primarily preyed upon. Most attacks occurred when livestock were roaming outside and away from their ‘home’ protective enclosures at night. Hyaena attacks were largely nocturnal; lions and leopards (Panthera pardus) were more flexible, with attacks occurring by day and at night. Livestock fitted with bells suffered a disproportionate number of attacks; the sound of bells appears to have conditioned predators to associate the sound with foraging opportunities. Lion and hyaena attacks on cattle were more frequent in the wet season suggesting that seasonal herding practices may result in cattle vulnerability. Only a small proportion of conflict incidents were reported to wildlife management officials with a bias towards lion predation events, potentially prejudicing conflict management policies. Predation on domestic stock involves an intricate interplay between predator behaviour and ecology on the one hand and human behaviour and husbandry practices on the other. Our data suggest that improved livestock husbandry (supervision of grazing animals, protection at night in strong enclosures) would greatly reduce livestock depredation. PMID:28149682

  17. Attack Vulnerability of Network Controllability

    PubMed Central

    2016-01-01

    Controllability of complex networks has attracted much attention, and understanding the robustness of network controllability against potential attacks and failures is of practical significance. In this paper, we systematically investigate the attack vulnerability of network controllability for the canonical model networks as well as the real-world networks subject to attacks on nodes and edges. The attack strategies are selected based on degree and betweenness centralities calculated for either the initial network or the current network during the removal, among which random failure is as a comparison. It is found that the node-based strategies are often more harmful to the network controllability than the edge-based ones, and so are the recalculated strategies than their counterparts. The Barabási-Albert scale-free model, which has a highly biased structure, proves to be the most vulnerable of the tested model networks. In contrast, the Erdős-Rényi random model, which lacks structural bias, exhibits much better robustness to both node-based and edge-based attacks. We also survey the control robustness of 25 real-world networks, and the numerical results show that most real networks are control robust to random node failures, which has not been observed in the model networks. And the recalculated betweenness-based strategy is the most efficient way to harm the controllability of real-world networks. Besides, we find that the edge degree is not a good quantity to measure the importance of an edge in terms of network controllability. PMID:27588941

  18. Attack Vulnerability of Network Controllability.

    PubMed

    Lu, Zhe-Ming; Li, Xin-Feng

    2016-01-01

    Controllability of complex networks has attracted much attention, and understanding the robustness of network controllability against potential attacks and failures is of practical significance. In this paper, we systematically investigate the attack vulnerability of network controllability for the canonical model networks as well as the real-world networks subject to attacks on nodes and edges. The attack strategies are selected based on degree and betweenness centralities calculated for either the initial network or the current network during the removal, among which random failure is as a comparison. It is found that the node-based strategies are often more harmful to the network controllability than the edge-based ones, and so are the recalculated strategies than their counterparts. The Barabási-Albert scale-free model, which has a highly biased structure, proves to be the most vulnerable of the tested model networks. In contrast, the Erdős-Rényi random model, which lacks structural bias, exhibits much better robustness to both node-based and edge-based attacks. We also survey the control robustness of 25 real-world networks, and the numerical results show that most real networks are control robust to random node failures, which has not been observed in the model networks. And the recalculated betweenness-based strategy is the most efficient way to harm the controllability of real-world networks. Besides, we find that the edge degree is not a good quantity to measure the importance of an edge in terms of network controllability.

  19. Specialised use of working memory by Portia africana, a spider-eating salticid.

    PubMed

    Cross, Fiona R; Jackson, Robert R

    2014-03-01

    Using expectancy-violation methods, we investigated the role of working memory in the predatory strategy of Portia africana, a salticid spider from Kenya that preys by preference on other spiders. One of this predator's tactics is to launch opportunistic leaping attacks on to other spiders in their webs. Focussing on this particular tactic, our experiments began with a test spider on a ramp facing a lure (dead prey spider mounted on a cork disc) that could be reached by leaping. After the test spider faced the lure for 30 s, we blocked the test spider's view of the lure by lowering an opaque shutter before the spider leapt. When the shutter was raised 90 s later, either the same lure came into view again (control) or a different lure came into view (experimental: different prey type in same orientation or same prey type in different orientation). We recorded attack frequency (number of test spiders that leapt at the lure) and attack latency (time elapsing between shutter being raised and spiders initiating a leap). Attack latencies in control trials were not significantly different from attack latencies in experimental trials, regardless of whether it was prey type or prey orientation that changed in the experimental trials. However, compared with test spiders in the no-change control trials, significantly fewer test spiders leapt when prey type changed. There was no significant effect on attack frequency when prey orientation changed. These findings suggest that this predator represents prey type independently of prey orientation.

  20. Marginal eyespots on butterfly wings deflect bird attacks under low light intensities with UV wavelengths.

    PubMed

    Olofsson, Martin; Vallin, Adrian; Jakobsson, Sven; Wiklund, Christer

    2010-05-24

    Predators preferentially attack vital body parts to avoid prey escape. Consequently, prey adaptations that make predators attack less crucial body parts are expected to evolve. Marginal eyespots on butterfly wings have long been thought to have this deflective, but hitherto undemonstrated function. Here we report that a butterfly, Lopinga achine, with broad-spectrum reflective white scales in its marginal eyespot pupils deceives a generalist avian predator, the blue tit, to attack the marginal eyespots, but only under particular conditions-in our experiments, low light intensities with a prominent UV component. Under high light intensity conditions with a similar UV component, and at low light intensities without UV, blue tits directed attacks towards the butterfly head. In nature, birds typically forage intensively at early dawn, when the light environment shifts to shorter wavelengths, and the contrast between the eyespot pupils and the background increases. Among butterflies, deflecting attacks is likely to be particularly important at dawn when low ambient temperatures make escape by flight impossible, and when insectivorous birds typically initiate another day's search for food. Our finding that the deflective function of eyespots is highly dependent on the ambient light environment helps explain why previous attempts have provided little support for the deflective role of marginal eyespots, and we hypothesize that the mechanism that we have discovered in our experiments in a laboratory setting may function also in nature when birds forage on resting butterflies under low light intensities.

  1. ATP hydrolysis in Eg5 kinesin involves a catalytic two-water mechanism.

    PubMed

    Parke, Courtney L; Wojcik, Edward J; Kim, Sunyoung; Worthylake, David K

    2010-02-19

    Motor proteins couple steps in ATP binding and hydrolysis to conformational switching both in and remote from the active site. In our kinesin.AMPPPNP crystal structure, closure of the active site results in structural transformations appropriate for microtubule binding and organizes an orthosteric two-water cluster. We conclude that a proton is shared between the lytic water, positioned for gamma-phosphate attack, and a second water that serves as a general base. To our knowledge, this is the first experimental detection of the catalytic base for any ATPase. Deprotonation of the second water by switch residues likely triggers subsequent large scale structural rearrangements. Therefore, the catalytic base is responsible for initiating nucleophilic attack of ATP and for relaying the positive charge over long distances to initiate mechanotransduction. Coordination of switch movements via sequential proton transfer along paired water clusters may be universal for nucleotide triphosphatases with conserved active sites, such as myosins and G-proteins.

  2. Dissociating motivational direction and affective valence: specific emotions alter central motor processes.

    PubMed

    Coombes, Stephen A; Cauraugh, James H; Janelle, Christopher M

    2007-11-01

    We aimed to clarify the relation between affective valence and motivational direction by specifying how central and peripheral components of extension movements are altered according to specific unpleasant affective states. As predicted, premotor reaction time was quicker for extension movements initiated during exposure to attack than for extension movements initiated during exposure to all other valence categories (mutilation, erotic couples, opposite-sex nudes, neutral humans, household objects, blank). Exposure to erotic couples and mutilations yielded greater peak force than exposure to images of attack, neutral humans, and household objects. Finally, motor reaction time and peak electromyographic amplitude were not altered by valence. These findings indicate that unpleasant states do not unilaterally prime withdrawal movements, and that the quick execution of extension movements during exposure to threatening images is due to rapid premotor, rather than motor, reaction time. Collectively, our findings support the call for dissociating motivational direction and affective valence.

  3. Clinical features of ocular toxoplasmosis in Korean patients.

    PubMed

    Park, Young-Hoon; Han, Jae-Hyung; Nam, Ho-Woo

    2011-06-01

    We report here the records of 10 consecutive Korean patients (10 eyes) with ocular toxoplasmosis which showed the typical clinical manifestations with seropositivity for Toxoplasma gondii specific IgG antibodies by micro-ELISA between 2006 and 2010. Nine patients were males and 1 was female; their age was 50.5 ± 13.8 years. The most common accompanying signs were vitritis (100%), anterior uveitis (70%), and scattered white deposit (80%). Pre-existing retinochoroidal scar was found in 1 (10%) patient. All patients received antiparasitic chemotherapy and systemic corticosteroid treatment, which resolved the presenting attack and recovered the visual acuity better than initial one in 9 patients and worse in 1. Optic atrophy, cataract, and retinal neovascularization were observed during the follow-up period and recurrence was detected in 3 eyes (30%) 6 to 20 months after the initial attack. In Korea, although rarely detected and reported, ocular toxoplasmosis needs more attention in clinical field of retinal diseases.

  4. Do water-limiting conditions predispose Norway spruce to bark beetle attack?

    PubMed Central

    Netherer, Sigrid; Matthews, Bradley; Katzensteiner, Klaus; Blackwell, Emma; Henschke, Patrick; Hietz, Peter; Pennerstorfer, Josef; Rosner, Sabine; Kikuta, Silvia; Schume, Helmut; Schopf, Axel

    2015-01-01

    Drought is considered to enhance susceptibility of Norway spruce (Picea abies) to infestations by the Eurasian spruce bark beetle (Ips typographus, Coleoptera: Curculionidae), although empirical evidence is scarce. We studied the impact of experimentally induced drought on tree water status and constitutive resin flow, and how physiological stress affects host acceptance and resistance. We established rain-out shelters to induce both severe (two full-cover plots) and moderate (two semi-cover plots) drought stress. In total, 18 sample trees, which were divided equally between the above treatment plots and two control plots, were investigated. Infestation was controlled experimentally using a novel ‘attack box’ method. Treatments influenced the ratios of successful and defended attacks, but predisposition of trees to infestation appeared to be mainly driven by variations in stress status of the individual trees over time. With increasingly negative twig water potentials and decreasing resin exudation, the defence capability of the spruce trees decreased. We provide empirical evidence that water-limiting conditions impair Norway spruce resistance to bark beetle attack. Yet, at the same time our data point to reduced host acceptance byI. typographus with more extreme drought stress, indicated by strongly negative pre-dawn twig water potentials. PMID:25417785

  5. Stress and aversive learning in a wild vertebrate: the role of corticosterone in mediating escape from a novel stressor.

    PubMed

    Thaker, Maria; Vanak, Abi T; Lima, Steven L; Hews, Diana K

    2010-01-01

    Elevated plasma corticosterone during stressful events is linked to rapid changes in behavior in vertebrates and can mediate learning and memory consolidation. We tested the importance of acute corticosterone elevation in aversive learning of a novel stressor by wild male eastern fence lizards (Sceloporus undulatus). We found that inhibiting corticosterone elevation (using metyrapone, a corticosterone synthesis blocker) during an encounter with a novel attacker impaired immediate escape responses and limited learning and recall during future encounters. In the wild and in outdoor enclosures, lizards whose acute corticosterone response was blocked by an earlier metyrapone injection did not alter their escape behavior during repeated encounters with the attacker. Control-injected (unblocked) lizards, however, progressively increased flight initiation distance and decreased hiding duration during subsequent encounters. Aversive responses were also initially higher for control lizards exposed to a higher intensity first attack. Further, we demonstrate a role of corticosterone elevation in recollection, since unblocked lizards had heightened antipredator responses 24-28 h later. Exogenously restoring corticosterone levels in metyrapone-injected lizards maintained aversive behaviors and learning at control (unblocked) levels. We suggest that the corticosterone mediation of antipredator behaviors and aversive learning is a critical and general mechanism for the behavioral flexibility of vertebrate prey.

  6. How clarinettists articulate: The effect of blowing pressure and tonguing on initial and final transients.

    PubMed

    Li, Weicong; Almeida, André; Smith, John; Wolfe, Joe

    2016-02-01

    Articulation, including initial and final note transients, is important to tasteful music performance. Clarinettists' tongue-reed contact, the time variation of the blowing pressure P¯mouth, the mouthpiece pressure, the pressure in the instrument bore, and the radiated sound were measured for normal articulation, accents, sforzando, staccato, and for minimal attack, i.e., notes started very softly. All attacks include a phase when the amplitude of the fundamental increases exponentially, with rates r ∼1000 dB s(-1) controlled by varying both the rate of increase in P¯mouth and the timing of tongue release during this increase. Accented and sforzando notes have shorter attacks (r∼1300 dB s(-1)) than normal notes. P¯mouth reaches a higher peak value for accented and sforzando notes, followed by a steady decrease for accented notes or a rapid fall to a lower, nearly steady value for sforzando notes. Staccato notes are usually terminated by tongue contact, producing an exponential decrease in sound pressure with rates similar to those calculated from the bandwidths of the bore resonances: ∼400 dB s(-1). In all other cases, notes are stopped by decreasing P¯mouth. Notes played with different dynamics are qualitatively similar, but louder notes have larger P¯mouth and larger r.

  7. Management of Acute and Recurrent Gout: A Clinical Practice Guideline From the American College of Physicians.

    PubMed

    Qaseem, Amir; Harris, Russell P; Forciea, Mary Ann

    2017-01-03

    The American College of Physicians (ACP) developed this guideline to present the evidence and provide clinical recommendations on the management of gout. Using the ACP grading system, the committee based these recommendations on a systematic review of randomized, controlled trials; systematic reviews; and large observational studies published between January 2010 and March 2016. Clinical outcomes evaluated included pain, joint swelling and tenderness, activities of daily living, patient global assessment, recurrence, intermediate outcomes of serum urate levels, and harms. The target audience for this guideline includes all clinicians, and the target patient population includes adults with acute or recurrent gout. ACP recommends that clinicians choose corticosteroids, nonsteroidal anti-inflammatory drugs (NSAIDs), or colchicine to treat patients with acute gout. (Grade: strong recommendation, high-quality evidence). ACP recommends that clinicians use low-dose colchicine when using colchicine to treat acute gout. (Grade: strong recommendation, moderate-quality evidence). ACP recommends against initiating long-term urate-lowering therapy in most patients after a first gout attack or in patients with infrequent attacks. (Grade: strong recommendation, moderate-quality evidence). ACP recommends that clinicians discuss benefits, harms, costs, and individual preferences with patients before initiating urate-lowering therapy, including concomitant prophylaxis, in patients with recurrent gout attacks. (Grade: strong recommendation, moderate-quality evidence).

  8. Conversion of chlorobiphenyls into phenylhexadienoates and benzoates by the enzymes of the upper pathway for polychlorobiphenyl degradation encoded by the bph locus of Pseudomonas sp. strain LB400.

    PubMed Central

    Seeger, M; Timmis, K N; Hofer, B

    1995-01-01

    Metabolism of 21 chlorobiphenyls by the enzymes of the upper biphenyl catabolic pathway encoded by the bph locus of Pseudomonas sp. strain LB400 was investigated by using recombinant strains harboring gene cassettes containing bphABC or bphABCD. The enzymes of the upper pathway were generally able to metabolize mono- and dichlorinated biphenyls but only partially transform most trichlorinated congeners investigated: 14 of 15 mono- and dichlorinated and 2 of 6 trichlorinated congeners were converted into benzoates. All mono- and at least 8 of 12 dichlorinated congeners were attacked by the bphA-encoded biphenyl dioxygenase virtually exclusively at ortho and meta carbons. This enzyme exhibited a high degree of selectivity for the aromatic ring to be attacked, with the order of ring preference being non- > ortho- > meta- > para-substituted for mono- and dichlorinated congeners. The influence of the chlorine substitution pattern of the metabolized ring on benzoate formation resembled its influence on the reactivity of initial dioxygenation, suggesting that the rate of benzoate formation may frequently be determined by the rate of initial attack. The absorption spectra of phenylhexadienoates formed correlated with the presence or absence of a chlorine substituent at an ortho position. PMID:7618878

  9. Nonproliferation and Threat Reduction Assistance: U.S. Programs in the Former Soviet Union

    DTIC Science & Technology

    2012-03-06

    The March 1995 nerve agent attack in the Tokyo subway system by the Aum Shinryo cult raised the profile of this type of threat. 19 The report went...had not yet produced any commercial successes . DOE responded by stating that IAP had temporarily employed thousands of scientists in around 170...continued, coordinated success for the programs requires “active political engagement at the White House, cabinet, and sub-cabinet political appointee

  10. Surface protection overview

    NASA Technical Reports Server (NTRS)

    Levine, S. R.

    1982-01-01

    A first-cut integrated environmental attack life prediction methodology for hot section components is addressed. The HOST program is concerned with oxidation and hot corrosion attack of metallic coatings as well as their degradation by interdiffusion with the substrate. The effects of the environment and coatings on creep/fatigue behavior are being addressed through a joint effort with the Fatigue sub-project. An initial effort will attempt to scope the problem of thermal barrier coating life prediction. Verification of models will be carried out through benchmark rig tests including a 4 atm. replaceable blade turbine and a 50 atm. pressurized burner rig.

  11. Nitrogen Cycling Responses to Mountain Pine Beetle Disturbance in a High Elevation Whitebark Pine Ecosystem

    PubMed Central

    Keville, Megan P.; Reed, Sasha C.; Cleveland, Cory C.

    2013-01-01

    Ecological disturbances can significantly affect biogeochemical cycles in terrestrial ecosystems, but the biogeochemical consequences of the extensive mountain pine beetle outbreak in high elevation whitebark pine (WbP) (Pinus albicaulis) ecosystems of western North America have not been previously investigated. Mountain pine beetle attack has driven widespread WbP mortality, which could drive shifts in both the pools and fluxes of nitrogen (N) within these ecosystems. Because N availability can limit forest regrowth, understanding how beetle-induced mortality affects N cycling in WbP stands may be critical to understanding the trajectory of ecosystem recovery. Thus, we measured above- and belowground N pools and fluxes for trees representing three different times since beetle attack, including unattacked trees. Litterfall N inputs were more than ten times higher under recently attacked trees compared to unattacked trees. Soil inorganic N concentrations also increased following beetle attack, potentially driven by a more than two-fold increase in ammonium (NH4 +) concentrations in the surface soil organic horizon. However, there were no significant differences in mineral soil inorganic N or soil microbial biomass N concentrations between attacked and unattacked trees, implying that short-term changes in N cycling in response to the initial stages of WbP attack were restricted to the organic horizon. Our results suggest that while mountain pine beetle attack drives a pulse of N from the canopy to the forest floor, changes in litterfall quality and quantity do not have profound effects on soil biogeochemical cycling, at least in the short-term. However, continuous observation of these important ecosystems will be crucial to determining the long-term biogeochemical effects of mountain pine beetle outbreaks. PMID:23755166

  12. Nitrogen cycling responses to mountain pine beetle disturbance in a high elevation whitebark pine ecosystem.

    PubMed

    Keville, Megan P; Reed, Sasha C; Cleveland, Cory C

    2013-01-01

    Ecological disturbances can significantly affect biogeochemical cycles in terrestrial ecosystems, but the biogeochemical consequences of the extensive mountain pine beetle outbreak in high elevation whitebark pine (WbP) (Pinus albicaulis) ecosystems of western North America have not been previously investigated. Mountain pine beetle attack has driven widespread WbP mortality, which could drive shifts in both the pools and fluxes of nitrogen (N) within these ecosystems. Because N availability can limit forest regrowth, understanding how beetle-induced mortality affects N cycling in WbP stands may be critical to understanding the trajectory of ecosystem recovery. Thus, we measured above- and belowground N pools and fluxes for trees representing three different times since beetle attack, including unattacked trees. Litterfall N inputs were more than ten times higher under recently attacked trees compared to unattacked trees. Soil inorganic N concentrations also increased following beetle attack, potentially driven by a more than two-fold increase in ammonium (NH₄⁺) concentrations in the surface soil organic horizon. However, there were no significant differences in mineral soil inorganic N or soil microbial biomass N concentrations between attacked and unattacked trees, implying that short-term changes in N cycling in response to the initial stages of WbP attack were restricted to the organic horizon. Our results suggest that while mountain pine beetle attack drives a pulse of N from the canopy to the forest floor, changes in litterfall quality and quantity do not have profound effects on soil biogeochemical cycling, at least in the short-term. However, continuous observation of these important ecosystems will be crucial to determining the long-term biogeochemical effects of mountain pine beetle outbreaks.

  13. Nitrogen cycling responses to mountain pine beetle disturbance in a high elevation whitebark pine ecosystem

    USGS Publications Warehouse

    Keville, Megan P.; Reed, Sasha C.; Cleveland, Cory C.

    2013-01-01

    Ecological disturbances can significantly affect biogeochemical cycles in terrestrial ecosystems, but the biogeochemical consequences of the extensive mountain pine beetle outbreak in high elevation whitebark pine (WbP) (Pinus albicaulis) ecosystems of western North America have not been previously investigated. Mountain pine beetle attack has driven widespread WbP mortality, which could drive shifts in both the pools and fluxes of nitrogen (N) within these ecosystems. Because N availability can limit forest regrowth, understanding how beetle-induced mortality affects N cycling in WbP stands may be critical to understanding the trajectory of ecosystem recovery. Thus, we measured above- and belowground N pools and fluxes for trees representing three different times since beetle attack, including unattacked trees. Litterfall N inputs were more than ten times higher under recently attacked trees compared to unattacked trees. Soil inorganic N concentrations also increased following beetle attack, potentially driven by a more than two-fold increase in ammonium (NH4+) concentrations in the surface soil organic horizon. However, there were no significant differences in mineral soil inorganic N or soil microbial biomass N concentrations between attacked and unattacked trees, implying that short-term changes in N cycling in response to the initial stages of WbP attack were restricted to the organic horizon. Our results suggest that while mountain pine beetle attack drives a pulse of N from the canopy to the forest floor, changes in litterfall quality and quantity do not have profound effects on soil biogeochemical cycling, at least in the short-term. However, continuous observation of these important ecosystems will be crucial to determining the long-term biogeochemical effects of mountain pine beetle outbreaks.

  14. Transcatheter Embolization of a Coronary Fistula Originating from the Left Anterior Descending Artery by Using N-Butyl 2-Cyanoacrylate

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Karagoz, Tevfik; Celiker, Alpay; Cil, Barbaros

    In this report, we describe a successful percutaneous transcatheter n-butyl 2-cyanoacrylate embolization of a coronary fistula originating from the left anterior descending artery in an adolescent with unexpected recurrent attacks of myocardial ischemia.

  15. Communicating about the Risks of Terrorism (or Anything Else)

    ERIC Educational Resources Information Center

    Fischhoff, Baruch

    2011-01-01

    Communication is essential to preventing terrorists from achieving their objectives. Effective communication can reduce terrorists' chances of mounting successful operations, creating threats that disrupt everyday life, and undermining the legitimacy of the societies that they attack. Psychological research has essential roles to play in that…

  16. Relationship between Corporate Governance and Information Security Governance Effectiveness in United States Corporations

    ERIC Educational Resources Information Center

    Davis, Robert E.

    2017-01-01

    Cyber attackers targeting large corporations achieved a high perimeter penetration success rate during 2013, resulting in many corporations incurring financial losses. Corporate information technology leaders have a fiduciary responsibility to implement information security domain processes that effectually address the challenges for preventing…

  17. Heart Rate and Initial Presentation of Cardiovascular Diseases (Caliber)

    ClinicalTrials.gov

    2013-09-17

    Abdominal Aortic Aneurysm; Coronary Heart Disease NOS; Unheralded Coronary Death; Intracerebral Haemorrhage; Heart Failure; Ischemic Stroke; Myocardial Infarction; Stroke; Peripheral Arterial Disease; Stable Angina Pectoris; Subarachnoid Haemorrhage; Transient Ischemic Attack; Unstable Angina; Cardiac Arrest, Sudden Cardiac Death

  18. Implementing an Integrated Network Defense Construct

    DTIC Science & Technology

    2013-06-01

    hierarchical structure under the Air Defence of Great Britain initiative ( Checkland and Holwell, 1998). This implementation was the earliest concept...Framework for Detecting and Defending against Insider IT Attacks. Auerbach Publications. 2008. Checkland , Peter and Holwell, Sue. "Information, Systems

  19. The stress and migraine interaction.

    PubMed

    Sauro, Khara M; Becker, Werner J

    2009-10-01

    There are several ways in which stress may interact with migraine in those predisposed to migraine attacks. These interactions may result from biochemical changes related to the physiological stress response, as, for example, the release of corticotrophin releasing hormone, or from changes induced by the psychological response to stressors. Stress is the factor listed most often by migraine sufferers as a trigger for their attacks, but in addition there is evidence that stress can help initiate migraine in those predisposed to the disorder, and may also contribute to migraine chronification. Migraine attacks themselves can act as a stressor, thereby potentially leading to a vicious circle of increasing migraine frequency. Since the important factor in the stress-migraine interaction is likely the individual's responses to stressors, rather than the stressors themselves, the acquisition of effective stress management skills has the potential to reduce the impact of stressors on those with migraine.

  20. Toward more environmentally resistant gas turbines: Progress in NASA-Lewis programs

    NASA Technical Reports Server (NTRS)

    Lowell, C. E.; Grisaffe, S. J.; Levine, S. R.

    1976-01-01

    A wide range of programs are being conducted for improving the environmental resistance to oxidation and hot corrosion of gas turbine and power system materials. They range from fundamental efforts to delineate attack mechanisms, allow attack modeling and permit life prediction, to more applied efforts to develop potentially more resistant alloys and coatings. Oxidation life prediction efforts have resulted in a computer program which provides an initial method for predicting long time metal loss using short time oxidation data by means of a paralinear attack model. Efforts in alloy development have centered on oxide-dispersion strengthened alloys based on the Ni-Cr-Al system. Compositions have been identified which are compromises between oxidation and thermal fatigue resistance. Fundamental studies of hot corrosion mechanisms include thermodynamic studies of sodium sulfate formation during turbine combustion. Information concerning species formed during the vaporization of Na2SO4 has been developed using high temperature mass spectrometry.

  1. Burner Rig Hot Corrosion of a Single Crystal Ni-48Al-Ti-Hf-Ga Alloy

    NASA Technical Reports Server (NTRS)

    Nesbitt, James A.; Darolia, Ram; Cuy, Michael D.

    1998-01-01

    The hot corrosion resistance of a single crystal Ni-48Al-1Ti-0.5Hf-0.2Ga alloy was examined in a Mach 0.3 burner rig at 900 C for 300 hours. The combustion chamber was doped with 2 ppmw synthetic sea salt. The hot corrosion attack produced a random mound morphology on the surface. Microstructurally, the hot corrosion attack appeared to initiate with oxide-filled pits which were often broad and shallow. At an intermediate stage, the pits increased in size to incorporate unoxidized Ni islands in the corrosion product. The rampant attack stage, which was observed only at sharp sample corners, was characterized by rapid inward growth of alumina in finger-like protrusions incorporating significant amounts of Al-depleted Ni islands. Aluminum consumption in the oxide fingers resulted in the growth of a gamma' layer ahead of the advancing oxide fingers.

  2. Intrusion Detection System Using Deep Neural Network for In-Vehicle Network Security.

    PubMed

    Kang, Min-Joo; Kang, Je-Won

    2016-01-01

    A novel intrusion detection system (IDS) using a deep neural network (DNN) is proposed to enhance the security of in-vehicular network. The parameters building the DNN structure are trained with probability-based feature vectors that are extracted from the in-vehicular network packets. For a given packet, the DNN provides the probability of each class discriminating normal and attack packets, and, thus the sensor can identify any malicious attack to the vehicle. As compared to the traditional artificial neural network applied to the IDS, the proposed technique adopts recent advances in deep learning studies such as initializing the parameters through the unsupervised pre-training of deep belief networks (DBN), therefore improving the detection accuracy. It is demonstrated with experimental results that the proposed technique can provide a real-time response to the attack with a significantly improved detection ratio in controller area network (CAN) bus.

  3. Intrusion Detection System Using Deep Neural Network for In-Vehicle Network Security

    PubMed Central

    Kang, Min-Joo

    2016-01-01

    A novel intrusion detection system (IDS) using a deep neural network (DNN) is proposed to enhance the security of in-vehicular network. The parameters building the DNN structure are trained with probability-based feature vectors that are extracted from the in-vehicular network packets. For a given packet, the DNN provides the probability of each class discriminating normal and attack packets, and, thus the sensor can identify any malicious attack to the vehicle. As compared to the traditional artificial neural network applied to the IDS, the proposed technique adopts recent advances in deep learning studies such as initializing the parameters through the unsupervised pre-training of deep belief networks (DBN), therefore improving the detection accuracy. It is demonstrated with experimental results that the proposed technique can provide a real-time response to the attack with a significantly improved detection ratio in controller area network (CAN) bus. PMID:27271802

  4. Feared consequences of panic attacks in panic disorder: a qualitative and quantitative analysis.

    PubMed

    Raffa, Susan D; White, Kamila S; Barlow, David H

    2004-01-01

    Cognitions are hypothesized to play a central role in panic disorder (PD). Previous studies have used questionnaires to assess cognitive content, focusing on prototypical cognitions associated with PD; however, few studies have qualitatively examined cognitions associated with the feared consequences of panic attacks. The purpose of this study was to conduct a qualitative and quantitative analysis of feared consequences of panic attacks. The initial, qualitative analysis resulted in the development of 32 categories of feared consequences. The categories were derived from participant responses to a standardized, semi-structured question (n = 207). Five expert-derived categories were then utilized to quantitatively examine the relationship between cognitions and indicators of PD severity. Cognitions did not predict PD severity; however, correlational analyses indicated some predictive validity to the expert-derived categories. The qualitative analysis identified additional areas of patient-reported concern not included in previous research that may be important in the assessment and treatment of PD.

  5. Meningococcal disease. Secondary attack rate and chemoprophylaxis in the United States, 1974.

    PubMed

    1976-01-19

    Three hundred twenty-six reported cases of meningococcal disease in the United States from November 1973 through March 1974 were investigated. Three household members became ill with meningococcal disease following onset of the initial case in their household. The secondary attack rate was approximately 3/1,000 household members. In 60% of the households, members were given an antimicrobial drug as chemoprophylaxis for meningococcal disease, but only 35% received minocycline hydrochloride or rifampin, the two drugs now available for the eradication of sulfonamide-resistant meningococci from the nasopharynx. Only 26% given chemoprophylaxis received the drug within 24 hours after the patient's hospital admission. Survey results indicate that the secondary attack rate of meningococcal disease may justify the use of chemoprophylaxis, but that frequently in the United States, the drugs given are likely to be ineffective, give too late, or administered to persons who are not at high risk to meningococcal disease.

  6. Bioterrorism for the respiratory physician.

    PubMed

    Waterer, Grant W; Robertson, Hannah

    2009-01-01

    Terrorist attacks by definition are designed to cause fear and panic. There is no question that a terrorist attack using biological agents would present a grave threat to stability of the society in which they were released. Early recognition of such a bioterrorist attack is crucial to containing the damage they could cause. As many of the most likely bioterrorism agents present with pulmonary disease, respiratory physicians may be crucial in the initial recognition and diagnosis phase, and certainly would be drawn into treatment of affected individuals. This review focuses on the biological agents thought most likely to be used by terrorists that have predominantly respiratory presentations. The primary focus of this review is on anthrax, plague, tularaemia, ricin, and Staphylococcal enterotoxin B. The pathogenesis, clinical manifestations and treatment of these agents will be discussed as well as historical examples of their use. Other potential bioterrorism agents with respiratory manifestations will also be discussed briefly.

  7. The F-18 High Alpha Research Vehicle: A High-Angle-of-Attack Testbed Aircraft

    NASA Technical Reports Server (NTRS)

    Regenie, Victoria; Gatlin, Donald; Kempel, Robert; Matheny, Neil

    1992-01-01

    The F-18 High Alpha Research Vehicle is the first thrust-vectoring testbed aircraft used to study the aerodynamics and maneuvering available in the poststall flight regime and to provide the data for validating ground prediction techniques. The aircraft includes a flexible research flight control system and full research instrumentation. The capability to control the vehicle at angles of attack up to 70 degrees is also included. This aircraft was modified by adding a pitch and yaw thrust-vectoring system. No significant problems occurred during the envelope expansion phase of the program. This aircraft has demonstrated excellent control in the wing rock region and increased rolling performance at high angles of attack. Initial pilot reports indicate that the increased capability is desirable although some difficulty in judging the size and timing of control inputs was observed. The aircraft, preflight ground testing and envelope expansion flight tests are described.

  8. New record for Woldstedtius flavolineatus (Ichneumonidae: Diplazontinae), a hymenopteran parasitoid of syrphid flies in Hawaii

    USGS Publications Warehouse

    Cappadonna, Justin; Euaparadorn, Melody; Peck, Robert W.; Banko, Paul C.

    2009-01-01

    The parasitoid wasp Woldstedtius flavolineatus (Gravenhorst) (Ichneumonidae) attacks the larvae of syrphid flies (Syrphidae). Woldstedtius flavolineatus was collected in Hawaii for the first time during an extensive malaise trap-based survey of parasitoids in Hawaiian forests. Since its initial collection on Hawaii Island in January 2006, it has been collected at five additional sites on Hawaii Island and at one site each on Maui and Oahu. Malaise trap results from Hakalau Forest National Wildlife Refuge showed a strong seasonal pattern of abundance, with peak population levels reached during July–September. Rearing of its host, Allograpta obliqua (Say), collected from koa (Acacia koa Gray) at Hakalau over two days, revealed a parasitism rate of approximately 95%. Broader impacts of this alien wasp are unknown, but a reduction in host syrphid abundance could result in an increase in numbers of psyllids and aphids (Homoptera) that are preyed upon by syrphid larvae. Furthermore, a reduction in adult syrphids could impact the reproductive success of some of the plants they pollinate.

  9. Stress corrosion crack initiation of alloy 600 in PWR primary water

    DOE PAGES

    Zhai, Ziqing; Toloczko, Mychailo B.; Olszta, Matthew J.; ...

    2017-04-27

    Stress corrosion crack (SCC) initiation of three mill-annealed alloy 600 heats in simulated pressurized water reactor primary water has been investigated using constant load tests equipped with in-situ direct current potential drop (DCPD) measurement capabilities. SCC initiation times were greatly reduced by a small amount of cold work. Shallow intergranular attack and/or cracks were found on most high-energy grain boundaries intersecting the surface with only a small fraction evolving into larger cracks and intergranular SCC growth. Crack depth profiles were measured and related to DCPD-detected initiation response. Lastly, we discuss processes controlling the SCC initiation in mill-annealed alloy 600.

  10. Stress corrosion crack initiation of alloy 600 in PWR primary water

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Zhai, Ziqing; Toloczko, Mychailo B.; Olszta, Matthew J.

    Stress corrosion crack (SCC) initiation of three mill-annealed alloy 600 heats in simulated pressurized water reactor primary water has been investigated using constant load tests equipped with in-situ direct current potential drop (DCPD) measurement capabilities. SCC initiation times were greatly reduced by a small amount of cold work. Shallow intergranular attack and/or cracks were found on most high-energy grain boundaries intersecting the surface with only a small fraction evolving into larger cracks and intergranular SCC growth. Crack depth profiles were measured and related to DCPD-detected initiation response. Lastly, we discuss processes controlling the SCC initiation in mill-annealed alloy 600.

  11. Nonlinear time-series-based adaptive control applications

    NASA Technical Reports Server (NTRS)

    Mohler, R. R.; Rajkumar, V.; Zakrzewski, R. R.

    1991-01-01

    A control design methodology based on a nonlinear time-series reference model is presented. It is indicated by highly nonlinear simulations that such designs successfully stabilize troublesome aircraft maneuvers undergoing large changes in angle of attack as well as large electric power transients due to line faults. In both applications, the nonlinear controller was significantly better than the corresponding linear adaptive controller. For the electric power network, a flexible AC transmission system with series capacitor power feedback control is studied. A bilinear autoregressive moving average reference model is identified from system data, and the feedback control is manipulated according to a desired reference state. The control is optimized according to a predictive one-step quadratic performance index. A similar algorithm is derived for control of rapid changes in aircraft angle of attack over a normally unstable flight regime. In the latter case, however, a generalization of a bilinear time-series model reference includes quadratic and cubic terms in angle of attack.

  12. What good cyber resilience looks like.

    PubMed

    Hult, Fredrik; Sivanesan, Giri

    In January 2012, the World Economic Forum made cyber attacks its fourth top global risk. In the 2013 risk report, cyber attacks were noted to be an even higher risk in absolute terms. The reliance of critical infrastructure on cyber working has never been higher; the frequency, intensity, impact and sophistication of attacks is growing. This trend looks likely to continue. It can be argued that it is no longer a question whether an organisation will be successfully hacked, but how long it will take to detect. In the ever-changing cyber environment, traditional protection techniques and reliance on preventive controls are not enough. A more agile approach is required to give assurance of a sufficiently secure digital society. Are we faced with a paradigm shift or a storm in a digital teacup? This paper offers an introduction to why cyber is important, a wider taxonomy on the topic and some historical context on how the discipline of cyber security has evolved, and an interpretation on what this means in the new normal of today.

  13. Introducing cyber.

    PubMed

    Hult, Fredrik; Sivanesan, Giri

    In January 2012, the World Economic Forum made cyber attacks its fourth top global risk. In the 2013 risk report, cyber attacks were noted to be an even higher risk in absolute terms. The reliance of critical infrastructure on cyber working has never been higher; the frequency, intensity, impact and sophistication of attacks is growing. This trend looks likely to continue. It can be argued that it is no longer a question whether an organisation will be successfully hacked, but how long it will take to detect. In the ever-changing cyber environment, traditional protection techniques and reliance on preventive controls are not enough. A more agile approach is required to give assurance of a sufficiently secure digital society. Are we faced with a paradigm shift or a storm in a digital teacup? This paper offers an introduction to why cyber is important, a wider taxonomy on the topic and some historical context on how the discipline of cyber security has evolved, and an interpretation on what this means in the new normal of today.

  14. SMART syndrome (stroke-like migraine attacks after radiation therapy) in adult and pediatric patients.

    PubMed

    Armstrong, Amy E; Gillan, Eileen; DiMario, Francis Joseph

    2014-03-01

    SMART syndrome (stroke-like migraine attacks after radiation therapy) is a rare condition that involves complex migraines with focal neurologic findings in patients following cranial irradiation for central nervous system malignancies. Little is known about the mechanisms behind the disorder, making successful treatment challenging. We report 2 new cases of SMART syndrome in pediatric patients as well as review all documented cases of the syndrome. Each of our 2 pediatric patients suffered multiple episodes. Attacks were characterized by severe headache, visual disturbance, aphasia, and weakness. Recovery occurred over several days to weeks. The data from all documented reports of SMART syndrome indicate a greater prevalence for male gender. An age-dependent pattern of onset was also observed, with a greater variability of syndrome onset in patients who received cranial irradiation at a younger age. SMART appears to be a reversible, recurrent long-term complication of radiation therapy with possible age- and gender-related influences.

  15. Industrial Control Systems/SCADA systems risk assessment in the energy sector

    NASA Astrophysics Data System (ADS)

    Falodun, Babatunde

    The energy sector is one of the most critical components of our national infrastructure. It not only provides the electrical power and petroleum required to run day-to-day operations and mechanisms in society, it's also an important element that directly impacts the economy with regard to growth and stability. Industrial Control Systems (ICS) /Supervisory Control and Data Acquisition Systems (SCADA) are computerized mechanisms, they are both software and hardware that are used to control real time processes and operations in power plants and oil production facilities. A significant attack on these control systems that leads to widespread disruption of energy could result in catastrophic consequences for any major city and even the nation. This research paper explores cyber threats and vulnerabilities faced by ICS/SCADA systems in the energy sector and also highlights possible outcomes of a successful breach. Furthermore, the research underscores mitigation strategies that could be used to prevent and respond to an attack. Keywords: Cybersecurity, SCADA, Cyber Attacks, Threats, Vulnerabilities, Risk Assessment, Dr. Albert Orbinati.

  16. A Study of Simulation Effectiveness in Modeling Heavy Combined Arms Combat in Urban Environments

    DTIC Science & Technology

    2007-05-01

    Printing Office, 1987), 51. 2The old FM 17-15 (Tank Platoon) described bypassing urban areas. The new manual, FM 3-20.15 (dtd. 22 February 2007...hardened positions and counter the German’s crew-served weapons and armored counter-attacks.15 In addition to the moderately successful M4 tanks...the successful urban operations since and during WWII, it involved the use of heavy armor and combined arms. When the NVA and Vietcong captured Hue

  17. Termiticides - the Gulfport report

    Treesearch

    Bradford M. Kard

    1999-01-01

    Termiticide treatments to soil are the most widely used and successful method to protect wooden structures from attack by subterranean termites and potentially new termiticides continue to be placed in Forest Service field tests each year. This article presents the latest findings taken from USDA Forest Service field tests in Arizona, Florida, Mississippi, and South...

  18. Relational Aggression: A Different Kind of Bullying.

    ERIC Educational Resources Information Center

    Mullin-Rindler, Nancy

    2003-01-01

    Relational aggression is a form of bullying that includes both overt name-calling and verbal attacks as well as such indirect strategies as spreading gossip and rumors, manipulating friendships, or intentionally excluding or isolating someone. Educators must become more attuned and vigilant in their responses to it. Offers successful strategies.…

  19. Hypersonic research engine/aerothermodynamic integration model, experimental results. Volume 2: Mach 6 performance

    NASA Technical Reports Server (NTRS)

    Andrews, E. H., Jr.; Mackley, E. A.

    1976-01-01

    Computer program performance results of a Mach 6 hypersonic research engine during supersonic and subsonic combustion modes were presented. The combustion mode transition was successfully performed, exit surveys made, and effects of altitude, angle of attack, and inlet spike position were determined during these tests.

  20. A Citadel under Siege: A Strategy against the Censor.

    ERIC Educational Resources Information Center

    North, William D.

    1986-01-01

    Identifies the tasks that the library administrator must complete if the collection is to successfully withstand censorship. Using an analogy of the construction, arming, and manning of a "citadel," a strategy is presented which is adaptable to the broadest range of attack on collection, acquisition, and dissemination policies of…

  1. Robotic management of pheochromocytoma of the vesicoureteric junction.

    PubMed

    Nayyar, Rishi; Singh, Prabhjot; Gupta, Narmada P

    2010-01-01

    Pheochromocytoma of the urinary bladder is rare, presenting usually with hypertension, hematuria and syncopal attacks. Such cases have usually been managed with open or laparoscopic partial cystectomy. We present a case of bladder pheochromocytoma that had unusual presenting symptoms, a paraneoplastic manifestation and was successfully managed with robotic technique.

  2. Restraint in Urban Warfare: The Canadian Attack on Groningen, Netherlands, 13-16 April 1945

    DTIC Science & Technology

    2013-06-13

    Netherlands under orders to limit civilian casualties and collateral damage. Their reasons for imposing these limitations and their experiences in...firepower were offset by information on enemy locations. The key to success turned out to be the closest possible cooperation between armour and...

  3. Validation of the PCN Concept: Mobility, Traffic Flow Confidentiality and Protection Against Directed Attacks

    DTIC Science & Technology

    2010-11-01

    peer, racoon (IKE-daemon) will start authenticating using certificates. After a successful authentication, IPSec security associations will be set up...colour had credentials from one CA. Racoon and ipsec-tools are open-source software, implementing IKE and IPSec. Validation of the PCN Concept; Mobility

  4. Laboratory Experiments for Network Security Instruction

    ERIC Educational Resources Information Center

    Brustoloni, Jose Carlos

    2006-01-01

    We describe a sequence of five experiments on network security that cast students successively in the roles of computer user, programmer, and system administrator. Unlike experiments described in several previous papers, these experiments avoid placing students in the role of attacker. Each experiment starts with an in-class demonstration of an…

  5. Risk Factors in the Initial Presentation of Specific Cardiovascular Disease Syndromes

    ClinicalTrials.gov

    2013-03-03

    Heart Diseases; Cardiovascular Diseases; Acute Myocardial Infarction; Unstable Angina; Chronic Stable Angina; Ischemic Stroke; Cerebrovascular Accident; Subarachnoid Hemorrhage; Transient Ischemic Attack; Abdominal Aortic Aneurysm; Peripheral Arterial Disease; Sudden Coronary Death; Ventricular Arrhythmia; Sudden Death; Cardiac Arrest; Heart Failure

  6. Social Deprivation and Initial Presentation of 12 Cardiovascular Diseases: a CALIBER Study

    ClinicalTrials.gov

    2013-09-03

    Abdominal Aortic Aneurysm; Coronary Heart Disease NOS; Unheralded Corronary Death; Intracerebral Haemorrhage; Heart Failure; Ischemic Stroke; Myocardial Infarction; Stroke; Peripheral Arterial Disease; Stable Angina Pectoris; Subarachnoid Haemorrhage; Transient Ischemic Attack; Unstable Angina; Cardiac Arrest, Sudden Cardiac Death

  7. Spoof Detection for Finger-Vein Recognition System Using NIR Camera.

    PubMed

    Nguyen, Dat Tien; Yoon, Hyo Sik; Pham, Tuyen Danh; Park, Kang Ryoung

    2017-10-01

    Finger-vein recognition, a new and advanced biometrics recognition method, is attracting the attention of researchers because of its advantages such as high recognition performance and lesser likelihood of theft and inaccuracies occurring on account of skin condition defects. However, as reported by previous researchers, it is possible to attack a finger-vein recognition system by using presentation attack (fake) finger-vein images. As a result, spoof detection, named as presentation attack detection (PAD), is necessary in such recognition systems. Previous attempts to establish PAD methods primarily focused on designing feature extractors by hand (handcrafted feature extractor) based on the observations of the researchers about the difference between real (live) and presentation attack finger-vein images. Therefore, the detection performance was limited. Recently, the deep learning framework has been successfully applied in computer vision and delivered superior results compared to traditional handcrafted methods on various computer vision applications such as image-based face recognition, gender recognition and image classification. In this paper, we propose a PAD method for near-infrared (NIR) camera-based finger-vein recognition system using convolutional neural network (CNN) to enhance the detection ability of previous handcrafted methods. Using the CNN method, we can derive a more suitable feature extractor for PAD than the other handcrafted methods using a training procedure. We further process the extracted image features to enhance the presentation attack finger-vein image detection ability of the CNN method using principal component analysis method (PCA) for dimensionality reduction of feature space and support vector machine (SVM) for classification. Through extensive experimental results, we confirm that our proposed method is adequate for presentation attack finger-vein image detection and it can deliver superior detection results compared to CNN-based methods and other previous handcrafted methods.

  8. Spoof Detection for Finger-Vein Recognition System Using NIR Camera

    PubMed Central

    Nguyen, Dat Tien; Yoon, Hyo Sik; Pham, Tuyen Danh; Park, Kang Ryoung

    2017-01-01

    Finger-vein recognition, a new and advanced biometrics recognition method, is attracting the attention of researchers because of its advantages such as high recognition performance and lesser likelihood of theft and inaccuracies occurring on account of skin condition defects. However, as reported by previous researchers, it is possible to attack a finger-vein recognition system by using presentation attack (fake) finger-vein images. As a result, spoof detection, named as presentation attack detection (PAD), is necessary in such recognition systems. Previous attempts to establish PAD methods primarily focused on designing feature extractors by hand (handcrafted feature extractor) based on the observations of the researchers about the difference between real (live) and presentation attack finger-vein images. Therefore, the detection performance was limited. Recently, the deep learning framework has been successfully applied in computer vision and delivered superior results compared to traditional handcrafted methods on various computer vision applications such as image-based face recognition, gender recognition and image classification. In this paper, we propose a PAD method for near-infrared (NIR) camera-based finger-vein recognition system using convolutional neural network (CNN) to enhance the detection ability of previous handcrafted methods. Using the CNN method, we can derive a more suitable feature extractor for PAD than the other handcrafted methods using a training procedure. We further process the extracted image features to enhance the presentation attack finger-vein image detection ability of the CNN method using principal component analysis method (PCA) for dimensionality reduction of feature space and support vector machine (SVM) for classification. Through extensive experimental results, we confirm that our proposed method is adequate for presentation attack finger-vein image detection and it can deliver superior detection results compared to CNN-based methods and other previous handcrafted methods. PMID:28974031

  9. The role of HATCH score in predicting the success rate of sinus rhythm following electrical cardioversion of atrial fibrillation.

    PubMed

    Emren, Sadık Volkan; Kocabaş, Uğur; Duygu, Hamza; Levent, Fatih; Şimşek, Ersin Çağrı; Yapan Emren, Zeynep; Tülüce, Selcen

    2016-01-01

    The HATCH score predicts the development of persistent and permanent atrial fibrillation (AF) one year after spontaneous or pharmacological conversion to sinus rhythm in patients with AF. However, it remains unknown whether HATCH score predicts short-term success of the procedure at early stages for patients who have undergone electrical cardioversion (EC) for AF. The present study evaluated whether HATCH score predicts short-term success of EC in patients with AF. The study included patients aged 18 years and over, who had undergone EC due to AF lasting less than 12 months, between December 2011 and October 2013. HATCH score was calculated for all patients. The acronym HATCH stands for Hypertension, Age (above 75 years), Transient ischaemic attack or stroke, Chronic obstructive pulmonary disease, and Heart failure. This scoring system awards two points for heart failure and transient ischaemic attack or stroke and one point for the remaining items. The study included 227 patients and short-term EC was successful in 163 of the cases. The mean HATCH scores of the patients who had undergone successful or unsuccessful EC were 1.3 ± 1.4 and 2.9 ± 1.4, respectively (p < 0.001). The area of the HATCH score under the curve in receiver operating characteristics analysis was (AUC) 0.792 (95% CI 0.727-0.857, p < 0.001). A HATCH score of two and above yielded 77% sensitivity, 62% specificity, 56% positive predictive value, and 87% negative predictive value in predicting unsuccessful cardioversion. HATCH score is useful in predicting short-term success of EC at early stages for patients with AF, for whom the use of a rhythm-control strategy is planned.

  10. The second-generation eCLIPs Endovascular Clip System: initial experience.

    PubMed

    Chiu, Albert H; De Vries, Joost; O'Kelly, Cian J; Riina, Howard; McDougall, Ian; Tippett, Jonathan; Wan, Martina; de Oliveira Manoel, Airton Leonardo; Marotta, Thomas R

    2018-02-01

    OBJECTIVE Treatment of wide-necked intracranial aneurysms is associated with higher recanalization and complication rates; however, the most commonly used methods are not specifically designed to work in bifurcation lesions. To address these issues, the authors describe the evolution in the design and use of the eCLIPs (Endovascular Clip System) device, a novel hybrid stent-like assist device with flow diverter properties that was first described in 2008. METHODS A registry was established covering 13 international centers at which patients were treated with the second-generation eCLIPs device. Aneurysm morphology and rupture status, device neck coverage, coil retention, and procedural and late morbidity and mortality were recorded. For those patients who had undergone successful implantation more than 6 months earlier, the final imaging and clinical follow-up results and need for re-treatment were recorded. RESULTS Thirty-three patients were treated between June 2013 and September 2015. Twenty-five (76%) patients had successful placement of an eCLIPs device; 23 (92%) of these 25 patients had complete data. Eight cases of nondeployment occurred during the 1st year of use, consistent with a learning curve; no failures of deployment occurred thereafter. Two periprocedural transient ischemic attacks and 2 asymptomatic thrombotic events occurred. Twenty-one (91%) of 23 patients underwent follow-up at an average of 8 months (range 3-18 months); 9 (42.9%) of these 21 patients demonstrated an improvement in Raymond grade at follow-up; no cases of worsening Raymond grade were recorded, and 17 (81.0%) patients sustained a modified Raymond-Roy Classification class of I or II angiographic result at follow-up. Two delayed ruptures were recorded, both in previously coiled, symptomatic giant aneurysms where the device was used as a part of a salvage strategy. CONCLUSIONS The second-generation eCLIPs device is a viable treatment option for bifurcation aneurysms. The aneurysm occlusion rates in this initial clinical series are comparable to the initial experience with other bifurcation support devices.

  11. Pre-visual detection of stress in pine forests

    NASA Technical Reports Server (NTRS)

    Olson, C. E., Jr.

    1977-01-01

    Pre-visual, or early, detection of forest stress with particular reference to detection of attacks by pine bark beetles is discussed. Preliminary efforts to obtain early detection of attacks by pine bark beetles, using MSS data from the ERIM M-7 scanner, were not sufficiently successful to demonstrate an operational capability, but indicate that joint processing of the 0.71 to 0.73, 2.00 to 2.60, and 9.3 to 11.7 micrometer bands holds some promise. Ratio processing of transformed data from the 0.45 to 0.52, 1.55 to 2.60, and 4.5 to 5.5 or 9.3 to 11.7 micrometer regions appears even more promising.

  12. Study of aerodynamic technology for VSTOL fighter/attack aircraft, phase 1

    NASA Technical Reports Server (NTRS)

    Driggers, H. H.

    1978-01-01

    A conceptual design study was performed of a vertical attitude takeoff and landing (VATOL) fighter/attack aircraft. The configuration has a close-coupled canard-delta wing, side two-dimensional ramp inlets, and two augmented turbofan engines with thrust vectoring capability. Performance and sensitivities to objective requirements were calculated. Aerodynamic characteristics were estimated based on contractor and NASA wind tunnel data. Computer simulations of VATOL transitions were performed. Successful transitions can be made, even with series post-stall instabilities, if reaction controls are properly phased. Principal aerodynamic uncertainties identified were post-stall aerodynamics, transonic aerodynamics with thrust vectoring and inlet performance in VATOL transition. A wind tunnel research program was recommended to resolve the aerodynamic uncertainties.

  13. Study of aerodynamic technology for single-cruise-engine V/STOL fighter/attack aircraft

    NASA Technical Reports Server (NTRS)

    Mark, L.

    1982-01-01

    Conceptual designs and analyses were conducted on two V/STOL supersonic fighter/attack aircraft. These aircraft feature low footprint temperature and pressure thrust augmenting ejectors in the wings for vertical lift, combined with a low wing loading, low wave drag airframe for outstanding cruise and supersonic performance. Aerodynamic, propulsion, performance, and mass properties were determined and are presented for each aircraft. Aerodynamic and Aero/Propulsion characteristics having the most significant effect on the success of the up and away flight mode were identified, and the certainty with which they could be predicted was defined. A wind tunnel model and test program are recommended to resolve the identified uncertainties.

  14. A Survey of Image Encryption Algorithms

    NASA Astrophysics Data System (ADS)

    Kumari, Manju; Gupta, Shailender; Sardana, Pranshul

    2017-12-01

    Security of data/images is one of the crucial aspects in the gigantic and still expanding domain of digital transfer. Encryption of images is one of the well known mechanisms to preserve confidentiality of images over a reliable unrestricted public media. This medium is vulnerable to attacks and hence efficient encryption algorithms are necessity for secure data transfer. Various techniques have been proposed in literature till date, each have an edge over the other, to catch-up to the ever growing need of security. This paper is an effort to compare the most popular techniques available on the basis of various performance metrics like differential, statistical and quantitative attacks analysis. To measure the efficacy, all the modern and grown-up techniques are implemented in MATLAB-2015. The results show that the chaotic schemes used in the study provide highly scrambled encrypted images having uniform histogram distribution. In addition, the encrypted images provided very less degree of correlation coefficient values in horizontal, vertical and diagonal directions, proving their resistance against statistical attacks. In addition, these schemes are able to resist differential attacks as these showed a high sensitivity for the initial conditions, i.e. pixel and key values. Finally, the schemes provide a large key spacing, hence can resist the brute force attacks, and provided a very less computational time for image encryption/decryption in comparison to other schemes available in literature.

  15. Drought predisposes piñon-juniper woodlands to insect attacks and mortality.

    PubMed

    Gaylord, Monica L; Kolb, Thomas E; Pockman, William T; Plaut, Jennifer A; Yepez, Enrico A; Macalady, Alison K; Pangle, Robert E; McDowell, Nate G

    2013-04-01

    To test the hypothesis that drought predisposes trees to insect attacks, we quantified the effects of water availability on insect attacks, tree resistance mechanisms, and mortality of mature piñon pine (Pinus edulis) and one-seed juniper (Juniperus monosperma) using an experimental drought study in New Mexico, USA. The study had four replicated treatments (40 × 40 m plot/replicate): removal of 45% of ambient annual precipitation (H2 O-); irrigation to produce 125% of ambient annual precipitation (H2 O+); a drought control (C) to quantify the impact of the drought infrastructure; and ambient precipitation (A). Piñon began dying 1 yr after drought initiation, with higher mortality in the H2 O- treatment relative to other treatments. Beetles (bark/twig) were present in 92% of dead trees. Resin duct density and area were more strongly affected by treatments and more strongly associated with piñon mortality than direct measurements of resin flow. For juniper, treatments had no effect on insect resistance or attacks, but needle browning was highest in the H2 O- treatment. Our results provide strong evidence that ≥ 1 yr of severe drought predisposes piñon to insect attacks and increases mortality, whereas 3 yr of the same drought causes partial canopy loss in juniper. © 2013 The Authors. New Phytologist © 2013 New Phytologist Trust.

  16. Reactions of Oklahoma City bombing survivors to media coverage of the September 11, 2001, attacks.

    PubMed

    Pfefferbaum, Betty; Nitiéma, Pascal; Pfefferbaum, Rose L; Houston, J Brian; Tucker, Phebe; Jeon-Slaughter, Haekyung; North, Carol S

    2016-02-01

    This study explored the effects of media coverage of a terrorist incident in individuals remote from the location of a major attack who had directly experienced a prior terrorist incident. Directly-exposed survivors of the 1995 Oklahoma City bombing, initially studied six months after the incident, and indirectly-affected Oklahoma City community residents were assessed two to seven months after the September 11, 2001, attacks. Survivors were assessed for a diagnosis of bombing-related posttraumatic stress disorder (PTSD) at index and follow up, and emotional reactions and September 11 media behavior were assessed in all participants. Among the three investigated forms of media (television, radio, and newspaper), only television viewing was associated with 9/11-related posttraumatic stress reactions. Exposure to the Oklahoma City bombing was associated with greater arousal in relation to the September 11 attacks, and among survivors, having developed bombing-related PTSD was associated with higher scores on all three September 11 posttraumatic stress response clusters (intrusion, avoidance, and arousal). Although time spent watching television coverage of the September 11 attacks and fear-related discontinuation of media contact were not associated with Oklahoma City bombing exposure, discontinuing September 11 media contact due to fear was associated with avoidance/numbing in the full sample and in the analysis restricted to the bombing survivors. Surviving a prior terrorist incident and developing PTSD in relation to that incident may predispose individuals to adverse reactions to media coverage of a future terrorist attack. Copyright © 2015 Elsevier Inc. All rights reserved.

  17. SCODE: A Secure Coordination-Based Data Dissemination to Mobile Sinks in Sensor Networks

    NASA Astrophysics Data System (ADS)

    Hung, Lexuan; Lee, Sungyoung; Lee, Young-Koo; Lee, Heejo

    For many sensor network applications such as military, homeland security, it is necessary for users (sinks) to access sensor networks while they are moving. However, sink mobility brings new challenges to secure routing in large-scale sensor networks. Mobile sinks have to constantly propagate their current location to all nodes, and these nodes need to exchange messages with each other so that the sensor network can establish and maintain a secure multi-hop path between a source node and a mobile sink. This causes significant computation and communication overhead for sensor nodes. Previous studies on sink mobility have mainly focused on efficiency and effectiveness of data dissemination without security consideration. In this paper, we propose a secure and energy-efficient data dissemination protocol — Secure COodination-based Data dissEmination (SCODE) — for mobile sinks in sensor networks. We take advantages of coordination networks (grid structure) based on Geographical Adaptive Fidelity (GAF) protocol to construct a secure and efficient routing path between sources and sinks. Our security analysis demonstrates that the proposed protocol can defend against common attacks in sensor network routing such as replay attacks, selective forwarding attacks, sinkhole and wormhole, Sybil attacks, HELLO flood attacks. Our performance evaluation both in mathematical analysis and simulation shows that the SCODE significantly reduces communication overhead and energy consumption while the latency is similar compared with the existing routing protocols, and it always delivers more than 90 percentage of packets successfully.

  18. Attacks on quantum key distribution protocols that employ non-ITS authentication

    NASA Astrophysics Data System (ADS)

    Pacher, C.; Abidin, A.; Lorünser, T.; Peev, M.; Ursin, R.; Zeilinger, A.; Larsson, J.-Å.

    2016-01-01

    We demonstrate how adversaries with large computing resources can break quantum key distribution (QKD) protocols which employ a particular message authentication code suggested previously. This authentication code, featuring low key consumption, is not information-theoretically secure (ITS) since for each message the eavesdropper has intercepted she is able to send a different message from a set of messages that she can calculate by finding collisions of a cryptographic hash function. However, when this authentication code was introduced, it was shown to prevent straightforward man-in-the-middle (MITM) attacks against QKD protocols. In this paper, we prove that the set of messages that collide with any given message under this authentication code contains with high probability a message that has small Hamming distance to any other given message. Based on this fact, we present extended MITM attacks against different versions of BB84 QKD protocols using the addressed authentication code; for three protocols, we describe every single action taken by the adversary. For all protocols, the adversary can obtain complete knowledge of the key, and for most protocols her success probability in doing so approaches unity. Since the attacks work against all authentication methods which allow to calculate colliding messages, the underlying building blocks of the presented attacks expose the potential pitfalls arising as a consequence of non-ITS authentication in QKD post-processing. We propose countermeasures, increasing the eavesdroppers demand for computational power, and also prove necessary and sufficient conditions for upgrading the discussed authentication code to the ITS level.

  19. Bacteria between protists and phages: from antipredation strategies to the evolution of pathogenicity.

    PubMed

    Brüssow, Harald

    2007-08-01

    Bacteriophages and protists are major causes of bacterial mortality. Genomics suggests that phages evolved well before eukaryotic protists. Bacteria were thus initially only confronted with phage predators. When protists evolved, bacteria were caught between two types of predators. One successful antigrazing strategy of bacteria was the elaboration of toxins that would kill the grazer. The released cell content would feed bystander bacteria. I suggest here that, to fight grazing protists, bacteria teamed up with those phage predators that concluded at least a temporary truce with them in the form of lysogeny. Lysogeny was perhaps initially a resource management strategy of phages that could not maintain infection chains. Subsequently, lysogeny might have evolved into a bacterium-prophage coalition attacking protists, which became a food source for them. When protists evolved into multicellular animals, the lysogenic bacteria tracked their evolving food source. This hypothesis could explain why a frequent scheme of bacterial pathogenicity is the survival in phagocytes, why a significant fraction of bacterial pathogens have prophage-encoded virulence genes, and why some virulence factors of animal pathogens are active against unicellular eukaryotes. Bacterial pathogenicity might thus be one playing option of the stone-scissor-paper game played between phages-bacteria-protists, with humans getting into the crossfire.

  20. Expressing thoughts and feelings following a collective trauma: immediate responses to 9/11 predict negative outcomes in a national sample.

    PubMed

    Seery, Mark D; Silver, Roxane Cohen; Holman, E Alison; Ence, Whitney A; Chu, Thai Q

    2008-08-01

    Collective traumas can negatively affect large numbers of people who ostensibly did not experience events directly, making it particularly important to identify which people are most vulnerable to developing mental and physical health problems as a result of such events. It is commonly believed that successful coping with a traumatic event requires expressing one's thoughts and feelings about the experience, suggesting that people who choose not to do so would be at high risk for poor adjustment. To test this idea in the context of collective trauma, 2,138 members of a nationally representative Web-enabled survey panel were given the opportunity to express their reactions to the terrorist attacks of September 11, 2001, on that day and those following. Follow-up surveys assessing mental and physical health outcomes were completed over the next 2 years. Contrary to common belief, participants who chose not to express any initial reaction reported better outcomes over time than did those who expressed an initial reaction. Among those who chose to express their immediate reactions, longer responses predicted worse outcomes over time. Implications for myths of coping, posttrauma interventions, and psychology in the media are discussed. Copyright 2008 APA, all rights reserved.

  1. Game Analysis of Olympic, World and European Championships in Men's Handball.

    PubMed

    Bilge, Murat

    2012-12-01

    The development of men's handball was analyzed using data from the Olympic, World and European Championships held within the last eight years. The most obvious change, especially within these last nine tournaments, was that men's handball was played more dynamically and rapidly, both in attack and defense, especially by European teams. The first aim of this study was to conduct a technical analysis of current handball and to determine factors related to success in this sport discipline. The second aim was to compare the data of European Championships with other tournaments, considering the success of European teams in Men's World Handball. The technical variables used to compare the tournaments included: the average number of attacks, the efficiency of attacks, the efficiency of goal throws, fast break goals per game, the efficiency of fast breaks, the efficiency of the goalkeeper, saves by the goalkeeper per game, number of turnovers per game, and the efficiency of position throws (wing, pivot, back court, break-through, fast break, and 7-meter). This technical analysis used cumulative statistics from the European Handball Federation and International Handball Federation. ANOVA revealed significant differences between the first eight teams in the European Championships and their counterparts in the other two tournaments (Olympics and World Championships) in terms of several technical variables. The results showed that the efficiency of fast break, pivot position and back court players affected the ranking in favor of the European teams in significant international tournaments.

  2. Outcomes following acute primary angle closure in an Asian population.

    PubMed

    Tan, Anna M; Loon, Seng C; Chew, Paul T K

    2009-07-01

    Data regarding development of primary angle closure glaucoma (PACG) following acute primary angle closure (APAC) is conflicting. This study looks at outcomes after an APAC episode with a secondary aim to identify any risk factors that could predict progression to PACG. This is a retrospective review of the charts of consecutive patients who were diagnosed with APAC from December 2003 to June 2006. All were treated in a standard manner with initial intensive medical therapy or laser iridoplasty followed by early laser peripheral iridotomy within 24 h of presentation. Forty-two eyes of 41 patients were analysed. The mean follow-up period was 27.3 +/- 16.2 months. Nine eyes (21.4%) developed an increase in intraocular pressure (IOP) within a mean of 11.9 months (median 5 months) after resolution of APAC. Eight eyes went on to have trabeculectomy or glaucoma drainage device. At final follow up, the mean IOP of attack eye was 13.3 +/- 2.92 mmHg. None of the eyes, including those that underwent surgery, required topical medication to control IOP. Thirty-eight eyes (90.5%) have BCVA of 6/6 to 6/12. The duration of symptoms before presentation (P = 0.00) and duration taken to abort the acute attack (P = 0.01) were found to be significantly associated with development of PACG. The results of this study suggest that outcomes following successful treatment of APAC may not be as poor as described previously. Early aggressive management of the acute episode may have a role to play in preventing development of PACG after APAC.

  3. A robust cooperative spectrum sensing scheme based on Dempster-Shafer theory and trustworthiness degree calculation in cognitive radio networks

    NASA Astrophysics Data System (ADS)

    Wang, Jinlong; Feng, Shuo; Wu, Qihui; Zheng, Xueqiang; Xu, Yuhua; Ding, Guoru

    2014-12-01

    Cognitive radio (CR) is a promising technology that brings about remarkable improvement in spectrum utilization. To tackle the hidden terminal problem, cooperative spectrum sensing (CSS) which benefits from the spatial diversity has been studied extensively. Since CSS is vulnerable to the attacks initiated by malicious secondary users (SUs), several secure CSS schemes based on Dempster-Shafer theory have been proposed. However, the existing works only utilize the current difference of SUs, such as the difference in SNR or similarity degree, to evaluate the trustworthiness of each SU. As the current difference is only one-sided and sometimes inaccurate, the statistical information contained in each SU's historical behavior should not be overlooked. In this article, we propose a robust CSS scheme based on Dempster-Shafer theory and trustworthiness degree calculation. It is carried out in four successive steps, which are basic probability assignment (BPA), trustworthiness degree calculation, selection and adjustment of BPA, and combination by Dempster-Shafer rule, respectively. Our proposed scheme evaluates the trustworthiness degree of SUs from both current difference aspect and historical behavior aspect and exploits Dempster-Shafer theory's potential to establish a `soft update' approach for the reputation value maintenance. It can not only differentiate malicious SUs from honest ones based on their historical behaviors but also reserve the current difference for each SU to achieve a better real-time performance. Abundant simulation results have validated that the proposed scheme outperforms the existing ones under the impact of different attack patterns and different number of malicious SUs.

  4. A Case Report on Red Ear Syndrome with Tinnitus Successfully Treated with Transcranial Random Noise Stimulation.

    PubMed

    Kreuzer, Peter M; Vielsmeier, Veronika; Poeppl, Timm B; Langguth, Berthold

    2017-01-01

    The red ear syndrome represents a rare symptom complex consisting of auricular erythema associated with painful and burning sensations. It has been described in combination with tinnitus rarely. It has been hypothesized to be etiologically related to altered trigeminal afferent input, temporomandibular disorders, and thalamic dysfunction. The initial objective of applying transcranial random noise stimulation (tRNS) in a case of red ear syndrome in combination with tinnitus was the alleviation of the phantom sounds. This is a case report on the successful treatment of red ear syndrome with tinnitus by means of transcranial random noise stimulation (tRNS) and a short review on the published cases of this condition. We present the case of a 50-year-old woman reporting a simultaneous onset of constant left-sided tinnitus and feelings of warmth accompanied by an intermittent stabbing and/or oppressive pain stretching from the ipsilateral ear to the head/neck/shoulder region, occasionally accompanied by nausea/vomiting and dizziness. After failure of pharmacological treatment attempts, either because of lacking clinical effects (gabapentin, zolmitriptan, and indomethacin) or because of adverse reactions (pregabaline), the patient was offered an experimental neuromodulatory treatment with bitemporal tRNS primarily targeting the tinnitus complaints of the patient. tRNS was conducted in 2 - 3 day sessions (stimulation site: bilateral temporal cortex/2.0 mA/10 s on-and-off-ramp/offset 0 mA/20 min/random frequencies 101 - 640 Hz / NeuroConn Eldith DC-Stimulator plus). In 3 consecutive pain attacks repeated sessions of tRNS resulted in substantial alleviation of pain intensity and a prolongation of the interval between attacks. This was an expected finding as the proposed tRNS treatment was initially offered to the patient aiming at an alleviation of the tinnitus complaints (which remained unaffected by tRNS). The reported data derive from compassionate use treatment in one single patient. Application of a sham condition would have been desirable, but is not possible in the context of compassionate use treatment. Nevertheless, we would consider it rather unlikely that the reported effects are purely unspecific as the patient did exclusively report symptom alleviation of pain-related parameters without affecting the tinnitus. This case report demonstrates the feasibility and therapeutic potential of applying neuromodulatory treatment approaches in red ear syndrome, a rare form of trigemino-autonomal headache. Therefore, it deserves detailed observation in clinical routine applications as well as controlled trials further investigating its neurobiological effects. Key words: Red ear syndrome, pain, trigemino-autonomal headache, chronic tinnitus, transcranial electrical stimulation, random noise stimulation.

  5. Ocular Involvement of Behçet's Syndrome: a Comprehensive Review.

    PubMed

    Ozyazgan, Yilmaz; Ucar, Didar; Hatemi, Gulen; Yazici, Yusuf

    2015-12-01

    Behçet's syndrome (BS) is a vasculitis involving several organ systems including the eyes. Ocular involvement is one of the most disabling complications of BS, causing loss of vision that may progress to blindness if left untreated. The typical form of ocular involvement is a relapsing and remitting panuveitis and retinal vasculitis. Initial attacks may spontaneously improve and subsequently disappear in a few weeks but tend to recur if left untreated. Destructive and recurrent attacks, especially with posterior segment and retina involvement, may cause irreversible ocular structural changes and permanent damage in sensory retina, resulting in loss of vision. The risk of irreversible damage to ocular tissue which may result in loss of vision warrants early and intensive treatment especially in patients at high risk such as young men who tend to follow an aggressive disease course. The management strategy involves rapid suppression of inflammation during the attacks and prevention of recurrent attacks. Local and systemic measures including immunosuppressives, corticosteroids, and biologic agents are used for this purpose. Surgery may be required in selected cases. The prognosis of eye involvement has greatly improved over the last decades with the effective use of immunosuppressives.

  6. Hi-alpha forebody design. Part 1: Methodology base and initial parametrics

    NASA Technical Reports Server (NTRS)

    Mason, William H.; Ravi, R.

    1992-01-01

    The use of Computational Fluid Dynamics (CFD) has been investigated for the analysis and design of aircraft forebodies at high angle of attack combined with sideslip. The results of the investigation show that CFD has reached a level of development where computational methods can be used for high angle of attack aerodynamic design. The classic wind tunnel experiment for the F-5A forebody directional stability has been reproduced computationally over an angle of attack range from 10 degrees to 45 degrees, and good agreement with experimental data was obtained. Computations have also been made at combined angle of attack and sideslip over a chine forebody, demonstrating the qualitative features of the flow, although not producing good agreement with measured experimental pressure distributions. The computations were performed using the code known as cfl3D for both the Euler equations and the Reynolds equations using a form of the Baldwin-Lomax turbulence model. To study the relation between forebody shape and directional stability characteristics, a generic parametric forebody model has been defined which provides a simple analytic math model with flexibility to capture the key shape characteristics of the entire range of forebodies of interest, including chines.

  7. Privacy in Pharmacogenetics: An End-to-End Case Study of Personalized Warfarin Dosing.

    PubMed

    Fredrikson, Matthew; Lantz, Eric; Jha, Somesh; Lin, Simon; Page, David; Ristenpart, Thomas

    2014-08-01

    We initiate the study of privacy in pharmacogenetics, wherein machine learning models are used to guide medical treatments based on a patient's genotype and background. Performing an in-depth case study on privacy in personalized warfarin dosing, we show that suggested models carry privacy risks, in particular because attackers can perform what we call model inversion : an attacker, given the model and some demographic information about a patient, can predict the patient's genetic markers. As differential privacy (DP) is an oft-proposed solution for medical settings such as this, we evaluate its effectiveness for building private versions of pharmacogenetic models. We show that DP mechanisms prevent our model inversion attacks when the privacy budget is carefully selected . We go on to analyze the impact on utility by performing simulated clinical trials with DP dosing models. We find that for privacy budgets effective at preventing attacks, patients would be exposed to increased risk of stroke, bleeding events, and mortality . We conclude that current DP mechanisms do not simultaneously improve genomic privacy while retaining desirable clinical efficacy, highlighting the need for new mechanisms that should be evaluated in situ using the general methodology introduced by our work.

  8. Simulations in Cyber-Security: A Review of Cognitive Modeling of Network Attackers, Defenders, and Users.

    PubMed

    Veksler, Vladislav D; Buchler, Norbou; Hoffman, Blaine E; Cassenti, Daniel N; Sample, Char; Sugrim, Shridat

    2018-01-01

    Computational models of cognitive processes may be employed in cyber-security tools, experiments, and simulations to address human agency and effective decision-making in keeping computational networks secure. Cognitive modeling can addresses multi-disciplinary cyber-security challenges requiring cross-cutting approaches over the human and computational sciences such as the following: (a) adversarial reasoning and behavioral game theory to predict attacker subjective utilities and decision likelihood distributions, (b) human factors of cyber tools to address human system integration challenges, estimation of defender cognitive states, and opportunities for automation, (c) dynamic simulations involving attacker, defender, and user models to enhance studies of cyber epidemiology and cyber hygiene, and (d) training effectiveness research and training scenarios to address human cyber-security performance, maturation of cyber-security skill sets, and effective decision-making. Models may be initially constructed at the group-level based on mean tendencies of each subject's subgroup, based on known statistics such as specific skill proficiencies, demographic characteristics, and cultural factors. For more precise and accurate predictions, cognitive models may be fine-tuned to each individual attacker, defender, or user profile, and updated over time (based on recorded behavior) via techniques such as model tracing and dynamic parameter fitting.

  9. Protecting Dynamic Mobile Agent against Denial of Service Attacks

    NASA Astrophysics Data System (ADS)

    Aggarwal, Mayank; Nipur, Pallavi

    2010-11-01

    Mobile Agents are softwares migrating from one node to another to fulfill the task of its owner. The introduction of mobile agents has reduced network latency, network traffic a lot but at the same time it has increased the vulnerability for attacks by malicious hosts. One such attack is `Denial of Service', once the agent is launched it is free to roam without any control of its owner, this on one hand decreases the cost of agent—owner interaction and on the other hand increases the chances of `Denial Of Service'. In Denial Of Service attack the malicious host may deny resources required by the agent and kill the agent, thus the result computed so far is lost and this may happen every time the agent visits any malicious host. In this paper we continued the work done in [10] in which the authors proposed techniques by which owner can detect the malicious host for `Denial Of Service' but they did not covered technique for dynamic routes i.e. where the host or agent initiate migrations to hosts which were not contained in the route composed by the owner. We introduced an algorithm and a model which can be useful for the above purpose.

  10. Privacy in Pharmacogenetics: An End-to-End Case Study of Personalized Warfarin Dosing

    PubMed Central

    Fredrikson, Matthew; Lantz, Eric; Jha, Somesh; Lin, Simon; Page, David; Ristenpart, Thomas

    2014-01-01

    We initiate the study of privacy in pharmacogenetics, wherein machine learning models are used to guide medical treatments based on a patient’s genotype and background. Performing an in-depth case study on privacy in personalized warfarin dosing, we show that suggested models carry privacy risks, in particular because attackers can perform what we call model inversion: an attacker, given the model and some demographic information about a patient, can predict the patient’s genetic markers. As differential privacy (DP) is an oft-proposed solution for medical settings such as this, we evaluate its effectiveness for building private versions of pharmacogenetic models. We show that DP mechanisms prevent our model inversion attacks when the privacy budget is carefully selected. We go on to analyze the impact on utility by performing simulated clinical trials with DP dosing models. We find that for privacy budgets effective at preventing attacks, patients would be exposed to increased risk of stroke, bleeding events, and mortality. We conclude that current DP mechanisms do not simultaneously improve genomic privacy while retaining desirable clinical efficacy, highlighting the need for new mechanisms that should be evaluated in situ using the general methodology introduced by our work. PMID:27077138

  11. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Engel, David W.; Jarman, Kenneth D.; Xu, Zhijie

    This report describes our initial research to quantify uncertainties in the identification and characterization of possible attack states in a network. As a result, we should be able to estimate the current state in which the network is operating, based on a wide variety of network data, and attach a defensible measure of confidence to these state estimates. The output of this research will be new uncertainty quantification (UQ) methods to help develop a process for model development and apply UQ to characterize attacks/adversaries, create an understanding of the degree to which methods scale to "big" data, and offer methodsmore » for addressing model approaches with regard to validation and accuracy.« less

  12. Erosion of phosphor bronze under cavitation attack in a mineral oil

    NASA Technical Reports Server (NTRS)

    Rao, B. C. S.; Buckley, D. H.

    1986-01-01

    Experimental investigations on erosion of a copper alloy, phosphor bronze, under cavitation attack in a viscous mineral oil are presented. The details of pit formation and erosion were studied using scanning electron microscopy. The mean depth of penetration, the variations in surface roughness, and the changes in erosion pit size were studied. Cavitation pits formed initially over the grain boundaries while the surface grains were plastically deformed. Erosion of surface grains occurred largely by ductile fracture involving microcracking and removal in layers. The ratio h/a of the depth h to half width a of cavitation pits increased with test duration from 0.047 to 0.55.

  13. VERIFICATION OF THE PERFORMANCE OF DECONTAMINATION TECHNOLOGIES IN EPA'S SAFE BUILDINGS PROGRAM

    EPA Science Inventory

    The paper describes initial progress in identifying and testing technologies applicable for decontaminating workplaces and other buildings that may be subject to chemical or biological attack. The EPA is using the process established in its Environmental Technology Verification (...

  14. Arizona's tobacco control initiative illustrates the need for continuing oversight by tobacco control advocates

    PubMed Central

    Bialous, S. A.; Glantz, S.

    1999-01-01

    BACKGROUND—In 1994, Arizona voters approved Proposition 200 which increased the tobacco tax and earmarked 23% of the new revenues for tobacco education programmes.
OBJECTIVE—To describe the campaign to pass Proposition 200, the legislative debate that followed the passage of the initiative, and the development and implementation of the tobacco control programme.
DESIGN—This is a case study. Data were collected through semi-structured interviews with key players in the initiative campaign and in the tobacco education programme, and written records (campaign material, newspapers, memoranda, public records).
RESULTS—Despite opposition from the tobacco industry, Arizonans approved an increase in the tobacco tax. At the legislature, health advocates in Arizona successfully fought the tobacco industry attempts to divert the health education funds and pass preemptive legislation. The executive branch limited the scope of the programme to adolescents and pregnant women. It also prevented the programme from attacking the tobacco industry or focusing on secondhand smoke. Health advocates did not put enough pressure at the executive branch to force it to develop a comprehensive tobacco education programme.
CONCLUSIONS—It is not enough for health advocates to campaign for an increase in tobacco tax and to protect the funds at the legislature. Tobacco control advocates must closely monitor the development and implementation of tax-funded tobacco education programmes at the administrative level and be willing to press the executive to implement effective programmes.


Keywords: tobacco tax; health education; advocacy PMID:10478397

  15. MAD with aliens? Interstellar deterrence and its implications

    NASA Astrophysics Data System (ADS)

    Korhonen, Janne M.

    2013-05-01

    The possibility that extraterrestrial intelligences (ETIs) could be hostile to humanity has been raised as a reason to avoid even trying to contact ETIs. However, there is a distinct shortage of analytical discussion about the risks of an attack, perhaps because of an implicit premise that we cannot analyze the decision making of an alien civilization. This paper argues that we can draw some inferences from the history of the Cold War and nuclear deterrence in order to show that at least some attack scenarios are likely to be exaggerated. In particular, it would seem to be unlikely that the humanity would be attacked simply because it might, sometime in the future, present a threat to the ETI. Even if communication proves to be difficult, rational decision-makers should avoid unprovoked attacks, because their success would be very difficult to assure. In general, it seems believable that interstellar conflicts between civilizations would remain rare. The findings advise caution for proposed interstellar missions, however, as starfaring capability itself might be seen as a threat. On the other hand, attempting to contact ETIs seems to be a relatively low-risk strategy: paranoid ETIs must also consider the possibility that the messages are a deception designed to lure out hostile civilizations and preemptively destroy them.

  16. Unraveling the contribution of pancreatic beta-cell suicide in autoimmune type 1 diabetes✩

    PubMed Central

    Jaberi-Douraki, Majid; Schnell, Santiago; Pietropaolo, Massimo; Khadra, Anmar

    2014-01-01

    In type 1 diabetes, an autoimmune disease mediated by autoreactive T-cells that attack insulin-secreting pancreatic beta-cells, it has been suggested that disease progression may additionally require protective mechanisms in the target tissue to impede such auto-destructive mechanisms. We hypothesize that the autoimmune attack against beta-cells causes endoplasmic reticulum stress by forcing the remaining beta-cells to synthesize and secrete defective insulin. To rescue beta-cell from the endoplasmic reticulum stress, beta-cells activate the unfolded protein response to restore protein homeostasis and normal insulin synthesis. Here we investigate the compensatory role of unfolded protein response by developing a multi-state model of type 1 diabetes that takes into account beta-cell destruction caused by pathogenic autoreactive T-cells and apoptosis triggered by endoplasmic reticulum stress. We discuss the mechanism of unfolded protein response activation and how it counters beta-cell extinction caused by an autoimmune attack and/or irreversible damage by endoplasmic reticulum stress. Our results reveal important insights about the balance between beta-cell destruction by autoimmune attack (beta-cell homicide) and beta-cell apoptosis by endoplasmic reticulum stress (beta-cell suicide). It also provides an explanation as to why the unfolded protein response may not be a successful therapeutic target to treat type 1 diabetes. PMID:24831415

  17. Face antispoofing based on frame difference and multilevel representation

    NASA Astrophysics Data System (ADS)

    Benlamoudi, Azeddine; Aiadi, Kamal Eddine; Ouafi, Abdelkrim; Samai, Djamel; Oussalah, Mourad

    2017-07-01

    Due to advances in technology, today's biometric systems become vulnerable to spoof attacks made by fake faces. These attacks occur when an intruder attempts to fool an established face-based recognition system by presenting a fake face (e.g., print photo or replay attacks) in front of the camera instead of the intruder's genuine face. For this purpose, face antispoofing has become a hot topic in face analysis literature, where several applications with antispoofing task have emerged recently. We propose a solution for distinguishing between real faces and fake ones. Our approach is based on extracting features from the difference between successive frames instead of individual frames. We also used a multilevel representation that divides the frame difference into multiple multiblocks. Different texture descriptors (local binary patterns, local phase quantization, and binarized statistical image features) have then been applied to each block. After the feature extraction step, a Fisher score is applied to sort the features in ascending order according to the associated weights. Finally, a support vector machine is used to differentiate between real and fake faces. We tested our approach on three publicly available databases: CASIA Face Antispoofing database, Replay-Attack database, and MSU Mobile Face Spoofing database. The proposed approach outperforms the other state-of-the-art methods in different media and quality metrics.

  18. Cascading failures in complex networks with community structure

    NASA Astrophysics Data System (ADS)

    Lin, Guoqiang; di, Zengru; Fan, Ying

    2014-12-01

    Much empirical evidence shows that when attacked with cascading failures, scale-free or even random networks tend to collapse more extensively when the initially deleted node has higher betweenness. Meanwhile, in networks with strong community structure, high-betweenness nodes tend to be bridge nodes that link different communities, and the removal of such nodes will reduce only the connections among communities, leaving the networks fairly stable. Understanding what will affect cascading failures and how to protect or attack networks with strong community structure is therefore of interest. In this paper, we have constructed scale-free Community Networks (SFCN) and Random Community Networks (RCN). We applied these networks, along with the Lancichinett-Fortunato-Radicchi (LFR) benchmark, to the cascading-failure scenario to explore their vulnerability to attack and the relationship between cascading failures and the degree distribution and community structure of a network. The numerical results show that when the networks are of a power-law distribution, a stronger community structure will result in the failure of fewer nodes. In addition, the initial removal of the node with the highest betweenness will not lead to the worst cascading, i.e. the largest avalanche size. The Betweenness Overflow (BOF), an index that we developed, is an effective indicator of this tendency. The RCN, however, display a different result. In addition, the avalanche size of each node can be adopted as an index to evaluate the importance of the node.

  19. TV spots' impact.

    PubMed

    El-bakly, S

    1994-09-01

    The Information, Education and Communication (IEC) Center of the State Information Service was established in 1979 for the purpose of providing information to the people on the population issue. The Ministry of Information has accorded the State Information Service free TV and radio air time for family planning dramas and spots. In the early years information campaigns were organized to make people aware of the population problem by slogans, songs, and cartoons. Around 1984 misconceptions about family planning and contraceptives were attacked through a number of TV and radio spots. A few years later 21 spots on specific contraceptive methods were broadcast which were aired for three years over 3000 times. They were extremely successful. The impact of these TV spots was one of the major reasons why the contraceptive prevalence rate increased from 30% in 1984 to 38% in 1988 and 47% in 1992. Spots were also broadcast about the social implications of large families. The TV soap opera "And The Nile Flows On", with the family planning message interwoven into it, was very well received by the target audience. A program entitled "Wedding of the Month" features couples who know family planning well. The most successful radio program is a 15-20 minute long quiz show for residents of the villages where the Select Villages Project is being implemented. The State Information Service has 60 local information centers in the 26 governorates of Egypt that make plans for the family planning campaign. In 1992 the Minya Initiative, a family planning project was implemented in the Minya Governorate. As a result, the contraceptive prevalence rate rose from 22% to 30% over 18 months. A new project, the Select Village Project, was developed in 1993 that replicates the Minya Initiative on the village level in other governorates. This new project that was implemented in sixteen governorates.

  20. Patriot Advanced Capability-3 (PAC-3)

    DTIC Science & Technology

    2013-12-01

    attack than is possible with actuator -driven aerodynamic control surfaces alone. The Patriot system is deployed world-wide in defense of U.S. and...Start Complete Low Rate Initial Production .. Low Rate Initial Production .. Low Rate Production First D ... First Unit EQuipped IOT &E Start...MAR 2002 SEP 2001 IOT &E Start JAN 2002 JAN 2002 JUL 2002 JAN 2002 Complete SEP 2002 SEP 2002 MAR 2003 SEP 2002 Block 2002 Production Decision OCT

Top