Sample records for klubis active attack

  1. Risk Management

    DTIC Science & Technology

    2011-06-02

    actively attack the risks, they will actively attack you.” -Tom Gib Why do Risk Management? 8 “The first step in the risk management process is to...opportunities to manage and improve our chances of success. - Roger Vanscoy “If you do not actively attack the risks, they will actively attack ...our risks provides opportunities to manage and improve our chances of success. - Roger Vanscoy “If you do not actively attack the risks, they will

  2. Being active after a heart attack (image)

    MedlinePlus

    ... best activity when you start exercising after a heart attack. Start slowly, and increase the amount of time ... best activity when you start exercising after a heart attack. Start slowly, and increase the amount of time ...

  3. fMRI amygdala activation during a spontaneous panic attack in a patient with panic disorder.

    PubMed

    Pfleiderer, Bettina; Zinkirciran, Sariye; Arolt, Volker; Heindel, Walter; Deckert, Juergen; Domschke, Katharina

    2007-01-01

    Previous studies on neuronal activation correlates of panic attacks were mostly based on challenge tests, sensory-related stimulation or fear conditioning in healthy subjects. In the present study, we report on a female patient with panic disorder experiencing a spontaneous panic attack under an auditory habituation paradigm in the last stimulation block with sine tones captured with fMRI at 3T. The panic attack was associated with a significantly increased activity in the right amygdala. This is the first report on neuronal activation correlates of a spontaneous panic attack in a patient with panic disorder as measured by fMRI, which lends further support to a pivotal role of the amygdala in the pathogenesis of the disease.

  4. Angioedema attacks in patients with hereditary angioedema: Local manifestations of a systemic activation process.

    PubMed

    Hofman, Zonne L M; Relan, Anurag; Zeerleder, Sacha; Drouet, Christian; Zuraw, Bruce; Hack, C Erik

    2016-08-01

    Hereditary angioedema (HAE) caused by a deficiency of functional C1-inhibitor (C1INH) becomes clinically manifest as attacks of angioedema. C1INH is the main inhibitor of the contact system. Poor control of a local activation process of this system at the site of the attack is believed to lead to the formation of bradykinin (BK), which increases local vasopermeability and mediates angioedema on interaction with BK receptor 2 on the endothelium. However, several observations in patients with HAE are difficult to explain from a pathogenic model claiming a local activation process at the site of the angioedema attack. Therefore we postulate an alternative model for angioedema attacks in patients with HAE, which assumes a systemic, fluid-phase activation of the contact system to generate BK and its breakdown products. Interaction of these peptides with endothelial receptors that are locally expressed in the affected tissues rather than with receptors constitutively expressed by the endothelium throughout the whole body explains that such a systemic activation process results in local manifestations of an attack. In particular, BK receptor 1, which is induced on the endothelium by inflammatory stimuli, such as kinins and cytokines, meets the specifications of the involved receptor. The pathogenic model discussed here also provides an explanation for why angioedema can occur at multiple sites during an attack and why HAE attacks respond well to modest increases of circulating C1INH activity levels because inhibition of fluid-phase Factor XIIa and kallikrein requires lower C1INH levels than inhibition of activator-bound factors. Copyright © 2016 American Academy of Allergy, Asthma & Immunology. Published by Elsevier Inc. All rights reserved.

  5. A rare case of recurrent vasodepressive attacks of 2-hours duration: analysis of the mechanism by muscle sympathetic nerve activity recording.

    PubMed

    Yatomi, A; Iguchi, A; Uemura, K; Sakamoto, N; Iwase, S; Mano, T

    1989-03-01

    Muscle sympathetic nerve activity was recorded in a 57-year-old male patient suffering from severe hypotensive attacks with bradycardia for 10 years. Continuous blood pressure recording demonstrated frequent drastic falls in pressure. Disappearance and reappearance of muscle sympathetic nerve activity coincided with the onset and termination of attacks. Awakening from sleep or emotional and/or cardiovascular stress seems to trigger hypotension. Cardiac pacemaker was not useful in limiting the attack, because right ventricular pacing caused abrupt falls in both blood pressure and heart rate.

  6. 10 CFR 50.13 - Attacks and destructive acts by enemies of the United States; and defense activities.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 1 2012-01-01 2012-01-01 false Attacks and destructive acts by enemies of the United States; and defense activities. 50.13 Section 50.13 Energy NUCLEAR REGULATORY COMMISSION DOMESTIC... the effects of (a) attacks and destructive acts, including sabotage, directed against the facility by...

  7. 10 CFR 50.13 - Attacks and destructive acts by enemies of the United States; and defense activities.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 1 2011-01-01 2011-01-01 false Attacks and destructive acts by enemies of the United States; and defense activities. 50.13 Section 50.13 Energy NUCLEAR REGULATORY COMMISSION DOMESTIC... the effects of (a) attacks and destructive acts, including sabotage, directed against the facility by...

  8. 10 CFR 50.13 - Attacks and destructive acts by enemies of the United States; and defense activities.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 1 2013-01-01 2013-01-01 false Attacks and destructive acts by enemies of the United States; and defense activities. 50.13 Section 50.13 Energy NUCLEAR REGULATORY COMMISSION DOMESTIC... the effects of (a) attacks and destructive acts, including sabotage, directed against the facility by...

  9. 10 CFR 50.13 - Attacks and destructive acts by enemies of the United States; and defense activities.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 1 2014-01-01 2014-01-01 false Attacks and destructive acts by enemies of the United States; and defense activities. 50.13 Section 50.13 Energy NUCLEAR REGULATORY COMMISSION DOMESTIC... the effects of (a) attacks and destructive acts, including sabotage, directed against the facility by...

  10. Counter-Chemical, Biological, Radiological, and Nuclear Operations

    DTIC Science & Technology

    2007-01-26

    environment. (Page 10) Consequence management activities serve to reduce the effects of a CBRN attack or event, and assist in the restoration of...can be used quite effectively as attack agents. Toxic Industrial Chemicals (TICs), Toxic Industrial Materials (TIMs), and other potentially...CBRN pillars. Consequence Management Consequence management (CM) activities serve to reduce the effects of a CBRN attack or event, and assist in

  11. Fast WEP-Key Recovery Attack Using Only Encrypted IP Packets

    NASA Astrophysics Data System (ADS)

    Teramura, Ryoichi; Asakura, Yasuo; Ohigashi, Toshihiro; Kuwakado, Hidenori; Morii, Masakatu

    Conventional efficient key recovery attacks against Wired Equivalent Privacy (WEP) require specific initialization vectors or specific packets. Since it takes much time to collect the packets sufficiently, any active attack should be performed. An Intrusion Detection System (IDS), however, will be able to prevent the attack. Since the attack logs are stored at the servers, it is possible to prevent such an attack. This paper proposes an algorithm for recovering a 104-bit WEP key from any IP packets in a realistic environment. This attack needs about 36, 500 packets with a success probability 0.5, and the complexity of our attack is equivalent to about 220 computations of the RC4 key setups. Since our attack is passive, it is difficult for both WEP users and administrators to detect our attack.

  12. Terrorist Attacks Escalate in Frequency and Fatalities Preceding Highly Lethal Attacks

    PubMed Central

    Martens, Andy; Sainudiin, Raazesh; Sibley, Chris G.; Schimel, Jeff; Webber, David

    2014-01-01

    Highly lethal terrorist attacks, which we define as those killing 21 or more people, account for 50% of the total number of people killed in all terrorist attacks combined, yet comprise only 3.5% of terrorist attacks. Given the disproportionate influence of these incidents, uncovering systematic patterns in attacks that precede and anticipate these highly lethal attacks may be of value for understanding attacks that exact a heavy toll on life. Here we examined whether the activity of terrorist groups escalates–both in the number of people killed per attack and in the frequency of attacks–leading up to highly lethal attacks. Analyses of terrorist attacks drawn from a state-of-the-art international terrorism database (The Global Terrorism Database) showed evidence for both types of escalation leading up to highly lethal attacks, though complexities to the patterns emerged as well. These patterns of escalation do not emerge among terrorist groups that never commit a highly lethal attack. PMID:24755753

  13. Management of children and young people (CYP) with asthma: a clinical audit report.

    PubMed

    Levy, Mark L; Ward, Angela; Nelson, Sara

    2018-05-21

    An asthma attack or exacerbation signals treatment failure. Most attacks are preventable and failure to recognize risk of asthma attacks are well recognized as risk factors for future attacks and even death. Of the 19 recommendations made by the United Kingdom National Review of Asthma Deaths (NRAD) (1) only one has been partially implemented-a National Asthma Audit; however, this hasn't reported yet. The Harrow Clinical Commissioning Group (CCG) in London implemented a clinical asthma audit on 291 children and young people aged under 19 years (CYP) who had been treated for asthma attacks in 2016. This was funded as a Local Incentive Scheme (LIS) aimed at improving quality health care delivery. Two years after the publication of the NRAD report it is surprising that risks for future attacks were not recognized, that few patients were assessed objectively during attacks and only 10% of attacks were followed up within 2 days. However, it is encouraging that CYP hospital admissions following the audit were reduced by 16%, with clear benefit for patients, their families and the local health economy. This audit has provided an example of how clinicians can focus learning on patients who have had asthma attacks and utilize these events as a catalyst for active reflection in particular on modifiable risk factors. Through identification of these risks and active optimization of management, preventable asthma attacks could become 'never events'.

  14. Netwar

    NASA Astrophysics Data System (ADS)

    Keen, Arthur A.

    2006-04-01

    This paper describes technology being developed at 21st Century Technologies to automate Computer Network Operations (CNO). CNO refers to DoD activities related to Attacking and Defending Computer Networks (CNA & CND). Next generation cyber threats are emerging in the form of powerful Internet services and tools that automate intelligence gathering, planning, testing, and surveillance. We will focus on "Search-Engine Hacks", queries that can retrieve lists of router/switch/server passwords, control panels, accessible cameras, software keys, VPN connection files, and vulnerable web applications. Examples include "Titan Rain" attacks against DoD facilities and the Santy worm, which identifies vulnerable sites by searching Google for URLs containing application-specific strings. This trend will result in increasingly sophisticated and automated intelligence-driven cyber attacks coordinated across multiple domains that are difficult to defeat or even understand with current technology. One traditional method of CNO relies on surveillance detection as an attack predictor. Unfortunately, surveillance detection is difficult because attackers can perform search engine-driven surveillance such as with Google Hacks, and avoid touching the target site. Therefore, attack observables represent only about 5% of the attacker's total attack time, and are inadequate to provide warning. In order to predict attacks and defend against them, CNO must also employ more sophisticated techniques and work to understand the attacker's Motives, Means and Opportunities (MMO). CNO must use automated reconnaissance tools, such as Google, to identify information vulnerabilities, and then utilize Internet tools to observe the intelligence gathering, planning, testing, and collaboration activities that represent 95% of the attacker's effort.

  15. Decoding Ventromedial Hypothalamic Neural Activity during Male Mouse Aggression

    PubMed Central

    Dollar, Piotr; Perona, Pietro

    2014-01-01

    The ventromedial hypothalamus, ventrolateral area (VMHvl) was identified recently as a critical locus for inter-male aggression. Optogenetic stimulation of VMHvl in male mice evokes attack toward conspecifics and inactivation of the region inhibits natural aggression, yet very little is known about its underlying neural activity. To understand its role in promoting aggression, we recorded and analyzed neural activity in the VMHvl in response to a wide range of social and nonsocial stimuli. Although response profiles of VMHvl neurons are complex and heterogeneous, we identified a subpopulation of neurons that respond maximally during investigation and attack of male conspecific mice and during investigation of a source of male mouse urine. These “male responsive” neurons in the VMHvl are tuned to both the inter-male distance and the animal's velocity during attack. Additionally, VMHvl activity predicts several parameters of future aggressive action, including the latency and duration of the next attack. Linear regression analysis further demonstrates that aggression-specific parameters, such as distance, movement velocity, and attack latency, can model ongoing VMHvl activity fluctuation during inter-male encounters. These results represent the first effort to understand the hypothalamic neural activity during social behaviors using quantitative tools and suggest an important role for the VMHvl in encoding movement, sensory, and motivation-related signals. PMID:24760856

  16. Herbivory Rapidly Activates MAPK Signaling in Attacked and Unattacked Leaf Regions but Not between Leaves of Nicotiana attenuata[W

    PubMed Central

    Wu, Jianqiang; Hettenhausen, Christian; Meldau, Stefan; Baldwin, Ian T.

    2007-01-01

    Mitogen-activated protein kinase (MAPK) signaling plays a central role in transducing extracellular stimuli into intracellular responses, but its role in mediating plant responses to herbivore attack remains largely unexplored. When Manduca sexta larvae attack their host plant, Nicotiana attenuata, the plant's wound response is reconfigured at transcriptional, phytohormonal, and defensive levels due to the introduction of oral secretions (OS) into wounds during feeding. We show that OS dramatically amplify wound-induced MAPK activity and that fatty acid–amino acid conjugates in M. sexta OS are the elicitors. Virus-induced gene silencing of salicylic acid–induced protein kinase (SIPK) and wound-induced protein kinase revealed their importance in mediating wound and OS-elicited hormonal responses and transcriptional regulation of defense-related genes. We found that after applying OS to wounds created in one portion of a leaf, SIPK is activated in both wounded and specific unwounded regions of the leaf but not in phylotactically connected adjacent leaves. We propose that M. sexta attack elicits a mobile signal that travels to nonwounded regions of the attacked leaf where it activates MAPK signaling and, thus, downstream responses; subsequently, a different signal is transported by the vascular system to systemic leaves to initiate defense responses without activating MAPKs in systemic leaves. PMID:17400894

  17. An Ethical Governor for Constraining Lethal Action in an Autonomous System

    DTIC Science & Technology

    2009-01-01

    property is prohibited from being attacked, including buildings dedicated to religion, art , science … Activity Active Logical Form TargetDiscriminated...attacked, including buildings dedicated to religion, art , science , charitable purposes, and historic monuments. Prohibition LOW Civilian

  18. The contribution of collective attack tactics in differentiating handball score efficiency.

    PubMed

    Rogulj, Nenad; Srhoj, Vatromir; Srhoj, Ljerka

    2004-12-01

    The prevalence of 19 elements of collective tactics in score efficient and score inefficient teams was analyzed in 90 First Croatian Handball League--Men games during the 1998-1999 season. Prediction variables were used to describe duration, continuity, system, organization and spatial direction of attacks. Analysis of the basic descriptive and distribution statistical parameters revealed normal distribution of all variables and possibility to use multivariate methods. Canonic discrimination analysis and analysis of variance showed the use of collective tactics elements on attacks to differ statistically significantly between the winning and losing teams. Counter-attacks and uninterrupted attacks predominate in winning teams. Other types of attacks such as long position attack, multiply interrupted attack, attack with one circle runner attack player/pivot, attack based on basic principles, attack based on group cooperation, attack based on independent action, attack based on group maneuvering, rightward directed attack and leftward directed attack predominate in losing teams. Winning teams were found to be clearly characterized by quick attacks against unorganized defense, whereas prolonged, interrupted position attacks against organized defense along with frequent and diverse tactical actions were characteristic of losing teams. The choice and frequency of using a particular tactical activity in position attack do not warrant score efficiency but usually are consequential to the limited anthropologic potential and low level of individual technical-tactical skills of the players in low-quality teams.

  19. 10 CFR 52.10 - Attacks and destructive acts.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 2 2012-01-01 2012-01-01 false Attacks and destructive acts. 52.10 Section 52.10 Energy... protection against the effects of— (a) Attacks and destructive acts, including sabotage, directed against the... deployment of weapons incident to U.S. defense activities. ...

  20. 10 CFR 52.10 - Attacks and destructive acts.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Attacks and destructive acts. 52.10 Section 52.10 Energy... protection against the effects of— (a) Attacks and destructive acts, including sabotage, directed against the... deployment of weapons incident to U.S. defense activities. ...

  1. 10 CFR 52.10 - Attacks and destructive acts.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 2 2011-01-01 2011-01-01 false Attacks and destructive acts. 52.10 Section 52.10 Energy... protection against the effects of— (a) Attacks and destructive acts, including sabotage, directed against the... deployment of weapons incident to U.S. defense activities. ...

  2. 10 CFR 52.10 - Attacks and destructive acts.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 2 2013-01-01 2013-01-01 false Attacks and destructive acts. 52.10 Section 52.10 Energy... protection against the effects of— (a) Attacks and destructive acts, including sabotage, directed against the... deployment of weapons incident to U.S. defense activities. ...

  3. 10 CFR 52.10 - Attacks and destructive acts.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 2 2014-01-01 2014-01-01 false Attacks and destructive acts. 52.10 Section 52.10 Energy... protection against the effects of— (a) Attacks and destructive acts, including sabotage, directed against the... deployment of weapons incident to U.S. defense activities. ...

  4. Depredation of domestic herds by pumas based on farmer's information in Southern Brazil.

    PubMed

    Schulz, Francine; Printes, Rodrigo C; Oliveira, Larissa R

    2014-10-15

    Large carnivores such as pumas are frequently killed due to conflicts with human populations involving predation on domestic herds. In Southern Brazil, traditional pasture systems, where animals feed without specific husbandry practices is typical, becoming the herds vulnerable to puma attacks. The aim of this study was to examine the conflict between local people and pumas in a Protected Areas mosaic in southern Brazil. Forty-five face-to-face interviews with local people were performed during the year of 2011, using a structured questionnaire with open and closed questions about puma attack episodes in some farms. Based on responses, the conflict and puma attacks were described, and the characteristics of attacked farms and estimated financial losses were evaluated. The first respondents were indicated by the Local Environmental Agency, and the others were indicated by the first one and so on, which is known as "snow-ball" method. Our data suggested that pumas used to attack in unfavorable conditions of visibility (foggy days) and on easier prey (e.g. sheep). Most of the attacks reported were close to forested areas and were focused on free herds during feeding activities. Some farmers said they gave up their sheep breeding activity due to losses caused by puma attacks. However, some farmers could over estimate their losses. Moreover, pumas were considered a threat to domestic herds and respondents mentioned cases of illegal puma hunting in the area. The results of questionnaires suggested that puma attack episodes were related to fragmentation of their habitat associated to incorrect management of herds in the farms studied. The diagnosis of this type of conflict and the characterization of most attacked sites are extremely important to create strategies to prevent and control attacks by wild carnivores. Deep changes in husbandry practices added to educational programs should be implemented, in order to maintain the sustainability of rural activities as well as the survival of pumas in southern Brazil.

  5. Counteracting Power Analysis Attacks by Masking

    NASA Astrophysics Data System (ADS)

    Oswald, Elisabeth; Mangard, Stefan

    The publication of power analysis attacks [12] has triggered a lot of research activities. On the one hand these activities have been dedicated toward the development of secure and efficient countermeasures. On the other hand also new and improved attacks have been developed. In fact, there has been a continuous arms race between designers of countermeasures and attackers. This chapter provides a brief overview of the state-of-the art in the arms race in the context of a countermeasure called masking. Masking is a popular countermeasure that has been extensively discussed in the scientific community. Numerous articles have been published that explain different types of masking and that analyze weaknesses of this countermeasure.

  6. Active Detection for Exposing Intelligent Attacks in Control Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Weerakkody, Sean; Ozel, Omur; Griffioen, Paul

    In this paper, we consider approaches for detecting integrity attacks carried out by intelligent and resourceful adversaries in control systems. Passive detection techniques are often incorporated to identify malicious behavior. Here, the defender utilizes finely-tuned algorithms to process information and make a binary decision, whether the system is healthy or under attack. We demonstrate that passive detection can be ineffective against adversaries with model knowledge and access to a set of input/output channels. We then propose active detection as a tool to detect attacks. In active detection, the defender leverages degrees of freedom he has in the system to detectmore » the adversary. Specifically, the defender will introduce a physical secret kept hidden from the adversary, which can be utilized to authenticate the dynamics. In this regard, we carefully review two approaches for active detection: physical watermarking at the control input, and a moving target approach for generating system dynamics. We examine practical considerations for implementing these technologies and discuss future research directions.« less

  7. Dopaminergic regulation of sleep and cataplexy in a murine model of narcolepsy.

    PubMed

    Burgess, Christian R; Tse, Gavin; Gillis, Lauren; Peever, John H

    2010-10-01

    To determine if the dopaminergic system modulates cataplexy, sleep attacks and sleep-wake behavior in narcoleptic mice. Hypocretin/orexin knockout (i.e., narcoleptic) and wild-type mice were administered amphetamine and specific dopamine receptor modulators to determine their effects on sleep, cataplexy and sleep attacks. Hypocretin knockout (n = 17) and wild-type mice (n = 21). Cataplexy, sleep attacks and sleep-wake behavior were identified using electroencephalogram, electromyogram and videography. These behaviors were monitored for 4 hours after an i.p. injection of saline, amphetamine and specific dopamine receptor modulators (D1- and D2-like receptor modulators). Amphetamine (2 mg/kg), which increases brain dopamine levels, decreased sleep attacks and cataplexy by 61% and 67%, suggesting that dopamine transmission modulates such behaviors. Dopamine receptor modulation also had powerful effects on sleep attacks and cataplexy. Activation (SKF 38393; 20 mg/kg) and blockade (SCH 23390; 1 mg/kg) of D1-like receptors decreased and increased sleep attacks by 77% and 88%, without affecting cataplexy. Pharmacological activation of D2-like receptors (quinpirole; 0.5 mg/kg) increased cataplectic attacks by 172% and blockade of these receptors (eticlopride; 1 mg/kg) potently suppressed them by 97%. Manipulation of D2-like receptors did not affect sleep attacks. We show that the dopaminergic system plays a role in regulating both cataplexy and sleep attacks in narcoleptic mice. We found that cataplexy is modulated by a D2-like receptor mechanism, whereas dopamine modulates sleep attacks by a D1-like receptor mechanism. These results support a role for the dopamine system in regulating sleep attacks and cataplexy in a murine model of narcolepsy.

  8. Operational Test and Evaluation Handbook for Aircrew Training Devices. Volume II. Operational Effectiveness Evaluation

    DTIC Science & Technology

    1982-02-01

    should also convey an understanding of the differ- ences in learning behavior between initial learning activity and later skill maintenance and...refinement might then be, ATTACK MANEUVERS * Pop-up attack # Loft/ LADO type attack * Level/laydown attack Figure 5-4 showe diagrammatically the...sensitive to differ- ences in performance. Severai criteria should be used to guide the selection/development of performance measures, i.e., measure validity

  9. Panic disorder and locomotor activity

    PubMed Central

    Sakamoto, Noriyuki; Yoshiuchi, Kazuhiro; Kikuchi, Hiroe; Takimoto, Yoshiyuki; Kaiya, Hisanobu; Kumano, Hiroaki; Yamamoto, Yoshiharu; Akabayashi, Akira

    2008-01-01

    Background Panic disorder is one of the anxiety disorders, and anxiety is associated with some locomotor activity changes such as "restlessness". However, there have been few studies on locomotor activity in panic disorder using actigraphy, although many studies on other psychiatric disorders have been reported using actigraphy. Therefore, the aim of the present study was to investigate the relationship between panic disorder and locomotor activity pattern using a wrist-worn activity monitor. In addition, an ecological momentary assessment technique was used to record panic attacks in natural settings. Methods Sixteen patients with panic disorder were asked to wear a watch-type computer as an electronic diary for recording panic attacks for two weeks. In addition, locomotor activity was measured and recorded continuously in an accelerometer equipped in the watch-type computer. Locomotor activity data were analyzed using double cosinor analysis to calculate mesor and the amplitude and acrophase of each of the circadian rhythm and 12-hour harmonic component. Correlations between panic disorder symptoms and locomotor activity were investigated. Results There were significant positive correlations between the frequency of panic attacks and mesor calculated from double cosinor analysis of locomotor activity (r = 0.55) and between HAM-A scores and mesor calculated from double cosinor analysis of locomotor activity (r = 0.62). Conclusion Panic disorder patients with more panic attacks and more anxiety have greater objectively assessed locomotor activity, which may reflect the "restlessness" of anxiety disorders. PMID:19017383

  10. Dynamic defense and network randomization for computer systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chavez, Adrian R.; Stout, William M. S.; Hamlet, Jason R.

    The various technologies presented herein relate to determining a network attack is taking place, and further to adjust one or more network parameters such that the network becomes dynamically configured. A plurality of machine learning algorithms are configured to recognize an active attack pattern. Notification of the attack can be generated, and knowledge gained from the detected attack pattern can be utilized to improve the knowledge of the algorithms to detect a subsequent attack vector(s). Further, network settings and application communications can be dynamically randomized, wherein artificial diversity converts control systems into moving targets that help mitigate the early reconnaissancemore » stages of an attack. An attack(s) based upon a known static address(es) of a critical infrastructure network device(s) can be mitigated by the dynamic randomization. Network parameters that can be randomized include IP addresses, application port numbers, paths data packets navigate through the network, application randomization, etc.« less

  11. Panic attacks and panic disorder in a population-based sample of active Canadian military personnel.

    PubMed

    Kinley, D Jolene; Walker, John R; Mackenzie, Corey S; Sareen, Jitender

    2011-01-01

    The factors contributing to psychiatric problems among military personnel, particularly for panic, are unclear. The objective of this study was to examine the prevalence and correlates of panic disorder and panic attacks in the Canadian military. Statistics Canada and the Department of National Defense conducted the Canadian Community Health Survey-Canadian Forces Supplement in 2002 (May to December) with a representative sample of active Canadian military personnel (aged 16-54 years; N = 8,441; response rate, 81.5%). Comparisons were made between respondents with no past-year panic attacks, panic attacks without panic disorder, and panic disorder on measures of DSM-IV mental disorders, as well as validated measures of disability, distress, suicidal ideation, perceived need for mental health treatment, and mental health service use. Lifetime exposure to combat operations, witnessing of atrocities, and deployments were also assessed. Panic disorder and panic attacks were common in the military population, with past-year prevalence estimates of 1.8% and 7.0%, respectively. Both panic disorder and panic attacks were associated with increased odds of all mental disorders assessed, suicidal ideation, 2-week disability, and distress. Perceived need for mental health treatment and service use were common in individuals with panic attacks and panic disorder (perceived need: 46.3% for panic attacks, 89.6% for panic disorder; service use: 32.5% for panic attacks, 74.5% for panic disorder). Panic attacks and panic disorder in the military are associated with outcomes that could be detrimental to well-being and work performance, and early detection of panic in this population could help reduce these negative outcomes. © Copyright 2011 Physicians Postgraduate Press, Inc.

  12. Fourth High Alpha Conference, volume 1

    NASA Technical Reports Server (NTRS)

    1994-01-01

    The goal of the Fourth High Alpha Conference was to focus on the flight validation of high angle-of-attack technologies and provide an in-depth review of the latest high angle-of-attack activities. Areas that were covered include: high angle-of-attack aerodynamics, propulsion and inlet dynamics, thrust vectoring, control laws and handling qualities, tactical utility, and forebody controls.

  13. Estimating the probability of mountain pine beetle red-attack damage

    Treesearch

    Michael A Wulder; J. C. White; Barbara J Bentz; M. F. Alvarez; N. C. Coops

    2006-01-01

    Accurate spatial information on the location and extent of mountain pine beetle infestation is critical for the planning of mitigation and treatment activities. Areas of mixed forest and variable terrain present unique challenges for the detection and mapping of mountain pine beetle red-attack damage, as red-attack has a more heterogeneous distribution under these...

  14. Scalable control of mounting and attack by Esr1+ neurons in the ventromedial hypothalamus.

    PubMed

    Lee, Hyosang; Kim, Dong-Wook; Remedios, Ryan; Anthony, Todd E; Chang, Angela; Madisen, Linda; Zeng, Hongkui; Anderson, David J

    2014-05-29

    Social behaviours, such as aggression or mating, proceed through a series of appetitive and consummatory phases that are associated with increasing levels of arousal. How such escalation is encoded in the brain, and linked to behavioural action selection, remains an unsolved problem in neuroscience. The ventrolateral subdivision of the murine ventromedial hypothalamus (VMHvl) contains neurons whose activity increases during male-male and male-female social encounters. Non-cell-type-specific optogenetic activation of this region elicited attack behaviour, but not mounting. We have identified a subset of VMHvl neurons marked by the oestrogen receptor 1 (Esr1), and investigated their role in male social behaviour. Optogenetic manipulations indicated that Esr1(+) (but not Esr1(-)) neurons are sufficient to initiate attack, and that their activity is continuously required during ongoing agonistic behaviour. Surprisingly, weaker optogenetic activation of these neurons promoted mounting behaviour, rather than attack, towards both males and females, as well as sniffing and close investigation. Increasing photostimulation intensity could promote a transition from close investigation and mounting to attack, within a single social encounter. Importantly, time-resolved optogenetic inhibition experiments revealed requirements for Esr1(+) neurons in both the appetitive (investigative) and the consummatory phases of social interactions. Combined optogenetic activation and calcium imaging experiments in vitro, as well as c-Fos analysis in vivo, indicated that increasing photostimulation intensity increases both the number of active neurons and the average level of activity per neuron. These data suggest that Esr1(+) neurons in VMHvl control the progression of a social encounter from its appetitive through its consummatory phases, in a scalable manner that reflects the number or type of active neurons in the population.

  15. Scalable Control of Mounting and Attack by ESR1+ Neurons in the Ventromedial Hypothalamus

    PubMed Central

    Lee, Hyosang; Kim, Dong-Wook; Remedios, Ryan; Anthony, Todd E.; Chang, Angela; Madisen, Linda; Zeng, Hongkui; Anderson, David J.

    2014-01-01

    Social behaviors, such as aggression or mating, proceed through a series of appetitive and consummatory phases1 that are associated with increasing levels of arousal2. How such escalation is encoded in the brain, and linked to behavioral action selection, remains an important unsolved problem in neuroscience. The ventrolateral subdivision of the murine ventromedial hypothalamus (VMHvl) contains neurons whose activity increases during male-male and male-female social encounters. Non-cell type-specific optogenetic activation of this region elicited attack behavior, but not mounting3. We have identified a subset of VMHvl neurons marked by the estrogen receptor 1 (Esr1), and investigated their role in male social behavior. Optogenetic manipulations indicated that Esr1+ (but not Esr1-) neurons are sufficient to initiate attack, and that their activity is continuously required during ongoing agonistic behavior. Surprisingly, weaker optogenetic activation of these neurons promoted mounting behavior, rather than attack, towards both males and females, as well as sniffing and close investigation (CI). Increasing photostimulation intensity could promote a transition from CI and mounting to attack, within a single social encounter. Importantly, time-resolved optogenetic inhibition experiments revealed requirements for Esr1+ neurons in both the appetitive (investigative) and the consummatory phases of social interactions. Combined optogenetic activation and calcium imaging experiments in vitro, as well as c-Fos analysis in vivo, indicated that increasing photostimulation intensity increases both the number of active neurons and the average level of activity per neuron. These data suggest that Esr1+ neurons in VMHvl control the progression of a social encounter from its appetitive through its consummatory phases, in a scalable manner that reflects the number or type of active neurons in the population. PMID:24739975

  16. SFTP: A Secure and Fault-Tolerant Paradigm against Blackhole Attack in MANET

    NASA Astrophysics Data System (ADS)

    KumarRout, Jitendra; Kumar Bhoi, Sourav; Kumar Panda, Sanjaya

    2013-02-01

    Security issues in MANET are a challenging task nowadays. MANETs are vulnerable to passive attacks and active attacks because of a limited number of resources and lack of centralized authority. Blackhole attack is an attack in network layer which degrade the network performance by dropping the packets. In this paper, we have proposed a Secure Fault-Tolerant Paradigm (SFTP) which checks the Blackhole attack in the network. The three phases used in SFTP algorithm are designing of coverage area to find the area of coverage, Network Connection algorithm to design a fault-tolerant model and Route Discovery algorithm to discover the route and data delivery from source to destination. SFTP gives better network performance by making the network fault free.

  17. Attacks on Bluetooth Security Architecture and Its Countermeasures

    NASA Astrophysics Data System (ADS)

    Iqbal, Mian Muhammad Waseem; Kausar, Firdous; Wahla, Muhammad Arif

    WPANs compliment the traditional IEEE 802.11 wireless networks by facilitating the clients with flexibility in network topologies, higher mobility and relaxed configuration/hardware requirements. Bluetooth, a WPAN technology, is an open standard for short-range radio frequency (RF) communication. However, it is also susceptible to typical security threats found in wireless LANs. This paper discuses some of the attack scenarios against the bluetooth network such as hostile intrusion, active Man-in-the-Middle (MITM) attack using unit key and various forms of denial of service (DoS) attacks. These threats and attacks compromise the confidentiality and availability of bluetooth data and services. This paper proposes an improved security architecture for bluetooth device which provides protection against the above mentioned attacks.

  18. Design and implementation of dynamic hybrid Honeypot network

    NASA Astrophysics Data System (ADS)

    Qiao, Peili; Hu, Shan-Shan; Zhai, Ji-Qiang

    2013-05-01

    The method of constructing a dynamic and self-adaptive virtual network is suggested to puzzle adversaries, delay and divert attacks, exhaust attacker resources and collect attacking information. The concepts of Honeypot and Honeyd, which is the frame of virtual Honeypot are introduced. The techniques of network scanning including active fingerprint recognition are analyzed. Dynamic virtual network system is designed and implemented. A virtual network similar to real network topology is built according to the collected messages from real environments in this system. By doing this, the system can perplex the attackers when Hackers attack and can further analyze and research the attacks. The tests to this system prove that this design can successfully simulate real network environment and can be used in network security analysis.

  19. Sweet smells prepare plants for future stress: airborne induction of plant disease immunity.

    PubMed

    Yi, Hwe-Su; Ryu, Choong-Min; Heil, Martin

    2010-05-01

    Plants require protection against a wide range of attackers such as insects and pathogens. The adequate plant defense responses are regulated via sophisticated signal cascades, which are activated following the perception of specific cues of the attackers. Plants might, however, gain a significant fitness advantage when pre-empting enemy attack before it actually occurs. Monitoring cues from attacked neighbors can permit plants to reach this goal. We have recently found airborne disease resistance against a bacterial pathogen in uninfected lima bean plants when these were located close to conspecific, resistance-expressing neighbors. The emitters could be chemically induced with benzothiadiazole or biologically with an avirulent pathogen. Unexpectedly, receiver plants, although expressing a functioning resistance, did not show reduced growth rates, which represent a common side-effect of directly induced pathogen resistance. Nonanal was identified as an active volatile and, rather than directly inducing full resistance, primed defense gene expression, which became fully activated only when the plants were subsequently challenged by a virulent pathogen. Priming by airborne signals allows for a more efficient and less costly preparation of plants for future attack and airborne signaling can affect resistance against both major groups of plant enemies: herbivores and pathogens.

  20. Tacrolimus

    MedlinePlus

    ... rejection (attack of a transplanted organ by the immune system of a person receiving the organ) in people ... It works by decreasing the activity of the immune system to prevent it from attacking the transplanted organ.

  1. The ATPG Attack for Reverse Engineering of Combinational Hybrid Custom-Programmable Circuits

    DTIC Science & Technology

    2017-03-23

    The ATPG Attack for Reverse Engineering of Combinational Hybrid Custom- Programmable Circuits Raza Shafiq Hamid Mahmoodi Houman Homayoun Hassan... programmable circuits. While functionality of programmable cells are only known to trusted parties, effective techniques for activation and propagation...of the cells are introduced. The ATPG attack carefully studies dependency of programmable cells to develop their (partial) truth tables. Results

  2. Fourth High Alpha Conference, volume 3

    NASA Technical Reports Server (NTRS)

    1994-01-01

    Thie goal of this conference was to focus on the flight validation of high-angle-of-attack technologies and provide an in-depth review of the latest high-angle-of-attack activities. Areas covered include: (1) high-angle-of-attack aerodynamics; (2) propulsion and inlet dynamics; (3) thrust vectoring; (4) control laws and handling qualities; (5) tactical utility; and (6) forebody controls.

  3. Belatacept Injection

    MedlinePlus

    ... rejection (attack of a transplanted organ by the immune system of a person receiving the organ) of kidney ... It works by decreasing the activity of the immune system to prevent it from attacking the transplanted kidney.

  4. Basiliximab Injection

    MedlinePlus

    ... rejection (attack of the transplanted organ by the immune system of the person receiving the organ) in people ... works by decreasing the activity of the body's immune system so it will not attack the transplanted organ.

  5. Using Unix system auditing for detecting network intrusions

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Christensen, M.J.

    1993-03-01

    Intrusion Detection Systems (IDSs) are designed to detect actions of individuals who use computer resources without authorization as well as legitimate users who exceed their privileges. This paper describes a novel approach to IDS research, namely a decision aiding approach to intrusion detection. The introduction of a decision tree represents the logical steps necessary to distinguish and identify different types of attacks. This tool, the Intrusion Decision Aiding Tool (IDAT), utilizes IDS-based attack models and standard Unix audit data. Since attacks have certain characteristics and are based on already developed signature attack models, experienced and knowledgeable Unix system administrators knowmore » what to look for in system audit logs to determine if a system has been attacked. Others, however, are usually less able to recognize common signatures of unauthorized access. Users can traverse the tree using available audit data displayed by IDAT and general knowledge they possess to reach a conclusion regarding suspicious activity. IDAT is an easy-to-use window based application that gathers, analyzes, and displays pertinent system data according to Unix attack characteristics. IDAT offers a more practical approach and allows the user to make an informed decision regarding suspicious activity.« less

  6. Panic Attack or Heart Attack?

    MedlinePlus

    ... disease affects your heart's muscle, blood vessels, and electrical system and is the leading cause of death ... An electrocardiogram (EKG or ECG) measures your heart's electrical activity by placing small electrodes on your chest, ...

  7. Design and Analysis of an Enhanced Patient-Server Mutual Authentication Protocol for Telecare Medical Information System.

    PubMed

    Amin, Ruhul; Islam, S K Hafizul; Biswas, G P; Khan, Muhammad Khurram; Obaidat, Mohammad S

    2015-11-01

    In order to access remote medical server, generally the patients utilize smart card to login to the server. It has been observed that most of the user (patient) authentication protocols suffer from smart card stolen attack that means the attacker can mount several common attacks after extracting smart card information. Recently, Lu et al.'s proposes a session key agreement protocol between the patient and remote medical server and claims that the same protocol is secure against relevant security attacks. However, this paper presents several security attacks on Lu et al.'s protocol such as identity trace attack, new smart card issue attack, patient impersonation attack and medical server impersonation attack. In order to fix the mentioned security pitfalls including smart card stolen attack, this paper proposes an efficient remote mutual authentication protocol using smart card. We have then simulated the proposed protocol using widely-accepted AVISPA simulation tool whose results make certain that the same protocol is secure against active and passive attacks including replay and man-in-the-middle attacks. Moreover, the rigorous security analysis proves that the proposed protocol provides strong security protection on the relevant security attacks including smart card stolen attack. We compare the proposed scheme with several related schemes in terms of computation cost and communication cost as well as security functionalities. It has been observed that the proposed scheme is comparatively better than related existing schemes.

  8. Muscular imbalance and shoulder pain in volleyball attackers.

    PubMed Central

    Kugler, A; Krüger-Franke, M; Reininger, S; Trouillier, H H; Rosemeyer, B

    1996-01-01

    OBJECTIVE: In overhead sports such as volleyball, baseball, or tennis shoulder problems are very common. The aim of this study was to identify features which may correlate with shoulder problems in volleyball attackers. METHODS: 30 competitive volleyball attackers (mean age 25 years) were included in the study; 15 were suffering from shoulder pain and 15 had no history of shoulder pain. The results were compared with those of a control group of 15 recreational athletes without any overhead sports activities. RESULTS: Volleyball attackers have a different muscular and capsular pattern at the playing shoulder compared to the opposite shoulder. Their playing shoulder is depressed, the scapula lateralised, and the dorsal muscles and the posterior and inferior part of the shoulder capsule shortened. These differences were of more significance in volleyball attackers with shoulder pain than in volleyball players without shoulder pain. In contrast to recreational athletes without any overhead sports activity, there were no significant difference in the comparison of the two shoulders. The histories, clinical and sonographic findings did not reveal further typical features for volleyball attackers with shoulder pain. CONCLUSIONS: Muscular balance of the shoulder girdle is very important in this sport. It is therefore imperative to include adequate stretching and muscular training programme for the prevention, as well as for therapy, of shoulder pain in volleyball attackers. Images Figure 1 Figure 2 Figure 3 Figure 4 Figure 5 PMID:8889124

  9. Automatic analysis of attack data from distributed honeypot network

    NASA Astrophysics Data System (ADS)

    Safarik, Jakub; Voznak, MIroslav; Rezac, Filip; Partila, Pavol; Tomala, Karel

    2013-05-01

    There are many ways of getting real data about malicious activity in a network. One of them relies on masquerading monitoring servers as a production one. These servers are called honeypots and data about attacks on them brings us valuable information about actual attacks and techniques used by hackers. The article describes distributed topology of honeypots, which was developed with a strong orientation on monitoring of IP telephony traffic. IP telephony servers can be easily exposed to various types of attacks, and without protection, this situation can lead to loss of money and other unpleasant consequences. Using a distributed topology with honeypots placed in different geological locations and networks provides more valuable and independent results. With automatic system of gathering information from all honeypots, it is possible to work with all information on one centralized point. Communication between honeypots and centralized data store use secure SSH tunnels and server communicates only with authorized honeypots. The centralized server also automatically analyses data from each honeypot. Results of this analysis and also other statistical data about malicious activity are simply accessible through a built-in web server. All statistical and analysis reports serve as information basis for an algorithm which classifies different types of used VoIP attacks. The web interface then brings a tool for quick comparison and evaluation of actual attacks in all monitored networks. The article describes both, the honeypots nodes in distributed architecture, which monitor suspicious activity, and also methods and algorithms used on the server side for analysis of gathered data.

  10. Triggers of acute attacks of gout, does age of gout onset matter? A primary care based cross-sectional study.

    PubMed

    Abhishek, Abhishek; Valdes, Ana M; Jenkins, Wendy; Zhang, Weiya; Doherty, Michael

    2017-01-01

    To determine the proportion of people with gout who self-report triggers of acute attacks; identify the commonly reported triggers, and examine the disease and demographic features associated with self-reporting any trigger(s) of acute attacks of gout. Individuals with gout were asked to fill a questionnaire enquiring about triggers that precipitated their acute gout attacks. Binary logistic regression was used to compute odds ratio (OR) and 95% confidence intervals (CI) to examine the association between having ≥1 self-reported trigger of acute gout and disease and demographic risk factors and to adjust for covariates. All statistical analyses were performed using STATA. 550 participants returned completed questionnaires. 206 (37.5%) reported at least one trigger of acute attacks, and less than 5% reported >2 triggers. Only 28.73% participants reported that their most recent gout attack was triggered by dietary or lifestyle risk factors. The most frequently self-reported triggers were alcohol intake (14.18%), red-meat or sea-food consumption (6%), dehydration (4.91%), injury or excess activity (4.91%), and excessively warm or cold weather (4.36% and 5.45%). Patients who had onset of gout before the age of 50 years were significantly more likely to identify a trigger for precipitating their acute gout attacks (aOR (95%CI) 1.73 (1.12-2.68) after adjusting for covariates. Most people with gout do not identify any triggers for acute attacks, and identifiable triggers are more common in those with young onset gout. Less than 20% people self-reported acute gout attacks from conventionally accepted triggers of gout e.g. alcohol, red-meat intake, while c.5% reported novel triggers such as dehydration, injury or physical activity, and weather extremes.

  11. Triggers of acute attacks of gout, does age of gout onset matter? A primary care based cross-sectional study

    PubMed Central

    Valdes, Ana M.; Jenkins, Wendy; Zhang, Weiya; Doherty, Michael

    2017-01-01

    Objectives To determine the proportion of people with gout who self-report triggers of acute attacks; identify the commonly reported triggers, and examine the disease and demographic features associated with self-reporting any trigger(s) of acute attacks of gout. Methods Individuals with gout were asked to fill a questionnaire enquiring about triggers that precipitated their acute gout attacks. Binary logistic regression was used to compute odds ratio (OR) and 95% confidence intervals (CI) to examine the association between having ≥1 self-reported trigger of acute gout and disease and demographic risk factors and to adjust for covariates. All statistical analyses were performed using STATA. Results 550 participants returned completed questionnaires. 206 (37.5%) reported at least one trigger of acute attacks, and less than 5% reported >2 triggers. Only 28.73% participants reported that their most recent gout attack was triggered by dietary or lifestyle risk factors. The most frequently self-reported triggers were alcohol intake (14.18%), red-meat or sea-food consumption (6%), dehydration (4.91%), injury or excess activity (4.91%), and excessively warm or cold weather (4.36% and 5.45%). Patients who had onset of gout before the age of 50 years were significantly more likely to identify a trigger for precipitating their acute gout attacks (aOR (95%CI) 1.73 (1.12–2.68) after adjusting for covariates. Conclusion Most people with gout do not identify any triggers for acute attacks, and identifiable triggers are more common in those with young onset gout. Less than 20% people self-reported acute gout attacks from conventionally accepted triggers of gout e.g. alcohol, red-meat intake, while c.5% reported novel triggers such as dehydration, injury or physical activity, and weather extremes. PMID:29023487

  12. 75 FR 38947 - Airworthiness Directives; Airbus Model A330-200 and A330-300 Series Airplanes, and Model A340-200...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-07

    ... the stator and the rotor parts of the AoA [angle of attack] vane position resolvers. This oil residue... extent, it could lead to a late activation of the angle of attack protection, which in combination with light at high angle of attack would constitute an unsafe condition. The proposed AD would require...

  13. Serial agonistic attacks by greylag goose families, Anser anser, against the same opponent

    PubMed Central

    Scheiber, Isabella B.R.; Kotrschal, Kurt; Weiß, Brigitte M.

    2011-01-01

    It is known from primates that alliance partners may support each other’s interests in competition with others, for example, through repeated agonistic attacks against a particular individual. We examined serial aggressive interactions between greylag goose families and other flock members. We found that repeated attacks towards the same individual were common and that up to five serial attacks by family members followed an initial attack. Family size did not affect the frequency of such serial attacks. Juvenile geese evidently benefited most from active social support through serial attacks. About 60% of the juveniles’ lost primary interactions were subsequently reversed by another family member. This may be one of the reasons why juveniles rank higher in the social hierarchy than would be expected from their age and size alone. Losses in serial attacks predominantly occurred against other, presumably higher-ranking, family geese and ganders. We propose three major functions/consequences of serial attacks. Analogous to primates, serial attacks in greylag geese may serve to reinforce a losing experience of an opponent defeated in a preceding attack. On the side of the winning family, serial attacks may reinforce the experience of winning. Both winning and losing experiences are linked with physiological consequences in higher vertebrates, affecting the future social performance of winners or losers. Finally, serial attacks may signal the agonistic potential of a family to other flock members. This is supported by heart rate data, which indicate that greylags are competent to interpret third-party relationships. PMID:21984838

  14. The relationship between levels of plasma-soluble urokinase plasminogen activator receptor (suPAR) and presence of migraine attack and aura.

    PubMed

    Yılmaz, Nigar; Yılmaz, Mustafa; Sirin, Burcu; Yılmaztekin, Sureyya; Kutlu, Gülnihal

    2017-10-01

    Migraine is one of the most common types of pain associated with sterile inflammatory conditions. Soluble urokinase plasminogen activator receptor (suPAR) is a potential novel inflammatory marker. We aim to determine the association between serum values of suPAR, procalcitonin, fibrinogen, and high-sensitivity C-reactive protein (hs-CRP) and migraine disease characteristics. The study involved a total of 60 migraine patients (33 patients in the interictal period, 27 patients in the attack period) and 30 healthy individuals. The serum values of suPAR were found to be significantly higher in migraine patients in the attack period than in migraine patients in the interictal period, and in healthy individuals (p < .01 for both). In addition, levels of suPAR were determined to be higher in migraine with aura patients than in migraine without aura patients. When we subdivided migraine patients according to frequency of attack (attacks/month), significant differences were found between the suPAR and procalcitonin levels (measured during the attack period) of those in the frequent-attack group (4-5 or more) versus those in the less frequent attack group (less than 4). Serum levels of procalcitonin were shown to be significantly higher in migraine patients during the attack period compared with migraine patients in the interictal period and in control subjects (p = .001 for both). Significant differences were found between plasma levels of fibrinogen in migraine patients versus control subjects (p < .01). No statistically significant difference was found between levels of hs-CRP in migraine patients versus the control group. These findings may show that presenting a high level of suPAR in migraine patients with attack and aura results to predisposition to occurring on the symptoms and that high levels of suPAR, procalcitonin and fibrinogen in patients with migraine result in neurogenic inflammation during migraine headaches.

  15. Impulsive artistic creativity as a presentation of transient cognitive alterations.

    PubMed

    Finkelstein, Y; Vardi, J; Hod, I

    1991-01-01

    A 27-year-old right-handed male mosaic artisan who had not shown any interest in drawing or artistic activity was admitted to the Department of Neurology for attacks of bizarre behavior and convulsive disorder. The patient reported feeling "waves" engulfing him during the attacks, leaving him floating helplessly. During some attacks, the patient impulsively initiated drawing activity. Interictal sleep-deprivation EEG showed a left frontotemporal focus of paroxysmal discharge. Brain tomography with SPECT showed low 99Tc-HMPAO uptake in the left frontoparietal region. Psychodiagnostic tests gave evidence of dysfunction of the left frontal region, with preference of the right hemisphere. It is suggested that the attacks of altered cognitive state were, in this case, provoked by spreading depression of the left hemisphere, while the integrative functions of the right hemisphere remained intact. Thus, the impulsive artistic creativity during the attacks may represent a "release phenomenon" of the complex visuospatial skills of the right (subdominant) hemisphere. This symptomatology of transient cognitive alterations is unique and, to the best of our knowledge, has not been previously reported.

  16. The dislocations of terror: Assessments of risk during the Second Intifada.

    PubMed

    Spilerman, Seymour; Stecklov, Guy

    2013-05-01

    The goal of terrorism is to create havoc and disrupt the normal functioning of society. To understand the impact of terrorism on a country it is useful to consider two types of country experiences with these shocks to the social order-the instance of a very small number of attacks against high profile targets and the case of chronic terror with a great number of attacks, generally against targets that are part of routine daily activities. The present study explores the Israeli experience with chronic terror. Using expenditure information from coffee shops and restaurants we examine how individuals assess their vulnerability to an attack and adjust their behavior. Specifically, we explore whether distance from the site of an attack, and similarity of a contemplated undertaking to the target of a recent attack, influence decision making in a context of chronic terror. We find strong support for a situational similarity effect but only weak evidence for a proximity effect. We examine the implications of these findings for the organization of economic activity. Copyright © 2012 Elsevier Inc. All rights reserved.

  17. Shark attack-related injuries: Epidemiology and implications for plastic surgeons.

    PubMed

    Ricci, Joseph A; Vargas, Christina R; Singhal, Dhruv; Lee, Bernard T

    2016-01-01

    The increased media attention to shark attacks has led to a heightened fear and public awareness. Although few sharks are considered dangerous, attacks on humans can result in large soft tissue defects necessitating the intervention of reconstructive surgeons. This study aims to evaluate and describe the characteristics of shark-related injuries in order to improve treatment. The Global Shark Accident File, maintained by the Shark Research Institute (Princeton, NJ, USA), is a compilation of all known worldwide shark attacks. Database records since the 1900s were reviewed to identify differences between fatal and nonfatal attacks, including: geography, injury pattern, shark species, and victim activity. Since the 1900s, there have been 5034 reported shark attacks, of which 1205 (22.7%) were fatal. Although the incidence of attacks per decade has increased, the percentage of fatalities has decreased. Characteristics of fatal attacks included swimming (p = 0.001), boating (p = 0.001), three or more bite sites (p = 0.03), limb loss (p = 0.001), or tiger shark attack (p = 0.002). The most common attacks were bites to the legs (41.8%) or arms (18.4%), with limb loss occurring in 7% of attacks. Geographically, the majority of attacks occurred in North America (36.7%) and Australia (26.5%). Most attacks in the USA occurred in Florida (49.1%) and California (13.6%). Although rare, shark attacks result in devastating injuries to patients. As these injuries often involve multiple sites and limb loss, this creates a significant challenge for reconstructive surgeons. Proper identification of the characteristics of the attack can aid in providing optimal care for those affected. Copyright © 2015 British Association of Plastic, Reconstructive and Aesthetic Surgeons. Published by Elsevier Ltd. All rights reserved.

  18. Fourth High Alpha Conference, volume 2

    NASA Technical Reports Server (NTRS)

    1994-01-01

    The goal of the Fourth High Alpha Conference, held at the NASA Dryden Flight Research Center on July 12-14, 1994, was to focus on the flight validation of high angle of attack technologies and provide an in-depth review of the latest high angle of attack activities. Areas that were covered include high angle of attack aerodynamics, propulsion and inlet dynamics, thrust vectoring, control laws and handling qualities, and tactical utility.

  19. A neural network for intermale aggression to establish social hierarchy.

    PubMed

    Stagkourakis, Stefanos; Spigolon, Giada; Williams, Paul; Protzmann, Jil; Fisone, Gilberto; Broberger, Christian

    2018-06-01

    Intermale aggression is used to establish social rank. Several neuronal populations have been implicated in aggression, but the circuit mechanisms that shape this innate behavior and coordinate its different components (including attack execution and reward) remain elusive. We show that dopamine transporter-expressing neurons in the hypothalamic ventral premammillary nucleus (PMv DAT neurons) organize goal-oriented aggression in male mice. Activation of PMv DAT neurons triggers attack behavior; silencing these neurons interrupts attacks. Regenerative PMv DAT membrane conductances interacting with recurrent and reciprocal excitation explain how a brief trigger can elicit a long-lasting response (hysteresis). PMv DAT projections to the ventrolateral part of the ventromedial hypothalamic and the supramammillary nuclei control attack execution and aggression reward, respectively. Brief manipulation of PMv DAT activity switched the dominance relationship between males, an effect persisting for weeks. These results identify a network structure anchored in PMv DAT neurons that organizes aggressive behavior and, as a consequence, determines intermale hierarchy.

  20. Muscarine- and carbachol-induced aggressions: fear and irritable kinds of aggressions.

    PubMed

    Beleslin, D B; Samardzić, R

    1977-12-28

    In unaneasthetized and unrestrained cats, muscarine and carbachol were injected into the cerebral ventricles. The kind of aggressive behaviour depended on the cholinomimetic drug and was classified as fear and an irritable kind of aggression. Muscarine induced the fear kind of aggression. The aggressive behaviour was usually preceded by attempts to escape and the attack was relevant to the situation. For the attack the presence of some threatening agent was needed. The aggression was accompanied by intense motor but less autonomic activation. On the other hand, carbachol induced an irritable kind of aggression and had the following characteristics: for the attack the presence of some threatening agent was not needed; the attack was not relevant to the situation; the aggression was not preceded by attempts to escape; and the aggressive behaviour was accompanied by intense motor and autonomic activation. It is concluded that cholinoceptive mechanisms are involved in the control of aggressive behaviour.

  1. A Cyber-Attack Detection Model Based on Multivariate Analyses

    NASA Astrophysics Data System (ADS)

    Sakai, Yuto; Rinsaka, Koichiro; Dohi, Tadashi

    In the present paper, we propose a novel cyber-attack detection model based on two multivariate-analysis methods to the audit data observed on a host machine. The statistical techniques used here are the well-known Hayashi's quantification method IV and cluster analysis method. We quantify the observed qualitative audit event sequence via the quantification method IV, and collect similar audit event sequence in the same groups based on the cluster analysis. It is shown in simulation experiments that our model can improve the cyber-attack detection accuracy in some realistic cases where both normal and attack activities are intermingled.

  2. Recurrence of Panic Attacks after Influenza Vaccination: Two Case Reports.

    PubMed

    Kim, Han-Joon; Jeon, Sang-Won; Yoon, Ho-Kyoung

    2016-11-30

    Human influenza is a contagious respiratory illness caused by the influenza virus. The influenza vaccination is recommended annually, but several adverse effects related to allergic reactions have been reported. Panic attacks are also known to occur, but no case of a panic attack adverse effect has been reported in South Korea. We present two cases of panic disorder patients whose symptoms were aggravated by the influenza vaccination. We assumed that dysregulation of T-lymphocytes in panic disorder patients could have a role in activating various kinds of cytokines and chemokines, which then can lead to panic attack aggravation.

  3. The framework for simulation of bioinspired security mechanisms against network infrastructure attacks.

    PubMed

    Shorov, Andrey; Kotenko, Igor

    2014-01-01

    The paper outlines a bioinspired approach named "network nervous system" and methods of simulation of infrastructure attacks and protection mechanisms based on this approach. The protection mechanisms based on this approach consist of distributed procedures of information collection and processing, which coordinate the activities of the main devices of a computer network, identify attacks, and determine necessary countermeasures. Attacks and protection mechanisms are specified as structural models using a set-theoretic approach. An environment for simulation of protection mechanisms based on the biological metaphor is considered; the experiments demonstrating the effectiveness of the protection mechanisms are described.

  4. Towards an integrated defense system for cyber security situation awareness experiment

    NASA Astrophysics Data System (ADS)

    Zhang, Hanlin; Wei, Sixiao; Ge, Linqiang; Shen, Dan; Yu, Wei; Blasch, Erik P.; Pham, Khanh D.; Chen, Genshe

    2015-05-01

    In this paper, an implemented defense system is demonstrated to carry out cyber security situation awareness. The developed system consists of distributed passive and active network sensors designed to effectively capture suspicious information associated with cyber threats, effective detection schemes to accurately distinguish attacks, and network actors to rapidly mitigate attacks. Based on the collected data from network sensors, image-based and signals-based detection schemes are implemented to detect attacks. To further mitigate attacks, deployed dynamic firewalls on hosts dynamically update detection information reported from the detection schemes and block attacks. The experimental results show the effectiveness of the proposed system. A future plan to design an effective defense system is also discussed based on system theory.

  5. Function and activity classification in network traffic data: existing methods, their weaknesses, and a path forward

    NASA Astrophysics Data System (ADS)

    Levchuk, Georgiy

    2016-05-01

    The cyber spaces are increasingly becoming the battlefields between friendly and adversary forces, with normal users caught in the middle. Accordingly, planners of enterprise defensive policies and offensive cyber missions alike have an essential goal to minimize the impact of their own actions and adversaries' attacks on normal operations of the commercial and government networks. To do this, the cyber analysis need accurate "cyber battle maps", where the functions, roles, and activities of individual and groups of devices and users are accurately identified. Most of the research in cyber exploitation has focused on the identification of attacks, attackers, and their devices. Many tools exist for device profiling, malware identification, user attribution, and attack analysis. However, most of the tools are intrusive, sensitive to data obfuscation, or provide anomaly flagging and not able to correctly classify the semantics and causes of network activities. In this paper, we review existing solutions that can identify functional and social roles of entities in cyberspace, discuss their weaknesses, and propose an approach for developing functional and social layers of cyber battle maps.

  6. Using the Domain Name System to Thwart Automated Client-Based Attacks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Taylor, Curtis R; Shue, Craig A

    2011-09-01

    On the Internet, attackers can compromise systems owned by other people and then use these systems to launch attacks automatically. When attacks such as phishing or SQL injections are successful, they can have negative consequences including server downtime and the loss of sensitive information. Current methods to prevent such attacks are limited in that they are application-specific, or fail to block attackers. Phishing attempts can be stopped with email filters, but if the attacker manages to successfully bypass these filters, then the user must determine if the email is legitimate or not. Unfortunately, they often are unable to do so.more » Since attackers have a low success rate, they attempt to compensate for it in volume. In order to have this high throughput, attackers take shortcuts and break protocols. We use this knowledge to address these issues by implementing a system that can detect malicious activity and use it to block attacks. If the client fails to follow proper procedure, they can be classified as an attacker. Once an attacker has been discovered, they will be isolated and monitored. This can be accomplished using existing software in Ubuntu Linux applications, along with our custom wrapper application. After running the system and seeing its performance on three popular Web browsers Chromium, Firefox and Internet Explorer as well as two popular email clients, Thunderbird and Evolution, we found that not only is this system conceivable, it is effective and has low overhead.« less

  7. Similarities and Differences in Patterns and Geolocation of SSH Attack Data

    DTIC Science & Technology

    2015-09-01

    failed inputs. ..................................................................................14  Figure 7.  Latest “ passwd ” commands entered by...also has fake file contents to allow an attacker to “cat” files like /etc/ passwd [12]. Kippo saves all downloaded files for later inspection. The...overall post-compromise activity, human activity inside the honeypot, top 10 inputs (overall), top 10 successful inputs, top 10 failed inputs, passwd

  8. Sympathetic activity in patients with panic disorder at rest, under laboratory mental stress, and during panic attacks.

    PubMed

    Wilkinson, D J; Thompson, J M; Lambert, G W; Jennings, G L; Schwarz, R G; Jefferys, D; Turner, A G; Esler, M D

    1998-06-01

    The sympathetic nervous system has long been believed to be involved in the pathogenesis of panic disorder, but studies to date, most using peripheral venous catecholamine measurements, have yielded conflicting and equivocal results. We tested sympathetic nervous function in patients with panic disorder by using more sensitive methods. Sympathetic nervous and adrenal medullary function was measured by using direct nerve recording (clinical microneurography) and whole-body and cardiac catecholamine kinetics in 13 patients with panic disorder as defined by the DSM-IV, and 14 healthy control subjects. Measurements were made at rest, during laboratory stress (forced mental arithmetic), and, for 4 patients, during panic attacks occurring spontaneously in the laboratory setting. Muscle sympathetic activity, arterial plasma concentration of norepinephrine, and the total and cardiac norepinephrine spillover rates to plasma were similar in patients and control subjects at rest, as was whole-body epinephrine secretion. Epinephrine spillover from the heart was elevated in patients with panic disorder (P=.01). Responses to laboratory mental stress were almost identical in patient and control groups. During panic attacks, there were marked increases in epinephrine secretion and large increases in the sympathetic activity in muscle in 2 patients but smaller changes in the total norepinephrine spillover to plasma. Whole-body and regional sympathetic nervous activity are not elevated at rest in patients with panic disorder. Epinephrine is released from the heart at rest in patients with panic disorder, possibly due to loading of cardiac neuronal stores by uptake from plasma during surges of epinephrine secretion in panic attacks. Contrary to popular belief, the sympathetic nervous system is not globally activated during panic attacks.

  9. Posttraumatic stress disorder, depression, and perceived safety 13 months after September 11.

    PubMed

    Grieger, Thomas A; Fullerton, Carol S; Ursano, Robert J

    2004-09-01

    This study assessed relationships between exposure to the September 11, 2001, terrorist attack, current posttraumatic stress disorder (PTSD), current major depression, and current safety perceptions in a sample of 212 Pentagon staff members 13 months after the attack. Forty-eight respondents (23 percent) had possible PTSD; eight (4 percent) had probable major depression. Respondents who were directly exposed to the attack were more likely to have PTSD and major depression and were less likely to have a perception of safety at work and in usual activities and travel only. In contrast, respondents with PTSD reported a lower perception of safety at home, at work, and in usual activities and travel.

  10. Distress of Routine Activities and Perceived Safety Associated with Post-Traumatic Stress, Depression, and Alcohol Use: 2002 Washington, DC, Sniper Attacks.

    PubMed

    Fullerton, Carol S; Herberman Mash, Holly B; Benevides, K Nikki; Morganstein, Joshua C; Ursano, Robert J

    2015-10-01

    For over 3 weeks in October 2002, a series of sniper attacks in the Washington, DC, area left 10 people dead and 3 wounded. This study examined the relationship of distress associated with routine activities and perceived safety to psychological and behavioral responses. Participants were 1238 residents of the Washington, DC, metropolitan area (aged 18 to 90 years, mean=41.7 years) who completed an Internet survey including the Impact of Event Scale-Revised, Patient Health Questionnaire-9, and items pertaining to distress related to routine activities, perceived safety, and alcohol use. Data were collected at one time point approximately 3 weeks after the first sniper shooting and before apprehension of the suspects. Relationships of distress and perceived safety to post-traumatic stress, depressive symptoms, and increased alcohol use were examined by using linear and logistic regression analyses. Approximately 8% of the participants met the symptom criteria for probable post-traumatic stress disorder, 22% reported mild to severe depression, and 4% reported increased alcohol use during the attacks. Distress related to routine activities and perceived safety were associated with increased post-traumatic stress and depressive symptoms and alcohol use. Distress and perceived safety are associated with specific routine activities and both contribute to psychological and behavioral responses during a terrorist attack. These findings have implications for targeted information dissemination and risk communication by community leaders.

  11. Behavioral Strategies of Phorid Parasitoids and Responses of Their Hosts, the Leaf-Cutting Ants

    PubMed Central

    Elizalde, Luciana; Folgarait, Patricia Julia

    2012-01-01

    Host-searching and oviposition behaviors of parasitoids, and defensive responses of the hosts, are fundamental in shaping the ecology of host-parasitoid interactions. In order to uncover key behavioral features for the little known interactions between phorid parasitoids (Diptera: Phoridae) and their leaf-cutting ant hosts (Formicidae: Attini), host-related behavioral strategies (i.e., host searching and oviposition) for 13 phorid species, and host defensive responses (i.e., hitchhikers and particular body postures) for 11 ant species, were studied. Data was collected at 14 localities, one of them characterized by its high species richness for this host-parasitoid system. Phorid species showed both great variation and specificity in attacking behaviors. Some chose their hosts using either an ambush or an actively searching strategy, while some species attacked ants on different body parts, and specialized on ants performing different tasks, such as when ants were foraging, removing wastes to refuse piles, or repairing the nest. Combining all the behaviors recorded, most phorid species differed in performance in at least one, making it possible to recognize species in the field through their behavior. Phorid species that attacked hosts with greater activity levels showed overall higher attack rates, although there was no significant correlation between attack rates by most phorid species and ant activity outside the nest while parasitoids were attacking. The presence of phorids was a significant determinant for the presence of defensive behaviors by the ants. Although ant species varied in the incidence levels of these defensive behaviors, most ant species reacted against different phorids by utilizing similar behaviors, in contrast to what parasitoids do. General features of the observed phorid-ant interactions were parasitoid specialization and corresponding high interspecific variation in their behaviors, while their hosts showed generalized responses to attacks with high intraspecific variation. Behavioral patterns as well as specific features of these ant-parasitoid interactions are described, and their ecological importance discussed. PMID:23448343

  12. The Framework for Simulation of Bioinspired Security Mechanisms against Network Infrastructure Attacks

    PubMed Central

    Kotenko, Igor

    2014-01-01

    The paper outlines a bioinspired approach named “network nervous system" and methods of simulation of infrastructure attacks and protection mechanisms based on this approach. The protection mechanisms based on this approach consist of distributed prosedures of information collection and processing, which coordinate the activities of the main devices of a computer network, identify attacks, and determine nessesary countermeasures. Attacks and protection mechanisms are specified as structural models using a set-theoretic approach. An environment for simulation of protection mechanisms based on the biological metaphor is considered; the experiments demonstrating the effectiveness of the protection mechanisms are described. PMID:25254229

  13. Countermeasures for unintentional and intentional video watermarking attacks

    NASA Astrophysics Data System (ADS)

    Deguillaume, Frederic; Csurka, Gabriela; Pun, Thierry

    2000-05-01

    These last years, the rapidly growing digital multimedia market has revealed an urgent need for effective copyright protection mechanisms. Therefore, digital audio, image and video watermarking has recently become a very active area of research, as a solution to this problem. Many important issues have been pointed out, one of them being the robustness to non-intentional and intentional attacks. This paper studies some attacks and proposes countermeasures applied to videos. General attacks are lossy copying/transcoding such as MPEG compression and digital/analog (D/A) conversion, changes of frame-rate, changes of display format, and geometrical distortions. More specific attacks are sequence edition, and statistical attacks such as averaging or collusion. Averaging attack consists of averaging locally consecutive frames to cancel the watermark. This attack works well for schemes which embed random independent marks into frames. In the collusion attack the watermark is estimated from single frames (based on image denoising), and averaged over different scenes for better accuracy. The estimated watermark is then subtracted from each frame. Collusion requires that the same mark is embedded into all frames. The proposed countermeasures first ensures robustness to general attacks by spread spectrum encoding in the frequency domain and by the use of an additional template. Secondly, a Bayesian criterion, evaluating the probability of a correctly decoded watermark, is used for rejection of outliers, and to implement an algorithm against statistical attacks. The idea is to embed randomly chosen marks among a finite set of marks, into subsequences of videos which are long enough to resist averaging attacks, but short enough to avoid collusion attacks. The Bayesian criterion is needed to select the correct mark at the decoding step. Finally, the paper presents experimental results showing the robustness of the proposed method.

  14. Confronting the bomber: coping at the site of previous terror attacks.

    PubMed

    Strous, Rael D; Mishaeli, Nurit; Ranen, Yaniv; Benatov, Joy; Green, Dovid; Zivotofsky, Ari Z

    2007-03-01

    Terror exposure has become commonplace in Israel, with civilians needing to develop appropriate coping mechanisms. This study investigated coping mechanisms of those who are able to return to leisure activity at sites of previous terror attacks. A specially designed questionnaire, exploring knowledge of the terror event, previous terror exposure, coping mechanisms, state of anxiety, and mood, was administered to 93 restaurant attendees at sites of well-known recent terror attacks (2001-2005). Most respondents were aware of the previous terror attack (92.3%) and most reported no fear at revisiting (70.3%), with 20.9% reporting some anxiety and 5.5% reporting moderate or severe anxiety. Sixty percent reported that they have no fear that a terror attack will reoccur at the same place. Some (27.7%) reported change in practices or decrease in one or more activity, especially use of public transport (18%). The most helpful reported resource for facilitating stress coping following a suicide bombing was to "call or be in touch with friends or relatives," and least helpful was "medicines." Over half of respondents (53%) reported that the current security climate affected their mood. Older individuals and females were more affected by terror events. Study observations confirm that resilience develops in the general population in response to ongoing terror attacks. Response to terror is heterogeneous with a range of coping mechanisms expressed.

  15. Exposure‐Response Model of Subcutaneous C1‐Inhibitor Concentrate to Estimate the Risk of Attacks in Patients With Hereditary Angioedema

    PubMed Central

    Tortorici, Michael A.; Pawaskar, Dipti; Pragst, Ingo; Machnig, Thomas; Hutmacher, Matthew; Zuraw, Bruce; Cicardi, Marco; Craig, Timothy; Longhurst, Hilary; Sidhu, Jagdev

    2018-01-01

    Subcutaneous C1‐inhibitor (HAEGARDA, CSL Behring), is a US Food and Drug Administration (FDA)‐approved, highly concentrated formulation of a plasma‐derived C1‐esterase inhibitor (C1‐INH), which, in the phase III Clinical Studies for Optimal Management in Preventing Angioedema with Low‐Volume Subcutaneous C1‐inhibitor Replacement Therapy (COMPACT) trial, reduced the incidence of hereditary angioedema (HAE) attacks when given prophylactically. Data from the COMPACT trial were used to develop a repeated time‐to‐event model to characterize the timing and frequency of HAE attacks as a function of C1‐INH activity, and then develop an exposure–response model to assess the relationship between C1‐INH functional activity levels (C1‐INH(f)) and the risk of an attack. The C1‐INH(f) values of 33.1%, 40.3%, and 63.1% were predicted to correspond with 50%, 70%, and 90% reductions in the HAE attack risk, respectively, relative to no therapy. Based on trough C1‐INH(f) values for the 40 IU/kg (40.2%) and 60 IU/kg (48.0%) C1‐INH (SC) doses, the model predicted that 50% and 67% of the population, respectively, would see at least a 70% decrease in the risk of an attack. PMID:29316335

  16. Preemptive Striking in Individual and Group Conflict.

    PubMed

    Mifune, Nobuhiro; Hizen, Yoichi; Kamijo, Yoshio; Okano, Yoshitaka

    2016-01-01

    In this study, we conducted a laboratory experiment to assess preemptive striking by and towards individuals or groups. In the framework of a preemptive strike game, we set the following four conditions: one person faced another person, one person faced a three-person group, a three-person group faced an individual, and a three-person group faced another three-person group. Previous studies have revealed that greed is activated when participants belong to a group, while fear is activated when participants interact with a group, and further, that attacking behaviors in the preemptive strike game are driven by fear. These observations led to a hypothesis that high attack rates would be realized when participants interact with a group, regardless of whether the participants make decisions as individuals or a group. The results of our experiment, however, rejected this hypothesis. Among the four conditions, the attack rate was highest when a three-person group faced an individual. As possible reasons for our observation, we discuss the potential threat stemming from the imbalance in the effectiveness of attack between individuals and groups, and the (incorrect) belief by groups that single individuals would be more likely to attack out of fear.

  17. Preemptive Striking in Individual and Group Conflict

    PubMed Central

    Mifune, Nobuhiro; Hizen, Yoichi; Kamijo, Yoshio; Okano, Yoshitaka

    2016-01-01

    In this study, we conducted a laboratory experiment to assess preemptive striking by and towards individuals or groups. In the framework of a preemptive strike game, we set the following four conditions: one person faced another person, one person faced a three-person group, a three-person group faced an individual, and a three-person group faced another three-person group. Previous studies have revealed that greed is activated when participants belong to a group, while fear is activated when participants interact with a group, and further, that attacking behaviors in the preemptive strike game are driven by fear. These observations led to a hypothesis that high attack rates would be realized when participants interact with a group, regardless of whether the participants make decisions as individuals or a group. The results of our experiment, however, rejected this hypothesis. Among the four conditions, the attack rate was highest when a three-person group faced an individual. As possible reasons for our observation, we discuss the potential threat stemming from the imbalance in the effectiveness of attack between individuals and groups, and the (incorrect) belief by groups that single individuals would be more likely to attack out of fear. PMID:27148871

  18. Terrorism in Spain: emergency medical aspects.

    PubMed

    García-Castrillo Riesgo, Luis; García Merino, Antonio

    2003-01-01

    A terrorism movement has been active in Spain during the last 20 years, with a painful number of victims. Civil Defense is in charge of the coordination of all the structures that are implicated in a terrorist incident. There are three typical patterns of attacks: (1) individual attacks; (2) group attacks; and (3) mass attacks. The individual attacks are done with guns, usually 9 mm, fired from a short distance; victims die from serious intracranial damage. Collective attacks are done using explosives under vehicles, tramp bombs, or "bomb vehicles;" victims are of different severity with wounds, burns, and blast injuries. With mass attacks with "bomb vehicles" in buildings or crowded public places, the numbers of victims are elevated and produce brutal social consequences. Emergency Medical Services integrated in to "Civil Defense" try to minimize the damage by initializing treatment on-scene and with the rapid provision of definitive care. During the last year, post-traumatic stress disorder treatment groups have been providing care to the victims and personnel. Chemical or biological weapons have not been used, although this is a great concern to the authorities.

  19. Asymmetric threat data mining and knowledge discovery

    NASA Astrophysics Data System (ADS)

    Gilmore, John F.; Pagels, Michael A.; Palk, Justin

    2001-03-01

    Asymmetric threats differ from the conventional force-on- force military encounters that the Defense Department has historically been trained to engage. Terrorism by its nature is now an operational activity that is neither easily detected or countered as its very existence depends on small covert attacks exploiting the element of surprise. But terrorism does have defined forms, motivations, tactics and organizational structure. Exploiting a terrorism taxonomy provides the opportunity to discover and assess knowledge of terrorist operations. This paper describes the Asymmetric Threat Terrorist Assessment, Countering, and Knowledge (ATTACK) system. ATTACK has been developed to (a) data mine open source intelligence (OSINT) information from web-based newspaper sources, video news web casts, and actual terrorist web sites, (b) evaluate this information against a terrorism taxonomy, (c) exploit country/region specific social, economic, political, and religious knowledge, and (d) discover and predict potential terrorist activities and association links. Details of the asymmetric threat structure and the ATTACK system architecture are presented with results of an actual terrorist data mining and knowledge discovery test case shown.

  20. Survey of subterranean termites (Isoptera: Rhinotermitidae) in a managed silvicultural plantation in Portugal, using a line-intersection method (LIS).

    PubMed

    Nobre, T; Nunes, L; Bignell, D E

    2009-02-01

    Subterranean termites (Reticulitermes grassei) were surveyed over successive seasons in a managed eucalyptus plantation in southeastern Portugal for 26 months. Termite activity in seven diameter categories of lying dead wood was investigated by a modified line intersection method (LIS). Each item sampled was inspected and assessed for termite attack and for general (i.e. fungal) decay status using standard protocols. Line intersection is quantitative to the extent that it can link foraging and decay parameters to woody biovolume. It was found that termites selected items with larger diameter, the observed trend showing an exponential character with greater termite attack as diameter increased. Attack by termites was positively associated with prior decay by fungi. A clear positive relationship was shown between rainfall and total woody biovolume containing live termites, underlining the importance of moisture for termite activity. Subterranean termites appeared to be important wood decomposers in the woodland studied, with an average of 30% of lying dead wood branches showing signs of termite attack.

  1. An attack aimed at active phase compensation in one-way phase-encoded QKD systems

    NASA Astrophysics Data System (ADS)

    Dong, Zhao-Yue; Yu, Ning-Na; Wei, Zheng-Jun; Wang, Jin-Dong; Zhang, Zhi-Ming

    2014-08-01

    Phase drift is an inherent problem in one-way phase-encoded quantum key distribution (QKD) systems. Although combining passive with active phase compensation (APC) processes can effectively compensate for the phase drift, the security problems brought about by these processes are rarely considered. In this paper, we point out a security hole in the APC process and put forward a corresponding attack scheme. Under our proposed attack, the quantum bit error rate (QBER) of the QKD can be close to zero for some conditions. However, under the same conditions the ratio r of the key "0" and the key "1" which Bob (the legal communicators Alice and Bob) gets is no longer 1:1 but 2:1, which may expose Eve (the eavesdropper). In order to solve this problem, we modify the resend strategy of the attack scheme, which can force r to reach 1 and the QBER to be lower than the tolerable QBER.

  2. Network robustness assessed within a dual connectivity framework: joint dynamics of the Active and Idle Networks.

    PubMed

    Tejedor, Alejandro; Longjas, Anthony; Zaliapin, Ilya; Ambroj, Samuel; Foufoula-Georgiou, Efi

    2017-08-17

    Network robustness against attacks has been widely studied in fields as diverse as the Internet, power grids and human societies. But current definition of robustness is only accounting for half of the story: the connectivity of the nodes unaffected by the attack. Here we propose a new framework to assess network robustness, wherein the connectivity of the affected nodes is also taken into consideration, acknowledging that it plays a crucial role in properly evaluating the overall network robustness in terms of its future recovery from the attack. Specifically, we propose a dual perspective approach wherein at any instant in the network evolution under attack, two distinct networks are defined: (i) the Active Network (AN) composed of the unaffected nodes and (ii) the Idle Network (IN) composed of the affected nodes. The proposed robustness metric considers both the efficiency of destroying the AN and that of building-up the IN. We show, via analysis of well-known prototype networks and real world data, that trade-offs between the efficiency of Active and Idle Network dynamics give rise to surprising robustness crossovers and re-rankings, which can have significant implications for decision making.

  3. Sensor noise camera identification: countering counter-forensics

    NASA Astrophysics Data System (ADS)

    Goljan, Miroslav; Fridrich, Jessica; Chen, Mo

    2010-01-01

    In camera identification using sensor noise, the camera that took a given image can be determined with high certainty by establishing the presence of the camera's sensor fingerprint in the image. In this paper, we develop methods to reveal counter-forensic activities in which an attacker estimates the camera fingerprint from a set of images and pastes it onto an image from a different camera with the intent to introduce a false alarm and, in doing so, frame an innocent victim. We start by classifying different scenarios based on the sophistication of the attacker's activity and the means available to her and to the victim, who wishes to defend herself. The key observation is that at least some of the images that were used by the attacker to estimate the fake fingerprint will likely be available to the victim as well. We describe the socalled "triangle test" that helps the victim reveal attacker's malicious activity with high certainty under a wide range of conditions. This test is then extended to the case when none of the images that the attacker used to create the fake fingerprint are available to the victim but the victim has at least two forged images to analyze. We demonstrate the test's performance experimentally and investigate its limitations. The conclusion that can be made from this study is that planting a sensor fingerprint in an image without leaving a trace is significantly more difficult than previously thought.

  4. Do Unexpected Panic Attacks Occur Spontaneously?

    PubMed Central

    Meuret, Alicia E.; Rosenfield, David; Wilhelm, Frank H.; Zhou, Enlu; Conrad, Ansgar; Ritz, Thomas; Roth, Walton T.

    2012-01-01

    Background Spontaneous or unexpected panic attacks, per definition, occur out-of-the blue, in absence of cues or triggers. Accordingly, physiological arousal or instability should occur at the onset of or during the attack, but not preceding it. To test this hypothesisweexaminedif points of significant autonomic changes preceded the onset of spontaneous panic attacks. Methods Forty-three panic disorder patients underwent repeated 24-hour ambulatory monitoring. Thirteen naturally panic attacks were recorded during 1,960 hours of monitoring. Minute-by-minute epochs beginning 60 minutes before, and continuing to 10 minutes after, the onset of individual attacks were examined for respiration, heart rate, and skin conductance level. Measures were controlled for physical activity and vocalization, and compared to time matched control periods within the same person. Results Significant patterns of instability across a numberof autonomic and respiratory variables were detected as early as 47 minutes before panic onset. The final minutes prior to onset were dominated by respiratory changes, with significant decreases in tidal volume followed by abrupt PCO2 increases. Panic attack onset was characterized by heart rate and tidal volume increases and a drop in PCO2. Symptom report was consistent with these changes. Skin conductance levels were generally elevated in the hour before and duringthe attacks. Changes in the matched control periods were largely absent. Conclusions Significant autonomic irregularities preceded the onset of attacks that were reported as abrupt and unexpected. The findings invite reconsideration of the current diagnostic distinction betweenuncuedand cued panic attacks. PMID:21783179

  5. 47 CFR 87.397 - Emergency operations.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... in subpart G may also be used for communications with private aircraft engaged in organized civil defense activities in preparation for, during an enemy attack or immediately after an enemy attack. When... unattended operation has been granted, the Commission may at any time, for national defense, modify the...

  6. 47 CFR 87.397 - Emergency operations.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... in subpart G may also be used for communications with private aircraft engaged in organized civil defense activities in preparation for, during an enemy attack or immediately after an enemy attack. When... unattended operation has been granted, the Commission may at any time, for national defense, modify the...

  7. Exploring Windows Domain-Level Defenses Against Authentication Attacks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Nichols, Jeff A.; Curtis, Laura

    2016-01-01

    We investigated the security resilience of the current Windows Active Directory (AD) environments to Pass-the-Hash and Pass- the-Ticket credential theft attacks. While doing this, we discovered a way to trigger the removal of all previously issued authentication credentials for a client, thus preventing their use by attackers. After triggered, the user is forced to contact the domain administrators and to authenticate to the AD to continue. This could become the basis for a response that arrests the spread of a detected attack. Operating in a virtualized XenServer environment, we were able to carefully determine and recreate the conditions necessary tomore » cause this response.« less

  8. Quantum hacking: Saturation attack on practical continuous-variable quantum key distribution

    NASA Astrophysics Data System (ADS)

    Qin, Hao; Kumar, Rupesh; Alléaume, Romain

    2016-07-01

    We identify and study a security loophole in continuous-variable quantum key distribution (CVQKD) implementations, related to the imperfect linearity of the homodyne detector. By exploiting this loophole, we propose an active side-channel attack on the Gaussian-modulated coherent-state CVQKD protocol combining an intercept-resend attack with an induced saturation of the homodyne detection on the receiver side (Bob). We show that an attacker can bias the excess noise estimation by displacing the quadratures of the coherent states received by Bob. We propose a saturation model that matches experimental measurements on the homodyne detection and use this model to study the impact of the saturation attack on parameter estimation in CVQKD. We demonstrate that this attack can bias the excess noise estimation beyond the null key threshold for any system parameter, thus leading to a full security break. If we consider an additional criterion imposing that the channel transmission estimation should not be affected by the attack, then the saturation attack can only be launched if the attenuation on the quantum channel is sufficient, corresponding to attenuations larger than approximately 6 dB. We moreover discuss the possible countermeasures against the saturation attack and propose a countermeasure based on Gaussian postselection that can be implemented by classical postprocessing and may allow one to distill the secret key when the raw measurement data are partly saturated.

  9. Jasmonate-induced responses are costly but benefit plants under attack in native populations

    PubMed Central

    Baldwin, Ian T.

    1998-01-01

    Herbivore attack is widely known to reduce food quality and to increase chemical defenses and other traits responsible for herbivore resistance. Inducible defenses are commonly thought to allow plants to forgo the costs of defense when not needed; however, neither their defensive function (increasing a plant’s fitness) nor their cost-savings function have been demonstrated in nature. The root-produced toxin nicotine increases after herbivore attack in the native, postfire annual Nicotiana attenuata and is internally activated by the wound hormone, jasmonic acid. I treated the roots of plants with the methyl ester of this hormone (MeJA) to elicit a response in one member of each of 745 matched pairs of plants growing in native populations with different probabilities of attack from herbivores, and measured the lifetime production of viable seed. In populations with intermediate rates of attack, induced plants were attacked less often by herbivores and survived to produce more seed than did their uninduced counterparts. Previous induction did not significantly increase the fitness of plants suffering high rates of attack. However, if plants had not been attacked, induced plants produced less seed than did their uninduced counterparts. Jasmonate-induced responses function as defenses but are costly, and inducibility allows this species to forgo these costs when the defenses are unnecessary. PMID:9653149

  10. Network Robustness: the whole story

    NASA Astrophysics Data System (ADS)

    Longjas, A.; Tejedor, A.; Zaliapin, I. V.; Ambroj, S.; Foufoula-Georgiou, E.

    2014-12-01

    A multitude of actual processes operating on hydrological networks may exhibit binary outcomes such as clean streams in a river network that may become contaminated. These binary outcomes can be modeled by node removal processes (attacks) acting in a network. Network robustness against attacks has been widely studied in fields as diverse as the Internet, power grids and human societies. However, the current definition of robustness is only accounting for the connectivity of the nodes unaffected by the attack. Here, we put forward the idea that the connectivity of the affected nodes can play a crucial role in proper evaluation of the overall network robustness and its future recovery from the attack. Specifically, we propose a dual perspective approach wherein at any instant in the network evolution under attack, two distinct networks are defined: (i) the Active Network (AN) composed of the unaffected nodes and (ii) the Idle Network (IN) composed of the affected nodes. The proposed robustness metric considers both the efficiency of destroying the AN and the efficiency of building-up the IN. This approach is motivated by concrete applied problems, since, for example, if we study the dynamics of contamination in river systems, it is necessary to know both the connectivity of the healthy and contaminated parts of the river to assess its ecological functionality. We show that trade-offs between the efficiency of the Active and Idle network dynamics give rise to surprising crossovers and re-ranking of different attack strategies, pointing to significant implications for decision making.

  11. Exposure-Response Model of Subcutaneous C1-Inhibitor Concentrate to Estimate the Risk of Attacks in Patients With Hereditary Angioedema.

    PubMed

    Zhang, Ying; Tortorici, Michael A; Pawaskar, Dipti; Pragst, Ingo; Machnig, Thomas; Hutmacher, Matthew; Zuraw, Bruce; Cicardi, Marco; Craig, Timothy; Longhurst, Hilary; Sidhu, Jagdev

    2018-03-01

    Subcutaneous C1-inhibitor (HAEGARDA, CSL Behring), is a US Food and Drug Administration (FDA)-approved, highly concentrated formulation of a plasma-derived C1-esterase inhibitor (C1-INH), which, in the phase III Clinical Studies for Optimal Management in Preventing Angioedema with Low-Volume Subcutaneous C1-inhibitor Replacement Therapy (COMPACT) trial, reduced the incidence of hereditary angioedema (HAE) attacks when given prophylactically. Data from the COMPACT trial were used to develop a repeated time-to-event model to characterize the timing and frequency of HAE attacks as a function of C1-INH activity, and then develop an exposure-response model to assess the relationship between C1-INH functional activity levels (C1-INH(f)) and the risk of an attack. The C1-INH(f) values of 33.1%, 40.3%, and 63.1% were predicted to correspond with 50%, 70%, and 90% reductions in the HAE attack risk, respectively, relative to no therapy. Based on trough C1-INH(f) values for the 40 IU/kg (40.2%) and 60 IU/kg (48.0%) C1-INH (SC) doses, the model predicted that 50% and 67% of the population, respectively, would see at least a 70% decrease in the risk of an attack. © 2018 The Authors CPT: Pharmacometrics & Systems Pharmacology published by Wiley Periodicals, Inc. on behalf of American Society for Clinical Pharmacology and Therapeutics.

  12. Limited Investigation of Active Feel Control Stick System (Active Stick)

    DTIC Science & Technology

    2009-06-01

    contained no limit protection and was the baseline system. The second system was “F-16 like” and contained angle -of-attack and load factor limiting...system. The second system was “F-16 like” and contained angle of attack (AOA) and load factor limiting features built into the flight control system...Force PTI at VLO .......................... 13 Figure 9: Pitch Angle Response to 1.5 g Commanded Force PTI at VLO ........................ 14 Figure 10

  13. 77 FR 10693 - Airworthiness Directives; Airbus Airplanes

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-02-23

    ... the position resolvers of the angle of attack (AOA) vane, which was a result of incorrect removal of... non-activation of the AOA protection systems which, during flight at a high angle of attack, could... information identified in this proposed AD, contact Airbus, Airworthiness Office--EAS, 1 Rond Point Maurice...

  14. Inferring Internet Denial-of-Service Activity

    DTIC Science & Technology

    2001-01-01

    observe more than 12,000 attacks against more than 5,000 distinct targets, ranging from well known e- commerce companies such as Amazon and Hotmail to...observe more than 2,000 attacks against more than 5,000 distinct targets, ranging from well known e-commerce companies such as Amazon and Hotmail to small

  15. Host selection and lethality of attacks by sea lampreys (Petromyzon marinus) in laboratory studies

    USGS Publications Warehouse

    Swink, William D.

    2003-01-01

    Parasitic-phase sea lampreys (Petromyzon marinus) are difficult to study in the wild. A series of laboratory studies (1984-1995) of single attacks on lake trout (Salvelinus namaycush), rainbow trout (Oncorhynchus mykiss), and burbot (Lota lota) examined host size selection; determined the effects of host size, host species, host strain, and temperature on host mortality; and estimated the weight of hosts killed per lamprey. Rainbow trout were more able and burbot less able to survive attacks than lake trout. Small sea lampreys actively selected the larger of two small hosts; larger sea lampreys attacked larger hosts in proportion to the hosts' body sizes, but actively avoided shorter hosts (a?? 600 mm) when larger were available. Host mortality was significantly less for larger (43-44%) than for smaller hosts (64%). However, the yearly loss of hosts per sea lamprey was less for small hosts (range, 6.8-14.2 kg per sea lamprey) than larger hosts (range, 11.4-19.3 kg per sea lamprey). Attacks at the lower of two temperature ranges (6.1-11.8A?C and 11.1-15.0A?C) did not significantly reduce the percentage of hosts killed (54% vs. 69%, p > 0.21), but longer attachment times at lower temperatures reduced the number of hosts attacked (33 vs. 45), and produced the lowest loss of hosts (6.6 kg per sea lamprey). Low temperature appeared to offset other factors that increase host mortality. Reanalysis of 789 attacks pooled from these studies, using forward stepwise logistic regression, also identified mean daily temperature as the dominant factor affecting host mortality. Observations in Lakes Superior, Huron, and Ontario support most laboratory results.

  16. A data fusion approach to indications and warnings of terrorist attacks

    NASA Astrophysics Data System (ADS)

    McDaniel, David; Schaefer, Gregory

    2014-05-01

    Indications and Warning (I&W) of terrorist attacks, particularly IED attacks, require detection of networks of agents and patterns of behavior. Social Network Analysis tries to detect a network; activity analysis tries to detect anomalous activities. This work builds on both to detect elements of an activity model of terrorist attack activity - the agents, resources, networks, and behaviors. The activity model is expressed as RDF triples statements where the tuple positions are elements or subsets of a formal ontology for activity models. The advantage of a model is that elements are interdependent and evidence for or against one will influence others so that there is a multiplier effect. The advantage of the formality is that detection could occur hierarchically, that is, at different levels of abstraction. The model matching is expressed as a likelihood ratio between input text and the model triples. The likelihood ratio is designed to be analogous to track correlation likelihood ratios common in JDL fusion level 1. This required development of a semantic distance metric for positive and null hypotheses as well as for complex objects. The metric uses the Web 1Terabype database of one to five gram frequencies for priors. This size requires the use of big data technologies so a Hadoop cluster is used in conjunction with OpenNLP natural language and Mahout clustering software. Distributed data fusion Map Reduce jobs distribute parts of the data fusion problem to the Hadoop nodes. For the purposes of this initial testing, open source models and text inputs of similar complexity to terrorist events were used as surrogates for the intended counter-terrorist application.

  17. On the designing of a tamper resistant prescription RFID access control system.

    PubMed

    Safkhani, Masoumeh; Bagheri, Nasour; Naderi, Majid

    2012-12-01

    Recently, Chen et al. have proposed a novel tamper resistant prescription RFID access control system, published in the Journal of Medical Systems. In this paper we consider the security of the proposed protocol and identify some existing weaknesses. The main attack is a reader impersonation attack which allows an active adversary to impersonate a legitimate doctor, e.g. the patient's doctor, to access the patient's tag and change the patient prescription. The presented attack is quite efficient. To impersonate a doctor, the adversary should eavesdrop one session between the doctor and the patient's tag and then she can impersonate the doctor with the success probability of '1'. In addition, we present efficient reader-tag to back-end database impersonation, de-synchronization and traceability attacks against the protocol. Finally, we propose an improved version of protocol which is more efficient compared to the original protocol while provides the desired security against the presented attacks.

  18. Is television traumatic? Dreams, stress, and media exposure in the aftermath of September 11, 2001.

    PubMed

    Propper, Ruth E; Stickgold, Robert; Keeley, Raeann; Christman, Stephen D

    2007-04-01

    The terrorist attacks of September 11, 2001, were traumatic for people living throughout the United States. It has been suggested that people living far from the attacks experienced increased stress because of their exposure to the terrorist events via the media, particularly via television. Following a traumatic or stressful event, individuals may have dreams that reflect that experience. As part of a course on dreaming, individuals recorded their dreams both prior to and following the terrorist attacks of September 11, 2001. On September 12, these same individuals reported their activities and media exposure the previous day. Results revealed (a) changes in dream features following the attacks and (b) a strong relation between exposure to the events on television and changes in dream features after the attacks. Because of the study's within-subjects design, the results provide evidence for a direct association between television viewing and subsequent increases in stress and trauma.

  19. PKI Layer Cake: New Collision Attacks against the Global X.509 Infrastructure

    NASA Astrophysics Data System (ADS)

    Kaminsky, Dan; Patterson, Meredith L.; Sassaman, Len

    Research unveiled in December of 2008 [15] showed how MD5's long-known flaws could be actively exploited to attack the real-worldCertification Authority infrastructure. In this paper, we demonstrate two new classes of collision, which will be somewhat trickier to address than previous attacks against X.509: the applicability of MD2 preimage attacks against the primary root certificate for Verisign, and the difficulty of validating X.509 Names contained within PKCS#10 Certificate Requests.We also draw particular attention to two possibly unrecognized vectors for implementation flaws that have been problematic in the past: the ASN.1 BER decoder required to parsePKCS#10, and the potential for SQL injection fromtext contained within its requests. Finally, we explore why the implications of these attacks are broader than some have realized - first, because Client Authentication is sometimes tied to X.509, and second, because Extended Validation certificates were only intended to stop phishing attacks from names similar to trusted brands. As per the work of Adam Barth and Collin Jackson [4], EV does not prevent an attacker who can synthesize or acquire a "low assurance" certificate for a given name from acquiring the "green bar" EV experience.

  20. Human behaviour can trigger large carnivore attacks in developed countries

    PubMed Central

    Penteriani, Vincenzo; Delgado, María del Mar; Pinchera, Francesco; Naves, Javier; Fernández-Gil, Alberto; Kojola, Ilpo; Härkönen, Sauli; Norberg, Harri; Frank, Jens; Fedriani, José María; Sahlén, Veronica; Støen, Ole-Gunnar; Swenson, Jon E.; Wabakken, Petter; Pellegrini, Mario; Herrero, Stephen; López-Bao, José Vicente

    2016-01-01

    The media and scientific literature are increasingly reporting an escalation of large carnivore attacks on humans in North America and Europe. Although rare compared to human fatalities by other wildlife, the media often overplay large carnivore attacks on humans, causing increased fear and negative attitudes towards coexisting with and conserving these species. Although large carnivore populations are generally increasing in developed countries, increased numbers are not solely responsible for the observed rise in the number of attacks by large carnivores. Here we show that an increasing number of people are involved in outdoor activities and, when doing so, some people engage in risk-enhancing behaviour that can increase the probability of a risky encounter and a potential attack. About half of the well-documented reported attacks have involved risk-enhancing human behaviours, the most common of which is leaving children unattended. Our study provides unique insight into the causes, and as a result the prevention, of large carnivore attacks on people. Prevention and information that can encourage appropriate human behaviour when sharing the landscape with large carnivores are of paramount importance to reduce both potentially fatal human-carnivore encounters and their consequences to large carnivores. PMID:26838467

  1. Human behaviour can trigger large carnivore attacks in developed countries.

    PubMed

    Penteriani, Vincenzo; Delgado, María del Mar; Pinchera, Francesco; Naves, Javier; Fernández-Gil, Alberto; Kojola, Ilpo; Härkönen, Sauli; Norberg, Harri; Frank, Jens; Fedriani, José María; Sahlén, Veronica; Støen, Ole-Gunnar; Swenson, Jon E; Wabakken, Petter; Pellegrini, Mario; Herrero, Stephen; López-Bao, José Vicente

    2016-02-03

    The media and scientific literature are increasingly reporting an escalation of large carnivore attacks on humans in North America and Europe. Although rare compared to human fatalities by other wildlife, the media often overplay large carnivore attacks on humans, causing increased fear and negative attitudes towards coexisting with and conserving these species. Although large carnivore populations are generally increasing in developed countries, increased numbers are not solely responsible for the observed rise in the number of attacks by large carnivores. Here we show that an increasing number of people are involved in outdoor activities and, when doing so, some people engage in risk-enhancing behaviour that can increase the probability of a risky encounter and a potential attack. About half of the well-documented reported attacks have involved risk-enhancing human behaviours, the most common of which is leaving children unattended. Our study provides unique insight into the causes, and as a result the prevention, of large carnivore attacks on people. Prevention and information that can encourage appropriate human behaviour when sharing the landscape with large carnivores are of paramount importance to reduce both potentially fatal human-carnivore encounters and their consequences to large carnivores.

  2. Tofacitinib suppresses disease activity and febrile attacks in a patient with coexisting rheumatoid arthritis and familial Mediterranean fever.

    PubMed

    Gök, Kevser; Cengiz, Gizem; Erol, Kemal; Ozgocmen, Salih

    2017-01-01

    Familial Mediterranean fever (FMF) is the most common hereditary auto-inflammatory (periodic fever) syndrome, and usually successfully treated with colchicine. However, nearly 5-10% of FMF cases are resistant or intolerant to colchicine and treatment options are highly restricted in these cases. Biologics including anakinra, canakinumab, rilonacept, etanercept, infliximab, interferon-alpha, and tocilizumab are shown to have efficacy to control FMF attacks. Tofacitinib, a Janus kinase (JAK) inhibitor, is an orally administered non-biologic disease modifying anti-rheumatic drug for the treatment of rheumatoid arthritis (RA). Herein we report a female patient with coexisting RA and colchicine resistant FMF whose FMF attacks and disease activity were completely controlled after treatment with tofacitinib, a small-molecule JAK3 inhibitor.

  3. Disaster planning and emergency preparedness: lessons learned.

    PubMed

    Babb, John; Tosatto, Robert; Hayslett, James

    2002-01-01

    Following the terrorist attacks of September 11, 2001, the federal response plan was activated immediately, with most efforts focused on helping recovery workers at Ground Zero in New York City. Comprehensive pharmacy services were critical in protecting the health of those potentially exposed to anthrax at U.S. Postal Service facilities and the U.S. Capitol. Responding to anthrax attacks taught many valuable lessons to emergency workers on how to manage a bioterrorist attack. Because of its central place in the life of many American communities, pharmacy is a natural and important ally of public health.

  4. Good Things in Small Packages: Micro Worlds and Cyber Security

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    David I Gertman

    2013-11-01

    Cyber events, as perpetrated by terrorists and nation states, have become commonplace as evidenced in national and international news media. Cyber attacks affect day-to-day activities of end users through exploitation of social networks, businesses such as banking and stock exchanges, and government entities including Departments of Defense. They are becoming more frequent and sophisticated. Currently, efforts are directed to understanding the methods employed by attackers and towards dissecting the planning and activities of the perpetrator, including review of psychosocial factors.

  5. Lightweight Privacy-Preserving Authentication Protocols Secure against Active Attack in an Asymmetric Way

    NASA Astrophysics Data System (ADS)

    Cui, Yank; Kobara, Kazukuni; Matsuura, Kanta; Imai, Hideki

    As pervasive computing technologies develop fast, the privacy protection becomes a crucial issue and needs to be coped with very carefully. Typically, it is difficult to efficiently identify and manage plenty of the low-cost pervasive devices like Radio Frequency Identification Devices (RFID), without leaking any privacy information. In particular, the attacker may not only eavesdrop the communication in a passive way, but also mount an active attack to ask queries adaptively, which is obviously more dangerous. Towards settling this problem, in this paper, we propose two lightweight authentication protocols which are privacy-preserving against active attack, in an asymmetric way. That asymmetric style with privacy-oriented simplification succeeds to reduce the load of low-cost devices and drastically decrease the computation cost for the management of server. This is because that, unlike the usual management of the identities, our approach does not require any synchronization nor exhaustive search in the database, which enjoys great convenience in case of a large-scale system. The protocols are based on a fast asymmetric encryption with specialized simplification and only one cryptographic hash function, which consequently assigns an easy work to pervasive devices. Besides, our results do not require the strong assumption of the random oracle.

  6. Interval forecasting of cyber-attacks on industrial control systems

    NASA Astrophysics Data System (ADS)

    Ivanyo, Y. M.; Krakovsky, Y. M.; Luzgin, A. N.

    2018-03-01

    At present, cyber-security issues of industrial control systems occupy one of the key niches in a state system of planning and management Functional disruption of these systems via cyber-attacks may lead to emergencies related to loss of life, environmental disasters, major financial and economic damage, or disrupted activities of cities and settlements. There is then an urgent need to develop protection methods against cyber-attacks. This paper studied the results of cyber-attack interval forecasting with a pre-set intensity level of cyber-attacks. Interval forecasting is the forecasting of one interval from two predetermined ones in which a future value of the indicator will be obtained. For this, probability estimates of these events were used. For interval forecasting, a probabilistic neural network with a dynamic updating value of the smoothing parameter was used. A dividing bound of these intervals was determined by a calculation method based on statistical characteristics of the indicator. The number of cyber-attacks per hour that were received through a honeypot from March to September 2013 for the group ‘zeppo-norcal’ was selected as the indicator.

  7. A benchmark system to optimize our defense against an attack on the US food supply using the Risk Reduction Effectiveness and Capabilities Assessment Program.

    PubMed

    Hodoh, Ofia; Dallas, Cham E; Williams, Paul; Jaine, Andrew M; Harris, Curt

    2015-01-01

    A predictive system was developed and tested in a series of exercises with the objective of evaluating the preparedness and effectiveness of the multiagency response to food terrorism attacks. A computerized simulation model, Risk Reduction Effectiveness and Capabilities Assessment Program (RRECAP), was developed to identify the key factors that influence the outcomes of an attack and quantify the relative reduction of such outcomes caused by each factor. The model was evaluated in a set of Tabletop and Full-Scale Exercises that simulate biological and chemical attacks on the food system. More than 300 participants representing more than 60 federal, state, local, and private sector agencies and organizations. The exercises showed that agencies could use RRECAP to identify and prioritize their advance preparation to mitigate such attacks with minimal expense. RRECAP also demonstrated the relative utility and limitations of the ability of medical resources to treat patients if responders do not recognize and mitigate the attack rapidly, and the exercise results showed that proper advance preparation would reduce these deficiencies. Using computer simulation prediction of the medical outcomes of food supply attacks to identify optimal remediation activities and quantify the benefits of various measures provides a significant tool to agencies in both the public and private sector as they seek to prepare for such an attack.

  8. Efficacy of a Community-Based Physical Activity Program KM2H2 for Stroke and Heart Attack Prevention among Senior Hypertensive Patients: A Cluster Randomized Controlled Phase-II Trial.

    PubMed

    Gong, Jie; Chen, Xinguang; Li, Sijian

    2015-01-01

    To evaluate the efficacy of the program Keep Moving toward Healthy Heart and Healthy Brain (KM2H2) in encouraging physical activities for the prevention of heart attack and stroke among hypertensive patients enrolled in the Community-Based Hypertension Control Program (CBHCP). Cluster randomized controlled trial with three waves of longitudinal assessments at baseline, 3 and 6 months post intervention. Community-based and patient-centered self-care for behavioral intervention in urban settings of China. A total of 450 participants diagnosed with hypertension from 12 community health centers in Wuhan, China were recruited, and were randomly assigned by center to receive either KM2H2 plus standard CBHCP care (6 centers and 232 patients) or the standard care only (6 centers and 218 patients). KM2H2 is a behavioral intervention guided by the Transtheoretical Model, the Model of Personalized Medicine and Social Capital Theory. It consists of six intervention sessions and two booster sessions engineered in a progressive manner. The purpose is to motivate and maintain physical activities for the prevention of heart attack and stroke. Heart attack and stroke (clinically diagnosed, primary outcome), blood pressure (measured, secondary outcome), and physical activity (self-report, tertiary outcome) were assessed at the individual level during the baseline, 3- and 6-month post-intervention. Relative to the standard care, receiving KM2H2 was associated with significant reductions in the incidence of heart attack (3.60% vs. 7.03%, p < .05) and stroke (5.11% vs. 9.90%, p<0.05), and moderate reduction in blood pressure (-3.72 mmHg in DBP and -2.92 mmHg in DBP) at 6-month post-intervention; and significant increases in physical activity at 3- (d = 0.53, 95% CI: 0.21, 0.85) and 6-month (d = 0.45, 95% CI: 0.04, 0.85) post-intervention, respectively. The program KM2H2 is efficacious to reduce the risk of heart attack and stroke among senior patients who are on anti-hypertensive medication. Findings of this study provide solid data supporting a formal phase-III trial to establish the effectiveness of KM2H2 for use in community settings for prevention. ISRCTN Register ISRCTN12608966.

  9. Focal hyperemia followed by spreading oligemia and impaired activation of rCBF in classic migraine

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Olesen, J.; Larsen, B.; Lauritzen, M.

    1981-04-01

    Regional cerebral blood flow (rCBF) was measured in 254 areas of a hemisphere with the xenon 133 intraarterial injection method. Six cases of classic migraine were followed from the normal state into the prodromal phase, and in 3 cases further into the headache phase. One patient with common migraine was similarly followed during his only classic attack. The attacks were initiated by focal hyperemia in 3 patients. During prodromes all patients displayed occipitoparietal rCBF reduction (oligemia), but in only 1 case did the reduction approach critical values. Oligemia gradually spread anteriorly in the course of 15 to 45 minutes. Inmore » 4 patients a global oligemia was observed. In 4 patients severe headache was present concomitantly with oligemia and with no sign of hyperemia or nonhomogeneous brain perfusion. The normal rCBF increase during cortical activity (hand movement, speech, and similar activities) was impaired in 6 patients. The results indicate that the vasospastic model of the migraine attack is too simplistic.« less

  10. Experimental design affects social behavior outcomes in adult zebrafish developmentally exposed to lead.

    PubMed

    Weber, Daniel N; Ghorai, Jugal K

    2013-09-01

    Lead (Pb(2+)) affects neuronal and endocrine systems that influence social interactions. By providing potential hiding locations, spatial heterogeneity may affect Pb(2+)-induced behavioral outcomes. Therefore, a test chamber was designed into which a refuge could be inserted. The refuge allowed test subjects to escape from the mirror image that stimulated agonistic interactions. Behaviors with a mirror were compared with baseline activity patterns without a mirror. Adult (12-month old) male and female zebrafish, exposed to Pb(2+) (0-10 μM) as embryos (2-24 hours post fertilization), were tested individually for 5 min in each chamber design within 2 h of feeding. Behaviors were evaluated for % time in mirror zone, distance traveled (=activity level), and attacks on the mirror image. When there was no refuge, significant concentration-dependent increases occurred in male % time in mirror zone, activity level, and number of attacks. Increases in these variables were less pronounced in females. When there was a refuge, there were significant differences for males only in activity level and attacks at the higher developmental exposure concentrations; % time in mirror zone followed a similar pattern and level as without refuge. Females displayed Pb(2+)-induced behavioral changes only for attacks on mirror. Since the presence of refuges that is, environmental enrichment, reduced Pb(2+)-induced agonistic behavior in both sexes, experimental spatial design can be considered an important factor when interpreting behavioral outcomes.

  11. Stress-induced changes in brain serotonergic activity, plasma cortisol and aggressive behavior in Arctic charr (Salvelinus alpinus) is counteracted by L-DOPA.

    PubMed

    Höglund, E; Kolm, N; Winberg, S

    2001-10-01

    Arctic charr (Salvelinus alpinus) were tested for aggressive behavior using intruder tests, before and after 2 days of dyadic social interaction. Following social interaction, half of the dominant and half of the subordinate fish were given L-DOPA (10 mg/kg, orally), whereas the remaining dominant and subordinate fish were given vehicle. One hour following drug treatment, the fish were tested for aggressive behavior again in a third and final intruder test, after which blood plasma and brain tissue were sampled for analysis of plasma cortisol concentrations and brain levels of monoamines and monoamine metabolites. Subordinate fish showed a reduction in the number of attacks launched against the intruder, as well as an increase in attack latency, as compared to prior to dyadic social interactions. Social subordination also resulted in an elevation of brain serotonergic activity. Fish receiving L-DOPA prior to the final intruder test showed shorter attack latency than vehicle controls. Drug treatment was a stressful experience and vehicle controls showed elevated plasma cortisol levels and longer attack latency as compared to before treatment. L-DOPA-treated fish showed lower plasma levels of cortisol and lower serotonergic activity in certain brain areas than vehicle controls. These results suggest that L-DOPA counteracts the stress-induced inhibition of aggressive behavior, and at the same time inhibits stress-induced effects on brain serotonergic activity and plasma cortisol concentrations.

  12. What happens in the pith stays in the pith: tissue-localized defense responses facilitate chemical niche differentiation between two spatially separated herbivores.

    PubMed

    Lee, Gisuk; Joo, Youngsung; Kim, Sang-Gyu; Baldwin, Ian T

    2017-11-01

    Herbivore attack is known to elicit systemic defense responses that spread throughout the host plant and influence the performance of other herbivores. While these plant-mediated indirect competitive interactions are well described, and the co-existence of herbivores from different feeding guilds is common, the mechanisms of co-existence are poorly understood. In both field and glasshouse experiments with a native tobacco, Nicotiana attenuata, we found no evidence of negative interactions when plants were simultaneously attacked by two spatially separated herbivores: a leaf chewer Manduca sexta and a stem borer Trichobaris mucorea. T. mucorea attack elicited jasmonic acid (JA) and jasmonoyl-l-isoleucine bursts in the pith of attacked stems similar to those that occur in leaves when M. sexta attacks N. attenuata leaves. Pith chlorogenic acid (CGA) levels increased 1000-fold to levels 6-fold higher than leaf levels after T. mucorea attack; these increases in pith CGA levels, which did not occur in M. sexta-attacked leaves, required JA signaling. With plants silenced in CGA biosynthesis (irHQT plants), CGA, as well as other caffeic acid conjugates, was demonstrated in both glasshouse and field experiments to function as a direct defense protecting piths against T. mucorea attack, but not against leaf chewers or sucking insects. T. mucorea attack does not systemically activate JA signaling in leaves, while M. sexta leaf-attack transiently induces detectable but minor pith JA levels that are dwarfed by local responses. We conclude that tissue-localized defense responses allow tissue-specialized herbivores to share the same host and occupy different chemical defense niches in the same hostplant. © 2017 The Authors The Plant Journal © 2017 John Wiley & Sons Ltd.

  13. Classification of HTTP Attacks: A Study on the ECML/PKDD 2007 Discovery Challenge

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Gallagher, Brian; Eliassi-Rad, Tina

    2009-07-08

    As the world becomes more reliant on Web applications for commercial, financial, and medical transactions, cyber attacks on the World Wide Web are increasing in frequency and severity. Web applications provide an attractive alternative to traditional desktop applications due to their accessibility and ease of deployment. However, the accessibility of Web applications also makes them extremely vulnerable to attack. This inherent vulnerability is intensified by the distributed nature ofWeb applications and the complexity of configuring application servers. These factors have led to a proliferation of Web-based attacks, in which attackers surreptitiously inject code into HTTP requests, allowing them to executemore » arbitrary commands on remote systems and perform malicious activities such as reading, altering, or destroying sensitive data. One approach for dealing with HTTP-based attacks is to identify malicious code in incoming HTTP requests and eliminate bad requests before they are processed. Using machine learning techniques, we can build a classifier to automatically label requests as “Valid” or “Attack.” For this study, we develop a simple, but effective HTTP attack classifier, based on the vector space model used commonly for Information Retrieval. Our classifier not only separates attacks from valid requests, but can also identify specific attack types (e.g., “SQL Injection” or “Path Traversal”). We demonstrate the effectiveness of our approach through experiments on the ECML/PKDD 2007 Discovery Challenge data set. Specifically, we show that our approach achieves higher precision and recall than previous methods. In addition, our approach has a number of desirable characteristics, including robustness to missing contextual information, interpretability of models, and scalability.« less

  14. Analyzing Cyber-Physical Threats on Robotic Platforms.

    PubMed

    Ahmad Yousef, Khalil M; AlMajali, Anas; Ghalyon, Salah Abu; Dweik, Waleed; Mohd, Bassam J

    2018-05-21

    Robots are increasingly involved in our daily lives. Fundamental to robots are the communication link (or stream) and the applications that connect the robots to their clients or users. Such communication link and applications are usually supported through client/server network connection. This networking system is amenable of being attacked and vulnerable to the security threats. Ensuring security and privacy for robotic platforms is thus critical, as failures and attacks could have devastating consequences. In this paper, we examine several cyber-physical security threats that are unique to the robotic platforms; specifically the communication link and the applications. Threats target integrity, availability and confidential security requirements of the robotic platforms, which use MobileEyes/arnlServer client/server applications. A robot attack tool (RAT) was developed to perform specific security attacks. An impact-oriented approach was adopted to analyze the assessment results of the attacks. Tests and experiments of attacks were conducted in simulation environment and physically on the robot. The simulation environment was based on MobileSim; a software tool for simulating, debugging and experimenting on MobileRobots/ActivMedia platforms and their environments. The robot platform PeopleBot TM was used for physical experiments. The analysis and testing results show that certain attacks were successful at breaching the robot security. Integrity attacks modified commands and manipulated the robot behavior. Availability attacks were able to cause Denial-of-Service (DoS) and the robot was not responsive to MobileEyes commands. Integrity and availability attacks caused sensitive information on the robot to be hijacked. To mitigate security threats, we provide possible mitigation techniques and suggestions to raise awareness of threats on the robotic platforms, especially when the robots are involved in critical missions or applications.

  15. Analyzing Cyber-Physical Threats on Robotic Platforms †

    PubMed Central

    2018-01-01

    Robots are increasingly involved in our daily lives. Fundamental to robots are the communication link (or stream) and the applications that connect the robots to their clients or users. Such communication link and applications are usually supported through client/server network connection. This networking system is amenable of being attacked and vulnerable to the security threats. Ensuring security and privacy for robotic platforms is thus critical, as failures and attacks could have devastating consequences. In this paper, we examine several cyber-physical security threats that are unique to the robotic platforms; specifically the communication link and the applications. Threats target integrity, availability and confidential security requirements of the robotic platforms, which use MobileEyes/arnlServer client/server applications. A robot attack tool (RAT) was developed to perform specific security attacks. An impact-oriented approach was adopted to analyze the assessment results of the attacks. Tests and experiments of attacks were conducted in simulation environment and physically on the robot. The simulation environment was based on MobileSim; a software tool for simulating, debugging and experimenting on MobileRobots/ActivMedia platforms and their environments. The robot platform PeopleBotTM was used for physical experiments. The analysis and testing results show that certain attacks were successful at breaching the robot security. Integrity attacks modified commands and manipulated the robot behavior. Availability attacks were able to cause Denial-of-Service (DoS) and the robot was not responsive to MobileEyes commands. Integrity and availability attacks caused sensitive information on the robot to be hijacked. To mitigate security threats, we provide possible mitigation techniques and suggestions to raise awareness of threats on the robotic platforms, especially when the robots are involved in critical missions or applications. PMID:29883403

  16. 10 CFR 50.13 - Attacks and destructive acts by enemies of the United States; and defense activities.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... LICENSING OF PRODUCTION AND UTILIZATION FACILITIES Requirement of License, Exceptions § 50.13 Attacks and... construct and operate a production or utilization facility, or for an amendment to such license, is not required to provide for design features or other measures for the specific purpose of protection against...

  17. Development of mental health first aid guidelines for panic attacks: a Delphi study.

    PubMed

    Kelly, Claire M; Jorm, Anthony F; Kitchener, Betty A

    2009-08-10

    Panic attacks are common, and while they are not life-threatening events, they can lead to the development of panic disorder and agoraphobia. Appropriate help at the time that a panic attack occurs may decrease the fear associated with the attack and reduce the risk of developing an anxiety disorder. However, few people have the knowledge and skills required to assist. Simple first aid guidelines may help members of the public to offer help to people who experience panic attacks. The Delphi method was used to reach consensus in a panel of experts. Experts included 50 professionals and 6 people who had experience of panic attacks and were active in mental health advocacy. Statements about how to assist someone who is having a panic attack were sourced through a systematic search of both professional and lay literature. These statements were rated for importance as first aid guidelines by the expert and consumer panels and guidelines were written using the items most consistently endorsed. Of 144 statements presented to the panels, 27 were accepted. These statements were used to develop the guidelines appended to this paper. There are a number of actions which are considered to be useful for members of the public to do if they encounter someone who is having a panic attack. These guidelines will be useful in revision of curricula of mental health first aid programs. They can also be used by members of the public who want immediate information about how to assist someone who is experiencing panic attacks.

  18. Technosocial Modeling of IED Threat Scenarios and Attacks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Whitney, Paul D.; Brothers, Alan J.; Coles, Garill A.

    2009-03-23

    This paper describes an approach for integrating sociological and technical models to develop more complete threat assessment. Current approaches to analyzing and addressing threats tend to focus on the technical factors. This paper addresses development of predictive models that encompass behavioral as well as these technical factors. Using improvised explosive device (IED) attacks as motivation, this model supports identification of intervention activities 'left of boom' as well as prioritizing attack modalities. We show how Bayes nets integrate social factors associated with IED attacks into general threat model containing technical and organizational steps from planning through obtaining the IED to initiationmore » of the attack. The social models are computationally-based representations of relevant social science literature that describes human decision making and physical factors. When combined with technical models, the resulting model provides improved knowledge integration into threat assessment for monitoring. This paper discusses the construction of IED threat scenarios, integration of diverse factors into an analytical framework for threat assessment, indicator identification for future threats, and future research directions.« less

  19. Hydrogen atom abstraction from aldehydes - OH + H2CO and O + H2CO

    NASA Technical Reports Server (NTRS)

    Dupuis, M.; Lester, W. A., Jr.

    1984-01-01

    The essential features of the potential energy surfaces governing hydrogen abstraction from formaldehyde by oxygen atom and hydroxyl radical have been characterized with ab inito multiconfiguration Hartree-Fock (MCHF) and configuration interaction (CI) wave functions. The results are consistent with a very small activation energy for the OH + H2CO reaction, and an activation energy of a few kcal/mol for the O + H2CO reaction. In the transition state structure of both systems, the attacking oxygen atom is nearly collinear with the attacked CH bond.

  20. Animal-Borne Imaging Reveals Novel Insights into the Foraging Behaviors and Diel Activity of a Large-Bodied Apex Predator, the American Alligator (Alligator mississippiensis)

    PubMed Central

    Nifong, James C.; Nifong, Rachel L.; Silliman, Brian R.; Lowers, Russell H.; Guillette, Louis J.; Ferguson, Jake M.; Welsh, Matthew; Abernathy, Kyler; Marshall, Greg

    2014-01-01

    Large-bodied, top- and apex predators (e.g., crocodilians, sharks, wolves, killer whales) can exert strong top-down effects within ecological communities through their interactions with prey. Due to inherent difficulties while studying the behavior of these often dangerous predatory species, relatively little is known regarding their feeding behaviors and activity patterns, information that is essential to understanding their role in regulating food web dynamics and ecological processes. Here we use animal-borne imaging systems (Crittercam) to study the foraging behavior and activity patterns of a cryptic, large-bodied predator, the American alligator (Alligator mississippiensis) in two estuaries of coastal Florida, USA. Using retrieved video data we examine the variation in foraging behaviors and activity patterns due to abiotic factors. We found the frequency of prey-attacks (mean = 0.49 prey attacks/hour) as well as the probability of prey-capture success (mean = 0.52 per attack) were significantly affected by time of day. Alligators attempted to capture prey most frequently during the night. Probability of prey-capture success per attack was highest during morning hours and sequentially lower during day, night, and sunset, respectively. Position in the water column also significantly affected prey-capture success, as individuals’ experienced two-fold greater success when attacking prey while submerged. These estimates are the first for wild adult American alligators and one of the few examples for any crocodilian species worldwide. More broadly, these results reveal that our understandings of crocodilian foraging behaviors are biased due to previous studies containing limited observations of cryptic and nocturnal foraging interactions. Our results can be used to inform greater understanding regarding the top-down effects of American alligators in estuarine food webs. Additionally, our results highlight the importance and power of using animal-borne imaging when studying the behavior of elusive large-bodied, apex predators, as it provides critical insights into their trophic and behavioral interactions. PMID:24454711

  1. Animal-borne imaging reveals novel insights into the foraging behaviors and Diel activity of a large-bodied apex predator, the American alligator (Alligator mississippiensis).

    PubMed

    Nifong, James C; Nifong, Rachel L; Silliman, Brian R; Lowers, Russell H; Guillette, Louis J; Ferguson, Jake M; Welsh, Matthew; Abernathy, Kyler; Marshall, Greg

    2014-01-01

    Large-bodied, top- and apex predators (e.g., crocodilians, sharks, wolves, killer whales) can exert strong top-down effects within ecological communities through their interactions with prey. Due to inherent difficulties while studying the behavior of these often dangerous predatory species, relatively little is known regarding their feeding behaviors and activity patterns, information that is essential to understanding their role in regulating food web dynamics and ecological processes. Here we use animal-borne imaging systems (Crittercam) to study the foraging behavior and activity patterns of a cryptic, large-bodied predator, the American alligator (Alligator mississippiensis) in two estuaries of coastal Florida, USA. Using retrieved video data we examine the variation in foraging behaviors and activity patterns due to abiotic factors. We found the frequency of prey-attacks (mean = 0.49 prey attacks/hour) as well as the probability of prey-capture success (mean = 0.52 per attack) were significantly affected by time of day. Alligators attempted to capture prey most frequently during the night. Probability of prey-capture success per attack was highest during morning hours and sequentially lower during day, night, and sunset, respectively. Position in the water column also significantly affected prey-capture success, as individuals' experienced two-fold greater success when attacking prey while submerged. These estimates are the first for wild adult American alligators and one of the few examples for any crocodilian species worldwide. More broadly, these results reveal that our understandings of crocodilian foraging behaviors are biased due to previous studies containing limited observations of cryptic and nocturnal foraging interactions. Our results can be used to inform greater understanding regarding the top-down effects of American alligators in estuarine food webs. Additionally, our results highlight the importance and power of using animal-borne imaging when studying the behavior of elusive large-bodied, apex predators, as it provides critical insights into their trophic and behavioral interactions.

  2. Patch Time Allocation and Oviposition Behavior in Response to Patch Quality and the Presence of a Generalist Predator in Meteorus pulchricornis (Hymenoptera: Braconidae)

    PubMed Central

    Sheng, Sheng; Ling, Meng; Fu-an, Wu; Baoping, Li

    2015-01-01

    Foraging parasitoids often must estimate local risk of predation just as they must estimate local patch value. Here, we investigate the effects a generalist predator Chlaenius bioculatus (Coleoptera: Carabidae), has on the oviposition behavior and the patch residence decisions of a solitary parasitoid Meteorus pulchricornis (Hymenoptera: Braconidae) in response to the varying host quality of Spodoptera litura (Lepidoptera: Noctuidae) larvae (L2 and L4). M. pulchricornis attacked more L4 than on L2 hosts, with the difference in attack rate varying depending on predation treatments, greater in the presence (either actively feeding or not) of the predator than in the absence of it. The parasitoid attacked fewer L2 and L4 hosts when the predator was actively feeding than when it was not feeding or not present in the patch. M. pulchricornis decreased the patch leaving tendency with increasing rejections of hosts, but increased the tendency in response to the presence of the predator as compared with the absence of it, and furthermore, increased the patch leaving tendency when the predator was actively feeding as compared with when it was not. Our study suggests that M. pulchricornis can exploit high quality patches while minimizing predation risk, by attacking more hosts in high quality patches while reducing total patch time in response to risk of predation. PMID:25943317

  3. Oral lysine clonixinate in the acute treatment of migraine: a double-blind placebo-controlled study.

    PubMed

    Krymchantowski, A V; Barbosa, J S; Cheim, C; Alves, L A

    2001-03-01

    Several oral nonsteroidal anti-inflammatory drugs (NSAIDs) are effective to treat migraine attacks. Lysine clonixinate (LC) is a NSAID derived from nicotinic acid that has proven to be effective in various pain syndromes such as renal colic and muscular pain. The aim of this double-blind, placebo-controlled study was to evaluate the efficacy of oral LC compared to placebo in the acute treatment of migraine. Sixty four patients with the diagnosis of migraine, according to the IHS criteria, were studied prospectively. Patients received LC or placebo once the headache reached moderate or severe intensity for 6 consecutive attacks. With regard to the moderate attacks, LC was superior than placebo after 1, 2 and 4 hours. The consumption of other rescue medications after 4 hours was significantly higher in the placebo group. With regard to the severe attacks, there was no difference between the active drug group and the placebo group concerning headache intensity and consumption of other rescue medications. We conclude that the NSAID lysine clonixinate is effective in treating moderately severe migraine attacks. It is not superior than placebo in treating severe migraine attacks.

  4. Radiological threat assessment and the Federal Response Plan--a gap analysis.

    PubMed

    Conklin, W Craig; Liotta, Philip L

    2005-11-01

    The ability of the federal government to effectively and efficiently respond to nuclear or radiological terrorist attacks has been the subject of intense discussion and analysis for many years. Because of recent terrorist activities and intelligence information, there is strong sentiment that it is not a question of if, but when, a radiological or nuclear terrorist attack will occur. As a result, there is considerable concern that the federal government may not be adequately prepared to respond to an attack involving a radiological dispersal device or improvised nuclear device. In response to these concerns, federal departments and agencies have initiated actions to develop a better understanding of the magnitude of the radiological/nuclear terrorist threat, assess the ability of the federal government to support state and local responses to such attacks, and improve the Nation's ability to prepare for, respond to, and recover from these types of attacks. In an era of limited fiscal growth and competing priorities, the federal government will have to enhance its collaboration with state and local governments, the private sector, and academia to ensure that the Nation is capable of responding to a terrorist attack involving radioactive or nuclear material.

  5. Impact of Protection Motivation Theory and General Deterrence Theory on the Behavioral Intention to Implement and Misuse Active Cyber Defense

    ERIC Educational Resources Information Center

    White, Jautau Kelton

    2017-01-01

    Current cybersecurity measures have become a major concern for commercial organizations in the United States. As the cyber-attack landscape expands and the skills and knowledge of the cyber-attacker become broader, the current measures that are taken and the laws structured around them are making it increasingly difficult for commercial…

  6. Periaqueductal grey stimulation induced panic-like behaviour is accompanied by deactivation of the deep cerebellar nuclei.

    PubMed

    Moers-Hornikx, Véronique M P; Vles, Johan S H; Lim, Lee Wei; Ayyildiz, Mustafa; Kaplan, Suleyman; Gavilanes, Antonio W D; Hoogland, Govert; Steinbusch, Harry W M; Temel, Yasin

    2011-03-01

    Until recently, the cerebellum was primarily considered to be a structure involved in motor behaviour. New anatomical and clinical evidence has shown that the cerebellum is also involved in higher cognitive functions and non-motor behavioural changes. Functional imaging in patients with anxiety disorders and in cholecystokinin tetrapeptide-induced panic-attacks shows activation changes in the cerebellum. Deep brain stimulation of the dorsolateral periaqueductal grey (dlPAG) and the ventromedial hypothalamus (VMH) in rats has been shown to induce escape behaviour, which mimics a panic attack in humans. We used this animal model to study the neuronal activation in the deep cerebellar nuclei (DCbN) using c-Fos immunohistochemistry. c-Fos expression in the DCbN decreased significantly after inducing escape behaviour by stimulation of the dlPAG and the VMH, indicating that the DCbN were deactivated. This study demonstrates that the DCbN are directly or indirectly involved in panic attacks. We suggest that the cerebellum plays a role in the selection of relevant information, and that deactivation of the cerebellar nuclei is required to allow inappropriate behaviour to occur, such as panic attacks.

  7. Socioeconomic burden of hereditary angioedema: results from the hereditary angioedema burden of illness study in Europe.

    PubMed

    Aygören-Pürsün, Emel; Bygum, Anette; Beusterien, Kathleen; Hautamaki, Emily; Sisic, Zlatko; Wait, Suzanne; Boysen, Henrik B; Caballero, Teresa

    2014-07-04

    Hereditary angioedema (HAE) due to C1 inhibitor deficiency is a rare but serious and potentially life-threatening disease marked by spontaneous, recurrent attacks of swelling. The study objective was to characterize direct and indirect resource utilization associated with HAE from the patient perspective in Europe. The study was conducted in Spain, Germany, and Denmark to assess the real-world experience of HAE via a cross-sectional survey of HAE patients, including direct and indirect resource utilization during and between attacks for patients and their caregivers over the past 6 months. A regression model examined predictors of medical resource utilization. Overall, 164 patients had an attack in the past 6 months and were included in the analysis. The most significant predictor of medical resource utilization was the severity of the last attack (OR 2.6; p < 0.001). Among patients who sought medical care during the last attack (23%), more than half utilized the emergency department. The last attack prevented patients from their normal activities an average of 4-12 hours. Patient and caregiver absenteeism increased with attack severity and frequency. Among patients who were working or in school (n = 120), 72 provided work/school absenteeism data, resulting in an estimated 20 days missing from work/school on average per year; 51% (n = 84) indicated that HAE has hindered their career/educational advancement. HAE poses a considerable burden on patients and their families in terms of direct medical costs and indirect costs related to lost productivity. This burden is substantial at the time of attacks and in between attacks.

  8. Developing a Media Moisture Threshold for Nurseries to Reduce Tree Stress and Ambrosia Beetle Attacks.

    PubMed

    Frank, Steven D; Ranger, Christopher M

    2016-08-01

    Exotic ambrosia beetles are among the most damaging pests of trees grown in nurseries. The primary pests Xylosandrus crassiusculus Motschulsky and Xylosandrus germanus Blandford use ethanol to locate vulnerable trees. Research, primarily with X. germanus, has shown that flood-stressed trees emit ethanol and are preferentially attacked by ambrosia beetles. Our goal was to develop a media (also called potting soil) moisture threshold as an integrated pest management (IPM) tactic and assess grower practices that lead to ambrosia beetle attacks. Flooded Cornus florida L., Cornus kousa Burg., and Magnolia grandiflora L. trees incurred more attacks than unflooded trees that were not attacked. To determine optimal media moisture levels, we grew flood-tolerant Acer rubrum L. and flood-intolerant C. florida in containers with 10, 30, 50, 70, or 90% media moisture. No flooded or unflooded A. rubrum were attacked. However, C. florida grown in 70 or 90% moisture were attacked and died, whereas trees at 30 and 50% moisture were not attacked. Thus, we suggest an upper moisture threshold of 50% when growing C. florida and other flood-intolerant trees. However, during peak ambrosia beetle flight activity in spring 2013 and 2014, we found that media moisture levels in commercial nurseries were often between 50 and 90%. Implementing a media moisture threshold, as a new IPM tool, could reduce ambrosia beetle attacks and the need for insecticide applications, which is currently the only available management tactic. Future research should focus on how changes in substrates, irrigation, and other practices could help growers meet this threshold. © The Authors 2016. Published by Oxford University Press on behalf of Entomological Society of America. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  9. Comparing Asian American Women's Knowledge, Self-Efficacy, and Perceived Risk of Heart Attack to Other Racial and Ethnic Groups: The mPED Trial.

    PubMed

    Fukuoka, Yoshimi; Lisha, Nadra E; Vittinghoff, Eric

    2017-09-01

    The aim of the study was to compare knowledge and awareness of heart attacks/heart disease and perceived risk for future heart attack in Asian/Pacific Islander women, compared to other racial and ethnic groups. In this cross-sectional study, 318 women enrolled in a mobile phone-based physical activity education trial were analyzed. Heart attack knowledge, self-efficacy for recognizing and responding to heart attack symptoms, and perceived risk for a future heart attack were measured. Analyses were conducted using logistic, proportional odds, and linear regression models, depending on the outcome and adjusting for age. Pairwise differences between Asian/Pacific Islanders and the other four groups were assessed using a Bonferroni correction (p < 0.0125). Asian/Pacific Islander women had significantly lower total scores for knowledge of heart attack and self-efficacy for heart attack recognition and care seeking behavior compared to the Caucasian women (p = 0.001 and p = 0.002, respectively). However, perceived risk did not differ among the groups. Forty-six percent of the Asian American women, compared to 25% of Caucasian women, falsely believed "breast cancer is the number one cause of death for women (p = 0.002)." In addition, Asian/Pacific Islander women were less likely to report "arm pain, numbness, tingling, or radiating" as one of the heart attack symptoms compared to the Caucasian and the multiracial group (34%, 63% [p < 0.001], and 66% [p = 0.004], respectively). These findings highlight the urgent need to develop effective, tailored campaigns to close the knowledge gap between Asian/Pacific Islander women and Caucasian women.

  10. Racial and ethnic disparities associated with knowledge of symptoms of heart attack and use of 911: National Health Interview Survey, 2001.

    PubMed

    McGruder, Henraya E; Greenlund, Kurt J; Malarcher, Ann M; Antoine, Theresa L; Croft, Janet B; Zheng, Zhi-Jie

    2008-01-01

    Heart attacks are more prevalent among Hispanics and Blacks than among Whites. Bystanders must be able to recognize heart attack symptoms and activate the emergency response system in order to receive time-dependent therapies that increase survival. This study estimated racial/ethnic disparities in awareness of heart attack symptoms in a sample of the US population. We evaluated data from 33,059 adult participants in the 2001 National Health Interview Survey. Respondents indicated their awareness of five heart attack symptoms and the need to call 911 in the presence of such symptoms. Hispanics and Blacks were less likely to recognize each heart attack symptom than were Whites (P<.05). Hispanics (25.6%), people aged 18-24 years (33.6%), men (39.1%), and those with less than a high school education (31.3%) were less likely to recognize all five heart attack symptoms and report that they would call 911 than were Whites (45.8%), Blacks (36.1%), respondents aged 45-64 years (47.7%) and >65 years (43.9%), and those with a high school education (41.0%) or more (45.6%). In multivariate logistic regression analyses, Blacks (OR .73, 95% CI .66-.80) and Hispanics (OR .49, 95% CI .45-.54) were less likely than were Whites to recognize all five heart attack symptoms and the need to call 911 if someone had these symptoms. One Healthy People 2010 goal is to eliminate health disparities. Racial/ethnic disparities exist in knowledge of heart attack symptoms and the need to call 911. Special educational efforts should focus on Black and Hispanic populations and highlight the importance of symptoms and time-dependent therapies.

  11. Socioeconomic burden of hereditary angioedema: results from the hereditary angioedema burden of illness study in Europe

    PubMed Central

    2014-01-01

    Background Hereditary angioedema (HAE) due to C1 inhibitor deficiency is a rare but serious and potentially life-threatening disease marked by spontaneous, recurrent attacks of swelling. The study objective was to characterize direct and indirect resource utilization associated with HAE from the patient perspective in Europe. Methods The study was conducted in Spain, Germany, and Denmark to assess the real-world experience of HAE via a cross-sectional survey of HAE patients, including direct and indirect resource utilization during and between attacks for patients and their caregivers over the past 6 months. A regression model examined predictors of medical resource utilization. Results Overall, 164 patients had an attack in the past 6 months and were included in the analysis. The most significant predictor of medical resource utilization was the severity of the last attack (OR 2.6; p < 0.001). Among patients who sought medical care during the last attack (23%), more than half utilized the emergency department. The last attack prevented patients from their normal activities an average of 4–12 hours. Patient and caregiver absenteeism increased with attack severity and frequency. Among patients who were working or in school (n = 120), 72 provided work/school absenteeism data, resulting in an estimated 20 days missing from work/school on average per year; 51% (n = 84) indicated that HAE has hindered their career/educational advancement. Conclusion HAE poses a considerable burden on patients and their families in terms of direct medical costs and indirect costs related to lost productivity. This burden is substantial at the time of attacks and in between attacks. PMID:24996814

  12. A Methodological Approach for Assessing Amplified Reflection Distributed Denial of Service on the Internet of Things

    PubMed Central

    Costa Gondim, João José; de Oliveira Albuquerque, Robson; Clayton Alves Nascimento, Anderson; García Villalba, Luis Javier; Kim, Tai-Hoon

    2016-01-01

    Concerns about security on Internet of Things (IoT) cover data privacy and integrity, access control, and availability. IoT abuse in distributed denial of service attacks is a major issue, as typical IoT devices’ limited computing, communications, and power resources are prioritized in implementing functionality rather than security features. Incidents involving attacks have been reported, but without clear characterization and evaluation of threats and impacts. The main purpose of this work is to methodically assess the possible impacts of a specific class–amplified reflection distributed denial of service attacks (AR-DDoS)–against IoT. The novel approach used to empirically examine the threat represented by running the attack over a controlled environment, with IoT devices, considered the perspective of an attacker. The methodology used in tests includes that perspective, and actively prospects vulnerabilities in computer systems. This methodology defines standardized procedures for tool-independent vulnerability assessment based on strategy, and the decision flows during execution of penetration tests (pentests). After validation in different scenarios, the methodology was applied in amplified reflection distributed denial of service (AR-DDoS) attack threat assessment. Results show that, according to attack intensity, AR-DDoS saturates reflector infrastructure. Therefore, concerns about AR-DDoS are founded, but expected impact on abused IoT infrastructure and devices will be possibly as hard as on final victims. PMID:27827931

  13. A Methodological Approach for Assessing Amplified Reflection Distributed Denial of Service on the Internet of Things.

    PubMed

    Costa Gondim, João José; de Oliveira Albuquerque, Robson; Clayton Alves Nascimento, Anderson; García Villalba, Luis Javier; Kim, Tai-Hoon

    2016-11-04

    Concerns about security on Internet of Things (IoT) cover data privacy and integrity, access control, and availability. IoT abuse in distributed denial of service attacks is a major issue, as typical IoT devices' limited computing, communications, and power resources are prioritized in implementing functionality rather than security features. Incidents involving attacks have been reported, but without clear characterization and evaluation of threats and impacts. The main purpose of this work is to methodically assess the possible impacts of a specific class-amplified reflection distributed denial of service attacks (AR-DDoS)-against IoT. The novel approach used to empirically examine the threat represented by running the attack over a controlled environment, with IoT devices, considered the perspective of an attacker. The methodology used in tests includes that perspective, and actively prospects vulnerabilities in computer systems. This methodology defines standardized procedures for tool-independent vulnerability assessment based on strategy, and the decision flows during execution of penetration tests (pentests). After validation in different scenarios, the methodology was applied in amplified reflection distributed denial of service (AR-DDoS) attack threat assessment. Results show that, according to attack intensity, AR-DDoS saturates reflector infrastructure. Therefore, concerns about AR-DDoS are founded, but expected impact on abused IoT infrastructure and devices will be possibly as hard as on final victims.

  14. Receipt of outpatient cardiac rehabilitation among heart attack survivors--United States, 2005.

    PubMed

    2008-02-01

    Each year, approximately 865,000 persons in the United States have a myocardial infarction (i.e., heart attack). In 2007, direct and indirect costs of heart disease were estimated at approximately $277.1 billion. Cardiac rehabilitation, an essential component of recovery care after a heart attack, focuses on cardiovascular risk reduction, promoting healthy behaviors, reducing death and disability, and promoting an active lifestyle for heart attack survivors. Current guidelines from the American Heart Association (AHA) and the American Association of Cardiovascular and Pulmonary Rehabilitation emphasize the importance of cardiac rehabilitation, which reduces morbidity and mortality, improves clinical outcomes, enhances psychological recovery, and decreases the risk for secondary cardiac events. To estimate the prevalence of receipt of outpatient cardiac rehabilitation among heart attack survivors in 21 states and the District of Columbia (DC), data from the 2005 Behavioral Risk Factor Surveillance System (BRFSS) were assessed. The results of that assessment indicated that 34.7% of BRFSS respondents who had experienced a heart attack participated in outpatient cardiac rehabilitation. Outpatient cardiac rehabilitation for eligible patients after a heart attack is an essential component of care that should be incorporated into treatment plans. Increasing the number of persons who participate in cardiac rehabilitation services also can reduce health-care costs for recurrent events and reduce the burden on families and caregivers of patients with serious sequelae.

  15. Efficacy of a Community-Based Physical Activity Program KM2H2 for Stroke and Heart Attack Prevention among Senior Hypertensive Patients: A Cluster Randomized Controlled Phase-II Trial

    PubMed Central

    Gong, Jie; Chen, Xinguang; Li, Sijian

    2015-01-01

    Objective To evaluate the efficacy of the program Keep Moving toward Healthy Heart and Healthy Brain (KM2H2) in encouraging physical activities for the prevention of heart attack and stroke among hypertensive patients enrolled in the Community-Based Hypertension Control Program (CBHCP). Design Cluster randomized controlled trial with three waves of longitudinal assessments at baseline, 3 and 6 months post intervention. Setting Community-based and patient-centered self-care for behavioral intervention in urban settings of China. Participants A total of 450 participants diagnosed with hypertension from 12 community health centers in Wuhan, China were recruited, and were randomly assigned by center to receive either KM2H2 plus standard CBHCP care (6 centers and 232 patients) or the standard care only (6 centers and 218 patients). Intervention KM2H2 is a behavioral intervention guided by the Transtheoretical Model, the Model of Personalized Medicine and Social Capital Theory. It consists of six intervention sessions and two booster sessions engineered in a progressive manner. The purpose is to motivate and maintain physical activities for the prevention of heart attack and stroke. Outcome Measures Heart attack and stroke (clinically diagnosed, primary outcome), blood pressure (measured, secondary outcome), and physical activity (self-report, tertiary outcome) were assessed at the individual level during the baseline, 3- and 6-month post-intervention. Results Relative to the standard care, receiving KM2H2 was associated with significant reductions in the incidence of heart attack (3.60% vs. 7.03%, p < .05) and stroke (5.11% vs. 9.90%, p<0.05), and moderate reduction in blood pressure (-3.72mmHg in DBP and -2.92 mmHg in DBP) at 6-month post-intervention; and significant increases in physical activity at 3- (d = 0.53, 95% CI: 0.21, 0.85) and 6-month (d = 0.45, 95% CI: 0.04, 0.85) post-intervention, respectively. Conclusion The program KM2H2 is efficacious to reduce the risk of heart attack and stroke among senior patients who are on anti-hypertensive medication. Findings of this study provide solid data supporting a formal phase-III trial to establish the effectiveness of KM2H2 for use in community settings for prevention. Trial Registration ISRCTN Register ISRCTN12608966 PMID:26426421

  16. Circadian and seasonal variation of migraine attacks in children.

    PubMed

    Soriani, Stefano; Fiumana, Elisa; Manfredini, Roberto; Boari, Benedetta; Battistella, Pier Antonio; Canetta, Elisabetta; Pedretti, Stefania; Borgna-Pignatti, Caterina

    2006-01-01

    To investigate the rhythmicity of migraine episodes without aura in a pediatric population. Time of occurrence of 2517 migraine attacks in 115 children was recorded, by means of a diary, both by hourly and monthly intervals. A significant circadian variation, characterized by a peak in the afternoon (P < .001) and one in the early morning (P= .002) was found. A seasonal peak was also observed between November and January, while a nadir was observed in July. The clustering of attacks in the morning and midday and in autumn-winter, with a minimum frequency in July, suggests that school activities may represent an important cause of migraine.

  17. Application of Piloted Simulation to High-Angle-of-Attack Flight-Dynamics Research for Fighter Aircraft

    NASA Technical Reports Server (NTRS)

    Ogburn, Marilyn E.; Foster, John V.; Hoffler, Keith D.

    2005-01-01

    This paper reviews the use of piloted simulation at Langley Research Center as part of the NASA High-Angle-of-Attack Technology Program (HATP), which was created to provide concepts and methods for the design of advanced fighter aircraft. A major research activity within this program is the development of the design processes required to take advantage of the benefits of advanced control concepts for high-angle-of-attack agility. Fundamental methodologies associated with the effective use of piloted simulation for this research are described, particularly those relating to the test techniques, validation of the test results, and design guideline/criteria development.

  18. General A Scheme to Share Information via Employing Discrete Algorithm to Quantum States

    NASA Astrophysics Data System (ADS)

    Kang, Guo-Dong; Fang, Mao-Fa

    2011-02-01

    We propose a protocol for information sharing between two legitimate parties (Bob and Alice) via public-key cryptography. In particular, we specialize the protocol by employing discrete algorithm under mod that maps integers to quantum states via photon rotations. Based on this algorithm, we find that the protocol is secure under various classes of attacks. Specially, owe to the algorithm, the security of the classical privacy contained in the quantum public-key and the corresponding ciphertext is guaranteed. And the protocol is robust against the impersonation attack and the active wiretapping attack by designing particular checking processing, thus the protocol is valid.

  19. Three-party quantum secure direct communication against collective noise

    NASA Astrophysics Data System (ADS)

    He, Ye-Feng; Ma, Wen-Ping

    2017-10-01

    Based on logical quantum states, two three-party quantum secure direct communication protocols are proposed, which can realize the exchange of the secret messages between three parties with the help of the measurement correlation property of six-particle entangled states. These two protocols can be immune to the collective-dephasing noise and the collective-rotation noise, respectively; neither of them has information leakage problem. The one-way transmission mode ensures that they can congenitally resist against the Trojan horse attacks and the teleportation attack. Furthermore, these two protocols are secure against other active attacks because of the use of the decoy state technology.

  20. Worldwide Threat Assessment of the US Intelligence Community

    DTIC Science & Technology

    2014-01-29

    data-deletion and system- damaging attacks.  In early 2013, the US financial sector faced wide-scale network denial-of-service attacks that...South Sudan Nigeria Central African Republic Democratic Republic of the Congo Lord’s Resistance Army 19 19 19 19 19 20 20 21 21 East Asia...operations, financial activities, and personnel recruitment. Cyber criminal organizations are as ubiquitous as they are problematic on digital

  1. Report on Progress Toward Security and Stability in Afghanistan

    DTIC Science & Technology

    2012-12-01

    availability becomes more difficult further away from the cities. A lack of sufficient progress in governance and sustainable economic ...their confinement to areas away from major population centers. A small number of high-profile attacks (HPAs) occurred during the reporting period...activities were related to criminal networks. A small number of high-profiles attacks (HPAs) occurred during the reporting period. Contrary to insurgents

  2. Self-Regulated Assignment Attack Strategy: Evaluating the Effects of a Classroom-Level Intervention on Student Management of Curricular Activities in a Resource Context

    ERIC Educational Resources Information Center

    Ness, Bryan M.; Sohlberg, McKay Moore

    2013-01-01

    The purpose of this study was to evaluate the impact of a classroom-based strategy instruction package grounded in self-regulated learning. The Self-Regulated Assignment Attack Strategy (SAAS) targeted self-regulation of assignment management and related academic-behavioral variables for 6th grade students in resource support classrooms. SAAS was…

  3. Quantum hacking on a practical continuous-variable quantum cryptosystem by inserting an external light

    NASA Astrophysics Data System (ADS)

    Qin, Hao; Kumar, Rupesh; Alleaume, Romain

    2015-10-01

    We report here a new side channel attack on a practical continuous-variable (CV) quantum key distribution (QKD) system. Inspired by blinding attack in discrete-variable QKD, we formalize an attack strategy by inserting an external light into a CV QKD system implemented Gaussian-modulated coherent state protocol and show that our attack can compromise its practical security. In this attack, we concern imperfections of a balanced homodyne detector used in CV QKD. According to our analysis, if one inserts an external light into Bob's signal port, due to the imperfect subtraction from the homodyne detector, the leakage of the external light contributes a displacement on the homodyne signal which causes detector electronics saturation. In consequence, Bob's quadrature measurement is not linear with the quadrature sent by Alice. By considering such vulnerability, a potential Eve can launch a full intercept-resend attack meanwhile she inserts an external light into Bob's signal port. By selecting proper properties of the external light, Eve actively controls the induced displacement value from the inserted light which results saturation of homodyne detection. In consequence, Eve can bias the excess noise due to the intercept-resend attack and the external light, such that Alice and Bob believe their excess noise estimation is below the null key threshold and they can still share a secret key. Our attack shows that the detector loopholes also exist in CV QKD, and it seems influence all the CV QKD systems using homodyne detection, since all the practical detectors have finite detection range.

  4. Public perception and risk communication in regard to bioterrorism against animals and plants.

    PubMed

    Pearson, G S

    2006-04-01

    This paper examines the total international prohibition on the use of disease to attack humans, animals and plants, noting that in the past several countries had developed programmes for attacks on animals and plants as well as humans. Current activities undertaken by intergovernmental organisations - the World Health Organization (WHO), Food and Agricultural Organization (FAO) and World Organisation for Animal Health (OIE)--to counter the threat of attacks on humans, animals and plants are examined. Effective countermeasures to deliberate attacks need to be developed in harmony with existing measures to control natural or accidental outbreaks of disease. Finally the paper assesses the risk and the public perception of it, and considers what risk communication is needed and to whom. Clear mandates are needed for the FAO and OIE to be prepared to deal with outbreaks of disease, and with contamination of the food supply chain, whether accidental or intentional.

  5. Who will attack the competitors? How political parties resolve strategic and collective action dilemmas in negative campaigning

    PubMed Central

    Dolezal, Martin; Müller, Wolfgang C

    2015-01-01

    Negative campaigning presents parties with a collective action problem. While parties would prefer to have their competitors attacked, potential backlash effects from negative messages mean that individual politicians typically lack the incentives to carry out such attacks. We theorize that parties solve this problem by implementing a division of labour that takes into account the incentives of individual office holders, their availability for campaign activity, and media relevance. Drawing on these arguments we expect that holders of high public office and party leaders are less likely to issue attacks, leaving the bulk of the ‘dirty work’ to be carried out by party floor leaders and general secretaries. Examining almost 8000 press releases issued by over 600 individual politicians during four election campaigns in Austria, we find strong support for our theoretical expectations. PMID:28989298

  6. Risk analysis of chemical, biological, or radionuclear threats: implications for food security.

    PubMed

    Mohtadi, Hamid; Murshid, Antu Panini

    2009-09-01

    If the food sector is attacked, the likely agents will be chemical, biological, or radionuclear (CBRN). We compiled a database of international terrorist/criminal activity involving such agents. Based on these data, we calculate the likelihood of a catastrophic event using extreme value methods. At the present, the probability of an event leading to 5,000 casualties (fatalities and injuries) is between 0.1 and 0.3. However, pronounced, nonstationary patterns within our data suggest that the "reoccurrence period" for such attacks is decreasing every year. Similarly, disturbing trends are evident in a broader data set, which is nonspecific as to the methods or means of attack. While at the present the likelihood of CBRN events is quite low, given an attack, the probability that it involves CBRN agents increases with the number of casualties. This is consistent with evidence of "heavy tails" in the distribution of casualties arising from CBRN events.

  7. Patch time allocation and oviposition behavior in response to patch quality and the presence of a generalist predator in Meteorus pulchricornis (Hymenoptera: Braconidae).

    PubMed

    Sheng, Sheng; Ling, Meng; Fu-An, Wu; Baoping, Li

    2015-01-01

    Foraging parasitoids often must estimate local risk of predation just as they must estimate local patch value. Here, we investigate the effects a generalist predator Chlaenius bioculatus (Coleoptera: Carabidae), has on the oviposition behavior and the patch residence decisions of a solitary parasitoid Meteorus pulchricornis (Hymenoptera: Braconidae) in response to the varying host quality of Spodoptera litura (Lepidoptera: Noctuidae) larvae (L2 and L4). M. pulchricornis attacked more L4 than on L2 hosts, with the difference in attack rate varying depending on predation treatments, greater in the presence (either actively feeding or not) of the predator than in the absence of it. The parasitoid attacked fewer L2 and L4 hosts when the predator was actively feeding than when it was not feeding or not present in the patch. M. pulchricornis decreased the patch leaving tendency with increasing rejections of hosts, but increased the tendency in response to the presence of the predator as compared with the absence of it, and furthermore, increased the patch leaving tendency when the predator was actively feeding as compared with when it was not. Our study suggests that M. pulchricornis can exploit high quality patches while minimizing predation risk, by attacking more hosts in high quality patches while reducing total patch time in response to risk of predation. © The Author 2015. Published by Oxford University Press on behalf of the Entomological Society of America.

  8. Predator personality structures prey communities and trophic cascades.

    PubMed

    Start, Denon; Gilbert, Benjamin

    2017-03-01

    Intraspecific variation is central to our understanding of evolution and population ecology, yet its consequences for community ecology are poorly understood. Animal personality - consistent individual differences in suites of behaviours - may be particularly important for trophic dynamics, where predator personality can determine activity rates and patterns of attack. We used mesocosms with aquatic food webs in which the top predator (dragonfly nymphs) varied in activity and subsequent attack rates on zooplankton, and tested the effects of predator personality. We found support for four hypotheses: (1) active predators disproportionately reduce the abundance of prey, (2) active predators select for predator-resistant prey species, (3) active predators strengthen trophic cascades (increase phytoplankton abundance) and (4) active predators are more likely to cannibalise one another, weakening all other trends when at high densities. These results suggest that intraspecific variation in predator personality is an important determinant of prey abundance, community composition and trophic cascades. © 2017 John Wiley & Sons Ltd/CNRS.

  9. Methotrexate

    MedlinePlus

    ... and sometimes other medications to treat severe active rheumatoid arthritis (RA; a condition in which the body attacks ... to stop scales from forming. Methotrexate may treat rheumatoid arthritis by decreasing the activity of the immune system.

  10. Factors governing risk of cougar attacks on humans

    USGS Publications Warehouse

    Mattson, David; Logan, Kenneth; Sweanor, Linda

    2011-01-01

    Since the 1980s wildlife managers in the United States and Canada have expressed increasing concern about the physical threat posed by cougars (Puma concolor) to humans. We developed a conceptual framework and analyzed 386 human–cougar encounters (29 fatal attacks, 171 instances of nonfatal contact, and 186 close-threatening encounters) to provide information relevant to public safety. We conceived of human injury and death as the outcome of 4 transitions affected by different suites of factors: (1) a human encountering a cougar: (2) given an encounter, odds that the cougar would be aggressive; (3) given aggression, odds that the cougar would attack; and (4) given an attack, odds that the human would die. We developed multivariable logistic regression models to explain variation in odds at transitions three and four using variables pertaining to characteristics of involved people and cougars. Young (≤ 2.5 years) or unhealthy (by weight, condition, or disease) cougars were more likely than any others to be involved in close (typically <5 m) encounters that threatened the involved person. Of cougars in close encounters, females were more likely than males to attack, and of attacking animals, adults were more likely than juveniles to kill the victim (32% versus 9% fatality, respectively). During close encounters, victims who used a weapon killed the involved cougar in 82% of cases. Other mitigating behaviors (e.g., yelling, backing away, throwing objects, increasing stature) also substantially lessened odds of attack. People who were moving quickly or erratically when an encounter happened (running, playing, skiing, snowshoeing, biking, ATV-riding) were more likely to be attacked and killed compared to people who were less active (25% versus 8% fatality). Children (≤ 10 years) were more likely than single adults to be attacked, but intervention by people of any age reduced odds of a child’s death by 4.6×. Overall, cougar attacks on people in Canada and the United States were rare (currently 4 to 6/year) compared to attacks by large felids and wolves (Canis lupus) in Africa and Asia (hundreds to thousands/year).

  11. Risk Due to Radiological Terror Attacks With Natural Radionuclides

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Friedrich, Steinhaeusler; Lyudmila, Zaitseva; Stan, Rydell

    The naturally occurring radionuclides radium (Ra-226) and polonium (Po-210) have the potential to be used for criminal acts. Analysis of international incident data contained in the Database on Nuclear Smuggling, Theft and Orphan Radiation Sources (CSTO), operated at the University of Salzburg, shows that several acts of murder and terrorism with natural radionuclides have already been carried out in Europe and Russia. Five different modes of attack (T) are possible: (1) Covert irradiation of an individual in order to deliver a high individual dose; (2) Covert irradiation of a group of persons delivering a large collective dose; (3) Contamination ofmore » food or drink; (4) Generation of radioactive aerosols or solutions; (5) Combination of Ra-226 with conventional explosives (Dirty Bomb).This paper assesses the risk (R) of such criminal acts in terms of: (a) Probability of terrorist motivation deploying a certain attack mode T; (b) Probability of success by the terrorists for the selected attack mode T; (c) Primary damage consequence (C) to the attacked target (activity, dose); (d) Secondary damage consequence (C') to the attacked target (psychological and socio-economic effects); (e) Probability that the consequences (C, C') cannot be brought under control, resulting in a failure to manage successfully the emergency situation due to logistical and/or technical deficits in implementing adequate countermeasures. Extensive computer modelling is used to determine the potential impact of such a criminal attack on directly affected victims and on the environment.« less

  12. Risk Due to Radiological Terror Attacks With Natural Radionuclides

    NASA Astrophysics Data System (ADS)

    Friedrich, Steinhäusler; Stan, Rydell; Lyudmila, Zaitseva

    2008-08-01

    The naturally occurring radionuclides radium (Ra-226) and polonium (Po-210) have the potential to be used for criminal acts. Analysis of international incident data contained in the Database on Nuclear Smuggling, Theft and Orphan Radiation Sources (CSTO), operated at the University of Salzburg, shows that several acts of murder and terrorism with natural radionuclides have already been carried out in Europe and Russia. Five different modes of attack (T) are possible: (1) Covert irradiation of an individual in order to deliver a high individual dose; (2) Covert irradiation of a group of persons delivering a large collective dose; (3) Contamination of food or drink; (4) Generation of radioactive aerosols or solutions; (5) Combination of Ra-226 with conventional explosives (Dirty Bomb). This paper assesses the risk (R) of such criminal acts in terms of: (a) Probability of terrorist motivation deploying a certain attack mode T; (b) Probability of success by the terrorists for the selected attack mode T; (c) Primary damage consequence (C) to the attacked target (activity, dose); (d) Secondary damage consequence (C') to the attacked target (psychological and socio-economic effects); (e) Probability that the consequences (C, C') cannot be brought under control, resulting in a failure to manage successfully the emergency situation due to logistical and/or technical deficits in implementing adequate countermeasures. Extensive computer modelling is used to determine the potential impact of such a criminal attack on directly affected victims and on the environment.

  13. Comparison of serum oxidant and antioxidant parameters in familial Mediterranean fever patients (FMF) with attack free period.

    PubMed

    Şahin, Ali; Erten, Şükran; Altunoğlu, Alpaslan; Işıkoğlu, Semra; Neşelioğlu, Salim; Ergin, Merve; Atalay, Hacı Veli; Erel, Özcan

    2014-01-01

    Familial Mediterranean fever (FMF) is an autoinflammatory, autosomal recessive, inherited disease characterized by recurrent self-limiting attacks of serosal surfaces. The imbalance of oxidants/antioxidants may play a role in such attacks. In this study, we aimed to evaluate the relationship between serum paraoxonase (PON1) activity, PON1 phenotype, and other parameters in patients with FMF and healthy controls. A total of 120 FMF patients with an attack-free period (AFP) and 65 healthy subjects were included in this study. The serum PON1 activity, stimulated paraoxonase (SPON) activity, PON1 phenotype (representing Q192R polymorphism; QQ, QR, RR), arylesterase activity, total oxidant status (TOS), total antioxidant capacity (TAC), oxidative stress index (OSI), advanced oxidative protein products (AOPP), total thiols (TTL), and ischemia-modified albumin (IMA) and cystatin-c (CYS-C) levels were measured. For the QQ phenotype, the median TTL and AOPP levels of the control group were 264.50 (57.75) mol/L and 21.26 (21.17) mmol/L, respectively, whereas the median TTL, AOPP levels of the patients were 309.00 (47.00) mol/L and 12.98 (6.96) mmol/L, respectively. There was a statistically significant difference between the patients and controls with the QQ phenotype in terms of TTL and AOPP (p< 0.001 and p= 0.004, respectively). However, there were no statistically significant differences between the QQ and QR+RR phenotypes with respect to TAC, TOS, OSI, or the other parameters. The FMF patients with AFP had higher TTL and lower AOPP levels than the controls. However, other oxidant and antioxidant parameters were similar among the patients during AFP and the controls.

  14. The neurobiology of abnormal manifestations of aggression--a review of hypothalamic mechanisms in cats, rodents, and humans.

    PubMed

    Haller, Jozsef

    2013-04-01

    Aggression research was for long dominated by the assumption that aggression-related psychopathologies result from the excessive activation of aggression-promoting brain mechanisms. This assumption was recently challenged by findings with models of aggression that mimic etiological factors of aggression-related psychopathologies. Subjects submitted to such procedures show abnormal attack features (mismatch between provocation and response, disregard of species-specific rules, and insensitivity toward the social signals of opponents). We review here 12 such laboratory models and the available human findings on the neural background of abnormal aggression. We focus on the hypothalamus, a region tightly involved in the execution of attacks. Data show that the hypothalamic mechanisms controlling attacks (general activation levels, local serotonin, vasopressin, substance P, glutamate, GABA, and dopamine neurotransmission) undergo etiological factor-dependent changes. Findings suggest that the emotional component of attacks differentiates two basic types of hypothalamic mechanisms. Aggression associated with increased arousal (emotional/reactive aggression) is paralleled by increased mediobasal hypothalamic activation, increased hypothalamic vasopressinergic, but diminished hypothalamic serotonergic neurotransmission. In aggression models associated with low arousal (unemotional/proactive aggression), the lateral but not the mediobasal hypothalamus is over-activated. In addition, the anti-aggressive effect of serotonergic neurotransmission is lost and paradoxical changes were noticed in vasopressinergic neurotransmission. We conclude that there is no single 'neurobiological road' to abnormal aggression: the neural background shows qualitative, etiological factor-dependent differences. Findings obtained with different models should be viewed as alternative mechanisms rather than conflicting data. The relevance of these findings for understanding and treating of aggression-related psychopathologies is discussed. This article is part of a Special Issue entitled 'Extrasynaptic ionotropic receptors'. Copyright © 2012 Elsevier Inc. All rights reserved.

  15. Assessment of aerodynamic performance of V/STOL and STOVL fighter aircraft

    NASA Technical Reports Server (NTRS)

    Nelms, W. P.

    1984-01-01

    The aerodynamic performance of V/STOL and STOVL fighter/attack aircraft was assessed. Aerodynamic and propulsion/airframe integration activities are described and small and large scale research programs are considered. Uncertainties affecting aerodynamic performance that are associated with special configuration features resulting from the V/STOL requirement are addressed. Example uncertainties relate to minimum drag, wave drag, high angle of attack characteristics, and power induced effects.

  16. Extended Deterrence and Allied Assurance: Key Concepts and Current Challenges for U.S. Policy

    DTIC Science & Technology

    2013-09-01

    include adversary nuclear forces and stockpiles) in the pre- satellite era required a strategy using large numbers of bombers, large numbers of...radar and sensor capabilities related to TMD, activities Canberra considered important to “bolstering 59 the [U.S.-Australia] alliance.” 146 In...external attack; with potential adversaries developing anti- satellite 90 capabilities, and conducting cyber incursions and attacks against U.S. and

  17. Research on Network Defense Strategy Based on Honey Pot Technology

    NASA Astrophysics Data System (ADS)

    Hong, Jianchao; Hua, Ying

    2018-03-01

    As a new network security technology of active defense, The honeypot technology has become a very effective and practical method of decoy attackers. The thesis discusses the theory, structure, characteristic, design and implementation of Honeypot in detail. Aiming at the development of means of attack, put forward a kind of network defense technology based on honeypot technology, constructing a virtual Honeypot demonstrate the honeypot’s functions.

  18. Achieving Homeland Security in a Time of Diminishing Resources

    DTIC Science & Technology

    2012-06-08

    and merged over 22 federal agencies and programs under the DHS umbrella. The overall mission of DHS is to enact “ a concerted national effort to ensure... A concerted national effort to prevent terrorist attacks within the United States; reduce America’s vulnerability to terrorism, major disasters...activity or effort performed to protect a nation against attack or other threats National Security. Requirement to maintain the survival of the state

  19. Unraveling the contribution of pancreatic beta-cell suicide in autoimmune type 1 diabetes✩

    PubMed Central

    Jaberi-Douraki, Majid; Schnell, Santiago; Pietropaolo, Massimo; Khadra, Anmar

    2014-01-01

    In type 1 diabetes, an autoimmune disease mediated by autoreactive T-cells that attack insulin-secreting pancreatic beta-cells, it has been suggested that disease progression may additionally require protective mechanisms in the target tissue to impede such auto-destructive mechanisms. We hypothesize that the autoimmune attack against beta-cells causes endoplasmic reticulum stress by forcing the remaining beta-cells to synthesize and secrete defective insulin. To rescue beta-cell from the endoplasmic reticulum stress, beta-cells activate the unfolded protein response to restore protein homeostasis and normal insulin synthesis. Here we investigate the compensatory role of unfolded protein response by developing a multi-state model of type 1 diabetes that takes into account beta-cell destruction caused by pathogenic autoreactive T-cells and apoptosis triggered by endoplasmic reticulum stress. We discuss the mechanism of unfolded protein response activation and how it counters beta-cell extinction caused by an autoimmune attack and/or irreversible damage by endoplasmic reticulum stress. Our results reveal important insights about the balance between beta-cell destruction by autoimmune attack (beta-cell homicide) and beta-cell apoptosis by endoplasmic reticulum stress (beta-cell suicide). It also provides an explanation as to why the unfolded protein response may not be a successful therapeutic target to treat type 1 diabetes. PMID:24831415

  20. DNS Rebinding Attacks

    DTIC Science & Technology

    2009-09-01

    active scripting, file downloads, installation of desktop items, signed and unsigned ActiveX controls, Java permissions, launching applications and...files in an IFRAME, running ActiveX controls and plug-ins, and scripting of Java applets [49]. This security measure is very effective against DNS

  1. Methotrexate Injection

    MedlinePlus

    ... and sometimes other medications to treat severe active rheumatoid arthritis (RA; a condition in which the body attacks ... to stop scales from forming. Methotrexate may treat rheumatoid arthritis by decreasing the activity of the immune system.

  2. Protective responses to sublytic complement in the retinal pigment epithelium

    PubMed Central

    Tan, Li Xuan; Toops, Kimberly A.; Lakkaraju, Aparna

    2016-01-01

    The retinal pigment epithelium (RPE) is a key site of injury in inherited and age-related macular degenerations. Abnormal activation of the complement system is a feature of these blinding diseases, yet how the RPE combats complement attack is poorly understood. The complement cascade terminates in the cell-surface assembly of membrane attack complexes (MACs), which promote inflammation by causing aberrant signal transduction. Here, we investigated mechanisms crucial for limiting MAC assembly and preserving cellular integrity in the RPE and asked how these are compromised in models of macular degeneration. Using polarized primary RPE and the pigmented Abca4−/− Stargardt disease mouse model, we provide evidence for two protective responses occurring within minutes of complement attack, which are essential for maintaining mitochondrial health in the RPE. First, accelerated recycling of the membrane-bound complement regulator CD59 to the RPE cell surface inhibits MAC formation. Second, fusion of lysosomes with the RPE plasma membrane immediately after complement attack limits sustained elevations in intracellular calcium and prevents mitochondrial injury. Cholesterol accumulation in the RPE, induced by vitamin A dimers or oxidized LDL, inhibits these defense mechanisms by activating acid sphingomyelinase (ASMase), which increases tubulin acetylation and derails organelle traffic. Defective CD59 recycling and lysosome exocytosis after complement attack lead to mitochondrial fragmentation and oxidative stress in the RPE. Drugs that stimulate cholesterol efflux or inhibit ASMase restore both these critical safeguards in the RPE and avert complement-induced mitochondrial injury in vitro and in Abca4−/− mice, indicating that they could be effective therapeutic approaches for macular degenerations. PMID:27432952

  3. A Novel Topology Link-Controlling Approach for Active Defense of a Node in a Network.

    PubMed

    Li, Jun; Hu, HanPing; Ke, Qiao; Xiong, Naixue

    2017-03-09

    With the rapid development of virtual machine technology and cloud computing, distributed denial of service (DDoS) attacks, or some peak traffic, poses a great threat to the security of the network. In this paper, a novel topology link control technique and mitigation attacks in real-time environments is proposed. Firstly, a non-invasive method of deploying virtual sensors in the nodes is built, which uses the resource manager of each monitored node as a sensor. Secondly, a general topology-controlling approach of resisting the tolerant invasion is proposed. In the proposed approach, a prediction model is constructed by using copula functions for predicting the peak of a resource through another resource. The result of prediction determines whether or not to initiate the active defense. Finally, a minority game with incomplete strategy is employed to suppress attack flows and improve the permeability of the normal flows. The simulation results show that the proposed approach is very effective in protecting nodes.

  4. [Dangerous sharks in tropical seas].

    PubMed

    Maslin, J; Menard, G; Drouin, C; Pollet, L

    2000-01-01

    Sightseeing travel in tropical zones is a growing industry. The risks incurred by travelers depend on the destination, duration of stay, individual behavior, and type of leisure activity. Water sports expose visitors to encounters with dangerous marine animals. Shark attacks are rare but always serious occurrences. Divers should handle any shark, regardless of size, with due precaution. Prevention of shark attack depends on avoiding encounters by not attracting the attention of the shark and knowing the proper attitude to adopt in case an encounter should occur. Active and passive protection can be used, but each method has advantages and disadvantages depending on the situation. Rescue operations are difficult due to the gravity of injuries and their occurrence in a marine environment. This along with the nature of the aggressor explain that many attacks are immediately fatal. Wounds are often deep with involvement of bone, blood vessels, and nerves. A possible source of complication in survivors is infection, which can involve uncommon microorganisms associated with bacteria in sharks mouth or marine environment.

  5. A Novel Topology Link-Controlling Approach for Active Defense of Nodes in Networks

    PubMed Central

    Li, Jun; Hu, HanPing; Ke, Qiao; Xiong, Naixue

    2017-01-01

    With the rapid development of virtual machine technology and cloud computing, distributed denial of service (DDoS) attacks, or some peak traffic, poses a great threat to the security of the network. In this paper, a novel topology link control technique and mitigation attacks in real-time environments is proposed. Firstly, a non-invasive method of deploying virtual sensors in the nodes is built, which uses the resource manager of each monitored node as a sensor. Secondly, a general topology-controlling approach of resisting the tolerant invasion is proposed. In the proposed approach, a prediction model is constructed by using copula functions for predicting the peak of a resource through another resource. The result of prediction determines whether or not to initiate the active defense. Finally, a minority game with incomplete strategy is employed to suppress attack flows and improve the permeability of the normal flows. The simulation results show that the proposed approach is very effective in protecting nodes. PMID:28282962

  6. Morning ambush attacks by black-footed ferrets on emerging prairie dogs

    USGS Publications Warehouse

    Eads, D.A.; Biggins, D.E.; Jachowski, D.S.; Livieri, T.M.; Millspaugh, J.J.; Forsberg, M.

    2010-01-01

    Black-footed ferrets (Mustela nigripes) often hunt at night, attacking normally diurnal prairie dogs (Cynomys spp.) in underground burrow systems. While monitoring black-footed ferrets in South Dakota during morning daylight hours, we observed an adult female ferret ambush a black-tailed prairie dog (C. ludovicianus) emerging from a burrow. On a neighboring colony, we observed a second adult female ferret engaging in similar ambush behaviors on 12 occasions, although prey was not visible. We retrospectively assessed radio-telemetry data on white-tailed prairie dogs (C. leucurus) and a male and a female ferret to evaluate ferret activity in relation to timing of prairie dog emergence. Activity of radio-collared ferrets was high during the hourly period when prairie dogs first emerged and the following 2 hr, relative to later daylight hours. Such behavior is consistent with behaviors observed in South Dakota. Nighttime movements by ferrets might involve hunting but also reconnaissance of prey preparatory to morning ambush attacks.

  7. Optimal Resource Allocation in Electrical Network Defense

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Yao, Y; Edmunds, T; Papageorgiou, D

    2004-01-15

    Infrastructure networks supplying electricity, natural gas, water, and other commodities are at risk of disruption due to well-engineered and coordinated terrorist attacks. Countermeasures such as hardening targets, acquisition of spare critical components, and surveillance can be undertaken to detect and deter these attacks. Allocation of available countermeasures resources to sites or activities in a manner that maximizes their effectiveness is a challenging problem. This allocation must take into account the adversary's response after the countermeasure assets are in place and consequence mitigation measures the infrastructure operation can undertake after the attack. The adversary may simply switch strategies to avoid countermeasuresmore » when executing the attack. Stockpiling spares of critical energy infrastructure components has been identified as a key element of a grid infrastructure defense strategy in a recent National Academy of Sciences report [1]. Consider a scenario where an attacker attempts to interrupt the service of an electrical network by disabling some of its facilities while a defender wants to prevent or minimize the effectiveness of any attack. The interaction between the attacker and the defender can be described in three stages: (1) The defender deploys countermeasures, (2) The attacker disrupts the network, and (3) The defender responds to the attack by rerouting power to maintain service while trying to repair damage. In the first stage, the defender considers all possible attack scenarios and deploys countermeasures to defend against the worst scenarios. Countermeasures can include hardening targets, acquiring spare critical components, and installing surveillance devices. In the second stage, the attacker, with full knowledge of the deployed countermeasures, attempts to disable some nodes or links in the network to inflict the greatest loss on the defender. In the third stage, the defender re-dispatches power and restores disabled nodes or links to minimize the loss. The loss can be measured in costs, including the costs of using more expensive generators and the economic losses that can be attributed to loss of load. The defender's goal is to minimize the loss while the attacker wants to maximize it. Assuming some level of budget constraint, each side can only defend or attack a limited number of network elements. When an element is attacked, it is assumed that it will be totally disabled. It is assumed that when an element is defended it cannot be disabled, which may mean that it will be restored in a very short time after being attacked. The rest of the paper is organized as follows. Section 2 will briefly review literature related to multilevel programming and network defense. Section 3 presents a mathematical formulation of the electrical network defense problem. Section 4 describes the solution algorithms. Section 5 discusses computational results. Finally, Sec. 6 explores future research directions.« less

  8. Nature, nurture, and microbes: The development of multiple sclerosis.

    PubMed

    Wekerle, H

    2017-11-01

    This paper argues that multiple sclerosis (MS) is the result of an autoimmune attack against components of the central nervous system (CNS). The effector cells involved in the pathogenic process are CNS-autoreactive T cells present in the healthy immune system in a resting state. Upon activation, these cells cross the blood-brain barrier and attack the CNS target tissue. Recent evidence indicates that autoimmune activation may happen in the intestine, following an interaction of bacterial components of the gut flora with local CNS autoreactive T cells. The consequences of this concept are discussed. © 2017 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.

  9. Cyber / Physical Security Vulnerability Assessment Integration

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    MacDonald, Douglas G.; Simpkins, Bret E.

    Abstract Both physical protection and cyber security domains offer solutions for the discovery of vulnerabilities through the use of various assessment processes and software tools. Each vulnerability assessment (VA) methodology provides the ability to identify and categorize vulnerabilities, and quantifies the risks within their own areas of expertise. Neither approach fully represents the true potential security risk to a site and/or a facility, nor comprehensively assesses the overall security posture. The technical approach to solving this problem was to identify methodologies and processes that blend the physical and cyber security assessments, and develop tools to accurately quantify the unaccounted formore » risk. SMEs from both the physical and the cyber security domains developed the blending methodologies, and cross trained each other on the various aspects of the physical and cyber security assessment processes. A local critical infrastructure entity volunteered to host a proof of concept physical/cyber security assessment, and the lessons learned have been leveraged by this effort. The four potential modes of attack an adversary can use in approaching a target are; Physical Only Attack, Cyber Only Attack, Physical Enabled Cyber Attack, and the Cyber Enabled Physical Attack. The Physical Only and the Cyber Only pathway analysis are two of the most widely analyzed attack modes. The pathway from an off-site location to the desired target location is dissected to ensure adversarial activity can be detected and neutralized by the protection strategy, prior to completion of a predefined task. This methodology typically explores a one way attack from the public space (or common area) inward towards the target. The Physical Enabled Cyber Attack and the Cyber Enabled Physical Attack are much more intricate. Both scenarios involve beginning in one domain to affect change in the other, then backing outward to take advantage of the reduced system effectiveness, before penetrating further into the defenses. The proper identification and assessment of the overlapping areas (and interaction between these areas) in the VA process is necessary to accurately assess the true risk.« less

  10. Network Analysis of Reconnaissance and Intrusion of an Industrial Control System

    DTIC Science & Technology

    2016-09-01

    simulated a plant engineer using the engineering workstation web browser to authenticate to the vegetable cooker HMI. While the engineer established the...observed the vegetable cooker HMI web display, the attacker stopped capturing network traffic. Acting as the attacker, we searched the attacker’s pcap...manually controlled by human activity. In this testbed network, only web browser traffic (HTTP) is created by an operator to view an HMI status

  11. Bypass Ratio: The US Air Force and Light-Attack Aviation

    DTIC Science & Technology

    2013-06-01

    for making recommendations which optimize base activity and its impact on the environment. Local and state politics can keep a base open even if it is...for the region, and this conduct can affect global commerce. Such disruption and destabilization in turn can have large impacts on the US diplomatic... IFR ) operations, emergency procedures, low-level flight and two-ship formation flight by this stage. Once track selection occurs, the light-attack

  12. CTC Sentinel. Volume 5, Issue 8, August 2012

    DTIC Science & Technology

    2012-08-01

    Cyberterrorism: Capturing a Broad Range of Activities in Cyberspace By Jonalan Brickey 6 Pakistani Taliban Renew Attacks on Punjabi Heartland By Arif Rafiq...Agency, U.S. Northern Command, and U.S. Army Central Command. Pakistani Taliban Renew Attacks on Punjabi Heartland By Arif Rafiq after an extended...Lashkar-i-Tayyiba as well as the various Punjabi Taliban groups. 25 The Punjab police have made some important arrests in the past year. In

  13. Effect of using different cover image quality to obtain robust selective embedding in steganography

    NASA Astrophysics Data System (ADS)

    Abdullah, Karwan Asaad; Al-Jawad, Naseer; Abdulla, Alan Anwer

    2014-05-01

    One of the common types of steganography is to conceal an image as a secret message in another image which normally called a cover image; the resulting image is called a stego image. The aim of this paper is to investigate the effect of using different cover image quality, and also analyse the use of different bit-plane in term of robustness against well-known active attacks such as gamma, statistical filters, and linear spatial filters. The secret messages are embedded in higher bit-plane, i.e. in other than Least Significant Bit (LSB), in order to resist active attacks. The embedding process is performed in three major steps: First, the embedding algorithm is selectively identifying useful areas (blocks) for embedding based on its lighting condition. Second, is to nominate the most useful blocks for embedding based on their entropy and average. Third, is to select the right bit-plane for embedding. This kind of block selection made the embedding process scatters the secret message(s) randomly around the cover image. Different tests have been performed for selecting a proper block size and this is related to the nature of the used cover image. Our proposed method suggests a suitable embedding bit-plane as well as the right blocks for the embedding. Experimental results demonstrate that different image quality used for the cover images will have an effect when the stego image is attacked by different active attacks. Although the secret messages are embedded in higher bit-plane, but they cannot be recognised visually within the stegos image.

  14. A national survey of stress reactions after the September 11, 2001, terrorist attacks.

    PubMed

    Schuster, M A; Stein, B D; Jaycox, L; Collins, R L; Marshall, G N; Elliott, M N; Zhou, A J; Kanouse, D E; Morrison, J L; Berry, S H

    2001-11-15

    People who are not present at a traumatic event may also experience stress reactions. We assessed the immediate mental health effects of the terrorist attacks on September 11, 2001. Using random-digit dialing three to five days after September 11, we interviewed a nationally representative sample of 569 U.S. adults about their reactions to the terrorist attacks and their perceptions of their children's reactions. Forty-four percent of the adults reported one or more substantial stress symptoms; 91 percent had one or more symptoms to at least some degree. Respondents throughout the country reported stress syndromes. They coped by talking with others (98 percent), turning to religion (90 percent), participating in group activities (60 percent), and making donations (36 percent). Eighty-five percent of parents reported that they or other adults in the household had talked to their children about the attacks for an hour or more; 34 percent restricted their children's television viewing. Thirty-five percent of children had one or more stress symptoms, and 47 percent were worried about their own safety or the safety of loved ones. After the September 11 terrorist attacks, Americans across the country, including children, had substantial symptoms of stress. Even clinicians who practice in regions that are far from the recent attacks should be prepared to assist people with trauma-related symptoms of stress.

  15. A likelihood ratio anomaly detector for identifying within-perimeter computer network attacks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Grana, Justin; Wolpert, David; Neil, Joshua

    The rapid detection of attackers within firewalls of enterprise computer networks is of paramount importance. Anomaly detectors address this problem by quantifying deviations from baseline statistical models of normal network behavior and signaling an intrusion when the observed data deviates significantly from the baseline model. But, many anomaly detectors do not take into account plausible attacker behavior. As a result, anomaly detectors are prone to a large number of false positives due to unusual but benign activity. Our paper first introduces a stochastic model of attacker behavior which is motivated by real world attacker traversal. Then, we develop a likelihoodmore » ratio detector that compares the probability of observed network behavior under normal conditions against the case when an attacker has possibly compromised a subset of hosts within the network. Since the likelihood ratio detector requires integrating over the time each host becomes compromised, we illustrate how to use Monte Carlo methods to compute the requisite integral. We then present Receiver Operating Characteristic (ROC) curves for various network parameterizations that show for any rate of true positives, the rate of false positives for the likelihood ratio detector is no higher than that of a simple anomaly detector and is often lower. Finally, we demonstrate the superiority of the proposed likelihood ratio detector when the network topologies and parameterizations are extracted from real-world networks.« less

  16. A likelihood ratio anomaly detector for identifying within-perimeter computer network attacks

    DOE PAGES

    Grana, Justin; Wolpert, David; Neil, Joshua; ...

    2016-03-11

    The rapid detection of attackers within firewalls of enterprise computer networks is of paramount importance. Anomaly detectors address this problem by quantifying deviations from baseline statistical models of normal network behavior and signaling an intrusion when the observed data deviates significantly from the baseline model. But, many anomaly detectors do not take into account plausible attacker behavior. As a result, anomaly detectors are prone to a large number of false positives due to unusual but benign activity. Our paper first introduces a stochastic model of attacker behavior which is motivated by real world attacker traversal. Then, we develop a likelihoodmore » ratio detector that compares the probability of observed network behavior under normal conditions against the case when an attacker has possibly compromised a subset of hosts within the network. Since the likelihood ratio detector requires integrating over the time each host becomes compromised, we illustrate how to use Monte Carlo methods to compute the requisite integral. We then present Receiver Operating Characteristic (ROC) curves for various network parameterizations that show for any rate of true positives, the rate of false positives for the likelihood ratio detector is no higher than that of a simple anomaly detector and is often lower. Finally, we demonstrate the superiority of the proposed likelihood ratio detector when the network topologies and parameterizations are extracted from real-world networks.« less

  17. 75 FR 36423 - Government-Owned Inventions; Availability for Licensing

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-25

    ... tested for antimicrobial activity against drug resistant bacteria, methicillin- resistant Staphylococcus.... Advantages: Structurally distinct antimicrobial compounds. Attack newly validated antibacterial targeted... GTPase activity. Inhibit drug-susceptible and drug-resistant bacteria. Development Status: [[Page 36424...

  18. Our Diets May Be Killing Us.

    ERIC Educational Resources Information Center

    Shannon, Brenda K. J.

    1995-01-01

    Describes a Food-Choice Unit that includes the following activities: drawing circle graphs, graphing dietary content, understanding heart attacks, reducing dietary fat, charting fat content of restaurant foods, and calculating percent of fat. Includes extension activities. (CSCO)

  19. DFT Virtual Screening Identifies Rhodium–Amidinate Complexes As Potential Homogeneous Catalysts for Methane-to-Methanol Oxidation

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Fu, Ross; Nielsen, Robert J.; Goddard, William A.

    2014-11-11

    In the search for new organometallic catalysts for low-temperature selective conversion of CH4 to CH3OH, we apply quantum mechanical virtual screening to select the optimum combination of ligand and solvent on rhodium to achieve low barriers for CH4 activation and functionalization to recommend for experimental validation. Here, we considered Rh because its lower electronegativity compared with Pt and Pd may allow it to avoid poisoning by coordinating media. We report quantum mechanical predictions (including implicit and explicit solvation) of the mechanisms for RhIII(NN) and RhIII(NNF) complexes [where (NN) = bis(N-phenyl)benzylamidinate and (NNF) = bis(N-pentafluorophenyl)pentafluorobenzylamidinate] to catalytically activate and functionalize methanemore » using trifluoroacetic acid (TFAH) or water as a solvent. In particular, we designed the (NNF) ligand as a more electrophilic analogue to the (NN) ligand, and our results predict the lowest transition state barrier (ΔG‡ = 27.6 kcal/mol) for methane activation in TFAH from a pool of four different classes of ligands. To close the catalytic cycle, the functionalization of methylrhodium intermediates was also investigated, involving carbon–oxygen bond formation via SN2 attack by solvent, or SR2 attack by a vanadium oxo. Activation barriers for the functionalization of methylrhodium intermediates via nucleophilic attack are lower when the solvent is water, but CH4 activation barriers are higher. In addition, we have found a correlation between CH4 activation barriers and rhodium–methyl bond energies that allow us to predict the activation transition state energies for future ligands, as well.« less

  20. DFT Studies of SN2 Dechlorination of Polychlorinated Biphenyls.

    PubMed

    Krzemińska, Agnieszka; Paneth, Piotr

    2016-06-21

    Nucleophilic dechlorination of all 209 PCBs congeners by ethylene glycol anion has been studied theoretically at the DFT level. The obtained Gibbs free energies of activation are in the range 7-22 kcal/mol. The reaction Gibbs free energies indicate that all reactions are virtually irreversible. Due to geometric constrains these reactions undergo rather untypical attack with attacking oxygen atom being nearly perpendicular to the attacked C-Cl bond. The most prone to substitution are chlorine atoms that occupy ortho- (2, 2', 6, 6') positions. These results provide extensive information on the PEG/KOH dependent PCBs degradation. They can also be used in further developments of reaction class transition state theory (RC-TST) for description of complex reactive systems encountered for example in combustion processes.

  1. Bio-inspired diversity for increasing attacker workload

    NASA Astrophysics Data System (ADS)

    Kuhn, Stephen

    2014-05-01

    Much of the traffic in modern computer networks is conducted between clients and servers, rather than client-toclient. As a result, servers represent a high-value target for collection and analysis of network traffic. As they reside at a single network location (i.e. IP/MAC address) for long periods of time. Servers present a static target for surveillance, and a unique opportunity to observe the network traffic. Although servers present a heightened value for attackers, the security community as a whole has shifted more towards protecting clients in recent years leaving a gap in coverage. In addition, servers typically remain active on networks for years, potentially decades. This paper builds on previous work that demonstrated a proof of concept leveraging existing technology for increasing attacker workload. Here we present our clean slate approach to increasing attacker workload through a novel hypervisor and micro-kernel, utilizing next generation virtualization technology to create synthetic diversity of the server's presence including the hardware components.

  2. Cyber for the Middleweight Fighter: Recommendations for Cyberspace Capabilities for the United States Marine Corps

    DTIC Science & Technology

    2013-02-14

    L acts to “provided resources for national and joint kinetic attack requirements.”24 Additionally, the Marine Corps Force Structure Review Group...for unusual system activity and searching for signs of known malware, unlike what is depicted in movies such as Hackers, where opposing cyber...never admitted involvement but the attacks originated in Russia. The FBI code name for the inquiry was Moonlight Maze. 29. Jeffrey Carr, Inside Cyber

  3. Transformation: A Bold Case for Unconventional Warfare

    DTIC Science & Technology

    2004-06-01

    military accused of engaging in sub-rosa, cloak -and- dagger activities in the event of disclosure. The JCS dared to put its toes into what it considered to...commander to attack weakness, avoid strength, and above all else, be patient.16 This is consistent with what we consider UW to be—an indirect use of...of communist revolutionaries in their takeover of nearby Nicaragua, in 1981 the FMLN launched what it called its “final offensive” in an attack on

  4. Developing Health-Based Pre-Planning Clearance Goals for Airport Remediation Following a Chemical Terrorist Attack: Decision Criteria for Multipathway Exposure Routes

    PubMed Central

    Watson, Annetta; Dolislager, Fredrick; Hall, Linda; Raber, Ellen; Hauschild, Veronique D.; Love, Adam H.

    2011-01-01

    In the event of a chemical terrorist attack on a transportation hub, post-event remediation and restoration activities necessary to attain unrestricted facility re-use and re-entry could require hours to multiple days. While timeframes are dependent on numerous variables, a primary controlling factor is the level of pre-planning and decision-making completed prior to chemical release. What follows is the second of a two-part analysis identifying key considerations, critical information and decision criteria to facilitate post-attack and post-decontamination consequence management activities. Decision criteria analysis presented here provides first-time, open-literature documentation of multi-pathway, health-based remediation exposure guidelines for selected toxic industrial compounds, chemical warfare agents, and agent degradation products for pre-planning application in anticipation of a chemical terrorist attack. Guideline values are provided for inhalation and direct ocular vapor exposure routes as well as percutaneous vapor, surface contact, and ingestion. Target populations include various employees as well as transit passengers. This work has been performed as a national case study conducted in partnership with the Los Angeles International Airport and The Bradley International Terminal. All recommended guidelines have been selected for consistency with airport scenario release parameters of a one-time, short-duration, finite airborne release from a single source followed by compound-specific decontamination. PMID:21399674

  5. Developing health-based pre-planning clearance goals for airport remediation following a chemical terrorist attack: Decision criteria for multipathway exposure routes

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Watson, Annetta Paule; Dolislager, Frederick; Hall, Dr. Linda

    2011-01-01

    In the event of a chemical terrorist attack on a transportation hub, post-event remediation and restoration activities necessary to attain unrestricted facility re-use and re-entry could require hours to multiple days. While timeframes are dependent on numerous variables, a primary controlling factor is the level of pre-planning and decision-making completed prior to chemical release. What follows is the second of a two-part analysis identifying key considerations, critical information and decision criteria to facilitate post-attack and post-decontamination consequence management activities. Decision criteria analysis presented here provides first-time, open-literature documentation of multi-pathway, health-based remediation exposure guidelines for selected toxic industrial compounds, chemicalmore » warfare agents, and agent degradation products for pre-planning application in anticipation of a chemical terrorist attack. Guideline values are provided for inhalation and direct ocular vapor exposure routes as well as percutaneous vapor, surface contact, and ingestion. Target populations include various employees as well as transit passengers. This work has been performed as a national case study conducted in partnership with the Los Angeles International Airport and The Bradley International Terminal. All recommended guidelines have been selected for consistency with airport scenario release parameters of a one-time, short-duration, finite airborne release from a single source followed by compound-specific decontamination.« less

  6. Nonpainful remote electrical stimulation alleviates episodic migraine pain.

    PubMed

    Yarnitsky, David; Volokh, Lana; Ironi, Alon; Weller, Boaz; Shor, Merav; Shifrin, Alla; Granovsky, Yelena

    2017-03-28

    To evaluate the efficacy of remote nonpainful electrical upper arm skin stimulation in reducing migraine attack pain. This is a prospective, double-blinded, randomized, crossover, sham-controlled trial. Migraineurs applied skin electrodes to the upper arm soon after attack onset for 20 minutes, at various pulse widths, and refrained from medications for 2 hours. Patients were asked to use the device for up to 20 attacks. In 71 patients (299 treatments) with evaluable data, 50% pain reduction was obtained for 64% of participants based on best of 200-μs, 150-μs, and 100-μs pulse width stimuli per individual vs 26% for sham stimuli. Greater pain reduction was found for active stimulation vs placebo; for those starting at severe or moderate pain, reduction (1) to mild or no pain occurred in 58% (25/43) of participants (66/134 treatments) for the 200-μs stimulation protocol and 24% (4/17; 8/29 treatments) for placebo ( p = 0.02), and (2) to no pain occurred in 30% (13/43) of participants (37/134 treatments) and 6% (1/17; 5/29 treatments), respectively ( p = 0.004). Earlier application of the treatment, within 20 minutes of attack onset, yielded better results: 46.7% pain reduction as opposed to 24.9% reduction when started later ( p = 0.02). Nonpainful remote skin stimulation can significantly reduce migraine pain, especially when applied early in an attack. This is presumably by activating descending inhibition pathways via the conditioned pain modulation effect. This treatment may be proposed as an attractive nonpharmacologic, easy to use, adverse event free, and inexpensive tool to reduce migraine pain. NCT02453399. This study provides Class III evidence that for patients with an acute migraine headache, remote nonpainful electrical stimulation on the upper arm skin reduces migraine pain. © 2017 American Academy of Neurology.

  7. Can people with Raynaud's phenomenon travel to high altitude?

    PubMed

    Luks, Andrew M; Grissom, Colin K; Jean, Dominique; Swenson, Erik R

    2009-01-01

    To determine whether high altitude travel adversely affects mountain enthusiasts with Raynaud's phenomenon. Volunteers with Raynaud's phenomenon were recruited using announcements disseminated by organizations dedicated to climbing or wilderness travel and Internet discussion boards dedicated to mountain activities to complete an online, anonymous survey. Survey questions addressed demographic variables, aspects of their Raynaud's phenomenon, and features of their mountain activities. Respondents compared experiences with Raynaud's phenomenon between high (>2440 m; 8000 feet) and low elevations and rated agreement with statements concerning their disease and the effects of high altitude. One hundred forty-two people, 98% of whom had primary Raynaud's phenomenon, completed the questionnaire. Respondents spent 5 to 7 days per month at elevations above 2440 m and engaged in 5.4 +/- 2.0 different activities. Eighty-nine percent of respondents engaged in winter sports and only 22% reported changing their mountain activities because of Raynaud's phenomenon. Respondents reported a variety of tactics to prevent and treat Raynaud's attacks, but only 12% used prophylactic medications. Fifteen percent of respondents reported an episode of frostbite following a Raynaud's phenomenon attack at high altitude. There was considerable heterogeneity in participants' perceptions of the frequency, duration, and severity of attacks at high altitude compared to their home elevation. Motivated individuals with primary Raynaud's phenomenon, employing various prevention and treatment strategies, can engage in different activities, including winter sports, at altitudes above 2440 m. Frostbite may be common in this population at high altitude, and care must be taken to prevent its occurrence.

  8. The relationship between dlPFC activity during unpredictable threat and CO2-induced panic symptoms.

    PubMed

    Balderston, Nicholas L; Liu, Jeffrey; Roberson-Nay, Roxann; Ernst, Monique; Grillon, Christian

    2017-11-30

    Panic disorder is characterized by sudden, repeated, and unexpected attacks of intense fear and overwhelming anxiety about when another attack may strike. Patients with panic disorder and healthy individuals with a history of panic attacks show a hypersensitivity to unpredictable threats, suggesting a possible link between panic and sustained anxiety. The purpose of this study was to determine the degree to which induced symptoms of panic relate to fear and anxiety, as well as activity in the neural systems that mediate and regulate these affective states. Psychological and physiological symptoms of panic were assessed during an 8-min 7.5% CO 2 challenge task. Psychological, physiological, and neural symptoms of fear and anxiety were measured during two sessions (one psychophysiology and one functional magnetic resonance imaging where subjects experienced several blocks of no threat (N), predictable shock (P), and unpredictable shock (U; NPU threat task). We used a principle component analysis to characterize panic susceptibility (PS), and found that PS significantly predicted dorsolateral prefrontal cortex (dlPFC) activity to the unpredictable cue during the NPU threat task. When examining the weighted beta coefficients from this analysis, we observed that self-reported fear/anxiety during the CO 2 challenge negatively loaded onto dlPFC activity during the NPU task. Consistent with this observation, dlPFC activity during the unpredictable cue was also negatively correlated with anxiety during the NPU sessions. Together, these results suggest that panic symptoms and anxiety are regulated by the same prefrontal cognitive control system.

  9. The role of genetics on migraine induction triggered by CGRP and PACAP38.

    PubMed

    Guo, Song

    2017-03-01

    Migraine has a strong genetic component and is characterized by multiphasic events including an initial premonitory phase with premonitory symptoms (PS). Calcitonin gene-related peptide (CGRP) and pituitary adenylate cyclase-activating peptide-38 (PACAP38) are endogenous neuropeptides that can trigger migraine attacks and have in recent years gained considerable interest in the migraine field. Yet, the exact pathophysiological mechanisms underlying CGRP- and PACAP38-induced attacks are not fully clarified. Human provocation models have shown that these peptides induce attacks in only two- thirds of migraine patients. Whether this diverse migraine response after CGRP or PACAP38 may be explained by genetic factors is unknown. The present thesis includes four studies that explore different factors that may be associated with the CGRP- and PACAP38-induced migraine response. In study I and II we investigated the role of familial predisposition (family load) and number of risk conferring gene variants on migraine attacks induced by CGRP or PA-CAP38. In study III, we investigated biochemical changes of CGRP, vasoactive intestinal peptide (VIP), S100B and TNF-alpha in the blood after PACAP38. Finally in study IV, we studied whether CGRP or PACAP38 may induce PS. Study I and II demonstrated that PACAP38 and CGRP induce migraine attacks in 63% and 72% of the patients, respectively. Moreover, we showed that patients with high family load or a high number of migraine associated gene variants did not report more migraine attacks after CGRP or PACAP38 than those with no familial predisposition or few gene variants. Study III showed that PACAP38 infusion caused changes in plasma concentrations for VIP and S100B, but not CGRP and TNF-alpha, suggesting activation of parasympathetic nerve endings. Study IV showed absence of PS after CGRP and lack of statistical difference in PS between patients who reported and not reported attacks after PACAP38 suggesting peripheral mechanisms of induction. In conclusion, the present thesis suggests that genetics factors such as family load and genetic variants do not contribute to susceptibility of migraine attacks induced by CGRP or PACAP38. Additionally, our data indicate that CGRP and PACAP38 primarily have a peripheral site of action. We believe that the acquired knowledge from this thesis on how CGRP and PACAP38 might be involved in migraine pathophysiology would contribute to the development of novel and better migraine treatments in the future.

  10. Acylation and deacylation mechanism of Helicobacter pylori AmiF formamidase: A computational DFT study

    NASA Astrophysics Data System (ADS)

    He, Rongxing; Yang, Qinlei; Li, Ming

    2014-04-01

    The acylation and deacylation mechanisms of Helicobacter pylori AmiF formamidase were investigated using DFT method. In the constructed active site, residues Glu60, Glu141 and His167 were taken into account besides Lys133 and Cys166. Calculations provided insight on the details of mechanism and explained crucial roles played by Glu60, Glu141 and His167. For acetylation, we proposed a new stepwise mechanism in which the thiol group first attacks the carbon atom of formamide and produces tetrahedral intermediate. In deacylation, Glu60 activates a water molecule to perform nucleophilic attack and then forms an intermediate, which is different from the usually suggested mechanism.

  11. A Model of Medical Countermeasures for Organophosphates

    DTIC Science & Technology

    2015-10-01

    Animal Data ................................................................. 51 6.2.1. Verifying AChE Activity ...17 Figure 4-3. Model Output for AChE Activity and Free/Stimulated Receptor Fraction with No OP Exposure...Figure 6-1. Sarin Model Output Compared to Individual AChE Activity in Acute Phase Following Tokyo Sarin Attack

  12. Life-threatening event reduces subjective well-being through activating avoidance motivation: a longitudinal study.

    PubMed

    Van Dijk, Dina; Seger-Guttmann, Tali; Heller, Daniel

    2013-04-01

    Drawing on the approach-avoidance theory, we have examined the role of avoidance motivation in explaining the negative effects of a life-threatening event on subjective well-being (SWB). Residents of the south of Israel were surveyed during heavy missile attacks in January 2009 (T1; n = 283), and again after 6 months (T2; n = 212) and 1 year (T3; n = 154). During the missile attacks, we also surveyed a group from the center of the country (T1; n = 102), not exposed to the attacks. The results indicate that avoidance motivation was activated by the life threat and further mediated its detrimental influence on SWB measures (positive/negative affects, anxiety, and subjective health). Moreover, within the southern sample, the drop in avoidance motivation over time mediated the parallel drop in SWB. In contrast to avoidance motivation, approach motivation remained stable over time and was related to positive emotions. The role of avoidance and approach motivations in life-threatening situations is further discussed. PsycINFO Database Record (c) 2013 APA, all rights reserved.

  13. Identification of Antipathogenic Bacterial Coral Symbionts Against Porites Ulcerative White Spots Disease

    NASA Astrophysics Data System (ADS)

    Sa'adah, Nor; Sabdono, Agus; Diah Permata Wijayanti, dan

    2018-02-01

    Coral reef ecosystems are ecosystems that are vulnerable and susceptible to damage due to the exploitation of ocean resources. One of the factors that cause coral damage is the disease that attacks the coral. Porites Ulcerative White Spots (PUWS) is a coral disease found in Indonesia and attacks the coral genera Porites allegedly caused by pathogenic microbial attacks. The purpose of this study was to identify the symbiotic bacteria on healthy coral that have antipatogenic potency against PUWS. The method used in this research was descriptive explorative. Sampling was done in Kemujan Island, Karimunjawa. Bacteria were isolated from healthy coral and coral affected by PUWS disease. Streak method was used to purify coral bacteria, while overlay and agar diffusion were used to test antipathogenic activity. Bacterial identification was carried out based on polyphasic approach. The results of this study showed that coral bacterial symbionts have antipathogenic activity against PUWS disease. The selected bacteria NM 1.2, NM 1.3 and KPSH 5. NM1.2 were closely related to Pseudoalteromonas piscicida, Pseudoalteromonas flavipulchra and Bacillus flexus, respectively.

  14. 76 FR 18564 - Government-Owned Inventions; Availability for Licensing

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-04

    ... attractive antimicrobial target. The chrysophaetin exhibits antimicrobial activity against drug resistant... analogues will show similar antimicrobial activity to the natural products and will utilize the same... distinct antimicrobial compounds. Attack newly validated antibacterial targeted protein FtsZ. These...

  15. A Mutual Authentication Framework for Wireless Medical Sensor Networks.

    PubMed

    Srinivas, Jangirala; Mishra, Dheerendra; Mukhopadhyay, Sourav

    2017-05-01

    Wireless medical sensor networks (WMSN) comprise of distributed sensors, which can sense human physiological signs and monitor the health condition of the patient. It is observed that providing privacy to the patient's data is an important issue and can be challenging. The information passing is done via the public channel in WMSN. Thus, the patient, sensitive information can be obtained by eavesdropping or by unauthorized use of handheld devices which the health professionals use in monitoring the patient. Therefore, there is an essential need of restricting the unauthorized access to the patient's medical information. Hence, the efficient authentication scheme for the healthcare applications is needed to preserve the privacy of the patients' vital signs. To ensure secure and authorized communication in WMSN, we design a symmetric key based authentication protocol for WMSN environment. The proposed protocol uses only computationally efficient operations to achieve lightweight attribute. We analyze the security of the proposed protocol. We use a formal security proof algorithm to show the scheme security against known attacks. We also use the Automated Validation of Internet Security Protocols and Applications (AVISPA) simulator to show protocol secure against man-in-the-middle attack and replay attack. Additionally, we adopt an informal analysis to discuss the key attributes of the proposed scheme. From the formal proof of security, we can see that an attacker has a negligible probability of breaking the protocol security. AVISPA simulator also demonstrates the proposed scheme security against active attacks, namely, man-in-the-middle attack and replay attack. Additionally, through the comparison of computational efficiency and security attributes with several recent results, proposed scheme seems to be battered.

  16. Proactive routing mutation against stealthy Distributed Denial of Service attacks: metrics, modeling, and analysis

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Duan, Qi; Al-Shaer, Ehab; Chatterjee, Samrat

    The Infrastructure Distributed Denial of Service (IDDoS) attacks continue to be one of the most devastating challenges facing cyber systems. The new generation of IDDoS attacks exploit the inherent weakness of cyber infrastructure including deterministic nature of routes, skew distribution of flows, and Internet ossification to discover the network critical links and launch highly stealthy flooding attacks that are not observable at the victim end. In this paper, first, we propose a new metric to quantitatively measure the potential susceptibility of any arbitrary target server or domain to stealthy IDDoS attacks, and es- timate the impact of such susceptibility onmore » enterprises. Second, we develop a proactive route mutation technique to minimize the susceptibility to these attacks by dynamically changing the flow paths periodically to invalidate the adversary knowledge about the network and avoid targeted critical links. Our proposed approach actively changes these network paths while satisfying security and qualify of service requirements. We present an integrated approach of proactive route mutation that combines both infrastructure-based mutation that is based on reconfiguration of switches and routers, and middle-box approach that uses an overlay of end-point proxies to construct a virtual network path free of critical links to reach a destination. We implemented the proactive path mutation technique on a Software Defined Network using the OpendDaylight controller to demonstrate a feasible deployment of this approach. Our evaluation validates the correctness, effectiveness, and scalability of the proposed approaches.« less

  17. Understanding human aggression: New insights from neuroscience.

    PubMed

    Siegel, Allan; Victoroff, Jeff

    2009-01-01

    The present paper reviews and summarizes the basic findings concerning the nature of the neurobiological and behavioral characteristics of aggression and rage. For heuristic purposes, the types of aggression will be reduced to two categories - defensive rage (affective defense) and predatory attack. This approach helps explain both the behavioral properties of aggression as well as the underlying neural substrates and mechanisms of aggression both in animals and humans. Defensive rage behavior is activated by a threatening stimulus that is real or perceived and is associated with marked sympathetic output. This yields impulsivity with minimal cortical involvement. Predatory attack behavior in both animals and humans is generally planned, taking minutes, hours, days, weeks, months, or even years (with respect to humans) for it to occur and is directed upon a specific individual target; it reflects few outward sympathetic signs and is believed to require cortical involvement for its expression. Predatory attack requires activation of the lateral hypothalamus, while defensive rage requires activation of the medial hypothalamus and midbrain periaqueductal gray (PAG). Both forms of aggressive behavior are controlled by components of the limbic system, a region of the forebrain that is influenced by sensory inputs from the cerebral cortex and monoaminergic inputs from the brainstem reticular formation. Control of aggressive tendencies is partly modifiable through conditioning and related learning principles generated through the cerebral cortex.

  18. Engagement in community activities and trust in local leaders as concomitants of psychological distress among Israeli civilians exposed to prolonged rocket attacks.

    PubMed

    Zanbar, Lea; Kaniasty, Krzysztof; Ben-Tzur, Navit

    2018-07-01

    Present study, conducted in the aftermath of the 2014 Israel-Gaza conflict, investigated psychological toll of exposure to rockets attacks in a sample of residents of central and southern Israel. Analyses focused on the distress-protective functions of collectively grounded resources: engagement in community activities and trust in local leadership. This cross-sectional study was conducted between 2 and 3 months after the hostilities. Participants (N = 764) were recruited by an online survey company that distributed a questionnaire assessing, in addition to focal predictors, sociodemographic factors and prior exposure to trauma. The outcome variables were post-traumatic stress disorder (PTSD) and nonspecific distress symptoms. Conservative regression analyses revealed that greater exposure to rocket attacks was predictive of higher levels of posttraumatic stress symptoms. Higher engagement in community activities exhibited a partial trauma-buffering function. However, higher levels of trust in local leaders appeared to exacerbate, rather than diminish, negative impact of rocket exposure on PTSD. Symptoms of psychological distress were not influenced neither by trauma exposure nor by stressor interactions with resources. Trust in local leadership exerted a beneficial main effect on distress. Collectively based resources are important for coping in times of community-wide stressors, yet their role is complex.

  19. The adaptive function of tiger moth clicks against echolocating bats: an experimental and synthetic approach.

    PubMed

    Ratcliffe, John M; Fullard, James H

    2005-12-01

    We studied the efficiency and effects of the multiple sensory cues of tiger moths on echolocating bats. We used the northern long-eared bat, Myotis septentrionalis, a purported moth specialist that takes surface-bound prey (gleaning) and airborne prey (aerial hawking), and the dogbane tiger moth, Cycnia tenera, an eared species unpalatable to bats that possesses conspicuous colouration and sound-producing organs (tymbals). This is the first study to investigate the interaction of tiger moths and wild-caught bats under conditions mimicking those found in nature and to demand the use of both aerial hawking and gleaning strategies by bats. Further, it is the first to report spectrograms of the sounds produced by tiger moths while under aerial attack by echolocating bats. During both aerial hawking and gleaning trials, all muted C. tenera and perched intact C. tenera were attacked by M. septentrionalis, indicating that M. septentrionalis did not discriminate C. tenera from palatable moths based on potential echoic and/or non-auditory cues. Intact C. tenera were attacked significantly less often than muted C. tenera during aerial hawking attacks: tymbal clicks were therefore an effective deterrent in an aerial hawking context. During gleaning attacks, intact and muted C. tenera were always attacked and suffered similar mortality rates, suggesting that while handling prey this bat uses primarily chemical signals. Our results also show that C. tenera temporally matches the onset of click production to the ;approach phase' echolocation calls produced by aerial hawking attacking bats and that clicks themselves influence the echolocation behaviour of attacking bats. In the context of past research, these findings support the hypotheses that the clicks of arctiid moths are both an active defence (through echolocation disruption) and a reliable indicator of chemical defence against aerial-hawking bats. We suggest these signals are specialized for an aerial context.

  20. Brain imaging with sup 123 I-IMP-SPECT in migraine between attacks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Schlake, H.P.; Boettger, I.G.G.; Grotemeyer, K.H.

    1989-06-01

    {sup 123}I-IMP-SPECT brain imaging was performed in patients with classic migraine (n = 5) and migraine accompagnee (n = 18) during the headache-free interval. A regional reduction of tracer uptake into brain was observed in all patients with migraine accompagnee, while in patients with classic migraine only one case showed an area of decreased activity. The most marked alteration was found in a patient with persisting neurological symptoms (complicated migraine). In most cases the areas of decreased tracer uptake corresponded to headache localization as well as to topography of neurologic symptoms during migraine attacks. It may be concluded that migrainemore » attacks occur in connection with exacerbations of preexisting changes of cerebral autoregulation due to endogenous or exogenous factors.« less

  1. Investigating the Self-Protective Potential of Immobility in Victims of Rape.

    PubMed

    de Heer, Brooke A; Jones, Lynn C

    2017-04-01

    Using a nationwide sample of reported rape cases collected by the Federal Bureau of Investigation (FBI; 389 victims; 89% stranger rapes), this study investigates assumptions about self-protective behaviors for rape victims. Past research on victim resistance strategies often specifies active resistance as self-protective, inadvertently underestimating the potential for biologically based reactions, such as tonic immobility, to be self-protective as well. Results confirm that rape victims who were verbally and physically immobile during the attack were less likely to be injured and have force used against them. In addition, victims who were verbally immobile suffered a less severe attack. The results indicate that immobility may protect the victim from increased injury, force, and severity of the attack. Implications for the legal and public definition of consent are discussed.

  2. Aboveground predation by an American badger (Taxidea taxus) on black-tailed prairie dogs (Cynomys ludovicianus)

    USGS Publications Warehouse

    Eads, D.A.; Biggins, D.E.

    2008-01-01

    During research on black-tailed prairie dogs (Cynomys ludovicianus), we repeatedly observed a female American badger (Taxidea taxus) hunting prairie dogs on a colony in southern Phillips County, Montana. During 1-14 June 2006, we observed 7 aboveground attacks (2 successful) and 3 successful excavations of prairie dogs. The locations and circumstances of aboveground attacks suggested that the badger improved her probability of capturing prairie dogs by planning the aboveground attacks based on perceptions of speeds, angles, distances, and predicted escape responses of prey. Our observations add to previous reports on the complex and varied predatory methods and cognitive capacities of badgers. These observations also underscore the individuality of predators and support the concept that predators are active participants in predator-prey interactions.

  3. Beneficial Properties of Phytochemicals on NLRP3 Inflammasome-Mediated Gout and Complication.

    PubMed

    Jhang, Jhih-Jia; Lin, Jia-Hong; Yen, Gow-Chin

    2018-01-31

    Gouty arthritis is characterized by the precipitation of monosodium urate (MSU) crystals in the joint. Pro-inflammatory cytokine IL-1β is a critical manifestation in response to MSU crystals attack. IL-1β secretion is dependent on the nucleotide-binding oligomerization domain-like receptor pyrin domain containing 3 (NLRP3) inflammasome. Abnormal activation of the NLRP inflammasome is related to cellular oxidative stress. However, recent studies have illustrated that phytochemicals with potent antioxidant activity exert inhibitory effects on NLRP3 inflammasome-mediated diseases. This review focuses on the current findings of studies on the NLRP3 inflammasome and the proposed mechanisms that MSU crystals trigger inflammation via activation of the NLRP3 inflammasome. We also summarized the potential use of phytochemicals on NLRP3 inflammasome-mediated diseases, suggesting that phytochemicals can further prevent acute gout attack.

  4. Attacks exploiting deviation of mean photon number in quantum key distribution and coin tossing

    NASA Astrophysics Data System (ADS)

    Sajeed, Shihan; Radchenko, Igor; Kaiser, Sarah; Bourgoin, Jean-Philippe; Pappa, Anna; Monat, Laurent; Legré, Matthieu; Makarov, Vadim

    2015-03-01

    The security of quantum communication using a weak coherent source requires an accurate knowledge of the source's mean photon number. Finite calibration precision or an active manipulation by an attacker may cause the actual emitted photon number to deviate from the known value. We model effects of this deviation on the security of three quantum communication protocols: the Bennett-Brassard 1984 (BB84) quantum key distribution (QKD) protocol without decoy states, Scarani-Acín-Ribordy-Gisin 2004 (SARG04) QKD protocol, and a coin-tossing protocol. For QKD we model both a strong attack using technology possible in principle and a realistic attack bounded by today's technology. To maintain the mean photon number in two-way systems, such as plug-and-play and relativistic quantum cryptography schemes, bright pulse energy incoming from the communication channel must be monitored. Implementation of a monitoring detector has largely been ignored so far, except for ID Quantique's commercial QKD system Clavis2. We scrutinize this implementation for security problems and show that designing a hack-proof pulse-energy-measuring detector is far from trivial. Indeed, the first implementation has three serious flaws confirmed experimentally, each of which may be exploited in a cleverly constructed Trojan-horse attack. We discuss requirements for a loophole-free implementation of the monitoring detector.

  5. A Weakest Precondition Approach to Robustness

    NASA Astrophysics Data System (ADS)

    Balliu, Musard; Mastroeni, Isabella

    With the increasing complexity of information management computer systems, security becomes a real concern. E-government, web-based financial transactions or military and health care information systems are only a few examples where large amount of information can reside on different hosts distributed worldwide. It is clear that any disclosure or corruption of confidential information in these contexts can result fatal. Information flow controls constitute an appealing and promising technology to protect both data confidentiality and data integrity. The certification of the security degree of a program that runs in untrusted environments still remains an open problem in the area of language-based security. Robustness asserts that an active attacker, who can modify program code in some fixed points (holes), is unable to disclose more private information than a passive attacker, who merely observes unclassified data. In this paper, we extend a method recently proposed for checking declassified non-interference in presence of passive attackers only, in order to check robustness by means of weakest precondition semantics. In particular, this semantics simulates the kind of analysis that can be performed by an attacker, i.e., from public output towards private input. The choice of semantics allows us to distinguish between different attacks models and to characterize the security of applications in different scenarios.

  6. Leopard in a tea-cup: A study of leopard habitat-use and human-leopard interactions in north-eastern India.

    PubMed

    Kshettry, Aritra; Vaidyanathan, Srinivas; Athreya, Vidya

    2017-01-01

    There is increasing evidence of the importance of multi-use landscapes for the conservation of large carnivores. However, when carnivore ranges overlap with high density of humans, there are often serious conservation challenges. This is especially true in countries like India where loss of peoples' lives and property to large wildlife are not uncommon. The leopard (Panthera pardus) is a large felid that is widespread in India, often sharing landscapes with high human densities. In order to understand the ecology of leopards in a human use landscape and the nature of human-leopard interactions, we studied (i) the spatial and temporal distribution and the characteristics of leopard attacks on people, (ii) the spatial variability in the pattern of habitat use by the leopard, and (iii) the spatial relationship between attack locations and habitat use by leopards. The study site, located in northern West Bengal, India, is a densely populated mixed-use landscape of 630 km2, comprising of forests, tea plantations, agriculture fields, and human settlements. A total of 171 leopard attacks on humans were reported between January 2009 and March 2016, most of which occurred within the tea-gardens. None of the attacks was fatal. We found significant spatial clustering of locations of leopard attacks on humans. However, most of the attacks were restricted to certain tea estates and occurred mostly between January and May. Analysis of habitat use by leopards showed that the probability of use of areas with more ground vegetation cover was high while that of areas with high density of buildings was low. However, locations of leopard attacks on people did not coincide with areas that showed a higher probability of use by leopards. This indicates that an increased use of an area by leopards, by itself, does not necessarily imply an increase in attacks on people. The spatial and temporal clustering of attack locations allowed us to use this information to prioritize areas to focus mitigation activities in order reduce negative encounters between people and leopards in this landscape which has had a long history of conflict.

  7. Leopard in a tea-cup: A study of leopard habitat-use and human-leopard interactions in north-eastern India

    PubMed Central

    2017-01-01

    There is increasing evidence of the importance of multi-use landscapes for the conservation of large carnivores. However, when carnivore ranges overlap with high density of humans, there are often serious conservation challenges. This is especially true in countries like India where loss of peoples’ lives and property to large wildlife are not uncommon. The leopard (Panthera pardus) is a large felid that is widespread in India, often sharing landscapes with high human densities. In order to understand the ecology of leopards in a human use landscape and the nature of human-leopard interactions, we studied (i) the spatial and temporal distribution and the characteristics of leopard attacks on people, (ii) the spatial variability in the pattern of habitat use by the leopard, and (iii) the spatial relationship between attack locations and habitat use by leopards. The study site, located in northern West Bengal, India, is a densely populated mixed-use landscape of 630 km2, comprising of forests, tea plantations, agriculture fields, and human settlements. A total of 171 leopard attacks on humans were reported between January 2009 and March 2016, most of which occurred within the tea-gardens. None of the attacks was fatal. We found significant spatial clustering of locations of leopard attacks on humans. However, most of the attacks were restricted to certain tea estates and occurred mostly between January and May. Analysis of habitat use by leopards showed that the probability of use of areas with more ground vegetation cover was high while that of areas with high density of buildings was low. However, locations of leopard attacks on people did not coincide with areas that showed a higher probability of use by leopards. This indicates that an increased use of an area by leopards, by itself, does not necessarily imply an increase in attacks on people. The spatial and temporal clustering of attack locations allowed us to use this information to prioritize areas to focus mitigation activities in order reduce negative encounters between people and leopards in this landscape which has had a long history of conflict. PMID:28493999

  8. Investigation of carbachol and PACAP38 in a human model of migraine.

    PubMed

    Schytz, Henrik Winther

    2010-12-01

    The parasympathetic signalling molecules acetylcholine, pituitary adenylate cyclase activating peptide-38 (PACAP38) and vasoactive intestinal peptide (VIP) may be released from parasympathetic fibres and activate sensory nerve fibres during migraine attacks. Recently, it was shown that VIP does not induce migraine-like attacks in migraine patients. Interestingly, PACAP38 activates the same VPAC receptors as VIP, but also specifically activates the PAC1 receptor. The present thesis includes four double-blind placebo-controlled crossover studies aimed to explore the role of acetylcholine, PACAP and VIP in migraine and head pain. In study I-III we investigated acetylcholine, via the analogue carbachol, and PACAP38 in a human model of migraine. In study IV we studied if PACAP38 and VIP might induce central sensitization, neurogenic inflammation and mast cell degranulation in a cutaneous model of acute pain. Study I-II showed that carbachol induced short lasting mild headache and moderate cephalic vasodilatation in both healthy volunteers and migraine patients, but did not induce migraine-like attacks. In study III PACAP38 induced headache in healthy subjects and delayed migraine-like attacks in migraine patients as well as sustained dilatation of cephalic vessels. In study IV VIP and PACAP38 evoked skin pain, central sensitization, neurogenic inflammation and mast cell degranulation, but VIP showed to be more potent than PACAP38 in inducing neurogenic inflammation and mast cell degranulation. In conclusion, we found that carbachol infusion was not a good model for experimental migraine provocation, probably because the maximal dose was insufficient to produce enough nitric oxide to trigger migraine. PACAP38 infusion is a new pathway for migraine induction and the results from study IV suggest that neurogenic inflammation and mast cell degranulation are unlikely to cause PACAP38 induced migraine. The present thesis contributes to our knowledge on migraine pathophysiology and suggests PAC1 receptor antagonism as a new target for migraine treatment.

  9. DISPOSAL OF RESIDUES FROM BUILDING DECONTAMINATION ACTIVITIES

    EPA Science Inventory

    After a building has gone through decontamination activities from a chemical attack there will be a significant amount of building decontamination residue that will need to undergo disposal. This project consists of a fundamental study to investigate the desorption of simulated c...

  10. A taxonomy and discussion of software attack technologies

    NASA Astrophysics Data System (ADS)

    Banks, Sheila B.; Stytz, Martin R.

    2005-03-01

    Software is a complex thing. It is not an engineering artifact that springs forth from a design by simply following software coding rules; creativity and the human element are at the heart of the process. Software development is part science, part art, and part craft. Design, architecture, and coding are equally important activities and in each of these activities, errors may be introduced that lead to security vulnerabilities. Therefore, inevitably, errors enter into the code. Some of these errors are discovered during testing; however, some are not. The best way to find security errors, whether they are introduced as part of the architecture development effort or coding effort, is to automate the security testing process to the maximum extent possible and add this class of tools to the tools available, which aids in the compilation process, testing, test analysis, and software distribution. Recent technological advances, improvements in computer-generated forces (CGFs), and results in research in information assurance and software protection indicate that we can build a semi-intelligent software security testing tool. However, before we can undertake the security testing automation effort, we must understand the scope of the required testing, the security failures that need to be uncovered during testing, and the characteristics of the failures. Therefore, we undertook the research reported in the paper, which is the development of a taxonomy and a discussion of software attacks generated from the point of view of the security tester with the goal of using the taxonomy to guide the development of the knowledge base for the automated security testing tool. The representation for attacks and threat cases yielded by this research captures the strategies, tactics, and other considerations that come into play during the planning and execution of attacks upon application software. The paper is organized as follows. Section one contains an introduction to our research and a discussion of the motivation for our work. Section two contains a presents our taxonomy of software attacks and a discussion of the strategies employed and general weaknesses exploited for each attack. Section three contains a summary and suggestions for further research.

  11. Omics Approaches for the Engineering of Pathogen Resistant Plants.

    PubMed

    Gomez-Casati, Diego F; Pagani, María A; Busi, María V; Bhadauria, Vijai

    2016-01-01

    The attack of different pathogens, such as bacteria, fungi and viruses has a negative impact on crop production. In counter such attacks, plants have developed different strategies involving the modification of gene expression, activation of several metabolic pathways and post-translational modification of proteins, which culminate into the accumulation of primary and secondary metabolites implicated in plant defense responses. The recent advancement in omics techniques allows the increase coverage of plants transcriptomes, proteomes and metabolomes during pathogen attack, and the modulation of the response after the infection. Omics techniques also allow us to learn more about the biological cycle of the pathogens in addition to the identification of novel virulence factors in pathogens and their host targets. Both approaches become important to decipher the mechanism underlying pathogen attacks and to develop strategies for improving disease-resistant plants. In this review, we summarize some of the contribution of genomics, transcriptomics, proteomics, metabolomics and metallomics in devising the strategies to obtain plants with increased resistance to pathogens. These approaches constitute important research tools in the development of new technologies for the protection against diseases and increase plant production.

  12. ACE inhibitors

    MedlinePlus

    ... Diabetes - keeping active Diabetes - low blood sugar - self-care Diabetes - preventing heart attack and stroke Diabetes - taking care of your feet Diabetes - tests and checkups Diabetes - when you are sick ...

  13. Classical-quantum arbitrarily varying wiretap channel: Secret message transmission under jamming attacks

    NASA Astrophysics Data System (ADS)

    Boche, Holger; Cai, Minglai; Deppe, Christian; Nötzel, Janis

    2017-10-01

    We analyze arbitrarily varying classical-quantum wiretap channels. These channels are subject to two attacks at the same time: one passive (eavesdropping) and one active (jamming). We elaborate on our previous studies [H. Boche et al., Quantum Inf. Process. 15(11), 4853-4895 (2016) and H. Boche et al., Quantum Inf. Process. 16(1), 1-48 (2016)] by introducing a reduced class of allowable codes that fulfills a more stringent secrecy requirement than earlier definitions. In addition, we prove that non-symmetrizability of the legal link is sufficient for equality of the deterministic and the common randomness assisted secrecy capacities. Finally, we focus on analytic properties of both secrecy capacities: We completely characterize their discontinuity points and their super-activation properties.

  14. Resveratrol products resulting by free radical attack

    NASA Astrophysics Data System (ADS)

    Bader, Yvonne; Quint, R. M.; Getoff, Nikola

    2008-06-01

    Trans-resveratrol ( trans-3,4',5-trihydroxystilbene; RES), which is contained in red wine and many plants, is one of the most relevant and extensively investigated stilbenes with a broad spectrum of biological activities. Among other duties, RES has been reported to have anti-carcinogenetic activities, which could be attributed to its antioxidant properties. The degradation of RES was studied under various conditions. The products (aldehydes, carboxylic acids, etc.) generated from RES by the attack of free radicals were registered as a function of the radical concentration (absorbed radiation dose). Based on the obtained data it appears that the OH radicals are initiating the rather complicated process, which involves of the numerous consecutive reactions. A possible starting reaction mechanism is presented.

  15. The role of an active site Mg(2+) in HDV ribozyme self-cleavage: insights from QM/MM calculations.

    PubMed

    Mlýnský, Vojtěch; Walter, Nils G; Šponer, Jiří; Otyepka, Michal; Banáš, Pavel

    2015-01-07

    The hepatitis delta virus (HDV) ribozyme is a catalytic RNA motif embedded in the human pathogenic HDV RNA. It catalyzes self-cleavage of its sugar-phosphate backbone with direct participation of the active site cytosine C75. Biochemical and structural data support a general acid role of C75. Here, we used hybrid quantum mechanical/molecular mechanical (QM/MM) calculations to probe the reaction mechanism and changes in Gibbs energy along the ribozyme's reaction pathway with an N3-protonated C75H(+) in the active site, which acts as the general acid, and a partially hydrated Mg(2+) ion with one deprotonated, inner-shell coordinated water molecule that acts as the general base. We followed eight reaction paths with a distinct position and coordination of the catalytically important active site Mg(2+) ion. For six of them, we observed feasible activation barriers ranging from 14.2 to 21.9 kcal mol(-1), indicating that the specific position of the Mg(2+) ion in the active site is predicted to strongly affect the kinetics of self-cleavage. The deprotonation of the U-1(2'-OH) nucleophile and the nucleophilic attack of the resulting U-1(2'-O(-)) on the scissile phosphodiester are found to be separate steps, as deprotonation precedes the nucleophilic attack. This sequential mechanism of the HDV ribozyme differs from the concerted nucleophilic activation and attack suggested for the hairpin ribozyme. We estimate the pKa of the U-1(2'-OH) group to range from 8.8 to 11.2, suggesting that it is lowered by several units from that of a free ribose, comparable to and most likely smaller than the pKa of the solvated active site Mg(2+) ion. Our results thus support the notion that the structure of the HDV ribozyme, and particularly the positioning of the active site Mg(2+) ion, facilitate deprotonation and activation of the 2'-OH nucleophile.

  16. A pharmacological evidence of positive association between mouse intermale aggression and brain serotonin metabolism.

    PubMed

    Kulikov, A V; Osipova, D V; Naumenko, V S; Terenina, E; Mormède, P; Popova, N K

    2012-07-15

    The neurotransmitter serotonin (5-HT) is involved in the regulation of mouse intermale aggression. Previously, it was shown that intensity of mouse intermale aggression was positively associated with activity of the key enzyme of 5-HT synthesis - tryptophan hydroxylase 2 (TPH2) in mouse brain. The aim of the present study was to investigate the effect of pharmacological activation or inhibition of 5-HT synthesis in the brain on intermale aggression in two mouse strains differing in the TPH2 activity: C57BL/6J (B6, high TPH2 activity, high aggressiveness) and CC57BR/Mv (BR, low TPH2 activity, low aggressiveness). Administration of 5-HT precursor L-tryptophan (300 mg/kg, i.p.) to BR mice significantly increased the 5-HT and 5-hydroxyindoleacetic acid (5-HIAA) levels in the midbrain as well as the number of attacks and their duration in the resident-intruder test. And vice versa, administration of TPH2 inhibitor p-chlorophenylalanine (pCPA) (300 mg/kg, i.p., for 3 consecutive days) to B6 mice dramatically reduced the 5-HT and 5-HIAA contents in brain structures and attenuated the frequency and the duration of aggressive attacks. At the same time, L-tryptophan or pCPA did not influence the percentage of aggressive mice and the attack latency reflecting the threshold of aggressive reaction. This result indicated that the intensity of intermale aggression, but not the threshold of aggressive reaction is positively dependent on 5-HT metabolism in mouse brain. Copyright © 2012 Elsevier B.V. All rights reserved.

  17. [Blood coagulation and fibrinolysis in ischemic heart disease].

    PubMed

    Sakamoto, T; Ogawa, H; Miyao, Y; Yasue, H

    1994-01-01

    Intracoronary thrombus formation has been thought to play an important role in the genesis of acute myocardial infarction an unstable angina. To examine whether the coagulation and fibrinolytic systems are altered in such ischemic heart diseases, the plasma levels of fibrinopeptide A (FPA) and plasminogen activator (PAI) were measured. The plasma level of FPA was increased in patients with variant angina as compared with those with stable exertional angina and there was a significant circadian variation in the plasma level of FPA in parallel with that of the frequency of the attacks with the peak level occurring from midnight to early morning in patients with variant angina. The plasma FPA level increased in patients with coronary spastic angina after the ischemic attack induced by hyperventilation. Furthermore, FPA was released into the coronary circulation after the anginal attack induced by intracoronary injection of acetylcholine. These findings suggest that the coronary artery spasm may induce thrombin generation and trigger thrombus formation in the coronary artery. On the other hand, the plasma level of PAI activity was higher in patients with unstable angina and coronary spastic angina than in those with stable exertional angina. Moreover, the PAI activity in patients with unstable angina decreased to the level in patients with stable exertional angina after the stabilization of their symptoms by drugs. Our findings suggest that the increased plasma PAI activity may reduce fibrinolytic activity and attenuate removal of the thrombus and may ultimately lead to acute myocardial infarction in some patients with unstable angina and coronary spastic angina.(ABSTRACT TRUNCATED AT 250 WORDS)

  18. An Active Smart Material Control System for F/A-18 Buffet Alleviation

    NASA Technical Reports Server (NTRS)

    Sheta, Essam F.; Moses, Robert W.; Huttsell, Lawrence J.; Harrand, Vincent J.

    2003-01-01

    The vertical tail buffet problem of fighter aircraft occurs at high angles of attack when the vortical flow breaks down ahead of the vertical tails resulting in unsteady and unbalanced pressure loads on the vertical tails. The buffet loads imposed upon the vertical tails resulted in a premature fatigue failure of the tails, and consequently limits the performance and super maneuverability of twin-tail fighter aircraft. An active smart material control system using distributed piezoelectric actuators has been developed for buffet alleviation and is presented. The inboard and outboard surfaces of the vertical tail are equipped with piezoelectric actuators to control the buffet responses in the first bending and torsion modes. The electrodynamics of the piezoelectric actuators are expressed with a three-dimensional finite-element model. A single-input-single-output controller is designed to drive the active piezoelectric actuators. High-fidelity multidisciplinary analysis modules for the fluid dynamics, structure dynamics, electrodynamics of the piezoelectric actuators, control law, fluid structure interfacing, and grid motion are integrated into a multidisciplinary computing environment that controls the temporal synchronization of the analysis modules. At 30 degree angle of attack, RMS values of tip acceleration are reduced by as much as 12%. The peak values of the power spectral density of tail-tip acceleration are reduced by as much as 22% in the first bending mode and by as much as 82% in the first torsion mode. The actively controlled piezoelectric actuators were also effective in adding damping at wide range of angles of attack.

  19. NF-κB and enhancer-binding CREB protein scaffolded by CREB-binding protein (CBP)/p300 proteins regulate CD59 protein expression to protect cells from complement attack.

    PubMed

    Du, Yiqun; Teng, Xiaoyan; Wang, Na; Zhang, Xin; Chen, Jianfeng; Ding, Peipei; Qiao, Qian; Wang, Qingkai; Zhang, Long; Yang, Chaoqun; Yang, Zhangmin; Chu, Yiwei; Du, Xiang; Zhou, Xuhui; Hu, Weiguo

    2014-01-31

    The complement system can be activated spontaneously for immune surveillance or induced to clear invading pathogens, in which the membrane attack complex (MAC, C5b-9) plays a critical role. CD59 is the sole membrane complement regulatory protein (mCRP) that restricts MAC assembly. CD59, therefore, protects innocent host cells from attacks by the complement system, and host cells require the constitutive and inducible expression of CD59 to protect themselves from deleterious destruction by complement. However, the mechanisms that underlie CD59 regulation remain largely unknown. In this study we demonstrate that the widely expressed transcription factor Sp1 may regulate the constitutive expression of CD59, whereas CREB-binding protein (CBP)/p300 bridge NF-κB and CREB, which surprisingly functions as an enhancer-binding protein to induce the up-regulation of CD59 during in lipopolysaccharide (LPS)-triggered complement activation, thus conferring host defense against further MAC-mediated destruction. Moreover, individual treatment with LPS, TNF-α, and the complement activation products (sublytic MAC (SC5b-9) and C5a) could increase the expression of CD59 mainly by activating NF-κB and CREB signaling pathways. Together, our findings identify a novel gene regulation mechanism involving CBP/p300, NF-κB, and CREB; this mechanism suggests potential drug targets for controlling various complement-related human diseases.

  20. Player Load in Elite Netball: Match, Training, and Positional Comparisons.

    PubMed

    Young, Christopher M; Gastin, Paul B; Sanders, Nick; Mackey, Luke; Dwyer, Dan B

    2016-11-01

    The activity profile of competition and training in elite netball has not been comprehensively reported in the literature. To measure and analyze player load in elite netballers during matches and training sessions. The primary research question was, How does player load vary between playing positions in a match and between matches and training sessions? Various measures of player load were recorded in 12 elite professional netballers with a mean ± SD age of 26 ± 4.9 y and height of 183.2 ± 8.7 cm. Player load was assessed using a published method that uses accelerometry. Load was represented as total load in arbitrary units (au), playing intensity (au/min), and relative time spent in each of 4 playing intensity zones (low, low to moderate, moderate, and high). Data from 15 games and up to 17 training sessions were analyzed for each player. Player load in matches for the goal-based positions (goal shooter, goal keeper, and goal defense) tended to be lower than the attacking and wing-based positions (goal attack, wing attack, wing defense, and center). The difference was largely due to the amount of time spent in low-intensity activity. Playing intensity of matches was greater than in training sessions; however, the total time spent in moderate- to high-intensity activities was not practically different. Accelerometry is a valuable method of measuring player load in netball, and the present results provide new information about the activity profile of different playing positions.

  1. Vertical Tail Buffeting Alleviation Using Piezoelectric Actuators-Some Results of the Actively Controlled Response of Buffet-Affected Tails (ACROBAT) Program

    NASA Technical Reports Server (NTRS)

    Moses, Robert W.

    1997-01-01

    Buffet is an aeroelastic phenomenon associated with high performance aircraft especially those with twin vertical tails. In particular, for the F/A-18 aircraft at high angles of attack, vortices emanating from wing/fuselage leading edge extensions burst, immersing the vertical tails in their wake. The resulting buffet loads on the vertical tails are a concern from fatigue and inspection points of view. Recently, a 1/6-scale F-18 wind-tunnel model was tested in the Transonic Dynamics Tunnel at the NASA Langley Research Center as part of the Actively Controlled Response Of Buffet Affected Tails (ACROBAT) Program to assess the use of active controls in reducing vertical tail buffeting. The starboard vertical tail was equipped with an active rudder and the port vertical tail was equipped with piezoelectric actuators. The tunnel conditions were atmospheric air at Mach 0.10. By using single-input-single-output control laws at gains well below the physical limits of the actuators, the power spectral density of the root strains at the frequency of the first bending mode of the vertical tail was reduced by as much as 60 percent up to angles of attack of 37 degrees. Root mean square (RMS) values of root strain were reduced by as much as 19 percent. The results herein illustrate that buffet alleviation of vertical tails can be accomplished using simple active control of the rudder or piezoelectric actuators. In fact, as demonstrated herein, a fixed gain single input single output control law that commands piezoelectric actuators may be active throughout the high angle-of-attack maneuver without requiring any changes during the maneuver. Future tests are mentioned for accentuating the international interest in this area of research.

  2. Diagnostic and therapeutic problems associated with hereditary deficiency of the C1 esterase inhibitor.

    PubMed

    Molina, C; Brun, J; Coulet, M; Betail, G; Wahl, D; Hartmann, L

    1977-03-01

    Six patients in a family with a history of hereditary angioedema reported swelling of the extremities and recurrent abdominal pain occurring spontaneously or after trauma. Attacks of oedema involving the airways, the greatest danger with this disorder, were present only in one case. This autosomal dominant disease is due to deficient activity of the inhibitor of the first component of complement. Low levels of C4, and absence of C1 esterase inhibitor confirm the diagnosis. Two asymptomatic cases with the appropriate biochemical abnormality are reported in this study. For short term prophylaxis of attacks (before surgery expecially), fresh frozen plasma is used, or better still, C1 esterase inhibitor. For long term prophylaxis of attacks antifibrinolytic and hormonal drugs are used: in two cases, the authors obtained good results with methyltestosterone after failure of tranexamic acid.

  3. [The development and introduction of a rational system for the protection of the personnel in a large enterprise against attack by blood-sucking arthropods in western Siberia].

    PubMed

    Ermishev, Iu V; Dremova, V P; Stepnov, A P; Semenov, V E

    2000-01-01

    In the middle Ob River Valley (north and moderate taiga), a large number of bloodsucking dipterans (mosquitoes, blackflies, biting midges, horseflies) are recorded during 90-100 days; the activity of Ixodes persulcatus and their attack on humans are notified during 90-115 days. A package of measures that protect petroleum industrial workers from the attacks of bloodsucking insects and ticks includes the use of protective suits, the treatment of premises with insecticides, the use of repellents, and health education. Protective means for workers should be the items included into the list of expenses on safety measures. Work is done on a cost-accounting principle. The introduced system annually shows a high efficiency (95-98%) in protecting large groups of workers in their working places.

  4. Attacks on practical quantum key distribution systems (and how to prevent them)

    NASA Astrophysics Data System (ADS)

    Jain, Nitin; Stiller, Birgit; Khan, Imran; Elser, Dominique; Marquardt, Christoph; Leuchs, Gerd

    2016-07-01

    With the emergence of an information society, the idea of protecting sensitive data is steadily gaining importance. Conventional encryption methods may not be sufficient to guarantee data protection in the future. Quantum key distribution (QKD) is an emerging technology that exploits fundamental physical properties to guarantee perfect security in theory. However, it is not easy to ensure in practice that the implementations of QKD systems are exactly in line with the theoretical specifications. Such theory-practice deviations can open loopholes and compromise security. Several such loopholes have been discovered and investigated in the last decade. These activities have motivated the proposal and implementation of appropriate countermeasures, thereby preventing future attacks and enhancing the practical security of QKD. This article introduces the so-called field of quantum hacking by summarising a variety of attacks and their prevention mechanisms.

  5. On a simulation study for reliable and secured smart grid communications

    NASA Astrophysics Data System (ADS)

    Mallapuram, Sriharsha; Moulema, Paul; Yu, Wei

    2015-05-01

    Demand response is one of key smart grid applications that aims to reduce power generation at peak hours and maintain a balance between supply and demand. With the support of communication networks, energy consumers can become active actors in the energy management process by adjusting or rescheduling their electricity usage during peak hours based on utilities pricing incentives. Nonetheless, the integration of communication networks expose the smart grid to cyber-attacks. In this paper, we developed a smart grid simulation test-bed and designed evaluation scenarios. By leveraging the capabilities of Matlab and ns-3 simulation tools, we conducted a simulation study to evaluate the impact of cyber-attacks on demand response application. Our data shows that cyber-attacks could seriously disrupt smart grid operations, thus confirming the need of secure and resilient communication networks for supporting smart grid operations.

  6. On detection and visualization techniques for cyber security situation awareness

    NASA Astrophysics Data System (ADS)

    Yu, Wei; Wei, Shixiao; Shen, Dan; Blowers, Misty; Blasch, Erik P.; Pham, Khanh D.; Chen, Genshe; Zhang, Hanlin; Lu, Chao

    2013-05-01

    Networking technologies are exponentially increasing to meet worldwide communication requirements. The rapid growth of network technologies and perversity of communications pose serious security issues. In this paper, we aim to developing an integrated network defense system with situation awareness capabilities to present the useful information for human analysts. In particular, we implement a prototypical system that includes both the distributed passive and active network sensors and traffic visualization features, such as 1D, 2D and 3D based network traffic displays. To effectively detect attacks, we also implement algorithms to transform real-world data of IP addresses into images and study the pattern of attacks and use both the discrete wavelet transform (DWT) based scheme and the statistical based scheme to detect attacks. Through an extensive simulation study, our data validate the effectiveness of our implemented defense system.

  7. Sleep bruxism possibly triggered by multiple sclerosis attacks and treated successfully with botulinum toxin: Report of three cases.

    PubMed

    Sevim, Serhan; Kaleağası, Hakan; Fidancı, Halit

    2015-09-01

    Sleep bruxism refers to a nocturnal parafunctional activity including the clenching, grinding or gnashing of teeth. While most of the nocturnal bruxism cases seen in the general population are apparently idiopathic, it has been reported to be associated with a range of neurological diseases such as Huntington's disease, cranio-cervical dystonia and post-anoxic brain damage, but not multiple sclerosis (MS). We describe three cases of MS patients who have had moderate to severe complaints of bruxism in the two weeks following their relevant MS attacks. None of the three patients had a diagnosis of bruxism prior to her attack. The diagnosis was confirmed in one out of three by a polysomnography. One patient did not have any complaints related to bruxism previous to her attack, whereas two had mild and infrequent complaints. The symptoms of the relevant attacks were left hemihypesthesia in all and hemiparesis in two. None of the patients had spasticity that could result in severe teeth clenching. All three patients presented with morning headaches and jaw pain or tightness and were treated successfully with botulinum toxin (Btx) injections applied to their masseter and temporalis muscles. The cause of bruxism is controversial but lesions of the cortico-basalganglia-thalamo-cotrical loops are thought to be most likely. However, acute or chronic lesions in those pathways were not demonstrated in the 3 patients. It is feasible that they had normal appearing white matter interruptions in their cortico-basalganglia-thalamocortical loops along with their relevant attack. Copyright © 2015 Elsevier B.V. All rights reserved.

  8. Decontamination formulation with sorbent additive

    DOEpatents

    Tucker; Mark D. , Comstock; Robert H.

    2007-10-16

    A decontamination formulation and method of making that neutralizes the adverse health effects of both chemical and biological compounds, especially chemical warfare (CW) and biological warfare (BW) agents, and toxic industrial chemicals. The formulation provides solubilizing compounds that serve to effectively render the chemical and biological compounds, particularly CW and BW compounds, susceptible to attack, and at least one reactive compound that serves to attack (and detoxify or kill) the compound. The formulation includes at least one solubilizing agent, a reactive compound, a bleaching activator, a sorbent additive, and water. The highly adsorbent, water-soluble sorbent additive (e.g., sorbitol or mannitol) is used to "dry out" one or more liquid ingredients, such as the liquid bleaching activator (e.g., propylene glycol diacetate or glycerol diacetate) and convert the activator into a dry, free-flowing powder that has an extended shelf life, and is more convenient to handle and mix in the field.

  9. Detecting Cyber Attacks On Nuclear Power Plants

    NASA Astrophysics Data System (ADS)

    Rrushi, Julian; Campbell, Roy

    This paper proposes an unconventional anomaly detection approach that provides digital instrumentation and control (I&C) systems in a nuclear power plant (NPP) with the capability to probabilistically discern between legitimate protocol frames and attack frames. The stochastic activity network (SAN) formalism is used to model the fusion of protocol activity in each digital I&C system and the operation of physical components of an NPP. SAN models are employed to analyze links between protocol frames as streams of bytes, their semantics in terms of NPP operations, control data as stored in the memory of I&C systems, the operations of I&C systems on NPP components, and NPP processes. Reward rates and impulse rewards are defined in the SAN models based on the activity-marking reward structure to estimate NPP operation profiles. These profiles are then used to probabilistically estimate the legitimacy of the semantics and payloads of protocol frames received by I&C systems.

  10. ATP hydrolysis in Eg5 kinesin involves a catalytic two-water mechanism.

    PubMed

    Parke, Courtney L; Wojcik, Edward J; Kim, Sunyoung; Worthylake, David K

    2010-02-19

    Motor proteins couple steps in ATP binding and hydrolysis to conformational switching both in and remote from the active site. In our kinesin.AMPPPNP crystal structure, closure of the active site results in structural transformations appropriate for microtubule binding and organizes an orthosteric two-water cluster. We conclude that a proton is shared between the lytic water, positioned for gamma-phosphate attack, and a second water that serves as a general base. To our knowledge, this is the first experimental detection of the catalytic base for any ATPase. Deprotonation of the second water by switch residues likely triggers subsequent large scale structural rearrangements. Therefore, the catalytic base is responsible for initiating nucleophilic attack of ATP and for relaying the positive charge over long distances to initiate mechanotransduction. Coordination of switch movements via sequential proton transfer along paired water clusters may be universal for nucleotide triphosphatases with conserved active sites, such as myosins and G-proteins.

  11. Joint Force Quarterly. Issue 51, 4th Quarter, October 2008

    DTIC Science & Technology

    2008-10-01

    and Japanese forces to conduct operations in the event of a WMD attack, to include consequence management operations. Recent activities have...strategic challenges. As a supple- ment, we hosted regular professional devel- opment activities, such as Friday afternoon cinema presentations where a

  12. [Microbiological corrosion of aluminum alloys].

    PubMed

    Smirnov, V F; Belov, D V; Sokolova, T N; Kuzina, O V; Kartashov, V R

    2008-01-01

    Biological corrosion of ADO quality aluminum and aluminum-based construction materials (alloys V65, D16, and D16T) was studied. Thirteen microscopic fungus species and six bacterial species proved to be able to attack aluminum and its alloys. It was found that biocorrosion of metals by microscopic fungi and bacteria was mediated by certain exometabolites. Experiments on biocorrosion of the materials by the microscopic fungus Alternaria alternata, the most active biodegrader, demonstrated that the micromycete attack started with the appearance of exudate with pH 8-9 on end faces of the samples.

  13. A Bernoulli Gaussian Watermark for Detecting Integrity Attacks in Control Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Weerakkody, Sean; Ozel, Omur; Sinopoli, Bruno

    We examine the merit of Bernoulli packet drops in actively detecting integrity attacks on control systems. The aim is to detect an adversary who delivers fake sensor measurements to a system operator in order to conceal their effect on the plant. Physical watermarks, or noisy additive Gaussian inputs, have been previously used to detect several classes of integrity attacks in control systems. In this paper, we consider the analysis and design of Gaussian physical watermarks in the presence of packet drops at the control input. On one hand, this enables analysis in a more general network setting. On the othermore » hand, we observe that in certain cases, Bernoulli packet drops can improve detection performance relative to a purely Gaussian watermark. This motivates the joint design of a Bernoulli-Gaussian watermark which incorporates both an additive Gaussian input and a Bernoulli drop process. We characterize the effect of such a watermark on system performance as well as attack detectability in two separate design scenarios. Here, we consider a correlation detector for attack recognition. We then propose efficiently solvable optimization problems to intelligently select parameters of the Gaussian input and the Bernoulli drop process while addressing security and performance trade-offs. Finally, we provide numerical results which illustrate that a watermark with packet drops can indeed outperform a Gaussian watermark.« less

  14. The role of the emergency services in the optimisation of primary angioplasty: experience from London and the Heart Attack Team.

    PubMed

    Dalby, Miles; Whitbread, Mark

    2013-08-22

    Early ambulance services often confined their activities to a "scoop and run" approach, conveying sick patients quickly to the nearest emergency department. With the advent of modern ST-elevation myocardial infarction (STEMI) management and primary percutaneous coronary intervention (PPCI), the role of the emergency medical service (EMS) has expanded significantly. This review discusses the critical and evolving collaboration between the EMS and the heart attack centre. Speed of reperfusion is a major determinant of outcome in STEMI and, whilst the patient delay (symptom to call time) has a central role in this, system delay (first medical contact to balloon time) is linked to mortality and is used to measure the response of a PPCI programme and is a key element of contemporary guidelines. In addition to rapid diagnosis and transfer to the heart attack centre, the EMS has to deliver a growing number of established treatments including resuscitation and drug therapy. EMS also continually needs to develop expertise in new techniques such as advanced management of cardiac arrest patients, including automated cardiopulmonary resuscitation, and will need to deliver newer therapies if trials support their use, including cooling and preconditioning. Ultimately, the EMS has a central role in the management of STEMI patients which needs to be fully aligned with the heart attack centres. This integration of services is perhaps best regarded as the Heart Attack Team.

  15. Recent advances in management and treatment of hereditary angioedema.

    PubMed

    Sardana, Niti; Craig, Timothy J

    2011-12-01

    Hereditary angioedema (HAE) is a rare autosomal-dominant disease characterized by recurrent self-limiting episodes of skin and mucosal edema. Morbidity and mortality are significant, and new and pending therapies are now available to reduce the risk associated with the disease. To update the reader on new advances in HAE to improve patient care. We performed a literature search of Ovid, PubMed, and Google to develop this review. Articles that are necessary for the understanding and use of the new therapeutic options for HAE were chosen, and studies of high quality were used to support the use of therapies, and in most cases, results from phase III studies were used. Until recently, therapy for HAE attacks in the United States consisted of symptom relief with narcotics, hydration, and fresh-frozen plasma, which contains active C1 inhibitor. Therapy to prevent HAE attacks has been confined to androgens and, occasionally, antifibrinolytic agents; however, both drug groups have significant adverse effects. The approval of C1-inhibitor concentrate for prevention and acute therapy has improved efficacy and safety. Ecallantide has also been approved for therapy of attacks, and icatibant is expected to be approved in the next few months for attacks. Recombinant C1 inhibitor is presently in phase III studies and should be available for attacks in the near future. In this article we review the changing therapeutic options available for patients in 2011 and beyond.

  16. Interplant communication of tomato plants through underground common mycorrhizal networks.

    PubMed

    Song, Yuan Yuan; Zeng, Ren Sen; Xu, Jian Feng; Li, Jun; Shen, Xiang; Yihdego, Woldemariam Gebrehiwot

    2010-10-13

    Plants can defend themselves to pathogen and herbivore attack by responding to chemical signals that are emitted by attacked plants. It is well established that such signals can be transferred through the air. In theory, plants can also communicate with each other through underground common mycorrhizal networks (CMNs) that interconnect roots of multiple plants. However, until now research focused on plant-to-plant carbon nutrient movement and there is no evidence that defense signals can be exchanged through such mycorrhizal hyphal networks. Here, we show that CMNs mediate plant-plant communication between healthy plants and pathogen-infected tomato plants (Lycopersicon esculentum Mill.). After establishment of CMNs with the arbuscular mycorrhizal fungus Glomus mosseae between tomato plants, inoculation of 'donor' plants with the pathogen Alternaria solani led to increases in disease resistance and activities of the putative defensive enzymes, peroxidase, polyphenol oxidase, chitinase, β-1,3-glucanase, phenylalanine ammonia-lyase and lipoxygenase in healthy neighbouring 'receiver' plants. The uninfected 'receiver' plants also activated six defence-related genes when CMNs connected 'donor' plants challenged with A. solani. This finding indicates that CMNs may function as a plant-plant underground communication conduit whereby disease resistance and induced defence signals can be transferred between the healthy and pathogen-infected neighbouring plants, suggesting that plants can 'eavesdrop' on defence signals from the pathogen-challenged neighbours through CMNs to activate defences before being attacked themselves.

  17. Superior Therapeutic Index in Lymphoma Therapy: CD30+ CD34+ Hematopoietic Stem Cells Resist a Chimeric Antigen Receptor T-cell Attack

    PubMed Central

    Hombach, Andreas A; Görgens, André; Chmielewski, Markus; Murke, Florian; Kimpel, Janine; Giebel, Bernd; Abken, Hinrich

    2016-01-01

    Recent clinical trials with chimeric antigen receptor (CAR) redirected T cells targeting CD19 revealed particular efficacy in the treatment of leukemia/lymphoma, however, were accompanied by a lasting depletion of healthy B cells. We here explored CD30 as an alternative target, which is validated in lymphoma therapy and expressed by a broad variety of Hodgkin's and non-Hodgkin's lymphomas. As a safty concern, however, CD30 is also expressed by lymphocytes and hematopoietic stem and progenitor cells (HSPCs) during activation. We revealed that HRS3scFv-derived CAR T cells are superior since they were not blocked by soluble CD30 and did not attack CD30+ HSPCs while eliminating CD30+ lymphoma cells. Consequently, normal hemato- and lymphopoiesis was not affected in the long-term in the humanized mouse; the number of blood B and T cells remained unchanged. We provide evidence that the CD30+ HSPCs are protected against a CAR T-cell attack by substantially lower CD30 levels than lymphoma cells and higher levels of the granzyme B inactivating SP6/PI9 serine protease, which furthermore increased upon activation. Taken together, adoptive cell therapy with anti-CD30 CAR T cells displays a superior therapeutic index in the treatment of CD30+ malignancies leaving healthy activated lymphocytes and HSPCs unaffected. PMID:27112062

  18. Robustness of non-interdependent and interdependent networks against dependent and adaptive attacks

    NASA Astrophysics Data System (ADS)

    Tyra, Adam; Li, Jingtao; Shang, Yilun; Jiang, Shuo; Zhao, Yanjun; Xu, Shouhuai

    2017-09-01

    Robustness of complex networks has been extensively studied via the notion of site percolation, which typically models independent and non-adaptive attacks (or disruptions). However, real-life attacks are often dependent and/or adaptive. This motivates us to characterize the robustness of complex networks, including non-interdependent and interdependent ones, against dependent and adaptive attacks. For this purpose, dependent attacks are accommodated by L-hop percolation where the nodes within some L-hop (L ≥ 0) distance of a chosen node are all deleted during one attack (with L = 0 degenerating to site percolation). Whereas, adaptive attacks are launched by attackers who can make node-selection decisions based on the network state in the beginning of each attack. The resulting characterization enriches the body of knowledge with new insights, such as: (i) the Achilles' Heel phenomenon is only valid for independent attacks, but not for dependent attacks; (ii) powerful attack strategies (e.g., targeted attacks and dependent attacks, dependent attacks and adaptive attacks) are not compatible and cannot help the attacker when used collectively. Our results shed some light on the design of robust complex networks.

  19. A telephone hotline for transient ischaemic attack and stroke: prospective audit of a model to improve rapid access to specialist stroke care.

    PubMed

    Kerr, Enda; Arulraj, Nolan; Scott, Maggie; McDowall, Mike; van Dijke, Margrethe; Keir, Sarah; Sandercock, Peter; Dennis, Martin

    2010-07-02

    Patients with transient ischaemic attack or stroke benefit from early diagnosis, specialist assessment, and treatment with thrombolysis, and from stroke unit care and secondary prevention. The challenge with such patients is to minimise delays and ensure that treatment is appropriate, and to provide this care with the available resources. An ongoing prospective audit of a transient ischaemic attack and stroke clinic (1 January 2005 to 30 September 2009), as part of the Scottish Stroke Care Audit, and a three month targeted audit of immediate telephone access to a specialist stroke consultant (1 February 2009 to 30 April 2009). Stroke and transient ischaemic attack services in Lothian, a region of Scotland with a population of 810,000. Delays to assessment at a rapid access transient ischaemic attack and stroke clinic; delays to appropriate treatment. In February 2007 we introduced a 24 hours a day, seven days a week hotline to a consultant, who provided immediate advice on diagnosis, investigation, and emergency treatment for patients with transient ischaemic attack or stroke, and suggested the most appropriate care pathway, which might include an early appointment in a transient ischaemic attack and stroke clinic. The introduction of the hotline was associated with an immediate and sustained reduction in delays to assessment (from 13 to three days) and treatment. The proportion of participants taking statins at the time of visiting the clinic increased from 40% before the introduction of the hotline to 60% after the hotline was in place. Also, the hotline contributed to a reduction in the delay from last event to carotid surgery, from 58 days to 21.5 days. A total of 376 calls were received during the three month audit. Of the 273 (88%) referrers who responded to our questionnaire, 257 (94%) were very satisfied with the advice given over the hotline. Although associated with some disruption to the activities of the consultants, a 24 hours a day, seven days a week telephone hotline to a consultant is a feasible and effective means of reducing delays to specialist assessment and treatment of patients with transient ischaemic attack or stroke.

  20. Sodium Oxybate

    MedlinePlus

    Sodium oxybate is used to prevent attacks of cataplexy (episodes of muscle weakness that begin suddenly and ... urge to sleep during daily activities, and cataplexy). Sodium oxybate is in a class of medications called ...

  1. Protein Poly(ADP-ribosyl)ation Regulates Arabidopsis Immune Gene Expression and Defense Responses

    PubMed Central

    Feng, Baomin; Liu, Chenglong; de Oliveira, Marcos V. V.; Intorne, Aline C.; Li, Bo; Babilonia, Kevin; de Souza Filho, Gonçalo A.; Shan, Libo; He, Ping

    2015-01-01

    Perception of microbe-associated molecular patterns (MAMPs) elicits transcriptional reprogramming in hosts and activates defense to pathogen attacks. The molecular mechanisms underlying plant pattern-triggered immunity remain elusive. A genetic screen identified Arabidopsis poly(ADP-ribose) glycohydrolase 1 (atparg1) mutant with elevated immune gene expression upon multiple MAMP and pathogen treatments. Poly(ADP-ribose) glycohydrolase (PARG) is predicted to remove poly(ADP-ribose) polymers on acceptor proteins modified by poly(ADP-ribose) polymerases (PARPs) with three PARPs and two PARGs in Arabidopsis genome. AtPARP1 and AtPARP2 possess poly(ADP-ribose) polymerase activity, and the activity of AtPARP2 was enhanced by MAMP treatment. AtPARG1, but not AtPARG2, carries glycohydrolase activity in vivo and in vitro. Importantly, mutation (G450R) in atparg1 blocks its activity and the corresponding residue is highly conserved and essential for human HsPARG activity. Consistently, mutant atparp1atparp2 plants exhibited compromised immune gene activation and enhanced susceptibility to pathogen infections. Our study indicates that protein poly(ADP-ribosyl)ation plays critical roles in plant immune gene expression and defense to pathogen attacks. PMID:25569773

  2. Future's operation areas: new-generation suppression enemy air defence (SEAD) elements

    NASA Astrophysics Data System (ADS)

    Hazinedar, Ä.°lker

    2015-05-01

    Since air vehicles took place in the theater of operations, they have become the indispensable elements and the strongest attack power of armed forces. In the following period, with technological development, supersonic aircrafts took place in the operation area and this increased effectiveness of air vehicles much more. Air forces have used these aircrafts during important missions like strategic attack and air defense operations. On the other hand, decision makers understood that it was not feasible to intercept fighter aircrafts by executing combat air patrol flight missions. Since there is not enough reaction time to intercept the high speed aircrafts, ground stationed Surface to Air Missiles (SAM) system requirement has emerged. Therefore, SAM systems took place in the operation scene as well. Due to the fact that SAM systems emerged against the attack power, the attack aircrafts are to keep away from the fire of the ground stationed SAM systems. Hence, the requirement of Suppression Enemy Air Defense (SEAD) arose. SEAD elements take under suppression the radar of the SAM systems. In this way, attack aircrafts are able to attack without the risk of SAM systems. The purpose of this study is to find new methods or concepts in order to protect friendly attack aircrafts against ground based surface to air missiles' fires. Modernization of SAM systems and new generation SAM system producing activities have proceeded with positive acceleration. So, current SEAD elements and concepts are not able to cover the requirements due to the increased SAM system ranges. According to the concepts, SEAD weapons` ranges must be longer than the SAM weapons' ranges to protect friendly aircrafts. In this study, new concept was offered to overcome the deficiencies of current SEAD concept. The elements of new concepts were put forward. Classic SEAD concept and new generation concepts were assessed by using SWOT analysis technique. As a result, this study has revealed that, air forces' effectiveness can be enhanced by using new generation SEAD concepts against enemy SAM systems.

  3. The association of a heart attack or stroke with depressive symptoms stratified by the presence of a close social contact: findings from the National Health and Aging Trends Study Cohort.

    PubMed

    Simning, Adam; Seplaki, Christopher L; Conwell, Yeates

    2018-01-01

    The objective of the study is to examine whether the risk of having clinically significant depressive symptoms following a heart attack or stroke varies by the presence of a close social contact. The National Health and Aging Trends Study is a nationally representative longitudinal survey of US Medicare beneficiaries aged 65 and older initiated in 2011. A total of 5643 older adults had information on social contacts at baseline and depressive symptoms at the 1-year follow-up interview. The two-item Patient Health Questionnaire identified clinically significant depressive symptoms. Interview questions examined social contacts and the presence of self-reported heart attack or stroke during the year of follow-up. A total of 297 older adults reported experiencing a heart attack and/or stroke between their baseline and follow-up interviews. In regression analyses accounting for sociodemographics, baseline depressive symptoms, medical comorbidity, and activities of daily living impairment, older adults with no close social contacts had increased odds of depressive symptoms at follow-up after experiencing a heart attack or stroke, while those with close social contacts had increased odds of depressive symptoms at follow-up after experiencing a stroke, but not a heart attack. Older adults have increased odds of having depressive symptoms following a self-reported stroke, but only those with no close social contacts had increased odds of depressive symptoms following a heart attack. Social networks may play a role in the mechanisms underlying depression among older adults experiencing certain acute health events. Future work exploring the potential causal relationships suggested here, if confirmed, could inform interventions to alleviate or prevent depression among at risk older adults. Copyright © 2017 John Wiley & Sons, Ltd. Copyright © 2017 John Wiley & Sons, Ltd.

  4. Corticotropin releasing factor influences aggression and monoamines: Modulation of attacks and retreats

    PubMed Central

    Carpenter, Russ E.; Korzan, Wayne J.; Bockholt, Craig; Watt, Michael J.; Forster, Gina L.; Renner, Kenneth J.; Summers, Cliff H.

    2009-01-01

    Salmonids establish social hierarchies as a result of aggressive social interactions. The establishment of dominant or subordinate status is strongly linked to neuroendocrine responses mediated through the stress axis. In this study, we tested the effects of icv CRF on the behavioral outcome, plasma cortisol and monoamine function in trout subjected to a socially aggressive encounter. Rainbow trout were treated with an icv injection of artificial cerebrospinal fluid (aCSF), 500 or 2000 ng ovine CRF, or not injected. Fish were allowed to interact with a similarly sized conspecific for 15 minutes. Following the behavioral interaction, plasma cortisol and central monoamine concentrations were analyzed. Trout treated with CRF were victorious in approximately 60% of the aggressive encounters against aCSF treated opponents. Trout injected with CRF exhibited a reduction in the total number of attacks and decreased latency to attack. When trout were divided winners and losers, only victorious CRF-treated fish exhibited a reduced latency to attack and fewer retreats. Social stress increased cortisol levels in both winners and losers of aggressive interaction. This effect was enhanced with the additional stress incurred from icv injection of aCSF. However, icv CRF in addition to social stress decreased plasma cortisol in both winners and losers. While aggression stimulated significant changes in serotonergic and dopaminergic activity, the magnitude and direction were dependent on limbic brain region, CRF dose, and outcome of social aggression. With broad effects on aggressive behavior, anxiety, stress responsiveness, and central monoaminergic activity, CRF plays an important role modulating the behavioral components of social interaction. PMID:18992791

  5. [Outbreak of whooping cough with a high attack rate in well-vaccinated children and adolescents].

    PubMed

    Torres, Joan; Godoy, Pere; Artigues, Antoni; Codina, Gemma; Bach, Pilar; Mòdol, Irma; Duró, Maria Àngels; Trilla, Carme

    2011-10-01

    Whooping cough is a re-emerging disease. We describe the investigation of an outbreak of whooping cough and the measures of control adopted. The event was reconstructed through a longitudinal study of incidence. In addition to the notified cases, an active search from the list of those who attended summer camps was made through telephone calls. An epidemiological survey was applied to all cases; vaccination history was confirmed with computerised clinical history and the obtaining of samples for analytical confirmation was proposed. The description of the outbreak was made through the epidemic curve, the attack rates, the relative risk and the linear trend by ages and the vaccination coverage. Of the 30 cases that appeared, 22 (73.3%) were among the members of the summer camps. In these, the attack rate was 21.8%, 26.7% among the children and adolescents increasing linearly with the age. The large majority (86.4%) of this last group were correctly vaccinated, including the fifth dose at the age of 4-6 years. Through the meticulous study of the first cases and the telephone calls to those who attended the summer camp, 90% of the cases of the outbreak were detected. The active search of cases allowed an outbreak of whooping cough with a high attack rate to be studied in children and adolescents with a high vaccination coverage, and the application of control measures that contributed to stop the outbreak. Copyright © 2010 Elsevier España, S.L. All rights reserved.

  6. Predatory behavior inTupinambis teguixin (Sauria: Teiidae). I. Tongue-flicking responses to chemical food stimuli.

    PubMed

    Yanosky, A A; Iriart, D E; Mercolli, C

    1993-02-01

    Black tegu lizards (Tupinambis teguixin) have the ability to detect food odors and discriminate between them and nonfood odors. This was tested by offering chemical stimuli on cotton-tipped applicators to the animals. Stimuli were from two plant and two animal species known to be principal items in these lizards' diets, demineralized water as an odorless control, and eaude-cologne as an odorous control lacking feeding or social importance. Tongueflick attack score, latency to attack, preattack tongue-flicks, and number of attacks were analyzed. The results clearly demonstrated that this species responds to chemical food stimuli, but does not respond to odorless nonfood stimuli. Responses differed among food types. There were no sex differences. These results are in agreement with the prediction that lizards having forked tongues and an active foraging mode rely on chemical cues for feeding.

  7. Cyclic vomiting associated with excessive dopamine in Riley-day syndrome.

    PubMed

    Norcliffe-Kaufmann, Lucy J; Axelrod, Felicia B; Kaufmann, Horacio

    2013-02-01

    To analyze the neurochemical profile during the recurrent attacks of nausea and vomiting in patients with Riley-day syndrome. One of the most disabling features of patients with Riley-day syndrome are recurrent attacks of severe nausea/retching/vomiting accompanied by hypertension, tachycardia, and skin flushing, usually triggered by emotional or other stresses. We monitored blood pressure and heart rate and measured plasma catecholamines during typical dysautonomic crises triggered by emotionally charged situations. For comparison, measurements were repeated at follow-up after the symptoms had resolved and the patients were feeling calm and well. During a typical attack, patients were hypertensive and tachycardic. In all patients, circulating levels of norepinephrine (P < 0.002) and dopamine (P < 0.007) increased significantly. Activation of dopamine receptors in the chemoreceptor trigger zone may explain the cyclic nausea/retching/vomiting of patients with Riley-day syndrome.

  8. A Targeted Attack For Enhancing Resiliency of Intelligent Intrusion Detection Modules in Energy Cyber Physical Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Youssef, Tarek; El Hariri, Mohammad; Habib, Hani

    Abstract— Secure high-speed communication is required to ensure proper operation of complex power grid systems and prevent malicious tampering activities. In this paper, artificial neural networks with temporal dependency are introduced for false data identification and mitigation for broadcasted IEC 61850 SMV messages. The fast responses of such intelligent modules in intrusion detection make them suitable for time- critical applications, such as protection. However, care must be taken in selecting the appropriate intelligence model and decision criteria. As such, this paper presents a customizable malware script to sniff and manipulate SMV messages and demonstrates the ability of the malware tomore » trigger false positives in the neural network’s response. The malware developed is intended to be as a vaccine to harden the intrusion detection system against data manipulation attacks by enhancing the neural network’s ability to learn and adapt to these attacks.« less

  9. Functional identification of an aggression locus in the mouse hypothalamus

    PubMed Central

    Lin, Dayu; Boyle, Maureen P.; Dollar, Piotr; Lee, Hyosang; Perona, Pietro; Lein, Ed S.; Anderson, David J.

    2010-01-01

    Electrical stimulation of certain hypothalamic regions in cats and rodents can elicit attack behavior, but the exact location of relevant cells within these regions, their requirement for naturally occurring aggression and their relationship to mating circuits have not been clear. Genetic methods for neural circuit manipulation in mice provide a potentially powerful approach to this problem, but brain stimulation-evoked aggression has never been demonstrated in this species. Here we show that optogenetic, but not electrical, stimulation of neurons in the ventromedial hypothalamus, ventrolateral subdivision (VMHvl) causes male mice to attack both females and inanimate objects, as well as males. Pharmacogenetic silencing of VMHvl reversibly inhibits inter-male aggression. Immediate early gene analysis and single unit recordings from VMHvl during social interactions reveal overlapping but distinct neuronal subpopulations involved in fighting and mating. Neurons activated during attack are inhibited during mating, suggesting a potential neural substrate for competition between these behaviors. PMID:21307935

  10. Functional identification of an aggression locus in the mouse hypothalamus.

    PubMed

    Lin, Dayu; Boyle, Maureen P; Dollar, Piotr; Lee, Hyosang; Lein, E S; Perona, Pietro; Anderson, David J

    2011-02-10

    Electrical stimulation of certain hypothalamic regions in cats and rodents can elicit attack behaviour, but the exact location of relevant cells within these regions, their requirement for naturally occurring aggression and their relationship to mating circuits have not been clear. Genetic methods for neural circuit manipulation in mice provide a potentially powerful approach to this problem, but brain-stimulation-evoked aggression has never been demonstrated in this species. Here we show that optogenetic, but not electrical, stimulation of neurons in the ventromedial hypothalamus, ventrolateral subdivision (VMHvl) causes male mice to attack both females and inanimate objects, as well as males. Pharmacogenetic silencing of VMHvl reversibly inhibits inter-male aggression. Immediate early gene analysis and single unit recordings from VMHvl during social interactions reveal overlapping but distinct neuronal subpopulations involved in fighting and mating. Neurons activated during attack are inhibited during mating, suggesting a potential neural substrate for competition between these opponent social behaviours.

  11. High-angle-of-attack aerodynamics - Lessons learned

    NASA Technical Reports Server (NTRS)

    Chambers, J. R.

    1986-01-01

    Recently, the military and civil technical communities have undertaken numerous studies of the high angle-of-attack aerodynamic characteristics of advanced airplane and missile configurations. The method of approach and the design methodology employed have necessarily been experimental and exploratory in nature, due to the complex nature of separated flows. However, despite the relatively poor definition of many of the key aerodynamic phenomena involved for high-alpha conditions, some generic guidelines for design consideration have been identified. The present paper summarizes some of the more important lessons learned in the area of high angle-of-attack aerodynamics with examples of a number of key concepts and with particular emphasis on high-alpha stability and control characteristics of high performance aircraft. Topics covered in the discussion include the impact of design evolution, forebody flows, control of separated flows, configuration effects, aerodynamic controls, wind-tunnel flight correlation, and recent NASA research activities.

  12. Origins of the different metal preferences of Escherichia coli peptide deformylase and Bacillus thermoproteolyticus thermolysin: a comparative quantum mechanical/molecular mechanical study.

    PubMed

    Dong, Minghui; Liu, Haiyan

    2008-08-21

    The Escherichia coli peptide deformylase (PDF) and Bacillus thermoproteolyticus thermolysin (TLN) are two representative metal-requiring peptidases having remarkably similar active centers but distinctively different metal preferences. Zinc is a competent catalytic cofactor for TLN but not for PDF. Reaction pathways and the associated energetics for both enzymes were determined using combined semiempirical and ab initio quantum mechanical/molecular mechanical modeling, without presuming reaction coordinates. The results confirmed that both enzymes catalyze via the same chemical steps, and reproduced their different preferences for zinc or iron as competent cofactors. Further analyses indicated that different feasibility of the nucleophilic attack step leads to different metal preferences of the two enzymes. In TLN, the substrate is strongly activated and can serve as the fifth coordination ligand of zinc prior to the chemical steps. In PDF, the substrate carbonyl is activated by the chemical step itself, and becomes the fifth coordination partner of zinc only in a later stage of the nucleophilic attack. These leads to a much more difficult nucleophilic attack in PDF than in TLN. Different from some earlier suggestions, zinc has no difficulty in accepting an activated substrate as the fifth ligand to switch from tetra- to penta-coordination in either PDF or TLN. When iron replaces zinc, its stronger interaction with the hydroxide ligand may lead to higher activation barrier in TLN. In PDF, the stronger interactions of iron with ligands allow iron-substrate coordination to take place either before or at a very early stage of the chemical step, leading to effective catalysis. Our calculations also show combined semiempirical and ab initio quantum mechanical modeling can be efficient approaches to explore complicated reaction pathways in enzyme systems.

  13. Inter- and intra-species variation in genome-wide gene expression of Drosophila in response to parasitoid wasp attack.

    PubMed

    Salazar-Jaramillo, Laura; Jalvingh, Kirsten M; de Haan, Ammerins; Kraaijeveld, Ken; Buermans, Henk; Wertheim, Bregje

    2017-04-27

    Parasitoid resistance in Drosophila varies considerably, among and within species. An immune response, lamellocyte-mediated encapsulation, evolved in a subclade of Drosophila and was subsequently lost in at least one species within this subclade. While the mechanisms of resistance are fairly well documented in D. melanogaster, much less is known for closely related species. Here, we studied the inter- and intra-species variation in gene expression after parasitoid attack in Drosophila. We used RNA-seq after parasitization of four closely related Drosophila species of the melanogaster subgroup and replicated lines of D. melanogaster experimentally selected for increased resistance to gain insights into short- and long-term evolutionary changes. We found a core set of genes that are consistently up-regulated after parasitoid attack in the species and lines tested, regardless of their level of resistance. Another set of genes showed no up-regulation or expression in D. sechellia, the species unable to raise an immune response against parasitoids. This set consists largely of genes that are lineage-restricted to the melanogaster subgroup. Artificially selected lines did not show significant differences in gene expression with respect to non-selected lines in their responses to parasitoid attack, but several genes showed differential exon usage. We showed substantial similarities, but also notable differences, in the transcriptional responses to parasitoid attack among four closely related Drosophila species. In contrast, within D. melanogaster, the responses were remarkably similar. We confirmed that in the short-term, selection does not act on a pre-activation of the immune response. Instead it may target alternative mechanisms such as differential exon usage. In the long-term, we found support for the hypothesis that the ability to immunologically resist parasitoid attack is contingent on new genes that are restricted to the melanogaster subgroup.

  14. Optimal Predator Risk Assessment by the Sonar-Jamming Arctiine Moth Bertholdia trigona

    PubMed Central

    Corcoran, Aaron J.; Wagner, Ryan D.; Conner, William E.

    2013-01-01

    Nearly all animals face a tradeoff between seeking food and mates and avoiding predation. Optimal escape theory holds that an animal confronted with a predator should only flee when benefits of flight (increased survival) outweigh the costs (energetic costs, lost foraging time, etc.). We propose a model for prey risk assessment based on the predator's stage of attack. Risk level should increase rapidly from when the predator detects the prey to when it commits to the attack. We tested this hypothesis using a predator – the echolocating bat – whose active biosonar reveals its stage of attack. We used a prey defense – clicking used for sonar jamming by the tiger moth Bertholdia trigona– that can be readily studied in the field and laboratory and is enacted simultaneously with evasive flight. We predicted that prey employ defenses soon after being detected and targeted, and that prey defensive thresholds discriminate between legitimate predatory threats and false threats where a nearby prey is attacked. Laboratory and field experiments using playbacks of ultrasound signals and naturally behaving bats, respectively, confirmed our predictions. Moths clicked soon after bats detected and targeted them. Also, B. trigona clicking thresholds closely matched predicted optimal thresholds for discriminating legitimate and false predator threats for bats using search and approach phase echolocation – the period when bats are searching for and assessing prey. To our knowledge, this is the first quantitative study to correlate the sensory stimuli that trigger defensive behaviors with measurements of signals provided by predators during natural attacks in the field. We propose theoretical models for explaining prey risk assessment depending on the availability of cues that reveal a predator's stage of attack. PMID:23671686

  15. ADJUSTMENT AMONG CHILDREN WITH RELATIVES WHO PARTICIPATED IN THE MANHUNT FOLLOWING THE BOSTON MARATHON ATTACK

    PubMed Central

    Comer, Jonathan S.; Kerns, Caroline E.; Elkins, R. Meredith; Edson, Aubrey L.; Chou, Tommy; Dantowitz, Annie; Miguel, Elizabeth; Brown, Bonnie; Coxe, Stefany; Green, Jennifer Greif

    2014-01-01

    Background Following the Boston Marathon attack, the extraordinary interagency manhunt and shelter-in-place made for a truly unprecedented experience for area families. Although research on Boston youth has found robust associations between manhunt-related experiences and post-attack functioning, such work does little to identify the specific needs of a particularly vulnerable population—i.e., children with a relative who participated in the manhunt. Understanding the adjustment of these youth is critical for informing clinical efforts. Methods Survey of Boston-area parents/caretakers (N = 460) reporting on their child’s attack/manhunt-related experiences, as well as psychosocial functioning in the first six post-attack months; analyses compared youth with and without a relative in law enforcement or the armed services who participated in the manhunt. Results The proportion of youth with likely PTSD was 5.7 times higher among youth with relatives in the manhunt than among youth without. After accounting for child demographics, blast exposure, and children’s own exposure to manhunt events (e.g., hearing/seeing gunfire/explosions, having officers enter/search home), having a relative in the manhunt significantly predicted child PTSD symptoms, emotional symptoms, and hyperactivity/inattention. Fear during the manhunt that a loved one could be hurt mediated relationships between having a relative in the manhunt and clinical outcomes; living within the zone of greatest manhunt activity did not moderate observed relationships. Conclusions Children with relatives called upon to participate in the unprecedented interagency manhunt following the Boston Marathon attack carried a particularly heavy mental health burden. Continued research is needed to clarify the clinical needs of youth with relatives in high-risk occupations. PMID:24865569

  16. Adjustment among children with relatives who participated in the manhunt following the Boston Marathon attack.

    PubMed

    Comer, Jonathan S; Kerns, Caroline E; Elkins, R Meredith; Edson, Aubrey L; Chou, Tommy; Dantowitz, Annie; Miguel, Elizabeth; Brown, Bonnie; Coxe, Stefany; Green, Jennifer Greif

    2014-07-01

    Following the Boston Marathon attack, the extraordinary interagency manhunt and shelter-in-place made for a truly unprecedented experience for area families. Although research on Boston youth has found robust associations between manhunt-related experiences and post-attack functioning, such work does little to identify the specific needs of a particularly vulnerable population--i.e., children with a relative who participated in the manhunt. Understanding the adjustment of these youth is critical for informing clinical efforts. Survey of Boston-area parents/caretakers (N = 460) reporting on their child's attack/manhunt-related experiences, as well as psychosocial functioning in the first six post-attack months; analyses compared youth with and without a relative in law enforcement or the armed services who participated in the manhunt. The proportion of youth with likely PTSD was 5.7 times higher among youth with relatives in the manhunt than among youth without. After accounting for child demographics, blast exposure, and children's own exposure to manhunt events (e.g., hearing/seeing gunfire/explosions, having officers enter/search home), having a relative in the manhunt significantly predicted child PTSD symptoms, emotional symptoms, and hyperactivity/inattention. Fear during the manhunt that a loved one could be hurt mediated relationships between having a relative in the manhunt and clinical outcomes; living within the zone of greatest manhunt activity did not moderate observed relationships. Children with relatives called upon to participate in the unprecedented interagency manhunt following the Boston Marathon attack carried a particularly heavy mental health burden. Continued research is needed to clarify the clinical needs of youth with relatives in high-risk occupations. © 2014 Wiley Periodicals, Inc.

  17. Predicting Factors of Zone 4 Attack in Volleyball.

    PubMed

    Costa, Gustavo C; Castro, Henrique O; Evangelista, Breno F; Malheiros, Laura M; Greco, Pablo J; Ugrinowitsch, Herbert

    2017-06-01

    This study examined 142 volleyball games of the Men's Super League 2014/2015 seasons in Brazil from which we analyzed 24-26 games of each participating team, identifying 5,267 Zone 4 attacks for further analysis. Within these Zone 4 attacks, we analyzed the association between the effect of the attack carried out and the separate effects of serve reception, tempo and type of attack. We found that the reception, tempo of attack, second tempo of attack, and power of diagonal attack were predictors of the attack effect in Zone 4. Moreover, placed attacks showed a tendency to not yield a score. In conclusion, winning points in high-level men's volleyball requires excellent receptions, a fast attack tempo and powerfully executed of attacks.

  18. Plant Responses to Pathogen Attack: Small RNAs in Focus.

    PubMed

    Islam, Waqar; Noman, Ali; Qasim, Muhammad; Wang, Liande

    2018-02-08

    Small RNAs (sRNA) are a significant group of gene expression regulators for multiple biological processes in eukaryotes. In plants, many sRNA silencing pathways produce extensive array of sRNAs with specialized roles. The evidence on record advocates for the functions of sRNAs during plant microbe interactions. Host sRNAs are reckoned as mandatory elements of plant defense. sRNAs involved in plant defense processes via different pathways include both short interfering RNA (siRNA) and microRNA (miRNA) that actively regulate immunity in response to pathogenic attack via tackling pathogen-associated molecular patterns (PAMPs) and other effectors. In response to pathogen attack, plants protect themselves with the help of sRNA-dependent immune systems. That sRNA-mediated plant defense responses play a role during infections is an established fact. However, the regulations of several sRNAs still need extensive research. In this review, we discussed the topical advancements and findings relevant to pathogen attack and plant defense mediated by sRNAs. We attempted to point out diverse sRNAs as key defenders in plant systems. It is hoped that sRNAs would be exploited as a mainstream player to achieve food security by tackling different plant diseases.

  19. An Enhanced Biometric Based Authentication with Key-Agreement Protocol for Multi-Server Architecture Based on Elliptic Curve Cryptography.

    PubMed

    Reddy, Alavalapati Goutham; Das, Ashok Kumar; Odelu, Vanga; Yoo, Kee-Young

    2016-01-01

    Biometric based authentication protocols for multi-server architectures have gained momentum in recent times due to advancements in wireless technologies and associated constraints. Lu et al. recently proposed a robust biometric based authentication with key agreement protocol for a multi-server environment using smart cards. They claimed that their protocol is efficient and resistant to prominent security attacks. The careful investigation of this paper proves that Lu et al.'s protocol does not provide user anonymity, perfect forward secrecy and is susceptible to server and user impersonation attacks, man-in-middle attacks and clock synchronization problems. In addition, this paper proposes an enhanced biometric based authentication with key-agreement protocol for multi-server architecture based on elliptic curve cryptography using smartcards. We proved that the proposed protocol achieves mutual authentication using Burrows-Abadi-Needham (BAN) logic. The formal security of the proposed protocol is verified using the AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to show that our protocol can withstand active and passive attacks. The formal and informal security analyses and performance analysis demonstrates that the proposed protocol is robust and efficient compared to Lu et al.'s protocol and existing similar protocols.

  20. Protecting ICS Systems Within the Energy Sector from Cyber Attacks

    NASA Astrophysics Data System (ADS)

    Barnes, Shaquille

    Advance persistent threat (APT) groups are continuing to attack the energy sector through cyberspace, which poses a risk to our society, national security, and economy. Industrial control systems (ICSs) are not designed to handle cyber-attacks, which is why asset owners need to implement the correct proactive and reactive measures to mitigate the risk to their ICS environments. The Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) responded to 290 incidents for fiscal year 2016, where 59 of those incidents came from the Energy Sector. APT groups know how vulnerable energy sector ICS systems are and the destruction they can cause when they go offline such as loss of production, loss of life, and economic impact. Defending against APT groups requires more than just passive controls such as firewalls and antivirus solutions. Asset owners should implement a combination of best practices and active defense in their environment to defend against APT groups. Cyber-attacks against critical infrastructure will become more complex and harder to detect and respond to with traditional security controls. The purpose of this paper was to provide asset owners with the correct security controls and methodologies to help defend against APT groups.

  1. Plant Responses to Pathogen Attack: Small RNAs in Focus

    PubMed Central

    2018-01-01

    Small RNAs (sRNA) are a significant group of gene expression regulators for multiple biological processes in eukaryotes. In plants, many sRNA silencing pathways produce extensive array of sRNAs with specialized roles. The evidence on record advocates for the functions of sRNAs during plant microbe interactions. Host sRNAs are reckoned as mandatory elements of plant defense. sRNAs involved in plant defense processes via different pathways include both short interfering RNA (siRNA) and microRNA (miRNA) that actively regulate immunity in response to pathogenic attack via tackling pathogen-associated molecular patterns (PAMPs) and other effectors. In response to pathogen attack, plants protect themselves with the help of sRNA-dependent immune systems. That sRNA-mediated plant defense responses play a role during infections is an established fact. However, the regulations of several sRNAs still need extensive research. In this review, we discussed the topical advancements and findings relevant to pathogen attack and plant defense mediated by sRNAs. We attempted to point out diverse sRNAs as key defenders in plant systems. It is hoped that sRNAs would be exploited as a mainstream player to achieve food security by tackling different plant diseases. PMID:29419801

  2. Management of a severe forceful breather with Rett syndrome using carbogen.

    PubMed

    Smeets, Eric E J; Julu, Peter O O; van Waardenburg, Dick; Engerström, Ingegerd Witt; Hansen, Stig; Apartopoulos, Flora; Curfs, Leopold M G; Schrander-Stumpel, Connie T R M

    2006-11-01

    We have used a novel neurophysiological technique in the NeuroScope system in combination with conventional electroencephalography (EEG) to monitor both brainstem and cortical activity simultaneously in real-time in a girl with Rett syndrome. The presenting clinical features in our patient were severe sleep disturbances, irregular breathing in the awake state dominated by Valsalva's type of breathing followed by tachypnoea and very frequent attacks of seizures and vacant spells. Our novel neurophysiological data showed that the patient was a Forceful Breather according to the breathing categories in Rett syndrome. She had frequent abnormal spontaneous brainstem activation (ASBA) preceded by severe attacks of hypocapnoea, which was caused by a combination of Valsalva's type of breathing and tachypnoea and all these together were responsible for the seizures and non-epileptic vacant spells. The ASBA was not detectable in conventional EEG and there were no epileptiform changes in the EEG during the seizures and vacant spells caused by the hypocapnic attacks, therefore these were pseudo-seizures. The record of brainstem activity confirmed that these were autonomic events, a kind of "brainstem epilepsy". We successfully treated the sleep disturbance with Pipamperone, a 5-hydroxytryptophan antagonist of receptor type 2 and we prevented the severe hypocapnoea during Valsalva's type of breathing and during tachypnoea using carbogen (a mixture of 5% carbon dioxide and 95% oxygen), which we gave by inhalation. Our treatment drastically reduced the autonomic events, promoted whole night sleep and significantly improved the quality of life in our patient. She can now participate in normal family activity which was previously impossible before treatment.

  3. Age at asthma onset and asthma self-management education among adults in the United States.

    PubMed

    Mirabelli, Maria C; Beavers, Suzanne F; Shepler, Samantha H; Chatterjee, Arjun B

    2015-01-01

    Asthma self-management education improves asthma-related outcomes. We conducted this analysis to evaluate variation in the percentages of adults with active asthma reporting components of asthma self-management education by age at asthma onset. Data from 2011 to 2012 Asthma Call-back Surveys were used to estimate percentages of adults with active asthma reporting six components of asthma self-management education. Components of asthma self-management education include having been taught to what to do during an asthma attack and receiving an asthma action plan. Differences in the percentages of adults reporting each component and the average number of components reported across categories of age at asthma onset were estimated using linear regression, adjusted for age, education, race/ethnicity, sex, smoking status, and years since asthma onset. Overall, an estimated 76.4% of adults with active asthma were taught what to do during an asthma attack and 28.7% reported receiving an asthma action plan. Percentages reporting each asthma self-management education component declined with increasing age at asthma onset. Compared with the referent group of adults whose asthma onset occurred at 5-14 years of age, the percentage of adults reporting being taught what to do during an asthma attack was 10% lower among those whose asthma onset occurred at 65-93 years of age (95% CI: -18.0, -2.5) and the average number of components reported decreased monotonically across categories of age at asthma onset of 35 years and older. Among adults with active asthma, reports of asthma self-management education decline with increasing age at asthma onset.

  4. Breakthrough attacks in patients with hereditary angioedema receiving long-term prophylaxis are responsive to icatibant: findings from the Icatibant Outcome Survey.

    PubMed

    Aberer, Werner; Maurer, Marcus; Bouillet, Laurence; Zanichelli, Andrea; Caballero, Teresa; Longhurst, Hilary J; Perrin, Amandine; Andresen, Irmgard

    2017-01-01

    Patients with hereditary angioedema (HAE) due to C1-inhibitor deficiency (C1-INH-HAE) experience recurrent attacks of cutaneous or submucosal edema that may be frequent and severe; prophylactic treatments can be prescribed to prevent attacks. However, despite the use of long-term prophylaxis (LTP), breakthrough attacks are known to occur. We used data from the Icatibant Outcome Survey (IOS) to evaluate the characteristics of breakthrough attacks and the effectiveness of icatibant as a treatment option. Data on LTP use, attacks, and treatments were recorded. Attack characteristics, treatment characteristics, and outcomes (time to treatment, time to resolution, and duration of attack) were compared for attacks that occurred with versus without LTP. Data on 3228 icatibant-treated attacks from 448 patients with C1-INH-HAE were analyzed; 30.1% of attacks occurred while patients were using LTP. Attack rate, attack severity, and the distribution of attack sites were similar across all types of LTP used, and were comparable to the results found in patients who did not receive LTP. Attacks were successfully treated with icatibant; 82.5% of all breakthrough attacks were treated with a single icatibant injection without C1-INH rescue medication. Treatment outcomes were comparable for breakthrough attacks across all LTP types, and for attacks without LTP. Patients who use LTP should be aware that breakthrough attacks can occur, and such attacks can be severe. Thus, patients with C1-INH-HAE using LTP should have emergency treatment readily available. Data from IOS show that icatibant is effective for the treatment of breakthrough attacks. Trial Registration NCT01034969.

  5. Tacrolimus Injection

    MedlinePlus

    ... of the transplanted organ by the transplant recipient's immune system) in people who have received kidney, liver, or ... It works by decreasing the activity of the immune system to prevent it from attacking the transplanted organ.

  6. Reticulocyte Count Test

    MedlinePlus

    ... Acid-Fast Bacillus (AFB) Testing Activated Clotting Time Acute Viral Hepatitis Panel Adenosine Deaminase Adrenocorticotropic Hormone (ACTH) ... Guillain-Barré Syndrome Hashimoto Thyroiditis Heart Attack and Acute Coronary Syndrome Heart Disease Hemochromatosis Hemoglobin Abnormalities Hepatitis ...

  7. Diabetes - what to ask your doctor - type 2

    MedlinePlus

    ... Diabetes - keeping active Diabetes - low blood sugar - self-care Diabetes - preventing heart attack and stroke Diabetes - taking care of your feet Diabetes - tests and checkups Diabetes - when you are sick ...

  8. Abatacept Injection

    MedlinePlus

    ... with daily activities, and joint damage caused by rheumatoid arthritis (a condition in which the body attacks its ... that fight infection). People who have had severe rheumatoid arthritis for a long time may have a greater ...

  9. Increased Amplitude of Thalamocortical Low-Frequency Oscillations in Patients with Migraine

    PubMed Central

    Wilcox, Sophie L.; Veggeberg, Rosanna; Noseda, Rodrigo; Burstein, Rami; Borsook, David; Becerra, Lino

    2016-01-01

    For many years, neurobiological theories have emphasized the importance of neuronal oscillations in the emergence of brain function. At the same time, clinical studies have shown that disturbances or irregularities in brain rhythms may relate to various common neurological conditions, including migraine. Increasing evidence suggests that the CNS plays a fundamental role in the predisposition to develop different forms of headache. Here, we present human imaging data that strongly support the presence of abnormal low-frequency oscillations (LFOs) in thalamocortical networks of patients in the interictal phase of migraine. Our results show that the main source of arrhythmic activity was localized to the higher-order thalamic relays of the medial dorsal nucleus. In addition, spontaneous LFOs in the thalamus were selectively associated with the headache attack frequency, meaning that the varying amplitude of dysrhythmia could predispose patients to recurrent attacks. Rhythmic cortical feedback to the thalamus is a major factor in the amplification of thalamocortical oscillations, making it a strong candidate for influencing neuronal excitability. We further speculate that the intrinsic dynamics of thalamocortical network oscillations are crucial for early sensory processing and therefore could underlie important pathophysiological processes involved in multisensory integration. SIGNIFICANCE STATEMENT In many cases, migraine attacks are thought to begin centrally. A major obstacle to studying intrinsic brain activity has been the identification of the precise anatomical structures and functional networks that are involved in migraine. Here, we present imaging data that strongly support the presence of abnormal low-frequency oscillations in thalamocortical networks of patients in the interictal phase of migraine. This arrhythmic activity was localized to the higher-order thalamic relays of the medial dorsal nucleus and was selectively associated with headache attack frequency. Rhythmic cortical feedback to the thalamus is a major factor in the amplification of thalamocortical oscillations, making it a strong candidate for influencing neuronal excitability and higher-level processes involved in multisensory integration. PMID:27466345

  10. An animal model of panic vulnerability with chronic disinhibition of the dorsomedial/perifornical hypothalamus

    PubMed Central

    Johnson, Philip L.; Shekhar, Anantha

    2013-01-01

    Panic disorder (PD) is a severe anxiety disorder characterized by susceptibility to induction of panic attacks by subthreshold interoceptive stimuli such as sodium lactate infusions or hypercapnia induction. Here we review a model of panic vulnerability in rats involving chronic inhibition of GABAergic tone in the dorsomedial/ perifornical hypothalamic (DMH/PeF) region that produces enhanced anxiety and freezing responses in fearful situations, as well as a vulnerability to displaying acute panic-like increases in cardioexcitation, respiration activity and “flight” associated behavior following subthreshold interoceptive stimuli that do not elicit panic responses in control rats. This model of panic vulnerability was developed over 15 years ago and has provided an excellent preclinical model with robust face, predictive and construct validity. The model recapitulates many of the phenotypics features of panic attacks associated with human panic disorder (face validity) including greater sensitivity to panicogenic stimuli demonstrated by sudden onset of anxiety and autonomic activation following an administration of a sub-threshold (i.e., do not usually induce panic in healthy subjects) stimulus such as sodium lactate, CO2, or yohimbine. The construct validity is supported by several key findings; DMH/PeF neurons regulate behavioral and autonomic components of a normal adaptive panic response, as well as being implicated in eliciting panic-like responses in humans. Additionally, Patients with PD have deficits in central GABA activity and pharmacological restoration of central GABA activity prevents panic attacks, consistent with this model. The model’s predictive validity is demonstrated by not only showing panic responses to several panic-inducing agents that elicit panic in patients with PD, but also by the positive therapeutic responses to clinically used agents such as alprazolam and antidepressants that attenuate panic attacks in patients. More importantly, this model has been utilized to discover novel drugs such as group II metabotropic glutamate agonists and a new class of translocator protein enhancers of GABA, both of which subsequently showed anti-panic properties in clinical trials. All of these data suggest that this preparation provides a strong preclinical model of some forms of human panic disorders. PMID:22484112

  11. A graph-based network-vulnerability analysis system

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Swiler, L.P.; Phillips, C.; Gaylor, T.

    1998-05-03

    This paper presents a graph based approach to network vulnerability analysis. The method is flexible, allowing analysis of attacks from both outside and inside the network. It can analyze risks to a specific network asset, or examine the universe of possible consequences following a successful attack. The analysis system requires as input a database of common attacks, broken into atomic steps, specific network configuration and topology information, and an attacker profile. The attack information is matched with the network configuration information and an attacker profile to create a superset attack graph. Nodes identify a stage of attack, for example themore » class of machines the attacker has accessed and the user privilege level he or she has compromised. The arcs in the attack graph represent attacks or stages of attacks. By assigning probabilities of success on the arcs or costs representing level of effort for the attacker, various graph algorithms such as shortest path algorithms can identify the attack paths with the highest probability of success.« less

  12. A graph-based network-vulnerability analysis system

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Swiler, L.P.; Phillips, C.; Gaylor, T.

    1998-01-01

    This report presents a graph-based approach to network vulnerability analysis. The method is flexible, allowing analysis of attacks from both outside and inside the network. It can analyze risks to a specific network asset, or examine the universe of possible consequences following a successful attack. The analysis system requires as input a database of common attacks, broken into atomic steps, specific network configuration and topology information, and an attacker profile. The attack information is matched with the network configuration information and an attacker profile to create a superset attack graph. Nodes identify a stage of attack, for example the classmore » of machines the attacker has accessed and the user privilege level he or she has compromised. The arcs in the attack graph represent attacks or stages of attacks. By assigning probabilities of success on the arcs or costs representing level-of-effort for the attacker, various graph algorithms such as shortest-path algorithms can identify the attack paths with the highest probability of success.« less

  13. Method and tool for network vulnerability analysis

    DOEpatents

    Swiler, Laura Painton [Albuquerque, NM; Phillips, Cynthia A [Albuquerque, NM

    2006-03-14

    A computer system analysis tool and method that will allow for qualitative and quantitative assessment of security attributes and vulnerabilities in systems including computer networks. The invention is based on generation of attack graphs wherein each node represents a possible attack state and each edge represents a change in state caused by a single action taken by an attacker or unwitting assistant. Edges are weighted using metrics such as attacker effort, likelihood of attack success, or time to succeed. Generation of an attack graph is accomplished by matching information about attack requirements (specified in "attack templates") to information about computer system configuration (contained in a configuration file that can be updated to reflect system changes occurring during the course of an attack) and assumed attacker capabilities (reflected in "attacker profiles"). High risk attack paths, which correspond to those considered suited to application of attack countermeasures given limited resources for applying countermeasures, are identified by finding "epsilon optimal paths."

  14. A Study of the Effects of Physical Activity on Asthmatic Symptoms and Obesity Risk in Elementary School-Aged Children

    ERIC Educational Resources Information Center

    Haines, Michael S.; Kim, Danny H.

    2013-01-01

    Background: Children with moderate persistent asthma are often reluctant to engage in physical activity and as a result are more prone to obesity and increased incidence of asthma attacks. Purpose: This study developed an asthma program that included physical activity and asthma management education for elementary school children with moderate…

  15. Normobaric hyperoxia markedly reduces brain damage and sensorimotor deficits following brief focal ischaemia.

    PubMed

    Ejaz, Sohail; Emmrich, Julius V; Sitnikov, Sergey L; Hong, Young T; Sawiak, Stephen J; Fryer, Tim D; Aigbirhio, Franklin I; Williamson, David J; Baron, Jean-Claude

    2016-03-01

    'True' transient ischaemic attacks are characterized not only clinically, but also radiologically by a lack of corresponding changes on magnetic resonance imaging. During a transient ischaemic attack it is assumed that the affected tissue is penumbral but rescued by early spontaneous reperfusion. There is, however, evidence from rodent studies that even brief focal ischaemia not resulting in tissue infarction can cause extensive selective neuronal loss associated with long-lasting sensorimotor impairment but normal magnetic resonance imaging. Selective neuronal loss might therefore contribute to the increasingly recognized cognitive impairment occurring in patients with transient ischaemic attacks. It is therefore relevant to consider treatments to reduce brain damage occurring with transient ischaemic attacks. As penumbral neurons are threatened by markedly constrained oxygen delivery, improving the latter by increasing arterial O2 content would seem logical. Despite only small increases in arterial O2 content, normobaric oxygen therapy experimentally induces significant increases in penumbral O2 pressure and by such may maintain the penumbra alive until reperfusion. Nevertheless, the effects of normobaric oxygen therapy on infarct volume in rodent models have been conflicting, although duration of occlusion appeared an important factor. Likewise, in the single randomized trial published to date, early-administered normobaric oxygen therapy had no significant effect on clinical outcome despite reduced diffusion-weighted imaging lesion growth during therapy. Here we tested the hypothesis that normobaric oxygen therapy prevents both selective neuronal loss and sensorimotor deficits in a rodent model mimicking true transient ischaemic attack. Normobaric oxygen therapy was applied from the onset and until completion of 15 min distal middle cerebral artery occlusion in spontaneously hypertensive rats, a strain representative of the transient ischaemic attack-prone population. Whereas normoxic controls showed normal magnetic resonance imaging but extensive cortical selective neuronal loss associated with microglial activation (present both at Day 14 in vivo and at Day 28 post-mortem) and marked and long-lasting sensorimotor deficits, normobaric oxygen therapy completely prevented sensorimotor deficit (P < 0.02) and near-completely Day 28 selective neuronal loss (P < 0.005). Microglial activation was substantially reduced at Day 14 and completely prevented at Day 28 (P = 0.002). Our findings document that normobaric oxygen therapy administered during ischaemia nearly completely prevents the neuronal death, microglial inflammation and sensorimotor impairment that characterize this rodent true transient ischaemic attack model. Taken together with the available literature, normobaric oxygen therapy appears a promising therapy for short-lasting ischaemia, and is attractive clinically as it could be started at home in at-risk patients or in the ambulance in subjects suspected of transient ischaemic attack/early stroke. It may also be a straightforward adjunct to reperfusion therapies, and help prevent subtle brain damage potentially contributing to long-term cognitive and sensorimotor impairment in at-risk populations. © The Author (2016). Published by Oxford University Press on behalf of the Guarantors of Brain. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  16. THE NEWEST CHAPTER IN COUNTERINSURGENCY OPERATIONS: DEFEATING THE ISLAMIC STATE OF IRAQ AND THE LEVANT EXPLORING HOW TO SUCCEED IN LIGHT OF RECENT COUNTERINSURGENCY OPERATIONS THAT YIELDED LIMITED OR NO SUCCESS

    DTIC Science & Technology

    2015-10-01

    concerns. Third, insurgent support bases and activities in Pakistan needed be eliminated. In every Afghanistan insurgency since 1979 , insurgents have...Vinograd, “ISIS Attacks Soared in Past 3 Months: HIS Jane’s Database”, web 136. Vinograd, “Are the Airstrike Against ISIS Working?”, web...Attacks Soared in Past 3 Months: IHS Jane’s Database.” NBC News, 21 Oct 2015. Web. 24 Oct 2015. Welna, David. “After A Year of Bombing ISIS

  17. A Geographic Information Science (GISc) Approach to Characterizing Spatiotemporal Patterns of Terrorist Incidents in Iraq, 2004-2009

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Medina, Richard M; Siebeneck, Laura K.; Hepner, George F.

    2011-01-01

    As terrorism on all scales continues, it is necessary to improve understanding of terrorist and insurgent activities. This article takes a Geographic Information Systems (GIS) approach to advance the understanding of spatial, social, political, and cultural triggers that influence terrorism incidents. Spatial, temporal, and spatiotemporal patterns of terrorist attacks are examined to improve knowledge about terrorist systems of training, planning, and actions. The results of this study aim to provide a foundation for understanding attack patterns and tactics in emerging havens as well as inform the creation and implementation of various counterterrorism measures.

  18. A Protocol Specification-Based Intrusion Detection System for VoIP and Its Evaluation

    NASA Astrophysics Data System (ADS)

    Phit, Thyda; Abe, Kôki

    We propose an architecture of Intrusion Detection System (IDS) for VoIP using a protocol specification-based detection method to monitor the network traffics and alert administrator for further analysis of and response to suspicious activities. The protocol behaviors and their interactions are described by state machines. Traffic that behaves differently from the standard specifications are considered to be suspicious. The IDS has been implemented and simulated using OPNET Modeler, and verified to detect attacks. It was found that our system can detect typical attacks within a reasonable amount of delay time.

  19. Development of an Apparatus for Wind Tunnel Dynamic Experiments at High-alpha

    NASA Technical Reports Server (NTRS)

    Pedreiro, Nelson

    1997-01-01

    A unique experimental apparatus that allows a wind tunnel model two degrees of freedom has been designed and built. The apparatus was developed to investigate the use of new methods to augment aircraft control in the high angle of attack regime. The model support system provides a platform in which the roll-yaw coupling at high angles of attack can be studied in a controlled environment. Active cancellation of external effects is used to provide a system in which the dynamics are dominated by the aerodynamic loads acting on the wind tunnel model.

  20. About Heart Attacks

    MedlinePlus

    ... Artery Disease Venous Thromboembolism Aortic Aneurysm More About Heart Attacks Updated:Jan 11,2018 A heart attack is ... coronary artery damage leads to a heart attack . Heart Attack Questions and Answers What is a heart attack? ...

  1. Index of Glossary Terms

    MedlinePlus

    ... Acid-Fast Bacillus (AFB) Testing Activated Clotting Time Acute Viral Hepatitis Panel Adenosine Deaminase Adrenocorticotropic Hormone (ACTH) ... Guillain-Barré Syndrome Hashimoto Thyroiditis Heart Attack and Acute Coronary Syndrome Heart Disease Hemochromatosis Hemoglobin Abnormalities Hepatitis ...

  2. BCR-ABL1: Test

    MedlinePlus

    ... Acid-Fast Bacillus (AFB) Testing Activated Clotting Time Acute Viral Hepatitis Panel Adenosine Deaminase Adrenocorticotropic Hormone (ACTH) ... Guillain-Barré Syndrome Hashimoto Thyroiditis Heart Attack and Acute Coronary Syndrome Heart Disease Hemochromatosis Hemoglobin Abnormalities Hepatitis ...

  3. White Blood Cell Count

    MedlinePlus

    ... Acid-Fast Bacillus (AFB) Testing Activated Clotting Time Acute Viral Hepatitis Panel Adenosine Deaminase Adrenocorticotropic Hormone (ACTH) ... Guillain-Barré Syndrome Hashimoto Thyroiditis Heart Attack and Acute Coronary Syndrome Heart Disease Hemochromatosis Hemoglobin Abnormalities Hepatitis ...

  4. A Socio-Technical Approach to Preventing, Mitigating, and Recovering from Ransomware Attacks.

    PubMed

    Sittig, Dean F; Singh, Hardeep

    2016-01-01

    Recently there have been several high-profile ransomware attacks involving hospitals around the world. Ransomware is intended to damage or disable a user's computer unless the user makes a payment. Once the attack has been launched, users have three options: 1) try to restore their data from backup; 2) pay the ransom; or 3) lose their data. In this manuscript, we discuss a socio-technical approach to address ransomware and outline four overarching steps that organizations can undertake to secure an electronic health record (EHR) system and the underlying computing infrastructure. First, health IT professionals need to ensure adequate system protection by correctly installing and configuring computers and networks that connect them. Next, the health care organizations need to ensure more reliable system defense by implementing user-focused strategies, including simulation and training on correct and complete use of computers and network applications. Concomitantly, the organization needs to monitor computer and application use continuously in an effort to detect suspicious activities and identify and address security problems before they cause harm. Finally, organizations need to respond adequately to and recover quickly from ransomware attacks and take actions to prevent them in future. We also elaborate on recommendations from other authoritative sources, including the National Institute of Standards and Technology (NIST). Similar to approaches to address other complex socio-technical health IT challenges, the responsibility of preventing, mitigating, and recovering from these attacks is shared between health IT professionals and end-users.

  5. A Socio-Technical Approach to Preventing, Mitigating, and Recovering from Ransomware Attacks

    PubMed Central

    Singh, Hardeep

    2016-01-01

    Summary Recently there have been several high-profile ransomware attacks involving hospitals around the world. Ransomware is intended to damage or disable a user’s computer unless the user makes a payment. Once the attack has been launched, users have three options: 1) try to restore their data from backup; 2) pay the ransom; or 3) lose their data. In this manuscript, we discuss a socio-technical approach to address ransomware and outline four overarching steps that organizations can undertake to secure an electronic health record (EHR) system and the underlying computing infrastructure. First, health IT professionals need to ensure adequate system protection by correctly installing and configuring computers and networks that connect them. Next, the health care organizations need to ensure more reliable system defense by implementing user-focused strategies, including simulation and training on correct and complete use of computers and network applications. Concomitantly, the organization needs to monitor computer and application use continuously in an effort to detect suspicious activities and identify and address security problems before they cause harm. Finally, organizations need to respond adequately to and recover quickly from ransomware attacks and take actions to prevent them in future. We also elaborate on recommendations from other authoritative sources, including the National Institute of Standards and Technology (NIST). Similar to approaches to address other complex socio-technical health IT challenges, the responsibility of preventing, mitigating, and recovering from these attacks is shared between health IT professionals and end-users. PMID:27437066

  6. Interaction between juniper Juniperus communis L. and its fruit pest insects: Pest abundance, fruit characteristics and seed viability

    NASA Astrophysics Data System (ADS)

    García, Daniel

    1998-12-01

    The relationships between the fruit features of Juniperus communis and the presence of fruit pests were studied in Sierra Nevada, SE Spain. The abundance of two insect species — a pulp-sucking scale and a seed-predator wasp — was surveyed with respect both to fruit characteristics and to viability of seeds contained therein. Seed-predator pressure was not significantly related to any fruit characteristics; however, pulp suckers tended to be more abundant in plants with low pulp: seed ratios and high fruit-water content. In addition, fruits with high levels of pulp-sucker attack tended to have higher water content. A multi-factor ANOVA, considering the identity of the plant and the attack of the different pests as factors, showed that plant identity accounts for most of the variation in fruit characteristics. The viability of seeds tended to be lower in plants strongly attacked by both pests. Fruits attacked by seed predators showed significantly lower proportions of viable and unviable seeds than did unattacked fruits. Seed viability was also lower in those fruits heavily attacked by pulp suckers, but this pattern is strongly mediated by plant identity. Pest activity proved to be clearly associated with a direct decrease in juniper reproductive capacity. This loss involved a reduction of the viable-seed number, mainly related to the seed predator, as well as a reduction of fruit attractiveness to frugivorous dispersers, related to the pulp sucker.

  7. A graph-based system for network-vulnerability analysis

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Swiler, L.P.; Phillips, C.

    1998-06-01

    This paper presents a graph-based approach to network vulnerability analysis. The method is flexible, allowing analysis of attacks from both outside and inside the network. It can analyze risks to a specific network asset, or examine the universe of possible consequences following a successful attack. The graph-based tool can identify the set of attack paths that have a high probability of success (or a low effort cost) for the attacker. The system could be used to test the effectiveness of making configuration changes, implementing an intrusion detection system, etc. The analysis system requires as input a database of common attacks,more » broken into atomic steps, specific network configuration and topology information, and an attacker profile. The attack information is matched with the network configuration information and an attacker profile to create a superset attack graph. Nodes identify a stage of attack, for example the class of machines the attacker has accessed and the user privilege level he or she has compromised. The arcs in the attack graph represent attacks or stages of attacks. By assigning probabilities of success on the arcs or costs representing level-of-effort for the attacker, various graph algorithms such as shortest-path algorithms can identify the attack paths with the highest probability of success.« less

  8. Application of Cellular Automata to Detection of Malicious Network Packets

    ERIC Educational Resources Information Center

    Brown, Robert L.

    2014-01-01

    A problem in computer security is identification of attack signatures in network packets. An attack signature is a pattern of bits that characterizes a particular attack. Because there are many kinds of attacks, there are potentially many attack signatures. Furthermore, attackers may seek to avoid detection by altering the attack mechanism so that…

  9. Cooperating attackers in neural cryptography.

    PubMed

    Shacham, Lanir N; Klein, Einat; Mislovaty, Rachel; Kanter, Ido; Kinzel, Wolfgang

    2004-06-01

    A successful attack strategy in neural cryptography is presented. The neural cryptosystem, based on synchronization of neural networks by mutual learning, has been recently shown to be secure under different attack strategies. The success of the advanced attacker presented here, called the "majority-flipping attacker," does not decay with the parameters of the model. This attacker's outstanding success is due to its using a group of attackers which cooperate throughout the synchronization process, unlike any other attack strategy known. An analytical description of this attack is also presented, and fits the results of simulations.

  10. Heart Health Tests for Diabetes Patients

    MedlinePlus

    ... or fluids in the body. They include: Electrocardiogram ("EKG" or "ECG") This test measures the electrical activity ... Tools & Resources Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...

  11. WBC (White Blood Cell) Differential Count

    MedlinePlus

    ... Acid-Fast Bacillus (AFB) Testing Activated Clotting Time Acute Viral Hepatitis Panel Adenosine Deaminase Adrenocorticotropic Hormone (ACTH) ... Guillain-Barré Syndrome Hashimoto Thyroiditis Heart Attack and Acute Coronary Syndrome Heart Disease Hemochromatosis Hemoglobin Abnormalities Hepatitis ...

  12. Being active after your heart attack

    MedlinePlus

    ... the management of patients with unstable angina/non-ST-Elevation myocardial infarction: a report of the American ... the Management of Patients With Unstable Angina/Non-ST-Elevation Myocardial Infarction) developed in collaboration with the ...

  13. Creep fatigue life prediction for engine hot section materials (ISOTROPIC)

    NASA Technical Reports Server (NTRS)

    Nelson, R. S.; Schoendorf, J. F.; Lin, L. S.

    1986-01-01

    The specific activities summarized include: verification experiments (base program); thermomechanical cycling model; multiaxial stress state model; cumulative loading model; screening of potential environmental and protective coating models; and environmental attack model.

  14. Department of Homeland Security

    MedlinePlus

    ... Release Joint Technical Alerts on Malicious North Korean Cyber Activity Today, DHS and FBI released a pair ... María Provide Feedback to DHS Protect Myself from Cyber Attacks Report Cyber Incidents Prepare My Family for ...

  15. Causal Attribution, Perceived Benefits, and Morbidity After a Heart Attack: An 8-Year Study.

    ERIC Educational Resources Information Center

    Affleck, Glenn; And Others

    1987-01-01

    Interviewed heart attack victims (N=287) seven weeks and eight years after their attack. Explored interrelations among causal attributions for the attack, survivor morbidity, and heart attack recurrence. Found that patients who cited benefits from their misfortune seven weeks after the first attack were less likely to have another attack and had…

  16. An Update: The Cardiac Wellness Training Project.

    ERIC Educational Resources Information Center

    Zinn, Lorraine; Long, Patrick

    1983-01-01

    This article reports on the scope of activities and the effectiveness of a Colorado program that trained community park and recreation personnel to carry out local cardiac wellness services. Participants were trained to provide rehabilitation and fitness activities for those recovering from heart attacks or surgery and for other high-risk persons.…

  17. Do Specific Classroom Reading Activities Predict English Language Learners' Later Reading Achievement?

    ERIC Educational Resources Information Center

    Swanson, H. Lee; Orosco, Michael J.; Kudo, Milagros Fatima

    2017-01-01

    This study investigated the relationship between elementary classroom (N = 50) reading activities in Year 1 and reading performance (i.e., passage comprehension, letter-word identification, and word attack) 1 year later for English language learners (ELLs; N = 270). A cross-classification hierarchical model indicated that compared to other reading…

  18. Karrikins force a rethink of strigolactone mode of action

    PubMed Central

    Waters, Mark T.; Scaffidi, Adrian; Flematti, Gavin R.; Smith, Steven M.

    2012-01-01

    Strigolactones (SL) and karrikins (KAR) both contain essential butenolide moieties, and both require the F-box protein MAX2 to control seed germination and photomorphogenesis in Arabidopsis thaliana. A new discovery that SL and KAR also require related α/β-hydrolase proteins for such activity suggests that they operate through a similar molecular mechanism. Based on structural similarity, a previously proposed mode of action for SL was also considered for KAR, but recent structure-activity studies suggest that this mechanism may not apply. Here we rationalise these observations into a hypothesis whereby different α/β-hydrolases distinguish SL and KAR by virtue of their non-butenolide moieties and catalyze nucleophilic attack on the butenolide. The products would be different for SL and KAR, and in the case of SL they have no biological activity. The inference is that nucleophilic attack on SL and KAR by α/β-hydrolases is required for their bioactivity, but the hydrolysis products are not. PMID:22827937

  19. A DFT Study of the cis-Dihydroxylation of Nitroaromatic Compounds Catalyzed by Nitrobenzene Dioxygenase

    PubMed Central

    2014-01-01

    The mechanism of cis-dihydroxylation of nitrobenzene and 2-nitrotoluene catalyzed by nitrobenzene 1,2-dioxygenase (NBDO), a member of the naphthalene family of Rieske non-heme iron dioxygenases, was studied by means of the density functional theory method using four models of the enzyme active site. Different possible reaction pathways for the substrate dioxygenation initiated either by the FeIII–OOH or HO–FeV=O attack on the aromatic ring were considered and the computed activation barriers compared with the Gibbs free energy of activation for the oxygen–oxygen cleavage leading to the formation of the iron(V)–oxo species from its ferric hydroperoxo precursor. The mechanism of the substrate cis-dihydroxylation leading to the formation of a cis-dihydrodiol was then investigated, and the most feasible mechanism was found to be starting with the attack of the high-valent iron–oxo species on the substrate ring yielding a radical intermediate, which further evolves toward the final product. PMID:24624972

  20. Evidence for a hydroxide ion bridging two magnesium ions at the active site of the hammerhead ribozyme.

    PubMed Central

    Hermann, T; Auffinger, P; Scott, W G; Westhof, E

    1997-01-01

    In the presence of magnesium ions, cleavage by the hammerhead ribozyme RNA at a specific residue leads to 2'3'-cyclic phosphate and 5'-OH extremities. In the cleavage reaction an activated ribose 2'-hydroxyl group attacks its attached 3'-phosphate. Molecular dynamics simulations of the crystal structure of the hammerhead ribozyme, obtained after flash-freezing of crystals under conditions where the ribozyme is active, provide evidence that a mu-bridging OH-ion is located between two Mg2+ions close to the cleavable phosphate. Constrained simulations show further that a flip from the C3'- endo to the C2'- endo conformation of the ribose at the cleavable phosphate brings the 2'-hydroxyl in proximity to both the attacked phosphorous atom and the mu-bridging OH-ion. Thus, the simulations lead to a detailed new insight into the mechanism of hammerhead ribozyme cleavage where a mu-hydroxo bridged magnesium cluster, located on the deep groove side, provides an OH-ion that is able to activate the 2'-hydroxyl nucleophile after a minor and localized conformational change in the RNA. PMID:9254698

  1. Active Vertical Tail Buffeting Alleviation on an F/A-18 Model in a Wind Tunnel

    NASA Technical Reports Server (NTRS)

    Moses, Robert W.

    1999-01-01

    A 1/6-scale F-18 wind-tunnel model was tested in the Transonic Dynamics Tunnel at the NASA Langley Research Center as part of the Actively Controlled Response Of Buffet-Affected Tails (ACROBAT) program to assess the use of active controls in reducing vertical tail buffeting. The starboard vertical tail was equipped with an active rudder and other aerodynamic devices, and the port vertical tail was equipped with piezoelectric actuators. The tunnel conditions were atmospheric air at a dynamic pressure of 14 psf. By using single-input-single-output control laws at gains well below the physical limits of the control effectors, the power spectral density of the root strains at the frequency of the first bending mode of the vertical tail was reduced by as much as 60 percent up to angles of attack of 37 degrees. Root mean square (RMS) values of root strain were reduced by as much as 19 percent. Stability margins indicate that a constant gain setting in the control law may be used throughout the range of angle of attack tested.

  2. Early H2O2 Accumulation in Mesophyll Cells Leads to Induction of Glutathione during the Hyper-Sensitive Response in the Barley-Powdery Mildew Interaction1

    PubMed Central

    Vanacker, Helene; Carver, Tim L.W.; Foyer, Christine H.

    2000-01-01

    H2O2 production and changes in glutathione, catalase, and peroxidase were followed in whole-leaf extracts from the susceptible (AlgS [Algerian/4* (F14) Man.(S)]; ml-a1 allele) and resistant (AlgR [Algerian/4* (F14) Man.(R)]; Ml-a1 allele) barley (Hordeum vulgare) isolines between 12 and 24 h after inoculation with powdery mildew (Blumeria graminis [DC]. Speer [syn. Erysiphe graminis DC] f.sp hordei Marchal). Localized papilla responses and cell death hypersensitive responses were not observed within the same cell. In hypersensitive response sites, H2O2 accumulation first occurred in the mesophyll underlying the attacked epidermal cell. Subsequently, H2O2 disappeared from the mesophyll and accumulated around attacked epidermal cells. In AlgR, transient glutathione oxidation coincided with H2O2 accumulation in the mesophyll. Subsequently, total foliar glutathione and catalase activities transiently increased in AlgR. These changes, absent from AlgS, preceded inoculation-dependent increases in peroxidase activity that were observed in both AlgR and AlgS at 18 h. An early intercellular signal precedes H2O2, and this elicits anti-oxidant responses in leaves prior to events leading to death of attacked cells. PMID:10938348

  3. Aberrant Neuromagnetic Activation in the Motor Cortex in Children with Acute Migraine: A Magnetoencephalography Study

    PubMed Central

    Guo, Xinyao; Xiang, Jing; Wang, Yingying; O’Brien, Hope; Kabbouche, Marielle; Horn, Paul; Powers, Scott W.; Hershey, Andrew D.

    2012-01-01

    Migraine attacks have been shown to interfere with normal function in the brain such as motor or sensory function. However, to date, there has been no clinical neurophysiology study focusing on the motor function in children with migraine during headache attacks. To investigate the motor function in children with migraine, twenty-six children with acute migraine, meeting International Classification of Headache Disorders criteria and age- and gender-matched healthy children were studied using a 275-channel magnetoencephalography system. A finger-tapping paradigm was designed to elicit neuromagnetic activation in the motor cortex. Children with migraine showed significantly prolonged latency of movement-evoked magnetic fields (MEF) during finger movement compared with the controls. The correlation coefficient of MEF latency and age in children with migraine was significantly different from that in healthy controls. The spectral power of high gamma (65–150 Hz) oscillations during finger movement in the primary motor cortex is also significantly higher in children with migraine than in controls. The alteration of responding latency and aberrant high gamma oscillations suggest that the developmental trajectory of motor function in children with migraine is impaired during migraine attacks and/or developmentally delayed. This finding indicates that childhood migraine may affect the development of brain function and result in long-term problems. PMID:23185541

  4. Publicly Available Online Tool Facilitates Real-Time Monitoring Of Vaccine Conversations And Sentiments.

    PubMed

    Bahk, Chi Y; Cumming, Melissa; Paushter, Louisa; Madoff, Lawrence C; Thomson, Angus; Brownstein, John S

    2016-02-01

    Real-time monitoring of mainstream and social media can inform public health practitioners and policy makers about vaccine sentiment and hesitancy. We describe a publicly available platform for monitoring vaccination-related content, called the Vaccine Sentimeter. With automated data collection from 100,000 mainstream media sources and Twitter, natural-language processing for automated filtering, and manual curation to ensure accuracy, the Vaccine Sentimeter offers a global real-time view of vaccination conversations online. To assess the system's utility, we followed two events: polio vaccination in Pakistan after a news story about a Central Intelligence Agency vaccination ruse and subsequent attacks on health care workers, and a controversial episode in a television program about adverse events following human papillomavirus vaccination. For both events, increased online activity was detected and characterized. For the first event, Twitter response to the attacks on health care workers decreased drastically after the first attack, in contrast to mainstream media coverage. For the second event, the mainstream and social media response was largely positive about the HPV vaccine, but antivaccine conversations persisted longer than the provaccine reaction. Using the Vaccine Sentimeter could enable public health professionals to detect increased online activity or sudden shifts in sentiment that could affect vaccination uptake. Project HOPE—The People-to-People Health Foundation, Inc.

  5. Practical passive decoy state measurement-device-independent quantum key distribution with unstable sources.

    PubMed

    Liu, Li; Guo, Fen-Zhuo; Wen, Qiao-Yan

    2017-09-12

    Measurement-device-independent quantum key distribution (MDI-QKD) with the active decoy state method can remove all detector loopholes, and resist the imperfections of sources. But it may lead to side channel attacks and break the security of QKD system. In this paper, we apply the passive decoy state method to the MDI-QKD based on polarization encoding mode. Not only all attacks on detectors can be removed, but also the side channel attacks on sources can be overcome. We get that the MDI-QKD with our passive decoy state method can have a performance comparable to the protocol with the active decoy state method. To fit for the demand of practical application, we discuss intensity fluctuation in the security analysis of MDI-QKD protocol using passive decoy state method, and derive the key generation rate for our protocol with intensity fluctuation. It shows that intensity fluctuation has an adverse effect on the key generation rate which is non-negligible, especially in the case of small data size of total transmitting signals and long distance transmission. We give specific simulations on the relationship between intensity fluctuation and the key generation rate. Furthermore, the statistical fluctuation due to the finite length of data is also taken into account.

  6. On Patarin's Attack against the lIC Scheme

    NASA Astrophysics Data System (ADS)

    Ogura, Naoki; Uchiyama, Shigenori

    In 2007, Ding et al. proposed an attractive scheme, which is called the l-Invertible Cycles (lIC) scheme. lIC is one of the most efficient multivariate public-key cryptosystems (MPKC); these schemes would be suitable for using under limited computational resources. In 2008, an efficient attack against lIC using Gröbner basis algorithms was proposed by Fouque et al. However, they only estimated the complexity of their attack based on their experimental results. On the other hand, Patarin had proposed an efficient attack against some multivariate public-key cryptosystems. We call this attack Patarin's attack. The complexity of Patarin's attack can be estimated by finding relations corresponding to each scheme. In this paper, we propose an another practical attack against the lIC encryption/signature scheme. We estimate the complexity of our attack (not experimentally) by adapting Patarin's attack. The attack can be also applied to the lIC- scheme. Moreover, we show some experimental results of a practical attack against the lIC/lIC- schemes. This is the first implementation of both our proposed attack and an attack based on Gröbner basis algorithm for the even case, that is, a parameter l is even.

  7. Prevention of Hereditary Angioedema Attacks with a Subcutaneous C1 Inhibitor.

    PubMed

    Longhurst, Hilary; Cicardi, Marco; Craig, Timothy; Bork, Konrad; Grattan, Clive; Baker, James; Li, Huamin H; Reshef, Avner; Bonner, James; Bernstein, Jonathan A; Anderson, John; Lumry, William R; Farkas, Henriette; Katelaris, Constance H; Sussman, Gordon L; Jacobs, Joshua; Riedl, Marc; Manning, Michael E; Hebert, Jacques; Keith, Paul K; Kivity, Shmuel; Neri, Sergio; Levy, Donald S; Baeza, Maria L; Nathan, Robert; Schwartz, Lawrence B; Caballero, Teresa; Yang, William; Crisan, Ioana; Hernandez, María D; Hussain, Iftikhar; Tarzi, Michael; Ritchie, Bruce; Králíčková, Pavlina; Guilarte, Mar; Rehman, Syed M; Banerji, Aleena; Gower, Richard G; Bensen-Kennedy, Debra; Edelman, Jonathan; Feuersenger, Henrike; Lawo, John-Philip; Machnig, Thomas; Pawaskar, Dipti; Pragst, Ingo; Zuraw, Bruce L

    2017-03-23

    Hereditary angioedema is a disabling, potentially fatal condition caused by deficiency (type I) or dysfunction (type II) of the C1 inhibitor protein. In a phase 2 trial, the use of CSL830, a nanofiltered C1 inhibitor preparation that is suitable for subcutaneous injection, resulted in functional levels of C1 inhibitor activity that would be expected to provide effective prophylaxis of attacks. We conducted an international, prospective, multicenter, randomized, double-blind, placebo-controlled, dose-ranging, phase 3 trial to evaluate the efficacy and safety of self-administered subcutaneous CSL830 in patients with type I or type II hereditary angioedema who had had four or more attacks in a consecutive 2-month period within 3 months before screening. We randomly assigned the patients to one of four treatment sequences in a crossover design, each involving two 16-week treatment periods: either 40 IU or 60 IU of CSL830 per kilogram of body weight twice weekly followed by placebo, or vice versa. The primary efficacy end point was the number of attacks of angioedema. Secondary efficacy end points were the proportion of patients who had a response (≥50% reduction in the number of attacks with CSL830 as compared with placebo) and the number of times that rescue medication was used. Of the 90 patients who underwent randomization, 79 completed the trial. Both doses of CSL830, as compared with placebo, reduced the rate of attacks of hereditary angioedema (mean difference with 40 IU, -2.42 attacks per month; 95% confidence interval [CI], -3.38 to -1.46; and mean difference with 60 IU, -3.51 attacks per month; 95% CI, -4.21 to -2.81; P<0.001 for both comparisons). Response rates were 76% (95% CI, 62 to 87) in the 40-IU group and 90% (95% CI, 77 to 96) in the 60-IU group. The need for rescue medication was reduced from 5.55 uses per month in the placebo group to 1.13 uses per month in the 40-IU group and from 3.89 uses in the placebo group to 0.32 uses per month in the 60-IU group. Adverse events (most commonly mild and transient local site reactions) occurred in similar proportions of patients who received CSL830 and those who received placebo. In patients with hereditary angioedema, the prophylactic use of a subcutaneous C1 inhibitor twice weekly significantly reduced the frequency of acute attacks. (Funded by CSL Behring; COMPACT EudraCT number, 2013-000916-10 , and ClinicalTrials.gov number, NCT01912456 .).

  8. Allicin and derivates are cysteine protease inhibitors with antiparasitic activity.

    PubMed

    Waag, Thilo; Gelhaus, Christoph; Rath, Jennifer; Stich, August; Leippe, Matthias; Schirmeister, Tanja

    2010-09-15

    Allicin and derivatives thereof inhibit the CAC1 cysteine proteases falcipain 2, rhodesain, cathepsin B and L in the low micromolar range. The structure-activity relationship revealed that only derivatives with primary carbon atom in vicinity to the thiosulfinate sulfur atom attacked by the active-site Cys residue are active against the target enzymes. Some compounds also show potent antiparasitic activity against Plasmodium falciparum and Trypanosoma brucei brucei. Copyright (c) 2010 Elsevier Ltd. All rights reserved.

  9. Machine Learning Methods for Attack Detection in the Smart Grid.

    PubMed

    Ozay, Mete; Esnaola, Inaki; Yarman Vural, Fatos Tunay; Kulkarni, Sanjeev R; Poor, H Vincent

    2016-08-01

    Attack detection problems in the smart grid are posed as statistical learning problems for different attack scenarios in which the measurements are observed in batch or online settings. In this approach, machine learning algorithms are used to classify measurements as being either secure or attacked. An attack detection framework is provided to exploit any available prior knowledge about the system and surmount constraints arising from the sparse structure of the problem in the proposed approach. Well-known batch and online learning algorithms (supervised and semisupervised) are employed with decision- and feature-level fusion to model the attack detection problem. The relationships between statistical and geometric properties of attack vectors employed in the attack scenarios and learning algorithms are analyzed to detect unobservable attacks using statistical learning methods. The proposed algorithms are examined on various IEEE test systems. Experimental analyses show that machine learning algorithms can detect attacks with performances higher than attack detection algorithms that employ state vector estimation methods in the proposed attack detection framework.

  10. Split-second escape decisions in blue tits (Parus caeruleus)

    NASA Astrophysics Data System (ADS)

    Lind, Johan; Kaby, Ulrika; Jakobsson, Sven

    2002-07-01

    Bird mortality is heavily affected by birds of prey. Under attack, take-off is crucial for survival and even minor mistakes in initial escape response can have devastating consequences. Birds may respond differently depending on the character of the predator's attack and these split-second decisions were studied using a model merlin (Falco columbarius) that attacked feeding blue tits (Parus caeruleus) from two different attack angles in two different speeds. When attacked from a low attack angle they took off more steeply than when attacked from a high angle. This is the first study to show that escape behaviour also depends on predator attack speed. The blue tits responded to a high-speed attack by dodging sideways more often than when attacked at a low speed. Escape speed was not significantly affected by the different treatments. Although they have only a split-second before escaping an attack, blue tits do adjust their escape strategy to the prevailing attack conditions.

  11. Hybrid attacks on model-based social recommender systems

    NASA Astrophysics Data System (ADS)

    Yu, Junliang; Gao, Min; Rong, Wenge; Li, Wentao; Xiong, Qingyu; Wen, Junhao

    2017-10-01

    With the growing popularity of the online social platform, the social network based approaches to recommendation emerged. However, because of the open nature of rating systems and social networks, the social recommender systems are susceptible to malicious attacks. In this paper, we present a certain novel attack, which inherits characteristics of the rating attack and the relation attack, and term it hybrid attack. Furtherly, we explore the impact of the hybrid attack on model-based social recommender systems in multiple aspects. The experimental results show that, the hybrid attack is more destructive than the rating attack in most cases. In addition, users and items with fewer ratings will be influenced more when attacked. Last but not the least, the findings suggest that spammers do not depend on the feedback links from normal users to become more powerful, the unilateral links can make the hybrid attack effective enough. Since unilateral links are much cheaper, the hybrid attack will be a great threat to model-based social recommender systems.

  12. Detecting Pulsing Denial-of-Service Attacks with Nondeterministic Attack Intervals

    NASA Astrophysics Data System (ADS)

    Luo, Xiapu; Chan, Edmond W. W.; Chang, Rocky K. C.

    2009-12-01

    This paper addresses the important problem of detecting pulsing denial of service (PDoS) attacks which send a sequence of attack pulses to reduce TCP throughput. Unlike previous works which focused on a restricted form of attacks, we consider a very broad class of attacks. In particular, our attack model admits any attack interval between two adjacent pulses, whether deterministic or not. It also includes the traditional flooding-based attacks as a limiting case (i.e., zero attack interval). Our main contribution is Vanguard, a new anomaly-based detection scheme for this class of PDoS attacks. The Vanguard detection is based on three traffic anomalies induced by the attacks, and it detects them using a CUSUM algorithm. We have prototyped Vanguard and evaluated it on a testbed. The experiment results show that Vanguard is more effective than the previous methods that are based on other traffic anomalies (after a transformation using wavelet transform, Fourier transform, and autocorrelation) and detection algorithms (e.g., dynamic time warping).

  13. The 'Direct Attack' Strategy for Poverty Removal: Implementation Methodology.

    ERIC Educational Resources Information Center

    Sinha, Sanjay

    1981-01-01

    Discusses elements of an implementation methodology for the removal of poverty in India. Includes background, methodology, aggregation of demands, economics of the strategy, complementary activities and infrastructure, mechanics of implementation, and monitoring. (CT)

  14. Cyber-Physical Attacks With Control Objectives

    DOE PAGES

    Chen, Yuan; Kar, Soummya; Moura, Jose M. F.

    2017-08-18

    This study studies attackers with control objectives against cyber-physical systems (CPSs). The goal of the attacker is to counteract the CPS's controller and move the system to a target state while evading detection. We formulate a cost function that reflects the attacker's goals, and, using dynamic programming, we show that the optimal attack strategy reduces to a linear feedback of the attacker's state estimate. By changing the parameters of the cost function, we show how an attacker can design optimal attacks to balance the control objective and the detection avoidance objective. In conclusion, we provide a numerical illustration based onmore » a remotely controlled helicopter under attack.« less

  15. Cyber-Physical Attacks With Control Objectives

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chen, Yuan; Kar, Soummya; Moura, Jose M. F.

    This study studies attackers with control objectives against cyber-physical systems (CPSs). The goal of the attacker is to counteract the CPS's controller and move the system to a target state while evading detection. We formulate a cost function that reflects the attacker's goals, and, using dynamic programming, we show that the optimal attack strategy reduces to a linear feedback of the attacker's state estimate. By changing the parameters of the cost function, we show how an attacker can design optimal attacks to balance the control objective and the detection avoidance objective. In conclusion, we provide a numerical illustration based onmore » a remotely controlled helicopter under attack.« less

  16. Structural and functional alterations in the prefrontal cortex after post-weaning social isolation: relationship with species-typical and deviant aggression.

    PubMed

    Biro, Laszlo; Toth, Mate; Sipos, Eszter; Bruzsik, Biborka; Tulogdi, Aron; Bendahan, Samuel; Sandi, Carmen; Haller, Jozsef

    2017-05-01

    Although the inhibitory control of aggression by the prefrontal cortex (PFC) is the cornerstone of current theories of aggression control, a number of human and laboratory studies showed that the execution of aggression increases PFC activity; moreover, enhanced activation was observed in aggression-related psychopathologies and laboratory models of abnormal aggression. Here, we investigated these apparently contradictory findings in the post-weaning social isolation paradigm (PWSI), an established laboratory model of abnormal aggression. When studied in the resident-intruder test as adults, rats submitted to PWSI showed increased attack counts, increased share of bites directed towards vulnerable body parts of opponents (head, throat, and belly) and reduced social signaling of attacks. These deviations from species-typical behavioral characteristics were associated with a specific reduction in the thickness of the right medial PFC (mPFC), a bilateral decrease in dendritic and glial density, and reduced vascularization on the right-hand side of the mPFC. Thus, the early stressor interfered with mPFC development. Despite these structural deficits, aggressive encounters enhanced the activation of the mPFC in PWSI rats as compared to controls. A voxel-like functional analysis revealed that overactivation was restricted to a circumscribed sub-region, which contributed to the activation of hypothalamic centers involved in the initiation of biting attacks as shown by structural equation modeling. These findings demonstrate that structural alterations and functional hyperactivity can coexist in the mPFC of rats exposed to early stressors, and suggest that the role of the mPFC in aggression control is more complex than suggested by the inhibitory control theory.

  17. Conical Euler simulation and active suppression of delta wing rocking motion

    NASA Technical Reports Server (NTRS)

    Lee, Elizabeth M.; Batina, John T.

    1990-01-01

    A conical Euler code was developed to study unsteady vortex-dominated flows about rolling highly-swept delta wings, undergoing either forced or free-to-roll motions including active roll suppression. The flow solver of the code involves a multistage Runge-Kutta time-stepping scheme which uses a finite volume spatial discretization of the Euler equations on an unstructured grid of triangles. The code allows for the additional analysis of the free-to-roll case, by including the rigid-body equation of motion for its simultaneous time integration with the governing flow equations. Results are presented for a 75 deg swept sharp leading edge delta wing at a freestream Mach number of 1.2 and at alpha equal to 10 and 30 deg angle of attack. A forced harmonic analysis indicates that the rolling moment coefficient provides: (1) a positive damping at the lower angle of attack equal to 10 deg, which is verified in a free-to-roll calculation; (2) a negative damping at the higher angle of attack equal to 30 deg at the small roll amplitudes. A free-to-roll calculation for the latter case produces an initially divergent response, but as the amplitude of motion grows with time, the response transitions to a wing-rock type of limit cycle oscillation. The wing rocking motion may be actively suppressed, however, through the use of a rate-feedback control law and antisymmetrically deflected leading edge flaps. The descriptions of the conical Euler flow solver and the free-to-roll analysis are presented. Results are also presented which give insight into the flow physics associated with unsteady vortical flows about forced and free-to-roll delta wings, including the active roll suppression of this wing-rock phenomenon.

  18. A cyber-event correlation framework and metrics

    NASA Astrophysics Data System (ADS)

    Kang, Myong H.; Mayfield, Terry

    2003-08-01

    In this paper, we propose a cyber-event fusion, correlation, and situation assessment framework that, when instantiated, will allow cyber defenders to better understand the local, regional, and global cyber-situation. This framework, with associated metrics, can be used to guide assessment of our existing cyber-defense capabilities, and to help evaluate the state of cyber-event correlation research and where we must focus our future cyber-event correlation research. The framework, based on the cyber-event gathering activities and analysis functions, consists of five operational steps, each of which provides a richer set of contextual information to support greater situational understanding. The first three steps are categorically depicted as increasingly richer and broader-scoped contexts achieved through correlation activity, while in the final two steps, these richer contexts are achieved through analytical activities (situation assessment, and threat analysis & prediction). Category 1 Correlation focuses on the detection of suspicious activities and the correlation of events from a single cyber-event source. Category 2 Correlation clusters the same or similar events from multiple detectors that are located at close proximity and prioritizes them. Finally, the events from different time periods and event sources at different location/regions are correlated at Category 3 to recognize the relationship among different events. This is the category that focuses on the detection of large-scale and coordinated attacks. The situation assessment step (Category 4) focuses on the assessment of cyber asset damage and the analysis of the impact on missions. The threat analysis and prediction step (Category 5) analyzes attacks based on attack traces and predicts the next steps. Metrics that can distinguish correlation and cyber-situation assessment tools for each category are also proposed.

  19. Performance Improvement of Power Analysis Attacks on AES with Encryption-Related Signals

    NASA Astrophysics Data System (ADS)

    Lee, You-Seok; Lee, Young-Jun; Han, Dong-Guk; Kim, Ho-Won; Kim, Hyoung-Nam

    A power analysis attack is a well-known side-channel attack but the efficiency of the attack is frequently degraded by the existence of power components, irrelative to the encryption included in signals used for the attack. To enhance the performance of the power analysis attack, we propose a preprocessing method based on extracting encryption-related parts from the measured power signals. Experimental results show that the attacks with the preprocessed signals detect correct keys with much fewer signals, compared to the conventional power analysis attacks.

  20. Attacks on public telephone networks: technologies and challenges

    NASA Astrophysics Data System (ADS)

    Kosloff, T.; Moore, Tyler; Keller, J.; Manes, Gavin W.; Shenoi, Sujeet

    2003-09-01

    Signaling System 7 (SS7) is vital to signaling and control in America's public telephone networks. This paper describes a class of attacks on SS7 networks involving the insertion of malicious signaling messages via compromised SS7 network components. Three attacks are discussed in detail: IAM flood attacks, redirection attacks and point code spoofing attacks. Depending on their scale of execution, these attacks can produce effects ranging from network congestion to service disruption. Methods for detecting these denial-of-service attacks and mitigating their effects are also presented.

  1. Novel mechanism of network protection against the new generation of cyber attacks

    NASA Astrophysics Data System (ADS)

    Milovanov, Alexander; Bukshpun, Leonid; Pradhan, Ranjit

    2012-06-01

    A new intelligent mechanism is presented to protect networks against the new generation of cyber attacks. This mechanism integrates TCP/UDP/IP protocol stack protection and attacker/intruder deception to eliminate existing TCP/UDP/IP protocol stack vulnerabilities. It allows to detect currently undetectable, highly distributed, low-frequency attacks such as distributed denial-of-service (DDoS) attacks, coordinated attacks, botnet, and stealth network reconnaissance. The mechanism also allows insulating attacker/intruder from the network and redirecting the attack to a simulated network acting as a decoy. As a result, network security personnel gain sufficient time to defend the network and collect the attack information. The presented approach can be incorporated into wireless or wired networks that require protection against known and the new generation of cyber attacks.

  2. A Secure Three-Factor User Authentication and Key Agreement Protocol for TMIS With User Anonymity.

    PubMed

    Amin, Ruhul; Biswas, G P

    2015-08-01

    Telecare medical information system (TMIS) makes an efficient and convenient connection between patient(s)/user(s) and doctor(s) over the insecure internet. Therefore, data security, privacy and user authentication are enormously important for accessing important medical data over insecure communication. Recently, many user authentication protocols for TMIS have been proposed in the literature and it has been observed that most of the protocols cannot achieve complete security requirements. In this paper, we have scrutinized two (Mishra et al., Xu et al.) remote user authentication protocols using smart card and explained that both the protocols are suffering against several security weaknesses. We have then presented three-factor user authentication and key agreement protocol usable for TMIS, which fix the security pitfalls of the above mentioned schemes. The informal cryptanalysis makes certain that the proposed protocol provides well security protection on the relevant security attacks. Furthermore, the simulator AVISPA tool confirms that the protocol is secure against active and passive attacks including replay and man-in-the-middle attacks. The security functionalities and performance comparison analysis confirm that our protocol not only provide strong protection on security attacks, but it also achieves better complexities along with efficient login and password change phase as well as session key verification property.

  3. An Enhanced Biometric Based Authentication with Key-Agreement Protocol for Multi-Server Architecture Based on Elliptic Curve Cryptography

    PubMed Central

    Reddy, Alavalapati Goutham; Das, Ashok Kumar; Odelu, Vanga; Yoo, Kee-Young

    2016-01-01

    Biometric based authentication protocols for multi-server architectures have gained momentum in recent times due to advancements in wireless technologies and associated constraints. Lu et al. recently proposed a robust biometric based authentication with key agreement protocol for a multi-server environment using smart cards. They claimed that their protocol is efficient and resistant to prominent security attacks. The careful investigation of this paper proves that Lu et al.’s protocol does not provide user anonymity, perfect forward secrecy and is susceptible to server and user impersonation attacks, man-in-middle attacks and clock synchronization problems. In addition, this paper proposes an enhanced biometric based authentication with key-agreement protocol for multi-server architecture based on elliptic curve cryptography using smartcards. We proved that the proposed protocol achieves mutual authentication using Burrows-Abadi-Needham (BAN) logic. The formal security of the proposed protocol is verified using the AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to show that our protocol can withstand active and passive attacks. The formal and informal security analyses and performance analysis demonstrates that the proposed protocol is robust and efficient compared to Lu et al.’s protocol and existing similar protocols. PMID:27163786

  4. An enhanced biometric authentication scheme for telecare medicine information systems with nonce using chaotic hash function.

    PubMed

    Das, Ashok Kumar; Goswami, Adrijit

    2014-06-01

    Recently, Awasthi and Srivastava proposed a novel biometric remote user authentication scheme for the telecare medicine information system (TMIS) with nonce. Their scheme is very efficient as it is based on efficient chaotic one-way hash function and bitwise XOR operations. In this paper, we first analyze Awasthi-Srivastava's scheme and then show that their scheme has several drawbacks: (1) incorrect password change phase, (2) fails to preserve user anonymity property, (3) fails to establish a secret session key beween a legal user and the server, (4) fails to protect strong replay attack, and (5) lacks rigorous formal security analysis. We then a propose a novel and secure biometric-based remote user authentication scheme in order to withstand the security flaw found in Awasthi-Srivastava's scheme and enhance the features required for an idle user authentication scheme. Through the rigorous informal and formal security analysis, we show that our scheme is secure against possible known attacks. In addition, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool and show that our scheme is secure against passive and active attacks, including the replay and man-in-the-middle attacks. Our scheme is also efficient as compared to Awasthi-Srivastava's scheme.

  5. A Randomized Trial of Ketorolac vs. Sumatripan vs. Placebo Nasal Spray (KSPN) for Acute Migraine.

    PubMed

    Rao, Aruna S; Gelaye, Bizu; Kurth, Tobias; Dash, Paul D; Nitchie, Haley; Peterlin, B Lee

    2016-02-01

    To compare the efficacy of ketorolac nasal spray (NS) vs. placebo and sumatriptan NS for the acute treatment of migraine. This was a randomized, double-blind, placebo and active-comparator, crossover study. Adult migraineurs were randomized to ketorolac NS 31.5 mg, sumatriptan NS 20 mg, or placebo to treat three moderate to severe migraine attacks and switched treatments with each attack. Patients seeking headache care at a headache center or in response to community advertisement were recruited. Adult participants with episodic migraine who experienced ≥2 migraine attacks per month were eligible for the Ketorolac vs. Sumatriptan vs. Placebo Nasal Spray migraine study. Participants were randomized to treatment arms by a research pharmacist, in a 1:1:1 ratio using computer-generated lists. The primary outcome was 2-hour pain relief. Secondary outcomes included 2-hour pain freedom and absence of migraine associated symptoms, and 24-hour sustained pain relief and pain freedom. Of the 72 randomized participants, 54 (75%) treated at least one attack and 49 (68%) completed all three treatments, for a total of 152 treated migraine attacks. Both ketorolac NS (72.5%, P < .001) and sumatriptan NS (69.4%, P = .001) were more effective than placebo (38.3%) for 2-hour pain relief and 2-hour pain freedom (ketorolac: 43.1%, P = .004; sumatriptan: 36.7%, P = .046; placebo: 18.4%). Ketorolac NS, but not sumatriptan NS, was more effective than placebo in 2-hour absence of nausea. Both ketorolac NS and sumatriptan NS were more effective than placebo for 24-hour sustained pain relief (ketorolac: 49%, P < .001; sumatriptan: 31%, P = .01, placebo: 20%). Only ketorolac NS was superior to placebo for 24-hour (ketorolac: 35.3%, P = .003; sumatriptan: 22.4%, P = .18, placebo: 12.2%) sustained pain freedom. Nasal burning and dysgeusia were the most common adverse effects for active treatments. This study supports that ketorolac NS is superior to placebo and that it is non-inferior to sumatriptan NS for the acute abortive treatment of migraine. © 2016 American Headache Society.

  6. A Randomized Trial of Ketorolac vs Sumatripan vs Placebo Nasal Spray (KSPN) for Acute Migraine

    PubMed Central

    Rao, Aruna S.; Gelaye, Bizu; Kurth, Tobias; Dash, Paul D.; Nitchie, Haley; Peterlin, B. Lee

    2016-01-01

    Objective To compare the efficacy of ketorolac nasal spray (NS) vs placebo and sumatriptan NS for the acute treatment of migraine. Methods This was a randomized, double-blind, placebo and active-comparator, crossover study. Adult migraineurs were randomized to ketorolac NS 31.5 mg, sumatriptan NS 20 mg, or placebo to treat three moderate to severe migraine attacks and switched treatments with each attack. Patients seeking headache care at a headache center or in response to community advertisement were recruited. Adult participants with episodic migraine who experienced ≥2 migraine attacks per month were eligible for the Ketorolac vs Sumatriptan vs Placebo Nasal Spray migraine study. Participants were randomized to treatment arms by a research pharmacist, in a 1:1:1 ratio using computer-generated lists. The primary outcome was 2-hour pain relief. Secondary outcomes included 2-hour pain freedom and absence of migraine associated symptoms, and 24-hour sustained pain relief and pain freedom. Results Of the 72 randomized participants, 54 (75%) treated at least one attack and 49 (68%) completed all three treatments, for a total of 152 treated migraine attacks. Both ketorolac NS (72.5%, P < .001) and sumatriptan NS (69.4%, P=.001) were more effective than placebo (38.3%) for 2-hour pain relief and 2-hour pain freedom (ketorolac: 43.1%, P=.004; sumatriptan: 36.7%, P=.046; placebo: 18.4%). Ketorolac NS, but not sumatriptan NS, was more effective than placebo in 2-hour absence of nausea. Both ketorolac NS and sumatriptan NS were more effective than placebo for 24-hour sustained pain relief (ketorolac: 49%, P < .001; sumatriptan: 31%, P=.01, placebo: 20%). Only ketorolac NS was superior to placebo for 24-hour (ketorolac: 35.3%, P=.003; sumatriptan: 22.4%, P=.18, placebo: 12.2%) sustained pain freedom. Nasal burning and dysgeusia were the most common adverse effects for active treatments. Conclusions This study supports that ketorolac NS is superior to placebo and that it is non-inferior to sumatriptan NS for the acute abortive treatment of migraine. PMID:26840902

  7. Robustness of coevolution in resolving prisoner's dilemma games on interdependent networks subject to attack

    NASA Astrophysics Data System (ADS)

    Liu, Penghui; Liu, Jing

    2017-08-01

    Recently, coevolution between strategy and network structure has been established as a rule to resolve social dilemmas and reach optimal situations for cooperation. Many follow-up researches have focused on studying how coevolution helps networks reorganize to deter the defectors and many coevolution methods have been proposed. However, the robustness of the coevolution rules against attacks have not been studied much. Since attacks may directly influence the original evolutionary process of cooperation, the robustness should be an important index while evaluating the quality of a coevolution method. In this paper, we focus on investigating the robustness of an elementary coevolution method in resolving the prisoner's dilemma game upon the interdependent networks. Three different types of time-independent attacks, named as edge attacks, instigation attacks and node attacks have been employed to test its robustness. Through analyzing the simulation results obtained, we find this coevolution method is relatively robust against the edge attack and the node attack as it successfully maintains cooperation in the population over the entire attack range. However, when the instigation probability of the attacked individuals is large or the attack range of instigation attack is wide enough, coevolutionary rule finally fails in maintaining cooperation in the population.

  8. Sumatriptan (oral route of administration) for acute migraine attacks in adults

    PubMed Central

    Derry, Christopher J; Derry, Sheena; Moore, R Andrew

    2014-01-01

    Background Migraine is a highly disabling condition for the individual and also has wide-reaching implications for society, healthcare services, and the economy. Sumatriptan is an abortive medication for migraine attacks, belonging to the triptan family. Objectives To determine the efficacy and tolerability of oral sumatriptan compared to placebo and other active interventions in the treatment of acute migraine attacks in adults. Search methods We searched the Cochrane Central Register of Controlled Trials (CENTRAL), MEDLINE, EMBASE, online databases, and reference lists for studies through 13 October 2011. Selection criteria We included randomised, double-blind, placebo- and/or active-controlled studies using oral sumatriptan to treat a migraine headache episode, with at least 10 participants per treatment arm. Data collection and analysis Two review authors independently assessed trial quality and extracted data. We used numbers of participants achieving each outcome to calculate relative risk (or ‘risk ratio’) and numbers needed to treat to benefit (NNT) or harm (NNH) compared to placebo or a different active treatment. Main results Sixty-one studies (37,250 participants) compared oral sumatriptan with placebo or an active comparator. Most of the data were for the 50 mg and 100 mg doses. Sumatriptan surpassed placebo for all efficacy outcomes. For sumatriptan 50 mg versus placebo the NNTs were 6.1, 7.5, and 4.0 for pain-free at two hours and headache relief at one and two hours, respectively. NNTs for sustained pain-free and sustained headache relief during the 24 hours postdose were 9.5 and 6.0, respectively. For sumatriptan 100 mg versus placebo the NNTs were 4.7, 6.8, 3.5, 6.5, and 5.2, respectively, for the same outcomes. Results for the 25 mg dose were similar to the 50 mg dose, while sumatriptan 100 mg was significantly better than 50 mg for pain-free and headache relief at two hours, and for sustained pain-free during 24 hours. Treating early, during the mild pain phase, gave significantly better NNTs for pain-free at two hours and sustained pain-free during 24 hours than did treating established attacks with moderate or severe pain intensity. Relief of associated symptoms, including nausea, photophobia, and phonophobia, was greater with sumatriptan than with placebo, and use of rescue medication was lower with sumatriptan than with placebo. For the most part, adverse events were transient and mild and were more common with the sumatriptan than with placebo, with a clear dose response relationship (25 mg to 100 mg). Sumatriptan was compared directly with a number of active treatments, including other triptans, paracetamol (acetaminophen), acetylsalicylic acid, non-steroidal anti-inflammatory drugs (NSAIDs), and ergotamine combinations. Authors’ conclusions Oral sumatriptan is effective as an abortive treatment for migraine attacks, relieving pain, nausea, photophobia, phonophobia, and functional disability, but is associated with increased adverse events. PMID:22336849

  9. Increased brainstem perfusion, but no blood-brain barrier disruption, during attacks of migraine with aura.

    PubMed

    Hougaard, Anders; Amin, Faisal M; Christensen, Casper E; Younis, Samaira; Wolfram, Frauke; Cramer, Stig P; Larsson, Henrik B W; Ashina, Messoud

    2017-06-01

    See Moskowitz (doi:10.1093/brain/awx099) for a scientific commentary on this article.The migraine aura is characterized by transient focal cortical disturbances causing dramatic neurological symptoms that are usually followed by migraine headache. It is currently not understood how the aura symptoms are related to the headache phase of migraine. Animal studies suggest that cortical spreading depression, the likely mechanism of migraine aura, causes disruption of the blood-brain barrier and noxious stimulation of trigeminal afferents leading to activation of brainstem nuclei and triggering of migraine headache. We used the sensitive and validated technique of dynamic contrast-enhanced high-field magnetic resonance imaging to simultaneously investigate blood-brain barrier permeability and tissue perfusion in the brainstem (at the level of the lower pons), visual cortex, and brain areas of the anterior, middle and posterior circulation during spontaneous attacks of migraine with aura. Patients reported to our institution to undergo magnetic resonance imaging during the headache phase after presenting with typical visual aura. Nineteen patients were scanned during attacks and on an attack-free day. The mean time from attack onset to scanning was 7.6 h. We found increased brainstem perfusion bilaterally during migraine with aura attacks. Perfusion also increased in the visual cortex and posterior white matter following migraine aura. We found no increase in blood-brain barrier permeability in any of the investigated regions. There was no correlation between blood-brain barrier permeability, brain perfusion, and time from symptom onset to examination or pain intensity. Our findings demonstrate hyperperfusion in brainstem during the headache phase of migraine with aura, while the blood-brain barrier remains intact during attacks of migraine with aura. These data thus contradict the preclinical hypothesis of cortical spreading depression-induced blood-brain barrier disruption as a possible mechanism linking aura and headache.awx089media15422686892001. © The Author (2017). Published by Oxford University Press on behalf of the Guarantors of Brain. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  10. Nutritional regulation of hepatic heme biosynthesis and porphyria through PGC-1alpha.

    PubMed

    Handschin, Christoph; Lin, Jiandie; Rhee, James; Peyer, Anne-Kathrin; Chin, Sherry; Wu, Pei-Hsuan; Meyer, Urs A; Spiegelman, Bruce M

    2005-08-26

    Inducible hepatic porphyrias are inherited genetic disorders of enzymes of heme biosynthesis. The main clinical manifestations are acute attacks of neuropsychiatric symptoms frequently precipitated by drugs, hormones, or fasting, associated with increased urinary excretion of delta-aminolevulinic acid (ALA). Acute attacks are treated by heme infusion and glucose administration, but the mechanisms underlying the precipitating effects of fasting and the beneficial effects of glucose are unknown. We show that the rate-limiting enzyme in hepatic heme biosynthesis, 5-aminolevulinate synthase (ALAS-1), is regulated by the peroxisome proliferator-activated receptor gamma coactivator 1alpha (PGC-1alpha). Elevation of PGC-1alpha in mice via adenoviral vectors increases the levels of heme precursors in vivo as observed in acute attacks. The induction of ALAS-1 by fasting is lost in liver-specific PGC-1alpha knockout animals, as is the ability of porphyrogenic drugs to dysregulate heme biosynthesis. These data show that PGC-1alpha links nutritional status to heme biosynthesis and acute hepatic porphyria.

  11. Hemodynamic, ventilatory, and biochemical responses of panic patients and normal controls with sodium lactate infusion and spontaneous panic attacks.

    PubMed

    Gaffney, F A; Fenton, B J; Lane, L D; Lake, C R

    1988-01-01

    Hemodynamic, ventilatory, and biochemical variables were measured in ten healthy adults and ten panic patients during infusion of 0.5 mol/L of sodium lactate. Physical activity, fitness level, and ambulatory electrocardiograms were also recorded. Lactate infusion doubled cardiac output, increased blood lactate levels by sixfold, and produced hypernatremia, hypocalcemia, and decreased serum bicarbonate levels in both groups but raised arterial pressure only in the patients. The patients hyperventilated before and during the infusion. Physiological responses and somatic complaints with the infusion differed little between the groups, but emotional complaints were six times more frequent among the panic patients. Eight patients but no control subjects interpreted their symptoms as a panic attack. Heart rate increased with only 14 of 31 recorded spontaneous outpatient panic attacks. Sodium lactate infusions appear to produce panic by mimicking the physiology of spontaneous panic. Treatment with cardioactive agents is not indicated in the absence of cardiopulmonary or autonomic nervous system abnormalities.

  12. Collaborative Defense of Transmission and Distribution Protection and Control Devices Against Cyber Attacks (CODEF) DE-OE0000674. ABB Inc. Final Scientific/Technical Report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Nuqui, Reynaldo

    This report summarizes the activities conducted under the DOE-OE funded project DEOE0000674, where ABB Inc. (ABB), in collaboration with University of Illinois at Urbana-Champaign (UIUC), Bonneville Power Administration (BPA), and Ameren-Illinois (Ameren-IL) pursued the development of a system of collaborative defense of electrical substation’s intelligent electronic devices against cyber-attacks (CODEF). An electrical substation with CODEF features will be more capable of mitigating cyber-attacks especially those that seek to control switching devices. It leverages the security extensions of IEC 61850 to empower existing devices to collaborate in identifying and blocking malicious intents to trip circuit breakers, mis-coordinate devices settings, even thoughmore » the commands and the measurements comply with correct syntax. The CODEF functions utilize the physics of electromagnetic systems, electric power engineering principles, and computer science to bring more in depth cyber defense closer to the protected substation devices.« less

  13. Macrophage inflammatory protein-1alpha: a link between innate immunity and familial Mediterranean fever?

    PubMed

    Dizdar, Omer; Kalyoncu, Umut; Karadag, Omer; Akdogan, Ali; Kiraz, Sedat; Ertenli, Ihsan; Barista, Ibrahim; Calguneri, Meral

    2007-01-01

    The aim of this study is to investigate the relationship between chemokines and the inflammation in Familial Mediterranean Fever (FMF). Forty-nine patients with FMF (41 in remission and 8 in acute attack period) and 20 healthy controls were included in the study. Serum levels of macrophage inflammatory protein-1alpha (MIP-1alpha) were assessed in the patients and the controls, along with other parameters of disease activity, i.e., fibrinogen, C-reactive protein and erythrocyte sedimentation rate. Serum MIP-1alpha levels of the patients with FMF in acute attack period were significantly higher than the patients in remission and healthy controls (p=0.02 and p=0.038, respectively). MIP-1alpha levels were weakly correlated with CRP (r=0.32, p=0.032) levels. MIP-1alpha may have a role in the pathogenesis of FMF attacks. MIP-1alpha and other chemokines may constitute a link between the innate immune system and FMF.

  14. Network Randomization and Dynamic Defense for Critical Infrastructure Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chavez, Adrian R.; Martin, Mitchell Tyler; Hamlet, Jason

    2015-04-01

    Critical Infrastructure control systems continue to foster predictable communication paths, static configurations, and unpatched systems that allow easy access to our nation's most critical assets. This makes them attractive targets for cyber intrusion. We seek to address these attack vectors by automatically randomizing network settings, randomizing applications on the end devices themselves, and dynamically defending these systems against active attacks. Applying these protective measures will convert control systems into moving targets that proactively defend themselves against attack. Sandia National Laboratories has led this effort by gathering operational and technical requirements from Tennessee Valley Authority (TVA) and performing research and developmentmore » to create a proof-of-concept solution. Our proof-of-concept has been tested in a laboratory environment with over 300 nodes. The vision of this project is to enhance control system security by converting existing control systems into moving targets and building these security measures into future systems while meeting the unique constraints that control systems face.« less

  15. Analysis of an Attenuator Artifact in an Experimental Attack by Gunn-Allison-Abbott Against the Kirchhoff-Law-Johnson-Noise (KLJN) Secure Key Exchange System

    NASA Astrophysics Data System (ADS)

    Kish, Laszlo B.; Gingl, Zoltan; Mingesz, Robert; Vadai, Gergely; Smulko, Janusz; Granqvist, Claes-Göran

    2015-12-01

    A recent paper by Gunn-Allison-Abbott (GAA) [L. J. Gunn et al., Scientific Reports 4 (2014) 6461] argued that the Kirchhoff-law-Johnson-noise (KLJN) secure key exchange system could experience a severe information leak. Here we refute their results and demonstrate that GAA's arguments ensue from a serious design flaw in their system. Specifically, an attenuator broke the single Kirchhoff-loop into two coupled loops, which is an incorrect operation since the single loop is essential for the security in the KLJN system, and hence GAA's asserted information leak is trivial. Another consequence is that a fully defended KLJN system would not be able to function due to its built-in current-comparison defense against active (invasive) attacks. In this paper we crack GAA's scheme via an elementary current-comparison attack which yields negligible error probability for Eve even without averaging over the correlation time of the noise.

  16. Diagnosis, pathophysiology, and management of cluster headache.

    PubMed

    Hoffmann, Jan; May, Arne

    2018-01-01

    Cluster headache is a trigeminal autonomic cephalalgia characterised by extremely painful, strictly unilateral, short-lasting headache attacks accompanied by ipsilateral autonomic symptoms or the sense of restlessness and agitation, or both. The severity of the disorder has major effects on the patient's quality of life and, in some cases, might lead to suicidal ideation. Cluster headache is now thought to involve a synchronised abnormal activity in the hypothalamus, the trigeminovascular system, and the autonomic nervous system. The hypothalamus appears to play a fundamental role in the generation of a permissive state that allows the initiation of an episode, whereas the attacks are likely to require the involvement of the peripheral nervous system. Triptans are the most effective drugs to treat an acute cluster headache attack. Monoclonal antibodies against calcitonin gene-related peptide, a crucial neurotransmitter of the trigeminal system, are under investigation for the preventive treatment of cluster headache. These studies will increase our understanding of the disorder and perhaps reveal other therapeutic targets. Copyright © 2018 Elsevier Ltd. All rights reserved.

  17. Visualization of the Serratia Type VI Secretion System Reveals Unprovoked Attacks and Dynamic Assembly

    PubMed Central

    Gerc, Amy J.; Diepold, Andreas; Trunk, Katharina; Porter, Michael; Rickman, Colin; Armitage, Judith P.; Stanley-Wall, Nicola R.; Coulthurst, Sarah J.

    2015-01-01

    Summary The Type VI secretion system (T6SS) is a bacterial nanomachine that fires toxic proteins into target cells. Deployment of the T6SS represents an efficient and widespread means by which bacteria attack competitors or interact with host organisms and may be triggered by contact from an attacking neighbor cell as a defensive strategy. Here, we use the opportunist pathogen Serratia marcescens and functional fluorescent fusions of key components of the T6SS to observe different subassemblies of the machinery simultaneously and on multiple timescales in vivo. We report that the localization and dynamic behavior of each of the components examined is distinct, revealing a multi-stage and dynamic assembly process for the T6SS machinery. We also show that the T6SS can assemble and fire without needing a cell contact trigger, defining an aggressive strategy that broadens target range and suggesting that activation of the T6SS is tailored to survival in specific niches. PMID:26387948

  18. A general ligand design for gold catalysis allowing ligand-directed anti-nucleophilic attack of alkynes.

    PubMed

    Wang, Yanzhao; Wang, Zhixun; Li, Yuxue; Wu, Gongde; Cao, Zheng; Zhang, Liming

    2014-04-07

    Most homogenous gold catalyses demand ≥ 0.5 mol% catalyst loading. Owing to the high cost of gold, these reactions are unlikely to be applicable in medium- or large-scale applications. Here we disclose a novel ligand design based on the privileged (1,1'-biphenyl)-2-ylphosphine framework that offers a potentially general approach to dramatically lowering catalyst loading. In this design, an amide group at the 3'-position of the ligand framework directs and promotes nucleophilic attack at the ligand gold complex-activated alkyne, which is unprecedented in homogenous gold catalysis considering the spatial challenge of using ligand to reach anti-approaching nucleophile in a linear P-Au-alkyne centroid structure. With such a ligand, the gold(I) complex becomes highly efficient in catalysing acid addition to alkynes, with a turnover number up to 99,000. Density functional theory calculations support the role of the amide moiety in directing the attack of carboxylic acid via hydrogen bonding.

  19. Changes in visual-evoked potential habituation induced by hyperventilation in migraine.

    PubMed

    Coppola, Gianluca; Currà, Antonio; Sava, Simona Liliana; Alibardi, Alessia; Parisi, Vincenzo; Pierelli, Francesco; Schoenen, Jean

    2010-12-01

    Hyperventilation is often associated with stress, an established trigger factor for migraine. Between attacks, migraine is associated with a deficit in habituation to visual-evoked potentials (VEP) that worsens just before the attack. Hyperventilation slows electroencephalographic (EEG) activity and decreases the functional response in the occipital cortex during visual stimulation. The neural mechanisms underlying deficient-evoked potential habituation in migraineurs remain unclear. To find out whether hyperventilation alters VEP habituation, we recorded VEPs before and after experimentally induced hyperventilation lasting 3 min in 18 healthy subjects and 18 migraine patients between attacks. We measured VEP P100 amplitudes in six sequential blocks of 100 sweeps and habituation as the change in amplitude over the six blocks. In healthy subjects, hyperventilation decreased VEP amplitude in block 1 and abolished the normal VEP habituation. In migraine patients, hyperventilation further decreased the already low block 1 amplitude and worsened the interictal habituation deficit. Hyperventilation worsens the habituation deficit in migraineurs possibly by increasing dysrhythmia in the brainstem-thalamo-cortical network.

  20. A General Ligand Design for Gold Catalysis allowing Ligand-Directed Anti Nucleophilic Attack of Alkynes

    PubMed Central

    Wang, Yanzhao; Wang, Zhixun; Li, Yuxue; Wu, Gongde; Cao, Zheng; Zhang, Liming

    2014-01-01

    Most homogenous gold catalyses demand ≥0.5 mol % catalyst loading. Due to the high cost of gold, these reactions are unlikely to be applicable in medium or large scale applications. Here we disclose a novel ligand design based on the privileged biphenyl-2-phosphine framework that offers a potentially general approach to dramatically lowering catalyst loading. In this design, an amide group at the 3’ position of the ligand framework directs and promotes nucleophilic attack at the ligand gold complex-activated alkyne, which is unprecedented in homogeneous gold catalysis considering the spatial challenge of using ligand to reach antiapproaching nucleophile in a linear P-Au-alkyne centroid structure. With such a ligand, the gold(I) complex becomes highly efficient in catalyzing acid addition to alkynes, with a turnover number up to 99,000. Density functional theory calculations support the role of the amide moiety in directing the attack of carboxylic acid via hydrogen bonding. PMID:24704803

  1. Long-term effect of September 11 on the political behavior of victims’ families and neighbors

    PubMed Central

    Hersh, Eitan D.

    2013-01-01

    This article investigates the long-term effect of September 11, 2001 on the political behaviors of victims’ families and neighbors. Relative to comparable individuals, family members and residential neighbors of victims have become—and have stayed—significantly more active in politics in the last 12 years, and they have become more Republican on account of the terrorist attacks. The method used to demonstrate these findings leverages the random nature of the terrorist attack to estimate a causal effect and exploits new techniques to link multiple, individual-level, governmental databases to measure behavioral change without relying on surveys or aggregate analysis. PMID:24324145

  2. A hash based mutual RFID tag authentication protocol in telecare medicine information system.

    PubMed

    Srivastava, Keerti; Awasthi, Amit K; Kaul, Sonam D; Mittal, R C

    2015-01-01

    Radio Frequency Identification (RFID) is a technology which has multidimensional applications to reduce the complexity of today life. Everywhere, like access control, transportation, real-time inventory, asset management and automated payment systems etc., RFID has its enormous use. Recently, this technology is opening its wings in healthcare environments, where potential applications include patient monitoring, object traceability and drug administration systems etc. In this paper, we propose a secure RFID-based protocol for the medical sector. This protocol is based on hash operation with synchronized secret. The protocol is safe against active and passive attacks such as forgery, traceability, replay and de-synchronization attack.

  3. Long-term effect of September 11 on the political behavior of victims' families and neighbors.

    PubMed

    Hersh, Eitan D

    2013-12-24

    This article investigates the long-term effect of September 11, 2001 on the political behaviors of victims' families and neighbors. Relative to comparable individuals, family members and residential neighbors of victims have become--and have stayed--significantly more active in politics in the last 12 years, and they have become more Republican on account of the terrorist attacks. The method used to demonstrate these findings leverages the random nature of the terrorist attack to estimate a causal effect and exploits new techniques to link multiple, individual-level, governmental databases to measure behavioral change without relying on surveys or aggregate analysis.

  4. [Concomitant impact of organic pathology on the development of cognitive impairment in patients with attack-like paranoid schizophrenia].

    PubMed

    Libin, L Ia; Tagil'tseva, A V; Lifanova, D E; Ganzenko, M A; Gritsevskaia, T M; Ivanov, M B

    2014-01-01

    The study included 47 patients (23 men, 24 women) with ICD-10 diagnosis of attack-like paranoid schizophrenia. Patients were divided into two groups: with- (25 patients) or without (22 patients) a concomitant organic disease. Memory, attention and thinking were assessed with psychometric tests. Inter- and intra-group differences were identified that indicated a considerable impact of a concomitant CNS organic pathology on the development of cognitive impairment in the schizophrenic process and active antipsychotic therapy. The data obtained can be used in the development of a differentiated approach to the treatment of patients with concomitant organic pathology.

  5. Strategies of Echinococcus species responses to immune attacks: implications for therapeutic tool development.

    PubMed

    Zheng, Yadong

    2013-11-01

    Echinococcus species have been studied as a model to investigate parasite-host interactions. Echinococcus spp. can actively communicate dynamically with a host to facilitate infection, growth and proliferation partially via secretion of molecules, especially in terms of harmonization of host immune attacks. This review systematically outlines our current knowledge of how the Echinococcus species have evolved to adapt to their host's microenvironment. This understanding of parasite-host interplay has implications in profound appreciation of parasite plasticity and is informative in designing novel and effective tools including vaccines and drugs for the treatment of echinococcosis and other diseases. © 2013.

  6. Prescribed fire effects on bark beetle activity and tree mortality in southwestern ponderosa pine forests

    Treesearch

    C.R. Breece; T.E. Kolb; B.G. Dickson; J.D. McMillin; K.M. Clancey

    2008-01-01

    Prescribed fire is an important tool in the management of ponderosa pine (Pinus ponderosa Dougl. ex Laws.) forests, yet effects on bark beetle (Coleoptera: Curculionidae, Scolytinae) activity and tree mortality are poorly understood in the southwestern U.S. We compared bark beetle attacks and tree mortality between paired prescribed-burned and...

  7. Defense.gov Special Report: Travels with Winnefeld: USO Tour

    Science.gov Websites

    Kaneohe Bay - Hawaii Osan Air Base - South Korea CIA Factbook - Diego Garcia Bagram Air Base - Afghanistan Naval Support Activity - Bahrain Naval Support Activity Naples - Italy Ramstein Air Base - Germany Photo Attacked in Seoul Stars Bring Piece of Home to Bagram Airfield During USO Spring Troop Visit Forward Base

  8. Interpersonal coordination tendencies shape 1-vs-1 sub-phase performance outcomes in youth soccer.

    PubMed

    Duarte, Ricardo; Araújo, Duarte; Davids, Keith; Travassos, Bruno; Gazimba, Vítor; Sampaio, Jaime

    2012-05-01

    This study investigated the influence of interpersonal coordination tendencies on performance outcomes of 1-vs-1 sub-phases in youth soccer. Eight male developing soccer players (age: 11.8 ± 0.4 years; training experience: 3.6 ± 1.1 years) performed an in situ simulation of a 1-vs-1 sub-phase of soccer. Data from 82 trials were obtained with motion-analysis techniques, and relative phase used to measure the space-time coordination tendencies of attacker-defender dyads. Approximate entropy (ApEn) was then used to quantify the unpredictability of interpersonal interactions over trials. Results revealed how different modes of interpersonal coordination emerging from attacker-defender dyads influenced the 1-vs-1 performance outcomes. High levels of space-time synchronisation (47%) and unpredictability in interpersonal coordination processes (ApEn: 0.91 ± 0.34) were identified as key features of an attacking player's success. A lead-lag relation attributed to a defending player (34% around -30° values) and a more predictable coordination mode (ApEn: 0.65 ± 0.27, P < 0.001), demonstrated the coordination tendencies underlying the success of defending players in 1-vs-1 sub-phases. These findings revealed how the mutual influence of each player on the behaviour of dyadic systems shaped emergent performance outcomes. More specifically, the findings showed that attacking players should be constrained to exploit the space-time synchrony with defenders in an unpredictable and creative way, while defenders should be encouraged to adopt postures and behaviours that actively constrain the attacker's actions.

  9. Comparative efficacy of plant-derived essential oils for managing ambrosia beetles (Coleoptera: Curculionidae: Scolytinae) and their corresponding mass spectral characterization.

    PubMed

    Ranger, Christopher M; Reding, Michael E; Oliver, Jason B; Schultz, Peter B; Moyseenko, James J; Youssef, Nadeer

    2011-10-01

    Ambrosia beetles (Coleoptera: Curculionidae: Scolytinae) pose a significant challenge to producers of ornamental nursery stock. Conventional insecticides are commonly used for management purposes, but plant-derived essential oils also may discourage ambrosia beetles from initiating attacks. To identify promising commercially available products, field-based efficacy trials were conducted in Ohio in 2009 and 2010 with the following products: Armorex (Soil Technologies), Cinnacure (Proguard, Inc.), EcoTrol (EcoSMART Technologies, Inc.), and Veggie Pharm (Pharm Solutions, Inc.). Potted Magnolia virginiana L. were first injected with 75 ml of 5% ethanol to ensure ambrosia beetle pressure on experimental trees. Mixtures of each product (10% in water) and a water control were applied until runoff and attacks occurring under field conditions were quantified at 1, 4, 7, and 14 d after treatment (DAT). Ambrosia beetle attacks generally increased over time but at differing rates depending on the particular treatment. In 2009, Armorex and Veggie Pharm were associated with the lowest cumulative attacks 14 DAT. In 2010, Armorex and Cinnacure were associated with the fewest attacks 14 DAT. Solid phase microextraction-gas chromatography-mass spectrometry was used to characterize the volatile compounds associated with each product. Allyl isothiocyanate, a compound with known repellent and insecticidal properties, was unique and predominant in Armorex. These experiments identified commercially available botanicals containing plant essential oils with activity against ambrosia beetles, along with demonstrating the usefulness of ethanol-injection to ensure ambrosia beetle pressure under field conditions. Characterizing the constituents of efficacious botanically based products could also lead to the development of improved botanical insecticides.

  10. Security under Uncertainty: Adaptive Attackers Are More Challenging to Human Defenders than Random Attackers

    PubMed Central

    Moisan, Frédéric; Gonzalez, Cleotilde

    2017-01-01

    Game Theory is a common approach used to understand attacker and defender motives, strategies, and allocation of limited security resources. For example, many defense algorithms are based on game-theoretic solutions that conclude that randomization of defense actions assures unpredictability, creating difficulties for a human attacker. However, many game-theoretic solutions often rely on idealized assumptions of decision making that underplay the role of human cognition and information uncertainty. The consequence is that we know little about how effective these algorithms are against human players. Using a simplified security game, we study the type of attack strategy and the uncertainty about an attacker's strategy in a laboratory experiment where participants play the role of defenders against a simulated attacker. Our goal is to compare a human defender's behavior in three levels of uncertainty (Information Level: Certain, Risky, Uncertain) and three types of attacker's strategy (Attacker's strategy: Minimax, Random, Adaptive) in a between-subjects experimental design. Best defense performance is achieved when defenders play against a minimax and a random attack strategy compared to an adaptive strategy. Furthermore, when payoffs are certain, defenders are as efficient against random attack strategy as they are against an adaptive strategy, but when payoffs are uncertain, defenders have most difficulties defending against an adaptive attacker compared to a random attacker. We conclude that given conditions of uncertainty in many security problems, defense algorithms would be more efficient if they are adaptive to the attacker actions, taking advantage of the attacker's human inefficiencies. PMID:28690557

  11. The role of exoproteases in governing intraneuronal metabolism of botulinum toxin.

    PubMed

    Simpson, Lance L; Maksymowych, Andrew B; Kouguchi, Hirokazu; Dubois, Garrett; Bora, Roop S; Joshi, Suresh

    2005-04-01

    Botulinum toxin type A has a long duration of action, and thus it can block transmitter release for several weeks to several months. However, little is known about the precise mechanism that accounts for termination of toxin action. Therefore, experiments were done to gauge the effects of aminopeptidases and carboxypeptidases on the structure and function of the toxin. Exoproteases were added to the holotoxin, the native light chain, and a recombinant light chain. Treated toxin and light chain were examined for their effects on neuromuscular transmission and on isolated substrate. The data showed that aminopeptidase attack did not alter the N-terminus of the toxin/light chain, nor did it produce losses in biological activity. Carboxypeptidase attack did alter the C-terminus of the light chain, but not sufficiently to alter biological activity. The data suggest that the tertiary structure of the light chain confers upon the molecule substantial resistance to exoproteases.

  12. Numerical simulation of the optimal two-mode attacks for two-way continuous-variable quantum cryptography in reverse reconciliation

    NASA Astrophysics Data System (ADS)

    Zhang, Yichen; Li, Zhengyu; Zhao, Yijia; Yu, Song; Guo, Hong

    2017-02-01

    We analyze the security of the two-way continuous-variable quantum key distribution protocol in reverse reconciliation against general two-mode attacks, which represent all accessible attacks at fixed channel parameters. Rather than against one specific attack model, the expression of secret key rates of the two-way protocol are derived against all accessible attack models. It is found that there is an optimal two-mode attack to minimize the performance of the protocol in terms of both secret key rates and maximal transmission distances. We identify the optimal two-mode attack, give the specific attack model of the optimal two-mode attack and show the performance of the two-way protocol against the optimal two-mode attack. Even under the optimal two-mode attack, the performances of two-way protocol are still better than the corresponding one-way protocol, which shows the advantage of making double use of the quantum channel and the potential of long-distance secure communication using a two-way protocol.

  13. Islam in Indonesia’s Political Future

    DTIC Science & Technology

    2002-09-01

    former and active military officials. These militias have threatened to attack Americans, staged actions against alleged centers of vice (discothèques... activity ; 3 ! The impact of trends in Islam on Indonesia’s relationship with the United States, Indonesia’s neighbors, and regional and global...rise to a new class of Islamic preachers and forms of Islamic activism consistent with social and educational aspirations of the urban middle class

  14. Blind Data Attack on BGP Routers

    DTIC Science & Technology

    2017-03-01

    implement blind attack protection, leaving long -standing connections, such as Border Gateway Protocol (BGP) sessions, vulnerable to exploitation. This...protection measures should a discovered vulnerability reduce attack complexity. 14. SUBJECT TERMS BGP, TCP, blind attack, blind data attack 15. NUMBER OF...implementations may not properly implement blind attack protection, leaving long -standing connections, such as BorderGateway Protocol (BGP) sessions

  15. Research on high power intra-channel crosstalk attack in optical networks

    NASA Astrophysics Data System (ADS)

    Ren, Shuai; Zhang, Yinfa; Wang, Jingyu; Zhang, Jumei; Rao, Xuejun; Fang, Yuanyuan

    2017-02-01

    The mechanism of high power intra-channel crosstalk attack is analyzed theoretically and the conclusion that power of attack signal and crosstalk coefficient of optical switch are the main factors for which high power intra-channel have destructive effect on quality of legitimate signals is drawn. Effects of high power intra-channel crosstalk attack on quality of legitimate signals and its capability of attack propagation are investigated quantitatively by building the simulation system in VPI software. The results show that legitimate signals through the first and the second stage optical switch are affected by attack and legitimate signal through the third stage optical switch is almost unaffected by attack when power of original attack signal (OAS) is above 20dB more than that of legitimate signals and crosstalk coefficient of optical switch is -20dB at optical cross connect 1 (OXC1). High power intra-channel crosstalk attack has a certain capability of attack propagation. Attack capability of OAS can be propagated to OXC3 when power of OAS is 27dB more than that of legitimate signals and crosstalk coefficient of optical switch is -20dB. We also find that the secondary attack signal (SAS) does not have capability of attack propagation.

  16. Warning Signs of Heart Attack, Stroke and Cardiac Arrest

    MedlinePlus

    ... a Heart Attack WARNING SIGNS OF HEART ATTACK, STROKE & CARDIAC ARREST HEART ATTACK WARNING SIGNS CHEST DISCOMFORT ... nausea or lightheadedness. Learn more about heart attack STROKE WARNING SIGNS Spot a stroke F.A.S.T.: - ...

  17. The role of mental disorder in attacks on European politicians 1990-2004.

    PubMed

    James, D V; Mullen, P E; Meloy, J R; Pathé, M T; Farnham, F R; Preston, L; Darnley, B

    2007-11-01

    The only systematic studies of attacks on public figures come from the USA. These studies de-emphasize the role of mental illness and suggest threats are of no predictive value. This study re-examines these questions through a study of attacks on European politicians. All non-terrorist attacks on elected politicians in Western Europe between 1990 and 2004 were analysed. Twenty-four attacks were identified, including five involving fatalities, and eight serious injuries. Ten attackers were psychotic, four drunk, nine politically motivated and one unclassifiable. Eleven attackers evidenced warning behaviours. The mentally disordered, most of whom gave warnings, were responsible for most of the fatal and seriously injurious attacks. A greater awareness of the link between delusional fixations on public figures and subsequent attacks could aid prevention. Equally importantly, recognition would encourage earlier intervention in people who, irrespective of whether they eventually attack, have delusional preoccupations which ruin their lives.

  18. Influence of field position and phase of play on the physical demands of match-play in professional rugby league forwards.

    PubMed

    Gabbett, Tim J; Polley, Chris; Dwyer, Dan B; Kearney, Simon; Corvo, Alex

    2014-09-01

    No study has investigated the influence of field position and phase of play on the physical demands of match-play in professional rugby league forwards. We investigated the physical demands placed on forwards in elite rugby league matches, with special reference to how these demands differed between attack and defence, and in different field positions. Cohort study. Twenty-two rugby league players (26 ± 3 years) from the same professional club participated in this study. Global positioning system (GPS) analysis was completed during 23 matches. Video footage was synchronised with the GPS files and coded for the time spent in attack and defence, and in one of three different field positions (0-30 m, 31-70 m, 71-100 m). The physical demands of defence were consistently greater than attack. Moderate to large differences (ES=0.62-1.41) were found between defence and attack for distance covered (109 ± 16 m/min vs. 82 ± 12 m/min), low speed distance (104 ± 15 m/min vs. 78 ± 11 m/min), frequency of collisions (1.9 ± 0.7/min vs. 0.8 ± 0.3/min), and repeated high-intensity effort bouts (1 every 4.9 ± 5.1 min vs. 1 every 9.4 ± 6.1 min). The running demands and frequency of repeated high-intensity effort bouts were greater when defending in the opposition's 30 m zone (i.e. 71-100 m), with repeated high-intensity effort bouts also occurring more frequently when defending the team's own try-line and when attacking the opposition's try-line. Specific training drills designed to replicate the attacking and defensive demands of different field positional zones are likely to be effective in preparing players for the most demanding activities that occur in professional rugby league match-play. Copyright © 2013 Sports Medicine Australia. Published by Elsevier Ltd. All rights reserved.

  19. Hydroxylation of p-substituted phenols by tyrosinase: Further insight into the mechanism of tyrosinase activity

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Munoz-Munoz, Jose Luis; Berna, Jose; Garcia-Molina, Maria del Mar

    2012-07-27

    Highlights: Black-Right-Pointing-Pointer The action the copper complexes and tyrosinase on phenols is equivalent. Black-Right-Pointing-Pointer Isotope effect showed that nucleophilic attack to copper atom may be the slower step. Black-Right-Pointing-Pointer The value of {rho} (Hammett constant) supports an electrophilic aromatic substitution. Black-Right-Pointing-Pointer Data obtained in steady state pH 7 conditions support the mechanism of Scheme 1SM. -- Abstract: A study of the monophenolase activity of tyrosinase by measuring the steady state rate with a group of p-substituted monophenols provides the following kinetic information: k{sub cat}{sup m} and the Michaelis constant, K{sub M}{sup m}. Analysis of these data taking into account chemicalmore » shifts of the carbon atom supporting the hydroxyl group ({delta}) and {sigma}{sub p}{sup +}, enables a mechanism to be proposed for the transformation of monophenols into o-diphenols, in which the first step is a nucleophilic attack on the copper atom on the form E{sub ox} (attack of the oxygen of the hydroxyl group of C-1 on the copper atom) followed by an electrophilic attack (attack of the hydroperoxide group on the ortho position with respect to the hydroxyl group of the benzene ring, electrophilic aromatic substitution with a reaction constant {rho} of -1.75). These steps show the same dependency on the electronic effect of the substituent groups in C-4. Furthermore, a study of a solvent deuterium isotope effect on the oxidation of monophenols by tyrosinase points to an appreciable isotopic effect. In a proton inventory study with a series of p-substituted phenols, the representation of k{sub cat}{sup f{sub n}}/k{sub cat}{sup f{sub 0}} against n (atom fractions of deuterium), where k{sub cat}{sup f{sub n}} is the catalytic constant for a molar fraction of deuterium (n) and k{sub cat}{sup f{sub 0}} is the corresponding kinetic parameter in a water solution, was linear for all substrates. These results indicate that only one of the proton transfer processes from the hydroxyl groups involved the catalytic cycle is responsible for the isotope effects. We suggest that this step is the proton transfer from the hydroxyl group of C-1 to the peroxide of the oxytyrosinase form (E{sub ox}). After the nucleophilic attack, the incorporation of the oxygen in the benzene ring occurs by means of an electrophilic aromatic substitution mechanism in which there is no isotopic effect.« less

  20. An Exploration of Hypotheses that Explain Herbivore and Pathogen Attack in Restored Plant Communities

    PubMed Central

    Blaisdell, G. Kai; Roy, Bitty A.; Pfeifer-Meister, Laurel; Bridgham, Scott D.

    2015-01-01

    Many hypotheses address the associations of plant community composition with natural enemies, including: (i) plant species diversity may reduce enemy attack, (ii) attack may increase as host abundance increases, (iii) enemy spillover may lead to increased attack on one host species due to transmission from another host species, or enemy dilution may lead to reduced attack on a host that would otherwise have more attack, (iv) physical characteristics of the plant community may influence attack, and (v) plant vigor may affect attack. Restoration experiments with replicated plant communities provide an exceptional opportunity to explore these hypotheses. To explore the relative predictive strengths of these related hypotheses and to investigate the potential effect of several restoration site preparation techniques, we surveyed arthropod herbivore and fungal pathogen attack on the six most common native plant species in a restoration experiment. Multi-model inference revealed a weak but consistent negative correlation with pathogen attack and host diversity across the plant community, and no correlation between herbivory and host diversity. Our analyses also revealed host species-specific relationships between attack and abundance of the target host species, other native plant species, introduced plant species, and physical community characteristics. We found no relationship between enemy attack and plant vigor. We found minimal differences in plant community composition among several diverse site preparation techniques, and limited effects of site preparation techniques on attack. The strongest associations of community characteristics with attack varied among plant species with no community-wide patterns, suggesting that no single hypothesis successfully predicts the dominant community-wide trends in enemy attack. PMID:25699672

  1. Cyber attack analysis on cyber-physical systems: Detectability, severity, and attenuation strategy

    NASA Astrophysics Data System (ADS)

    Kwon, Cheolhyeon

    Security of Cyber-Physical Systems (CPS) against malicious cyber attacks is an important yet challenging problem. Since most cyber attacks happen in erratic ways, it is usually intractable to describe and diagnose them systematically. Motivated by such difficulties, this thesis presents a set of theories and algorithms for a cyber-secure architecture of the CPS within the control theoretic perspective. Here, instead of identifying a specific cyber attack model, we are focused on analyzing the system's response during cyber attacks. Firstly, we investigate the detectability of the cyber attacks from the system's behavior under cyber attacks. Specifically, we conduct a study on the vulnerabilities in the CPS's monitoring system against the stealthy cyber attack that is carefully designed to avoid being detected by its detection scheme. After classifying three kinds of cyber attacks according to the attacker's ability to compromise the system, we derive the necessary and sufficient conditions under which such stealthy cyber attacks can be designed to cause the unbounded estimation error while not being detected. Then, the analytical design method of the optimal stealthy cyber attack that maximizes the estimation error is developed. The proposed stealthy cyber attack analysis is demonstrated with illustrative examples on Air Traffic Control (ATC) system and Unmanned Aerial Vehicle (UAV) navigation system applications. Secondly, in an attempt to study the CPSs' vulnerabilities in more detail, we further discuss a methodology to identify potential cyber threats inherent in the given CPSs and quantify the attack severity accordingly. We then develop an analytical algorithm to test the behavior of the CPS under various cyber attack combinations. Compared to a numerical approach, the analytical algorithm enables the prediction of the most effective cyber attack combinations without computing the severity of all possible attack combinations, thereby greatly reducing the computational cost. The proposed algorithm is validated through a linearized longitudinal motion of a UAV example. Finally, we propose an attack attenuation strategy via the controller design for CPSs that are robust to various types of cyber attacks. While the previous studies have investigated a secure control by assuming a specific attack strategy, in this research we propose a hybrid robust control scheme that contains multiple sub-controllers, each matched to a specific type of cyber attacks. Then the system can be adapted to various cyber attacks (including those that are not assumed for sub-controller design) by switching its sub-controllers to achieve the best performance. Then, a method for designing a secure switching logic to counter all possible cyber attacks is proposed and it verifies mathematically the system's performance and stability as well. The performance of the proposed control scheme is demonstrated by an example with the hybrid H2 - H-infinity controller applied to a UAV example.

  2. Method for Integrated Simulation (MINTSIM)

    DTIC Science & Technology

    1976-01-01

    sorties allocated to attack SAMs. FAPA = fraction of striking aircraft attacking air bases which attack parked aircraft in the open. TAAB...each striking aircraft. FAS = fraction of striking aircraft attacking air bases which attack sheltered aircraft. (NOTE: FAPA + FAS = 1.0

  3. Finite Energy and Bounded Actuator Attacks on Cyber-Physical Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Djouadi, Seddik M; Melin, Alexander M; Ferragut, Erik M

    As control system networks are being connected to enterprise level networks for remote monitoring, operation, and system-wide performance optimization, these same connections are providing vulnerabilities that can be exploited by malicious actors for attack, financial gain, and theft of intellectual property. Much effort in cyber-physical system (CPS) protection has focused on protecting the borders of the system through traditional information security techniques. Less effort has been applied to the protection of cyber-physical systems from intelligent attacks launched after an attacker has defeated the information security protections to gain access to the control system. In this paper, attacks on actuator signalsmore » are analyzed from a system theoretic context. The threat surface is classified into finite energy and bounded attacks. These two broad classes encompass a large range of potential attacks. The effect of theses attacks on a linear quadratic (LQ) control are analyzed, and the optimal actuator attacks for both finite and infinite horizon LQ control are derived, therefore the worst case attack signals are obtained. The closed-loop system under the optimal attack signals is given and a numerical example illustrating the effect of an optimal bounded attack is provided.« less

  4. Web Forms and Untraceable DDoS Attacks

    NASA Astrophysics Data System (ADS)

    Jakobsson, Markus; Menczer, Filippo

    We analyze a Web vulnerability that allows an attacker to perform an email-based attack on selected victims, using standard scripts and agents. What differentiates the attack we describe from other, already known forms of distributed denial of service (DDoS) attacks is that an attacker does not need to infiltrate the network in any manner - as is normally required to launch a DDoS attack. Thus, we see this type of attack as a poor man's DDoS. Not only is the attack easy to mount, but it is also almost impossible to trace back to the perpetrator. Along with descriptions of our attack, we demonstrate its destructive potential with (limited and contained) experimental results. We illustrate the potential impact of our attack by describing how an attacker can disable an email account by flooding its inbox; block competition during on-line auctions; harm competitors with an on-line presence; disrupt phone service to a given victim; disconnect mobile corporate leaders from their networks; and disrupt electronic elections. Finally, we propose a set of countermeasures that are light-weight, do not require modifications to the infrastructure, and can be deployed in a gradual manner.

  5. Replacement Attack: A New Zero Text Watermarking Attack

    NASA Astrophysics Data System (ADS)

    Bashardoost, Morteza; Mohd Rahim, Mohd Shafry; Saba, Tanzila; Rehman, Amjad

    2017-03-01

    The main objective of zero watermarking methods that are suggested for the authentication of textual properties is to increase the fragility of produced watermarks against tampering attacks. On the other hand, zero watermarking attacks intend to alter the contents of document without changing the watermark. In this paper, the Replacement attack is proposed, which focuses on maintaining the location of the words in the document. The proposed text watermarking attack is specifically effective on watermarking approaches that exploit words' transition in the document. The evaluation outcomes prove that tested word-based method are unable to detect the existence of replacement attack in the document. Moreover, the comparison results show that the size of Replacement attack is estimated less accurate than other common types of zero text watermarking attacks.

  6. Stop the World from Spinning | NIH MedlinePlus the Magazine

    MedlinePlus

    ... are using a device based on the same technology found in a cochlear implant to stop a Ménière's attack by restoring a stable pattern of electrical activity in the vestibular nerve of the damaged ...

  7. Federal Research and Development Funding: FY2009

    DTIC Science & Technology

    2009-05-22

    for acquisition under Project BioShield of medical countermeasures, such as vaccines , against biological terror attacks.2 The Office of Management...Interagency Autism Coordinating Committee. d. Separate account in the Interior/Environment appropriations for NIEHS research activities related to

  8. A Study of Gaps in Attack Analysis

    DTIC Science & Technology

    2016-10-12

    2014. [86] Shobha Venkataraman , David Brumley, Subhabrata Sen, and Oliver Spatscheck. Automati- cally Inferring the Evolution of Malicious Activity on...Shobha Venkataraman , Subhabrata Sen, Oliver Spatscheck, Patrick Haffner, and Dawn Song. Exploiting Network Structure for Proactive Spam Mitigation. In

  9. Rehabilitation

    MedlinePlus

    ... help. A younger person who has had a heart attack may go through cardiac rehabilitation to try to return to work and normal activities. Someone with a lung disease may get pulmonary rehabilitation to be able to breathe better and improve their quality of life.

  10. Simulation of Attacks for Security in Wireless Sensor Network.

    PubMed

    Diaz, Alvaro; Sanchez, Pablo

    2016-11-18

    The increasing complexity and low-power constraints of current Wireless Sensor Networks (WSN) require efficient methodologies for network simulation and embedded software performance analysis of nodes. In addition, security is also a very important feature that has to be addressed in most WSNs, since they may work with sensitive data and operate in hostile unattended environments. In this paper, a methodology for security analysis of Wireless Sensor Networks is presented. The methodology allows designing attack-aware embedded software/firmware or attack countermeasures to provide security in WSNs. The proposed methodology includes attacker modeling and attack simulation with performance analysis (node's software execution time and power consumption estimation). After an analysis of different WSN attack types, an attacker model is proposed. This model defines three different types of attackers that can emulate most WSN attacks. In addition, this paper presents a virtual platform that is able to model the node hardware, embedded software and basic wireless channel features. This virtual simulation analyzes the embedded software behavior and node power consumption while it takes into account the network deployment and topology. Additionally, this simulator integrates the previously mentioned attacker model. Thus, the impact of attacks on power consumption and software behavior/execution-time can be analyzed. This provides developers with essential information about the effects that one or multiple attacks could have on the network, helping them to develop more secure WSN systems. This WSN attack simulator is an essential element of the attack-aware embedded software development methodology that is also introduced in this work.

  11. Heartburn or Chest Pain: When Is It Heart Attack?

    MedlinePlus

    Heartburn or heart attack: When to worry Severe heartburn and heart attack can be hard to tell apart. Understand how they typically ... flow to your heart (angina) or an actual heart attack. Heartburn, angina and heart attack may feel very ...

  12. Know the Warning Signs of a Heart Attack

    MedlinePlus

    ... No. 22 Know the Warning Signs of a Heart Attack What is a heart attack? Aheart attack happens when the blood vessels that ... hurting your heart muscle. Another name for a heart attack is myocardial infarction, or MI. If you have ...

  13. Percolation of localized attack on isolated and interdependent random networks

    NASA Astrophysics Data System (ADS)

    Shao, Shuai; Huang, Xuqing; Stanley, H. Eugene; Havlin, Shlomo

    2014-03-01

    Percolation properties of isolated and interdependent random networks have been investigated extensively. The focus of these studies has been on random attacks where each node in network is attacked with the same probability or targeted attack where each node is attacked with a probability being a function of its centrality, such as degree. Here we discuss a new type of realistic attacks which we call a localized attack where a group of neighboring nodes in the networks are attacked. We attack a randomly chosen node, its neighbors, and its neighbor of neighbors and so on, until removing a fraction (1 - p) of the network. This type of attack reflects damages due to localized disasters, such as earthquakes, floods and war zones in real-world networks. We study, both analytically and by simulations the impact of localized attack on percolation properties of random networks with arbitrary degree distributions and discuss in detail random regular (RR) networks, Erdős-Rényi (ER) networks and scale-free (SF) networks. We extend and generalize our theoretical and simulation results of single isolated networks to networks formed of interdependent networks.

  14. Stealthy false data injection attacks using matrix recovery and independent component analysis in smart grid

    NASA Astrophysics Data System (ADS)

    JiWei, Tian; BuHong, Wang; FuTe, Shang; Shuaiqi, Liu

    2017-05-01

    Exact state estimation is vital important to maintain common operations of smart grids. Existing researches demonstrate that state estimation output could be compromised by malicious attacks. However, to construct the attack vectors, a usual presumption in most works is that the attacker has perfect information regarding the topology and so on even such information is difficult to acquire in practice. Recent research shows that Independent Component Analysis (ICA) can be used for inferring topology information which can be used to originate undetectable attacks and even to alter the price of electricity for the profits of attackers. However, we found that the above ICA-based blind attack tactics is merely feasible in the environment with Gaussian noises. If there are outliers (device malfunction and communication errors), the Bad Data Detector will easily detect the attack. Hence, we propose a robust ICA based blind attack strategy that one can use matrix recovery to circumvent the outlier problem and construct stealthy attack vectors. The proposed attack strategies are tested with IEEE representative 14-bus system. Simulations verify the feasibility of the proposed method.

  15. Shilling Attacks Detection in Recommender Systems Based on Target Item Analysis

    PubMed Central

    Zhou, Wei; Wen, Junhao; Koh, Yun Sing; Xiong, Qingyu; Gao, Min; Dobbie, Gillian; Alam, Shafiq

    2015-01-01

    Recommender systems are highly vulnerable to shilling attacks, both by individuals and groups. Attackers who introduce biased ratings in order to affect recommendations, have been shown to negatively affect collaborative filtering (CF) algorithms. Previous research focuses only on the differences between genuine profiles and attack profiles, ignoring the group characteristics in attack profiles. In this paper, we study the use of statistical metrics to detect rating patterns of attackers and group characteristics in attack profiles. Another question is that most existing detecting methods are model specific. Two metrics, Rating Deviation from Mean Agreement (RDMA) and Degree of Similarity with Top Neighbors (DegSim), are used for analyzing rating patterns between malicious profiles and genuine profiles in attack models. Building upon this, we also propose and evaluate a detection structure called RD-TIA for detecting shilling attacks in recommender systems using a statistical approach. In order to detect more complicated attack models, we propose a novel metric called DegSim’ based on DegSim. The experimental results show that our detection model based on target item analysis is an effective approach for detecting shilling attacks. PMID:26222882

  16. TANDI: threat assessment of network data and information

    NASA Astrophysics Data System (ADS)

    Holsopple, Jared; Yang, Shanchieh Jay; Sudit, Moises

    2006-04-01

    Current practice for combating cyber attacks typically use Intrusion Detection Sensors (IDSs) to passively detect and block multi-stage attacks. This work leverages Level-2 fusion that correlates IDS alerts belonging to the same attacker, and proposes a threat assessment algorithm to predict potential future attacker actions. The algorithm, TANDI, reduces the problem complexity by separating the models of the attacker's capability and opportunity, and fuse the two to determine the attacker's intent. Unlike traditional Bayesian-based approaches, which require assigning a large number of edge probabilities, the proposed Level-3 fusion procedure uses only 4 parameters. TANDI has been implemented and tested with randomly created attack sequences. The results demonstrate that TANDI predicts future attack actions accurately as long as the attack is not part of a coordinated attack and contains no insider threats. In the presence of abnormal attack events, TANDI will alarm the network analyst for further analysis. The attempt to evaluate a threat assessment algorithm via simulation is the first in the literature, and shall open up a new avenue in the area of high level fusion.

  17. Identifying and tracking attacks on networks: C3I displays and related technologies

    NASA Astrophysics Data System (ADS)

    Manes, Gavin W.; Dawkins, J.; Shenoi, Sujeet; Hale, John C.

    2003-09-01

    Converged network security is extremely challenging for several reasons; expanded system and technology perimeters, unexpected feature interaction, and complex interfaces all conspire to provide hackers with greater opportunities for compromising large networks. Preventive security services and architectures are essential, but in and of themselves do not eliminate all threat of compromise. Attack management systems mitigate this residual risk by facilitating incident detection, analysis and response. There are a wealth of attack detection and response tools for IP networks, but a dearth of such tools for wireless and public telephone networks. Moreover, methodologies and formalisms have yet to be identified that can yield a common model for vulnerabilities and attacks in converged networks. A comprehensive attack management system must coordinate detection tools for converged networks, derive fully-integrated attack and network models, perform vulnerability and multi-stage attack analysis, support large-scale attack visualization, and orchestrate strategic responses to cyber attacks that cross network boundaries. We present an architecture that embodies these principles for attack management. The attack management system described engages a suite of detection tools for various networking domains, feeding real-time attack data to a comprehensive modeling, analysis and visualization subsystem. The resulting early warning system not only provides network administrators with a heads-up cockpit display of their entire network, it also supports guided response and predictive capabilities for multi-stage attacks in converged networks.

  18. Developing Health-Based Pre-Planning Clearance Goals for Airport Remediation Following Chemical Terrorist Attack: Introduction and Key Assessment Considerations

    PubMed Central

    Watson, Annetta; Hall, Linda; Raber, Ellen; Hauschild, Veronique D.; Dolislager, Fredrick; Love, Adam H.; Hanna, M. Leslie

    2011-01-01

    In the event of a chemical terrorist attack on a transportation hub, post-event remediation and restoration activities necessary to attain unrestricted facility reuse and re-entry could require hours to multiple days. While restoration timeframes are dependent on numerous variables, a primary controlling factor is the level of pre-planning and decision-making completed prior to chemical terrorist release. What follows is the first of a two-part analysis identifying key considerations, critical information, and decision criteria to facilitate post-attack and post-decontamination consequence management activities. A conceptual site model and human health-based exposure guidelines are developed and reported as an aid to site-specific pre-planning in the current absence of U.S. state or Federal values designated as compound-specific remediation or re-entry concentrations, and to safely expedite facility recovery to full operational status. Chemicals of concern include chemical warfare nerve and vesicant agents and the toxic industrial compounds phosgene, hydrogen cyanide, and cyanogen chloride. This work has been performed as a national case study conducted in partnership with the Los Angeles International Airport and The Bradley International Terminal. All recommended guidelines have been selected for consistency with airport scenario release parameters of a one-time, short-duration, finite airborne release from a single source followed by compound-specific decontamination. PMID:21390292

  19. Developing Health-Based Pre-Planning Clearance Goals for Airport Remediation Following Chemical Terrorist Attack: Introduction and Key Assessment Considerations.

    PubMed

    Watson, Annetta; Hall, Linda; Raber, Ellen; Hauschild, Veronique D; Dolislager, Fredrick; Love, Adam H; Hanna, M Leslie

    2011-02-13

    In the event of a chemical terrorist attack on a transportation hub, post-event remediation and restoration activities necessary to attain unrestricted facility reuse and re-entry could require hours to multiple days. While restoration timeframes are dependent on numerous variables, a primary controlling factor is the level of pre-planning and decision-making completed prior to chemical terrorist release. What follows is the first of a two-part analysis identifying key considerations, critical information, and decision criteria to facilitate post-attack and post-decontamination consequence management activities. A conceptual site model and human health-based exposure guidelines are developed and reported as an aid to site-specific pre-planning in the current absence of U.S. state or Federal values designated as compound-specific remediation or re-entry concentrations, and to safely expedite facility recovery to full operational status. Chemicals of concern include chemical warfare nerve and vesicant agents and the toxic industrial compounds phosgene, hydrogen cyanide, and cyanogen chloride. This work has been performed as a national case study conducted in partnership with the Los Angeles International Airport and The Bradley International Terminal. All recommended guidelines have been selected for consistency with airport scenario release parameters of a one-time, short-duration, finite airborne release from a single source followed by compound-specific decontamination.

  20. Pathogen-Induced Changes in the Antioxidant Status of the Apoplast in Barley Leaves

    PubMed Central

    Vanacker, Hélène; Carver, Tim L.W.; Foyer, Christine H.

    1998-01-01

    Leaves of two barley (Hordeum vulgare L.) isolines, Alg-R, which has the dominant Mla1 allele conferring hypersensitive race-specific resistance to avirulent races of Blumeria graminis, and Alg-S, which has the recessive mla1 allele for susceptibility to attack, were inoculated with B. graminis f. sp. hordei. Total leaf and apoplastic antioxidants were measured 24 h after inoculation when maximum numbers of attacked cells showed hypersensitive death in Alg-R. Cytoplasmic contamination of the apoplastic extracts, judged by the marker enzyme glucose-6-phosphate dehydrogenase, was very low (less than 2%) even in inoculated plants. Dehydroascorbate, glutathione, superoxide dismutase, catalase, ascorbate peroxidase, glutathione reductase, monodehydroascorbate reductase, and dehydroascorbate reductase were present in the apoplast. Inoculation had no effect on the total foliar ascorbate pool size or the redox state. The glutathione content of Alg-S leaves and apoplast decreased, whereas that of Alg-R leaves and apoplast increased after pathogen attack, but the redox state was unchanged in both cases. Large increases in foliar catalase activity were observed in Alg-S but not in Alg-R leaves. Pathogen-induced increases in the apoplastic antioxidant enzyme activities were observed. We conclude that sustained oxidation does not occur and that differential strategies of antioxidant response in Alg-S and Alg-R may contribute to pathogen sensitivity. PMID:9662553

  1. Limbic control of aggression in the cat.

    PubMed

    Adamec, R E; Stark-Adamec, C I

    1983-01-01

    Over a decade of work by Flynn and colleagues has delineated a network of limbic circuits which function to modulate the expression of predatory aggression and defence in the cat, and aspects of this work are reviewed. In particular, Flynn's work revealed a circuit involving the basomedial amygdala which functions to suppress attack, and at the same time facilitates defence. A second circuit, involving the ventral hippocampus, is involved in attack facilitation. Studies relating stable differences in excitability in these two circuits to developmentally determined behavioural dispositions toward aggression or defence are summarized. Finally, the impact of experimentally induced limbic seizures on interictally maintained expression of aggression and defence behaviourally, and on limbic excitability are reviewed. Taken together, the data indicate that the behavioural balance of attack and defence is under the tonic control of opponent limbic circuits, which are themselves biased in a measureable manner. Developmental studies indicate that adult defensiveness is determined early in life, so early as to suggest some pre-programmed neuro-developmental process. Experimentally induced seizures alter behaviour lastingly, producing an increase in defensive disposition. At the same time there is an equally lasting potentiation of interictal transmission of neural activity from the amygdala to the hypothalamus. Moreover, seizures may reduce interictal transmission of activity through the ventral hippocampus by potentiating recurrent inhibition. These effects of seizures are of interest since seizures reproduce naturally occurring differences in limbic excitability seen in naturally defensive cats.

  2. Developing health-based pre-planning clearance goals for airport remediation following chemical terrorist attack: Introduction and key assessment considerations

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Watson, Annetta Paule; Raber, Ellen; Dolislager, Frederick

    2011-01-01

    In the event of a chemical terrorist attack on a transportation hub, post-event remediation and restoration activities necessary to attain unrestricted facility re-use and re-entry could require hours to multiple days. While restoration timeframes are dependent on numerous variables, a primary controlling factor is the level of pre-planning and decision-making completed prior to chemical terrorist release. What follows is the first of a two-part analysis identifying key considerations, critical information, and decision criteria to facilitate post-attack and post-decontamination consequence management activities. A conceptual site model and human health-based exposure guidelines are developed and reported as an aid to site-specific pre-planningmore » in the current absence of U.S. state or Federal values designated as compound-specific remediation or re-entry concentrations, and to safely expedite facility recovery to full operational status. Chemicals of concern include chemical warfare nerve and vesicant agents and the toxic industrial compounds phosgene, hydrogen cyanide, and cyanogen chloride. This work has been performed as a national case study conducted in partnership with the Los Angeles International Airport and The Bradley International Terminal. All recommended guidelines have been selected for consistency with airport scenario release parameters of a one-time, short-duration, finite airborne release from a single source followed by compound-specific decontamination.« less

  3. Conduct of Occupational Health During Major Disasters: A Comparison of Literature on Occupational Health Issues in the World Trade Center Terrorist Attack and the Fukushima Nuclear Power Plant Accident.

    PubMed

    Toyoda, Hiroyuki; Mori, Koji

    2017-01-01

    Workers who respond to large-scale disasters can be exposed to health hazards that do not exist in routine work. It is assumed that learning from past cases is effective for preparing for and responding to such problems, but published information is still insufficient. Accordingly, we conducted a literature review about the health issues and occupational health activities at the World Trade Center (WTC) terrorist attack and at the Fukushima Nuclear Power Plant accident to investigate how occupational health activities during disasters should be conducted. Seven studies about the WTC attack were extracted and categorized into the following topics: "in relation to emergency systems including occupational health management"; "in relation to improvement and prevention of health effects and occupational hygiene"; and "in relation to care systems aimed at mitigating health effects." Studies about the Fukushima Nuclear Power Plant accident have been used in a previous review. We conclude that, to prevent health effects in workers who respond to large-scale disasters, it is necessary to incorporate occupational health regulations into the national response plan, and to develop practical support functions that enable support to continue for an extended period, training systems for workers with opportunities to report accidents, and care systems to mitigate the health effects.

  4. Pre-attack signs and symptoms in cluster headache: Characteristics and time profile.

    PubMed

    Snoer, Agneta; Lund, Nunu; Beske, Rasmus; Jensen, Rigmor; Barloese, Mads

    2018-05-01

    Introduction In contrast to the premonitory phase of migraine, little is known about the pre-attack (prodromal) phase of a cluster headache. We aimed to describe the nature, prevalence, and duration of pre-attack symptoms in cluster headache. Methods Eighty patients with episodic cluster headache or chronic cluster headache, according to ICHD-3 beta criteria, were invited to participate. In this observational study, patients underwent a semi-structured interview where they were asked about the presence of 31 symptoms/signs in relation to a typical cluster headache attack. Symptoms included previously reported cluster headache pre-attack symptoms, premonitory migraine symptoms and accompanying symptoms of migraine and cluster headache. Results Pre-attack symptoms were reported by 83.3% of patients, with an average of 4.25 (SD 3.9) per patient. Local and painful symptoms, occurring with a median of 10 minutes before attack, were reported by 70%. Local and painless symptoms and signs, occurring with a median of 10 minutes before attack, were reported by 43.8% and general symptoms, occurring with a median of 20 minutes before attack, were reported by 62.5% of patients. Apart from a dull/aching sensation in the attack area being significantly ( p < 0.05) more frequent among men and episodic patients, compared with women and chronic patients respectively, no other differences in the prevalence of pre-attack symptoms were identified between groups. Conclusion Pre-attack symptoms are frequent in cluster headache. Since the origin of cluster headache attacks is still unresolved, studies of pre-attack symptoms could contribute to the understanding of cluster headache pathophysiology. Furthermore, identification and recognition of pre-attack symptoms could potentially allow earlier abortive treatment.

  5. Hereditary Angioedema Attacks Resolve Faster and Are Shorter after Early Icatibant Treatment

    PubMed Central

    Maurer, Marcus; Kaplan, Allen; Investigators, on behalf of I. O. S.

    2013-01-01

    Background Attacks of hereditary angioedema (HAE) are unpredictable and, if affecting the upper airway, can be lethal. Icatibant is used for physician- or patient self-administered symptomatic treatment of HAE attacks in adults. Its mode of action includes disruption of the bradykinin pathway via blockade of the bradykinin B2 receptor. Early treatment is believed to shorten attack duration and prevent severe outcomes; however, evidence to support these benefits is lacking. Objective To examine the impact of timing of icatibant administration on the duration and resolution of HAE type I and II attacks. Methods The Icatibant Outcome Survey is an international, prospective, observational study for patients treated with icatibant. Data on timings and outcomes of icatibant treatment for HAE attacks were collected between July 2009–February 2012. A mixed-model of repeated measures was performed for 426 attacks in 136 HAE type I and II patients. Results Attack duration was significantly shorter in patients treated <1 hour of attack onset compared with those treated ≥1 hour (6.1 hours versus 16.8 hours [p<0.001]). Similar significant effects were observed for <2 hours versus ≥2 hours (7.2 hours versus 20.2 hours [p<0.001]) and <5 hours versus ≥5 hours (8.0 hours versus 23.5 hours [p<0.001]). Treatment within 1 hour of attack onset also significantly reduced time to attack resolution (5.8 hours versus 8.8 hours [p<0.05]). Self-administrators were more likely to treat early and experience shorter attacks than those treated by a healthcare professional. Conclusion Early blockade of the bradykinin B2 receptor with icatibant, particularly within the first hour of attack onset, significantly reduced attack duration and time to attack resolution. PMID:23390491

  6. Adaptive optimisation-offline cyber attack on remote state estimator

    NASA Astrophysics Data System (ADS)

    Huang, Xin; Dong, Jiuxiang

    2017-10-01

    Security issues of cyber-physical systems have received increasing attentions in recent years. In this paper, deception attacks on the remote state estimator equipped with the chi-squared failure detector are considered, and it is assumed that the attacker can monitor and modify all the sensor data. A novel adaptive optimisation-offline cyber attack strategy is proposed, where using the current and previous sensor data, the attack can yield the largest estimation error covariance while ensuring to be undetected by the chi-squared monitor. From the attacker's perspective, the attack is better than the existing linear deception attacks to degrade the system performance. Finally, some numerical examples are provided to demonstrate theoretical results.

  7. Gold/copper-catalyzed activation of the aci-form of nitromethane in the synthesis of methylene-bridged bis-1,3-dicarbonyl compounds.

    PubMed

    Balamurugan, Rengarajan; Manojveer, Seetharaman

    2011-10-21

    Activation of the aci-form of nitromethane using Lewis acids for the attack of carbon nucleophiles was studied. 1,3-Dicarbonyl compounds in the presence of catalytic amounts of AuCl(3) or Cu(OTf)(2) in nitromethane solvent could be converted into methylene-bridged bis-1,3-dicarbonyl compounds.

  8. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Connell, Leonard W.

    We examined the relative risk and impact of a dirty bomb employing Co-60 and Cs-137, the two most common high activity source materials. We found that the risk of an area denial dirty bomb attack is greater for Cs-137 due to the form and chemistry of CsCl, the soft, powdery salt form currently in use for high activity Cs-137 sources, found in blood and research irradiators.

  9. Public knowledge of heart attack symptoms in Beijing residents.

    PubMed

    Zhang, Qing-Tan; Hu, Da-Yi; Yang, Jin-Gang; Zhang, Shou-Yan; Zhang, Xin-Quan; Liu, Shu-Shan

    2007-09-20

    Definitive treatment for heart attack is early reperfusion with either angioplasty or thrombolytic therapy, and the benefit is strictly time-dependent. Patient outcomes are improved with either therapy when initiated as soon as possible. Recognition of heart attack symptoms is logically tied to taking action to receive prompt emergency care. Inadequate knowledge of heart attack symptoms may prolong delay. The purpose of this study was to document knowledge about heart attack symptoms in Beijing residents and to identify the characteristics associated with increased knowledge of heart attack. A structured survey was conducted in 18 communities in Beijing from March 1 through June 10 in 2006. Addresses and participants were selected randomly following a stratification. The survey was designed to collect knowledge of heart attack symptoms from sampled adults in each community. A total of 4627 respondents completed the questionnaires correctly, and 50.29% of them were female. Totally 64.15% of the respondents reported chest pain or discomfort (common symptoms) as a symptom of heart attack; 75.38% reported at least one of the following eight symptoms as a symptom of heart attack: back pain, shortness of breath, arm pain or numbness, nausea or vomiting, neck, jaw or shoulder pain, epigastric pain, sweating, weakness (less common symptoms); 20.36% correctly reported four or more heart attack symptoms, only 7.4% knew all the correct heart attack symptoms, and 28.94% knew about reperfusion therapy for heart attack; 31.7% reported to call 120 or 999 while having a heart attack themselves; however 89.6% reported to call 120 or 999 when someone else is suffering from a heart attack. Very old persons and those with health insurance coverage, high education level, high household income, longer living in Beijing and previous experience with heart disease had greater knowledge of heart attack symptoms. Public knowledge of common heart attack symptoms as well as less common heart attack symptoms is deficient in Beijing residents. But their knowledge of calling emergency medical services when someone is having a heart attack is relatively adequate. Public health efforts are needed to increase the recognition of the major heart attack symptoms in both the general public and groups at high risk for an acute cardiac event, especially in socioeconomically disadvantaged subgroups, including persons with low education level, low household income, and no health insurance coverage.

  10. Vertical Tail Buffeting Alleviation Using Piezoelectric Actuators: Some Results of the Actively Controlled Response of Buffet-Affected Tails (ACROBAT) Program

    NASA Technical Reports Server (NTRS)

    Moses, Robert W.

    1997-01-01

    A 1/6-scale F-18 wind-tunnel model was tested in the Transonic Dynamics Tunnel at the NASA Langley Research Center as part of the Actively Controlled Response Of Buffet Affected Tails (ACROBAT) program to assess the use of active controls in reducing vertical tail buffeting. The starboard vertical tail was equipped with an active rudder and the port vertical tail was equipped with piezoelectric actuators. The tunnel conditions were atmospheric air at a dynamic pressure of 14 psf. By using single-input-single-output control laws at gains well below the physical limits of the actuators, the power spectral density of the root strains at the frequency of the first bending mode of the vertical tail was reduced by as much as 60 percent up to angles of attack of 37 degrees. Root mean square (RMS) values of root strain were reduced by as much as 19 percent. Buffeting alleviation results when using the rudder are presented for comparison. Stability margins indicate that a constant gain setting in the control law may be used throughout the range of angle of attack tested.

  11. Application distribution model and related security attacks in VANET

    NASA Astrophysics Data System (ADS)

    Nikaein, Navid; Kanti Datta, Soumya; Marecar, Irshad; Bonnet, Christian

    2013-03-01

    In this paper, we present a model for application distribution and related security attacks in dense vehicular ad hoc networks (VANET) and sparse VANET which forms a delay tolerant network (DTN). We study the vulnerabilities of VANET to evaluate the attack scenarios and introduce a new attacker`s model as an extension to the work done in [6]. Then a VANET model has been proposed that supports the application distribution through proxy app stores on top of mobile platforms installed in vehicles. The steps of application distribution have been studied in detail. We have identified key attacks (e.g. malware, spamming and phishing, software attack and threat to location privacy) for dense VANET and two attack scenarios for sparse VANET. It has been shown that attacks can be launched by distributing malicious applications and injecting malicious codes to On Board Unit (OBU) by exploiting OBU software security holes. Consequences of such security attacks have been described. Finally, countermeasures including the concepts of sandbox have also been presented in depth.

  12. An Approach for Assessing Consequences of Potential Supply Chain and Insider Contributed Cyber Attacks on Nuclear Power Plants

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chu, Tsong L.

    The Stuxnet attack at the Natanz facility is an example of a targeted and successful cyber attack on a nuclear facility. Snowden's release of National Security Agency documents demonstrated the consequences of the insider threat. More recently, the United States tried to attack North Korea but failed, South Korea was attempting to attack North Korea, and both applied Stuxnet-like approaches. These sophisticated targeted attacks differ from web-site hacking events that are reported almost daily in the news mainly because targeted attacks require detailed design and operation information of the systems attacked and/or are often carried out by insiders. For instance,more » in order to minimize disruption of facilities around the world, Stuxnet remained idle until it recognized the specific configuration of the Natanz facility, demonstrating that the attackers possessed extremely detailed information about the facility. Such targeted cyber attacks could become a national-level military weapon and be used in coercion of hostile countries.« less

  13. Sumatriptan (intranasal route of administration) for acute migraine attacks in adults

    PubMed Central

    Derry, Christopher J; Derry, Sheena; Moore, R Andrew

    2014-01-01

    Background Migraine is a highly disabling condition for the individual and also has wide-reaching implications for society, healthcare services, and the economy. Sumatriptan is an abortive medication for migraine attacks, belonging to the triptan family. Intranasal administration may be preferable to oral for individuals experiencing nausea and/or vomiting, although it is primarily absorbed in the gut, not the nasal mucosa. Objectives To determine the efficacy and tolerability of intranasal sumatriptan compared to placebo and other active interventions in the treatment of acute migraine attacks in adults. Search methods We searched Cochrane Central Register of Controlled Trials (CENTRAL), MEDLINE, EMBASE, online databases, and reference lists for studies through 13 October 2011. Selection criteria We included randomised, double-blind, placebo- and/or active-controlled studies using intranasal sumatriptan to treat a migraine headache episode, with at least 10 participants per treatment arm. Data collection and analysis Two review authors independently assessed trial quality and extracted data. We used numbers of participants achieving each outcome to calculate relative risk (or ‘risk ratio’) and numbers needed to treat to benefit (NNT) or harm (NNH) compared to placebo or a different active treatment. Main results Twelve studies (4755 participants) compared intranasal sumatriptan with placebo or an active comparator. Most of the data were for the 10 mg and 20 mg doses. Sumatriptan surpassed placebo for all efficacy outcomes. For sumatriptan 10 mg versus placebo the NNTs were 7.3, 7.4, and 5.5 for pain-free at two hours, and headache relief at one and two hours, respectively. For sumatriptan 20 mg versus placebo the NNTs were 4.7, 4.9, and 3.5, respectively, for the same outcomes. The 20 mg dose was significantly better than the 10 mg dose for each of these three primary efficacy outcomes. Relief of headache-associated symptoms, including nausea, photophobia, and phonophobia, was greater with sumatriptan than with placebo, and use of rescue medication was lower with sumatriptan than placebo. For the most part, adverse events were transient and mild and were more common with sumatriptan than placebo. Direct comparison of sumatriptan with active treatments was limited to two studies, one comparing sumatriptan 20 mg and dihydroergotamine (DHE) 1 mg, and one comparing sumatriptan 20 mg with rizatriptan 10 mg. Authors’ conclusions Intranasal sumatriptan is effective as an abortive treatment for acute migraine attacks, relieving pain, nausea, photophobia, phonophobia, and functional disability, but is associated with increased adverse events compared with placebo. PMID:22336867

  14. Improving the Rainbow Attack by Reusing Colours

    NASA Astrophysics Data System (ADS)

    Ågren, Martin; Johansson, Thomas; Hell, Martin

    Hashing or encrypting a key or a password is a vital part in most network security protocols. The most practical generic attack on such schemes is a time memory trade-off attack. Such an attack inverts any one-way function using a trade-off between memory and execution time. Existing techniques include the Hellman attack and the rainbow attack, where the latter uses different reduction functions ("colours") within a table.

  15. Simulation of Attacks for Security in Wireless Sensor Network

    PubMed Central

    Diaz, Alvaro; Sanchez, Pablo

    2016-01-01

    The increasing complexity and low-power constraints of current Wireless Sensor Networks (WSN) require efficient methodologies for network simulation and embedded software performance analysis of nodes. In addition, security is also a very important feature that has to be addressed in most WSNs, since they may work with sensitive data and operate in hostile unattended environments. In this paper, a methodology for security analysis of Wireless Sensor Networks is presented. The methodology allows designing attack-aware embedded software/firmware or attack countermeasures to provide security in WSNs. The proposed methodology includes attacker modeling and attack simulation with performance analysis (node’s software execution time and power consumption estimation). After an analysis of different WSN attack types, an attacker model is proposed. This model defines three different types of attackers that can emulate most WSN attacks. In addition, this paper presents a virtual platform that is able to model the node hardware, embedded software and basic wireless channel features. This virtual simulation analyzes the embedded software behavior and node power consumption while it takes into account the network deployment and topology. Additionally, this simulator integrates the previously mentioned attacker model. Thus, the impact of attacks on power consumption and software behavior/execution-time can be analyzed. This provides developers with essential information about the effects that one or multiple attacks could have on the network, helping them to develop more secure WSN systems. This WSN attack simulator is an essential element of the attack-aware embedded software development methodology that is also introduced in this work. PMID:27869710

  16. Low-pressure hydrogenation of carbon dioxide catalyzed by an iron pincer complex exhibiting noble metal activity.

    PubMed

    Langer, Robert; Diskin-Posner, Yael; Leitus, Gregory; Shimon, Linda J W; Ben-David, Yehoshoa; Milstein, David

    2011-10-10

    A highly active iron catalyst for the hydrogenation of carbon dioxide and bicarbonates works under remarkably low pressures and achieves activities similar to some of the best noble metal catalysts. A mechanism is proposed involving the direct attack of an iron trans-dihydride on carbon dioxide, followed by ligand exchange and dihydrogen coordination. Copyright © 2011 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  17. Analytical Characterization of Internet Security Attacks

    ERIC Educational Resources Information Center

    Sellke, Sarah H.

    2010-01-01

    Internet security attacks have drawn significant attention due to their enormously adverse impact. These attacks includes Malware (Viruses, Worms, Trojan Horse), Denial of Service, Packet Sniffer, and Password Attacks. There is an increasing need to provide adequate defense mechanisms against these attacks. My thesis proposal deals with analytical…

  18. Active site nanospace of aminoacyl tRNA synthetase: difference between the class I and class II synthetases.

    PubMed

    Dutta, Saheb; Choudhury, Kaberi; Banik, Sindrila Dutta; Nandi, Nilashis

    2014-03-01

    The present work is aimed at understanding the origin of the difference in the molecular organization of the active site nanospaces of the class I and class II aminoacyl tRNA synthetases (aaRSs) which are tunnel-like structures. The active site encloses the cognate amino acid (AA) and the adenosine triphosphate (ATP) to carry out aminoacylation reaction. Comparison of the structures of the active site of the class I and class II (aaRSs) shows that the nanodimensional tunnels are curved in opposite directions in the two classes. We investigated the origin of this difference using quantum mechanical computation of electrostatic potential (ESP) of substrates, surrounding residues and ions, using Atoms in Molecule (AIM) Theory and charge population analysis. We show that the difference is principally due to the variation in the spatial charge distribution of ATP in the two classes which correspond to extended and bent conformations of ATP. The present computation shows that the most feasible pathway for nucleophilic attack to alphaP is oppositely directed for class I and class II aaRSs. The available crystal structures show that the cognate AA is indeed located along the channel favorable for nucleophilic attack as predicted by the ESP analysis. It is also shown that the direction of the channel changes its orientation when the orientation of ATP is changed from extended to a bent like structure. We further used the AIM theory to confirm the direction of the approach of AA in each case and the results corroborate the results from the ESP analysis. The opposite curvatures of the active site nanospaces in class I and class II aaRSs are related with the influence of the charge distributions of the extended and bent conformations of ATP, respectively. The results of the computation of electrostatic potential by successive addition of active site residues show that their roles on the reaction are similar in both classes despite the difference in the organization of the active sites of class I and class II aaRSs. The difference in mechanism in two classes as pointed out in recent study (S. Dutta Banik and N. Nandi, J. Biomol. Struct. Dyn. 30, 701 (2012)) is related with the fact that the relative arrangement of the ATP with respect to the AA is opposite in class I and class II aaRSs as explained in the present work. The charge population difference between the reacting centers (which are the alphaP atom of ATP (q(p)) and the attacking oxygen atom of carboxylic acid group (q(o)), respectively) denoted by delta(q), is a measure of the propensity of nucleophilic attack. The population analysis of the substrate AA shows that a non-negligible difference exists between the attacking oxygens of AA in class I (syn) and in class II (anti) which is one reason for the lower value of delta(q) in class II relative to class I. The population analysis of the AA, ATP, Mg+2 ions and active site residues shows that the difference in delta(q) values of the two classes is substantially reduced. When ions and residues are considered. Thus, the bent state of ATP, Mg+2 ions and active site residues complements it cognate AA to carry out the nucleophilic reaction in class I as efficiently as occurs in class I (with the extended state of ATP, single Mg+2 ion and active site residues). This could be one reason for the two different conformations of ATP in the two classes. The mutual arrangements of AA and ATP in each aaRS are guided by the spatial charge distribution of ATP (extended and bent). The present work shows that the construction of nanospace complements the arrangement of the substrate (AA and ATP).

  19. Surgery in World War II. Activities of Surgical Consultants. Volume 2

    DTIC Science & Technology

    1964-01-01

    708 ACTIVITIES OF SURGICAL CONSULTANTS 12o0* 130 40 L Ingoyen * MOUNTING AREA Gulf PHILIPPINE 0 0oo IANILA MILES 1, % P A C /F /C X• Leyte 15o- 1-10...comprised one of the two attack forces of the Seventh Fleet in the asault on the Philippines . 856 ACTIVITIES OF SURIGICAL CONSULTANTS any real 1... ACTIVITIES OF SURGICAL CONSULTANTS Volume II Prepared and published under the direction of Lieutenant General LEONARD D. HIEATON The Surgeon General, United

  20. 78 FR 70567 - Nationwide Use of High Frequency and Ultra High Frequency Active SONAR Technology; Final...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-26

    ... such as: The attacks of September 11, 2001; natural disasters such as Hurricanes Katrina and Rita of... UHF SONAR technology during times of extreme weather, such as hurricanes, could be required for...

  1. 75 FR 81284 - Nationwide Use of High Frequency and Ultra High Frequency Active SONAR Technology; Draft...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-27

    ... such as: The attacks of September 11, 2001; natural disasters such as Hurricanes Katrina and Rita of... technology during times of extreme weather, such as hurricanes, could be required for onshore areas that...

  2. Preparing Schools for Terrorist Attacks.

    ERIC Educational Resources Information Center

    School Safety, 1991

    1991-01-01

    Outlines 21 actions, both immediate and over the long term, that administrators can take to protect students and schools from terrorist activities. Includes establishing a chain of command, a command post, a crisis response team, a communications staff, and inservice training. (four references) (MLF)

  3. Action mechanism of tyrosinase on meta- and para-hydroxylated monophenols.

    PubMed

    Fenoll, L G; Rodríguez-López, J N; Varón, R; García-Ruiz, P A; García-Cánovas, F; Tudela, J

    2000-04-01

    The relationship between the structure and activity of meta- and para-hydroxylated monophenols was studied during their tyrosinase-catalysed hydroxylation and the rate-limiting steps of the reaction mechanism were identified. The para-hydroxylated substrates permit us to study the effect of a substituent (R) in the carbon-1 position (C-1) of the benzene ring on the nucleophilic attack step, while the meta group permits a similar study of the effect on the electrophilic attack step. Substrates with a -OCH3 group on C-1, as p-hydroxyanisol (4HA) and m-hydroxyanisol (3HA), or with a -CH2OH group, as p-hydroxybenzylalcohol (4HBA) and m-hydroxybenzylalcohol (3HBA), were used because the effect of the substituent (R) size was assumed to be similar. However, the electron-donating effect of the -OCH3 group means that the carbon-4 position (C-4) is favoured for nucleophilic attack (para-hydroxylated substrates) or for electrophilic attack (meta-hydroxylated substrates). The electron-attracting effect of the -CH2OH group has the opposite effect, hindering nucleophilic (para) or electrophilic (meta) attack of C-4. The experimental data point to differences between the maximum steady-state rate (V(M)Max) of the different substrates, the value of this parameter depends on the nucleophilic and electrophilic attack. However, differences are greatest in the Michaelis constants (K(M)m), with the meta-hydroxylated substrates having very large values. The catalytic efficiency k(M)cat/K(M)m is much greater for thepara-hydroxylated substrates although it varies greatly between one substrate and the other. However, it varies much less in the meta-hydroxylated substrates since this parameter describes the power of the nucleophilic attack, which is weaker in the meta OH. The large increase in the K(M)m of the meta-hydroxylated substrates might suggest that the phenolic OH takes part in substrate binding. Since this is a weaker nucleophil than the para-hydroxylated substrates, the binding constant decreases, leading to an increase in K(M)m. The catalytic efficiency of tyrosinase on a monophenol (para or meta) is directly related to the nucleophilic power of the oxygen of the phenolic OH. The oxidation step is not limiting since if this were the case, the para and meta substrates would have the same V(M)max. The small difference between the absolute values of V(M)max suggests that the rate constants of the nucleophilic and electrophilic attacks are on the same order of magnitude.

  4. The anatomy of a shark attack: a case report and review of the literature.

    PubMed

    Caldicott, D G; Mahajani, R; Kuhn, M

    2001-07-01

    Shark attacks are rare but are associated with a high morbidity and significant mortality. We report the case of a patient's survival from a shark attack and their subsequent emergency medical and surgical management. Using data from the International Shark Attack File, we review the worldwide distribution and incidence of shark attack. A review of the world literature examines the features which make shark attacks unique pathological processes. We offer suggestions for strategies of management of shark attack, and techniques for avoiding adverse outcomes in human encounters with these endangered creatures.

  5. Distinguishing attack and second-preimage attack on encrypted message authentication codes (EMAC)

    NASA Astrophysics Data System (ADS)

    Ariwibowo, Sigit; Windarta, Susila

    2016-02-01

    In this paper we show that distinguisher on CBC-MAC can be applied to Encrypted Message Authentication Code (EMAC) scheme. EMAC scheme in general is vulnerable to distinguishing attack and second preimage attack. Distinguishing attack simulation on AES-EMAC using 225 message modifications, no collision have been found. According to second preimage attack simulation on AES-EMAC no collision found between EMAC value of S1 and S2, i.e. no second preimage found for messages that have been tested. Based on distinguishing attack simulation on truncated AES-EMAC we found collision in every message therefore we cannot distinguish truncated AES-EMAC with random function. Second-preimage attack is successfully performed on truncated AES-EMAC.

  6. Novel Method For Low-Rate Ddos Attack Detection

    NASA Astrophysics Data System (ADS)

    Chistokhodova, A. A.; Sidorov, I. D.

    2018-05-01

    The relevance of the work is associated with an increasing number of advanced types of DDoS attacks, in particular, low-rate HTTP-flood. Last year, the power and complexity of such attacks increased significantly. The article is devoted to the analysis of DDoS attacks detecting methods and their modifications with the purpose of increasing the accuracy of DDoS attack detection. The article details low-rate attacks features in comparison with conventional DDoS attacks. During the analysis, significant shortcomings of the available method for detecting low-rate DDoS attacks were found. Thus, the result of the study is an informal description of a new method for detecting low-rate denial-of-service attacks. The architecture of the stand for approbation of the method is developed. At the current stage of the study, it is possible to improve the efficiency of an already existing method by using a classifier with memory, as well as additional information.

  7. Heavy-tailed distribution of the SSH Brute-force attack duration in a multi-user environment

    NASA Astrophysics Data System (ADS)

    Lee, Jae-Kook; Kim, Sung-Jun; Park, Chan Yeol; Hong, Taeyoung; Chae, Huiseung

    2016-07-01

    Quite a number of cyber-attacks to be place against supercomputers that provide highperformance computing (HPC) services to public researcher. Particularly, although the secure shell protocol (SSH) brute-force attack is one of the traditional attack methods, it is still being used. Because stealth attacks that feign regular access may occur, they are even harder to detect. In this paper, we introduce methods to detect SSH brute-force attacks by analyzing the server's unsuccessful access logs and the firewall's drop events in a multi-user environment. Then, we analyze the durations of the SSH brute-force attacks that are detected by applying these methods. The results of an analysis of about 10 thousands attack source IP addresses show that the behaviors of abnormal users using SSH brute-force attacks are based on human dynamic characteristics of a typical heavy-tailed distribution.

  8. An entangling-probe attack on Shor's algorithm for factorization

    NASA Astrophysics Data System (ADS)

    Azuma, Hiroo

    2018-02-01

    We investigate how to attack Shor's quantum algorithm for factorization with an entangling probe. We show that an attacker can steal an exact solution of Shor's algorithm outside an institute where the quantum computer is installed if he replaces its initialized quantum register with entangled qubits, namely the entangling probe. He can apply arbitrary local operations to his own probe. Moreover, we assume that there is an unauthorized person who helps the attacker to commit a crime inside the institute. He tells garbage data obtained from measurements of the quantum register to the attacker secretly behind a legitimate user's back. If the attacker succeeds in cracking Shor's algorithm, the legitimate user obtains a random answer and does not notice the attacker's illegal acts. We discuss how to detect the attacker. Finally, we estimate a probability that the quantum algorithm inevitably makes an error, of which the attacker can take advantage.

  9. Use of the Panic Attack Questionnaire-IV to assess non-clinical panic attacks and limited symptom panic attacks in student and community samples.

    PubMed

    Norton, Peter J; Zvolensky, Michael J; Bonn-Miller, Marcel O; Cox, Brian J; Norton, G Ron

    2008-10-01

    Since its development in the mid-1980s, the Panic Attack Questionnaire (PAQ) has been one of the more, if not the most, commonly used self-report tools for assessing panic attacks. The usage of the instrument, however, has come amid potential concerns that instructions and descriptions may lead to an over-estimate of the prevalence of panic attacks. Furthermore, the instrument has not been revised since 1992, despite changes in DSM-IV criteria and more recent developments in the understanding of panic attacks. As a result, this paper describes a revision of the PAQ to improve the instruction and descriptive set, and to fully assess features of panic derived from recent conceptualizations. Students meeting DSM-IV panic attack criteria and those endorsing panic attacks, but not meeting criteria, showed few differences with the exception that those not meeting DSM-IV criteria typically reported a longer onset-to-peak intensity time than did Panickers. Results were cross-validated and extended using an independent Community Sample. A full descriptive phenomenology of panic attacks is described, and future directions for studying panic attacks using the PAQ are presented.

  10. Command Disaggregation Attack and Mitigation in Industrial Internet of Things

    PubMed Central

    Zhu, Pei-Dong; Hu, Yi-Fan; Cui, Peng-Shuai; Zhang, Yan

    2017-01-01

    A cyber-physical attack in the industrial Internet of Things can cause severe damage to physical system. In this paper, we focus on the command disaggregation attack, wherein attackers modify disaggregated commands by intruding command aggregators like programmable logic controllers, and then maliciously manipulate the physical process. It is necessary to investigate these attacks, analyze their impact on the physical process, and seek effective detection mechanisms. We depict two different types of command disaggregation attack modes: (1) the command sequence is disordered and (2) disaggregated sub-commands are allocated to wrong actuators. We describe three attack models to implement these modes with going undetected by existing detection methods. A novel and effective framework is provided to detect command disaggregation attacks. The framework utilizes the correlations among two-tier command sequences, including commands from the output of central controller and sub-commands from the input of actuators, to detect attacks before disruptions occur. We have designed components of the framework and explain how to mine and use these correlations to detect attacks. We present two case studies to validate different levels of impact from various attack models and the effectiveness of the detection framework. Finally, we discuss how to enhance the detection framework. PMID:29065461

  11. Command Disaggregation Attack and Mitigation in Industrial Internet of Things.

    PubMed

    Xun, Peng; Zhu, Pei-Dong; Hu, Yi-Fan; Cui, Peng-Shuai; Zhang, Yan

    2017-10-21

    A cyber-physical attack in the industrial Internet of Things can cause severe damage to physical system. In this paper, we focus on the command disaggregation attack, wherein attackers modify disaggregated commands by intruding command aggregators like programmable logic controllers, and then maliciously manipulate the physical process. It is necessary to investigate these attacks, analyze their impact on the physical process, and seek effective detection mechanisms. We depict two different types of command disaggregation attack modes: (1) the command sequence is disordered and (2) disaggregated sub-commands are allocated to wrong actuators. We describe three attack models to implement these modes with going undetected by existing detection methods. A novel and effective framework is provided to detect command disaggregation attacks. The framework utilizes the correlations among two-tier command sequences, including commands from the output of central controller and sub-commands from the input of actuators, to detect attacks before disruptions occur. We have designed components of the framework and explain how to mine and use these correlations to detect attacks. We present two case studies to validate different levels of impact from various attack models and the effectiveness of the detection framework. Finally, we discuss how to enhance the detection framework.

  12. Lethality of sea lamprey attacks on lake trout in relation to location on the body surface

    USGS Publications Warehouse

    Bergstedt, Roger A.; Schneider, Clifford P.; O'Gorman, Robert

    2001-01-01

    We compared the locations of healed attack marks of the sea lamprey Petromyzon marinus on live lake trout Salvelinus namaycush with those of unhealed attack marks on dead lake trout to determine if the lethality of a sea lamprey attack was related to attack location. Lake trout were collected from Lake Ontario, live fish with gill nets in September 1985 and dead fish with trawls in October 1983−1986. Attack location was characterized by the percent distances from snout to tail and from the ventral to the dorsal midline. Kolmogorov−Smirnov two-sample tests did not detect significant differences in the distribution of attack location along either the anteroposterior axis or the dorsoventral axis. When attack locations were grouped into six anatomical regions historically used to record sea lamprey attacks, dead fish did not exhibit a significantly higher proportion of attacks in the more anterior regions. Even if the differences in attack location on live and dead fish were significant, they were too small to imply substantial spatial differences in attack lethality that should be accounted for when modeling the effects of sea lampreys feeding on lake trout. We suggest that the tendency for sea lamprey attacks to occur on the anterior half of the fish is related to the lower amplitude of lateral body movement there during swimming and thus the lower likelihood of being dislodged.

  13. Khyâl attacks: a key idiom of distress among traumatized cambodia refugees.

    PubMed

    Hinton, Devon E; Pich, Vuth; Marques, Luana; Nickerson, Angela; Pollack, Mark H

    2010-06-01

    Traumatized Cambodian refugees with PTSD often complain of khyâl attacks. The current study investigates khyâl attacks from multiple perspectives and examines the validity of a model of how khyâl attacks are generated. The study found that khyâl attacks had commonly been experienced in the previous 4 weeks and that their severity was strongly correlated with the severity of PTSD (PTSD Checklist). It was found that khyâl attacks were triggered by various processes--such as worry, trauma recall, standing up, going to a mall--and that khyâl attacks almost always met panic attack criteria. It was also found that during a khyâl attack there was great fear that death might occur from bodily dysfunction. It was likewise found that a complex nosology of khyâl attacks exists that rates the attacks on a scale of severity, that the severity determines how the khyâl attacks should be treated and that those treatments are often complex. As illustrated by the article, khyâl attacks constitute a key aspect of trauma ontology in this group, a culturally specific experiencing of anxiety and trauma-related disorder. The article also contributes to the study of trauma somatics, that is, to the study of how trauma results in specific symptoms in a specific cultural context, showing that a key part of the trauma-somatic reticulum is often a cultural syndrome.

  14. Cyber attacks against state estimation in power systems: Vulnerability analysis and protection strategies

    NASA Astrophysics Data System (ADS)

    Liu, Xuan

    Power grid is one of the most critical infrastructures in a nation and could suffer a variety of cyber attacks. With the development of Smart Grid, false data injection attack has recently attracted wide research interest. This thesis proposes a false data attack model with incomplete network information and develops optimal attack strategies for attacking load measurements and the real-time topology of a power grid. The impacts of false data on the economic and reliable operations of power systems are quantitatively analyzed in this thesis. To mitigate the risk of cyber attacks, a distributed protection strategies are also developed. It has been shown that an attacker can design false data to avoid being detected by the control center if the network information of a power grid is known to the attacker. In practice, however, it is very hard or even impossible for an attacker to obtain all network information of a power grid. In this thesis, we propose a local load redistribution attacking model based on incomplete network information and show that an attacker only needs to obtain the network information of the local attacking region to inject false data into smart meters in the local region without being detected by the state estimator. A heuristic algorithm is developed to determine a feasible attacking region by obtaining reduced network information. This thesis investigates the impacts of false data on the operations of power systems. It has been shown that false data can be designed by an attacker to: 1) mask the real-time topology of a power grid; 2) overload a transmission line; 3) disturb the line outage detection based on PMU data. To mitigate the risk of cyber attacks, this thesis proposes a new protection strategy, which intends to mitigate the damage effects of false data injection attacks by protecting a small set of critical measurements. To further reduce the computation complexity, a mixed integer linear programming approach is also proposed to separate the power grid into several subnetworks, then distributed protection strategy is applied to each subnetwork.

  15. Public knowledge of heart attack in a Nepalese population survey.

    PubMed

    Limbu, Yuba R; Malla, Rabi; Regmi, Shyam R; Dahal, Ramesh; Nakarmi, Hari L; Yonzan, Ganesh; Gartaula, Ritu P

    2006-01-01

    Limited knowledge of heart attack symptoms may prevent patients from seeking time-dependent thrombolytic therapy, an intervention that offers impressive survival benefit. Previous studies carried out in developed countries demonstrated a deficit of knowledge about a wide range of heart attack symptoms. The aim of this study was to describe knowledge of heart attack, knowledge of heart attack symptoms, and anticipated first response to symptoms among the lay public in Nepal. A total of 1192 participants (657 men and 535 women age 16 to 88 years old) were interviewed in a cross-sectional manner. Those <16 years of age, all health professionals, and individuals with a history of heart attack were excluded. A total of 862 (72.3%) participants had heard of heart attack. Significantly more male than female participants had heard of heart attack (P <.001). Of the respondents, 91.7% with >or=10 years of education (ED-2) had heard of heart of attack, whereas only 54% respondents with <10 years of education or who were illiterate (unable to read and write) (ED-1) had heard of heart attack, and in both the male and female populations, a higher percentage of the ED-2 group had heard of heart attack than the ED-1 group (92.6% vs. 60% and 85.6% vs. 49.6%, respectively). A significantly higher number of respondents from 31 to 50 years of age (AGE-2) had heard of heart attack than those 16 to 30 years of age (AGE-1) and those >50 years of age (AGE-3) (P <.001). Among 862 respondents who had heard of heart attack, 21.3% could not name any heart attack symptoms. A total of 16 different heart attack symptoms were named. Fainting or collapsing (48%), chest pain (22.4%), shortness of breath (9%), dizziness (8.4%), palpitations (7.4%), and sweating (7.4%) were the leading symptoms named by respondents. Fainting or collapsing and chest pain and shortness of breath were named more frequently among the ED-2 group respondents and the AGE-3 group men. Only 3.7% could name >or=2 typical heart attack symptoms. A significantly larger number of the ED-2 group named >or=2 typical symptoms than their counterparts (P <0.001). A large number (77.6%) of respondents preferred immediate hospital referral and/or doctor consultation after a heart attack. In Nepal, better-educated men are more aware of heart attack. Fainting or collapsing and chest pain and shortness of breath were leading heart attack symptoms named by the general population. Public heart attack awareness is not adequate and knowledge of wide range of heart attack symptoms is deficient in the Nepalese general population.

  16. Enhanced formulations for neutralization of chemical, biological and industrial toxants

    DOEpatents

    Tucker, Mark D [Albuqueque, NM

    2008-06-24

    An enhanced formulation and method of making that neutralizes the adverse health effects of both chemical and biological compounds, especially chemical warfare (CW) and biological warfare (BW) agents, and toxic industrial chemicals. The enhanced formulation according to the present invention is non-toxic and non-corrosive and can be delivered by a variety of means and in different phases. The formulation provides solubilizing compounds that serve to effectively render the chemical and biological compounds, particularly CW and BW compounds, susceptible to attack, and at least one reactive compound that serves to attack (and detoxify or kill) the compound. The formulation includes at least one solubilizing agent, a reactive compound, a bleaching activator and water.

  17. Opportunistic quantum network coding based on quantum teleportation

    NASA Astrophysics Data System (ADS)

    Shang, Tao; Du, Gang; Liu, Jian-wei

    2016-04-01

    It seems impossible to endow opportunistic characteristic to quantum network on the basis that quantum channel cannot be overheard without disturbance. In this paper, we propose an opportunistic quantum network coding scheme by taking full advantage of channel characteristic of quantum teleportation. Concretely, it utilizes quantum channel for secure transmission of quantum states and can detect eavesdroppers by means of quantum channel verification. What is more, it utilizes classical channel for both opportunistic listening to neighbor states and opportunistic coding by broadcasting measurement outcome. Analysis results show that our scheme can reduce the times of transmissions over classical channels for relay nodes and can effectively defend against classical passive attack and quantum active attack.

  18. A case of hereditary angioneurotic oedema, successfully treated with ε-aminocaproic acid. Studies on C'1 esterase inhibitor, C'1 activation, plasminogen level and histamine metabolism

    PubMed Central

    Lundh, B.; Laurell, Anna-Brita; Wetterqvist, H.; White, T.; Granerus, G.

    1968-01-01

    A patient with clinical and laboratory findings characteristic of hereditary angioneurotic oedema was investigated. The patient was observed for a period of 5 weeks, during which he had four attacks. ε-Aminocaproic acid (EACA) was then given continuously for 5 months, during which time the patient had no attacks. Attacks reappeared on withdrawal of EACA. Trans-4-(aminomethyl) cyclohexane carboxylic acid (AMCA®) was found to be equally effective in later therapeutic trials. C'1 esterase inhibitor was found in low concentration in defibrinated plasma also during attacks. ε-Aminocaproic acid (EACA) produced no significant change of the inhibitor content. C'1 esterase inhibitor disappeared on incubation of defibrinated plasma from the patient at 37°C for 40 min, and C'1 esterase was generated. The generation time of C'1 esterase increased with increasing the concentration of EDTA in the test solution. The C'1 esterase inhibitor content of defibrinated plasma from the patient, varied with the C'1 esterase generation time, the coefficient of correlation being higher in plasma sampled before treatment with EACA. Plasminogen and α2-macroglobulin were within the normal ranges, also during attacks. EACA markedly depressed the plasminogen level, which rapidly returned to normal on withdrawal of the drug. The studies on histamine metabolism revealed no significant changes with the exception of the urinary excretion of histamine, which was moderately increased towards the end of the period studied. On the days the patient received EACA the urine never contained 1-methylimidazole-5-acetic acid which was present in all the other specimens of urine examined. The basal gastric acid secretion was increased. PMID:5701955

  19. Protecting drinking water utilities from cyberthreats

    DOE PAGES

    Clark, Robert M.; Panguluri, Srinivas; Nelson, Trent D.; ...

    2017-02-01

    Cyber-security challenges have the potential for becoming one of the defining issues of our time. Cyber-attacks have become an ever-increasing threat and the United States (US) Federal Bureau of Investigation (FBI) now ranks cyber-crime as one of its most important law enforcement activities. In addition to the general problems associated with cyber-crime, critical infrastructure (CI) related to energy production, manufacturing, water supply and other systems have come under attack. For example, drinking water utilities are increasingly incorporating computer technology into their routine operations and are therefore increasingly vulnerable to cyber- threats. Systems control and data acquisition (SCADA) systems used tomore » manage automated physical processes essential to water treatment and distribution systems have become standard in medium to large drinking water utilities and in many small water systems. However, even with the application of standard information technology cybersecurity best practices these types of systems have proven to be vulnerable to cyber-attacks. In 2015, the US Department of Homeland Security (DHS) responded to 25 cybersecurity incidents in the Water Sector and to 46 incidents in the Energy Sector. Comparatively, between 2014 and 2015, the reported number of Water Sector incidents actually increased by 78.6% (from 14 to 25). The DHS is in a collaborative partnership with the US Environmental Protection Agency to ensure cybersecurity in the Water Sector. As a result of this partnership a number of guidance documents and techniques have been developed to counter cyber-attacks and minimize cyber vulnerability. These approaches are documented along with a summary of common vulnerabilities. However, a new approach which has great promise in protecting drinking water systems against hacking and cyber-attacks, based on the concept of unidirectional gateways, is presented and discussed.« less

  20. Trichinella spiralis Paramyosin Binds to C8 and C9 and Protects the Tissue-Dwelling Nematode from Being Attacked by Host Complement

    PubMed Central

    Zhang, Zhifei; Yang, Jing; Wei, Junfei; Yang, Yaping; Chen, Xiaoqin; Zhao, Xi; Gu, Yuan; Cui, Shijuan; Zhu, Xinping

    2011-01-01

    Background Paramyosin is a thick myofibrillar protein found exclusively in invertebrates. Evidence suggested that paramyosin from helminths serves not only as a structural protein but also as an immunomodulatory agent. We previously reported that recombinant Trichinella spiralis paramyosin (Ts-Pmy) elicited a partial protective immunity in mice. In this study, the ability of Ts-Pmy to bind host complement components and protect against host complement attack was investigated. Methods and Findings In this study, the transcriptional and protein expression levels of Ts-Pmy were determined in T. spiralis newborn larva (NBL), muscle larva (ML) and adult worm developmental stages by RT-PCR and western blot analysis. Expression of Ts-Pmy at the outer membrane was observed in NBL and adult worms using immunogold electron microscopy and immunofluorescence staining. Functional analysis revealed that recombinant Ts-Pmy(rTs-Pmy) strongly bound to complement components C8 and C9 and inhibited the polymerization of C9 during the formation of the membrane attack complex (MAC). rTs-Pmy also inhibited the lysis of rabbit erythrocytes (ER) elicited by an alternative pathway-activated complement from guinea pig serum. Inhibition of native Ts-Pmy on the surface of NBL with a specific antiserum reduced larvae viability when under the attack of complement in vitro. In vivo passive transfer of anti-Ts-Pmy antiserum and complement-treated larvae into mice also significantly reduced the number of larvae that developed to ML. Conclusion These studies suggest that the outer membrane form of T. spiralis paramyosin plays an important role in the evasion of the host complement attack. PMID:21750743

  1. Applying the Scientific Method of Cybersecurity Research

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Tardiff, Mark F.; Bonheyo, George T.; Cort, Katherine A.

    The cyber environment has rapidly evolved from a curiosity to an essential component of the contemporary world. As the cyber environment has expanded and become more complex, so have the nature of adversaries and styles of attacks. Today, cyber incidents are an expected part of life. As a result, cybersecurity research emerged to address adversarial attacks interfering with or preventing normal cyber activities. Historical response to cybersecurity attacks is heavily skewed to tactical responses with an emphasis on rapid recovery. While threat mitigation is important and can be time critical, a knowledge gap exists with respect to developing the sciencemore » of cybersecurity. Such a science will enable the development and testing of theories that lead to understanding the broad sweep of cyber threats and the ability to assess trade-offs in sustaining network missions while mitigating attacks. The Asymmetric Resilient Cybersecurity Initiative at Pacific Northwest National Laboratory is a multi-year, multi-million dollar investment to develop approaches for shifting the advantage to the defender and sustaining the operability of systems under attack. The initiative established a Science Council to focus attention on the research process for cybersecurity. The Council shares science practices, critiques research plans, and aids in documenting and reporting reproducible research results. The Council members represent ecology, economics, statistics, physics, computational chemistry, microbiology and genetics, and geochemistry. This paper reports the initial work of the Science Council to implement the scientific method in cybersecurity research. The second section describes the scientific method. The third section in this paper discusses scientific practices for cybersecurity research. Section four describes initial impacts of applying the science practices to cybersecurity research.« less

  2. Protecting drinking water utilities from cyberthreats

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Clark, Robert M.; Panguluri, Srinivas; Nelson, Trent D.

    Cyber-security challenges have the potential for becoming one of the defining issues of our time. Cyber-attacks have become an ever-increasing threat and the United States (US) Federal Bureau of Investigation (FBI) now ranks cyber-crime as one of its most important law enforcement activities. In addition to the general problems associated with cyber-crime, critical infrastructure (CI) related to energy production, manufacturing, water supply and other systems have come under attack. For example, drinking water utilities are increasingly incorporating computer technology into their routine operations and are therefore increasingly vulnerable to cyber- threats. Systems control and data acquisition (SCADA) systems used tomore » manage automated physical processes essential to water treatment and distribution systems have become standard in medium to large drinking water utilities and in many small water systems. However, even with the application of standard information technology cybersecurity best practices these types of systems have proven to be vulnerable to cyber-attacks. In 2015, the US Department of Homeland Security (DHS) responded to 25 cybersecurity incidents in the Water Sector and to 46 incidents in the Energy Sector. Comparatively, between 2014 and 2015, the reported number of Water Sector incidents actually increased by 78.6% (from 14 to 25). The DHS is in a collaborative partnership with the US Environmental Protection Agency to ensure cybersecurity in the Water Sector. As a result of this partnership a number of guidance documents and techniques have been developed to counter cyber-attacks and minimize cyber vulnerability. These approaches are documented along with a summary of common vulnerabilities. However, a new approach which has great promise in protecting drinking water systems against hacking and cyber-attacks, based on the concept of unidirectional gateways, is presented and discussed.« less

  3. An evaluation of the role played by remote sensing technology following the World Trade Center attack

    NASA Astrophysics Data System (ADS)

    Huyck, Charles K.; Adams, Beverley J.; Kehrlein, David I.

    2003-06-01

    Remote sensing technology has been widely recognized for contributing to emergency response efforts after the World Trade Center attack on September 11th, 2001. The need to coordinate activities in the midst of a dense, yet relatively small area, made the combination of imagery and mapped data strategically useful. This paper reviews the role played by aerial photography, satellite imagery, and LIDAR data at Ground Zero. It examines how emergency managers utilized these datasets, and identifies significant problems that were encountered. It goes on to explore additional ways in which imagery could have been used, while presenting recommendations for more effective use in future disasters and Homeland Security applications. To plan adequately for future events, it was important to capture knowledge from individuals who responded to the World Trade Center attack. In recognition, interviews with key emergency management and geographic information system (GIS) personnel provide the basis of this paper. Successful techniques should not be forgotten, or serious problems dismissed. Although widely used after September 11th, it is important to recognize that with better planning, remote sensing and GIS could have played an even greater role. Together with a data acquisition timeline, an expanded discussion of these issues is available in the MCEER/NSF report “Emergency Response in the Wake of the World Trade Center Attack; The Remote Sensing Perspective” (Huyck and Adams, 2002)

  4. Heart attack

    MedlinePlus

    ... infarction; Non-ST - elevation myocardial infarction; NSTEMI; CAD - heart attack; Coronary artery disease - heart attack ... made up of cholesterol and other cells. A heart attack may occur when: A tear in the ...

  5. The effect of climate variability on urinary stone attacks: increased incidence associated with temperature over 18 °C: a population-based study.

    PubMed

    Park, Hyoung Keun; Bae, Sang Rak; Kim, Satbyul E; Choi, Woo Suk; Paick, Sung Hyun; Ho, Kim; Kim, Hyeong Gon; Lho, Yong Soo

    2015-02-01

    The aim of this study was to evaluate the effect of seasonal variation and climate parameters on urinary tract stone attack and investigate whether stone attack is increased sharply at a specific point. Nationwide data of total urinary tract stone attack numbers per month between January 2006 and December 2010 were obtained from the Korean Health Insurance Review and Assessment Service. The effects of climatic factors on monthly urinary stone attack were assessed using auto-regressive integrated moving average (ARIMA) regression method. A total of 1,702,913 stone attack cases were identified. Mean monthly and monthly average daily urinary stone attack cases were 28,382 ± 2,760 and 933 ± 85, respectively. The stone attack showed seasonal trends of sharp incline in June, a peak plateau from July to September, and a sharp decline after September. The correlation analysis showed that ambient temperature (r = 0.557, p < 0.001) and relative humidity (r = 0.513, p < 0.001) were significantly associated with urinary stone attack cases. However, after adjustment for trends and seasonality, ambient temperature was the only climate factor associated with the stone attack cases in ARIMA regression test (p = 0.04). Threshold temperature was estimated as 18.4 °C. Risk of urinary stone attack significantly increases 1.71% (1.02-2.41 %, 95% confidence intervals) with a 1 °C increase of ambient temperature above the threshold point. In conclusion, monthly urinary stone attack cases were changed according to seasonal variation. Among the climates variables, only temperature had consistent association with stone attack and when the temperature is over 18.4 °C, urinary stone attack would be increased sharply.

  6. Reexperiencing symptoms, dissociation, and avoidance behaviors in daily life of patients with PTSD and patients with panic disorder with agoraphobia.

    PubMed

    Pfaltz, Monique C; Michael, Tanja; Meyer, Andrea H; Wilhelm, Frank H

    2013-08-01

    Panic attacks are frequently perceived as life threatening. Panic disorder (PD) patients may therefore experience symptoms of posttraumatic stress disorder (PTSD). The authors explored this in 28 healthy controls, 17 PTSD patients, and 24 PD patients with agoraphobia who completed electronic diaries 36 times during 1 week. Patient groups frequently reported dissociation as well as thoughts, memories, and reliving of their trauma or panic attacks. PTSD patients reported more trauma/panic attack thoughts (incidence rate ratio [IRR] = 2.9) and memories (IRR = 2.8) than PD patients. Patient groups relived their trauma or panic attacks equally frequently, and reported comparable bodily reactions and distress associated with trauma or panic attack memories. Clinical groups avoided trauma or panic attack reminders more often than healthy controls (avoidance of trauma- or panic attack-related thoughts (IRR = 8.0); avoidance of things associated with the trauma or panic attack (IRR = 40.7). PD patients avoided trauma or panic attack reminders less often than PTSD patients (avoidance of trauma- or panic attack-related thoughts [IRR = 2.5]; avoidance of things associated with the trauma or panic attack [IRR = 4.1]), yet these differences were nonsignificant when controlling for functional impairment. In conclusion, trauma-like symptoms are common in PD with agoraphobia and panic attacks may be processed similarly as trauma in PTSD. Copyright © 2013 International Society for Traumatic Stress Studies.

  7. False Positive and False Negative Effects on Network Attacks

    NASA Astrophysics Data System (ADS)

    Shang, Yilun

    2018-01-01

    Robustness against attacks serves as evidence for complex network structures and failure mechanisms that lie behind them. Most often, due to detection capability limitation or good disguises, attacks on networks are subject to false positives and false negatives, meaning that functional nodes may be falsely regarded as compromised by the attacker and vice versa. In this work, we initiate a study of false positive/negative effects on network robustness against three fundamental types of attack strategies, namely, random attacks (RA), localized attacks (LA), and targeted attack (TA). By developing a general mathematical framework based upon the percolation model, we investigate analytically and by numerical simulations of attack robustness with false positive/negative rate (FPR/FNR) on three benchmark models including Erdős-Rényi (ER) networks, random regular (RR) networks, and scale-free (SF) networks. We show that ER networks are equivalently robust against RA and LA only when FPR equals zero or the initial network is intact. We find several interesting crossovers in RR and SF networks when FPR is taken into consideration. By defining the cost of attack, we observe diminishing marginal attack efficiency for RA, LA, and TA. Our finding highlights the potential risk of underestimating or ignoring FPR in understanding attack robustness. The results may provide insights into ways of enhancing robustness of network architecture and improve the level of protection of critical infrastructures.

  8. The non-trusty clown attack on model-based speaker recognition systems

    NASA Astrophysics Data System (ADS)

    Farrokh Baroughi, Alireza; Craver, Scott

    2015-03-01

    Biometric detectors for speaker identification commonly employ a statistical model for a subject's voice, such as a Gaussian Mixture Model, that combines multiple means to improve detector performance. This allows a malicious insider to amend or append a component of a subject's statistical model so that a detector behaves normally except under a carefully engineered circumstance. This allows an attacker to force a misclassification of his or her voice only when desired, by smuggling data into a database far in advance of an attack. Note that the attack is possible if attacker has access to database even for a limited time to modify victim's model. We exhibit such an attack on a speaker identification, in which an attacker can force a misclassification by speaking in an unusual voice, and replacing the least weighted component of victim's model by the most weighted competent of the unusual voice of the attacker's model. The reason attacker make his or her voice unusual during the attack is because his or her normal voice model can be in database, and by attacking with unusual voice, the attacker has the option to be recognized as himself or herself when talking normally or as the victim when talking in the unusual manner. By attaching an appropriately weighted vector to a victim's model, we can impersonate all users in our simulations, while avoiding unwanted false rejections.

  9. 44 CFR 312.2 - Definitions.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... meaning of the listed terms are as follows: (a) The term attack means any attack or series of attacks by... population caused, or which would be caused, by an attack upon the United States, or by natural disaster, (2) to deal with the immediate emergency conditions which would be created by any such attack, or natural...

  10. 44 CFR 312.2 - Definitions.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... meaning of the listed terms are as follows: (a) The term attack means any attack or series of attacks by... population caused, or which would be caused, by an attack upon the United States, or by natural disaster, (2) to deal with the immediate emergency conditions which would be created by any such attack, or natural...

  11. 44 CFR 312.2 - Definitions.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... meaning of the listed terms are as follows: (a) The term attack means any attack or series of attacks by... population caused, or which would be caused, by an attack upon the United States, or by natural disaster, (2) to deal with the immediate emergency conditions which would be created by any such attack, or natural...

  12. [Comparative analysis of phenomenology of paroxysms of atrial fibrillation and panic attacks].

    PubMed

    San'kova, T A; Solov'eva, A D; Nedostup, A V

    2004-01-01

    To study phenomenology of attacks of atrial fibrillation (AF) and to compare it with phenomenology of panic attacks for elucidation of pathogenesis of atrial fibrillation and for elaboration of rational therapeutic intervention including those aimed at correction of psychovegetative abnormalities. Patients with nonrheumatic paroxysmal AF (n=105) and 100 patients with panic attacks (n=100). Clinical, cardiological and neurological examination, analysis of patients complaints during attacks of AF, and comparison them with diagnostic criteria for panic attack. It was found that clinical picture of attacks of AF comprised vegetative, emotional and functional neurological phenomena similar to those characteristic for panic attacks. This similarity as well as positive therapeutic effect of clonazepam allowed to propose a novel pathogenic mechanism of AF attacks. Severity of psychovegetative disorders during paroxysm of AF could be evaluated by calculation of psychovegetative iudex: Psychovegetative index should be used for detection of panic attack-like component in clinical picture of AF paroxysm and thus for determination of indications for inclusion of vegetotropic drugs, e. g. clonazepam, in complex preventive therapy.

  13. Security Assessment of Cyberphysical Digital Microfluidic Biochips.

    PubMed

    Ali, Sk Subidh; Ibrahim, Mohamed; Sinanoglu, Ozgur; Chakrabarty, Krishnendu; Karri, Ramesh

    2016-01-01

    A digital microfluidic biochip (DMFB) is an emerging technology that enables miniaturized analysis systems for point-of-care clinical diagnostics, DNA sequencing, and environmental monitoring. A DMFB reduces the rate of sample and reagent consumption, and automates the analysis of assays. In this paper, we provide the first assessment of the security vulnerabilities of DMFBs. We identify result-manipulation attacks on a DMFB that maliciously alter the assay outcomes. Two practical result-manipulation attacks are shown on a DMFB platform performing enzymatic glucose assay on serum. In the first attack, the attacker adjusts the concentration of the glucose sample and thereby modifies the final result. In the second attack, the attacker tampers with the calibration curve of the assay operation. We then identify denial-of-service attacks, where the attacker can disrupt the assay operation by tampering either with the droplet-routing algorithm or with the actuation sequence. We demonstrate these attacks using a digital microfluidic synthesis simulator. The results show that the attacks are easy to implement and hard to detect. Therefore, this work highlights the need for effective protections against malicious modifications in DMFBs.

  14. Managing burn victims of suicide bombing attacks: outcomes, lessons learnt, and changes made from three attacks in Indonesia.

    PubMed

    Chim, Harvey; Yew, Woon Si; Song, Colin

    2007-01-01

    Terror attacks in Southeast Asia were almost nonexistent until the 2002 Bali bomb blast, considered the deadliest attack in Indonesian history. Further attacks in 2003 (Jakarta), 2004 (Jakarta), and 2005 (Bali) have turned terrorist attacks into an ever-present reality. The authors reviewed medical charts of victims evacuated to the Singapore General Hospital (SGH) Burns Centre during three suicide attacks involving Bali (2002 and 2005) and the Jakarta Marriott hotel (2003). Problems faced, lessons learnt, and costs incurred are discussed. A burns disaster plan drawing on lessons learnt from these attacks is presented. Thirty-one patients were treated at the SGH Burns Centre in three attacks (2002 Bali attack [n = 15], 2003 Jakarta attack [n = 14], and 2005 Bali attack [n = 2]). For the 2002 Bali attack, median age was 29 years (range 20 to 50 years), median percentage of total burn surface area (TBSA) was 29% (range 5% to 55%), and median abbreviated burn severity index (ABSI) was 6 (range 3 to 10). Eight of 15 patients were admitted to the intensive care unit. For the 2003 Jakarta attack, median age was 35 years (range 24 to 56 years), median percentage of TBSA was 10% (range 2% to 46%), and median ABSI was 4 (range 3 to 9). A large number of patients had other injuries. Problems faced included manpower issues, lack of bed space, shortage of blood products, and lack of cadaver skin. The changing nature of terror attacks mandates continued vigilance and disaster preparedness. The multidimensional burns patient, complicated by other injuries, is likely to become increasingly common. A burns disaster plan with emphasis on effective command, control, and communication as well as organisation of health care personnel following a 'team concept' will do much to ensure that the sudden onset of a crisis situation at an unexpected time does not overwhelm hospital manpower and resources.

  15. Managing burn victims of suicide bombing attacks: outcomes, lessons learnt, and changes made from three attacks in Indonesia

    PubMed Central

    Chim, Harvey; Yew, Woon Si; Song, Colin

    2007-01-01

    Introduction Terror attacks in Southeast Asia were almost nonexistent until the 2002 Bali bomb blast, considered the deadliest attack in Indonesian history. Further attacks in 2003 (Jakarta), 2004 (Jakarta), and 2005 (Bali) have turned terrorist attacks into an ever-present reality. Methods The authors reviewed medical charts of victims evacuated to the Singapore General Hospital (SGH) Burns Centre during three suicide attacks involving Bali (2002 and 2005) and the Jakarta Marriott hotel (2003). Problems faced, lessons learnt, and costs incurred are discussed. A burns disaster plan drawing on lessons learnt from these attacks is presented. Results Thirty-one patients were treated at the SGH Burns Centre in three attacks (2002 Bali attack [n = 15], 2003 Jakarta attack [n = 14], and 2005 Bali attack [n = 2]). For the 2002 Bali attack, median age was 29 years (range 20 to 50 years), median percentage of total burn surface area (TBSA) was 29% (range 5% to 55%), and median abbreviated burn severity index (ABSI) was 6 (range 3 to 10). Eight of 15 patients were admitted to the intensive care unit. For the 2003 Jakarta attack, median age was 35 years (range 24 to 56 years), median percentage of TBSA was 10% (range 2% to 46%), and median ABSI was 4 (range 3 to 9). A large number of patients had other injuries. Problems faced included manpower issues, lack of bed space, shortage of blood products, and lack of cadaver skin. Conclusion The changing nature of terror attacks mandates continued vigilance and disaster preparedness. The multidimensional burns patient, complicated by other injuries, is likely to become increasingly common. A burns disaster plan with emphasis on effective command, control, and communication as well as organisation of health care personnel following a 'team concept' will do much to ensure that the sudden onset of a crisis situation at an unexpected time does not overwhelm hospital manpower and resources. PMID:17274813

  16. Domestic Event Support Operations (DESO)

    DTIC Science & Technology

    2012-02-01

    Examples include EOD Technicians, doctors, nurses , and signalers. The capability also needed dedicated support from DSTO, which eventually became...attacks led to the postponement of CHOGM 2001 and the suspension of Operation GUARDIAN. The activity was rescheduled for March 2002 to be held in the

  17. Cyber Incidents Involving Control Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Robert J. Turk

    2005-10-01

    The Analysis Function of the US-CERT Control Systems Security Center (CSSC) at the Idaho National Laboratory (INL) has prepared this report to document cyber security incidents for use by the CSSC. The description and analysis of incidents reported herein support three CSSC tasks: establishing a business case; increasing security awareness and private and corporate participation related to enhanced cyber security of control systems; and providing informational material to support model development and prioritize activities for CSSC. The stated mission of CSSC is to reduce vulnerability of critical infrastructure to cyber attack on control systems. As stated in the Incident Managementmore » Tool Requirements (August 2005) ''Vulnerability reduction is promoted by risk analysis that tracks actual risk, emphasizes high risk, determines risk reduction as a function of countermeasures, tracks increase of risk due to external influence, and measures success of the vulnerability reduction program''. Process control and Supervisory Control and Data Acquisition (SCADA) systems, with their reliance on proprietary networks and hardware, have long been considered immune to the network attacks that have wreaked so much havoc on corporate information systems. New research indicates this confidence is misplaced--the move to open standards such as Ethernet, Transmission Control Protocol/Internet Protocol, and Web technologies is allowing hackers to take advantage of the control industry's unawareness. Much of the available information about cyber incidents represents a characterization as opposed to an analysis of events. The lack of good analyses reflects an overall weakness in reporting requirements as well as the fact that to date there have been very few serious cyber attacks on control systems. Most companies prefer not to share cyber attack incident data because of potential financial repercussions. Uniform reporting requirements will do much to make this information available to Department of Homeland Security (DHS) and others who require it. This report summarizes the rise in frequency of cyber attacks, describes the perpetrators, and identifies the means of attack. This type of analysis, when used in conjunction with vulnerability analyses, can be used to support a proactive approach to prevent cyber attacks. CSSC will use this document to evolve a standardized approach to incident reporting and analysis. This document will be updated as needed to record additional event analyses and insights regarding incident reporting. This report represents 120 cyber security incidents documented in a number of sources, including: the British Columbia Institute of Technology (BCIT) Industrial Security Incident Database, the 2003 CSI/FBI Computer Crime and Security Survey, the KEMA, Inc., Database, Lawrence Livermore National Laboratory, the Energy Incident Database, the INL Cyber Incident Database, and other open-source data. The National Memorial Institute for the Prevention of Terrorism (MIPT) database was also interrogated but, interestingly, failed to yield any cyber attack incidents. The results of this evaluation indicate that historical evidence provides insight into control system related incidents or failures; however, that the limited available information provides little support to future risk estimates. The documented case history shows that activity has increased significantly since 1988. The majority of incidents come from the Internet by way of opportunistic viruses, Trojans, and worms, but a surprisingly large number are directed acts of sabotage. A substantial number of confirmed, unconfirmed, and potential events that directly or potentially impact control systems worldwide are also identified. Twelve selected cyber incidents are presented at the end of this report as examples of the documented case studies (see Appendix B).« less

  18. Robustness analysis of interdependent networks under multiple-attacking strategies

    NASA Astrophysics Data System (ADS)

    Gao, Yan-Li; Chen, Shi-Ming; Nie, Sen; Ma, Fei; Guan, Jun-Jie

    2018-04-01

    The robustness of complex networks under attacks largely depends on the structure of a network and the nature of the attacks. Previous research on interdependent networks has focused on two types of initial attack: random attack and degree-based targeted attack. In this paper, a deliberate attack function is proposed, where six kinds of deliberate attacking strategies can be derived by adjusting the tunable parameters. Moreover, the robustness of four types of interdependent networks (BA-BA, ER-ER, BA-ER and ER-BA) with different coupling modes (random, positive and negative correlation) is evaluated under different attacking strategies. Interesting conclusions could be obtained. It can be found that the positive coupling mode can make the vulnerability of the interdependent network to be absolutely dependent on the most vulnerable sub-network under deliberate attacks, whereas random and negative coupling modes make the vulnerability of interdependent network to be mainly dependent on the being attacked sub-network. The robustness of interdependent network will be enhanced with the degree-degree correlation coefficient varying from positive to negative. Therefore, The negative coupling mode is relatively more optimal than others, which can substantially improve the robustness of the ER-ER network and ER-BA network. In terms of the attacking strategies on interdependent networks, the degree information of node is more valuable than the betweenness. In addition, we found a more efficient attacking strategy for each coupled interdependent network and proposed the corresponding protection strategy for suppressing cascading failure. Our results can be very useful for safety design and protection of interdependent networks.

  19. Continuous-variable quantum cryptography is secure against non-Gaussian attacks.

    PubMed

    Grosshans, Frédéric; Cerf, Nicolas J

    2004-01-30

    A general study of arbitrary finite-size coherent attacks against continuous-variable quantum cryptographic schemes is presented. It is shown that, if the size of the blocks that can be coherently attacked by an eavesdropper is fixed and much smaller than the key size, then the optimal attack for a given signal-to-noise ratio in the transmission line is an individual Gaussian attack. Consequently, non-Gaussian coherent attacks do not need to be considered in the security analysis of such quantum cryptosystems.

  20. Simulating cyber warfare and cyber defenses: information value considerations

    NASA Astrophysics Data System (ADS)

    Stytz, Martin R.; Banks, Sheila B.

    2011-06-01

    Simulating cyber warfare is critical to the preparation of decision-makers for the challenges posed by cyber attacks. Simulation is the only means we have to prepare decision-makers for the inevitable cyber attacks upon the information they will need for decision-making and to develop cyber warfare strategies and tactics. Currently, there is no theory regarding the strategies that should be used to achieve objectives in offensive or defensive cyber warfare, and cyber warfare occurs too rarely to use real-world experience to develop effective strategies. To simulate cyber warfare by affecting the information used for decision-making, we modify the information content of the rings that are compromised during in a decision-making context. The number of rings affected and value of the information that is altered (i.e., the closeness of the ring to the center) is determined by the expertise of the decision-maker and the learning outcome(s) for the simulation exercise. We determine which information rings are compromised using the probability that the simulated cyber defenses that protect each ring can be compromised. These probabilities are based upon prior cyber attack activity in the simulation exercise as well as similar real-world cyber attacks. To determine which information in a compromised "ring" to alter, the simulation environment maintains a record of the cyber attacks that have succeeded in the simulation environment as well as the decision-making context. These two pieces of information are used to compute an estimate of the likelihood that the cyber attack can alter, destroy, or falsify each piece of information in a compromised ring. The unpredictability of information alteration in our approach adds greater realism to the cyber event. This paper suggests a new technique that can be used for cyber warfare simulation, the ring approach for modeling context-dependent information value, and our means for considering information value when assigning cyber resources to information protection tasks. The first section of the paper introduces the cyber warfare simulation challenge and the reasons for its importance. The second section contains background information related to our research. The third section contains a discussion of the information ring technique and its use for simulating cyber attacks. The fourth section contains a summary and suggestions for research.

  1. Cancer and heart attack survivors' expectations of employment status: results from the English Longitudinal Study of Ageing.

    PubMed

    Duijts, Saskia F A; van der Beek, Allard J; Bleiker, Eveline M A; Smith, Lee; Wardle, Jane

    2017-08-07

    Sociodemographic, health- and work-related factors have been found to influence return to work in cancer survivors. It is feasible though that behavioural factors, such as expectation of being at work, could also affect work-related outcomes. Therefore, the effect of earlier identified factors and expectation of being at work on future employment status in cancer survivors was explored. To assess the degree to which these factors specifically concern cancer survivors, a comparison with heart attack survivors was made. Data from the English Longitudinal Study of Ageing were used. Cancer and heart attack survivors of working age in the UK were included and followed up for 2 years. Baseline characteristics of both cancer and heart attack survivors were compared regarding employment status. Univariate and multivariate regression analyses were performed in survivors at work, and the interaction between independent variables and diagnose group was assessed. In cancer survivors at work (N = 159), alcohol consumption, participating in moderate or vigorous sport activities, general health and participation were univariate associated with employment status at two-year follow-up. Only fair general health (compared to very good general health) remained statistically significant in the multivariate model (OR 0.31; 95% CI 0.13-0.76; p = 0.010). In heart attack survivors at work (N = 78), gender, general health and expectation of being at work were univariate associated with employment status at follow-up. Female gender (OR 0.03; 95% CI 0.00-0.57; p = 0.018) and high expectation of being at work (OR 10.68; 95% CI 1.23-93.92; p = 0.033) remained significant in the multivariate model. The influence of gender (p = 0.066) and general health (p = 0.020) regarding employment status was found to differ significantly between cancer and heart attack survivors. When predicting future employment status in cancer survivors in the UK, general health is the most relevant factor to consider. While expectation of being at work did not show any significant influence in cancer survivors, in heart attack survivors, it should not be disregarded though, when developing interventions to affect their employment status. Future research should focus on more specific measures for expectation, and additional behavioural factors, such as self-efficacy, and their effect on employment status.

  2. A comparison of the nature and correlates of panic attacks in the context of Panic Disorder and Social Anxiety Disorder.

    PubMed

    Brown, Lily A; LeBeau, Richard; Liao, Betty; Niles, Andrea N; Glenn, Daniel; Craske, Michelle G

    2016-01-30

    Panic attacks occurring outside of Panic Disorder are not well-understood despite their inclusion as a diagnostic specifier in the Diagnostic and Statistical Manual for Mental Disorders (DSM-5). This study compares panic attacks in the context of Panic Disorder compared to social anxiety in terms of their symptom frequency, severity, and clinical correlates. Participants (n=404) were interviewed using the Anxiety Disorders Interview Schedule (ADIS-IV-L; Brown et al., 1994), from which we analyzed interviewer ratings of panic attacks and panic attack symptoms, as well as other demographic and clinical characteristics. Panic attacks in the context of Panic Disorder were characterized by a greater number and severity of symptoms compared to panic attacks in the context of Social Anxiety Disorder, and were associated with a history of traumatization, inpatient psychiatric treatment, and benzodiazepine use. Social anxiety panic attacks were associated with reduced physical health concerns. Cognitive panic attack symptoms were more prevalent in Panic Disorder and were associated with a variety of poor clinical correlates. Panic attacks in the context of Panic Disorder are more severe than those in social anxiety, and this may be driven by cognitive disturbances during those attacks. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.

  3. Heart Attack Recovery FAQs

    MedlinePlus

    ... recommendations to make a full recovery. View an animation of a heart attack . Heart Attack Recovery Questions ... Support Network Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...

  4. Neural Detection of Malicious Network Activities Using a New Direct Parsing and Feature Extraction Technique

    DTIC Science & Technology

    2015-09-01

    intrusion detection systems , neural networks 15. NUMBER OF PAGES 75 16. PRICE CODE 17. SECURITY CLASSIFICATION OF... detection system (IDS) software, which learns to detect and classify network attacks and intrusions through prior training data. With the added criteria of...BACKGROUND The growing threat of malicious network activities and intrusion attempts makes intrusion detection systems (IDS) a

  5. Fitness and Independence after SCI: Defining Meaningful Change and Thresholds

    DTIC Science & Technology

    2015-10-01

    a sporting activity Yes (professional, recreational, or leisure) when you No were injured? (For example, swimming, diving, horseback riding, biking...etc.) Please select the sporting activity Diving (into pool, ocean, lake, etc) Swimming Surfing Motocross/dirt bike riding Cycling Gymnastics...Equestrian sports (riding or racing) Other Other __________________________________ Did your injury occur as the result of an assault, Yes attack, or act of

  6. Group Policy Reference Systems and Network Attack Center (SNAC)

    DTIC Science & Technology

    2001-03-02

    Policy Snap-in for a given Active Directory container . It is hoped that this map will alleviate some of the complexity in managing and understanding...help the reader locate specific policies within the Group Policy Snap-in for a given Active Directory container . It is hoped that this map will alleviate...Policy Snap-in for a given Active Directory container . It is hoped that this map will alleviate some of the complexity in managing and

  7. Analyzing Red and Gray Stages of Bark Beetle Attack in the San Bernardino National Forest Using Remote Sensing

    NASA Astrophysics Data System (ADS)

    Morgan, Andy J.

    The San Bernardino National Forest (SBNF) has experienced periods of high, concentrated bark beetle epidemics in the late 1990's and into the 2000's. This increased activity has caused huge amounts of forest loss, resulting from disease introduced by bark beetles. Using remote sensing techniques and Landsat Thematic Mapper 5 (TM5) imagery, the spread of bark beetle diseased trees is mapped over a period from 1998 to 2008. Acreage of two attack stages (red and gray) were calculated from a level sliced classification method developed on data training sites. In each image using Normalized Difference Vegetation Index (NDVI) is the driver of forest health classifications. The results of the analysis are classification maps for each year, red acreage estimated for each study year, and gray attack acreage estimated for each study year. Additionally, for the period of 2001-2004, acreage was compared to those reported by the USDA with a thirteen percent lower mortality total in comparison to USDA federal land and a thirty-two percent lower total mortality (federal and non-federal) land in the SBNF.

  8. Are fast explorers slow reactors? Linking personality type and anti-predator behaviour

    PubMed Central

    Jones, Katherine A.; Godin, Jean-Guy J.

    2010-01-01

    Response delays to predator attack may be adaptive, suggesting that latency to respond does not always reflect predator detection time, but can be a decision based on starvation–predation risk trade-offs. In birds, some anti-predator behaviours have been shown to be correlated with personality traits such as activity level and exploration. Here, we tested for a correlation between exploration behaviour and response latency time to a simulated fish predator attack in a fish species, juvenile convict cichlids (Amatitlania nigrofasciata). Individual focal fish were subjected to a standardized attack by a robotic fish predator while foraging, and separately given two repeated trials of exploration of a novel environment. We found a strong positive correlation between exploration and time taken to respond to the predator model. Fish that were fast to explore the novel environment were slower to respond to the predator. Our study therefore provides some of the first experimental evidence for a link between exploration behaviour and predator-escape behaviour. We suggest that different behavioural types may differ in how they partition their attention between foraging and anti-predator vigilance. PMID:19864291

  9. Comparison of Angle of Attack Measurements for Wind Tunnel Testing

    NASA Technical Reports Server (NTRS)

    Jones, Thomas, W.; Hoppe, John C.

    2001-01-01

    Two optical systems capable of measuring model attitude and deformation were compared to inertial devices employed to acquire wind tunnel model angle of attack measurements during the sting mounted full span 30% geometric scale flexible configuration of the Northrop Grumman Unmanned Combat Air Vehicle (UCAV) installed in the NASA Langley Transonic Dynamics Tunnel (TDT). The overall purpose of the test at TDT was to evaluate smart materials and structures adaptive wing technology. The optical techniques that were compared to inertial devices employed to measure angle of attack for this test were: (1) an Optotrak (registered) system, an optical system consisting of two sensors, each containing a pair of orthogonally oriented linear arrays to compute spatial positions of a set of active markers; and (2) Video Model Deformation (VMD) system, providing a single view of passive targets using a constrained photogrammetric solution whose primary function was to measure wing and control surface deformations. The Optotrak system was installed for this test for the first time at TDT in order to assess the usefulness of the system for future static and dynamic deformation measurements.

  10. Hawkmoths produce anti-bat ultrasound

    PubMed Central

    Barber, Jesse R.; Kawahara, Akito Y.

    2013-01-01

    Bats and moths have been engaged in aerial warfare for nearly 65 Myr. This arms race has produced a suite of counter-adaptations in moths, including bat-detecting ears. One set of defensive strategies involves the active production of sound; tiger moths' ultrasonic replies to bat attack have been shown to startle bats, warn the predators of bad taste and jam their biosonar. Here, we report that hawkmoths in the Choerocampina produce entirely ultrasonic sounds in response to tactile stimulation and the playback of biosonar attack sequences. Males do so by grating modified scraper scales on the outer surface of the genital valves against the inner margin of the last abdominal tergum. Preliminary data indicate that females also produce ultrasound to touch and playback of echolocation attack, but they do so with an entirely different mechanism. The anti-bat function of these sounds is unknown but might include startling, cross-family acoustic mimicry, warning of unprofitability or physical defence and/or jamming of echolocation. Hawkmoths present a novel and tractable system to study both the function and evolution of anti-bat defences. PMID:23825084

  11. Safe caves and dangerous forests? Predation risk may contribute to salamander colonization of subterranean habitats

    NASA Astrophysics Data System (ADS)

    Salvidio, Sebastiano; Palumbi, Giulia; Romano, Antonio; Costa, Andrea

    2017-04-01

    Recent studies suggest that many organisms actively colonize the subterranean environment to avoid climatic stress, exploit new ecological opportunities and reduce competition and predation. Terrestrial salamanders are known to colonize the more stable subterranean habitats mainly to escape external climatic extremes, while the role of predation avoidance remains untested. To better understand the importance of predation, we used clay models of the cave salamander Speleomantes strinatii to compare the predation occurring in woodland and subterranean habitats. Models were positioned in three forests and in three caves in NW Italy. One-hundred eighty-four models were retrieved from the field and 59 (32%) were attacked by predators. Models were attacked on their head more often than expected by chance and, therefore, were perceived by predators as real prey items. In the woodlands, clay models showed a four-time higher probability of being attacked in comparison to caves, suggesting a different level of potential predation risk in these surface habitats. These findings are one of the first experimental evidences that, in terrestrial ecosystems, predation avoidance may contribute to the salamander underground colonization process.

  12. [Aggression faced by doctors during social service in Mexico].

    PubMed

    Arredondo Trujillo, Francisco; Gascón Santos, Santiago; Espino Álvarez, Luis Arturo; Torres Morquecho, Maricela

    2014-12-01

    Physicians during their work activities have been exposed to suffering physical and non-physical aggression (insults, threats, sexual assaults and even murder) by patients. The frequency of such attacks has increased in recent years. The aim of this study is to identify the risk of attacks on physicians associated with the type of work place that health institutions have assigned them for their year of social service in Mexico. A cross-sectional questionnaire survey was conducted during 2012 of 371 physicians who were assigned to work in various community health centers called type "A", "B" or "C". Having worked in a work place type "C" was associated with physical aggression (OR: 2.32; 95% CI: 1.03-5.37), threats (OR: 2.64; 95% CI: 1.43-4.93), and insults (OR: 2.28; 95% CI: 1.35-3.88). The results should be interpreted with caution, but they suggest that physicians who are assigned to work in the places type "C" (where they must care for patients in a solitary manner and at night) during the year of social service in Mexico have a significant risk of being attacked.

  13. TauG-guidance of transients in expressive musical performance.

    PubMed

    Schogler, Benjaman; Pepping, Gert-Jan; Lee, David N

    2008-08-01

    The sounds in expressive musical performance, and the movements that produce them, offer insight into temporal patterns in the brain that generate expression. To gain understanding of these brain patterns, we analyzed two types of transient sounds, and the movements that produced them, during a vocal duet and a bass solo. The transient sounds studied were inter-tone f (0)(t)-glides (the continuous change in fundamental frequency, f (0)(t), when gliding from one tone to the next), and attack intensity-glides (the continuous rise in sound intensity when attacking, or initiating, a tone). The temporal patterns of the inter-tone f (0)(t)-glides and attack intensity-glides, and of the movements producing them, all conformed to the mathematical function, tau (G)(t) (called tauG), predicted by General Tau Theory, and assumed to be generated in the brain. The values of the parameters of the tau (G)(t) function were modulated by the performers when they modulated musical expression. Thus the tau (G)(t) function appears to be a fundamental of brain activity entailed in the generation of expressive temporal patterns of movement and sound.

  14. Lessons Learned in Over a Decade of Technical Support for U.S. Nuclear Cyber Security Programmes

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Glantz, Clifford S.; Landine, Guy P.; Craig, Philip A.

    Pacific Northwest National Laboratory’s (PNNL) nuclear cyber security team has been providing technical support to the U.S. Nuclear Regulatory Commission (NRC) since 2002. This team has provided cyber security technical experties in conducting cyber security inspections, developing of regulatory rules and guidance, reviewing facility cyber security plans, developing inspection guidance, and developing and teaching NRC inspectors how to conduct cyber security assessments. The extensive experience the PNNL team has gathered has allowed them to compile a lenghty list of recommendations on how to improve cyber security programs and conduct assessments. A selected set of recommendations are presented, including the needmore » to: integrate an array of defenisve strategies into a facility’s cyber security program, coordinate physical and cyber security activities, train phycial security forces to resist a cyber-enabled physical attack, improve estimates of the consequences of a cyber attack, properly resource cyber security assessments, appropropriately account for insider threats, routinely monitor security devices for potential attacks, supplement compliance-based requirements with risk-based decision making, and introduce the concept of resilience into cyber security programs.« less

  15. The Rice Transcription Factor WRKY53 Suppresses Herbivore-Induced Defenses by Acting as a Negative Feedback Modulator of Mitogen-Activated Protein Kinase Activity1

    PubMed Central

    Hu, Lingfei; Ye, Meng; Zhang, Tongfang; Zhou, Guoxin; Wang, Qi; Lu, Jing

    2015-01-01

    The mechanisms by which herbivore-attacked plants activate their defenses are well studied. By contrast, little is known about the regulatory mechanisms that allow them to control their defensive investment and avoid a defensive overshoot. We characterized a rice (Oryza sativa) WRKY gene, OsWRKY53, whose expression is rapidly induced upon wounding and induced in a delayed fashion upon attack by the striped stem borer (SSB) Chilo suppressalis. The transcript levels of OsWRKY53 are independent of endogenous jasmonic acid but positively regulated by the mitogen-activated protein kinases OsMPK3/OsMPK6. OsWRKY53 physically interacts with OsMPK3/OsMPK6 and suppresses their activity in vitro. By consequence, it modulates the expression of defensive, MPK-regulated WRKYs and thereby reduces jasmonic acid, jasmonoyl-isoleucine, and ethylene induction. This phytohormonal reconfiguration is associated with a reduction in trypsin protease inhibitor activity and improved SSB performance. OsWRKY53 is also shown to be a negative regulator of plant growth. Taken together, these results show that OsWRKY53 functions as a negative feedback modulator of MPK3/MPK6 and thereby acts as an early suppressor of induced defenses. OsWRKY53 therefore enables rice plants to control the magnitude of their defensive investment during early signaling. PMID:26453434

  16. Induction of tolerance towards TNP entails down-regulation of an autoimmune attack.

    PubMed Central

    Zöller, M; Andrighetto, G

    1988-01-01

    In order to follow the process of induction and maintainance of tolerance, BALB/c mice were tolerized by free hapten, and effector and regulatory cell interactions were analysed by limiting-dilution (LD) cultures. Injection of trinitrobenzenesulphonic acid (TNBS) resulted, predominantly, in the activation and expansion of self-reactive cytotoxic T cells (CTL), which were observed transiently at frequencies comparable to allo-specific CTL. In addition, self-reactive helper T cells (Th) were activated and expanded in tolerized mice. TNP-specific reactivity was difficult to evaluate, since cytotoxic activity against haptenized self followed the pattern of self-reactivity throughout the test period. But in LD cultures determining proliferation, two populations of Th responding to TNP-self were observed, while only one Th population could be detected in response to self. Expansion/activation of Th and CTL precursors (CTLp) was followed by activation of suppressor T cells (Ts). The suppressor population could be divided into two subpopulations, one interfering with Th, the second interacting directly with CTL (veto cells). The results indicate that during the induction of tolerance, animals pass through an autoimmune attack, with expansion and activation of self-reactive clones (CTL, Th). The final status of non-responsiveness towards TNP is not due to the deletion of effector or regulatory cells, but results from the establishment of a steady state of dominance of self-reactive and TNP-self-reactive suppression. PMID:2965095

  17. Categorizing experience-based foraging plasticity in mites: age dependency, primacy effects and memory persistence

    PubMed Central

    Davaasambuu, Undarmaa; Saussure, Stéphanie; Christiansen, Inga C.

    2018-01-01

    Behavioural plasticity can be categorized into activational (also termed contextual) and developmental plasticity. Activational plasticity allows immediate contextual behavioural changes, whereas developmental plasticity is characterized by time-lagged changes based on memory of previous experiences (learning). Behavioural plasticity tends to decline with age but whether this holds true for both plasticity categories and the effects of first-in-life experiences is poorly understood. We tackled this issue by assessing the foraging plasticity of plant-inhabiting predatory mites, Amblyseius swirskii, on thrips and spider mites following age-dependent prey experience, i.e. after hatching or after reaching maturity. Juvenile and young adult predator females were alternately presented thrips and spider mites, for establishing 1st and 2nd prey-in-life experiences, and tested, as gravid females, for their foraging plasticity when offered both prey species. Prey experience by juvenile predators resulted in clear learning effects, which were evident in likelier and earlier attacks on familiar prey, and higher proportional inclusion of familiar prey in total diet. First prey-in-life experience by juvenile but not adult predators resulted in primacy effects regarding attack latency. Prey experience by adult predators resulted mainly in prey-unspecific physiological changes, with easy-to-grasp spider mites providing higher net energy gains than difficult-to-grasp thrips. Prey experience by juvenile, but not adult, predators was adaptive, which was evident in a negative correlation between attack latencies and egg production. Overall, our study provides key evidence that similar experiences by juvenile and adult predators, including first-in-life experiences, may be associated with different types of behavioural plasticity, i.e. developmental and activational plasticity. PMID:29765663

  18. Categorizing experience-based foraging plasticity in mites: age dependency, primacy effects and memory persistence.

    PubMed

    Schausberger, Peter; Davaasambuu, Undarmaa; Saussure, Stéphanie; Christiansen, Inga C

    2018-04-01

    Behavioural plasticity can be categorized into activational (also termed contextual) and developmental plasticity. Activational plasticity allows immediate contextual behavioural changes, whereas developmental plasticity is characterized by time-lagged changes based on memory of previous experiences (learning). Behavioural plasticity tends to decline with age but whether this holds true for both plasticity categories and the effects of first-in-life experiences is poorly understood. We tackled this issue by assessing the foraging plasticity of plant-inhabiting predatory mites, Amblyseius swirskii , on thrips and spider mites following age-dependent prey experience, i.e. after hatching or after reaching maturity. Juvenile and young adult predator females were alternately presented thrips and spider mites, for establishing 1st and 2nd prey-in-life experiences, and tested, as gravid females, for their foraging plasticity when offered both prey species. Prey experience by juvenile predators resulted in clear learning effects, which were evident in likelier and earlier attacks on familiar prey, and higher proportional inclusion of familiar prey in total diet. First prey-in-life experience by juvenile but not adult predators resulted in primacy effects regarding attack latency. Prey experience by adult predators resulted mainly in prey-unspecific physiological changes, with easy-to-grasp spider mites providing higher net energy gains than difficult-to-grasp thrips. Prey experience by juvenile, but not adult, predators was adaptive, which was evident in a negative correlation between attack latencies and egg production. Overall, our study provides key evidence that similar experiences by juvenile and adult predators, including first-in-life experiences, may be associated with different types of behavioural plasticity, i.e. developmental and activational plasticity.

  19. Detecting Distributed SQL Injection Attacks in a Eucalyptus Cloud Environment

    NASA Technical Reports Server (NTRS)

    Kebert, Alan; Barnejee, Bikramjit; Solano, Juan; Solano, Wanda

    2013-01-01

    The cloud computing environment offers malicious users the ability to spawn multiple instances of cloud nodes that are similar to virtual machines, except that they can have separate external IP addresses. In this paper we demonstrate how this ability can be exploited by an attacker to distribute his/her attack, in particular SQL injection attacks, in such a way that an intrusion detection system (IDS) could fail to identify this attack. To demonstrate this, we set up a small private cloud, established a vulnerable website in one instance, and placed an IDS within the cloud to monitor the network traffic. We found that an attacker could quite easily defeat the IDS by periodically altering its IP address. To detect such an attacker, we propose to use multi-agent plan recognition, where the multiple source IPs are considered as different agents who are mounting a collaborative attack. We show that such a formulation of this problem yields a more sophisticated approach to detecting SQL injection attacks within a cloud computing environment.

  20. Sensitivity to carbon dioxide in subjects with a single lifetime panic attack: possible clinical "bedside" predictive test for panic disorder after a first attack.

    PubMed

    Berzak, Elina; Reznik, Mila; Narsia, Oxana; Benjamin, Jonathan

    2004-01-01

    There is currently no way of knowing whether a patient who has recently had a single panic attack has incipient panic disorder. Sensitivity to carbon dioxide (CO2) is lower in healthy volunteers than in panic disorder patients. If this is also true of people who experience a single lifetime panic attack, it could be used as a prognostic test. Subjects with a single lifetime panic attack and subjects with panic disorder received an inhalation of 35% CO2. Subjects completed the panic symptoms scale (PSS), and also stated whether they considered that they had experienced an attack. None of 14 subjects with a single lifetime panic attack, compared to 7 of 17 subjects with panic disorder (P=.009), had an attack. The PSS also distinguished between the groups. The 35% CO2 challenge warrants further investigation as a predictive test after a first panic attack.

  1. Exploiting Small Leakages in Masks to Turn a Second-Order Attack into a First-Order Attack and Improved Rotating Substitution Box Masking with Linear Code Cosets.

    PubMed

    DeTrano, Alexander; Karimi, Naghmeh; Karri, Ramesh; Guo, Xiaofei; Carlet, Claude; Guilley, Sylvain

    2015-01-01

    Masking countermeasures, used to thwart side-channel attacks, have been shown to be vulnerable to mask-extraction attacks. State-of-the-art mask-extraction attacks on the Advanced Encryption Standard (AES) algorithm target S-Box recomputation schemes but have not been applied to scenarios where S-Boxes are precomputed offline. We propose an attack targeting precomputed S-Boxes stored in nonvolatile memory. Our attack targets AES implemented in software protected by a low entropy masking scheme and recovers the masks with 91% success rate. Recovering the secret key requires fewer power traces (in fact, by at least two orders of magnitude) compared to a classical second-order attack. Moreover, we show that this attack remains viable in a noisy environment or with a reduced number of leakage points. Eventually, we specify a method to enhance the countermeasure by selecting a suitable coset of the masks set.

  2. The effect of nursing professional pay structures and pay levels on hospitals' heart attack outcomes.

    PubMed

    Brown, Mark P

    2006-01-01

    The effect of nursing professionals (i.e., nurse aid/orderly, licensed practical nurse, registered nurse) pay structures and pay levels on hospitals risk-adjusted heart attack outcomes was determined. Operationalizing hospitals' heart attack outcomes as their thirty-day risk-adjusted mortality rates, a positive curvilinear relation is hypothesized between pay dispersion and hospitals' heart attack outcomes, whereas a direct relation is hypothesized between pay level and hospitals' heart attack outcomes. Pay level is also hypothesized as a moderator of the relation between pay dispersion and hospitals' heart attack outcomes. Using a sample of 138 California hospitals, support is not found for either the curvilinear relation between hospitals' nursing professionals pay dispersion and hospitals' heart attack outcomes, or the direct relation between nursing professionals' pay level and hospitals' heart attack outcomes. Support is found for the moderation hypothesis in which nursing professionals' pay level moderates the relation between hospitals' nursing professionals pay dispersion and hospitals' heart attack outcomes. Implications for practice are discussed in light of the study's results.

  3. Exploiting Small Leakages in Masks to Turn a Second-Order Attack into a First-Order Attack and Improved Rotating Substitution Box Masking with Linear Code Cosets

    PubMed Central

    DeTrano, Alexander; Karimi, Naghmeh; Karri, Ramesh; Guo, Xiaofei; Carlet, Claude; Guilley, Sylvain

    2015-01-01

    Masking countermeasures, used to thwart side-channel attacks, have been shown to be vulnerable to mask-extraction attacks. State-of-the-art mask-extraction attacks on the Advanced Encryption Standard (AES) algorithm target S-Box recomputation schemes but have not been applied to scenarios where S-Boxes are precomputed offline. We propose an attack targeting precomputed S-Boxes stored in nonvolatile memory. Our attack targets AES implemented in software protected by a low entropy masking scheme and recovers the masks with 91% success rate. Recovering the secret key requires fewer power traces (in fact, by at least two orders of magnitude) compared to a classical second-order attack. Moreover, we show that this attack remains viable in a noisy environment or with a reduced number of leakage points. Eventually, we specify a method to enhance the countermeasure by selecting a suitable coset of the masks set. PMID:26491717

  4. The Icatibant Outcome Survey: treatment of laryngeal angioedema attacks

    PubMed Central

    Aberer, Werner; Bouillet, Laurence; Caballero, Teresa; Maurer, Marcus; Fabien, Vincent; Zanichelli, Andrea

    2016-01-01

    Objective To characterize the management and outcomes of life-threatening laryngeal attacks of hereditary angioedema (HAE) treated with icatibant in the observational Icatibant Outcome Survey (NCT01034969) registry. Methods This retrospective analysis was based on data from patients with HAE type I/II who received healthcare professional-administered or self-administered icatibant to treat laryngeal attacks between September 2008 and May 2013. Results Twenty centers in seven countries contributed data. Overall, 42 patients with HAE experienced 67 icatibant-treated laryngeal attacks. Icatibant was self-administered for 62.3% of attacks (healthcare professional-administered, 37.7%). One icatibant injection was used for 87.9% of attacks, with rescue or concomitant medication used for 9.0%. The median time to treatment was 2.0 h (n=31 attacks) and the median time to resolution was 6.0 h (n=35 attacks). Conclusions This analysis describes successful use of icatibant for the treatment of laryngeal HAE attacks in a real-world setting. PMID:27116379

  5. The 2005 London terror attacks: An investigation of changes in psychological wellbeing and social capital pre- and post-attacks (2003-07)-A UK panel study.

    PubMed

    Giordano, Giuseppe N; Lindström, Martin

    2016-12-01

    The London public transport suicide bombings, which occurred on 7th July 2005, were described as the worst single terrorist atrocity on British soil to date. Past acts of terrorism have been associated with deterioration in population mental health. They may also negatively impact levels of social capital, which is considered a buffer against poor mental health outcomes. By employing panel data from the British Household Panel Survey and following the same individuals (N T =9287) three times over a five-year period (2003, 2005 and 2007), the aim of this longitudinal multilevel study was to investigate: (i) the impact of terrorism on individual-level social capital (generalised trust and social participation) across the UK; and (ii) the buffering effects of social capital on psychological wellbeing (GHQ-12). By comparing 2005 and 2007 covariate values (including the two social capital proxies) against their pre-terror baseline (2003) measurements in two separate multilevel logistic regression models, we examined the immediate and longer-term effects of the 2005 attacks on our GHQ-12 outcome. Compared to baseline, generalised trust dropped from 44% to 36% immediately post-terror attacks in 2005, while local participation increased from 45.8% to 47.5%. Social capital levels started to return to baseline levels by 2007, yet both proxies maintained independent buffering effects against poor GHQ-12 scores in years 2005 and 2007. From this empirical evidence, it seems that though generalised trust levels are negatively affected by acts of terrorism, the accompanying increase in local active participation may aid in the re-establishment of societal norms and beliefs in later years. Decision makers should be aware that such atrocities may negatively impact on populations' generalised trust in the shorter-term. To safeguard against losing this buffer against poor mental health outcomes, local active participation should be encouraged.

  6. Airborne contaminants during controlled residential fires.

    PubMed

    Fent, Kenneth W; Evans, Douglas E; Babik, Kelsey; Striley, Cynthia; Bertke, Stephen; Kerber, Steve; Smith, Denise; Horn, Gavin P

    2018-05-01

    In this study, we characterize the area and personal air concentrations of combustion byproducts produced during controlled residential fires with furnishings common in 21 st century single family structures. Area air measurements were collected from the structure during active fire and overhaul (post suppression) and on the fireground where personnel were operating without any respiratory protection. Personal air measurements were collected from firefighters assigned to fire attack, victim search, overhaul, outside ventilation, and command/pump operator positions. Two different fire attack tactics were conducted for the fires (6 interior and 6 transitional) and exposures were compared between the tactics. For each of the 12 fires, firefighters were paired up to conduct each job assignment, except for overhaul that was conducted by 4 firefighters. Sampled compounds included polycyclic aromatic hydrocarbons (PAHs), volatile organic compounds (VOCs, e.g., benzene), hydrogen cyanide (HCN), and particulate (area air sampling only). Median personal air concentrations for the attack and search firefighters were generally well above applicable short-term occupational exposure limits, with the exception of HCN measured from search firefighters. Area air concentrations of all measured compounds decreased after suppression. Personal air concentrations of total PAHs and benzene measured from some overhaul firefighters exceeded exposure limits. Median personal air concentrations of HCN (16,300 ppb) exceeded the exposure limit for outside vent firefighters, with maximum levels (72,900 ppb) higher than the immediately dangerous to life and health (IDLH) level. Median air concentrations on the fireground (including particle count) were above background levels and highest when collected downwind of the structure and when ground-level smoke was the heaviest. No statistically significant differences in personal air concentrations were found between the 2 attack tactics. The results underscore the importance of wearing self-contained breathing apparatus when conducting overhaul or outside ventilation activities. Firefighters should also try to establish command upwind of the structure fire, and if this cannot be done, respiratory protection should be considered.

  7. [Chemical and biological terrorism: psychological aspects, and guidelines for psychiatric preparedness].

    PubMed

    Bleich, Avi; Kutz, Ilan

    2002-05-01

    Chemical or biological terror may cause mass casualties, but the major damage of such a threat is related mainly to psychological terror. Anxiety and panic that accompany chemical or biological threat, may affect mass populations, disrupt their lives, and enormously increase the demands from the medical systems. In the case of real attack, such an increased demands may be critical, especially to the functional ability of hospitals. The Israeli experience, during the Persian Gulf war, concerning preparations to chemical attacks at the national level, was unique in its nature. In addition, the Scud missiles attacks, accompanied with non-conventional threat, supplied valuable information on the populations behavior, and on the needed preparations for similar threats. In the case of chemical or biological threat or attack, the main task of the psychiatrist is to treat stress and anxiety casualties. At the same time, he should be aware of the possibility that the psychological & behavioral symptoms may reflect organic brain damage due to the pathogenic agent, and that such a differential diagnosis may be life saving for the patient. Stress casualties will be referred from the ER, and treated by the mental health team, at a specifically designed "center for stress casualties". In addition, the psychiatrist will consult the medical teams, or sometimes directly intervene, with combined casualties, at other locations of the hospital. At the regional or community level, one should plane and exercise deployment and activation of multi-professional teams, including mental health, in existing installations designed for screening, treatment, and temporary containment of casualties. It is recommended that the head of the local authority, will be responsible for the preparations and activation of this formation. A planned and rational usage of the media may have a critical influence on the ability of the authorities to manage the crisis situation and on shaping the behavior of the population. In certain scenarios, the media may even serve as the main tool for calming and instructing the people being isolated at their homes.

  8. Heart Attack

    MedlinePlus

    Each year almost 800,000 Americans have a heart attack. A heart attack happens when blood flow to the heart suddenly ... it's important to know the symptoms of a heart attack and call 9-1-1 if you or ...

  9. Microvascular Angina

    MedlinePlus

    ... to the Terms and Conditions and Privacy Policy Heart Attack Tools & Resources My Cardiac Coach What Is a ... Heart Attack Warning Signs: Patient sheet | Infographic | Quiz Heart Attack • Home • About Heart Attacks Acute Coronary Syndrome (ACS) ...

  10. Incidence and impact of dog attacks on guide dogs in the UK.

    PubMed

    Brooks, A; Moxon, R; England, G C W

    2010-06-19

    In a retrospective survey, researchers identified 100 incidents of attacks on guide dogs by other dogs. These were reviewed in order to determine the number, severity and impact on the handler and dog, and the characteristics of the aggressors and victims. During the study period there were more than three attacks reported each month, with 61 per cent of the attacks being upon dogs that were in harness and working with an owner or trainer. The majority of the dogs that were attacked were male (62 per cent), and the breeds that were over-represented (relative to their prevalence in the general guide dog population) were the labrador and the golden retriever x flat-coated retriever crossbreed. Most of the attacks occurred in public places between 09.00 and 15.00 and the majority (61 per cent) of the attacking dogs were off the lead at the time of the attack. Thirty-eight per cent of the attacking dogs were of bull breeds, which were over-represented among attackers compared with the proportion of this breed type in the general dog population. Veterinary attention was sought after 41 per cent of the attacks, and in 19 per cent of instances there was injury to the handler or to a member of the public. The attacks were reported to have affected the working performance and behaviour of the victim dog in 45 per cent of the instances, and two dogs had to be subsequently withdrawn from working as guide dogs.

  11. Robustness and structure of complex networks

    NASA Astrophysics Data System (ADS)

    Shao, Shuai

    This dissertation covers the two major parts of my PhD research on statistical physics and complex networks: i) modeling a new type of attack -- localized attack, and investigating robustness of complex networks under this type of attack; ii) discovering the clustering structure in complex networks and its influence on the robustness of coupled networks. Complex networks appear in every aspect of our daily life and are widely studied in Physics, Mathematics, Biology, and Computer Science. One important property of complex networks is their robustness under attacks, which depends crucially on the nature of attacks and the structure of the networks themselves. Previous studies have focused on two types of attack: random attack and targeted attack, which, however, are insufficient to describe many real-world damages. Here we propose a new type of attack -- localized attack, and study the robustness of complex networks under this type of attack, both analytically and via simulation. On the other hand, we also study the clustering structure in the network, and its influence on the robustness of a complex network system. In the first part, we propose a theoretical framework to study the robustness of complex networks under localized attack based on percolation theory and generating function method. We investigate the percolation properties, including the critical threshold of the phase transition pc and the size of the giant component Pinfinity. We compare localized attack with random attack and find that while random regular (RR) networks are more robust against localized attack, Erdoḧs-Renyi (ER) networks are equally robust under both types of attacks. As for scale-free (SF) networks, their robustness depends crucially on the degree exponent lambda. The simulation results show perfect agreement with theoretical predictions. We also test our model on two real-world networks: a peer-to-peer computer network and an airline network, and find that the real-world networks are much more vulnerable to localized attack compared with random attack. In the second part, we extend the tree-like generating function method to incorporating clustering structure in complex networks. We study the robustness of a complex network system, especially a network of networks (NON) with clustering structure in each network. We find that the system becomes less robust as we increase the clustering coefficient of each network. For a partially dependent network system, we also find that the influence of the clustering coefficient on network robustness decreases as we decrease the coupling strength, and the critical coupling strength qc, at which the first-order phase transition changes to second-order, increases as we increase the clustering coefficient.

  12. Phenomenology of panic attacks: a descriptive study of panic disorder patients' self-reports.

    PubMed

    Aronson, T A; Logue, C M

    1988-01-01

    The phenomenology of panic disorder and panic attacks was systematically assessed in 46 consecutive patients. The results suggest that DSM-III criteria include several symptoms that are not frequently present during a panic attack and that DSM-III's characterization of a panic attack is imprecise and misleading. Panic attacks were found to vary in intensity, frequency, spontaneity, and associated symptoms. A panic attack typically presents as a unified symptom complex of psychic anxiety and multiple somatic symptoms in multiple body systems. It occurs in a crescendolike pattern, is self-limited, and often leaves the subject weak or shaken. The temporal course as much as the symptomatic presentation defines a panic attack.

  13. Finite Energy and Bounded Attacks on Control System Sensor Signals

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Djouadi, Seddik M; Melin, Alexander M; Ferragut, Erik M

    Control system networks are increasingly being connected to enterprise level networks. These connections leave critical industrial controls systems vulnerable to cyber-attacks. Most of the effort in protecting these cyber-physical systems (CPS) has been in securing the networks using information security techniques and protection and reliability concerns at the control system level against random hardware and software failures. However, besides these failures the inability of information security techniques to protect against all intrusions means that the control system must be resilient to various signal attacks for which new analysis and detection methods need to be developed. In this paper, sensor signalmore » attacks are analyzed for observer-based controlled systems. The threat surface for sensor signal attacks is subdivided into denial of service, finite energy, and bounded attacks. In particular, the error signals between states of attack free systems and systems subject to these attacks are quantified. Optimal sensor and actuator signal attacks for the finite and infinite horizon linear quadratic (LQ) control in terms of maximizing the corresponding cost functions are computed. The closed-loop system under optimal signal attacks are provided. Illustrative numerical examples are provided together with an application to a power network with distributed LQ controllers.« less

  14. Multi-Layer Approach for the Detection of Selective Forwarding Attacks

    PubMed Central

    Alajmi, Naser; Elleithy, Khaled

    2015-01-01

    Security breaches are a major threat in wireless sensor networks (WSNs). WSNs are increasingly used due to their broad range of important applications in both military and civilian domains. WSNs are prone to several types of security attacks. Sensor nodes have limited capacities and are often deployed in dangerous locations; therefore, they are vulnerable to different types of attacks, including wormhole, sinkhole, and selective forwarding attacks. Security attacks are classified as data traffic and routing attacks. These security attacks could affect the most significant applications of WSNs, namely, military surveillance, traffic monitoring, and healthcare. Therefore, there are different approaches to detecting security attacks on the network layer in WSNs. Reliability, energy efficiency, and scalability are strong constraints on sensor nodes that affect the security of WSNs. Because sensor nodes have limited capabilities in most of these areas, selective forwarding attacks cannot be easily detected in networks. In this paper, we propose an approach to selective forwarding detection (SFD). The approach has three layers: MAC pool IDs, rule-based processing, and anomaly detection. It maintains the safety of data transmission between a source node and base station while detecting selective forwarding attacks. Furthermore, the approach is reliable, energy efficient, and scalable. PMID:26610499

  15. Cougar attacks on children: injury patterns and treatment.

    PubMed

    Kadesky, K M; Manarey, C; Blair, G K; Murphy, J J; Verchere, C; Atkinson, K

    1998-06-01

    Cougar attacks on humans appear to be on the rise. A review of all attacks on children was performed to determine the method of attack and injury patterns so that a treatment regimen as well as possible preventative measures could be determined. A review of all attacks, including attacks on children, was performed, including three recent attacks treated at our institution. Situation, adult supervision, patient age, injuries recorded, survival, and mode of attack, if known, were reviewed. There were 50 documented attacks on children with a 25% fatality rate. Most children were not alone at the time of the attack (92%), and in many instances adult supervision was present or nearby. Severe head and neck lacerations along with puncture wounds were the most common injury. Examples of typical cervical injuries include a nonfatal vertebral artery injury, phrenic nerve injury, a fatal internal carotid artery injury, and a fatal cervical spine injury. The cougar was rabid in two cases. Pasteurella resulted in late infections in two patients. Based on the pattern of injuries, the authors recommend aggressive evaluation for occult cervical injuries as well as surgical debridement. Antibiotics should cover oropharyngeal flora including Pasteurella multocida. Rabies prophylaxis is indicated. Adult supervision in wilderness areas is not necessarily protective.

  16. Multi-Layer Approach for the Detection of Selective Forwarding Attacks.

    PubMed

    Alajmi, Naser; Elleithy, Khaled

    2015-11-19

    Security breaches are a major threat in wireless sensor networks (WSNs). WSNs are increasingly used due to their broad range of important applications in both military and civilian domains. WSNs are prone to several types of security attacks. Sensor nodes have limited capacities and are often deployed in dangerous locations; therefore, they are vulnerable to different types of attacks, including wormhole, sinkhole, and selective forwarding attacks. Security attacks are classified as data traffic and routing attacks. These security attacks could affect the most significant applications of WSNs, namely, military surveillance, traffic monitoring, and healthcare. Therefore, there are different approaches to detecting security attacks on the network layer in WSNs. Reliability, energy efficiency, and scalability are strong constraints on sensor nodes that affect the security of WSNs. Because sensor nodes have limited capabilities in most of these areas, selective forwarding attacks cannot be easily detected in networks. In this paper, we propose an approach to selective forwarding detection (SFD). The approach has three layers: MAC pool IDs, rule-based processing, and anomaly detection. It maintains the safety of data transmission between a source node and base station while detecting selective forwarding attacks. Furthermore, the approach is reliable, energy efficient, and scalable.

  17. Incidence and impact of dog attacks on guide dogs in the UK: an update.

    PubMed

    Moxon, R; Whiteside, H; England, G C W

    2016-04-09

    Data on dog attacks on Guide Dogs' stock were reviewed to investigate the characteristics of the attacks. An average of 11.2 attacks occurred each month. Nearly all of the attacks occurred in public areas, 68.4 per cent of victim dogs were qualified guide dogs and 55.5 per cent of victim dogs were working in harness when they were attacked. Guide Dogs' stock were injured in 43.2 per cent of attacks and veterinary costs for attacks were estimated at £34,514.30. Over 40 per cent of qualified guide dogs' working ability was affected and >20 per cent of qualified guide dogs required some time off from working after a dog attack. Twenty dogs were permanently withdrawn from the Guide Dogs' programme as a result of dog attacks, 13 of which were qualified and working with guide dog owners at the time of the withdrawal; this resulted in a financial cost of >£600,000 to the charity. More importantly perhaps, temporary and permanent withdrawals have a significant impact upon the mobility and independence of guide dog owners and in many cases significantly impacted their emotional well-being. British Veterinary Association.

  18. Childhood internalizing and externalizing problems predict the onset of clinical panic attacks over adolescence: the TRAILS study.

    PubMed

    Mathyssek, Christina M; Olino, Thomas M; Verhulst, Frank C; van Oort, Floor V A

    2012-01-01

    Panic attacks are a source of individual suffering and are an independent risk factor for later psychopathology. However, much less is known about risk factors for the development of panic attacks, particularly during adolescence when the incidence of panic attacks increases dramatically. We examined whether internalizing and externalizing problems in childhood predict the onset of panic attacks in adolescence. This study is part of the TRacking Adolescents' Individual Lives Survey (TRAILS), a Dutch longitudinal population cohort study (N = 1,584). Internalizing and Externalizing Problems were collected using the Youth Self-Report (YSR) and the parent-report Child Behavior Checklist (CBCL) at baseline (age 10-12). At age 18-20, DSM-IV defined panic attacks since baseline were assessed with the Composite International Diagnostic Interview (CIDI). We investigated whether early adolescent Internalizing and Externalizing Problems predicted panic attacks between ages 10-20 years, using survival analysis in univariate and multivariate models. There were N = 314 (19.8%) cases who experienced at least one DSM-IV defined panic attack during adolescence and N = 18 (1.2%) who developed panic disorder during adolescence. In univariate analyses, CBCL Total Problems, Internalizing Problems and three of the eight syndrome scales predicted panic attack onset, while on the YSR all broad-band problem scales and each narrow-band syndrome scale predicted panic attack onset. In multivariate analyses, CBCL Social Problems (HR 1.19, p<.05), and YSR Thought Problems (HR 1.15, p<.05) and Social Problems (HR 1.26, p<.01) predicted panic attack onset. Risk indicators of panic attack include the wide range of internalizing and externalizing problems. Yet, when adjusted for co-occurring problem behaviors, Social Problems were the most consistent risk factor for panic attack onsets in adolescence.

  19. Unstable Angina

    MedlinePlus

    ... Women This content was last reviewed July 2015. Heart Attack • Home • About Heart Attacks Acute Coronary Syndrome (ACS) ... Recovery FAQs • Heart Attack Tools & Resources • Support Network Heart Attack Tools & Resources My Cardiac Coach What Is a ...

  20. Acute Coronary Syndrome

    MedlinePlus

    ... angina? This content was last reviewed July 2015. Heart Attack • Home • About Heart Attacks Acute Coronary Syndrome (ACS) ... Recovery FAQs • Heart Attack Tools & Resources • Support Network Heart Attack Tools & Resources My Cardiac Coach What Is a ...

  1. [Developing touch through rugby].

    PubMed

    Becas, Didier; Luksenberg, Marion; Denis, Sandrine

    2013-01-01

    Rugby subjects the body to a tough test. Attack, defence, contact, touching are all elements which form part of this physical activity. It is very structured and safe from a psychological perspective. Taking pleasure in the game, with its rules, helps patients to develop interpersonal and relationship skills.

  2. Phytohormone-based activity mapping of insect herbivore-produced elicitors

    USDA-ARS?s Scientific Manuscript database

    In response to insect attack many plants exhibit dynamic biochemical changes resulting in the induced production of direct and indirect defenses. Elicitors present in herbivore oral secretions are believed to positively regulate many inducible plant defenses; however, little is known about the speci...

  3. O–O bond formation in ruthenium-catalyzed water oxidation: single-site nucleophilic attack vs. O–O radical coupling

    DOE PAGES

    Shaffer, David W.; Xie, Yan; Concepcion, Javier J.

    2017-09-01

    In this review we discuss at the mechanistic level the different steps involved in water oxidation catalysis with ruthenium-based molecular catalysts. We have chosen to focus on ruthenium-based catalysts to provide a more coherent discussion and because of the availability of detailed mechanistic studies for these systems but many of the aspects presented in this review are applicable to other systems as well. The water oxidation cycle has been divided in four major steps: water oxidative activation, O–O bond formation, oxidative activation of peroxide intermediates, and O 2 evolution. A significant portion of the review is dedicated to the O–Omore » bond formation step as the key step in water oxidation catalysis. As a result, the two main pathways to accomplish this step, single-site water nucleophilic attack and O–O radical coupling, are discussed in detail and compared in terms of their potential use in photoelectrochemical cells for solar fuels generation.« less

  4. O–O bond formation in ruthenium-catalyzed water oxidation: single-site nucleophilic attack vs. O–O radical coupling

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Shaffer, David W.; Xie, Yan; Concepcion, Javier J.

    In this review we discuss at the mechanistic level the different steps involved in water oxidation catalysis with ruthenium-based molecular catalysts. We have chosen to focus on ruthenium-based catalysts to provide a more coherent discussion and because of the availability of detailed mechanistic studies for these systems but many of the aspects presented in this review are applicable to other systems as well. The water oxidation cycle has been divided in four major steps: water oxidative activation, O–O bond formation, oxidative activation of peroxide intermediates, and O 2 evolution. A significant portion of the review is dedicated to the O–Omore » bond formation step as the key step in water oxidation catalysis. As a result, the two main pathways to accomplish this step, single-site water nucleophilic attack and O–O radical coupling, are discussed in detail and compared in terms of their potential use in photoelectrochemical cells for solar fuels generation.« less

  5. Host-pathogen interaction in Fusarium oxysporum infections: where do we stand?

    PubMed

    Husaini, Amjad M; Sakina, Aafreen; Cambay, Souliha R

    2018-03-16

    Fusarium oxysporum, a ubiquitous soil-borne pathogen causes devastating vascular wilt in more than 100 plant species and ranks fifth among top ten fungal plant pathogens. It has emerged as a human pathogen too, causing infections in immune-compromised patients. It is, therefore, important to gain insight into the molecular processes involved in the pathogenesis of this trans-kingdom pathogen. A complex network comprising of interconnected and over lapping signal pathways; mitogen-activated protein kinase (MAPK) signaling pathways, Ras proteins, G-protein signaling components and their downstream pathways, components of the velvet (LaeA/VeA/VelB) complex and cAMP pathways, is involved in perceiving the host. This network regulates the expression of various pathogenicity genes. Plants have however evolved an elaborate protection system to combat this attack. They too possess intricate mechanisms at molecular level, which once triggered by pathogen attack transduce signals to activate defense response. This review focuses on understanding and presenting a wholistic picture of the molecular mechanisms of F. oxysporum-host interactions in plant immunity.

  6. Natural history and the formation of the human being: Kant on active forces.

    PubMed

    Waldow, Anik

    2016-08-01

    In his 1785-review of the Ideen zur Philosophie der Geschichte der Menschheit, Kant objects to Herder's conception of nature as being imbued with active forces. This attack is usually evaluated against the background of Kant's critical project and his epistemological concern to caution against the "metaphysical excess" of attributing immanent properties to matter. In this paper I explore a slightly different reading by investigating Kant's pre-critical account of creation and generation. The aim of this is to show that Kant's struggle with the forces of matter has a long history and revolves around one central problem: that of how to distinguish between the non-purposive forces of nature and the intentional powers of the mind. Given this history, the epistemic stricture that Kant's critical project imposes on him no longer appears to be the primary reason for his attack on Herder. It merely aggravates a problem that Kant has been battling with since his earliest writings. Copyright © 2016 Elsevier Ltd. All rights reserved.

  7. O-O bond formation in ruthenium-catalyzed water oxidation: single-site nucleophilic attack vs. O-O radical coupling.

    PubMed

    Shaffer, David W; Xie, Yan; Concepcion, Javier J

    2017-10-16

    In this review we discuss at the mechanistic level the different steps involved in water oxidation catalysis with ruthenium-based molecular catalysts. We have chosen to focus on ruthenium-based catalysts to provide a more coherent discussion and because of the availability of detailed mechanistic studies for these systems but many of the aspects presented in this review are applicable to other systems as well. The water oxidation cycle has been divided in four major steps: water oxidative activation, O-O bond formation, oxidative activation of peroxide intermediates, and O 2 evolution. A significant portion of the review is dedicated to the O-O bond formation step as the key step in water oxidation catalysis. The two main pathways to accomplish this step, single-site water nucleophilic attack and O-O radical coupling, are discussed in detail and compared in terms of their potential use in photoelectrochemical cells for solar fuels generation.

  8. Round-robin differential-phase-shift quantum key distribution with a passive decoy state method

    PubMed Central

    Liu, Li; Guo, Fen-Zhuo; Qin, Su-Juan; Wen, Qiao-Yan

    2017-01-01

    Recently, a new type of protocol named Round-robin differential-phase-shift quantum key distribution (RRDPS QKD) was proposed, where the security can be guaranteed without monitoring conventional signal disturbances. The active decoy state method can be used in this protocol to overcome the imperfections of the source. But, it may lead to side channel attacks and break the security of QKD systems. In this paper, we apply the passive decoy state method to the RRDPS QKD protocol. Not only can the more environment disturbance be tolerated, but in addition it can overcome side channel attacks on the sources. Importantly, we derive a new key generation rate formula for our RRDPS protocol using passive decoy states and enhance the key generation rate. We also compare the performance of our RRDPS QKD to that using the active decoy state method and the original RRDPS QKD without any decoy states. From numerical simulations, the performance improvement of the RRDPS QKD by our new method can be seen. PMID:28198808

  9. Prioritizing plant defence over growth through WRKY regulation facilitates infestation by non-target herbivores.

    PubMed

    Li, Ran; Zhang, Jin; Li, Jiancai; Zhou, Guoxin; Wang, Qi; Bian, Wenbo; Erb, Matthias; Lou, Yonggen

    2015-06-17

    Plants generally respond to herbivore attack by increasing resistance and decreasing growth. This prioritization is achieved through the regulation of phytohormonal signaling networks. However, it remains unknown how this prioritization affects resistance against non-target herbivores. In this study, we identify WRKY70 as a specific herbivore-induced, mitogen-activated protein kinase-regulated rice transcription factor that physically interacts with W-box motives and prioritizes defence over growth by positively regulating jasmonic acid (JA) and negatively regulating gibberellin (GA) biosynthesis upon attack by the chewing herbivore Chilo suppressalis. WRKY70-dependent JA biosynthesis is required for proteinase inhibitor activation and resistance against C. suppressalis. In contrast, WRKY70 induction increases plant susceptibility against the rice brown planthopper Nilaparvata lugens. Experiments with GA-deficient rice lines identify WRKY70-dependent GA signaling as the causal factor in N. lugens susceptibility. Our study shows that prioritizing defence over growth leads to a significant resistance trade-off with important implications for the evolution and agricultural exploitation of plant immunity.

  10. Analysis of characteristics associated with reinjection of icatibant: Results from the icatibant outcome survey.

    PubMed

    Longhurst, Hilary J; Aberer, Werner; Bouillet, Laurence; Caballero, Teresa; Fabien, Vincent; Zanichelli, Andrea; Maurer, Marcus

    2015-01-01

    Phase 3 icatibant trials showed that most hereditary angioedema (HAE) (C1 inhibitor deficiency) acute attacks were treated successfully with one injection of icatibant, a selective bradykinin B2 receptor antagonist. We conducted a post hoc analysis of icatibant reinjection for HAE type I and II attacks in a real-world setting by using data from the Icatibant Outcome Survey, an ongoing observational study that monitors the safety and effectiveness of icatibant treatment. Descriptive retrospective analyses of icatibant reinjection were performed on Icatibant Outcome Survey data (February 2008 to December 2012). New attacks were defined as the onset of new symptoms after full resolution of the previous attack. Potential associations between the patient and attack characteristics and reinjection were explored by using logistic regression analysis. Icatibant was administered for 652 attacks in 170 patients with HAE type I or II. Most attacks (89.1%) were treated with a single icatibant injection. For attacks that required two or three injections, the second injection was given a median of 11.0 hours after the first injection, with 90.4% of second injections administered ≥6 hours after the first injection. Time to resolution and attack duration were significantly longer for two or three injections versus one icatibant injection (p < 0.0001 and p < 0.05, respectively). Multivariate logistic regression analysis identified sex, attack severity, and laryngeal attacks as significantly correlated with reinjection (all p ≤ 0.05). These factors did not remain predictors for reinjection when two outlier patients with distinct patterns of icatibant use were excluded. In this real-world setting, most HAE attacks resolved with one icatibant injection. There was no distinct profile for patients or attacks that required reinjection when outliers with substantially different patterns of use were excluded. Because new attacks were not distinguished from the recurrence of symptoms, reinjection rates may be slightly higher than shown here. Clinical trial identifier: NCT01034969.

  11. Enhanced diffie-hellman algorithm for reliable key exchange

    NASA Astrophysics Data System (ADS)

    Aryan; Kumar, Chaithanya; Vincent, P. M. Durai Raj

    2017-11-01

    The Diffie -Hellman is one of the first public-key procedure and is a certain way of exchanging the cryptographic keys securely. This concept was introduced by Ralph Markel and it is named after Whitfield Diffie and Martin Hellman. Sender and Receiver make a common secret key in Diffie-Hellman algorithm and then they start communicating with each other over the public channel which is known to everyone. A number of internet services are secured by Diffie -Hellman. In Public key cryptosystem, the sender has to trust while receiving the public key of the receiver and vice-versa and this is the challenge of public key cryptosystem. Man-in-the-Middle attack is very much possible on the existing Diffie-Hellman algorithm. In man-in-the-middle attack, the attacker exists in the public channel, the attacker receives the public key of both sender and receiver and sends public keys to sender and receiver which is generated by his own. This is how man-in-the-middle attack is possible on Diffie-Hellman algorithm. Denial of service attack is another attack which is found common on Diffie-Hellman. In this attack, the attacker tries to stop the communication happening between sender and receiver and attacker can do this by deleting messages or by confusing the parties with miscommunication. Some more attacks like Insider attack, Outsider attack, etc are possible on Diffie-Hellman. To reduce the possibility of attacks on Diffie-Hellman algorithm, we have enhanced the Diffie-Hellman algorithm to a next level. In this paper, we are extending the Diffie -Hellman algorithm by using the concept of the Diffie -Hellman algorithm to get a stronger secret key and that secret key is further exchanged between the sender and the receiver so that for each message, a new secret shared key would be generated. The second secret key will be generated by taking primitive root of the first secret key.

  12. The panic attack-posttraumatic stress disorder model: applicability to orthostatic panic among Cambodian refugees.

    PubMed

    Hinton, Devon E; Hofmann, Stefan G; Pitman, Roger K; Pollack, Mark H; Barlow, David H

    2008-01-01

    This article examines the ability of the panic attack-posttraumatic stress disorder (PTSD) model to predict how panic attacks are generated and how panic attacks worsen PTSD. The article does so by determining the validity of the panic attack-PTSD model in respect to one type of panic attack among traumatized Cambodian refugees: orthostatic panic (OP) attacks (i.e. panic attacks generated by moving from lying or sitting to standing). Among Cambodian refugees attending a psychiatric clinic, the authors conducted two studies to explore the validity of the panic attack-PTSD model as applied to OP patients (i.e. patients with at least one episode of OP in the previous month). In Study 1, the panic attack-PTSD model accurately indicated how OP is seemingly generated: among OP patients (N = 58), orthostasis-associated flashbacks and catastrophic cognitions predicted OP severity beyond a measure of anxious-depressive distress (Symptom Checklist-90-R subscales), and OP severity significantly mediated the effect of anxious-depressive distress on Clinician-Administered PTSD Scale severity. In Study 2, as predicted by the panic attack-PTSD model, OP had a mediational role in respect to the effect of treatment on PTSD severity: among Cambodian refugees with PTSD and comorbid OP who participated in a cognitive behavioural therapy study (N = 56), improvement in PTSD severity was partially mediated by improvement in OP severity.

  13. Epileptic negative drop attacks in atypical benign partial epilepsy: a neurophysiological study.

    PubMed

    Hirano, Yoshiko; Oguni, Hirokazu; Osawa, Makiko

    2009-03-01

    We conducted a computer-assisted polygraphic analysis of drop attacks in a child with atypical benign partial epilepsy (ABPE) to investigate neurophysiological characteristics. The patient was a six-year two-month-old girl, who had started to have focal motor seizures, later combined with daily epileptic negative myoclonus (ENM) and drop attacks, causing multiple injuries. We studied episodes of ENM and drop attacks using video-polygraphic and computer-assisted back-averaging analysis. A total of 12 ENM episodes, seven involving the left arm (ENMlt) and five involving both arms (ENMbil), and five drop attacks were captured for analysis. All episodes were time-locked to spike-and-wave complexes (SWC) arising from both centro-temporo-parietal (CTP) areas. The latency between the onset of SWC and ENMlt, ENMbil, and drop attacks reached 68 ms, 42 ms, and 8 ms, respectively. The height of the spike as well as the slow-wave component of SWC for drop attacks were significantly larger than that for both ENMlt and ENMbil (p < 0.05). Drop attacks were considered to be epileptic negative myoclonus involving not only upper proximal but also axial muscles, causing the body to fall. Thus, drop attacks in ABPE are considered to be epileptic negative drop attacks arising from bilateral CTP foci and differ from drop attacks of a generalized origin seen in Lennox-Gastaut syndrome and myoclonic-astatic epilepsy.

  14. Seven Deadliest Network Attacks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Prowell, Stacy J; Borkin, Michael; Kraus, Robert

    2010-05-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you need "Seven Deadliest Network Attacks". This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Denial of Service; War Dialing; Penetration 'Testing'; Protocol Tunneling; Spanning Tree Attacks; Man-in-the-Middle; and, Password Replay. Knowledge is power, findmore » out about the most dominant attacks currently waging war on computers and networks globally. Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how. Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable.« less

  15. Cross-layer design for intrusion detection and data security in wireless ad hoc sensor networks

    NASA Astrophysics Data System (ADS)

    Hortos, William S.

    2007-09-01

    A wireless ad hoc sensor network is a configuration for area surveillance that affords rapid, flexible deployment in arbitrary threat environments. There is no infrastructure support and sensor nodes communicate with each other only when they are in transmission range. The nodes are severely resource-constrained, with limited processing, memory and power capacities and must operate cooperatively to fulfill a common mission in typically unattended modes. In a wireless sensor network (WSN), each sensor at a node can observe locally some underlying physical phenomenon and sends a quantized version of the observation to sink (destination) nodes via wireless links. Since the wireless medium can be easily eavesdropped, links can be compromised by intrusion attacks from nodes that may mount denial-of-service attacks or insert spurious information into routing packets, leading to routing loops, long timeouts, impersonation, and node exhaustion. A cross-layer design based on protocol-layer interactions is proposed for detection and identification of various intrusion attacks on WSN operation. A feature set is formed from selected cross-layer parameters of the WSN protocol to detect and identify security threats due to intrusion attacks. A separate protocol is not constructed from the cross-layer design; instead, security attributes and quantified trust levels at and among nodes established during data exchanges complement customary WSN metrics of energy usage, reliability, route availability, and end-to-end quality-of-service (QoS) provisioning. Statistical pattern recognition algorithms are applied that use observed feature-set patterns observed during network operations, viewed as security audit logs. These algorithms provide the "best" network global performance in the presence of various intrusion attacks. A set of mobile (software) agents distributed at the nodes implement the algorithms, by moving among the layers involved in the network response at each active node and trust neighborhood, collecting parametric information and executing assigned decision tasks. The communications overhead due to security mechanisms and the latency in network response are thus minimized by reducing the need to move large amounts of audit data through resource-limited nodes and by locating detection/identification programs closer to audit data. If network partitioning occurs due to uncoordinated node exhaustion, data compromise or other effects of the attacks, the mobile agents can continue to operate, thereby increasing fault tolerance in the network response to intrusions. Since the mobile agents behave like an ant colony in securing the WSN, published ant colony optimization (ACO) routines and other evolutionary algorithms are adapted to protect network security, using data at and through nodes to create audit records to detect and respond to denial-of-service attacks. Performance evaluations of algorithms are performed by simulation of a few intrusion attacks, such as black hole, flooding, Sybil and others, to validate the ability of the cross-layer algorithms to enable WSNs to survive the attacks. Results are compared for the different algorithms.

  16. An adaptive neural swarm approach for intrusion defense in ad hoc networks

    NASA Astrophysics Data System (ADS)

    Cannady, James

    2011-06-01

    Wireless sensor networks (WSN) and mobile ad hoc networks (MANET) are being increasingly deployed in critical applications due to the flexibility and extensibility of the technology. While these networks possess numerous advantages over traditional wireless systems in dynamic environments they are still vulnerable to many of the same types of host-based and distributed attacks common to those systems. Unfortunately, the limited power and bandwidth available in WSNs and MANETs, combined with the dynamic connectivity that is a defining characteristic of the technology, makes it extremely difficult to utilize traditional intrusion detection techniques. This paper describes an approach to accurately and efficiently detect potentially damaging activity in WSNs and MANETs. It enables the network as a whole to recognize attacks, anomalies, and potential vulnerabilities in a distributive manner that reflects the autonomic processes of biological systems. Each component of the network recognizes activity in its local environment and then contributes to the overall situational awareness of the entire system. The approach utilizes agent-based swarm intelligence to adaptively identify potential data sources on each node and on adjacent nodes throughout the network. The swarm agents then self-organize into modular neural networks that utilize a reinforcement learning algorithm to identify relevant behavior patterns in the data without supervision. Once the modular neural networks have established interconnectivity both locally and with neighboring nodes the analysis of events within the network can be conducted collectively in real-time. The approach has been shown to be extremely effective in identifying distributed network attacks.

  17. Using Machine Learning in Adversarial Environments.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Warren Leon Davis

    Intrusion/anomaly detection systems are among the first lines of cyber defense. Commonly, they either use signatures or machine learning (ML) to identify threats, but fail to account for sophisticated attackers trying to circumvent them. We propose to embed machine learning within a game theoretic framework that performs adversarial modeling, develops methods for optimizing operational response based on ML, and integrates the resulting optimization codebase into the existing ML infrastructure developed by the Hybrid LDRD. Our approach addresses three key shortcomings of ML in adversarial settings: 1) resulting classifiers are typically deterministic and, therefore, easy to reverse engineer; 2) ML approachesmore » only address the prediction problem, but do not prescribe how one should operationalize predictions, nor account for operational costs and constraints; and 3) ML approaches do not model attackers’ response and can be circumvented by sophisticated adversaries. The principal novelty of our approach is to construct an optimization framework that blends ML, operational considerations, and a model predicting attackers reaction, with the goal of computing optimal moving target defense. One important challenge is to construct a realistic model of an adversary that is tractable, yet realistic. We aim to advance the science of attacker modeling by considering game-theoretic methods, and by engaging experimental subjects with red teaming experience in trying to actively circumvent an intrusion detection system, and learning a predictive model of such circumvention activities. In addition, we will generate metrics to test that a particular model of an adversary is consistent with available data.« less

  18. Automatic Inference of Cryptographic Key Length Based on Analysis of Proof Tightness

    DTIC Science & Technology

    2016-06-01

    within an attack tree structure, then expand attack tree methodology to include cryptographic reductions. We then provide the algorithms for...maintaining and automatically reasoning about these expanded attack trees . We provide a software tool that utilizes machine-readable proof and attack metadata...and the attack tree methodology to provide rapid and precise answers regarding security parameters and effective security. This eliminates the need

  19. Cyber Signal/Noise Characteristics and Sensor Models for Early Cyber Indications and Warning

    DTIC Science & Technology

    2005-09-01

    investigating and simulating attack scenarios. The sensors are, in effect , mathematical functions. These functions range from simple functions of...172 8.1.2 Examine each attack scenario or case to derive the cause- effect network for the attack scenario...threat profiles............................ 174 8.1.4 Develop attack profiles by enlarging the cause- effect network of each attack scenario with

  20. Attack Coverage in High-Level Men’s Volleyball: Organization on the Edge of Chaos?

    PubMed Central

    Laporta, Lorenzo; Nikolaidis, Pantelis; Thomas, Luke; Afonso, José

    2015-01-01

    Change is pervasive, but emerging patterns are occasionally detectable through analysis of systemic behaviors. Match analysis uses these patterns in order to reduce the degree of improvisation and to optimize the training process. However, it is possible that certain game phases elude systematic patterning. In this vein, our aim was to analyze the case of attack coverage in men’s volleyball, as we suspected it would elude systematic patterning and has received negligible attention in scientific research. We analyzed the occurrence of attack coverage in 4544 plays of the 2011 Volleyball World League. A Chi-square test with residual adjusted values was applied to explore significant associations between variables. A Monte Carlo correction was applied, as some cells had n<5. Effect sizes were determined using Cramer’s V. Overall, attack coverage occurred in 3.89% of ball possessions, and 23 distinct structures emerged. These structures lacked significant associations with the game complex, setting zone, and effect of attack coverage. Conversely, attack coverage structures showed significant associations with the attack zone and tempo, with very strong effect sizes (V=0.472 and V=0.521, respectively). As certain attack zones are deeply associated with attack tempo, it is apparent that quicker attack plays affect attack coverage structuring, promoting the formation of less complex structures. Ultimately, attack coverage structures seem to depend on momentary constraints, thereby rendering rigid systematization impracticable. Still, we contended that a principle-based approach might be suitable. This invites researchers to rethink how to interpret game regularities. PMID:26557208

Top