Sample records for quality roq attacks

  1. A new plan quality index for nasopharyngeal cancer SIB IMRT.

    PubMed

    Jin, X; Yi, J; Zhou, Y; Yan, H; Han, C; Xie, C

    2014-02-01

    A new plan quality index integrating dosimetric and radiobiological indices was proposed to facilitate the evaluation and comparison of simultaneous integrated boost (SIB) intensity modulated radiotherapy (IMRT) plans for nasopharyngeal cancer (NPC) patients. Ten NPC patients treated by SIB-IMRT were enrolled in the study. Custom software was developed to read dose-volume histogram (DVH) curves from the treatment planning system (TPS). A plan filtering matrix was introduced to filter plans that fail to satisfy treatment protocol. Target plan quality indices and organ at risk (OAR) plan quality indices were calculated for qualified plans. A unique composite plan quality index (CPQI) was proposed based on the relative weight of these indices to evaluate and compare competing plans. Plan ranking results were compared with detailed statistical analysis, radiation oncology quality system (ROQS) scoring results and physician's evaluation results to verify the accuracy of this new plan quality index. The average CPQI values for plans with OAR priority of low, normal, high, and PTV only were 0.22 ± 0.08, 0.49 ± 0.077, 0.71 ± 0.062, and -0.21 ± 0.16, respectively. There were significant differences among these plan quality indices (One-way ANOVA test, p < 0.01). This was consistent with statistical analysis, ROQS results and physician's ranking results in which 90% OAR high plans were selected. Plan filtering matrix was able to speed up the plan evaluation process. The new matrix plan quality index CPQI showed good consistence with physician ranking results. It is a promising index for NPC SIB-IMRT plan evaluation. Copyright © 2013 Associazione Italiana di Fisica Medica. Published by Elsevier Ltd. All rights reserved.

  2. Phlebotomus Fever Viruses in Panama.

    DTIC Science & Technology

    1981-08-01

    were not attempted. Dr. Howard Christensen of GML has recently completed blood meal determinations on four species of Lutzomyia whicb are thought to...t (): - j: - a - 1a r- > O O 00 004 i- H4 H () -4 -4-J rOQ W 4-) OU0 M 17 by Lutzomyia on sloths, rabbits, porcupines, primates and opossums. Blood...feeding upon them by Lutzomyia (to 65% in Lu. trapidoi) indicates that experimental infections of these hosts would also be justified. E. Conclusions

  3. Modeling Growth and Toxin Production of Toxigenic Fungi Signaled in Cheese under Different Temperature and Water Activity Regimes

    PubMed Central

    Camardo Leggieri, Marco; Decontardi, Simone; Bertuzzi, Terenzio; Pietri, Amedeo; Battilani, Paola

    2016-01-01

    The aim of this study was to investigate in vitro and model the effect of temperature (T) and water activity (aw) conditions on growth and toxin production by some toxigenic fungi signaled in cheese. Aspergillus versicolor, Penicillium camemberti, P. citrinum, P. crustosum, P. nalgiovense, P. nordicum, P. roqueforti, P. verrucosum were considered they were grown under different T (0–40 °C) and aw (0.78–0.99) regimes. The highest relative growth occurred around 25 °C; all the fungi were very susceptible to aw and 0.99 was optimal for almost all species (except for A. versicolor, awopt = 0.96). The highest toxin production occurred between 15 and 25 °C and 0.96–0.99 aw. Therefore, during grana cheese ripening, managed between 15 and 22 °C, ochratoxin A (OTA), penitrem A (PA), roquefortine-C (ROQ-C) and mycophenolic acid (MPA) are apparently at the highest production risk. Bete and logistic function described fungal growth under different T and aw regimes well, respectively. Bete function described also STC, PA, ROQ-C and OTA production as well as function of T. These models would be very useful as starting point to develop a mechanistic model to predict fungal growth and toxin production during cheese ripening and to help advising the most proper setting of environmental factors to minimize the contamination risk. PMID:28029129

  4. ONR Tropical Cyclone Motion Research Initiative; First-Year Review, Discussion and Tentative Hypotheses.

    DTIC Science & Technology

    1988-02-01

    Pacific Network should have 3 to 4 levels of flight level observations and dropwindsonde from research aircraft. An outer box roughly 500 km2 should also...Motion Research Initiative: First. Year Review, Discussion and Tentative Hypotheses : ’ so A.t’oR’,S) Russell L. Elsberry *3j 0V R.OQ 2 ’ 3 .) T’E...Abstract 2 1. Introduction 3 2. Discussion Sessions 5 3 . Tentative Hypotheses 18 4. Preliminary field experiment design considerations 27 5

  5. An Evaluation of a Diabetes Self-Management Education (DSME) Intervention Delivered Using Avatar-Based Technology: Certified Diabetes Educators' Ratings and Perceptions.

    PubMed

    Duncan-Carnesciali, Joanne; Wallace, Barbara C; Odlum, Michelle

    2018-06-01

    Purpose The purpose of this study was to evaluate the perceptions that certified diabetes educators (CDEs), of diverse health professions, have of a culturally appropriate e-health intervention that used avatar-based technology. Methods Cross-sectional, survey-based design using quantitative and qualitative paradigms. A logic model framed the study, which centered on the broad and general concepts leading to study outcomes. In total, 198 CDEs participated in the evaluation. Participants were mostly female and represented an age range of 26 to 76 years. The profession representative of the sample was registered nurses. Study setting and data collection occurred at https://www.surveymonkey.com/r/AvatarVideoSurvey-for-Certified_Diabetes_Educators . Study instruments used were the Basic Demographics Survey (BD-13), Educational Material Use and Rating of Quality Scale (EMU-ROQ-9), Marlowe-Crowne Social Desirability Survey (MS-SOC-DES-CDE-13), Quality of Avatar Video Rating Scale (QAVRS-7), Recommend Avatar to Patients Scale (RAVTPS-3), Recommend Avatar Video to Health Professionals Scale (RAVTHP-3), and Avatar Video Applications Scale (AVAPP-1). Statistical analysis used included t tests, Pearson product moment correlations, backward stepwise regression, and content/thematic analysis. Results Age, ethnicity, Arab/Middle Eastern, Asian, and white/European descents were significant predictors of a high-quality rating of the video. Thematic and content analysis of the data revealed an overall positive perception of the video. Conclusions An e-health intervention grounded in evidence-based health behavior theories has potential to increase access to diabetes self-management education as evidenced in the ratings and perceptions of the video by CDEs.

  6. High angle of attack flying qualities criteria for longitudinal rate command systems

    NASA Technical Reports Server (NTRS)

    Wilson, David J.; Citurs, Kevin D.; Davidson, John B.

    1994-01-01

    This study was designed to investigate flying qualities requirements of alternate pitch command systems for fighter aircraft at high angle of attack. Flying qualities design guidelines have already been developed for angle of attack command systems at 30, 45, and 60 degrees angle of attack, so this research fills a similar need for rate command systems. Flying qualities tasks that require post-stall maneuvering were tested during piloted simulations in the McDonnell Douglas Aerospace Manned Air Combat Simulation facility. A generic fighter aircraft model was used to test angle of attack rate and pitch rate command systems for longitudinal gross acquisition and tracking tasks at high angle of attack. A wide range of longitudinal dynamic variations were tested at 30, 45, and 60 degrees angle of attack. Pilot comments, Cooper-Harper ratings, and pilot induced oscillation ratings were taken from five pilots from NASA, USN, CAF, and McDonnell Douglas Aerospace. This data was used to form longitudinal design guidelines for rate command systems at high angle of attack. These criteria provide control law design guidance for fighter aircraft at high angle of attack, low speed flight conditions. Additional time history analyses were conducted using the longitudinal gross acquisition data to look at potential agility measures of merit and correlate agility usage to flying qualities boundaries. This paper presents an overview of this research.

  7. Evaluation of High-Angle-of-Attack Handling Qualities for the X-31A Using Standard Evaluation Maneuvers

    NASA Technical Reports Server (NTRS)

    Stoliker, Patrick C.; Bosworth, John T.

    1996-01-01

    The X-31A aircraft gross-acquisition and fine-tracking handling qualities have been evaluated using standard evaluation maneuvers developed by Wright Laboratory, Wright-Patterson Air Force Base. The emphasis of the testing is in the angle-of-attack range between 30 deg and 70 deg. Longitudinal gross-acquisition handling qualities results show borderline Level 1/Level 2 performance. Lateral gross-acquisition testing results in Level 1/Level 2 ratings below 45 deg angle of attack, degrading into Level 3 as angle of attack increases. The fine-tracking performance in both longitudinal and lateral axes also receives Level 1 ratings near 30 deg angle of attack, with the ratings tending towards Level 3 at angles of attack greater than 50 deg. These ratings do not match the expectations from the extensive close-in combat testing where the X-31A aircraft demonstrated fair to good handling qualities maneuvering for high angles of attack. This paper presents the results of the high-angle-of-attack handling qualities flight testing of the X-31A aircraft. Discussion of the preparation for the maneuvers, the pilot ratings, and selected pilot comments are included. Evaluation of the results is made in conjunction with existing Neal-Smith, bandwidth, Smith-Geddes, and military specifications.

  8. Evaluation of High-Angle-of-Attack Handling Qualities for the X-31A Using Standard Evaluation Maneuvers

    NASA Technical Reports Server (NTRS)

    Stoliker, Patrick C.; Bosworth, John T.

    1997-01-01

    The X-31A aircraft gross-acquisition and fine-tracking handling qualities have been evaluated using standard evaluation maneuvers developed by Wright Laboratory, Wright Patterson Air Force Base. The emphasis of the testing is in the angle-of-attack range between 30 deg. and 70 deg. Longitudinal gross-acquisition handling qualities results show borderline Level l/Level 2 performance. Lateral gross-acquisition testing results in Level l/Level 2 ratings below 45 deg. angle of attack, degrading into Level 3 as angle of attack increases. The fine tracking performance in both longitudinal and lateral axes also receives Level 1 ratings near 30 deg. angle of attack, with the ratings tending towards Level 3 at angles of attack greater than 50 deg. These ratings do not match the expectations from the extensive close-in combat testing where the X-31A aircraft demonstrated fair to good handling qualities maneuvering for high angles of attack. This paper presents the results of the high-angle-of-attack handling qualities flight testing of the X-31A aircraft. Discussion of the preparation for the maneuvers, the pilot ratings, and selected pilot comments are included. Evaluation of the results is made in conjunction with existing Neal Smith, bandwidth, Smith-Geddes, and military specifications.

  9. High-Alpha Handling Qualities Flight Research on the NASA F/A-18 High Alpha Research Vehicle

    NASA Technical Reports Server (NTRS)

    Wichman, Keith D.; Pahle, Joseph W.; Bahm, Catherine; Davidson, John B.; Bacon, Barton J.; Murphy, Patrick C.; Ostroff, Aaron J.; Hoffler, Keith D.

    1996-01-01

    A flight research study of high-angle-of-attack handling qualities has been conducted at the NASA Dryden Flight Research Center using the F/A-18 High Alpha Research Vehicle (HARV). The objectives were to create a high-angle-of-attack handling qualities flight database, develop appropriate research evaluation maneuvers, and evaluate high-angle-of-attack handling qualities guidelines and criteria. Using linear and nonlinear simulations and flight research data, the predictions from each criterion were compared with the pilot ratings and comments. Proposed high-angle-of-attack nonlinear design guidelines and proposed handling qualities criteria and guidelines developed using piloted simulation were considered. Recently formulated time-domain Neal-Smith guidelines were also considered for application to high-angle-of-attack maneuvering. Conventional envelope criteria were evaluated for possible extension to the high-angle-of-attack regime. Additionally, the maneuvers were studied as potential evaluation techniques, including a limited validation of the proposed standard evaluation maneuver set. This paper gives an overview of these research objectives through examples and summarizes result highlights. The maneuver development is described briefly, the criteria evaluation is emphasized with example results given, and a brief discussion of the database form and content is presented.

  10. Generalized watermarking attack based on watermark estimation and perceptual remodulation

    NASA Astrophysics Data System (ADS)

    Voloshynovskiy, Sviatoslav V.; Pereira, Shelby; Herrigel, Alexander; Baumgartner, Nazanin; Pun, Thierry

    2000-05-01

    Digital image watermarking has become a popular technique for authentication and copyright protection. For verifying the security and robustness of watermarking algorithms, specific attacks have to be applied to test them. In contrast to the known Stirmark attack, which degrades the quality of the image while destroying the watermark, this paper presents a new approach which is based on the estimation of a watermark and the exploitation of the properties of Human Visual System (HVS). The new attack satisfies two important requirements. First, image quality after the attack as perceived by the HVS is not worse than the quality of the stego image. Secondly, the attack uses all available prior information about the watermark and cover image statistics to perform the best watermark removal or damage. The proposed attack is based on a stochastic formulation of the watermark removal problem, considering the embedded watermark as additive noise with some probability distribution. The attack scheme consists of two main stages: (1) watermark estimation and partial removal by a filtering based on a Maximum a Posteriori (MAP) approach; (2) watermark alteration and hiding through addition of noise to the filtered image, taking into account the statistics of the embedded watermark and exploiting HVS characteristics. Experiments on a number of real world and computer generated images show the high efficiency of the proposed attack against known academic and commercial methods: the watermark is completely destroyed in all tested images without altering the image quality. The approach can be used against watermark embedding schemes that operate either in coordinate domain, or transform domains like Fourier, DCT or wavelet.

  11. Research on high power intra-channel crosstalk attack in optical networks

    NASA Astrophysics Data System (ADS)

    Ren, Shuai; Zhang, Yinfa; Wang, Jingyu; Zhang, Jumei; Rao, Xuejun; Fang, Yuanyuan

    2017-02-01

    The mechanism of high power intra-channel crosstalk attack is analyzed theoretically and the conclusion that power of attack signal and crosstalk coefficient of optical switch are the main factors for which high power intra-channel have destructive effect on quality of legitimate signals is drawn. Effects of high power intra-channel crosstalk attack on quality of legitimate signals and its capability of attack propagation are investigated quantitatively by building the simulation system in VPI software. The results show that legitimate signals through the first and the second stage optical switch are affected by attack and legitimate signal through the third stage optical switch is almost unaffected by attack when power of original attack signal (OAS) is above 20dB more than that of legitimate signals and crosstalk coefficient of optical switch is -20dB at optical cross connect 1 (OXC1). High power intra-channel crosstalk attack has a certain capability of attack propagation. Attack capability of OAS can be propagated to OXC3 when power of OAS is 27dB more than that of legitimate signals and crosstalk coefficient of optical switch is -20dB. We also find that the secondary attack signal (SAS) does not have capability of attack propagation.

  12. An Overview of Controls and Flying Qualities Technology on the F/A-18 High Alpha Research Vehicle

    NASA Technical Reports Server (NTRS)

    Pahle, Joseph W.; Wichman, Keith D.; Foster, John V.; Bundick, W. Thomas

    1996-01-01

    The NASA F/A-18 High Alpha Research Vehicle (HARV) has been the flight test bed of a focused technology effort to significantly increase maneuvering capability at high angles of attack. Development and flight test of control law design methodologies, handling qualities metrics, performance guidelines, and flight evaluation maneuvers are described. The HARV has been modified to include two research control effectors, thrust vectoring, and actuated forebody strakes in order to provide increased control power at high angles of attack. A research flight control system has been used to provide a flexible, easily modified capability for high-angle-of-attack research controls. Different control law design techniques have been implemented and flight-tested, including eigenstructure assignment, variable gain output feedback, pseudo controls, and model-following. Extensive piloted simulation has been used to develop nonlinear performance guide-lines and handling qualities criteria for high angles of attack. This paper reviews the development and evaluation of technologies useful for high-angle-of-attack control. Design, development, and flight test of the research flight control system, control laws, flying qualities specifications, and flight test maneuvers are described. Flight test results are used to illustrate some of the lessons learned during flight test and handling qualities evaluations.

  13. Practical, Real-Time, and Robust Watermarking on the Spatial Domain for High-Definition Video Contents

    NASA Astrophysics Data System (ADS)

    Kim, Kyung-Su; Lee, Hae-Yeoun; Im, Dong-Hyuck; Lee, Heung-Kyu

    Commercial markets employ digital right management (DRM) systems to protect valuable high-definition (HD) quality videos. DRM system uses watermarking to provide copyright protection and ownership authentication of multimedia contents. We propose a real-time video watermarking scheme for HD video in the uncompressed domain. Especially, our approach is in aspect of practical perspectives to satisfy perceptual quality, real-time processing, and robustness requirements. We simplify and optimize human visual system mask for real-time performance and also apply dithering technique for invisibility. Extensive experiments are performed to prove that the proposed scheme satisfies the invisibility, real-time processing, and robustness requirements against video processing attacks. We concentrate upon video processing attacks that commonly occur in HD quality videos to display on portable devices. These attacks include not only scaling and low bit-rate encoding, but also malicious attacks such as format conversion and frame rate change.

  14. Flight test of the X-29A at high angle of attack: Flight dynamics and controls

    NASA Technical Reports Server (NTRS)

    Bauer, Jeffrey E.; Clarke, Robert; Burken, John J.

    1995-01-01

    The NASA Dryden Flight Research Center has flight tested two X-29A aircraft at low and high angles of attack. The high-angle-of-attack tests evaluate the feasibility of integrated X-29A technologies. More specific objectives focus on evaluating the high-angle-of-attack flying qualities, defining multiaxis controllability limits, and determining the maximum pitch-pointing capability. A pilot-selectable gain system allows examination of tradeoffs in airplane stability and maneuverability. Basic fighter maneuvers provide qualitative evaluation. Bank angle captures permit qualitative data analysis. This paper discusses the design goals and approach for high-angle-of-attack control laws and provides results from the envelope expansion and handling qualities testing at intermediate angles of attack. Comparisons of the flight test results to the predictions are made where appropriate. The pitch rate command structure of the longitudinal control system is shown to be a valid design for high-angle-of-attack control laws. Flight test results show that wing rock amplitude was overpredicted and aileron and rudder effectiveness were underpredicted. Flight tests show the X-29A airplane to be a good aircraft up to 40 deg angle of attack.

  15. DCT-based cyber defense techniques

    NASA Astrophysics Data System (ADS)

    Amsalem, Yaron; Puzanov, Anton; Bedinerman, Anton; Kutcher, Maxim; Hadar, Ofer

    2015-09-01

    With the increasing popularity of video streaming services and multimedia sharing via social networks, there is a need to protect the multimedia from malicious use. An attacker may use steganography and watermarking techniques to embed malicious content, in order to attack the end user. Most of the attack algorithms are robust to basic image processing techniques such as filtering, compression, noise addition, etc. Hence, in this article two novel, real-time, defense techniques are proposed: Smart threshold and anomaly correction. Both techniques operate at the DCT domain, and are applicable for JPEG images and H.264 I-Frames. The defense performance was evaluated against a highly robust attack, and the perceptual quality degradation was measured by the well-known PSNR and SSIM quality assessment metrics. A set of defense techniques is suggested for improving the defense efficiency. For the most aggressive attack configuration, the combination of all the defense techniques results in 80% protection against cyber-attacks with PSNR of 25.74 db.

  16. Does the initiation of urate-lowering treatment during an acute gout attack prolong the current episode and precipitate recurrent attacks: a systematic literature review.

    PubMed

    Eminaga, Fatma; La-Crette, Jonathan; Jones, Adrian; Abhishek, A

    2016-12-01

    The aim of this study was to systematically review the literature on effect of initiating urate-lowering treatment (ULT) during an acute attack of gout on duration of index attack and persistence on ULT. OVID (Medline), EMBASE and AMED were searched to identify randomized controlled trials (RCTs) of ULT initiation during acute gout attack published in English language. Two reviewers appraised the study quality and extracted data independently. Standardized mean difference (SMD) and relative risk (RR) were used to pool continuous and categorical data. Meta-analysis was carried out using STATA version 14. A total of 537 studies were selected. A total of 487 titles and abstracts were reviewed after removing duplicates. Three RCTs were identified. There was evidence from two high-quality studies that early initiation of allopurinol did not increase pain severity at days 10-15 [SMD pooled (95 % CI) 0.18 (-0.58, 0.93)]. Data from three studies suggested that initiation of ULT during an acute attack of gout did not associate with dropouts [RR pooled (95 % CI) 1.16 (0.58, 2.31)]. There is moderate-quality evidence that the initiation of ULT during an acute attack of gout does not increase pain severity and risk of ULT discontinuation. Larger studies are required to confirm these findings so that patients with acute gout can be initiated on ULT with confidence.

  17. A Distributed Middleware Architecture for Attack-Resilient Communications in Smart Grids

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hodge, Brian S; Wu, Yifu; Wei, Jin

    Distributed Energy Resources (DERs) are being increasingly accepted as an excellent complement to traditional energy sources in smart grids. As most of these generators are geographically dispersed, dedicated communications investments for every generator are capital cost prohibitive. Real-time distributed communications middleware, which supervises, organizes and schedules tremendous amounts of data traffic in smart grids with high penetrations of DERs, allows for the use of existing network infrastructure. In this paper, we propose a distributed attack-resilient middleware architecture that detects and mitigates the congestion attacks by exploiting the Quality of Experience (QoE) measures to complement the conventional Quality of Service (QoS)more » information to detect and mitigate the congestion attacks effectively. The simulation results illustrate the efficiency of our proposed communications middleware architecture.« less

  18. A Distributed Middleware Architecture for Attack-Resilient Communications in Smart Grids: Preprint

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wu, Yifu; Wei, Jin; Hodge, Bri-Mathias

    Distributed energy resources (DERs) are being increasingly accepted as an excellent complement to traditional energy sources in smart grids. Because most of these generators are geographically dispersed, dedicated communications investments for every generator are capital-cost prohibitive. Real-time distributed communications middleware - which supervises, organizes, and schedules tremendous amounts of data traffic in smart grids with high penetrations of DERs - allows for the use of existing network infrastructure. In this paper, we propose a distributed attack-resilient middleware architecture that detects and mitigates the congestion attacks by exploiting the quality of experience measures to complement the conventional quality of service informationmore » to effectively detect and mitigate congestion attacks. The simulation results illustrate the efficiency of our proposed communications middleware architecture.« less

  19. Fourth High Alpha Conference, volume 1

    NASA Technical Reports Server (NTRS)

    1994-01-01

    The goal of the Fourth High Alpha Conference was to focus on the flight validation of high angle-of-attack technologies and provide an in-depth review of the latest high angle-of-attack activities. Areas that were covered include: high angle-of-attack aerodynamics, propulsion and inlet dynamics, thrust vectoring, control laws and handling qualities, tactical utility, and forebody controls.

  20. Flight test experience with high-alpha control system techniques on the F-14 airplane

    NASA Technical Reports Server (NTRS)

    Gera, J.; Wilson, R. J.; Enevoldson, E. K.; Nguyen, L. T.

    1981-01-01

    Improved handling qualities of fighter aircraft at high angles of attack can be provided by various stability and control augmentation techniques. NASA and the U.S. Navy are conducting a joint flight demonstration of these techniques on an F-14 airplane. This paper reports on the flight test experience with a newly designed lateral-directional control system which suppresses such high angle of attack handling qualities problems as roll reversal, wing rock, and directional divergence while simultaneously improving departure/spin resistance. The technique of integrating a piloted simulation into the flight program was used extensively in this program. This technique had not been applied previously to high angle of attack testing and required the development of a valid model to simulate the test airplane at extremely high angles of attack.

  1. Fourth High Alpha Conference, volume 3

    NASA Technical Reports Server (NTRS)

    1994-01-01

    Thie goal of this conference was to focus on the flight validation of high-angle-of-attack technologies and provide an in-depth review of the latest high-angle-of-attack activities. Areas covered include: (1) high-angle-of-attack aerodynamics; (2) propulsion and inlet dynamics; (3) thrust vectoring; (4) control laws and handling qualities; (5) tactical utility; and (6) forebody controls.

  2. Attack by Pyemotes johnmoseri (Acari: Pyemotidae)

    Treesearch

    Tulin Askit; Ibrahim Cakmak; John Moser

    2007-01-01

    The Aegean Region of Turkey is one of the largest dried fig producers in the world. A Turkish cultivar sarilop (Ficus carica cv. Calimyrna L.) possesses good qualities for drying process, and has been grown extensively for many years in Turkey. Hypoborus ficus is the most common xylophagous insect attacking fig trees in Aydin (Aks¸it et al. 2003). This pest attacks...

  3. Improved decryption quality and security of a joint transform correlator-based encryption system

    NASA Astrophysics Data System (ADS)

    Vilardy, Juan M.; Millán, María S.; Pérez-Cabré, Elisabet

    2013-02-01

    Some image encryption systems based on modified double random phase encoding and joint transform correlator architecture produce low quality decrypted images and are vulnerable to a variety of attacks. In this work, we analyse the algorithm of some reported methods that optically implement the double random phase encryption in a joint transform correlator. We show that it is possible to significantly improve the quality of the decrypted image by introducing a simple nonlinear operation in the encrypted function that contains the joint power spectrum. This nonlinearity also makes the system more resistant to chosen-plaintext attacks. We additionally explore the system resistance against this type of attack when a variety of probability density functions are used to generate the two random phase masks of the encryption-decryption process. Numerical results are presented and discussed.

  4. Anger attacks in bipolar versus recurrent depression.

    PubMed

    Grover, Sandeep; Painuly, Nitesh; Gupta, Nitin; Mattoo, Surendra K

    2011-01-01

    Research on anger attacks has been mostly limited to unipolar depression, and only a few studies have focused on anger attacks in bipolar depression. In a cross-sectional study, 22 subjects with bipolar depression were compared to 22 subjects with recurrent unipolar depression using an anger attack questionnaire, irritability, depression and anxiety scale and quality of life scale. Anger attacks were present in 62.5% subjects with recurrent depression (RDD group) compared to 54.5% in subjects with bipolar depression (BD group), but the difference between the groups was not statistically significant. Also, there was no significant difference between the RDD and BD groups on the Irritability Depression and Anxiety Scale and WHOQOL-Bref except that the BD group had a poorer quality of life (QOL) compared to the RDD group in the social relationship domain (t=-2.30, p<0.05). In the BD group, the subjects with anger attacks were older (t=2.77, p<0.05), had significantly higher scores on the Irritability-Outwards component of IDA (t=3.90, p<0.01) and shorter duration of illness (Mann Whitney Signed ranked value 20.00, p<0.01) and duration of treatment (Mann Whitney Signed ranked value 28.00, p<0.05) compared to BD group members without anger attacks. In the RDD group, the subjects with anger attacks had poor QOL in the social domain (t= -2.12, p<0.05), environmental domain (t=2.99, p=.01) and total (t=2.56, p<0.05) QOL compared to those without anger attacks. Anger attacks are equally prevalent in unipolar and bipolar depression, are not influenced by sociodemographic and clinical variables, and lead to comparable impact on the subjective QOL in both groups.

  5. The contribution of collective attack tactics in differentiating handball score efficiency.

    PubMed

    Rogulj, Nenad; Srhoj, Vatromir; Srhoj, Ljerka

    2004-12-01

    The prevalence of 19 elements of collective tactics in score efficient and score inefficient teams was analyzed in 90 First Croatian Handball League--Men games during the 1998-1999 season. Prediction variables were used to describe duration, continuity, system, organization and spatial direction of attacks. Analysis of the basic descriptive and distribution statistical parameters revealed normal distribution of all variables and possibility to use multivariate methods. Canonic discrimination analysis and analysis of variance showed the use of collective tactics elements on attacks to differ statistically significantly between the winning and losing teams. Counter-attacks and uninterrupted attacks predominate in winning teams. Other types of attacks such as long position attack, multiply interrupted attack, attack with one circle runner attack player/pivot, attack based on basic principles, attack based on group cooperation, attack based on independent action, attack based on group maneuvering, rightward directed attack and leftward directed attack predominate in losing teams. Winning teams were found to be clearly characterized by quick attacks against unorganized defense, whereas prolonged, interrupted position attacks against organized defense along with frequent and diverse tactical actions were characteristic of losing teams. The choice and frequency of using a particular tactical activity in position attack do not warrant score efficiency but usually are consequential to the limited anthropologic potential and low level of individual technical-tactical skills of the players in low-quality teams.

  6. Security Policies for Mitigating the Risk of Load Altering Attacks on Smart Grid Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ryutov, Tatyana; AlMajali, Anas; Neuman, Clifford

    2015-04-01

    While demand response programs implement energy efficiency and power quality objectives, they bring potential security threats to the Smart Grid. The ability to influence load in a system enables attackers to cause system failures and impacts the quality and integrity of power delivered to customers. This paper presents a security mechanism to monitor and control load according to a set of security policies during normal system operation. The mechanism monitors, detects, and responds to load altering attacks. We examined the security requirements of Smart Grid stakeholders and constructed a set of load control policies enforced by the mechanism. We implementedmore » a proof of concept prototype and tested it using the simulation environment. By enforcing the proposed policies in this prototype, the system is maintained in a safe state in the presence of load drop attacks.« less

  7. Robustness of coevolution in resolving prisoner's dilemma games on interdependent networks subject to attack

    NASA Astrophysics Data System (ADS)

    Liu, Penghui; Liu, Jing

    2017-08-01

    Recently, coevolution between strategy and network structure has been established as a rule to resolve social dilemmas and reach optimal situations for cooperation. Many follow-up researches have focused on studying how coevolution helps networks reorganize to deter the defectors and many coevolution methods have been proposed. However, the robustness of the coevolution rules against attacks have not been studied much. Since attacks may directly influence the original evolutionary process of cooperation, the robustness should be an important index while evaluating the quality of a coevolution method. In this paper, we focus on investigating the robustness of an elementary coevolution method in resolving the prisoner's dilemma game upon the interdependent networks. Three different types of time-independent attacks, named as edge attacks, instigation attacks and node attacks have been employed to test its robustness. Through analyzing the simulation results obtained, we find this coevolution method is relatively robust against the edge attack and the node attack as it successfully maintains cooperation in the population over the entire attack range. However, when the instigation probability of the attacked individuals is large or the attack range of instigation attack is wide enough, coevolutionary rule finally fails in maintaining cooperation in the population.

  8. X-31 high angle of attack control system performance

    NASA Technical Reports Server (NTRS)

    Huber, Peter; Seamount, Patricia

    1994-01-01

    The design goals for the X-31 flight control system were: (1) level 1 handling qualities during post-stall maneuvering (30 to 70 degrees angle-of-attack); (2) thrust vectoring to enhance performance across the flight envelope; and (3) adequate pitch-down authority at high angle-of-attack. Additional performance goals are discussed. A description of the flight control system is presented, highlighting flight control system features in the pitch and roll axes and X-31 thrust vectoring characteristics. The high angle-of-attack envelope clearance approach will be described, including a brief explanation of analysis techniques and tools. Also, problems encountered during envelope expansion will be discussed. This presentation emphasizes control system solutions to problems encountered in envelope expansion. An essentially 'care free' envelope was cleared for the close-in-combat demonstrator phase. High angle-of-attack flying qualities maneuvers are currently being flown and evaluated. These results are compared with pilot opinions expressed during the close-in-combat program and with results obtained from the F-18 HARV for identical maneuvers. The status and preliminary results of these tests are discussed.

  9. Sleep Quantity and Quality of Ontario Wildland Firefighters Across a Low-Hazard Fire Season

    PubMed Central

    McGillis, Zachary; Dorman, Sandra C.; Robertson, Ayden; Larivière, Michel; Leduc, Caleb; Eger, Tammy; Oddson, Bruce E.; Larivière, Céline

    2017-01-01

    Objective: The aim of the study was to assess the sleep quality, quantity, and fatigue levels of Canadian wildland firefighters while on deployment. Methods: Objective and subjective sleep and fatigue measures were collected using actigraphy and questionnaires during non-fire (Base) and fire (Initial Attack and Project) deployments. Results: Suboptimal sleep quality and quantity were more frequently observed during high-intensity, Initial Attack fire deployments. Suboptimal sleep was also exhibited during non-fire (Base) work periods, which increases the risk of prefire deployment sleep debt. Self-reported, morning fatigue scores were low-to-moderate and highest for Initial Attack fire deployments. Conclusions: The study highlights the incidence of suboptimal sleep patterns in wildland firefighters during non-fire and fire suppression work periods. These results have implications for the health and safety practices of firefighters given the link between sleep and fatigue, in a characteristically hazardous occupation. PMID:29216017

  10. Fourth High Alpha Conference, volume 2

    NASA Technical Reports Server (NTRS)

    1994-01-01

    The goal of the Fourth High Alpha Conference, held at the NASA Dryden Flight Research Center on July 12-14, 1994, was to focus on the flight validation of high angle of attack technologies and provide an in-depth review of the latest high angle of attack activities. Areas that were covered include high angle of attack aerodynamics, propulsion and inlet dynamics, thrust vectoring, control laws and handling qualities, and tactical utility.

  11. Habitat-specific foraging of prothonotary warblers: Deducing habitat quality

    USGS Publications Warehouse

    Lyons, J.E.

    2005-01-01

    Foraging behavior often reflects food availability in predictable ways. For example, in habitats where food availability is high, predators should attack prey more often and move more slowly than in habitats where food availability is low. To assess relative food availability and habitat quality, I studied the foraging behavior of breeding Prothonotary Warblers (Protonotaria citrea) in two forest habitat types, cypress-gum swamp forest and coastal-plain levee forest. I quantified foraging behavior with focal animal sampling and continuous recording during foraging bouts. I measured two aspects of foraging behavior: 1) prey attack rate (attacks per minute), using four attack maneuvers (glean, sally, hover, strike), and 2) foraging speed (movements per minute), using three types of movement (hop, short flight [???1 m], long flight [>1 m]). Warblers attacked prey more often in cypress-gum swamp forest than in coastal-plain levee forest. Foraging speed, however, was not different between habitats. I also measured foraging effort (% time spent foraging) and relative frequency of attack maneuvers employed in each habitat; neither of these variables was influenced by forest type. I conclude that Prothonotary Warblers encounter more prey when foraging in cypress-gum swamps than in coastal-plain levee forest, and that greater food availability results in higher density and greater reproductive success for birds breeding in cypress-gum swamp.

  12. Patch Time Allocation and Oviposition Behavior in Response to Patch Quality and the Presence of a Generalist Predator in Meteorus pulchricornis (Hymenoptera: Braconidae)

    PubMed Central

    Sheng, Sheng; Ling, Meng; Fu-an, Wu; Baoping, Li

    2015-01-01

    Foraging parasitoids often must estimate local risk of predation just as they must estimate local patch value. Here, we investigate the effects a generalist predator Chlaenius bioculatus (Coleoptera: Carabidae), has on the oviposition behavior and the patch residence decisions of a solitary parasitoid Meteorus pulchricornis (Hymenoptera: Braconidae) in response to the varying host quality of Spodoptera litura (Lepidoptera: Noctuidae) larvae (L2 and L4). M. pulchricornis attacked more L4 than on L2 hosts, with the difference in attack rate varying depending on predation treatments, greater in the presence (either actively feeding or not) of the predator than in the absence of it. The parasitoid attacked fewer L2 and L4 hosts when the predator was actively feeding than when it was not feeding or not present in the patch. M. pulchricornis decreased the patch leaving tendency with increasing rejections of hosts, but increased the tendency in response to the presence of the predator as compared with the absence of it, and furthermore, increased the patch leaving tendency when the predator was actively feeding as compared with when it was not. Our study suggests that M. pulchricornis can exploit high quality patches while minimizing predation risk, by attacking more hosts in high quality patches while reducing total patch time in response to risk of predation. PMID:25943317

  13. Children's sleep under the threat of attack by ballistic missiles.

    PubMed

    Lavie; Amit; Epstein; Tzischinsky

    1993-03-01

    The present paper reports on the influence of the Scud missile attacks during the Gulf War on the sleep of Israeli children. Two studies were performed. In the first, sleep habits and sleep disturbances of 61 (mean age 20 months) infants were assessed by questionnaires completed by their parents 5 months before the war and immediately after the end of the War. Comparison of pre- and post-war data revealed no major changes in sleep habits or in sleep quality. In the second study, sleep of 55 children was monitored at home by actigraphs during the last month of the War. All children were aroused during missile attacks, but returned to sleep immediately, with no evidence of carry-over effects once the 'all clear' sign was given. Comparison of sleep quality measures obtained during the War with those of age- and sex-matched children monitored a year before the war did not reveal any significant differences apart from the immediate response to the attack.

  14. Seizure attacks while driving: quality of life in persons with epilepsy.

    PubMed

    Tiamkao, Somsak; Sawanyawisuth, Kittisak; Towanabut, Somchai; Visudhipun, Pongsak

    2009-07-01

    To study the effect on quality of life (QOL) of a seizure attack while driving in persons with epilepsy (PWE). From four provincial and eight university hospitals in Thailand, we enrolled epileptic patients who drove a car or motorcycle or used to drive. The SF-36 questionnaire was used to evaluate QOL. The mean SF-36 score for all dimensions was calculated and compared with patients who either had or did not have a seizure attack while driving and in those who either had or had not been involved in a traffic accident while driving. We had 245 adult PWE who drove a car or motorcycle or used to drive. Of these, 69 cases (28%) had a seizure attack whilst driving. Over half (36/69; 57%) had had seizure-related accidents, most of which were mild but about 20% needed hospitalization. PWE having a seizure attack while driving had a significantly lower QOL in four of the eight categories compared with patients who had not. PWE who had a seizure-related accident had a significantly lower mean value in the vitality category than those who did not. Seizure attacks while driving diminished QOL in PWE even though they only suffered minor injuries. Driving as a QOL issue should be discussed with patients. A good public transportation system would ease the need to drive.

  15. Hospital mergers and acquisitions: does market consolidation harm patients?

    PubMed

    Ho, V; Hamilton, B H

    2000-09-01

    Debate continues on whether consolidation in health care markets enhances efficiency or instead facilitates market power, possibly damaging quality. We compare the quality of hospital care before and after mergers and acquisitions in California between 1992 and 1995. We analyze inpatient mortality for heart attack and stroke patients, 90-day readmission for heart attack patients, and discharge within 48 h for normal newborn babies. Recent mergers and acquisitions have not had a measurable impact on inpatient mortality, although the associated standard errors are large. Readmission rates and early discharge increased in some cases. The adverse consequences of increased market power on the quality of care require further substantiation.

  16. Multiple-image hiding using super resolution reconstruction in high-frequency domains

    NASA Astrophysics Data System (ADS)

    Li, Xiao-Wei; Zhao, Wu-Xiang; Wang, Jun; Wang, Qiong-Hua

    2017-12-01

    In this paper, a robust multiple-image hiding method using the computer-generated integral imaging and the modified super-resolution reconstruction algorithm is proposed. In our work, the host image is first transformed into frequency domains by cellular automata (CA), to assure the quality of the stego-image, the secret images are embedded into the CA high-frequency domains. The proposed method has the following advantages: (1) robustness to geometric attacks because of the memory-distributed property of elemental images, (2) increasing quality of the reconstructed secret images as the scheme utilizes the modified super-resolution reconstruction algorithm. The simulation results show that the proposed multiple-image hiding method outperforms other similar hiding methods and is robust to some geometric attacks, e.g., Gaussian noise and JPEG compression attacks.

  17. Patch time allocation and oviposition behavior in response to patch quality and the presence of a generalist predator in Meteorus pulchricornis (Hymenoptera: Braconidae).

    PubMed

    Sheng, Sheng; Ling, Meng; Fu-An, Wu; Baoping, Li

    2015-01-01

    Foraging parasitoids often must estimate local risk of predation just as they must estimate local patch value. Here, we investigate the effects a generalist predator Chlaenius bioculatus (Coleoptera: Carabidae), has on the oviposition behavior and the patch residence decisions of a solitary parasitoid Meteorus pulchricornis (Hymenoptera: Braconidae) in response to the varying host quality of Spodoptera litura (Lepidoptera: Noctuidae) larvae (L2 and L4). M. pulchricornis attacked more L4 than on L2 hosts, with the difference in attack rate varying depending on predation treatments, greater in the presence (either actively feeding or not) of the predator than in the absence of it. The parasitoid attacked fewer L2 and L4 hosts when the predator was actively feeding than when it was not feeding or not present in the patch. M. pulchricornis decreased the patch leaving tendency with increasing rejections of hosts, but increased the tendency in response to the presence of the predator as compared with the absence of it, and furthermore, increased the patch leaving tendency when the predator was actively feeding as compared with when it was not. Our study suggests that M. pulchricornis can exploit high quality patches while minimizing predation risk, by attacking more hosts in high quality patches while reducing total patch time in response to risk of predation. © The Author 2015. Published by Oxford University Press on behalf of the Entomological Society of America.

  18. Quantifying Improbability: An Analysis of the Lloyd’s of London Business Blackout Cyber Attack Scenario

    DTIC Science & Technology

    Scenarios that describe cyber attacks on the electric grid consistently predict significant disruptions to the economy and citizens quality of life...phenomena that deserve further investigation, such as the importance of some individual power plants in influencing the adversarys probability of

  19. Depletion-of-Battery Attack: Specificity, Modelling and Analysis.

    PubMed

    Shakhov, Vladimir; Koo, Insoo

    2018-06-06

    The emerging Internet of Things (IoT) has great potential; however, the societal costs of the IoT can outweigh its benefits. To unlock IoT potential, there needs to be improvement in the security of IoT applications. There are several standardization initiatives for sensor networks, which eventually converge with the Internet of Things. As sensor-based applications are deployed, security emerges as an essential requirement. One of the critical issues of wireless sensor technology is limited sensor resources, including sensor batteries. This creates a vulnerability to battery-exhausting attacks. Rapid exhaustion of sensor battery power is not only explained by intrusions, but can also be due to random failure of embedded sensor protocols. Thus, most wireless sensor applications, without tools to defend against rash battery exhausting, would be unable to function during prescribed times. In this paper, we consider a special type of threat, in which the harm is malicious depletion of sensor battery power. In contrast to the traditional denial-of-service attack, quality of service under the considered attack is not necessarily degraded. Moreover, the quality of service can increase up to the moment of the sensor set crashes. We argue that this is a distinguishing type of attack. Hence, the application of a traditional defense mechanism against this threat is not always possible. Therefore, effective methods should be developed to counter the threat. We first discuss the feasibility of rash depletion of battery power. Next, we propose a model for evaluation of energy consumption when under attack. Finally, a technique to counter the attack is discussed.

  20. Acute Treatment of Migraine

    PubMed Central

    ÖZTÜRK, Vesile

    2013-01-01

    Migraine is one of the most frequent disabling neurological conditions with a major impact on the patient’s quality of life. Migraine has been described as a chronic disorder that characterized with attacks. Attacks are characterized by moderate–severe, often unilateral, pulsating headache attacks, typically lasting 4 to 72 hours. Migraine remains underdiagnosed and undertreated despite advances in the understanding of its pathophysiology. This article reviews management of migraine acute pharmacological treatment. Currently, for the acute treatment of migraine attacks, non-steroidal anti-inflammatory drugs (NSAIDs) and triptans (serotonin 5HT1B/1D receptor agonists) are recommended. Before intake of NSAID and triptans, metoclopramide or domperidone is useful. In very severe attacks, subcutaneous sumatriptan is first choice. The patient should be treated early in the attack, use an adequate dose and formulation of a medication. Ideally, acute therapy should be restricted to no more than 2 to 3 days per week to avoid medication overuse. PMID:28360580

  1. An open-label study to evaluate the long-term safety and efficacy of lanadelumab for prevention of attacks in hereditary angioedema: design of the HELP study extension.

    PubMed

    Riedl, Marc A; Bernstein, Jonathan A; Craig, Timothy; Banerji, Aleena; Magerl, Markus; Cicardi, Marco; Longhurst, Hilary J; Shennak, Mustafa M; Yang, William H; Schranz, Jennifer; Baptista, Jovanna; Busse, Paula J

    2017-01-01

    Hereditary angioedema (HAE) is characterized by recurrent attacks of subcutaneous or submucosal edema. Attacks are unpredictable, debilitating, and have a significant impact on quality of life. Patients may be prescribed prophylactic therapy to prevent angioedema attacks. Current prophylactic treatments may be difficult to administer (i.e., intravenously), require frequent administrations or are not well tolerated, and breakthrough attacks may still occur frequently. Lanadelumab is a subcutaneously-administered monoclonal antibody inhibitor of plasma kallikrein in clinical development for prophylaxis of hereditary angioedema attacks. A Phase 1b study supported its efficacy in preventing attacks. A Phase 3, randomized, double-blind, placebo-controlled, parallel-arm study has been completed and an open-label extension is currently ongoing. The primary objective of the open-label extension is to evaluate the long-term safety of repeated subcutaneous administrations of lanadelumab in patients with type I/II HAE. Secondary objectives include evaluation of efficacy and time to first angioedema attack to determine outer bounds of the dosing interval. The study will also evaluate immunogenicity, pharmacokinetics/pharmacodynamics, quality of life, characteristics of breakthrough attacks, ease of self-administration, and safety/efficacy in patients who switch to lanadelumab from another prophylactic therapy. The open-label extension will enroll patients who completed the double-blind study ("rollover patients") and those who did not participate in the double-blind study ("non-rollover patients"), which includes patients who may or may not be currently using another prophylactic therapy. Rollover patients will receive a single 300 mg dose of lanadelumab on Day 0 and the second dose after the patient's first confirmed angioedema attack. Thereafter, lanadelumab will be administered every 2 weeks. Non-rollover patients will receive 300 mg lanadelumab every 2 weeks regardless of the first attack. All patients will receive their last dose on Day 350 (maximum of 26 doses), and will then undergo a 4-week follow-up. Prevention of attacks can reduce the burden of illness associated with HAE. Prophylactic therapy requires extended, repeated dosing and the results of this study will provide important data on the long-term safety and efficacy of lanadelumab, a monoclonal antibody inhibitor of plasma kallikrein for subcutaneous administration for the treatment of HAE. Trial registration NCT02741596.

  2. Improvement of quality of life in panic disorder with escitalopram, citalopram, or placebo.

    PubMed

    Bandelow, B; Stein, D J; Dolberg, O T; Andersen, H F; Baldwin, D S

    2007-07-01

    It has been argued that measurement of outcome in panic disorder should not be limited to monitoring the number of panic attacks, but should include all domains that affect patient quality of life. Data from a randomized prospective comparison of escitalopram, citalopram, and placebo in patients with DSM-IV panic disorder were analyzed with regard to measurements of impairment of quality of life. The subscales of the Panic and Agoraphobia Scale (P&A) (Panic Attacks, Agoraphobic Avoidance, Anticipatory Anxiety, Functional and Social Disability, and Worries about Health) and the Quality of Life Enjoyment and Satisfaction Questionnaire (Q-LES-Q) were analyzed. Treatment with escitalopram was associated with significant improvement on all 5 subscales of the P&A. Citalopram was significantly different from placebo in 3 subscales. Escitalopram and citalopram were significantly better than placebo in improving quality of life (measured by the total score of the Q-LES-Q Scale). Escitalopram was superior to placebo on 12 of 16 items of the Q-LES-Q, while citalopram was superior on 7 items. The P&A scale was more robust than measurement of panic frequency in differentiating medication from placebo. Escitalopram treatment was associated with improvement on all assessed domains that impair quality of life in panic disorder. Measurement of clinical improvement should not be solely based on panic attack frequency, but should also include assessment of a broad range of domains that affect patient quality of life.

  3. Numerical simulation of the flow about the F-18 HARV at high angle of attack

    NASA Technical Reports Server (NTRS)

    Murman, Scott M.

    1994-01-01

    As part of NASA's High Alpha Technology Program, research has been aimed at developing and extending numerical methods to accurately predict the high Reynolds number flow about the NASA F-18 High Alpha Research Vehicle (HARV) at large angles of attack. The HARV aircraft is equipped with a bidirectional thrust vectoring unit which enables stable, controlled flight through 70 deg angle of attack. Currently, high-fidelity numerical solutions for the flow about the HARV have been obtained at alpha = 30 deg, and validated against flight-test data. It is planned to simulate the flow about the HARV through alpha = 60 deg, and obtain solutions of the same quality as those at the lower angles of attack. This report presents the status of work aimed at extending the HARV computations to the extreme angle of attack range.

  4. Game Theory for Proactive Dynamic Defense and Attack Mitigation in Cyber-Physical Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Letchford, Joshua

    While there has been a great deal of security research focused on preventing attacks, there has been less work on how one should balance security and resilience investments. In this work we developed and evaluated models that captured both explicit defenses and other mitigations that reduce the impact of attacks. We examined these issues both in more broadly applicable general Stackelberg models and in more specific network and power grid settings. Finally, we compared these solutions to existing work in terms of both solution quality and computational overhead.

  5. Migraine attack treatment : a tailor-made suit, not one size fits all.

    PubMed

    Belvis, Robert; Mas, Natalia; Aceituno, Azahara

    2014-04-01

    About 15% of people in the world suffer migraine attacks. Migraine can induce a great impact in the quality of life, and the costs of medical care and loss of productivity can be also high. Non-steroidal anti-inflammatory drugs (NSAIDs) are the best treatment in mild-to-moderate migraine attacks and triptans are the first line option in the acute treatment of moderate-to-severe migraine attacks. At present, there are seven marketed triptans: sumatriptan, rizatriptan, zolmitriptan, eletriptan, naratriptan, almotriptan and frovatriptan. Obviously, every drug presents different pharmacokinetic and pharmacodynamics properties and, moreover, some triptans have several formulations. The prescription of one of these seven triptans for a specified patient is based in the drug profile: efficacy, safety, pharmacokinetics and pharmacodynamics. Other data to take account in the final prescription are clinical characteristics of the migraine attack (speed of onset, intensity of pain, lasting of the attack) and patient characteristics as working habits, life style or medical history. It is therefore mandatory to perform an individualization of the treatment of migraine attack. In recent years, several new patents of drugs have been registered in the treatment of migraine attack, although most of these are already known drugs that only provide new routes of administration. We present an update on the treatment of the migraine attack.

  6. Preferential occurrence of attacks during night sleep and/or upon awakening negatively affects migraine clinical presentation.

    PubMed

    Gori, Sara; Lucchesi, Cinzia; Baldacci, Filippo; Bonuccelli, Ubaldo

    2015-01-01

    It is well known that migraine attacks can preferentially occur during night sleep and/or upon awakening, however the possible implications of this timing on migraine clinical presentation remain unclear. The aim of this study was to assess the possible consequences of sleep-related migraine (defined as ≥ 75% of migraine attacks occurring during night sleep and/or upon awakening) on the migraine clinical picture (i.e. migraine-related disability, attack severity, use of symptomatic drugs), subjective sleep quality, excessive daytime sleepiness and fatigue. Two hundred consecutive migraine without aura patients were enrolled; patients with comorbid disorders or chronic medication use were excluded. 39% of the migraineurs included in the study received a diagnosis of sleep-related migraine. The mean frequency of migraine attacks (days per month) did not significantly differ between the patients with and those without sleep-related migraine, whereas migraine-related disability (p<0.0001), mean attack severity (p<0.0001), and monthly intake of symptomatic drugs (p<0.0001) were significantly higher in patients with migraine preferentially occurring at night-time and/or upon awakening. Subjective sleep quality and excessive daytime sleepiness did not differ significantly between the two groups, whereas fatigue was significantly more present in the patients with sleep-related migraine (p=0.0001). These data seem to support the hypothesis that patients with sleep-related migraine represent a subset of individuals with a more severe and disabling clinical presentation of migraine and greater impairment of daily functioning, as suggested by the higher degree of fatigue. Migraineurs with night-time attacks Preferential occurrence of attacks during night sleep and/or upon awakening negatively affects migraine clinical presentation also showed a greater use of symptomatic drugs, possibly related to delayed use of symptomatic treatment. The identification of subtypes of patients with a higher disability risk profile could have crucial implications for individually tailored management of migraine patients.

  7. An Attack-Resilient Middleware Architecture for Grid Integration of Distributed Energy Resources

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wu, Yifu; Mendis, Gihan J.; He, Youbiao

    In recent years, the increasing penetration of Distributed Energy Resources (DERs) has made an impact on the operation of the electric power systems. In the grid integration of DERs, data acquisition systems and communications infrastructure are crucial technologies to maintain system economic efficiency and reliability. Since most of these generators are relatively small, dedicated communications investments for every generator are capital cost prohibitive. Combining real-time attack-resilient communications middleware with Internet of Things (IoTs) technologies allows for the use of existing infrastructure. In our paper, we propose an intelligent communication middleware that utilizes the Quality of Experience (QoE) metrics to complementmore » the conventional Quality of Service (QoS) evaluation. Furthermore, our middleware employs deep learning techniques to detect and defend against congestion attacks. The simulation results illustrate the efficiency of our proposed communications middleware architecture.« less

  8. Management of children and young people (CYP) with asthma: a clinical audit report.

    PubMed

    Levy, Mark L; Ward, Angela; Nelson, Sara

    2018-05-21

    An asthma attack or exacerbation signals treatment failure. Most attacks are preventable and failure to recognize risk of asthma attacks are well recognized as risk factors for future attacks and even death. Of the 19 recommendations made by the United Kingdom National Review of Asthma Deaths (NRAD) (1) only one has been partially implemented-a National Asthma Audit; however, this hasn't reported yet. The Harrow Clinical Commissioning Group (CCG) in London implemented a clinical asthma audit on 291 children and young people aged under 19 years (CYP) who had been treated for asthma attacks in 2016. This was funded as a Local Incentive Scheme (LIS) aimed at improving quality health care delivery. Two years after the publication of the NRAD report it is surprising that risks for future attacks were not recognized, that few patients were assessed objectively during attacks and only 10% of attacks were followed up within 2 days. However, it is encouraging that CYP hospital admissions following the audit were reduced by 16%, with clear benefit for patients, their families and the local health economy. This audit has provided an example of how clinicians can focus learning on patients who have had asthma attacks and utilize these events as a catalyst for active reflection in particular on modifiable risk factors. Through identification of these risks and active optimization of management, preventable asthma attacks could become 'never events'.

  9. Management of Acute and Recurrent Gout: A Clinical Practice Guideline From the American College of Physicians.

    PubMed

    Qaseem, Amir; Harris, Russell P; Forciea, Mary Ann

    2017-01-03

    The American College of Physicians (ACP) developed this guideline to present the evidence and provide clinical recommendations on the management of gout. Using the ACP grading system, the committee based these recommendations on a systematic review of randomized, controlled trials; systematic reviews; and large observational studies published between January 2010 and March 2016. Clinical outcomes evaluated included pain, joint swelling and tenderness, activities of daily living, patient global assessment, recurrence, intermediate outcomes of serum urate levels, and harms. The target audience for this guideline includes all clinicians, and the target patient population includes adults with acute or recurrent gout. ACP recommends that clinicians choose corticosteroids, nonsteroidal anti-inflammatory drugs (NSAIDs), or colchicine to treat patients with acute gout. (Grade: strong recommendation, high-quality evidence). ACP recommends that clinicians use low-dose colchicine when using colchicine to treat acute gout. (Grade: strong recommendation, moderate-quality evidence). ACP recommends against initiating long-term urate-lowering therapy in most patients after a first gout attack or in patients with infrequent attacks. (Grade: strong recommendation, moderate-quality evidence). ACP recommends that clinicians discuss benefits, harms, costs, and individual preferences with patients before initiating urate-lowering therapy, including concomitant prophylaxis, in patients with recurrent gout attacks. (Grade: strong recommendation, moderate-quality evidence).

  10. Timing of prophylactic surgery in prevention of diverticulitis recurrence: a cost-effectiveness analysis.

    PubMed

    Richards, Robert J; Hammitt, James K

    2002-09-01

    Although surgery is recommended after two or more attacks of uncomplicated diverticulitis, the optimal timing for surgery in terms of cost-effectiveness is unknown. A Markov model was used to compare the costs and outcomes of performing surgery after one, two, or three uncomplicated attacks in 60-year-old hypothetical cohorts. Transition state probabilities were assigned values using published data and expert opinion. Costs were estimated from Medicare reimbursement rates. Surgery after the third attack is cost saving, yielding more years of life and quality adjusted life years at a lower cost than the other two strategies. The results were not sensitive to many of the variables tested in the model or to changes made in the discount rate (0-5%). In conclusion, performing prophylactic resection after the third attack of diverticulitis is cost saving in comparison to resection performed after the first or second attacks and remains cost-effective during sensitivity analysis.

  11. Cued Panic Attacks in Body Dysmorphic Disorder

    PubMed Central

    Phillips, Katharine A.; Menard, William; Bjornsson, Andri S.

    2013-01-01

    Background Body dysmorphic disorder (BDD) is a common and often severe disorder. Clinical observations suggest that panic attacks triggered by BDD symptoms may be common. However, to our knowledge, no study has examined such panic attacks in BDD. We investigated the prevalence, clinical features, and correlates of BDD-triggered panic attacks in individuals with this disorder. Methods Panic attacks and other variables were assessed using reliable and valid measures in 76 individuals with lifetime DSM-IV BDD. Results 28.9% (95% CI, 18.5%–39.4%) of participants reported lifetime panic attacks triggered by BDD symptoms. The most common triggers of such attacks were feeling that others were looking at or scrutinizing the perceived appearance defects (61.9%), looking in the mirror at perceived defects (38.1%), and being in bright light where perceived defects would be more visible (23.8%). The most common panic attack symptoms were palpitations (86.4%), sweating (66.7%), shortness of breath (63.6%), trembling or shaking (63.6%), and fear of losing control or going crazy (63.6%). Compared to participants without such panic attacks, those with BDD-triggered panic attacks had more severe lifetime BDD, social anxiety, and depressive symptoms, as well as poorer functioning and quality of life on a number of measures. They were also less likely to be employed and more likely to have been psychiatrically hospitalized and to have had suicidal ideation due to BDD. Conclusions Panic attacks triggered by BDD-related situations appear common in individuals with this disorder. BDD-triggered panic attacks were associated with greater symptom severity and morbidity. PMID:23653076

  12. Effectiveness of the call in beach volleyball attacking play.

    PubMed

    Künzell, Stefan; Schweikart, Florian; Köhn, Daniel; Schläppi-Lienhard, Olivia

    2014-12-09

    In beach volleyball the setter has the opportunity to give her or his hitter a "call". The call intends that the setter suggests to her or his partner where to place the attack in the opponent's court. The effectiveness of a call is still unknown. We investigated the women's and men's Swiss National Beach Volleyball Championships in 2011 and analyzed 2185 attacks. We found large differences between female and male players. While men called in only 38.4% of attacks, women used calls in 85.5% of attacks. If the male players followed a given call, 63% of the attacks were successful. The success rate of attacks without any call was 55.8% and 47.6% when the call was ignored. These differences were not significant (χ(2)(2) = 4.55, p = 0.103). In women's beach volleyball, the rate of successful attacks was 61.5% when a call was followed, 35% for attacks without a call, and 42.6% when a call was ignored. The differences were highly significant (χ(2)(2) = 23.42, p < 0.0005). Taking into account the findings of the present study, we suggested that the call was effective in women's beach volleyball, while its effect in men's game was unclear. Considering the quality of calls we indicate that there is a significant potential to increase the effectiveness of a call.

  13. Jasmonate-induced responses are costly but benefit plants under attack in native populations

    PubMed Central

    Baldwin, Ian T.

    1998-01-01

    Herbivore attack is widely known to reduce food quality and to increase chemical defenses and other traits responsible for herbivore resistance. Inducible defenses are commonly thought to allow plants to forgo the costs of defense when not needed; however, neither their defensive function (increasing a plant’s fitness) nor their cost-savings function have been demonstrated in nature. The root-produced toxin nicotine increases after herbivore attack in the native, postfire annual Nicotiana attenuata and is internally activated by the wound hormone, jasmonic acid. I treated the roots of plants with the methyl ester of this hormone (MeJA) to elicit a response in one member of each of 745 matched pairs of plants growing in native populations with different probabilities of attack from herbivores, and measured the lifetime production of viable seed. In populations with intermediate rates of attack, induced plants were attacked less often by herbivores and survived to produce more seed than did their uninduced counterparts. Previous induction did not significantly increase the fitness of plants suffering high rates of attack. However, if plants had not been attacked, induced plants produced less seed than did their uninduced counterparts. Jasmonate-induced responses function as defenses but are costly, and inducibility allows this species to forgo these costs when the defenses are unnecessary. PMID:9653149

  14. Vulnerability of water supply systems to cyber-physical attacks

    NASA Astrophysics Data System (ADS)

    Galelli, Stefano; Taormina, Riccardo; Tippenhauer, Nils; Salomons, Elad; Ostfeld, Avi

    2016-04-01

    The adoption of smart meters, distributed sensor networks and industrial control systems has largely improved the level of service provided by modern water supply systems. Yet, the progressive computerization exposes these critical infrastructures to cyber-physical attacks, which are generally aimed at stealing critical information (cyber-espionage) or causing service disruption (denial-of-service). Recent statistics show that water and power utilities are undergoing frequent attacks - such as the December power outage in Ukraine - , attracting the interest of operators and security agencies. Taking the security of Water Distribution Networks (WDNs) as domain of study, our work seeks to characterize the vulnerability of WDNs to cyber-physical attacks, so as to conceive adequate defense mechanisms. We extend the functionality of EPANET, which models hydraulic and water quality processes in pressurized pipe networks, to include a cyber layer vulnerable to repeated attacks. Simulation results on a medium-scale network show that several hydraulic actuators (valves and pumps, for example) can be easily attacked, causing both service disruption - i.e., water spillage and loss of pressure - and structural damages - e.g., pipes burst. Our work highlights the need for adequate countermeasures, such as attacks detection and reactive control systems.

  15. Error function attack of chaos synchronization based encryption schemes.

    PubMed

    Wang, Xingang; Zhan, Meng; Lai, C-H; Gang, Hu

    2004-03-01

    Different chaos synchronization based encryption schemes are reviewed and compared from the practical point of view. As an efficient cryptanalysis tool for chaos encryption, a proposal based on the error function attack is presented systematically and used to evaluate system security. We define a quantitative measure (quality factor) of the effective applicability of a chaos encryption scheme, which takes into account the security, the encryption speed, and the robustness against channel noise. A comparison is made of several encryption schemes and it is found that a scheme based on one-way coupled chaotic map lattices performs outstandingly well, as judged from quality factor. Copyright 2004 American Institute of Physics.

  16. Deterring watermark collusion attacks using signal processing techniques

    NASA Astrophysics Data System (ADS)

    Lemma, Aweke N.; van der Veen, Michiel

    2007-02-01

    Collusion attack is a malicious watermark removal attack in which the hacker has access to multiple copies of the same content with different watermarks and tries to remove the watermark using averaging. In the literature, several solutions to collusion attacks have been reported. The main stream solutions aim at designing watermark codes that are inherently resistant to collusion attacks. The other approaches propose signal processing based solutions that aim at modifying the watermarked signals in such a way that averaging multiple copies of the content leads to a significant degradation of the content quality. In this paper, we present signal processing based technique that may be deployed for deterring collusion attacks. We formulate the problem in the context of electronic music distribution where the content is generally available in the compressed domain. Thus, we first extend the collusion resistance principles to bit stream signals and secondly present experimental based analysis to estimate a bound on the maximum number of modified versions of a content that satisfy good perceptibility requirement on one hand and destructive averaging property on the other hand.

  17. Attack by Pyemotes johnmoseri (Acari:Pyemotidae) on Hypoborus ficus (Coleoptera:Scolytidae) in fig trees in Turkey

    Treesearch

    T. Aksit; I. Cakmak; J. Moser

    2007-01-01

    The Aegean Region of Turkey is one of the largest dried fig producers in the world. A Turkish cultivar sarilop (Ficus carica cv. Calimyrna L.) possesses good qualities for drying process, and has been grown extensively for many years in Turkey. Hypoborus ficus is the most common xylophagous insect attacking fig trees in Aydin (Aks¸...

  18. Treatment of intractable chronic cluster headache by occipital nerve stimulation: a cohort of 51 patients.

    PubMed

    Miller, S; Watkins, L; Matharu, M

    2017-02-01

    Chronic cluster headache is a rare, highly disabling primary headache condition. When medically intractable, occipital nerve stimulation can offer effective treatment. Open-label series have provided data on small cohorts only. We analyzed 51 subjects to evaluate the long-term outcomes of highly intractable chronic cluster headache with occipital nerve stimulation. Patients with intractable chronic cluster headache were implanted with occipital nerve stimulators during the period 2007-2014. The primary endpoint was improvement in daily attack frequency. Secondary endpoints included attack severity, attack duration, quality-of-life measures, headache disability scores and adverse events. We studied 51 patients [35 males; mean age at implant 47.78 (range 31-70) years; mean follow-up 39.17 (range 2-81) months]. Nineteen patients had other chronic headache types in addition in chronic cluster headache. At final follow-up, there was a 46.1% improvement in attack frequency (P < 0001) across all patients, 49.5% (P < 0.001) in those with cluster headache alone and 40.3% (P = 0.036) in those with multiple phenotypes. There were no significant differences in response in those with or without multiple headache types. The overall response rate (defined as at least a 50% improvement in attack frequency) was 52.9%. Significant reductions were also seen in attack duration and severity. Improvements were noted in headache disability scores and quality-of-life measures. Triptan use of responders dropped by 62.56%, resulting in significant cost savings. Adverse event rates were highly favorable. Occipital nerve stimulation appears to be a safe and efficacious treatment for highly intractable chronic cluster headache even after a mean follow-up of over 3 years. © 2016 EAN.

  19. An approach to detecting deliberately introduced defects and micro-defects in 3D printed objects

    NASA Astrophysics Data System (ADS)

    Straub, Jeremy

    2017-05-01

    In prior work, Zeltmann, et al. demonstrated the negative impact that can be created by defects of various sizes in 3D printed objects. These defects may make the object unsuitable for its application or even present a hazard, if the object is being used for a safety-critical application. With the uses of 3D printing proliferating and consumer access to printers increasing, the desire of a nefarious individual or group to subvert the desired printing quality and safety attributes of a printer or printed object must be considered. Several different approaches to subversion may exist. Attackers may physically impair the functionality of the printer or launch a cyber-attack. Detecting introduced defects, from either attack, is critical to maintaining public trust in 3D printed objects and the technology. This paper presents an alternate approach. It applies a quality assurance technology based on visible light sensing to this challenge and assesses its capability for detecting introduced defects of multiple sizes.

  20. [Are pathological (or vital) anxiety and common fear the same experiences? A controlled study].

    PubMed

    Ramos Brieva, J A; Montejo Iglesias, M L; Ponce de León, C; del Valle López, P; Lafuente López, R; Cordero Villafáfila, A; Baca García, E

    1996-01-01

    Some authors affirm that the anxiety of panic attacks is endogenous and of different quality that the common fear. But objective clinical data don't exist that confirm that observation. The authors study by means of a discriminant analysis the description of the anxiety made by subject with panic attacks and normal subjects with common fear. It meet a discriminant function that shows the existence of qualitative differences between both experiences. It seem to have achieved enough empirical support in order to sustain that the anxiety of panic attacks and the common fear are two qualitatively different experiences; presumably due to their several origin.

  1. Improving the management and referral of patients with transient ischaemic attacks: a change strategy for a health community

    PubMed Central

    Wright, J; Harrison, S; McGeorge, M; Patterson, C; Russell, I; Russell, D; Small, N; Taylor, M; Walsh, M; Warren, E; Young, J

    2006-01-01

    Problem Rapid referral and management of patients with transient ischaemic attacks is a key component in the national strategy for stroke prevention. However, patients with transient ischaemic attacks are poorly identified and undertreated. Design and setting Before and after evaluation of quality improvement programme with controlled comparison in three primary care trusts reflecting diverse populations and organisational structures in an urban district in the North of England. Key measures for improvement The proportion of patients receiving antiplatelet drugs and safe driving advice on referral to a speciality clinic, and the numbers of referrals, adjusted for age, to the specialist clinic before and after the improvement programme. Strategies for change Interviews with patient and professionals to identify gaps and barriers to good practice; development of evidence based guidelines for the management of patients with transient ischaemic attacks; interactive multidisciplinary workshops for each primary care trust with feedback of individual audit results of referral practice; outreach visits to teams who were unable to attend the workshops; referral templates and desktop summaries to provide reminders of the guidelines to clinicians; incorporation of standards into professional contracts. Effects of change A significant improvement occurred in identification and referral of patients with transient ischaemic attacks to specialist clinics, with a 41% increase in referrals from trained practices compared with control practices. There were also significant improvements in the early treatment and safety advice provided to patients before referral. Lessons learnt A strategic approach to effective quality improvement across a diverse health community is feasible and achievable. Careful planning with patient and professional involvement to develop a tailored and multifaceted quality improvement programme to implement evidence based practice can work in very different primary care settings. Key components of the effectiveness of the model include contextual analysis, strong professional support, clear recommendations based on robust evidence, simplicity of adoption, good communication, and use of established networks and opinion leaders. PMID:16456203

  2. Improving the management and referral of patients with transient ischaemic attacks: a change strategy for a health community.

    PubMed

    Wright, J; Harrison, S; McGeorge, M; Patterson, C; Russell, I; Russell, D; Small, N; Taylor, M; Walsh, M; Warren, E; Young, J

    2006-02-01

    Rapid referral and management of patients with transient ischaemic attacks is a key component in the national strategy for stroke prevention. However, patients with transient ischaemic attacks are poorly identified and undertreated. Before and after evaluation of quality improvement programme with controlled comparison in three primary care trusts reflecting diverse populations and organisational structures in an urban district in the North of England. The proportion of patients receiving antiplatelet drugs and safe driving advice on referral to a specialty clinic, and the numbers of referrals, adjusted for age, to the specialist clinic before and after the improvement programme. Interviews with patient and professionals to identify gaps and barriers to good practice; development of evidence based guidelines for the management of patients with transient ischaemic attacks; interactive multidisciplinary workshops for each primary care trust with feedback of individual audit results of referral practice; outreach visits to teams who were unable to attend the workshops; referral templates and desktop summaries to provide reminders of the guidelines to clinicians; incorporation of standards into professional contracts. A significant improvement occurred in identification and referral of patients with transient ischaemic attacks to specialist clinics, with a 41% increase in referrals from trained practices compared with control practices. There were also significant improvements in the early treatment and safety advice provided to patients before referral. A strategic approach to effective quality improvement across a diverse health community is feasible and achievable. Careful planning with patient and professional involvement to develop a tailored and multifaceted quality improvement programme to implement evidence based practice can work in very different primary care settings. Key components of the effectiveness of the model include contextual analysis, strong professional support, clear recommendations based on robust evidence, simplicity of adoption, good communication, and use of established networks and opinion leaders.

  3. Effect of using different cover image quality to obtain robust selective embedding in steganography

    NASA Astrophysics Data System (ADS)

    Abdullah, Karwan Asaad; Al-Jawad, Naseer; Abdulla, Alan Anwer

    2014-05-01

    One of the common types of steganography is to conceal an image as a secret message in another image which normally called a cover image; the resulting image is called a stego image. The aim of this paper is to investigate the effect of using different cover image quality, and also analyse the use of different bit-plane in term of robustness against well-known active attacks such as gamma, statistical filters, and linear spatial filters. The secret messages are embedded in higher bit-plane, i.e. in other than Least Significant Bit (LSB), in order to resist active attacks. The embedding process is performed in three major steps: First, the embedding algorithm is selectively identifying useful areas (blocks) for embedding based on its lighting condition. Second, is to nominate the most useful blocks for embedding based on their entropy and average. Third, is to select the right bit-plane for embedding. This kind of block selection made the embedding process scatters the secret message(s) randomly around the cover image. Different tests have been performed for selecting a proper block size and this is related to the nature of the used cover image. Our proposed method suggests a suitable embedding bit-plane as well as the right blocks for the embedding. Experimental results demonstrate that different image quality used for the cover images will have an effect when the stego image is attacked by different active attacks. Although the secret messages are embedded in higher bit-plane, but they cannot be recognised visually within the stegos image.

  4. F-8C digital CCV flight control laws

    NASA Technical Reports Server (NTRS)

    Hartmann, G. L.; Hauge, J. A.; Hendrick, R. C.

    1976-01-01

    A set of digital flight control laws were designed for the NASA F-8C digital fly-by-wire aircraft. The control laws emphasize Control Configured Vehicle (CCV) benefits. Specific pitch axis objectives were improved handling qualities, angle-of-attack limiting, gust alleviation, drag reduction in steady and maneuvering flight, and a capability to fly with reduced static stability. The lateral-directional design objectives were improved Dutch roll damping and turn coordination over a wide range in angle-of-attack. An overall program objective was to explore the use of modern control design methodilogy to achieve these specific CCV benefits. Tests for verifying system integrity, an experimental design for handling qualities evaluation, and recommended flight test investigations were specified.

  5. Presentation Attack Detection for Iris Recognition System Using NIR Camera Sensor

    PubMed Central

    Nguyen, Dat Tien; Baek, Na Rae; Pham, Tuyen Danh; Park, Kang Ryoung

    2018-01-01

    Among biometric recognition systems such as fingerprint, finger-vein, or face, the iris recognition system has proven to be effective for achieving a high recognition accuracy and security level. However, several recent studies have indicated that an iris recognition system can be fooled by using presentation attack images that are recaptured using high-quality printed images or by contact lenses with printed iris patterns. As a result, this potential threat can reduce the security level of an iris recognition system. In this study, we propose a new presentation attack detection (PAD) method for an iris recognition system (iPAD) using a near infrared light (NIR) camera image. To detect presentation attack images, we first localized the iris region of the input iris image using circular edge detection (CED). Based on the result of iris localization, we extracted the image features using deep learning-based and handcrafted-based methods. The input iris images were then classified into real and presentation attack categories using support vector machines (SVM). Through extensive experiments with two public datasets, we show that our proposed method effectively solves the iris recognition presentation attack detection problem and produces detection accuracy superior to previous studies. PMID:29695113

  6. Presentation Attack Detection for Iris Recognition System Using NIR Camera Sensor.

    PubMed

    Nguyen, Dat Tien; Baek, Na Rae; Pham, Tuyen Danh; Park, Kang Ryoung

    2018-04-24

    Among biometric recognition systems such as fingerprint, finger-vein, or face, the iris recognition system has proven to be effective for achieving a high recognition accuracy and security level. However, several recent studies have indicated that an iris recognition system can be fooled by using presentation attack images that are recaptured using high-quality printed images or by contact lenses with printed iris patterns. As a result, this potential threat can reduce the security level of an iris recognition system. In this study, we propose a new presentation attack detection (PAD) method for an iris recognition system (iPAD) using a near infrared light (NIR) camera image. To detect presentation attack images, we first localized the iris region of the input iris image using circular edge detection (CED). Based on the result of iris localization, we extracted the image features using deep learning-based and handcrafted-based methods. The input iris images were then classified into real and presentation attack categories using support vector machines (SVM). Through extensive experiments with two public datasets, we show that our proposed method effectively solves the iris recognition presentation attack detection problem and produces detection accuracy superior to previous studies.

  7. High-performance compression and double cryptography based on compressive ghost imaging with the fast Fourier transform

    NASA Astrophysics Data System (ADS)

    Leihong, Zhang; Zilan, Pan; Luying, Wu; Xiuhua, Ma

    2016-11-01

    To solve the problem that large images can hardly be retrieved for stringent hardware restrictions and the security level is low, a method based on compressive ghost imaging (CGI) with Fast Fourier Transform (FFT) is proposed, named FFT-CGI. Initially, the information is encrypted by the sender with FFT, and the FFT-coded image is encrypted by the system of CGI with a secret key. Then the receiver decrypts the image with the aid of compressive sensing (CS) and FFT. Simulation results are given to verify the feasibility, security, and compression of the proposed encryption scheme. The experiment suggests the method can improve the quality of large images compared with conventional ghost imaging and achieve the imaging for large-sized images, further the amount of data transmitted largely reduced because of the combination of compressive sensing and FFT, and improve the security level of ghost images through ciphertext-only attack (COA), chosen-plaintext attack (CPA), and noise attack. This technique can be immediately applied to encryption and data storage with the advantages of high security, fast transmission, and high quality of reconstructed information.

  8. Accountability and Professionalism: A Contradiction in Terms?

    ERIC Educational Resources Information Center

    Cheng, Ming

    2012-01-01

    Declining trust in public services has led to increasing calls for higher education to be "accountable" for the quality of its teaching and learning provision. However, increasing levels of quality evaluation have led academics to feel that their professionalism is under attack. Reflecting on this history and various dimensions of…

  9. Sleep and chronobiology in cluster headache.

    PubMed

    Barloese, M; Lund, N; Petersen, A; Rasmussen, M; Jennum, P; Jensen, R

    2015-10-01

    Cluster headache (CH) is the headache disorder with the strongest chronobiological traits. The severe attacks of pain occur with diurnal and annual rhythmicity but the precise rhythm and involvement of potential zeitgebers is unknown. Patients complain of poor sleep quality yet this has never been studied. We investigated triggers, rhythms, sleep quality and chronotypes in CH. Patients and controls completed questionnaires and structured interviews composed of new and previously validated parts including the Pittsburgh Sleep Quality Index (PSQI) and Morningness-Eveningness Questionnaire (MEQ). Patients were characterized by a CH index, a unified measure of headache burden. A total of 275 CH patients and 145 matched controls were included. The most common trigger was sleep (80%) and a relationship between clusters and daylight was identified. Of the patients, 82.2% reported diurnal and 56% annual rhythmicity. Patients reported impaired sleep quality (PSQI) (p < 0.0001) and an inverse relationship between time passed since last attack and sleep quality was identified (p < 0.0001). The CH index was positively related to the PSQI (p < 0.0001). Diurnally, CH exhibits a relationship with night-time and annually with daylight hours. Patients' sleep quality is reduced compared with controls. Results suggest a complex relationship as sleep quality improves between clusters, but remains pathological. © International Headache Society 2015.

  10. Cluster headache: clinical features and therapeutic options.

    PubMed

    Gaul, Charly; Diener, Hans-Christoph; Müller, Oliver M

    2011-08-01

    Cluster headache is the most common type of trigemino-autonomic headache, affecting ca. 120 000 persons in Germany alone. The attacks of pain are in the periorbital area on one side, last 90 minutes on average, and are accompanied by trigemino-autonomic manifestations and restlessness. Most patients have episodic cluster headache; about 15% have chronic cluster headache, with greater impairment of their quality of life. The attacks often possess a circadian and seasonal rhythm. Selective literature review Oxygen inhalation and triptans are effective acute treatment for cluster attacks. First-line drugs for attack prophylaxis include verapamil and cortisone; alternatively, lithium and topiramate can be given. Short-term relief can be obtained by the subcutaneous infiltration of local anesthetics and steroids along the course of the greater occipital nerve, although most of the evidence in favor of this is not derived from randomized clinical trials. Patients whose pain is inadequately relieved by drug treatment can be offered newer, invasive treatments, such as deep brain stimulation in the hypothalamus (DBS) and bilateral occipital nerve stimulation (ONS). Pharmacotherapy for the treatment of acute attacks and for attack prophylaxis is effective in most patients. For the minority who do not gain adequate relief, newer invasive techniques are available in some referral centers. Definitive conclusions as to their value cannot yet be drawn from the available data.

  11. In-blade angle of attack measurement and comparison with models

    NASA Astrophysics Data System (ADS)

    Gallant, T. E.; Johnson, D. A.

    2016-09-01

    The torque generated by a wind turbine blade is dependent on several parameters, one of which is the angle of attack. Several models for predicting the angle of attack in yawed conditions have been proposed in the literature, but there is a lack of experimental data to use for direct validation. To address this problem, experiments were conducted at the University of Waterloo Wind Generation Research Facility using a 3.4 m diameter test turbine. A five-hole pressure probe was installed in a modular 3D printed blade and was used to measure the angle of attack, a, as a function of several parameters. Measurements were conducted at radial positions of r/R = 0.55 and 0.72 at tip speed ratios of λ = 5.0, 3.6, and 3.1. The yaw offset of the turbine was varied from -15° to +15°. Experimental results were compared directly to angle of attack values calculated using a model proposed by Morote in 2015. Modeled values were found to be in close agreement with the experimental results. The angle of attack was shown to vary cyclically in the yawed case while remaining mostly constant when aligned with the flow, as expected. The quality of results indicates the potential of the developed instrument for wind turbine measurements.

  12. Results from flight and simulator studies of a Mach 3 cruise longitudinal autopilot

    NASA Technical Reports Server (NTRS)

    Gilyard, G. B.; Smith, J. W.

    1978-01-01

    At Mach numbers of approximately 3.0 and altitudes greater than 21,300 meters, the original altitude and Mach hold modes of the YF-12 autopilot produced aircraft excursions that were erratic or divergent, or both. Flight data analysis and simulator studies showed that the sensitivity of the static pressure port to angle of attack had a detrimental effect on the performance of the altitude and Mach hold modes. Good altitude hold performance was obtained when a high passed pitch rate feedback was added to compensate for angle of attack sensitivity and the altitude error and integral altitude gains were reduced. Good Mach hold performance was obtained when the angle of attack sensitivity was removed; however, the ride qualities remained poor.

  13. H.264/AVC digital fingerprinting based on spatio-temporal just noticeable distortion

    NASA Astrophysics Data System (ADS)

    Ait Saadi, Karima; Bouridane, Ahmed; Guessoum, Abderrezak

    2014-01-01

    This paper presents a robust adaptive embedding scheme using a modified Spatio-Temporal noticeable distortion (JND) model that is designed for tracing the distribution of the H.264/AVC video content and protecting them from unauthorized redistribution. The Embedding process is performed during coding process in selected macroblocks type Intra 4x4 within I-Frame. The method uses spread-spectrum technique in order to obtain robustness against collusion attacks and the JND model to dynamically adjust the embedding strength and control the energy of the embedded fingerprints so as to ensure their imperceptibility. Linear and non linear collusion attacks are performed to show the robustness of the proposed technique against collusion attacks while maintaining visual quality unchanged.

  14. Socio-professional handicap and accidental risk in patients with hypersomnias of central origin.

    PubMed

    Bayon, Virginie; Léger, Damien; Philip, Pierre

    2009-12-01

    Narcolepsy and idiopathic hypersomnia profoundly affect quality of life, education and work. Young patients are very handicapped by unexpected sleep episodes during lessons. Professionals frequently complain about sleepiness at work. Motor discomfort (i.e., cataplectic attacks) surprisingly is less handicapping in narcoleptics than sleepiness but only a few studies clearly assess the problem. Quality of life is also largely impaired in its physical and emotional dimensions. Sleepiness is the major factor explaining a decrease of quality of life and unexpectedly cataplectic attacks have little impact on patients. Another potential problem for these patients is the risk of accidents at work or when driving. Narcoleptic and hypersomniac patients have a higher risk of accidents than apneic or insomniac subjects. But, confounding factors such as duration of driving, number of cataplectic attacks or even objective level of alertness are not always entered in the analytic models mainly because of small samples of patients. Unlike in apneic patients, the effect of treatment on accidental risk has not been studied in narcoleptics or in hypersomniacs. Epidemiological data are needed to improve knowledge concerning these areas. Clinical trials assessing the impact of treatment on driving and work are also urgently needed. Finally, medical treatment does not seem to be completely efficient and physicians should pay more attention to the education, work, life and social environment of their patients.

  15. IAQ Tools for Schools: Managing Asthma in the School Environment.

    ERIC Educational Resources Information Center

    Environmental Protection Agency, Washington, DC. Office of Radiation and Indoor Air.

    This manual provides tips on improving indoor air quality within the school environment by removing the elements that trigger asthma attacks in children, and presents a list of organizations where asthma resource information can be obtained. Air quality management tips cover removing of animal and cockroach allergens, cleaning up mold and…

  16. Health Conditions and Perceived Quality of Life in Retirement.

    ERIC Educational Resources Information Center

    Dorfman, Lorraine T.

    1995-01-01

    Investigates the effects of specific health conditions on perceived quality of life for retirees (n=451). Pulmonary disease was a predictor of dissatisfaction for both sexes. Pulmonary disease and heart attack were the strongest predictors of dissatisfaction with health for men, followed closely by stroke. Arthritis was the strongest predictor of…

  17. Application of a chitosan coating as a carrier for natamycin to maintain the storage quality of ground cherry (Physalis pubescens L.)*

    PubMed Central

    Hao, Xiao-lei; Zhang, Jiao-jiao; Li, Xi-hong; Wang, Wei

    2017-01-01

    Ground cherry (Physalis pubescens L.) is a kind of berry fruit favored by consumers in China; however, this fruit is particularly vulnerable to physiological senescence and pathogen attack during the traditional cold storage period. In order to maintain storage quality, a 1.5% (w/w) chitosan (CS) water solution containing 50 mg/L of natamycin (NA) was introduced. After all treatments were completed, the fruit was stored at 0 °C and sampled every 10 d. At each sampling date, the following tests were performed: mold and yeast analyses; enzyme activity and content analyses which included superoxide dismutase (SOD), ascorbate peroxidase (APX), and malondialdehyde (MDA); and color analysis. In addition, a sensory evaluation was carried out for quality assessment at the end of the storage period. The results showed that the application of a chitosan coating combined with natamycin (CSNA) enhanced the activity of superoxide dismutase (SOD) and ascorbate peroxidase (APX), reduced the physiological rate of senescence, and inhibited pathogen attack. Thus, CSNA treatment can maintain ground cherries at an acceptable level of storage quality for 50 d.

  18. Review of attacks on health care facilities in six conflicts of the past three decades.

    PubMed

    Briody, Carolyn; Rubenstein, Leonard; Roberts, Les; Penney, Eamon; Keenan, William; Horbar, Jeffrey

    2018-01-01

    In the ongoing conflicts of Syria and Yemen, there have been widespread reports of attacks on health care facilities and personnel. Tabulated evidence does suggest hospital bombings in Syria and Yemen are far higher than reported in other conflicts but it is unclear if this is a reporting artefact. This article examines attacks on health care facilities in conflicts in six middle- to high- income countries that have occurred over the past three decades to try and determine if attacks have become more common, and to assess the different methods used to collect data on attacks. The six conflicts reviewed are Yemen (2015-Present), Syria (2011- Present), Iraq (2003-2011), Chechnya (1999-2000), Kosovo (1998-1999), and Bosnia and Herzegovina (1992-1995). We attempted to get the highest quality source(s) with summary data of the number of facilities attacked for each of the conflicts. The only conflict that did not have summary data was the conflict in Iraq. In this case, we tallied individual reported events of attacks on health care. Physicians for Human Rights (PHR) reported attacks on 315 facilities (4.38 per month) in Syria over a 7-year period, while the Monitoring Violence against Health Care (MVH) tool launched later by the World Health Organization (WHO) Turkey Health Cluster reported attacks on 135 facilities (9.64 per month) over a 14-month period. Yemen had a reported 93 attacks (4.65 per month), Iraq 12 (0.12 per month), Chechnya > 24 (2.4 per month), Kosovo > 100 (6.67 per month), and Bosnia 21 (0.41 per month). Methodologies to collect data, and definitions of both facilities and attacks varied widely across sources. The number of reported facilities attacked is by far the greatest in Syria, suggesting that this phenomenon has increased compared to earlier conflicts. However, data on attacks of facilities was incomplete for all of the conflicts examined, methodologies varied widely, and in some cases, attacks were not defined at all. A global, standardized system that allows multiple reporting routes with different levels of confirmation, as seen in Syria, would likely allow for a more reliable and reproducible documentation system, and potentially, an increase in accountability.

  19. The Alberta Stroke Prevention in TIAs and mild strokes (ASPIRE) intervention: rationale and design for evaluating the implementation of a province-wide TIA triaging system.

    PubMed

    Jeerakathil, Thomas; Shuaib, Ashfaq; Majumdar, Sumit R; Demchuk, Andrew M; Butcher, Kenneth S; Watson, Tim J; Dean, Naeem; Gordon, Deb; Edmond, Cathy; Coutts, Shelagh B

    2014-10-01

    Stroke risk after transient ischaemic attack is high and, it is a challenge worldwide to provide urgent assessment and preventive services to entire populations. To determine whether a province-wide transient ischaemic attack Triaging algorithm and transient ischaemic attack hotline (the Alberta Stroke Prevention in transient ischaemic attacks and mild strokes intervention) can reduce the rate of stroke recurrence following transient ischaemic attack across the population of Alberta, Canada (population 3·7 million, 90-day rate of post-stroke transient ischaemic attack currently 9·5%). It also seeks to improve upon current transient ischaemic attack triaging rules by incorporating time from symptom onset as a predictive variable. The transient ischaemic attack algorithm and hotline were developed with a broad consensus of clinicians, patients, policy-makers, and researchers and based on local adaptation of the work of others and research and insights developed within the province. Because neither patient-level nor region-level randomization was possible, we conducted a quasi-experimental design examining changes in the post-transient ischaemic attack rate of stroke recurrence before and after the 15-month implementation period using an interrupted time-series regression analysis. The design controls for changes in case-mix, co-interventions, and secular trends. A prospective transient ischaemic attack cohort will also be concurrently created with telephone follow-up at seven-days and 90 days as well as passive follow-up over the longer term using linkages to provincial healthcare administrative databases. The primary outcome measure is the change in recurrence rate of stroke following transient ischaemic attack at seven-days and 90 days, comparing a period of two-years before vs. two-years after the intervention is implemented. All cases of recurrent stroke will be validated. Secondary outcomes include functional status, hospitalizations, morbidity, and mortality. We are undertaking a rigorous evaluation of a population-based approach to improving quality of transient ischaemic attack care. Whether positive or negative, our work should provide important insights for all potential stakeholders. © 2012 The Authors. International Journal of Stroke © 2012 World Stroke Organization.

  20. A Proposed Roadmap for Inpatient Neurology Quality Indicators

    PubMed Central

    Douglas, Vanja C.; Josephson, S. Andrew

    2011-01-01

    Background/Purpose: In recent years, there has been increasing pressure to measure and report quality in health care. However, there has been little focus on quality measurement in the field of neurology for conditions other than stroke and transient ischemic attack. As the number of evidence-based treatments for neurological conditions grows, so will the demand to measure the quality of care delivered. The purpose of this study was to review essential components of hospital performance measures for neurological disease and propose potential quality indicators for commonly encountered inpatient neurological diagnoses. Methods: We determined the most common inpatient neurological diagnoses at a major tertiary care medical center by reviewing the billing database. We then searched PubMed and the National Guidelines Clearinghouse to identify treatment guidelines for these conditions. Guideline recommendations with class I/level A evidence were evaluated as possible quality indicators. Results: We found 94 guidelines for 14 inpatient neurological conditions other than stroke and transient ischemic attack. Of these, 36 guidelines contained at least 1 recommendation with class I evidence. Based on these, potential quality indicators for intracerebral hemorrhage, subarachnoid hemorrhage, pneumococcal meningitis, coma following cardiac arrest, encephalitis, Guillain-Barre syndrome, multiple sclerosis, and benign paroxysmal positional vertigo are proposed. Conclusions: There are several inpatient neurological conditions with treatments or diagnostic test routines supported by high levels of evidence that could be used in the future as quality indicators. PMID:23983832

  1. The Weather and Ménière's Disease: A Longitudinal Analysis in the UK.

    PubMed

    Schmidt, Wiebke; Sarran, Christophe; Ronan, Natalie; Barrett, George; Whinney, David J; Fleming, Lora E; Osborne, Nicholas J; Tyrrell, Jessica

    2017-02-01

    Changes in the weather influence symptom severity in Ménière's disease (MD). MD is an unpredictable condition that significantly impacts on quality of life. It is suggested that fluctuations in the weather, especially atmospheric pressure may influence the symptoms of MD. However, to date, limited research has investigated the impact of the weather on MD. In a longitudinal study, a mobile phone application collected data from 397 individuals (277 females and 120 males with an average age of 50 yr) from the UK reporting consultant-diagnosed MD. Daily symptoms (vertigo, aural fullness, tinnitus, hearing loss, and attack prevalence) and GPS locations were collected; these data were linked with Met Office weather data (including atmospheric pressure, humidity, temperature, visibility, and wind speed). Symptom severity and attack prevalence were reduced on days when atmospheric pressure was higher. When atmospheric pressure was below 1,013 hectopascals, the risk of an attack was 1.30 (95% confidence interval: 1.10, 1.54); when the humidity was above 90%, the risk of an attack was 1.26 (95% confidence interval 1.06, 1.49). This study provides the strongest evidence to date that changes in atmospheric pressure and humidity are associated with symptom exacerbation in MD. Improving our understanding of the role of weather and other environmental triggers in Ménière's may reduce the uncertainty associated with living with this condition, significantly contributing to improved quality of life.

  2. The Weather and Ménière’s Disease: A Longitudinal Analysis in the UK

    PubMed Central

    Schmidt, Wiebke; Sarran, Christophe; Ronan, Natalie; Barrett, George; Whinney, David J.; Fleming, Lora E.; Osborne, Nicholas J.; Tyrrell, Jessica

    2016-01-01

    Hypothesis Changes in the weather influence symptom severity in Ménière’s disease (MD). Background MD is an unpredictable condition that significantly impacts on quality of life. It is suggested that fluctuations in the weather, especially atmospheric pressure may influence the symptoms of MD. However, to date, limited research has investigated the impact of the weather on MD. Methods In a longitudinal study, a mobile phone application collected data from 397 individuals (277 females and 120 males with an average age of 50 yr) from the UK reporting consultant-diagnosed MD. Daily symptoms (vertigo, aural fullness, tinnitus, hearing loss, and attack prevalence) and GPS locations were collected; these data were linked with Met Office weather data (including atmospheric pressure, humidity, temperature, visibility, and wind speed). Results Symptom severity and attack prevalence were reduced on days when atmospheric pressure was higher. When atmospheric pressure was below 1,013 hectopascals, the risk of an attack was 1.30 (95% confidence interval: 1.10, 1.54); when the humidity was above 90%, the risk of an attack was 1.26 (95% confidence interval 1.06, 1.49). Conclusion This study provides the strongest evidence to date that changes in atmospheric pressure and humidity are associated with symptom exacerbation in MD. Improving our understanding of the role of weather and other environmental triggers in Ménière’s may reduce the uncertainty associated with living with this condition, significantly contributing to improved quality of life. PMID:27861300

  3. Elucidation of covariant proofs in general relativity: example of the use of algebraic software in the shear-free conjecture in MAPLE

    NASA Astrophysics Data System (ADS)

    Huf, P. A.; Carminati, J.

    2018-01-01

    In this paper we explore the use of a new algebraic software package in providing independent covariant proof of a conjecture in general relativity. We examine the proof of two sub-cases of the shear-free conjecture σ =0 => ω Θ =0 by Senovilla et al. (Gen. Relativ. Gravit 30:389-411, 1998): case 1: for dust; case 2: for acceleration parallel to vorticity. We use TensorPack, a software package recently released for the Maple environment. In this paper, we briefly summarise the key features of the software and then demonstrate its use by providing and discussing examples of independent proofs of the paper in question. A full set of our completed proofs is available online at http://www.bach2roq.com/science/maths/GR/ShearFreeProofs.html. We are in agreeance with the equations provided in the original paper, noting that the proofs often require many steps. Furthermore, in our proofs we provide fully worked algebraic steps in such a way that the proofs can be examined systematically, and avoiding hand calculation. It is hoped that the elucidated proofs may be of use to other researchers in verifying the algebraic consistency of the expressions in the paper in question, as well as related literature. Furthermore we suggest that the appropriate use of algebraic software in covariant formalism could be useful for developing research and teaching in GR theory.

  4. A framework for analyzing the impact of data integrity/quality on electricity market operations

    NASA Astrophysics Data System (ADS)

    Choi, Dae Hyun

    This dissertation examines the impact of data integrity/quality in the supervisory control and data acquisition (SCADA) system on real-time locational marginal price (LMP) in electricity market operations. Measurement noise and/or manipulated sensor errors in a SCADA system may mislead system operators about real-time conditions in a power system, which, in turn, may impact the price signals in real-time power markets. This dissertation serves as a first attempt to analytically investigate the impact of bad/malicious data on electric power market operations. In future power system operations, which will probably involve many more sensors, the impact of sensor data integrity/quality on grid operations will become increasingly important. The first part of this dissertation studies from a market participant's perspective a new class of malicious data attacks on state estimation, which subsequently influences the result of the newly emerging look-ahead dispatch models in the real-time power market. In comparison with prior work of cyber-attack on static dispatch where no inter-temporal ramping constraint is considered, we propose a novel attack strategy, named ramp-induced data (RID) attack, with which the attacker can manipulate the limits of ramp constraints of generators in look-ahead dispatch. It is demonstrated that the proposed attack can lead to financial profits via malicious capacity withholding of selected generators, while being undetected by the existing bad data detection algorithm embedded in today's state estimation software. In the second part, we investigate from a system operator's perspective the sensitivity of locational marginal price (LMP) with respect to data corruption-induced state estimation error in real-time power market. Two data corruption scenarios are considered, in which corrupted continuous data (e.g., the power injection/flow and voltage magnitude) falsify power flow estimate whereas corrupted discrete data (e.g., the on/off status of a circuit breaker) do network topology estimate, thus leading to the distortion of LMP. We present an analytical framework to quantify real-time LMP sensitivity subject to continuous and discrete data corruption via state estimation. The proposed framework offers system operators an analytical tool to identify economically sensitive buses and transmission lines to data corruption as well as find sensors that impact LMP changes significantly. This dissertation serves as a first step towards rigorous understanding of the fundamental coupling among cyber, physical and economical layers of operations in future smart grid.

  5. Novel Psychological Formulation and Treatment of "Tic Attacks" in Tourette Syndrome.

    PubMed

    Robinson, Sally; Hedderly, Tammy

    2016-01-01

    One important, but underreported, phenomenon in Tourette syndrome (TS) is the occurrence of "tic attacks." These episodes have been described at conferences as sudden bouts of tics and/or functional tic-like movements, lasting from 15 min to several hours. They have also been described by patients in online TS communities. To date, there are no reports of tic attacks in the literature. The aim of this article is to stimulate discussion and inform clinical practices by describing the clinical presentation of 12 children (mean age 11 years and 3 months; SD = 2 years and 4 months) with TS and tic attacks, with a detailed case report for one case (13-year-old male). These children commonly present acutely to casualty departments and undergo unnecessary medical investigations. Interestingly, all children reported comorbid anxiety, with worries about the tics themselves and an increased internal focus of attention on tics once the attacks had started. In keeping with other children, the index case reported a strong internal focus of attention, with a relationship between physiological sensations/tic urges, worries about having tic attacks, and behavioral responses (e.g., body scanning, situational avoidance, and other responses). In our experience, the attacks reduce with psychological therapy, for example, the index case attended 13 sessions of therapy that included metacognitive and attention training techniques, as well as cognitive-behavioral strategies. Following treatment, an improvement was seen across a range of measures assessing tics, mood, anxiety, and quality of life. Thus, psychological techniques used to treat anxiety disorders are effective at supporting a reduction in tic attacks through modifying attention, worry processes, and negative beliefs. It is hypothesized that an attentional style of threat monitoring, difficulties tolerating internal sensory urges, cognitive misattributions, and maladaptive coping strategies contribute to the onset and maintenance of tic attacks. These cases provide support for the view that tic attacks are triggered and maintained by psychological factors, thereby challenging the view that tic attacks merely reflect extended bouts of tics. As such, we propose that the movements seen in tic attacks may resemble a combination of tics and functional neurological movements, with tic attacks reflecting episodes of panic and anxiety for individuals with TS.

  6. Health-related quality of life and treatment satisfaction in patients with gout: results from a cross-sectional study in a managed care setting.

    PubMed

    Khanna, Puja P; Shiozawa, Aki; Walker, Valery; Bancroft, Tim; Essoi, Breanna; Akhras, Kasem S; Khanna, Dinesh

    2015-01-01

    Patient satisfaction with treatment directly impacts adherence to medication. The objective was to assess and compare treatment satisfaction with the Treatment Satisfaction Questionnaire for Medication (TSQM), gout-specific health-related quality of life (HRQoL) with the Gout Impact Scale (GIS), and generic HRQoL with the SF-12v2(®) Health Survey (SF-12) in patients with gout in a real-world practice setting. This cross-sectional mail survey included gout patients enrolled in a large commercial health plan in the US. Patients were ≥18 years with self-reported gout diagnosis, who filled ≥1 prescription for febuxostat during April 26, 2012 to July 26, 2012 and were not taking any other urate-lowering therapies. The survey included the TSQM version II (TSQM vII, score 0-100, higher scores indicate better satisfaction), GIS (score 0-100, higher scores indicate worse condition), and SF-12 (physical component summary and mental component summary). Patients were stratified by self-report of currently experiencing a gout attack or not to assess the discriminant ability of the questionnaires. A total of 257 patients were included in the analysis (mean age, 54.9 years; 87% male). Patients with current gout attack (n=29, 11%) had worse scores than those without gout attack on most instrument scales. Mean differences between current attack and no current attack for the TSQM domains were: -20.6, effectiveness; -10.6, side effects; -12.1, global satisfaction (all P<0.05); and -6.1, convenience (NS). For the GIS, mean differences were: 30.5, gout overall concern; 14.6, gout medication side effects; 22.7, unmet gout treatment needs; 11.5, gout concern during attack (all P<0.05); and 7.9, well-being during attack (NS). Mean difference in SF-12 was -6.6 for physical component summary (P<0.05) and -2.9 for mental component summary (NS). Correlations between several TSQM and GIS scales were moderate. The TSQM and GIS were complementary in evaluating the impact of gout flare on treatment satisfaction and HRQoL. Correlations between the two instruments supported the relationship between treatment satisfaction and HRQoL.

  7. Health-related quality of life and treatment satisfaction in patients with gout: results from a cross-sectional study in a managed care setting

    PubMed Central

    Khanna, Puja P; Shiozawa, Aki; Walker, Valery; Bancroft, Tim; Essoi, Breanna; Akhras, Kasem S; Khanna, Dinesh

    2015-01-01

    Background Patient satisfaction with treatment directly impacts adherence to medication. Objective The objective was to assess and compare treatment satisfaction with the Treatment Satisfaction Questionnaire for Medication (TSQM), gout-specific health-related quality of life (HRQoL) with the Gout Impact Scale (GIS), and generic HRQoL with the SF-12v2® Health Survey (SF-12) in patients with gout in a real-world practice setting. Methods This cross-sectional mail survey included gout patients enrolled in a large commercial health plan in the US. Patients were ≥18 years with self-reported gout diagnosis, who filled ≥1 prescription for febuxostat during April 26, 2012 to July 26, 2012 and were not taking any other urate-lowering therapies. The survey included the TSQM version II (TSQM vII, score 0–100, higher scores indicate better satisfaction), GIS (score 0–100, higher scores indicate worse condition), and SF-12 (physical component summary and mental component summary). Patients were stratified by self-report of currently experiencing a gout attack or not to assess the discriminant ability of the questionnaires. Results A total of 257 patients were included in the analysis (mean age, 54.9 years; 87% male). Patients with current gout attack (n=29, 11%) had worse scores than those without gout attack on most instrument scales. Mean differences between current attack and no current attack for the TSQM domains were: −20.6, effectiveness; −10.6, side effects; −12.1, global satisfaction (all P<0.05); and −6.1, convenience (NS). For the GIS, mean differences were: 30.5, gout overall concern; 14.6, gout medication side effects; 22.7, unmet gout treatment needs; 11.5, gout concern during attack (all P<0.05); and 7.9, well-being during attack (NS). Mean difference in SF-12 was −6.6 for physical component summary (P<0.05) and −2.9 for mental component summary (NS). Correlations between several TSQM and GIS scales were moderate. Conclusion The TSQM and GIS were complementary in evaluating the impact of gout flare on treatment satisfaction and HRQoL. Correlations between the two instruments supported the relationship between treatment satisfaction and HRQoL. PMID:26185426

  8. [Microbiological corrosion of aluminum alloys].

    PubMed

    Smirnov, V F; Belov, D V; Sokolova, T N; Kuzina, O V; Kartashov, V R

    2008-01-01

    Biological corrosion of ADO quality aluminum and aluminum-based construction materials (alloys V65, D16, and D16T) was studied. Thirteen microscopic fungus species and six bacterial species proved to be able to attack aluminum and its alloys. It was found that biocorrosion of metals by microscopic fungi and bacteria was mediated by certain exometabolites. Experiments on biocorrosion of the materials by the microscopic fungus Alternaria alternata, the most active biodegrader, demonstrated that the micromycete attack started with the appearance of exudate with pH 8-9 on end faces of the samples.

  9. Finland's Cleanup Campaign

    ERIC Educational Resources Information Center

    Environmental Science and Technology, 1975

    1975-01-01

    Finland has received a $20 million loan from the World Bank to attack its pollution problems, mainly water. Improved quality of life, as well as resource conservation are both motives and goals of that country's environmental programs. (BT)

  10. An analysis of a candidate control algorithm for a ride quality augmentation system

    NASA Technical Reports Server (NTRS)

    Suikat, Reiner; Donaldson, Kent; Downing, David R.

    1987-01-01

    This paper presents a detailed analysis of a candidate algorithm for a ride quality augmentation system. The algorithm consists of a full-state feedback control law based on optimal control output weighting, estimators for angle of attack and sideslip, and a maneuvering algorithm. The control law is shown to perform well by both frequency and time domain analysis. The rms vertical acceleration is reduced by about 40 percent over the whole mission flight envelope. The estimators for the angle of attack and sideslip avoid the often inaccurate or costly direct measurement of those angles. The maneuvering algorithm will allow the augmented airplane to respond to pilot inputs. The design characteristics and performance are documented by the closed-loop eigenvalues; rms levels of vertical, lateral, and longitudinal acceleration; and representative time histories and frequency response.

  11. Occipital nerve stimulation improves the quality of life in medically-intractable chronic cluster headache: Results of an observational prospective study.

    PubMed

    Fontaine, Denys; Blond, Serge; Lucas, Christian; Regis, Jean; Donnet, Anne; Derrey, Stéphane; Guegan-Massardier, Evelyne; Jarraya, Bechir; Dang-Vu, Bich; Bourdain, Frederic; Valade, Dominique; Roos, Caroline; Creach, Christèle; Chabardes, Stéphan; Giraud, Pierric; Voirin, Jimmy; Bloch, Jocelyne; Rocca, Alda; Colnat-Coulbois, Sophie; Caire, Francois; Roger, Coralie; Romettino, Sylvie; Lanteri-Minet, Michel

    2017-10-01

    Background Occipital nerve stimulation (ONS) has been proposed to treat chronic medically-intractable cluster headache (iCCH) in small series of cases without evaluation of its functional and emotional impacts. Methods We report the multidimensional outcome of a large observational study of iCCH patients, treated by ONS within a nationwide multidisciplinary network ( https://clinicaltrials.gov NCT01842763), with a one-year follow-up. Prospective evaluation was performed before surgery, then three and 12 months after. Results One year after ONS, the attack frequency per week was decreased >30% in 64% and >50% in 59% of the 44 patients. Mean (Standard Deviation) weekly attack frequency decreased from 21.5 (16.3) to 10.7 (13.8) ( p = 0.0002). About 70% of the patients responded to ONS, 47.8% being excellent responders. Prophylactic treatments could be decreased in 40% of patients. Functional (HIT-6 and MIDAS scales) and emotional (HAD scale) impacts were significantly improved, as well as the health-related quality of life (EQ-5D). The mean (SD) EQ-5D visual analogic scale score increased from 35.2 (23.6) to 51.9 (25.7) ( p = 0.0037). Surgical minor complications were observed in 33% of the patients. Conclusion ONS significantly reduced the attack frequency per week, as well as the functional and emotional headache impacts in iCCH patients, and dramatically improved the health-related quality of life of responders.

  12. Weight loss for overweight and obese individuals with gout: a systematic review of longitudinal studies.

    PubMed

    Nielsen, Sabrina M; Bartels, Else M; Henriksen, Marius; Wæhrens, Eva E; Gudbergsen, Henrik; Bliddal, Henning; Astrup, Arne; Knop, Filip K; Carmona, Loreto; Taylor, William J; Singh, Jasvinder A; Perez-Ruiz, Fernando; Kristensen, Lars E; Christensen, Robin

    2017-11-01

    Weight loss is commonly recommended for gout, but the magnitude of the effect has not been evaluated in a systematic review. The aim of this systematic review was to determine benefits and harms associated with weight loss in overweight and obese patients with gout. We searched six databases for longitudinal studies, reporting the effect of weight loss in overweight/obese gout patients. Risk of bias was assessed using the tool Risk of Bias in Non-Randomised Studies of Interventions. The quality of evidence was assessed using the Grading of Recommendations Assessment, Development and Evaluation. From 3991 potentially eligible studies, 10 were included (including one randomised trial). Interventions included diet with/without physical activity, bariatric surgery, diuretics, metformin or no intervention. Mean weight losses ranged from 3 kg to 34 kg. Clinical heterogeneity in study characteristics precluded meta-analysis. The effect on serum uric acid (sUA) ranged from -168 to 30 μmol/L, and 0%-60% patients achieving sUA target (<360 μmol/L). Six out of eight studies (75%) showed beneficial effects on gout attacks. Two studies indicated dose-response relationship for sUA, achieving sUA target and gout attacks. At short term, temporary increased sUA and gout attacks tended to occur after bariatric surgery. The available evidence is in favour of weight loss for overweight/obese gout patients, with low, moderate and low quality of evidence for effects on sUA, achieving sUA target and gout attacks, respectively. At short term, unfavourable effects may occur. Since the current evidence consists of a few studies (mostly observational) of low methodological quality, there is an urgent need to initiate rigorous prospective studies (preferably randomised controlled trials). PROSPERO, CRD42016037937. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2017. All rights reserved. No commercial use is permitted unless otherwise expressly granted.

  13. Efficient Hybrid Watermarking Scheme for Security and Transmission Bit Rate Enhancement of 3D Color-Plus-Depth Video Communication

    NASA Astrophysics Data System (ADS)

    El-Shafai, W.; El-Rabaie, S.; El-Halawany, M.; Abd El-Samie, F. E.

    2018-03-01

    Three-Dimensional Video-plus-Depth (3DV + D) comprises diverse video streams captured by different cameras around an object. Therefore, there is a great need to fulfill efficient compression to transmit and store the 3DV + D content in compressed form to attain future resource bounds whilst preserving a decisive reception quality. Also, the security of the transmitted 3DV + D is a critical issue for protecting its copyright content. This paper proposes an efficient hybrid watermarking scheme for securing the 3DV + D transmission, which is the homomorphic transform based Singular Value Decomposition (SVD) in Discrete Wavelet Transform (DWT) domain. The objective of the proposed watermarking scheme is to increase the immunity of the watermarked 3DV + D to attacks and achieve adequate perceptual quality. Moreover, the proposed watermarking scheme reduces the transmission-bandwidth requirements for transmitting the color-plus-depth 3DV over limited-bandwidth wireless networks through embedding the depth frames into the color frames of the transmitted 3DV + D. Thus, it saves the transmission bit rate and subsequently it enhances the channel bandwidth-efficiency. The performance of the proposed watermarking scheme is compared with those of the state-of-the-art hybrid watermarking schemes. The comparisons depend on both the subjective visual results and the objective results; the Peak Signal-to-Noise Ratio (PSNR) of the watermarked frames and the Normalized Correlation (NC) of the extracted watermark frames. Extensive simulation results on standard 3DV + D sequences have been conducted in the presence of attacks. The obtained results confirm that the proposed hybrid watermarking scheme is robust in the presence of attacks. It achieves not only very good perceptual quality with appreciated PSNR values and saving in the transmission bit rate, but also high correlation coefficient values in the presence of attacks compared to the existing hybrid watermarking schemes.

  14. How moths escape bats: predicting outcomes of predator-prey interactions.

    PubMed

    Corcoran, Aaron J; Conner, William E

    2016-09-01

    What determines whether fleeing prey escape from attacking predators? To answer this question, biologists have developed mathematical models that incorporate attack geometries, pursuit and escape trajectories, and kinematics of predator and prey. These models have rarely been tested using data from actual predator-prey encounters. To address this problem, we recorded multi-camera infrared videography of bat-insect interactions in a large outdoor enclosure. We documented 235 attacks by four Myotis volans bats on a variety of moths. Bat and moth flight trajectories from 50 high-quality attacks were reconstructed in 3-D. Despite having higher maximum velocity, deceleration and overall turning ability, bats only captured evasive prey in 69 of 184 attacks (37.5%); bats captured nearly all moths not evading attack (50 of 51; 98%). Logistic regression indicated that prey radial acceleration and escape angle were the most important predictors of escape success (44 of 50 attacks correctly classified; 88%). We found partial support for the turning gambit mathematical model; however, it underestimated the escape threshold by 25% of prey velocity and did not account for prey escape angle. Whereas most prey escaping strikes flee away from predators, moths typically escaped chasing bats by turning with high radial acceleration toward 'safety zones' that flank the predator. This strategy may be widespread in prey engaged in chases. Based on these findings, we developed a novel geometrical model of predation. We discuss implications of this model for the co-evolution of predator and prey kinematics and pursuit and escape strategies. © 2016. Published by The Company of Biologists Ltd.

  15. Novel Psychological Formulation and Treatment of “Tic Attacks” in Tourette Syndrome

    PubMed Central

    Robinson, Sally; Hedderly, Tammy

    2016-01-01

    One important, but underreported, phenomenon in Tourette syndrome (TS) is the occurrence of “tic attacks.” These episodes have been described at conferences as sudden bouts of tics and/or functional tic-like movements, lasting from 15 min to several hours. They have also been described by patients in online TS communities. To date, there are no reports of tic attacks in the literature. The aim of this article is to stimulate discussion and inform clinical practices by describing the clinical presentation of 12 children (mean age 11 years and 3 months; SD = 2 years and 4 months) with TS and tic attacks, with a detailed case report for one case (13-year-old male). These children commonly present acutely to casualty departments and undergo unnecessary medical investigations. Interestingly, all children reported comorbid anxiety, with worries about the tics themselves and an increased internal focus of attention on tics once the attacks had started. In keeping with other children, the index case reported a strong internal focus of attention, with a relationship between physiological sensations/tic urges, worries about having tic attacks, and behavioral responses (e.g., body scanning, situational avoidance, and other responses). In our experience, the attacks reduce with psychological therapy, for example, the index case attended 13 sessions of therapy that included metacognitive and attention training techniques, as well as cognitive–behavioral strategies. Following treatment, an improvement was seen across a range of measures assessing tics, mood, anxiety, and quality of life. Thus, psychological techniques used to treat anxiety disorders are effective at supporting a reduction in tic attacks through modifying attention, worry processes, and negative beliefs. It is hypothesized that an attentional style of threat monitoring, difficulties tolerating internal sensory urges, cognitive misattributions, and maladaptive coping strategies contribute to the onset and maintenance of tic attacks. These cases provide support for the view that tic attacks are triggered and maintained by psychological factors, thereby challenging the view that tic attacks merely reflect extended bouts of tics. As such, we propose that the movements seen in tic attacks may resemble a combination of tics and functional neurological movements, with tic attacks reflecting episodes of panic and anxiety for individuals with TS. PMID:27242975

  16. Vestibular syncope: A disorder associated with drop attack in Ménière's disease.

    PubMed

    Pyykkö, Ilmari; Manchaiah, Vinaya; Zou, Jing; Levo, Hilla; Kentala, Erna

    2018-04-01

    Experiments in humans and animals indicate that vestibular influx through vestibular sympathetic reflex is an important and vital part of the regulatory system of circulation. The otolith organ adjusts the circulatory responses through the vestibular sympathetic reflex during an upright stance and may trigger a vasovagal attack of syncope. The aim of the present study was to evaluate the prevalence and association of syncope attacks among patients with Ménière's disease (MD). Vestibular syncope was defined as a sudden and transient loss of consciousness, which subsides spontaneously in people with vestibular disorders and without localizing neurological deficit. During clinical interactions, we encountered 5 patients with syncope during a Tumarkin attack of MD. Thereafter we evaluated data from 952 patients collected with a questionnaire from the Finnish Ménière Association (FMA). The data contained case histories with special attention to Tumarkin attacks, participation restriction, migraines, and syncope attacks. The mean age of the subjects participating in the study was 60.6 years (range 25-75 years). The duration of the disease was on average 9.8 years (range 0.5-35 years). In the current study sample, attacks of syncope were reported by 38 patients (4%) in association with the vertigo attack. Syncope was associated with Tumarkin attacks (X 2 =16.7, p<0.001), migraine (X 2 =7.4, p<0.011), history of ischemic heart disease (X 2 =6.0, p<0.025), and history of cerebrovascular disease (X 2 =11.7, p<0.004). Duration of MD was correlated with syncope. Syncope was provoked by physical strain and environmental pressure, and was associated with impairment of the visual field (i.e., visual blurring). In logistic regression analysis, syncope was significantly associated with Tumarkin attacks (odds ratio 3.2), migraines (odds ratio 2.3) and nausea (odds ratio 1.3). The attack of syncope was experienced as frightening, and general health related quality of life (HRQoL) was significantly worsened. Also, the patients suffered more from fatigue. The current study indicates that patients with MD who suffer from Tumarkin attacks can suffer from syncope. It confirms the role of the otolith organ in controlling the circulatory homeostasis of the body. The actions are mediated through the vestibular sympathetic reflex. Copyright © 2017 Elsevier B.V. All rights reserved.

  17. A simulation investigation of scout/attack helicopter directional control requirements for hover and low-speed tasks

    NASA Technical Reports Server (NTRS)

    Bivens, Courtland C.; Guercio, Joseph G.

    1987-01-01

    A piloted simulator experiment was conducted to investigate directional axis handling qualities requirements for low speed and hover tasks performed by a Scout/Attack helicopter. Included were the directional characteristics of various candidate light helicopter family configurations. Also, the experiment focused on conventional single main/tail rotor configurations of the OH-58 series aircraft, where the first-order yaw-axis dynamic effects that contributed to the loss of tail rotor control were modeled. Five pilots flew 22 configurations under various wind conditions. Cooper-Harper handling quality ratings were used as the primary measure of merit of each configuration. The results of the experiment indicate that rotorcraft configurations with high directional gust sensitivity require greater minimum yaw damping to maintain satisfactory handling qualities during nap-of-the-Earth flying tasks. It was also determined that both yaw damping and control response are critical handling qualities parameters in performing the air-to-air target acquisition and tracking task. Finally, the lack of substantial yaw damping and larger values of gust sensitivity increased the possibility of loss of directional control at low airspeeds for the single main/tail rotor configurations.

  18. Health-related quality of life two years after injury due to terrorism.

    PubMed

    Tuchner, Maya; Meiner, Zeev; Parush, Shula; Hartman-Maeir, Adina

    2010-01-01

    During the past few decades, terrorist acts have been an unfortunate reality worldwide. There is a striking paucity of research investigating the multitude of long-term outcomes after severe physical injury due to terrorist attacks, a unique subgroup of trauma patients. The purpose of this study was to provide a profile of the long-term health-related quality of life (HR-QOL) after injury due to terrorist attacks and to explore the relationships between Post Traumatic Stress Disorder (PTSD), occupational status and injury severity with HR-QOL. We included 35 survivors of terrorist attacks living in the community, two years on average after the injury, mean age at follow-up = 32.1 (±13.8), mean Injury Severity Score (ISS) = 27 (±14.2). The subjects were recruited from consecutive admissions to a rehabilitation department in a tertiary care center between September 2000 - June 2004. Most of the subjects suffered multiple trauma. The main outcome measures were the Short-Form Health Survey (SF-36), Post Traumatic Diagnostic Scale and return to work rates. The mean scores on 6/8 of the SF-36 subscales were significantly lower among the survivors compared to normative population norms. Post Traumatic Stress Disorder (PTSD) was found in 39% of the sample and 43% did not resume their main occupation two years after the injury. Multivariate analysis of variance of PTSD and occupational status (returned vs. did not return to work) on quality of life scores revealed significant main effects for both PTSD (p=. 000) and occupational status (p=. 005) with no interaction effect (p=. 476). No significant correlations were found between injury severity and the SF-36 scores. This study demonstrated the long-term impact of injury due to terrorism. Results showed independent effects of PTSD and occupational status on health related quality of life, two years after injury. These findings suggest that this group may benefit from intervention focusing on their emotional and occupational status in order to improve their quality of life.

  19. Application of graph-based semi-supervised learning for development of cyber COP and network intrusion detection

    NASA Astrophysics Data System (ADS)

    Levchuk, Georgiy; Colonna-Romano, John; Eslami, Mohammed

    2017-05-01

    The United States increasingly relies on cyber-physical systems to conduct military and commercial operations. Attacks on these systems have increased dramatically around the globe. The attackers constantly change their methods, making state-of-the-art commercial and military intrusion detection systems ineffective. In this paper, we present a model to identify functional behavior of network devices from netflow traces. Our model includes two innovations. First, we define novel features for a host IP using detection of application graph patterns in IP's host graph constructed from 5-min aggregated packet flows. Second, we present the first application, to the best of our knowledge, of Graph Semi-Supervised Learning (GSSL) to the space of IP behavior classification. Using a cyber-attack dataset collected from NetFlow packet traces, we show that GSSL trained with only 20% of the data achieves higher attack detection rates than Support Vector Machines (SVM) and Naïve Bayes (NB) classifiers trained with 80% of data points. We also show how to improve detection quality by filtering out web browsing data, and conclude with discussion of future research directions.

  20. Cooperation stimulation strategies for peer-to-peer wireless live video-sharing social networks.

    PubMed

    Lin, W Sabrina; Zhao, H Vicky; Liu, K J Ray

    2010-07-01

    Human behavior analysis in video sharing social networks is an emerging research area, which analyzes the behavior of users who share multimedia content and investigates the impact of human dynamics on video sharing systems. Users watching live streaming in the same wireless network share the same limited bandwidth of backbone connection to the Internet, thus, they might want to cooperate with each other to obtain better video quality. These users form a wireless live-streaming social network. Every user wishes to watch video with high quality while paying as little as possible cost to help others. This paper focuses on providing incentives for user cooperation. We propose a game-theoretic framework to model user behavior and to analyze the optimal strategies for user cooperation simulation in wireless live streaming. We first analyze the Pareto optimality and the time-sensitive bargaining equilibrium of the two-person game. We then extend the solution to the multiuser scenario. We also consider potential selfish users' cheating behavior and malicious users' attacking behavior and analyze the performance of the proposed strategies with the existence of cheating users and malicious attackers. Both our analytical and simulation results show that the proposed strategies can effectively stimulate user cooperation, achieve cheat free and attack resistance, and help provide reliable services for wireless live streaming applications.

  1. A review on delayed toxic effects of sulfur mustard in Iranian veterans

    PubMed Central

    2012-01-01

    Iranian soldiers were attacked with chemical bombs, rockets and artillery shells 387 times during the 8-years war by Iraq (1980–1988). More than 1,000 tons of sulfur mustard gas was used in the battlefields by the Iraqis against Iranian people. A high rate of morbidities occurred as the result of these attacks. This study aimed to evaluate the delayed toxic effects of sulfur mustard gas on Iranian victims. During a systematic search, a total of 193 (109 more relevant to the main aim) articles on sulfur mustard gas were reviewed using known international and national databases. No special evaluation was conducted on the quality of the articles and their publication in accredited journals was considered sufficient. High rate of morbidities as the result of chemical attacks by sulfur mustard among Iranian people occurred. Iranian researchers found a numerous late complications among the victims which we be listed as wide range of respiratory, ocular, dermatological, psychological, hematological, immunological, gastrointestinal and endocrine complications, all influenced the quality of life of exposed victims. The mortality rate due to this agent was 3%. Although, mortality rate induced by sulfur mustard among Iranian people was low, variety and chronicity of toxic effects and complications of this chemical agent were dramatic. PMID:23351810

  2. Effectiveness of Influenza Vaccines in Asthma: A Systematic Review and Meta-Analysis

    PubMed Central

    Vasileiou, Eleftheria; Sheikh, Aziz; Butler, Chris; El Ferkh, Karim; von Wissmann, Beatrix; McMenamin, Jim; Ritchie, Lewis; Schwarze, Jürgen; Papadopoulos, Nikolaos G; Johnston, Sebastian L; Tian, Lilly; Simpson, Colin R

    2017-01-01

    Abstract There is uncertainty about the effectiveness of influenza vaccination in persons with asthma and its impact on asthma outcomes, which may contribute to the suboptimal vaccination rates in persons with asthma. This systematic review and meta-analysis involved searching 12 international databases for randomized controlled trials (RCTs) and high-quality quasi-experimental and epidemiological studies (1970–2016). The risk of bias was low for 3 included RCTs. The quality of 3 included observational studies was moderate. The quality of evidence was very low for all study outcomes. Pooled vaccine effectiveness in 1825 persons with asthma from 2 test-negative design case-control studies was 45% (95% confidence interval [CI], 31%–56%) for laboratory-confirmed influenza. Pooled efficacy of live vaccines in reducing influenza was 81% (95% CI, 33%– 94%). Live vaccine reduced febrile illness by 72% (95% CI, 20%–90%). Influenza vaccine prevented 59%–78% of asthma attacks leading to emergency visits and/or hospitalizations. For persons with asthma, influenza vaccination may be effective in both reducing influenza infection and asthma attacks. PMID:28591866

  3. Nitrogen Cycling Responses to Mountain Pine Beetle Disturbance in a High Elevation Whitebark Pine Ecosystem

    PubMed Central

    Keville, Megan P.; Reed, Sasha C.; Cleveland, Cory C.

    2013-01-01

    Ecological disturbances can significantly affect biogeochemical cycles in terrestrial ecosystems, but the biogeochemical consequences of the extensive mountain pine beetle outbreak in high elevation whitebark pine (WbP) (Pinus albicaulis) ecosystems of western North America have not been previously investigated. Mountain pine beetle attack has driven widespread WbP mortality, which could drive shifts in both the pools and fluxes of nitrogen (N) within these ecosystems. Because N availability can limit forest regrowth, understanding how beetle-induced mortality affects N cycling in WbP stands may be critical to understanding the trajectory of ecosystem recovery. Thus, we measured above- and belowground N pools and fluxes for trees representing three different times since beetle attack, including unattacked trees. Litterfall N inputs were more than ten times higher under recently attacked trees compared to unattacked trees. Soil inorganic N concentrations also increased following beetle attack, potentially driven by a more than two-fold increase in ammonium (NH4 +) concentrations in the surface soil organic horizon. However, there were no significant differences in mineral soil inorganic N or soil microbial biomass N concentrations between attacked and unattacked trees, implying that short-term changes in N cycling in response to the initial stages of WbP attack were restricted to the organic horizon. Our results suggest that while mountain pine beetle attack drives a pulse of N from the canopy to the forest floor, changes in litterfall quality and quantity do not have profound effects on soil biogeochemical cycling, at least in the short-term. However, continuous observation of these important ecosystems will be crucial to determining the long-term biogeochemical effects of mountain pine beetle outbreaks. PMID:23755166

  4. Nitrogen cycling responses to mountain pine beetle disturbance in a high elevation whitebark pine ecosystem.

    PubMed

    Keville, Megan P; Reed, Sasha C; Cleveland, Cory C

    2013-01-01

    Ecological disturbances can significantly affect biogeochemical cycles in terrestrial ecosystems, but the biogeochemical consequences of the extensive mountain pine beetle outbreak in high elevation whitebark pine (WbP) (Pinus albicaulis) ecosystems of western North America have not been previously investigated. Mountain pine beetle attack has driven widespread WbP mortality, which could drive shifts in both the pools and fluxes of nitrogen (N) within these ecosystems. Because N availability can limit forest regrowth, understanding how beetle-induced mortality affects N cycling in WbP stands may be critical to understanding the trajectory of ecosystem recovery. Thus, we measured above- and belowground N pools and fluxes for trees representing three different times since beetle attack, including unattacked trees. Litterfall N inputs were more than ten times higher under recently attacked trees compared to unattacked trees. Soil inorganic N concentrations also increased following beetle attack, potentially driven by a more than two-fold increase in ammonium (NH₄⁺) concentrations in the surface soil organic horizon. However, there were no significant differences in mineral soil inorganic N or soil microbial biomass N concentrations between attacked and unattacked trees, implying that short-term changes in N cycling in response to the initial stages of WbP attack were restricted to the organic horizon. Our results suggest that while mountain pine beetle attack drives a pulse of N from the canopy to the forest floor, changes in litterfall quality and quantity do not have profound effects on soil biogeochemical cycling, at least in the short-term. However, continuous observation of these important ecosystems will be crucial to determining the long-term biogeochemical effects of mountain pine beetle outbreaks.

  5. Nitrogen cycling responses to mountain pine beetle disturbance in a high elevation whitebark pine ecosystem

    USGS Publications Warehouse

    Keville, Megan P.; Reed, Sasha C.; Cleveland, Cory C.

    2013-01-01

    Ecological disturbances can significantly affect biogeochemical cycles in terrestrial ecosystems, but the biogeochemical consequences of the extensive mountain pine beetle outbreak in high elevation whitebark pine (WbP) (Pinus albicaulis) ecosystems of western North America have not been previously investigated. Mountain pine beetle attack has driven widespread WbP mortality, which could drive shifts in both the pools and fluxes of nitrogen (N) within these ecosystems. Because N availability can limit forest regrowth, understanding how beetle-induced mortality affects N cycling in WbP stands may be critical to understanding the trajectory of ecosystem recovery. Thus, we measured above- and belowground N pools and fluxes for trees representing three different times since beetle attack, including unattacked trees. Litterfall N inputs were more than ten times higher under recently attacked trees compared to unattacked trees. Soil inorganic N concentrations also increased following beetle attack, potentially driven by a more than two-fold increase in ammonium (NH4+) concentrations in the surface soil organic horizon. However, there were no significant differences in mineral soil inorganic N or soil microbial biomass N concentrations between attacked and unattacked trees, implying that short-term changes in N cycling in response to the initial stages of WbP attack were restricted to the organic horizon. Our results suggest that while mountain pine beetle attack drives a pulse of N from the canopy to the forest floor, changes in litterfall quality and quantity do not have profound effects on soil biogeochemical cycling, at least in the short-term. However, continuous observation of these important ecosystems will be crucial to determining the long-term biogeochemical effects of mountain pine beetle outbreaks.

  6. C1-inhibitor concentrate home therapy for hereditary angioedema: a viable, effective treatment option

    PubMed Central

    Longhurst, H J; Carr, S; Khair, K

    2007-01-01

    Economic and political factors have led to the increased use of home therapy programmes for patients who have traditionally been treated in hospital. Many patients with hereditary angioedema (HAE) experience intermittent severe attacks that affect their quality of life and may be life-threatening. These attacks are treated with C1-inhibitor concentrate which, for most patients, is infused at the local hospital. Home therapy programmes for HAE are currently being established. This paper reviews the extent of use of these programmes and summarizes the advantages and potential disadvantages of the concept so far. PMID:17177958

  7. A FIVE-YEAR CRASH PROGRAM FOR QUALITY EDUCATION--AN ATTACK ON UNEMPLOYMENT AND POVERTY THROUGH IMPROVED EDUCATIONAL OPPORTUNITY.

    ERIC Educational Resources Information Center

    New York City Board of Education, Brooklyn, NY.

    NOTING THAT THE WELFARE OF INDIVIDUAL CITIZENS AS WELL AS THE WELFARE OF THE CITY, STATE, AND NATION DEMANDS THAT THE VICIOUS CYCLE OF INSUFFICIENT EDUCATIONAL OPPORTUNITIES, UNEMPLOYMENT, AND POVERTY BE BROKEN, THE BOARD OF EDUCATION OF NEW YORK CITY PROPOSED A 5-YEAR EMERGENCY PROGRAM FOR QUALITY EDUCATION. THE PROGRAM INCLUDES PLANS FOR THE…

  8. [Almotriptan vs. ergotamine plus caffeine for acute migraine treatment. A cost-efficacy analysis].

    PubMed

    Slof, J; Láinez, J M; Comas, A; Heras, J

    2009-04-01

    Almotriptan has proven to be more efficacious and tolerable than ergotamine plus caffeine but is more expensive, thus raising the question about its cost-efficacy. The course of migraine attacks during 24 hours treated with almotriptan and ergotamine plus caffeine was modelled with a decision tree, using efficacy data from a recent randomized, double-blind clinical trial comparing the two drugs. Costs were calculated from the social perspective (including indirect costs due to absenteeism and loss of productivity) and from the Spanish National Health System (NHS) perspective (only including drug costs). The impact on quality of life was estimated using utilities assigned in the literature to different health states of migraine patients. Treatment response was 57.7% for patients treated with almotriptan vs. 44.5% with ergotamine plus caffeine. Sustained pain-free status was achieved by 20.3% vs. 11.5%. Working days lost due to absenteeism and reduced productivity amounted to 0.24 vs. 0.38 days. Quality of life during attacks was estimated at an average utility of 0.548 vs. 0.422. From the NHS perspective, incremental costs per attack treated with almotriptan vs. ergotamine plus caffeine was euro 5.05, rendering an incremental cost-efficacy ratio of euro38.26 per additional response, euro57.39 per additional complete response, and euro14,709 per quality- adjusted life-year gained. From the social perspective almotriptan saved euro7.50 vs. ergotamine plus caffeine. Almotriptan can be considered cost-efficacious vs. ergotamine plus caffeine from the NHS perspective and is the dominant option (both more efficacious and more economical) from the social perspective.

  9. Genetics algorithm optimization of DWT-DCT based image Watermarking

    NASA Astrophysics Data System (ADS)

    Budiman, Gelar; Novamizanti, Ledya; Iwut, Iwan

    2017-01-01

    Data hiding in an image content is mandatory for setting the ownership of the image. Two dimensions discrete wavelet transform (DWT) and discrete cosine transform (DCT) are proposed as transform method in this paper. First, the host image in RGB color space is converted to selected color space. We also can select the layer where the watermark is embedded. Next, 2D-DWT transforms the selected layer obtaining 4 subband. We select only one subband. And then block-based 2D-DCT transforms the selected subband. Binary-based watermark is embedded on the AC coefficients of each block after zigzag movement and range based pixel selection. Delta parameter replacing pixels in each range represents embedded bit. +Delta represents bit “1” and -delta represents bit “0”. Several parameters to be optimized by Genetics Algorithm (GA) are selected color space, layer, selected subband of DWT decomposition, block size, embedding range, and delta. The result of simulation performs that GA is able to determine the exact parameters obtaining optimum imperceptibility and robustness, in any watermarked image condition, either it is not attacked or attacked. DWT process in DCT based image watermarking optimized by GA has improved the performance of image watermarking. By five attacks: JPEG 50%, resize 50%, histogram equalization, salt-pepper and additive noise with variance 0.01, robustness in the proposed method has reached perfect watermark quality with BER=0. And the watermarked image quality by PSNR parameter is also increased about 5 dB than the watermarked image quality from previous method.

  10. Robust, nonlinear, high angle-of-attack control design for a supermaneuverable vehicle

    NASA Technical Reports Server (NTRS)

    Adams, Richard J.

    1993-01-01

    High angle-of-attack flight control laws are developed for a supermaneuverable fighter aircraft. The methods of dynamic inversion and structured singular value synthesis are combined into an approach which addresses both the nonlinearity and robustness problems of flight at extreme operating conditions. The primary purpose of the dynamic inversion control elements is to linearize the vehicle response across the flight envelope. Structured singular value synthesis is used to design a dynamic controller which provides robust tracking to pilot commands. The resulting control system achieves desired flying qualities and guarantees a large margin of robustness to uncertainties for high angle-of-attack flight conditions. The results of linear simulation and structured singular value stability analysis are presented to demonstrate satisfaction of the design criteria. High fidelity nonlinear simulation results show that the combined dynamics inversion/structured singular value synthesis control law achieves a high level of performance in a realistic environment.

  11. Precision controllability of the F-15 airplane

    NASA Technical Reports Server (NTRS)

    Sisk, T. R.; Matheny, N. W.

    1979-01-01

    A flying qualities evaluation conducted on a preproduction F-15 airplane permitted an assessment to be made of its precision controllability in the high subsonic and low transonic flight regime over the allowable angle of attack range. Precision controllability, or gunsight tracking, studies were conducted in windup turn maneuvers with the gunsight in the caged pipper mode and depressed 70 mils. This evaluation showed the F-15 airplane to experience severe buffet and mild-to-moderate wing rock at the higher angles of attack. It showed the F-15 airplane radial tracking precision to vary from approximately 6 to 20 mils over the load factor range tested. Tracking in the presence of wing rock essentially doubled the radial tracking error generated at the lower angles of attack. The stability augmentation system affected the tracking precision of the F-15 airplane more than it did that of previous aircraft studied.

  12. Security Attacks and Solutions in Electronic Health (E-health) Systems.

    PubMed

    Zeadally, Sherali; Isaac, Jesús Téllez; Baig, Zubair

    2016-12-01

    For centuries, healthcare has been a basic service provided by many governments to their citizens. Over the past few decades, we have witnessed a significant transformation in the quality of healthcare services provided by healthcare organizations and professionals. Recent advances have led to the emergence of Electronic Health (E-health), largely made possible by the massive deployment and adoption of information and communication technologies (ICTs). However, cybercriminals and attackers are exploiting vulnerabilities associated primarily with ICTs, causing data breaches of patients' confidential digital health information records. Here, we review recent security attacks reported for E-healthcare and discuss the solutions proposed to mitigate them. We also identify security challenges that must be addressed by E-health system designers and implementers in the future, to respond to threats that could arise as E-health systems become integrated with technologies such as cloud computing, the Internet of Things, and smart cities.

  13. Between a Rock and a Hard Place: Ethical and Professional Dilemmas in a Psychiatric Hospital Under Missile Attacks.

    PubMed

    Kagan, Ilya; Schor, Razia; Kigli-Shemesh, Ronit; Ovadia, Karin Lee; Melnikov, Semyon

    2016-09-01

    Israeli hospitals must continuously develop various mechanisms to protect both patients and staff against the physical threat of missile attacks during war situations. To examine the difficulties and dilemmas with which the staff of a psychiatric hospital had to deal during missile attacks. A quality improvement project consisting of three stages (1) establishment of a steering committee; (2) execution of a staff nurses' focus group; and (3) categorization of issues raised and suggestions for care improvement in future emergencies. The project stressed the challenges of dealing with restrained patients during missile alarms, waking up patients or dealing with those who refuse to enter the protected area, mismatching of the security needs in protected areas, and institutionalized emotional support for staff members. Suitable policies for clinical and management behavior and for information transfer between management and wards are essential during a continuous emergency. © The Author(s) 2016.

  14. Air quality impact of traffic congestion in midtown Manhattan.

    DOT National Transportation Integrated Search

    2014-01-01

    Exposure to fine particle pollution can cause premature death and harmful cardiovascular effects such as heart : attacks and strokes, and is linked to a variety of other significant health problem. A pilot project was : commissioned by the University...

  15. Rehabilitation

    MedlinePlus

    ... help. A younger person who has had a heart attack may go through cardiac rehabilitation to try to return to work and normal activities. Someone with a lung disease may get pulmonary rehabilitation to be able to breathe better and improve their quality of life.

  16. Discrimination of fungal infections on grape berries via spectral signatures

    NASA Astrophysics Data System (ADS)

    Molitor, Daniel; Griesser, Michaela; Schütz, Erich; Khuen, Marie-Therese; Schefbeck, Christa; Ronellenfitsch, Franz Kai; Schlerf, Martin; Beyer, Marco; Schoedl-Hummel, Katharina; Anhalt, Ulrike; Forneck, Astrid

    2016-04-01

    The fungal pathogens Botrytis cinerea and Penicillium expansum are causing economic damages on grapevine worldwide. Especially the simultaneous occurrence of both often results in off-flavours highly threatening wine quality. For the classification of grape quality as well as for the determination of targeted enological treatments, the knowledge of the level of fungal attack is of highest interest. However, visual assessment and pathogen discrimination are cost-intensive. Consequently, a pilot laboratory study aimed at (i) detecting differences in spectral signatures between grape berry lots with different levels of infected berries (B. cinerea and/or P. expansum) and (ii) detecting links between spectral signatures and biochemical as well as quantitative molecular markers for fungal attack. To this end, defined percentages (infection levels) of table grape berries were inoculated with fungal spore suspensions. Spectral measurements were taken using a FieldSpec 3 Max spectroradiometer (ASD Inc., Boulder/Colorado, USA) in regular intervals after inoculation. In addition, fungal attack was determined enzymatically) and quantitatively (real-time PCR). In addition, gluconic acid concentrations (as a potential markers for fungal attack) were determined photometrically. Results indicate that based on spectral signatures, a discrimination of P. expansum and B. cinerea infections as well as of different B. cinerea infection levels is possible. Real-time PCR analyses, detecting DNA levels of both fungi, showed yet a low detection level. Whereas the gluconic acid concentrations turned out to be specific for the two fungi tested (B. cinerea vs. P. expansum) and thus may serve as a differentiating biochemical marker. Correlation analyses between spectral measurements and biological data (gluconic acid concentrations, fungi DNA) as well as further common field and laboratory trials are targeted.

  17. Recent advances in management and treatment of hereditary angioedema.

    PubMed

    Sardana, Niti; Craig, Timothy J

    2011-12-01

    Hereditary angioedema (HAE) is a rare autosomal-dominant disease characterized by recurrent self-limiting episodes of skin and mucosal edema. Morbidity and mortality are significant, and new and pending therapies are now available to reduce the risk associated with the disease. To update the reader on new advances in HAE to improve patient care. We performed a literature search of Ovid, PubMed, and Google to develop this review. Articles that are necessary for the understanding and use of the new therapeutic options for HAE were chosen, and studies of high quality were used to support the use of therapies, and in most cases, results from phase III studies were used. Until recently, therapy for HAE attacks in the United States consisted of symptom relief with narcotics, hydration, and fresh-frozen plasma, which contains active C1 inhibitor. Therapy to prevent HAE attacks has been confined to androgens and, occasionally, antifibrinolytic agents; however, both drug groups have significant adverse effects. The approval of C1-inhibitor concentrate for prevention and acute therapy has improved efficacy and safety. Ecallantide has also been approved for therapy of attacks, and icatibant is expected to be approved in the next few months for attacks. Recombinant C1 inhibitor is presently in phase III studies and should be available for attacks in the near future. In this article we review the changing therapeutic options available for patients in 2011 and beyond.

  18. The Importance of Asthma and Health Programs in Improving Academic Performance

    EPA Pesticide Factsheets

    School air quality has a major impact on asthma and other respiratory illnesses. Airborne allergens or irritants frequently trigger asthma attacks, yet environmental assessments demonstrate that schools often harbor allergen levels at or close to the th

  19. Climate change effects on macrofaunal litter decomposition: the interplay of temperature, body masses and stoichiometry.

    PubMed

    Ott, David; Rall, Björn C; Brose, Ulrich

    2012-11-05

    Macrofauna invertebrates of forest floors provide important functions in the decomposition process of soil organic matter, which is affected by the nutrient stoichiometry of the leaf litter. Climate change effects on forest ecosystems include warming and decreasing litter quality (e.g. higher C : nutrient ratios) induced by higher atmospheric CO(2) concentrations. While litter-bag experiments unravelled separate effects, a mechanistic understanding of how interactions between temperature and litter stoichiometry are driving decomposition rates is lacking. In a laboratory experiment, we filled this void by quantifying decomposer consumption rates analogous to predator-prey functional responses that include the mechanistic parameters handling time and attack rate. Systematically, we varied the body masses of isopods, the environmental temperature and the resource between poor (hornbeam) and good quality (ash). We found that attack rates increased and handling times decreased (i) with body masses and (ii) temperature. Interestingly, these relationships interacted with litter quality: small isopods possibly avoided the poorer resource, whereas large isopods exhibited increased, compensatory feeding of the poorer resource, which may be explained by their higher metabolic demands. The combination of metabolic theory and ecological stoichiometry provided critically important mechanistic insights into how warming and varying litter quality may modify macrofaunal decomposition rates.

  20. Health-Related Quality of Life with Subcutaneous C1-Inhibitor for Prevention of Attacks of Hereditary Angioedema.

    PubMed

    Lumry, William R; Craig, Timothy; Zuraw, Bruce; Longhurst, Hilary; Baker, James; Li, H Henry; Bernstein, Jonathan A; Anderson, John; Riedl, Marc A; Manning, Michael E; Keith, Paul K; Levy, Donald S; Caballero, Teresa; Banerji, Aleena; Gower, Richard G; Farkas, Henriette; Lawo, John-Philip; Pragst, Ingo; Machnig, Thomas; Watson, Douglas J

    2018-01-31

    Hereditary angioedema with C1-inhibitor deficiency (C1-INH-HAE) impairs health-related quality of life (HRQoL). The objective of this study was to assess HRQoL outcomes in patients self-administering subcutaneous C1-INH (C1-INH[SC]; HAEGARDA) for routine prevention of HAE attacks. Post hoc analysis of data from the placebo-controlled, crossover phase III COMPACT study (Clinical Studies for Optimal Management of Preventing Angioedema with Low-Volume Subcutaneous C1-Inhibitor Replacement Therapy). Ninety patients with C1-INH-HAE were randomized to 1 of 4 treatment sequences: C1-INH(SC) 40 or 60 IU/kg twice weekly for 16 weeks, preceded or followed by 16 weeks of twice weekly placebo injections. All HAE attacks were treated with open-label on-demand treatment as necessary. HRQoL assessments at week 14 (last visit) included the European Quality of Life-5 Dimensions Questionnaire (EQ-5D-3L), the Hospital Anxiety and Depression Scale (HADS), the Work Productivity and Activity Impairment Questionnaire (WPAI), and the Treatment Satisfaction Questionnaire for Medication (TSQM). Compared with placebo (on-demand treatment alone), treatment with twice weekly C1-INH(SC) (both doses combined) was associated with better EQ-5D visual analog scale general health, less HADS anxiety, less WPAI presenteeism, work productivity loss, and activity impairment, and greater TSQM effectiveness and overall treatment satisfaction. More patients self-reported a "good/excellent" response during routine prevention with C1-INH(SC) compared with on-demand only (placebo prophylaxis) management. For each HRQoL measure, a greater proportion of patients had a clinically meaningful improvement during C1-INH(SC) treatment compared with placebo. In patients with frequent HAE attacks, a treatment strategy of routine prevention with self-administered twice weekly C1-INH(SC) had a greater impact on improving multiple HAE-related HRQoL impairments, most notably anxiety and work productivity, compared with on-demand treatment alone (placebo prophylaxis). Copyright © 2018 The Authors. Published by Elsevier Inc. All rights reserved.

  1. Flight-Determined Subsonic Longitudinal Stability and Control Derivatives of the F-18 High Angle of Attack Research Vehicle (HARV) with Thrust Vectoring

    NASA Technical Reports Server (NTRS)

    Iliff, Kenneth W.; Wang, Kon-Sheng Charles

    1997-01-01

    The subsonic longitudinal stability and control derivatives of the F-18 High Angle of Attack Research Vehicle (HARV) are extracted from dynamic flight data using a maximum likelihood parameter identification technique. The technique uses the linearized aircraft equations of motion in their continuous/discrete form and accounts for state and measurement noise as well as thrust-vectoring effects. State noise is used to model the uncommanded forcing function caused by unsteady aerodynamics over the aircraft, particularly at high angles of attack. Thrust vectoring was implemented using electrohydraulically-actuated nozzle postexit vanes and a specialized research flight control system. During maneuvers, a control system feature provided independent aerodynamic control surface inputs and independent thrust-vectoring vane inputs, thereby eliminating correlations between the aircraft states and controls. Substantial variations in control excitation and dynamic response were exhibited for maneuvers conducted at different angles of attack. Opposing vane interactions caused most thrust-vectoring inputs to experience some exhaust plume interference and thus reduced effectiveness. The estimated stability and control derivatives are plotted, and a discussion relates them to predicted values and maneuver quality.

  2. Distributed denial of service (DDoS) attack in cloud- assisted wireless body area networks: a systematic literature review.

    PubMed

    Latif, Rabia; Abbas, Haider; Assar, Saïd

    2014-11-01

    Wireless Body Area Networks (WBANs) have emerged as a promising technology that has shown enormous potential in improving the quality of healthcare, and has thus found a broad range of medical applications from ubiquitous health monitoring to emergency medical response systems. The huge amount of highly sensitive data collected and generated by WBAN nodes requires an ascendable and secure storage and processing infrastructure. Given the limited resources of WBAN nodes for storage and processing, the integration of WBANs and cloud computing may provide a powerful solution. However, despite the benefits of cloud-assisted WBAN, several security issues and challenges remain. Among these, data availability is the most nagging security issue. The most serious threat to data availability is a distributed denial of service (DDoS) attack that directly affects the all-time availability of a patient's data. The existing solutions for standalone WBANs and sensor networks are not applicable in the cloud. The purpose of this review paper is to identify the most threatening types of DDoS attacks affecting the availability of a cloud-assisted WBAN and review the state-of-the-art detection mechanisms for the identified DDoS attacks.

  3. Space, Elastic And Impeding: Two Qualities Of Space Define Energy Which Defines Elementary Particles and Their Interactions

    NASA Astrophysics Data System (ADS)

    Salvatore, Gerard Micheal

    The conceptual foundations for a deterministic quantum mechanics are presented with the Socratic method. The theory is attacked and weaknesses elucidated. These are compared against those of convention. Directions for future research are proposed.

  4. REMOTE MONITORING OF WATER QUALITY IN DRINKING WATER DISTRIBUTION SYSTEMS

    EPA Science Inventory

    Water is a precious natural resource that Americans enjoy with little thought to contamination or potential tampering. However, the terrorist attacks on September 11, 2001, and ensuing threats have increased awareness of the potential for contamination of the nation's drinking w...

  5. Post-traumatic cognitions and quality of life in terrorism victims: the role of well-being in indirect versus direct exposure.

    PubMed

    Bajo, Miriam; Blanco, Amalio; Stavraki, Maria; Gandarillas, Beatriz; Cancela, Ana; Requero, Blanca; Díaz, Darío

    2018-05-15

    The effect of indirect (versus direct) exposure to a traumatic event on the quality of life of terrorist attack victims has received considerable attention in the literature. However, more research is required to examine whether the symptoms and underlying processes caused by both types of exposure are equivalent. Our main hypothesis is that well-being plays a different role depending on indirect vs. direct trauma exposure. In this cross-sectional study, eighty direct victims of 11-M terrorist attacks (people who were traveling in trains where bombs were placed) and two-hundred indirect victims (individuals highly exposed to the 11-M terrorist attacks through communications media) voluntarily participated without compensation. To test our hypothesis regarding the mediating role of indirect exposure, we conducted a biased corrected bootstrapping procedure. To test our hypothesis regarding the moderating role of direct exposure, data were subjected to a hierarchical regression analysis. As predicted, for indirect trauma exposure, well-being mediated the relationship between post-traumatic dysfunctional cognitions and trauma symptoms. However, for direct trauma exposure, well-being moderated the relationship between post-traumatic dysfunctional cognitions and trauma symptoms. The results of our study indicate that the different role of well-being found between indirect (causal factor) and direct exposure (protective factor) should be taken into consideration in interventions designed to improve victims' health.

  6. How to Compare the Security Quality Requirements Engineering (SQUARE) Method with Other Methods

    DTIC Science & Technology

    2007-08-01

    Attack Trees for Modeling and Analysis 10 2.8 Misuse and Abuse Cases 10 2.9 Formal Methods 11 2.9.1 Software Cost Reduction 12 2.9.2 Common...modern or efficient techniques. • Requirements analysis typically is either not performed at all (identified requirements are directly specified without...any analysis or modeling) or analysis is restricted to functional re- quirements and ignores quality requirements, other nonfunctional requirements

  7. IgG-based elimination diet in migraine plus irritable bowel syndrome.

    PubMed

    Aydinlar, Elif Ilgaz; Dikmen, Pinar Yalinay; Tiftikci, Arzu; Saruc, Murat; Aksu, Muge; Gunsoy, Hulya G; Tozun, Nurdan

    2013-03-01

    To evaluate therapeutic potential of the immunoglobulin G (IgG)-based elimination diet among migraine patients with irritable bowel syndrome (IBS). Food elimination has been suggested as an effective and inexpensive therapeutic strategy in patients with migraine and concomitant IBS in the past studies. A total of 21 patients (mean [standard deviation] age: 38.0 [11.2] years; 85.7% females) diagnosed with migraine and IBS were included in this double-blind, randomized, controlled, cross-over clinical trial composed of baseline (usual diet), first diet (elimination or provocation diets), and second diet (interchange of elimination or provocations diets) phases and 4 visits. IgG antibody tests against 270 food allergens revealed mean (standard deviation) reaction count to be 23.1 (14.1). Compared with baseline levels, elimination diet per se was associated with significant reductions in attack count (4.8 [2.1] vs 2.7 [2.0]; P < .001), maximum attack duration (2.6 [0.6] vs. 1.4 [1.1] days; P < .001), mean attack duration (1.8 [0.5] vs. 1.1 [0.8] days; P < .01), maximum attack severity (visual analog scale 8.5 [1.4] vs. visual analog scale 6.6 [3.3]; P < .001), and number of attacks with acute medication (4.0 [1.5] vs. 1.9 [1.8]; P < .001). There was a significant reduction in pain-bloating severity (1.8 [1.3] vs. 3.2 [0.8]; P < .05), pain-bloating within the last 10 days (3.2 [2.8] vs. 5.5 [3.1]; P < .05), and improvement obtained in quality of life (3.6 [1.4] vs. 2.9 [1.0]; P < .05) by the elimination diet as compared with provocation diet. Our findings indicate that food elimination based on IgG antibodies in migraine patients who suffer from concomitant IBS may effectively reduce symptoms from both disorders with possible positive impact on the quality of life of the patients as well as potential savings to the health-care system. © 2012 American Headache Society.

  8. Effectiveness of Influenza Vaccines in Asthma: A Systematic Review and Meta-Analysis.

    PubMed

    Vasileiou, Eleftheria; Sheikh, Aziz; Butler, Chris; El Ferkh, Karim; von Wissmann, Beatrix; McMenamin, Jim; Ritchie, Lewis; Schwarze, Jürgen; Papadopoulos, Nikolaos G; Johnston, Sebastian L; Tian, Lilly; Simpson, Colin R

    2017-10-15

    There is uncertainty about the effectiveness of influenza vaccination in persons with asthma and its impact on asthma outcomes, which may contribute to the suboptimal vaccination rates in persons with asthma. This systematic review and meta-analysis involved searching 12 international databases for randomized controlled trials (RCTs) and high-quality quasi-experimental and epidemiological studies (1970-2016). The risk of bias was low for 3 included RCTs. The quality of 3 included observational studies was moderate. The quality of evidence was very low for all study outcomes. Pooled vaccine effectiveness in 1825 persons with asthma from 2 test-negative design case-control studies was 45% (95% confidence interval [CI], 31%-56%) for laboratory-confirmed influenza. Pooled efficacy of live vaccines in reducing influenza was 81% (95% CI, 33%- 94%). Live vaccine reduced febrile illness by 72% (95% CI, 20%-90%). Influenza vaccine prevented 59%-78% of asthma attacks leading to emergency visits and/or hospitalizations. For persons with asthma, influenza vaccination may be effective in both reducing influenza infection and asthma attacks. © The Author 2017. Published by Oxford University Press for the Infectious Diseases Society of America.

  9. The comparison between SVD-DCT and SVD-DWT digital image watermarking

    NASA Astrophysics Data System (ADS)

    Wira Handito, Kurniawan; Fauzi, Zulfikar; Aminy Ma’ruf, Firda; Widyaningrum, Tanti; Muslim Lhaksmana, Kemas

    2018-03-01

    With internet, anyone can publish their creation into digital data simply, inexpensively, and absolutely easy to be accessed by everyone. However, the problem appears when anyone else claims that the creation is their property or modifies some part of that creation. It causes necessary protection of copyrights; one of the examples is with watermarking method in digital image. The application of watermarking technique on digital data, especially on image, enables total invisibility if inserted in carrier image. Carrier image will not undergo any decrease of quality and also the inserted image will not be affected by attack. In this paper, watermarking will be implemented on digital image using Singular Value Decomposition based on Discrete Wavelet Transform (DWT) and Discrete Cosine Transform (DCT) by expectation in good performance of watermarking result. In this case, trade-off happen between invisibility and robustness of image watermarking. In embedding process, image watermarking has a good quality for scaling factor < 0.1. The quality of image watermarking in decomposition level 3 is better than level 2 and level 1. Embedding watermark in low-frequency is robust to Gaussian blur attack, rescale, and JPEG compression, but in high-frequency is robust to Gaussian noise.

  10. COPPER PITTING CORROSION: A CASE STUDY

    EPA Science Inventory

    Localized or pitting corrosion of copper pipes used in household drinking-water plumbing is a problem for many water utilities and their customers. Extreme attack can lead to pinhole water leaks that may result in water damage, mold growth, and costly repairs. Water quality has b...

  11. Affective Interchange in Families with a Schizophrenic Son.

    ERIC Educational Resources Information Center

    Angermeyer, Matthias C.; And Others

    Sixty half-hour family discussions generated by the "revealed differences technique" were analyzed to determine the emotional intensity and quality (friendliness/attacking) of messages between individuals in families with schizophrenic and "normal" sons. Thirty families in each situation (schizophrenic/normal) were matched for comparison. Both…

  12. Public health consequences of terrorism on maternal-child health in New York City and Madrid.

    PubMed

    Sherrieb, Kathleen; Norris, Fran H

    2013-06-01

    Past research provides evidence for trajectories of health and wellness among individuals following disasters that follow specific pathways of resilience, resistance, recovery, or continued dysfunction. These individual responses are influenced by event type and pre-event capacities. This study was designed to utilize the trajectories of health model to determine if it translates to population health. We identified terrorist attacks that could potentially impact population health rather than only selected individuals within the areas of the attacks. We chose to examine a time series of population birth outcomes before and after the terrorist events of the New York City (NYC) World Trade Center (WTC) attacks of 2001 and the Madrid, Spain train bombings of 2004 to determine if the events affected maternal-child health of those cities and, if so, for how long. For percentages of low birth weight (LBW) and preterm births, we found no significant effects from the WTC attacks in NYC and transient but significant effects on rates of LBW and preterm births following the bombings in Madrid. We did find a significant positive and sustained effect on infant mortality rate in NYC following the WTC attacks but no similar effect in Madrid. There were no effects on any of the indicator variables in the comparison regions of New York state and the remainder of Spain. Thus, population maternal-health in New York and Madrid showed unique adverse effects after the terrorist attacks in those cities. Short-term effects on LBW and preterm birth rates in Madrid and long-term effects on infant mortality rates in NYC were found when quarterly data were analyzed from 1990 through 2008/2009. These findings raise questions about chronic changes in the population's quality of life following catastrophic terrorist attacks. Public health should be monitored and interventions designed to address chronic stress, environmental, and socioeconomic threats beyond the acute aftermath of events.

  13. Evaluation of avoralstat, an oral kallikrein inhibitor, in a Phase 3 hereditary angioedema prophylaxis trial: the OPUS-2 study.

    PubMed

    Riedl, Marc A; Aygören-Pürsün, Emel; Baker, James; Farkas, Henriette; Anderson, John; Bernstein, Jonathan A; Bouillet, Laurence; Busse, Paula; Manning, Michael; Magerl, Markus; Gompels, Mark; Huissoon, Aarnoud P; Longhurst, Hillary; Lumry, William; Ritchie, Bruce; Shapiro, Ralph; Soteres, Daniel; Banerji, Aleena; Cancian, Mauro; Johnston, Douglas T; Craig, Timothy J; Launay, David; Li, H Henry; Liebhaber, Myron; Nickel, Timothy; Offenberger, Jacob; Rae, William; Schrijvers, Rik; Triggiani, Massimo; Wedner, H James; Dobo, Sylvia; Cornpropst, Melanie; Clemons, Desiree; Fang, Lei; Collis, Phil; Sheridan, William P; Maurer, Marcus

    2018-04-24

    Effective inhibition of plasma kallikrein may have significant benefits for patients with hereditary angioedema due to deficiency of C1 inhibitor (C1-INH-HAE) by reducing the frequency of angioedema attacks. Avoralstat is a small molecule inhibitor of plasma kallikrein. This study (OPuS-2) evaluated the efficacy and safety of prophylactic avoralstat 300 or 500 mg compared with placebo. OPuS-2 was a Phase 3, multicenter, randomized, double-blind, placebo-controlled, parallel-group study. Subjects were administered avoralstat 300 mg, avoralstat 500 mg, or placebo orally 3 times per day for 12 weeks. The primary efficacy endpoint was the angioedema attack rate based on adjudicator-confirmed attacks. A total of 110 subjects were randomized and dosed. The least squares (LS) mean attack rates per week were 0.589, 0.675, and 0.593 for subjects receiving avoralstat 500 mg, avoralstat 300 mg, and placebo, respectively. Overall, 1 subject in each of the avoralstat groups and no subjects in the placebo group were attack-free during the 84-day treatment period. The LS mean duration of all confirmed attacks was 25.4, 29.4 and 31.4 hours for the avoralstat 500 mg, avoralstat 300 mg and placebo groups respectively. Using the Angioedema Quality of Life Questionnaire (AE-QoL), improved QoL was observed for the avoralstat 500 mg group compared with placebo. Avoralstat was generally safe and well tolerated. Although this study did not demonstrate efficacy of avoralstat in preventing angioedema attacks in C1-INH-HAE, it provided evidence of shortened angioedema episodes and improved QoL in the avoralstat 500 mg treatment group compared with placebo. This article is protected by copyright. All rights reserved. This article is protected by copyright. All rights reserved.

  14. [Trimigren in stopping migraine attacks: an open prospective multicenter comparative study of rectal suppository and tablet forms of sumatriptan].

    PubMed

    Azimova, Iu E; Tabeeva, G R

    2009-01-01

    Efficacy and safety of sumatriptan in rectal suppository (50 mg) and tablet forms (50 mg) in stopping migraine attacks has been studied in 80 patients with migraine with or without aura. Dynamics of migraine pain intensity measured with the VAS 30 min, 1, 2, 6 and 24 h after the first dose of drug was a primary index of efficacy. Secondary indices were the VAS intensity of nausea, vomiting, photophobia, phonophobia, duration of each migraine attack, quality of life parameters of a patient during the migraine attack assessed with the 24-hour questionnaire, severity of migraine course on the MIDAS, percentage of patients with complete regression of migraine pain, at least in 2 out of 3 attacks. To assess drug safety, any adverse effects, data of instrumental methods (clinical and biochemical blood tests, clinical urine test), EKG were taken into account. Rectal suppository had the more rapid effect on headache reduction compared to tablets. Changes of intensity of concomitant symptoms (nausea, vomiting, photophobia, phonophobia) as well as other secondary indices of drug efficacy were similar in both groups. In the group treated with rectal suppository, 9 (22.5%) patients had 12 adverse effects. In the group treated with tablets, 22 adverse effects were noted in 15 (37.5%) patients. Adverse effects related to the cardio-vascular system were observed less often in the group treated with rectal suppository (6.6 and 32%, respectively, p=0,004).

  15. Cost-effectiveness comparison of response strategies to a large-scale anthrax attack on the chicago metropolitan area: impact of timing and surge capacity.

    PubMed

    Kyriacou, Demetrios N; Dobrez, Debra; Parada, Jorge P; Steinberg, Justin M; Kahn, Adam; Bennett, Charles L; Schmitt, Brian P

    2012-09-01

    Rapid public health response to a large-scale anthrax attack would reduce overall morbidity and mortality. However, there is uncertainty about the optimal cost-effective response strategy based on timing of intervention, public health resources, and critical care facilities. We conducted a decision analytic study to compare response strategies to a theoretical large-scale anthrax attack on the Chicago metropolitan area beginning either Day 2 or Day 5 after the attack. These strategies correspond to the policy options set forth by the Anthrax Modeling Working Group for population-wide responses to a large-scale anthrax attack: (1) postattack antibiotic prophylaxis, (2) postattack antibiotic prophylaxis and vaccination, (3) preattack vaccination with postattack antibiotic prophylaxis, and (4) preattack vaccination with postattack antibiotic prophylaxis and vaccination. Outcomes were measured in costs, lives saved, quality-adjusted life-years (QALYs), and incremental cost-effectiveness ratios (ICERs). We estimated that postattack antibiotic prophylaxis of all 1,390,000 anthrax-exposed people beginning on Day 2 after attack would result in 205,835 infected victims, 35,049 fulminant victims, and 28,612 deaths. Only 6,437 (18.5%) of the fulminant victims could be saved with the existing critical care facilities in the Chicago metropolitan area. Mortality would increase to 69,136 if the response strategy began on Day 5. Including postattack vaccination with antibiotic prophylaxis of all exposed people reduces mortality and is cost-effective for both Day 2 (ICER=$182/QALY) and Day 5 (ICER=$1,088/QALY) response strategies. Increasing ICU bed availability significantly reduces mortality for all response strategies. We conclude that postattack antibiotic prophylaxis and vaccination of all exposed people is the optimal cost-effective response strategy for a large-scale anthrax attack. Our findings support the US government's plan to provide antibiotic prophylaxis and vaccination for all exposed people within 48 hours of the recognition of a large-scale anthrax attack. Future policies should consider expanding critical care capacity to allow for the rescue of more victims.

  16. Cost-Effectiveness Comparison of Response Strategies to a Large-Scale Anthrax Attack on the Chicago Metropolitan Area: Impact of Timing and Surge Capacity

    PubMed Central

    Dobrez, Debra; Parada, Jorge P.; Steinberg, Justin M.; Kahn, Adam; Bennett, Charles L.; Schmitt, Brian P.

    2012-01-01

    Rapid public health response to a large-scale anthrax attack would reduce overall morbidity and mortality. However, there is uncertainty about the optimal cost-effective response strategy based on timing of intervention, public health resources, and critical care facilities. We conducted a decision analytic study to compare response strategies to a theoretical large-scale anthrax attack on the Chicago metropolitan area beginning either Day 2 or Day 5 after the attack. These strategies correspond to the policy options set forth by the Anthrax Modeling Working Group for population-wide responses to a large-scale anthrax attack: (1) postattack antibiotic prophylaxis, (2) postattack antibiotic prophylaxis and vaccination, (3) preattack vaccination with postattack antibiotic prophylaxis, and (4) preattack vaccination with postattack antibiotic prophylaxis and vaccination. Outcomes were measured in costs, lives saved, quality-adjusted life-years (QALYs), and incremental cost-effectiveness ratios (ICERs). We estimated that postattack antibiotic prophylaxis of all 1,390,000 anthrax-exposed people beginning on Day 2 after attack would result in 205,835 infected victims, 35,049 fulminant victims, and 28,612 deaths. Only 6,437 (18.5%) of the fulminant victims could be saved with the existing critical care facilities in the Chicago metropolitan area. Mortality would increase to 69,136 if the response strategy began on Day 5. Including postattack vaccination with antibiotic prophylaxis of all exposed people reduces mortality and is cost-effective for both Day 2 (ICER=$182/QALY) and Day 5 (ICER=$1,088/QALY) response strategies. Increasing ICU bed availability significantly reduces mortality for all response strategies. We conclude that postattack antibiotic prophylaxis and vaccination of all exposed people is the optimal cost-effective response strategy for a large-scale anthrax attack. Our findings support the US government's plan to provide antibiotic prophylaxis and vaccination for all exposed people within 48 hours of the recognition of a large-scale anthrax attack. Future policies should consider expanding critical care capacity to allow for the rescue of more victims. PMID:22845046

  17. Recurrent laughter-induced syncope.

    PubMed

    Gaitatzis, Athanasios; Petzold, Axel

    2012-07-01

    Syncope is a common presenting complaint in Neurology clinics or Emergency departments, but its causes are sometimes difficult to diagnose. Apart from vasovagal attacks, other benign, neurally mediated syncopes include "situational" syncopes, which occur after urination, coughing, swallowing, or defecation. A healthy 42-year-old male patient presented to the neurology clinic with a long history of faints triggered by spontaneous laughter, especially after funny jokes. Physical and neurological examination, and electroencephalography and magnetic resonance imaging were unremarkable. There was no evidence to suggest cardiogenic causes, epilepsy, or cataplexy and a diagnosis of laughing syncope was made. Laughter-induced syncope is usually a single event in the majority of cases, but may present as recurrent attacks as in our case. Some cases occur in association with underlying neurological conditions. Prognosis is good in the case of neurally mediated attacks. Laughter may not be recognized by physicians as a cause of syncope, which may lead to unnecessary investigations or misdiagnosis, and affect patients' quality of life.

  18. Diagnosis, pathophysiology, and management of cluster headache.

    PubMed

    Hoffmann, Jan; May, Arne

    2018-01-01

    Cluster headache is a trigeminal autonomic cephalalgia characterised by extremely painful, strictly unilateral, short-lasting headache attacks accompanied by ipsilateral autonomic symptoms or the sense of restlessness and agitation, or both. The severity of the disorder has major effects on the patient's quality of life and, in some cases, might lead to suicidal ideation. Cluster headache is now thought to involve a synchronised abnormal activity in the hypothalamus, the trigeminovascular system, and the autonomic nervous system. The hypothalamus appears to play a fundamental role in the generation of a permissive state that allows the initiation of an episode, whereas the attacks are likely to require the involvement of the peripheral nervous system. Triptans are the most effective drugs to treat an acute cluster headache attack. Monoclonal antibodies against calcitonin gene-related peptide, a crucial neurotransmitter of the trigeminal system, are under investigation for the preventive treatment of cluster headache. These studies will increase our understanding of the disorder and perhaps reveal other therapeutic targets. Copyright © 2018 Elsevier Ltd. All rights reserved.

  19. The impact of resource limitation and the phenology of parasitoid attack on the duration of insect herbivore outbreaks.

    PubMed

    Umbanhowar, James; Hastings, Alan

    2002-11-01

    Fluctuations in resource quality and quantity, and changes in mortality due to predators and parasites are thought to be of prime importance in the regular fluctuations of forest insects. We examine how food limitation and parasitoids with different phenologies of attack regulate the population cycles of insect hosts. Our analysis of the limit cycle of a model with a biologically realistic form of density dependence in the host yields two novel predictions. First, outbreaks will typically last for only 2 generations after parasitoids begin to reduce the host population below the maximum density. Second, host growth rate is important in determining cycle length only when parasitoids attack before the impacts of resource limitation affect the host. The robustness of these predictions are tested using a more general form of density dependence in the host, revealing that our predictions are valid as long as density dependence in the host is not too overcompensatory.

  20. Case-control study of severe life threatening asthma (SLTA) in adults: demographics, health care, and management of the acute attack

    PubMed Central

    Kolbe, J; Fergusson, W; Vamos, M; Garrett, J

    2000-01-01

    BACKGROUND—Severe life threatening asthma (SLTA) is important in its own right and as a proxy for asthma death. In order to target hospital based intervention strategies to those most likely to benefit, risk factors for SLTA among those admitted to hospital need to be identified. A case-control study was undertaken to determine whether, in comparison with patients admitted to hospital with acute asthma, those with SLTA have different sociodemographic and clinical characteristics, evidence of inadequate ongoing medical care, barriers to health care, or deficiencies in management of the acute attack.
METHODS—Seventy seven patients with SLTA were admitted to an intensive care unit (pH 7.17 (0.15), PaCO2 10.7 (5.0) kPa) and 239 matched controls (by date of index attack) with acute asthma were admitted to general medical wards. A questionnaire was administered 24-48 hours after admission.
RESULTS—The risk of SLTA in comparison with other patients admitted with acute asthma increased with age (odds ratio (OR) 1.04/year, 95% CI 1.01 to 1.07) and was less for women (OR 0.36, 95% CI 0.20to 0.68). These variables were controlled for in all subsequent analyses. There were no differences in other sociodemographic features. Cases were more likely to have experienced a previous SLTA (OR 2.04, 95% CI 1.20 to 3.45) and to have had a hospital admission in the last year (OR 1.86, 95% CI 1.09 to 3.18). There were no differences between cases and controls in terms of indicators of quality of ongoing asthma specific medical care, nor was there evidence of disproportionate barriers to health care. During the index attack cases had more severe asthma at the time of presentation, were less likely to have presented to general practitioners, and were more likely to have called an ambulance or presented to an emergency department. In terms of pharmacological management, those with SLTA were more likely to have been using oral theophylline (OR 2.14, 95% CI 1.35 to 3.68) and less likely to have been using inhaled corticosteroids in the two weeks before the index attack (OR 0.69, 95% CI 0.47 to 0.99). While there was no difference in self-management knowledge or behaviour scores, those with SLTA were more likely to have inappropriately used oral corticosteroids during the acute attack (OR 2.09, 95% CI 1.02 to 4.47).
CONCLUSIONS—In comparison with those admitted to hospital with acute severe asthma, patients with SLTA were indistinguishable on sociodemographic criteria (apart from male predominance), were more likely to have had a previous SLTA or hospital admission in the previous year, had similar quality ongoing asthma care, had no evidence of increased physical, economic or other barriers to health care, but had demonstrable deficiencies in the management of the acute index attack. Educational interventions, while not losing sight of the need for good quality ongoing care, should focus on providing individual patients with better advice on self-management of acute exacerbations.

 PMID:11083885

  1. Environmental Quality Research Fish and Aufwuchs Bioassay

    DTIC Science & Technology

    1978-11-01

    Disease was controlled by applications of Malachite Green to eggs upon their transfer from spawning aquaria into hatching aquaria. MINERAL QUALITY OF WATER...for 1 hr) and Malachite Green was administered just after transfer. Exposure to Malachite Green was for a period of 1-2 min (later lengthened to 4-5...that Bank A tanks did not become infected with the fungus that attacked the eggs in Bank B tanks was that the period of treatment with Malachite Green

  2. Migraine, arousal and sleep deprivation: comment on: "sleep quality, arousal and pain thresholds in migraineurs: a blinded controlled polysomnographic study".

    PubMed

    Vollono, Catello; Testani, Elisa; Losurdo, Anna; Mazza, Salvatore; Della Marca, Giacomo

    2013-06-10

    We discuss the hypothesis proposed by Engstrom and coworkers that Migraineurs have a relative sleep deprivation, which lowers the pain threshold and predispose to attacks. Previous data indicate that Migraineurs have a reduction of Cyclic Alternating Pattern (CAP), an essential mechanism of NREM sleep regulation which allows to dump the effect of incoming disruptive stimuli, and to protect sleep. The modifications of CAP observed in Migraineurs are similar to those observed in patients with impaired arousal (narcolepsy) and after sleep deprivation. The impairment of this mechanism makes Migraineurs more vulnerable to stimuli triggering attacks during sleep, and represents part of a more general vulnerability to incoming stimuli.

  3. PubMed Central

    CANZI, P.; OCCHINI, A.; PAGELLA, F.; MARCHAL, F.; BENAZZO, M.

    2013-01-01

    SUMMARY Juvenile recurrent parotitis (JRP) is the second most frequent salivary gland disease in childhood, defined as a recurrent non-suppurative and non-obstructive parotid inflammation. The recurring attacks actually represent the most dramatic and serious aspect of this pathology, since they significantly influence the quality of life, and there are no recognized therapies to avoid them. In recent years, there are reports of many international experiences related to the management of JRP by sialendoscopy. In this context, several authors have stressed the striking role of sialendoscopy in the prevention of JRP attacks. The objective of the current review is to overview the existing literature with particular regards to diagnostic and therapeutic outcomes after the application of sialendoscopy in patients suffering from JRP. PMID:24376291

  4. Anti-reflection coatings applied by acid leaching process

    NASA Technical Reports Server (NTRS)

    Pastirik, E.

    1980-01-01

    The Magicote C process developed by S.M. Thompsen was evaluated for use in applying an antireflective coating to the cover plates of solar panels. The process uses a fluosilicic acid solution supersaturated with silica at elevated temperature to selectively attack the surface of soda-lime glass cover plates and alter the physical and chemical composition of a thin layer of glass. The altered glass layer constitutes an antireflective coating. The process produces coatings of excellent optical quality which possess outstanding resistance to soiling and staining. The coatings produced are not resistant to mechanical abrasion and are attacked to some extent by glass cleansers. Control of the filming process was found to be difficult.

  5. A Novel Application for Text Watermarking in Digital Reading

    NASA Astrophysics Data System (ADS)

    Zhang, Jin; Li, Qing-Cheng; Wang, Cong; Fang, Ji

    Although watermarking research has made great strides in theoretical aspect, its lack of application in business could not be covered. It is due to few people pays attention to usage of the information carried by watermarking. This paper proposes a new watermarking application method. After digital document being reorganized with advertisement together, watermarking is designed to carry this structure of new document. It will release advertisement as interference information under attack. On the one hand, reducing the quality of digital works could inhabit unauthorized distribution. On the other hand, advertisement can benefit copyright holders as compensation. Moreover implementation detail, attack evaluation and watermarking algorithm correlation are also discussed through an experiment based on txt file.

  6. Knowledge of heart attack and stroke symptomology: a cross-sectional comparison of rural and non-rural US adults.

    PubMed

    Swanoski, Michael T; Lutfiyya, May Nawal; Amaro, Maria L; Akers, Michael F; Huot, Krista L

    2012-06-01

    Understanding the signs and symptoms of heart attacks and strokes are important not only in saving lives, but also in preserving quality of life. Findings from recent research have yielded that the prevalence of cardiovascular disease risk factors are higher in rural populations, suggesting that adults living in rural locales may be at higher risk for heart attack and/or stroke. Knowledge of heart attack and stroke symptomology as well as calling 911 for a suspected heart attack or stroke are essential first steps in seeking care. This study sought to examine the knowledge of heart attack and stroke symptoms among rural adults in comparison to non-rural adults living in the U.S. Using multivariate techniques, a cross-sectional analysis of an amalgamated multi-year Behavioral Risk Factor Surveillance Survey (BRFSS) database was performed. The dependent variable for this analysis was low heart attack and stroke knowledge score. The covariates for the analysis were: age, sex, race/ethnicity, annual household income, attained education, health insurance status, having a health care provider (HCP), timing of last routine medical check-up, medical care deferment because of cost, self-defined health status and geographic locale. The weighted n for this study overall was 103,262,115 U.S. adults  > =18 years of age. Approximately 22.0% of these respondents were U.S. adults living in rural locales. Logistic regression analysis revealed that those U.S. adults who had low composite heart attack and stroke knowledge scores were more likely to be rural (OR=1.218 95%CI 1.216-1.219) rather than non-rural residents. Furthermore, those with low scores were more likely to be: male (OR=1.353 95%CI 1.352-1.354), >65 years of age (OR=1.369 95%CI 1.368-1.371), African American (OR=1.892 95%CI 1.889-1.894), not educated beyond high school (OR=1.400 955CI 1.399-1.402), uninsured (OR=1.308 95%CI 1.3-6-1.310), without a HCP (OR=1.216 95%CI 1.215-1.218), and living in a household with an annual income of  < $50,000 (OR=1.429 95%CI 1.428-1.431). Analysis identified clear disparities between the knowledge levels U.S. adults have regarding heart attack and stroke symptoms. These disparities should guide educational endeavors focusing on improving knowledge of heart attack and stroke symptoms.

  7. Knowledge of heart attack and stroke symptomology: a cross-sectional comparison of rural and non-rural US adults

    PubMed Central

    2012-01-01

    Background Understanding the signs and symptoms of heart attacks and strokes are important not only in saving lives, but also in preserving quality of life. Findings from recent research have yielded that the prevalence of cardiovascular disease risk factors are higher in rural populations, suggesting that adults living in rural locales may be at higher risk for heart attack and/or stroke. Knowledge of heart attack and stroke symptomology as well as calling 911 for a suspected heart attack or stroke are essential first steps in seeking care. This study sought to examine the knowledge of heart attack and stroke symptoms among rural adults in comparison to non-rural adults living in the U.S. Methods Using multivariate techniques, a cross-sectional analysis of an amalgamated multi-year Behavioral Risk Factor Surveillance Survey (BRFSS) database was performed. The dependent variable for this analysis was low heart attack and stroke knowledge score. The covariates for the analysis were: age, sex, race/ethnicity, annual household income, attained education, health insurance status, having a health care provider (HCP), timing of last routine medical check-up, medical care deferment because of cost, self-defined health status and geographic locale. Results The weighted n for this study overall was 103,262,115 U.S. adults > =18 years of age. Approximately 22.0% of these respondents were U.S. adults living in rural locales. Logistic regression analysis revealed that those U.S. adults who had low composite heart attack and stroke knowledge scores were more likely to be rural (OR = 1.218 95%CI 1.216-1.219) rather than non-rural residents. Furthermore, those with low scores were more likely to be: male (OR = 1.353 95%CI 1.352-1.354), >65 years of age (OR = 1.369 95%CI 1.368-1.371), African American (OR = 1.892 95%CI 1.889-1.894), not educated beyond high school (OR = 1.400 955CI 1.399-1.402), uninsured (OR = 1.308 95%CI 1.3-6-1.310), without a HCP (OR = 1.216 95%CI 1.215-1.218), and living in a household with an annual income of < $50,000 (OR = 1.429 95%CI 1.428-1.431). Conclusions Analysis identified clear disparities between the knowledge levels U.S. adults have regarding heart attack and stroke symptoms. These disparities should guide educational endeavors focusing on improving knowledge of heart attack and stroke symptoms. PMID:22490185

  8. Tactical Determinants of Setting Zone in Elite Men'S Volleyball

    PubMed Central

    Afonso, Jose; Esteves, Francisca; Araújo, Rui; Thomas, Luke; Mesquita, Isabel

    2012-01-01

    The interactions between two opposing teams lead to the emergence of unique game patterns. In volleyball, attack efficacy emerges as the strongest predictor of the final result and thus it becomes of foremost importance to understand which game patterns afford the attaining of higher attack efficacies. These rely on the quality of the setting action. In turn, the serve and the serve reception constrain the setter's actions and the attacker's efficacy. Therefore, the purpose of this study was to examine predictors of the setting zone in elite-level men's volleyball. Thirty-one matches of the 2007 World Cup were analyzed, in total 5117 rallies. The dependent variable was the setting zone, and the independent variables were the server player, serve type, serve direction, serve depth, reception zone, receiver player and reception type. Multinomial logistic regression was applied, in order to obtain the estimated likelihood of occurrence of the dependent variable, based on the values of the independent variables (p < 0.05). Only the serve direction showed not to be predictive of the setting zone. Concerning the remaining variables, the tennis jump serve, serves from the middle-player, deep serves, reception near the endline or sidelines, reception by the zone 4 attackers when in defensive zone, and low reception all proved to impair the quality of reception, demanding the setter to play more often in the not acceptable setting zone. Results suggest that, at this level, practice of serve-reception should preferably cover the deep tennis jump serve, and attempt to afford the libero more opportunities to receive. By focusing on the variables with the most predictive power, performers may better allocate their attention towards the most pertinent cues at each moment. Knowledge of these interactive models provides valuable insights into the dynamics of the action sequences, affording coaches important information and guidance. Key pointsA set of key variables interact and allow predicting the setting zone, an important variable in determining attack efficacy in high-level men's volleyball.The tennis jump serve, deep serves, receptions near the endline or sidelines, serves from the middle-players, receptions by the zone 4 attackers when in defensive zone, and low reception enhance the utilization of non-ideal setting zones.By focusing on the variables with the most predictive power, performers may better allocate their attention towards the most pertinent cues at each moment.Knowledge of these interactive models provides valuable insights into the dynamics of the action sequences, affording coaches important information and guidance. PMID:24149123

  9. Cost-effectiveness of gammaCore (non-invasive vagus nerve stimulation) for acute treatment of episodic cluster headache.

    PubMed

    Mwamburi, Mkaya; Liebler, Eric J; Tenaglia, Andrew T

    2017-11-01

    Cluster headache is a debilitating disease characterized by excruciatingly painful attacks that affects 0.15% to 0.4% of the US population. Episodic cluster headache manifests as circadian and circannual seasonal bouts of attacks, each lasting 15 to 180 minutes, with periods of remission. In chronic cluster headache, the attacks occur throughout the year with no periods of remission. While existing treatments are effective for some patients, many patients continue to suffer. There are only 2 FDA-approved medications for episodic cluster headache in the United States, while others, such as high-flow oxygen, are used off-label. Episodic cluster headache is associated with comorbidities and affects work, productivity, and daily functioning. The economic burden of episodic cluster headache is considerable, costing more than twice that of nonheadache patients. gammaCore adjunct to standard of care (SoC) was found to have superior efficacy in treatment of acute episodic cluster headaches compared with sham-gammaCore used with SoC in ACT1 and ACT2 trials. However, the economic impact has not been characterized for this indication. We conducted a cost-effectiveness analysis of gammaCore adjunct to SoC compared with SoC alone for the treatment of acute pain associated with episodic cluster headache attacks. The model structure was based on treatment of acute attacks with 3 outcomes: failures, nonresponders, and responders. The time horizon of the model is 1 year using a payer perspective with uncertainty incorporated. Parameter inputs were derived from primary data from the randomized controlled trials for gammaCore. The mean annual costs associated with the gammaCore-plus-SoC arm was $9510, and mean costs for the SoC-alone arm was $10,040. The mean quality-adjusted life years for gammaCore-plus-SoC arm were 0.83, and for the SoC-alone arm, they were 0.74. The gammaCore-plus-SoC arm was dominant over SoC alone. All 1-way and multiway sensitivity analyses were cost-effective using a threshold of $20,000. gammaCore dominance, representing savings, was driven by superior efficacy, improvement in quality of life (QoL), and reduction in costs associated with successful and consistent abortion of episodic attacks. These findings serve as additional economic evidence to support coverage for gammaCore. Additional real-world data are needed to characterize the long-term impact of gammaCore on comorbidities, utilization, QoL, daily functioning, productivity, and social engagement of these patients, and for other indications.

  10. Phytohormone mediation of interactions between herbivores and plant pathogens.

    PubMed

    Lazebnik, Jenny; Frago, Enric; Dicke, Marcel; van Loon, Joop J A

    2014-07-01

    Induced plant defenses against either pathogens or herbivore attackers are regulated by phytohormones. These phytohormones are increasingly recognized as important mediators of interactions between organisms associated with plants. In this review, we discuss the role of plant defense hormones in sequential tri-partite interactions among plants, pathogenic microbes, and herbivorous insects, based on the most recent literature. We discuss the importance of pathogen trophic strategy in the interaction with herbivores that exhibit different feeding modes. Plant resistance mechanisms also affect plant quality in future interactions with attackers. We discuss exemplary evidence for the hypotheses that (i) biotrophic pathogens can facilitate chewing herbivores, unless plants exhibit effector-triggered immunity, but (ii) facilitate or inhibit phloem feeders. (iii) Necrotrophic pathogens, on the other hand, can inhibit both phloem feeders and chewers. We also propose herbivore feeding mode as predictor of effects on pathogens of different trophic strategies, providing evidence for the hypotheses that (iv) phloem feeders inhibit pathogen attack by increasing SA induction, whereas (v) chewing herbivores tend not to affect necrotrophic pathogens, while they may either inhibit or facilitate biotrophic pathogens. Putting these hypotheses to the test will increase our understanding of phytohormonal regulation of plant defense to sequential attack by plant pathogens and insect herbivores. This will provide valuable insight into plant-mediated ecological interactions among members of the plant-associated community.

  11. Face antispoofing based on frame difference and multilevel representation

    NASA Astrophysics Data System (ADS)

    Benlamoudi, Azeddine; Aiadi, Kamal Eddine; Ouafi, Abdelkrim; Samai, Djamel; Oussalah, Mourad

    2017-07-01

    Due to advances in technology, today's biometric systems become vulnerable to spoof attacks made by fake faces. These attacks occur when an intruder attempts to fool an established face-based recognition system by presenting a fake face (e.g., print photo or replay attacks) in front of the camera instead of the intruder's genuine face. For this purpose, face antispoofing has become a hot topic in face analysis literature, where several applications with antispoofing task have emerged recently. We propose a solution for distinguishing between real faces and fake ones. Our approach is based on extracting features from the difference between successive frames instead of individual frames. We also used a multilevel representation that divides the frame difference into multiple multiblocks. Different texture descriptors (local binary patterns, local phase quantization, and binarized statistical image features) have then been applied to each block. After the feature extraction step, a Fisher score is applied to sort the features in ascending order according to the associated weights. Finally, a support vector machine is used to differentiate between real and fake faces. We tested our approach on three publicly available databases: CASIA Face Antispoofing database, Replay-Attack database, and MSU Mobile Face Spoofing database. The proposed approach outperforms the other state-of-the-art methods in different media and quality metrics.

  12. A Graph Oriented Approach for Network Forensic Analysis

    ERIC Educational Resources Information Center

    Wang, Wei

    2010-01-01

    Network forensic analysis is a process that analyzes intrusion evidence captured from networked environment to identify suspicious entities and stepwise actions in an attack scenario. Unfortunately, the overwhelming amount and low quality of output from security sensors make it difficult for analysts to obtain a succinct high-level view of complex…

  13. Changes in Tree Quality in Response to Defoliation

    Treesearch

    Jack C. Schultz; Ian T. Baldwin

    1983-01-01

    Plant chemistry alone fails to explain why most trees escape defoliation most of the time. Chemical variation in space and time, acting to enhance the effectiveness of natural enemies, may be the key. Changes and increasing variation in direct response to insect attack ("induction") may be particularly important for irruptive pests.

  14. Pitting Corrosion of Copper in Waters with High pH and Low Alkalinity

    EPA Science Inventory

    Localized or pitting corrosion of copper pipes used in household drinking-water plumbing is a problem for many water utilities and their customers. Extreme attack can lead to pinhole water leaks that may result in water damage, mold growth, and costly repairs. Water quality has b...

  15. TESTING AND VERIFICATION OF REAL-TIME WATER QUALITY MONITORING SENSORS IN A DISTRIBUTION SYSTEM AGAINST INTRODUCED CONTAMINATION

    EPA Science Inventory

    Drinking water distribution systems reach the majority of American homes, business and civic areas, and are therefore an attractive target for terrorist attack via direct contamination, or backflow events. Instrumental monitoring of such systems may be used to signal the prese...

  16. Integrated Social and Quality of Service Trust Management of Mobile Groups in Ad Hoc Networks

    DTIC Science & Technology

    2013-01-01

    high resiliency to malicious attacks and misbehaving nodes. Keywords—trust management; mobile ad hoc networks; QoS trust; social trust; trust...paper we address an importance issue of trust management protocol design for MANETs: trust bias minimization despite misbehaving nodes performing

  17. Medium-term effectiveness of online behavioral training in migraine self-management: A randomized trial controlled over 10 months.

    PubMed

    Sorbi, M J; Kleiboer, A M; van Silfhout, H G; Vink, G; Passchier, J

    2015-06-01

    This randomized, controlled trial examined the medium-term effectiveness of online behavioral training in migraine self-management (oBT; N = 195) versus waitlist control (WLC; N = 173) on attack frequency, indicators of self-management (primary outcomes), headache top intensity, use of rescue medications, quality of life and disability (secondary outcomes). An online headache diary following the ICHD-II and questionnaires were completed at baseline (T0), post-training (T1) and six months later (T2). Missing data (T1: 24%; T2: 37%) were handled by multiple imputation. We established effect sizes (ES) and tested between-group differences over time with linear mixed modelling techniques based on the intention-to-treat principle. At T2, attack frequency had improved significantly in oBT (-23%, ES = 0.66) but also in WLC (-19%; ES = 0.52). Self-efficacy, internal and external control in migraine management--and triptan use--improved only in oBT, however. This indicates different processes in both groups and could signify (the start of) active self-management in oBT. Also, only oBT improved migraine-specific quality of life to a sizable extent. oBT produced self-management gains but could not account for improved attack frequency, because WLC improved as well. The perspective that BT effects develop gradually, and that online delivery will boost BT outreach, justifies further research. © International Headache Society 2014 Reprints and permissions: sagepub.co.uk/journalsPermissions.nav.

  18. Improving the Quality of Alerts and Predicting Intruder's Next Goal with Hidden Colored Petri-Net

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Yu, Dong; Frincke, Deb A.

    2006-06-22

    Intrusion detection systems (IDS) often provide poor quality alerts, which are insufficient to support rapid identification of ongoing attacks or predict an intruder’s next likely goal. In this paper, we propose a novel approach to alert post-processing and correlation, the Hidden Colored Petri-Net (HCPN). Different from most other alert correlation methods, our approach treats the alert correlation problem as an inference problem rather than a filter problem. Our approach assumes that the intruder’s actions are unknown to the IDS and can be inferred only from the alerts generated by the IDS sensors. HCPN can describe the relationship between different stepsmore » carried out by intruders, model observations (alerts) and transitions (actions) separately, and associate each token element (system state) with a probability (or confidence). The model is an extension to Colored Petri-Net (CPN) .It is so called “hidden” because the transitions (actions) are not directly observable but can be inferred by looking through the observations (alerts). These features make HCPN especially suitable for discovering intruders’ actions from their partial observations (alerts,) and predicting intruders’ next goal. Our experiments on DARPA evaluation datasets and the attack scenarios from the Grand Challenge Problem (GCP) show that HCPN has promise as a way to reducing false positives and negatives, predicting intruder’s next possible action, uncovering intruders’ intrusion strategies after the attack scenario has happened, and providing confidence scores.« less

  19. A study of IEEE 802.15.4 security framework for wireless body area networks.

    PubMed

    Saleem, Shahnaz; Ullah, Sana; Kwak, Kyung Sup

    2011-01-01

    A Wireless Body Area Network (WBAN) is a collection of low-power and lightweight wireless sensor nodes that are used to monitor the human body functions and the surrounding environment. It supports a number of innovative and interesting applications, including ubiquitous healthcare and Consumer Electronics (CE) applications. Since WBAN nodes are used to collect sensitive (life-critical) information and may operate in hostile environments, they require strict security mechanisms to prevent malicious interaction with the system. In this paper, we first highlight major security requirements and Denial of Service (DoS) attacks in WBAN at Physical, Medium Access Control (MAC), Network, and Transport layers. Then we discuss the IEEE 802.15.4 security framework and identify the security vulnerabilities and major attacks in the context of WBAN. Different types of attacks on the Contention Access Period (CAP) and Contention Free Period (CFP) parts of the superframe are analyzed and discussed. It is observed that a smart attacker can successfully corrupt an increasing number of GTS slots in the CFP period and can considerably affect the Quality of Service (QoS) in WBAN (since most of the data is carried in CFP period). As we increase the number of smart attackers the corrupted GTS slots are eventually increased, which prevents the legitimate nodes to utilize the bandwidth efficiently. This means that the direct adaptation of IEEE 802.15.4 security framework for WBAN is not totally secure for certain WBAN applications. New solutions are required to integrate high level security in WBAN.

  20. A Study of IEEE 802.15.4 Security Framework for Wireless Body Area Networks

    PubMed Central

    Saleem, Shahnaz; Ullah, Sana; Kwak, Kyung Sup

    2011-01-01

    A Wireless Body Area Network (WBAN) is a collection of low-power and lightweight wireless sensor nodes that are used to monitor the human body functions and the surrounding environment. It supports a number of innovative and interesting applications, including ubiquitous healthcare and Consumer Electronics (CE) applications. Since WBAN nodes are used to collect sensitive (life-critical) information and may operate in hostile environments, they require strict security mechanisms to prevent malicious interaction with the system. In this paper, we first highlight major security requirements and Denial of Service (DoS) attacks in WBAN at Physical, Medium Access Control (MAC), Network, and Transport layers. Then we discuss the IEEE 802.15.4 security framework and identify the security vulnerabilities and major attacks in the context of WBAN. Different types of attacks on the Contention Access Period (CAP) and Contention Free Period (CFP) parts of the superframe are analyzed and discussed. It is observed that a smart attacker can successfully corrupt an increasing number of GTS slots in the CFP period and can considerably affect the Quality of Service (QoS) in WBAN (since most of the data is carried in CFP period). As we increase the number of smart attackers the corrupted GTS slots are eventually increased, which prevents the legitimate nodes to utilize the bandwidth efficiently. This means that the direct adaptation of IEEE 802.15.4 security framework for WBAN is not totally secure for certain WBAN applications. New solutions are required to integrate high level security in WBAN. PMID:22319358

  1. Epidemiology of international terrorism involving fatal outcomes in developed countries (1994-2003).

    PubMed

    Wilson, Nick; Thomson, George

    2005-01-01

    We aimed to describe the public health burden and epidemiology of international terrorism (i.e. involving foreign nationals) with fatal outcomes in developed countries. Data was abstracted from a United States Department of State database for 21 'established market economy' countries and 18 'former socialist economies of Europe' for 1994-2003. To put the findings in a wider context, comparisons were made with WHO data on all homicides for each country. A total of 32 international terrorist attacks causing fatalities were identified over the 10-year period. These resulted in 3299 deaths, giving a crude annual mortality rate of 0.3 per million population. The mortality burden attributable to international terrorism in these countries was 208 times less than that attributable to other homicide. Even for the country with the highest mortality burden from international terrorism (the United States), this ratio was 60. There was no statistically significant trend in the number of attacks over time, but the attack severity (in terms of deaths per attack) was higher in the latter part of the 10-year period. A number of limitations with this data set were identified. If a more rigorous definition of 'international terrorism' was used, then this would substantially reduce the total number of such attacks defined in this way. In conclusion, there is a need for better quality data and improved classification systems for describing international terrorism. Nevertheless, the available data indicates that the mortality burden from international terrorism in developed countries is small compared to that from other homicide.

  2. Shared War reality effects on the professional quality of life of mental health professionals.

    PubMed

    Pruginin, Itay; Segal-Engelchin, Dorit; Isralowitz, Richard; Reznik, Alexander

    2016-01-01

    To date, studies on the outcomes of a shared war reality among mental health professionals (MHPs) in southern Israel have focused only on those residing and working in Otef Gaza. The aim of this study is to determine the impact of different exposure levels to shared trauma on the professional quality of life of MHPs in southern Israel. This study compares the level of secondary traumatic stress, burnout, and compassion satisfaction of social workers from Otef Gaza to social workers living and working in the Beer-Sheva area who experience occasional missile attacks. The Professional Quality of Life Scale was used to examine the level of secondary traumatic stress, burnout, and compassion satisfaction of 125 social workers living and working in the Negev: 72 from Beer-Sheva and 53 from the regional councils of Otef Gaza. No statistically significant differences were found in the three professional quality of life variables between the Otef-Gaza and Beer-Sheva groups. The lack of secondary traumatic stress and burnout differences between the study groups, despite the chronic exposure to terror attacks among the Otef Gaza social workers, may be explained by the strong sense of belonging and support evidenced by many Otef Gaza residents as well as by the comprehensive trauma training MHPs receive for work in the region. The results of this study are important for health policy geared to trauma prevention efforts, moderating the effects of work under shared war reality, and promoting the professional quality of life of MHPs in conflict areas.

  3. Analysis of the longitudinal handling qualities and pilot-induced-oscillation tendencies of the High-Angle-of-Attack Research Vehicle (HARV)

    NASA Technical Reports Server (NTRS)

    Hess, Ronald A.

    1994-01-01

    The NASA High-Angle-of Attack Research Vehicle (HARV), a modified F-18 aircraft, experienced handling qualities problems in recent flight tests at NASA Dryden Research Center. Foremost in these problems was the tendency of the pilot-aircraft system to exhibit a potentially dangerous phenomenon known as a pilot-induced oscillation (PIO). When they occur, PIO's can severely restrict performance, sharply dimish mission capabilities, and can even result in aircraft loss. A pilot/vehicle analysis was undertaken with the goal of reducing these PIO tendencies and improving the overall vehicle handling qualities with as few changes as possible to the existing feedback/feedforward flight control laws. Utilizing a pair of analytical pilot models developed by the author, a pilot/vehicle analysis of the existing longitudinal flight control system was undertaken. The analysis included prediction of overall handling qualities levels and PIO susceptability. The analysis indicated that improvement in the flight control system was warranted and led to the formulation of a simple control stick command shaping filter. Analysis of the pilot/vehicle system with the shaping filter indicated significant improvements in handling qualities and PIO tendencies could be achieved. A non-real time simulation of the modified control system was undertaken with a realistic, nonlinear model of the current HARV. Special emphasis was placed upon those details of the command filter implementation which could effect safety of flight. The modified system is currently awaiting evaluation in the real-time, pilot-in-the-loop, Dual-Maneuvering-Simulator (DMS) facility at Langley.

  4. Migraine, arousal and sleep deprivation: comment on: “sleep quality, arousal and pain thresholds in migraineurs: a blinded controlled polysomnographic study”

    PubMed Central

    2013-01-01

    We discuss the hypothesis proposed by Engstrom and coworkers that Migraineurs have a relative sleep deprivation, which lowers the pain threshold and predispose to attacks. Previous data indicate that Migraineurs have a reduction of Cyclic Alternating Pattern (CAP), an essential mechanism of NREM sleep regulation which allows to dump the effect of incoming disruptive stimuli, and to protect sleep. The modifications of CAP observed in Migraineurs are similar to those observed in patients with impaired arousal (narcolepsy) and after sleep deprivation. The impairment of this mechanism makes Migraineurs more vulnerable to stimuli triggering attacks during sleep, and represents part of a more general vulnerability to incoming stimuli. PMID:23758606

  5. Sialendoscopy in juvenile recurrent parotitis: a review of the literature.

    PubMed

    Canzi, P; Occhini, A; Pagella, F; Marchal, F; Benazzo, M

    2013-12-01

    Juvenile recurrent parotitis (JRP) is the second most frequent salivary gland disease in childhood, defined as a recurrent non-suppurative and non-obstructive parotid inflammation. The recurring attacks actually represent the most dramatic and serious aspect of this pathology, since they significantly influence the quality of life, and there are no recognized therapies to avoid them. In recent years, there are reports of many international experiences related to the management of JRP by sialendoscopy. In this context, several authors have stressed the striking role of sialendoscopy in the prevention of JRP attacks. The objective of the current review is to overview the existing literature with particular regards to diagnostic and therapeutic outcomes after the application of sialendoscopy in patients suffering from JRP.

  6. Insect and Disease Pests of Southern Hardwoods

    Treesearch

    L. P. Abrahamson; F. I. McCracken

    1971-01-01

    Insects and diseases seldom kill southern hardwood trees in managed stands, but they cause major economic losses by lowering wood quality and reducing tree growth. In discussing the most important insects and diseases of southern hardwoods, let us consider first those that attack natural hardwood stands and then those associated with plantation culture.

  7. EXPERIMENTATION AND INNOVATION--A SEVEN-YEAR REPORT.

    ERIC Educational Resources Information Center

    DI LORENZO, LOUIS T.; SALTER, RUTH

    REPORTED IN AN EVALUATION OF A PROGRAM OF STATE AID FOR EXPERIMENTAL PROGRAMS WAS AN OVERVIEW OF THE LEGISLATION AND ADMINISTRATION GOVERNING SUCH PROGRAMS. A PURPOSE OF THE FINANCIAL AID TO LOCAL SCHOOL DISTRICTS WILLING TO EXPERIMENT WITH INNOVATIONS TO IMPROVE INSTRUCTIONAL QUALITY WAS TO PROMOTE THE SCIENTIFIC METHOD IN ATTACKING TEACHING AND…

  8. Formation and emission of linalool in tea (Camellia sinensis) leaves infested by tea green leafhopper (Empoasca (Matsumurasca) onukii Matsuda).

    PubMed

    Mei, Xin; Liu, Xiaoyu; Zhou, Ying; Wang, Xiaoqin; Zeng, Lanting; Fu, Xiumin; Li, Jianlong; Tang, Jinchi; Dong, Fang; Yang, Ziyin

    2017-12-15

    Famous oolong tea (Oriental Beauty), which is manufactured by tea leaves (Camellia sinensis) infected with tea green leafhoppers, contains characteristic volatile monoterpenes derived from linalool. This study aimed to determine the formation mechanism of linalool in tea exposed to tea green leafhopper attack. The tea green leafhopper responsible for inducing the production of characteristic volatiles was identified as Empoasca (Matsumurasca) onukii Matsuda. E. (M.) onukii attack significantly induced the emission of linalool from tea leaves (p<0.05) as a result of the up-regulation of the linalool synthases (CsLIS1 and CsLIS2) (p<0.05). Continuous mechanical damage significantly enhanced CsLIS1 and CsLIS2 expression levels and linalool emission (p<0.05). Therefore, continuous wounding was a key factor causing the formation and emission of linalool from tea leaves exposed to E. (M.) onukii attack. This information should prove helpful for the future use of stress responses of plant secondary metabolism to improve quality components of agricultural products. Copyright © 2017 Elsevier Ltd. All rights reserved.

  9. Flight test results for several light, canard-configured airplanes

    NASA Technical Reports Server (NTRS)

    Brown, Philip W.

    1987-01-01

    Brief flight evaluations of two different, light, composite constructed, canard and winglet configured airplanes were performed to assess their handling qualities; one airplane was a single engine, pusher design and the other a twin engine, push-pull configuration. An emphasis was placed on the slow speed/high angle of attack region for both airplanes and on the engine-out regime for the twin. Mission suitability assessment included cockpit and control layout, ground and airborne handling qualities, and turbulence response. Very limited performance data was taken. Stall/spin tests and the effects of laminar flow loss on performance and handling qualities were assessed on an extended range, single engine pusher design.

  10. X-29A Lateral-Directional Stability and Control Derivatives Extracted From High-Angle-of-Attack Flight Data

    NASA Technical Reports Server (NTRS)

    Iliff, Kenneth W.; Wang, Kon-Sheng Charles Wang

    1996-01-01

    The lateral-directional stability and control derivatives of the X-29A number 2 are extracted from flight data over an angle-of-attack range of 4 degrees to 53 degrees using a parameter identification algorithm. The algorithm uses the linearized aircraft equations of motion and a maximum likelihood estimator in the presence of state and measurement noise. State noise is used to model the uncommanded forcing function caused by unsteady aerodynamics over the aircraft at angles of attack above 15 degrees. The results supported the flight-envelope-expansion phase of the X-29A number 2 by helping to update the aerodynamic mathematical model, to improve the real-time simulator, and to revise flight control system laws. Effects of the aircraft high gain flight control system on maneuver quality and the estimated derivatives are also discussed. The derivatives are plotted as functions of angle of attack and compared with the predicted aerodynamic database. Agreement between predicted and flight values is quite good for some derivatives such as the lateral force due to sideslip, the lateral force due to rudder deflection, and the rolling moment due to roll rate. The results also show significant differences in several important derivatives such as the rolling moment due to sideslip, the yawing moment due to sideslip, the yawing moment due to aileron deflection, and the yawing moment due to rudder deflection.

  11. Injured civilian survivors of suicide bomb attacks: from partial PTSD to recovery or to traumatisation. Where is the turning point?

    PubMed

    Dolberg, Ornah T; Barkai, Gabriel; Leor, Agnes; Rapoport, Helena; Bloch, Miki; Schreiber, Shaul

    2010-03-01

    To assess the short- (3-9 months) and medium-term (30 months) occurrence and severity of post-traumatic stress disorder (PTSD) in civilian survivors of suicide bombing terrorist attacks. We evaluated 129 injured survivors of nine attacks in Israel who were treated in our emergency room between June 2000 and September 2002. Data on demographics, physical injuries and psychiatric symptoms were collected by both a structured clinical interview and standard assessment scales for depression, anxiety, and sleep quality. Diagnosis of PTSD was based on a Hebrew-validated DSM-IV SCID-PTSD rating scale. At the first assessment (short-term), 20 survivors (15.5%) met the criteria for full-blown PTSD and 54 (42%) for sub-clinical PTSD, while 55 (42.5%) evidenced no symptoms of PTSD. Two years later, only 54 patients could be located: 19 (35%) of them had either persistent or de novo PTSD and none had residual sub-clinical PTSD. Relatively few survivors of suicide bomb attacks had full-blown PTSD, while a substantial number of survivors had short-term sub-clinical PTSD. Two-year follow-up evaluations revealed that a significant a number of the patients available for testing (35%) had full-blown PTSD. These findings imply that medium-term follow-up of survivors is needed in order to establish the actual prevalence of PTSD.

  12. Conceptual model of acid attacks based on survivor's experiences: Lessons from a qualitative exploration.

    PubMed

    Sabzi Khoshnami, Mohammad; Mohammadi, Elham; Addelyan Rasi, Hamideh; Khankeh, Hamid Reza; Arshi, Maliheh

    2017-05-01

    Acid attack, a worldwide phenomenon, has been increasing in recent years. In addition to severe injuries to the face and body, such violence leads to psychological and social problems that affect the survivors' quality of life. The present study provides a more in-depth understanding of this phenomenon and explores the nature and dimensions of acid attacks based on survivors' experiences. A grounded theory study using semi-structured, recorded interviews and applying purposeful theoretical sampling was conducted with 12 acid attack survivors in Iran. Data were analysed using constant comparison in open, axial and selective coding stages. A conceptual model was developed to explain the relationships among the main categories extracted through the grounded theory study. Physical and psychological wounds emerged as a core category. Traditional context and extreme beauty value in society acted as the context of the physical and psychological wounds experienced. Living with a drug abuser with behavioural disorders and lack of problem-solving skills in interpersonal conflict were found to be causal conditions. Action strategies to deal with this experience were found to be composed of individual, interpersonal and structural levels. Education, percentage and place of burning acted as intervening conditions that influenced survivors' strategies. Finally, adverse consequences of social deprivation and feeling helpless and hindered were found to have an important impact. Acid attack lead to physical and psychological wounds in survivors. This is a multi-dimensional phenomenon involving illness, disability, and victimization, and requires a wide range of strategies at different levels. The conceptual model derived through this study can serve as a good basis for intervention programs. Copyright © 2016 Elsevier Ltd and ISBI. All rights reserved.

  13. Quality assessment of two- and three-dimensional unstructured meshes and validation of an upwind Euler flow solver

    NASA Technical Reports Server (NTRS)

    Woodard, Paul R.; Batina, John T.; Yang, Henry T. Y.

    1992-01-01

    Quality assessment procedures are described for two-dimensional unstructured meshes. The procedures include measurement of minimum angles, element aspect ratios, stretching, and element skewness. Meshes about the ONERA M6 wing and the Boeing 747 transport configuration are generated using an advancing front method grid generation package of programs. Solutions of Euler's equations for these meshes are obtained at low angle-of-attack, transonic conditions. Results for these cases, obtained as part of a validation study demonstrate accuracy of an implicit upwind Euler solution algorithm.

  14. Molecular assemblies as protective barriers and adhesion promotion interlayer

    DOEpatents

    King, D.E.; Czanderna, A.W.; Kennedy, C.E.

    1996-01-30

    A protective diffusion barrier having adhesive qualities for metalized surfaces is provided by a passivating agent having the formula HS--(CH{sub 2}){sub 11}--COOH which forms a very dense, transparent organized molecular assembly or layer that is impervious to water, alkali, and other impurities and corrosive substances that typically attack metal surfaces. 8 figs.

  15. Disrupting Whitestream Measures of Quality Teaching: The Community Cultural Wealth of Teachers of Color

    ERIC Educational Resources Information Center

    Burciaga, Rebeca; Kohli, Rita

    2018-01-01

    Discussions of teacher preparation, qualifications, and effectiveness are at the heart of increasing attacks on public education. In this article, we contribute to the growing body of literature that works to challenge the narrowing parameters of what is considered effective teacher pedagogy, particularly as it relates to the noted value of…

  16. Dickens, Chesterton, and the Future of English Studies

    ERIC Educational Resources Information Center

    Rampton, David

    2014-01-01

    The idea that literature has inspirational qualities and is produced by Great Writers has repeatedly come under attack as literary studies seeks to redefine itself. Yet the ability to think of the writer as genius, seer, moral guide, all the romantic possibilities, in short, is arguably as important as it has always been. Engaging with what G.K.…

  17. Inconvenient Truths: A Response to the Article by David Stoesz, "The Child Welfare Cartel"

    ERIC Educational Resources Information Center

    Clark, James J.; Yegidis, Bonnie L.

    2016-01-01

    David Stoesz offers a sweeping critique of the Children's Bureau and social work education by claiming the existence of a "child welfare cartel." He also attacks the quality of social work education and research, which he claims has poorly invested government funding and helped create the unmitigated failures of the American child…

  18. Educational Morality: A Task of Resisting the Economic Corruption of Academic Excellence.

    ERIC Educational Resources Information Center

    Van Allen, George H.

    Although the United States leads the world in spending for education, the quality of education is under attack from all quarters. On college campuses, the perceived necessity to maintain enrollment levels, and a post-60's reluctance to be selective in admissions contributed to waning academic standards. Economic interests have become the dominant…

  19. Game Location and Team Quality Effects on Performance Profiles in Professional Soccer

    PubMed Central

    Lago-Peñas, Carlos; Lago-Ballesteros, Joaquin

    2011-01-01

    Home advantage in team sports has an important role in determining the outcome of a game. The aim of the present study was to identify the soccer game- related statistics that best discriminate home and visiting teams according to the team quality. The sample included all 380 games of the Spanish professional men’s league. The independent variables were game location (home or away) and the team quality. Teams were classified into four groups according to their final ranking at the end of the league. The game-related statistics registered were divided into three groups: (i) variables related to goals scored; (ii) variables related to offense and (iii) variables related to defense. A univariate (t-test and Mann-Whitney U) and multivariate (discriminant analysis) analysis of data was done. Results showed that home teams have significantly higher means for goal scored, total shots, shots on goal, attacking moves, box moves, crosses, offsides committed, assists, passes made, successful passes, dribbles made, successful dribbles, ball possession, and gains of possession, while visiting teams presented higher means for losses of possession and yellow cards. In addition, the findings of the current study confirm that game location and team quality are important in determining technical and tactical performances in matches. Teams described as superior and those described as inferior did not experience the same home advantage. Future research should consider the influence of other confounding variables such as weather conditions, game status and team form. Key points Home teams have significantly higher figures for attack indicators probably due to facilities familiarity and crowd effects. The teams’ game-related statistics profile varied according to game location and team quality. Teams described as superior and those described as inferior did not experience the same home advantage. PMID:24150619

  20. Handling qualities related to stall/spin accidents of supersonic fighter aircraft

    NASA Technical Reports Server (NTRS)

    Anderson, S. B.

    1984-01-01

    This paper reviews the handling qualities which influence the high angle of attack (AOA) behavior of supersonic fighter aircraft in order to obtain a clearer understanding of the causes of stall/spin accidents. The results show that, because modern fighters suffer more serious consequences when control is lost, good handling qualities are essential for safe operation at high AOA. Relaxed static stability used on some fighter aircraft can result in control problems at high AOA owing to inertia coupling and the difficulty of a recovery from a deep stall. Indications are that the use of departure/spin resistance and an automatic spin prevention system will greatly improve the safety record for modern supersonic fighters.

  1. Asthma-specific health-related quality of life of people in Great Britain: A national survey.

    PubMed

    Upton, Jane; Lewis, Carine; Humphreys, Emily; Price, David; Walker, Samantha

    2016-11-01

    Although the ultimate goal of asthma treatment is to improve asthma-specific Health-Related Quality-Of-Life (HRQOL), in the UK population this is insufficiently studied. National asthma-specific HRQOL data is needed to inform strategies to address this condition. To benchmark asthma-specific HRQOL in a national survey of adults with asthma, and explore differences in this measure within subsections of the population. We analysed answers to the Marks Asthma Quality-of-Life Questionnaire (AQLQ-M) from a representative sample of 658 adults with asthma. Respondents answered asthma-specific questions to assess control, previous hospital admissions, asthma attacks and an indicator of severity. Higher scores indicate poorer HRQOL (maximum = 60). The highest quintile formed a subgroup 'Poor HRQOL'. Data were weighted to correct for any biases caused by differential non-response. Chi-square analyses were used to determine differences between good and poor quality of life and regression analyses performed to determine what factors are associated with poor HRQOL. The response rate was 49%. AQLQ-M median (IQR) scores were 5 (2-13) for the total sample (poor HRQOL = 21, good HRQOL = 3). Significant differences between good and poor HRQOL were observed in smoking status, SES, employment status and co-morbidities, but no differences were found between age groups. Those with poorly controlled asthma were significantly more likely to have poor HRQOL, ≥1 breathing related hospital admission or ≥1 asthma attack. This article provides benchmarking data on asthma-specific HRQOL. Improved strategies are needed to target interventions towards people experiencing poor HRQOL.

  2. Fearful Foragers: Honey Bees Tune Colony and Individual Foraging to Multi-Predator Presence and Food Quality

    PubMed Central

    Tan, Ken; Hu, Zongwen; Chen, Weiwen; Wang, Zhengwei; Wang, Yuchong; Nieh, James C.

    2013-01-01

    Fear can have strong ecosystem effects by giving predators a role disproportionate to their actual kill rates. In bees, fear is shown through foragers avoiding dangerous food sites, thereby reducing the fitness of pollinated plants. However, it remains unclear how fear affects pollinators in a complex natural scenario involving multiple predator species and different patch qualities. We studied hornets, Vespa velutina (smaller) and V. tropica (bigger) preying upon the Asian honey bee, Apis cerana in China. Hornets hunted bees on flowers and were attacked by bee colonies. Bees treated the bigger hornet species (which is 4 fold more massive) as more dangerous. It received 4.5 fold more attackers than the smaller hornet species. We tested bee responses to a three-feeder array with different hornet species and varying resource qualities. When all feeders offered 30% sucrose solution (w/w), colony foraging allocation, individual visits, and individual patch residence times were reduced according to the degree of danger. Predator presence reduced foraging visits by 55–79% and residence times by 17–33%. When feeders offered different reward levels (15%, 30%, or 45% sucrose), colony and individual foraging favored higher sugar concentrations. However, when balancing food quality against multiple threats (sweeter food corresponding to higher danger), colonies exhibited greater fear than individuals. Colonies decreased foraging at low and high danger patches. Individuals exhibited less fear and only decreased visits to the high danger patch. Contrasting individual with emergent colony-level effects of fear can thus illuminate how predators shape pollination by social bees. PMID:24098734

  3. An Anti-Electromagnetic Attack PUF Based on a Configurable Ring Oscillator for Wireless Sensor Networks

    PubMed Central

    Lu, Zhaojun; Li, Dongfang; Liu, Hailong; Gong, Mingyang; Liu, Zhenglin

    2017-01-01

    Wireless sensor networks (WSNs) are an emerging technology employed in some crucial applications. However, limited resources and physical exposure to attackers make security a challenging issue for a WSN. Ring oscillator-based physical unclonable function (RO PUF) is a potential option to protect the security of sensor nodes because it is able to generate random responses efficiently for a key extraction mechanism, which prevents the non-volatile memory from storing secret keys. In order to deploy RO PUF in a WSN, hardware efficiency, randomness, uniqueness, and reliability should be taken into account. Besides, the resistance to electromagnetic (EM) analysis attack is important to guarantee the security of RO PUF itself. In this paper, we propose a novel architecture of configurable RO PUF based on exclusive-or (XOR) gates. First, it dramatically increases the hardware efficiency compared with other types of RO PUFs. Second, it mitigates the vulnerability to EM analysis attack by placing the adjacent RO arrays in accordance with the cosine wave and sine wave so that the frequency of each RO cannot be detected. We implement our proposal in XINLINX A-7 field programmable gate arrays (FPGAs) and conduct a set of experiments to evaluate the quality of the responses. The results show that responses pass the National Institute of Standards and Technology (NIST) statistical test and have good uniqueness and reliability under different environments. Therefore, the proposed configurable RO PUF is suitable to establish a key extraction mechanism in a WSN. PMID:28914756

  4. FSM-F: Finite State Machine Based Framework for Denial of Service and Intrusion Detection in MANET.

    PubMed

    N Ahmed, Malik; Abdullah, Abdul Hanan; Kaiwartya, Omprakash

    2016-01-01

    Due to the continuous advancements in wireless communication in terms of quality of communication and affordability of the technology, the application area of Mobile Adhoc Networks (MANETs) significantly growing particularly in military and disaster management. Considering the sensitivity of the application areas, security in terms of detection of Denial of Service (DoS) and intrusion has become prime concern in research and development in the area. The security systems suggested in the past has state recognition problem where the system is not able to accurately identify the actual state of the network nodes due to the absence of clear definition of states of the nodes. In this context, this paper proposes a framework based on Finite State Machine (FSM) for denial of service and intrusion detection in MANETs. In particular, an Interruption Detection system for Adhoc On-demand Distance Vector (ID-AODV) protocol is presented based on finite state machine. The packet dropping and sequence number attacks are closely investigated and detection systems for both types of attacks are designed. The major functional modules of ID-AODV includes network monitoring system, finite state machine and attack detection model. Simulations are carried out in network simulator NS-2 to evaluate the performance of the proposed framework. A comparative evaluation of the performance is also performed with the state-of-the-art techniques: RIDAN and AODV. The performance evaluations attest the benefits of proposed framework in terms of providing better security for denial of service and intrusion detection attacks.

  5. An Anti-Electromagnetic Attack PUF Based on a Configurable Ring Oscillator for Wireless Sensor Networks.

    PubMed

    Lu, Zhaojun; Li, Dongfang; Liu, Hailong; Gong, Mingyang; Liu, Zhenglin

    2017-09-15

    Wireless sensor networks (WSNs) are an emerging technology employed in some crucial applications. However, limited resources and physical exposure to attackers make security a challenging issue for a WSN. Ring oscillator-based physical unclonable function (RO PUF) is a potential option to protect the security of sensor nodes because it is able to generate random responses efficiently for a key extraction mechanism, which prevents the non-volatile memory from storing secret keys. In order to deploy RO PUF in a WSN, hardware efficiency, randomness, uniqueness, and reliability should be taken into account. Besides, the resistance to electromagnetic (EM) analysis attack is important to guarantee the security of RO PUF itself. In this paper, we propose a novel architecture of configurable RO PUF based on exclusive-or (XOR) gates. First, it dramatically increases the hardware efficiency compared with other types of RO PUFs. Second, it mitigates the vulnerability to EM analysis attack by placing the adjacent RO arrays in accordance with the cosine wave and sine wave so that the frequency of each RO cannot be detected. We implement our proposal in XINLINX A-7 field programmable gate arrays (FPGAs) and conduct a set of experiments to evaluate the quality of the responses. The results show that responses pass the National Institute of Standards and Technology (NIST) statistical test and have good uniqueness and reliability under different environments. Therefore, the proposed configurable RO PUF is suitable to establish a key extraction mechanism in a WSN.

  6. Leaf Quality and the Host Preferences of Gypsy Moth in the Northern Deciduous Forest

    Treesearch

    Martin J.  Lechowicz

    1983-01-01

    Both gypsy morh host preferences and the foliage characteristics thaL have been implicated as factors in host selection were monitored from 1979 to 1982 in a Quercus-Acer-Ostrya forest near Montreal, Quebec. The preliminary analyses of these data suggest the hypothesis that gypsy moth larvae preferentially attack trees that have high sugar:tannin...

  7. Unwilling Brides: "Phallic Attack" as a Barrier to Gender Balance in Higher Education in Nigeria

    ERIC Educational Resources Information Center

    Nwadigwe, Charles E.

    2007-01-01

    Gender balance in access to quality education is a crucial item on the agenda of the Millennium Development Goals. But this ideal appears beset by a number of barriers, especially at higher education level. This study investigated the problem of sexual harassment in the Nigerian university system as a barrier to the educational advancement of…

  8. A high-quality high-fidelity visualization of the September 11 attack on the World Trade Center.

    PubMed

    Rosen, Paul; Popescu, Voicu; Hoffmann, Christoph; Irfanoglu, Ayhan

    2008-01-01

    In this application paper, we describe the efforts of a multidisciplinary team towards producing a visualization of the September 11 Attack on the North Tower of New York's World Trade Center. The visualization was designed to meet two requirements. First, the visualization had to depict the impact with high fidelity, by closely following the laws of physics. Second, the visualization had to be eloquent to a nonexpert user. This was achieved by first designing and computing a finite-element analysis (FEA) simulation of the impact between the aircraft and the top 20 stories of the building, and then by visualizing the FEA results with a state-of-the-art commercial animation system. The visualization was enabled by an automatic translator that converts the simulation data into an animation system 3D scene. We built upon a previously developed translator. The translator was substantially extended to enable and control visualization of fire and of disintegrating elements, to better scale with the number of nodes and number of states, to handle beam elements with complex profiles, and to handle smoothed particle hydrodynamics liquid representation. The resulting translator is a powerful automatic and scalable tool for high-quality visualization of FEA results.

  9. Digital audio watermarking using moment-preserving thresholding

    NASA Astrophysics Data System (ADS)

    Choi, DooSeop; Jung, Hae Kyung; Choi, Hyuk; Kim, Taejeong

    2007-09-01

    The Moment-Preserving Thresholding technique for digital images has been used in digital image processing for decades, especially in image binarization and image compression. Its main strength lies in that the binary values that the MPT produces as a result, called representative values, are usually unaffected when the signal being thresholded goes through a signal processing operation. The two representative values in MPT together with the threshold value are obtained by solving the system of the preservation equations for the first, second, and third moment. Relying on this robustness of the representative values to various signal processing attacks considered in the watermarking context, this paper proposes a new watermarking scheme for audio signals. The watermark is embedded in the root-sum-square (RSS) of the two representative values of each signal block using the quantization technique. As a result, the RSS values are modified by scaling the signal according to the watermark bit sequence under the constraint of inaudibility relative to the human psycho-acoustic model. We also address and suggest solutions to the problem of synchronization and power scaling attacks. Experimental results show that the proposed scheme maintains high audio quality and robustness to various attacks including MP3 compression, re-sampling, jittering, and, DA/AD conversion.

  10. A Comparative Study of Anomaly Detection Techniques for Smart City Wireless Sensor Networks.

    PubMed

    Garcia-Font, Victor; Garrigues, Carles; Rifà-Pous, Helena

    2016-06-13

    In many countries around the world, smart cities are becoming a reality. These cities contribute to improving citizens' quality of life by providing services that are normally based on data extracted from wireless sensor networks (WSN) and other elements of the Internet of Things. Additionally, public administration uses these smart city data to increase its efficiency, to reduce costs and to provide additional services. However, the information received at smart city data centers is not always accurate, because WSNs are sometimes prone to error and are exposed to physical and computer attacks. In this article, we use real data from the smart city of Barcelona to simulate WSNs and implement typical attacks. Then, we compare frequently used anomaly detection techniques to disclose these attacks. We evaluate the algorithms under different requirements on the available network status information. As a result of this study, we conclude that one-class Support Vector Machines is the most appropriate technique. We achieve a true positive rate at least 56% higher than the rates achieved with the other compared techniques in a scenario with a maximum false positive rate of 5% and a 26% higher in a scenario with a false positive rate of 15%.

  11. Precision controllability of the YF-17 airplane

    NASA Technical Reports Server (NTRS)

    Sisk, T. R.; Mataeny, N. W.

    1980-01-01

    A flying qualities evaluation conducted on the YF-17 airplane permitted assessment of its precision controllability in the transonic flight regime over the allowable angle of attack range. The precision controllability (tailchase tracking) study was conducted in constant-g and windup turn tracking maneuvers with the command augmentation system (CAS) on, automatic maneuver flaps, and the caged pipper gunsight depressed 70 mils. This study showed that the YF-17 airplane tracks essentially as well at 7 g's to 8 g's as earlier fighters did at 4 g's to 5 g's before they encountered wing rock. The pilots considered the YF-17 airplane one of the best tracking airplanes they had flown. Wing rock at the higher angles of attack degraded tracking precision, and lack of control harmony made precision controllability more difficult. The revised automatic maneuver flap schedule incorporated in the airplane at the time of the tests did not appear to be optimum. The largest tracking errors and greatest pilot workload occurred at high normal load factors at low angles of attack. The pilots reported that the high-g maneuvers caused some tunnel vision and that they found it difficult to think clearly after repeated maneuvers.

  12. A Comparative Study of Anomaly Detection Techniques for Smart City Wireless Sensor Networks

    PubMed Central

    Garcia-Font, Victor; Garrigues, Carles; Rifà-Pous, Helena

    2016-01-01

    In many countries around the world, smart cities are becoming a reality. These cities contribute to improving citizens’ quality of life by providing services that are normally based on data extracted from wireless sensor networks (WSN) and other elements of the Internet of Things. Additionally, public administration uses these smart city data to increase its efficiency, to reduce costs and to provide additional services. However, the information received at smart city data centers is not always accurate, because WSNs are sometimes prone to error and are exposed to physical and computer attacks. In this article, we use real data from the smart city of Barcelona to simulate WSNs and implement typical attacks. Then, we compare frequently used anomaly detection techniques to disclose these attacks. We evaluate the algorithms under different requirements on the available network status information. As a result of this study, we conclude that one-class Support Vector Machines is the most appropriate technique. We achieve a true positive rate at least 56% higher than the rates achieved with the other compared techniques in a scenario with a maximum false positive rate of 5% and a 26% higher in a scenario with a false positive rate of 15%. PMID:27304957

  13. Quality of Life Is Poorer for Patients With Stroke Who Require an Interpreter: An Observational Australian Registry Study.

    PubMed

    Kilkenny, Monique F; Lannin, Natasha A; Anderson, Craig S; Dewey, Helen M; Kim, Joosup; Barclay-Moss, Karen; Levi, Chris; Faux, Steven; Hill, Kelvin; Grabsch, Brenda; Middleton, Sandy; Thrift, Amanda G; Grimley, Rohan; Donnan, Geoffrey; Cadilhac, Dominique A

    2018-03-01

    In multicultural Australia, some patients with stroke cannot fully understand, or speak, English. Language barriers may reduce quality of care and consequent outcomes after stroke, yet little has been reported empirically. An observational study of patients with stroke or transient ischemic attack (2010-2015) captured from 45 hospitals participating in the Australian Stroke Clinical Registry. The use of interpreters in hospitals, which is routinely documented, was used as a proxy for severe language barriers. Health-Related Quality of Life was assessed using the EuroQoL-5 dimension-3 level measured 90 to 180 days after stroke. Logistic regression was undertaken to assess the association between domains of EuroQoL-5 dimension and interpreter status. Among 34 562 registrants, 1461 (4.2%) required an interpreter. Compared with patients without interpreters, patients requiring an interpreter were more often women (53% versus 46%; P <0.001), aged ≥75 years (68% versus 51%; P <0.001), and had greater access to stroke unit care (85% versus 78%; P <0.001). After accounting for patient characteristics and stroke severity, patients requiring interpreters had comparable discharge outcomes (eg, mortality, discharged to rehabilitation) to patients not needing interpreters. However, these patients reported poorer Health-Related Quality of Life (visual analogue scale coefficient, -9; 95% CI, -12.38, -5.62), including more problems with self-care (odds ratio: 2.22; 95% CI, 1.82, 2.72), pain (odds ratio: 1.84; 95% CI, 1.52, 2.34), anxiety or depression (odds ratio: 1.60; 95% CI, 1.33, 1.93), and usual activities (odds ratio: 1.62; 95% CI, 1.32, 2.00). Patients requiring interpreters reported poorer Health Related Quality of Life after stroke/transient ischemic attack despite greater access to stroke units. These findings should be interpreted with caution because we are unable to account for prestroke Health Related Quality of Life. Further research is needed. © 2018 American Heart Association, Inc.

  14. [Advance in treatment of hyperuricemia by Chinese medicine based on uric acid transporterome].

    PubMed

    Zhou, Qi; Liu, Shu-min

    2015-11-01

    With the development of the quality of life, the morbidity of hyperuricemia is increasing year by year. At the same time, it appears that this disease attacks the young people currently. As the study of pathogenesis of hyperuricemia advanced, a series of uric acid transporters were found during this process. Meanwhile, the definition of transporterome was proposed. They were divided into three groups according to the functions: reabsorption proteins, excretion proteins and skeleton proteins. At moment, the drugs for hyperuricmia mainly include uric acid composition inhibitors and uric acid excretion promoters. Since the excretion of uric acid plays a leading role during the process of attack of hyperurecimia, it makes sense to explore Chinese medicines with clear mechanism targeting the transporterome. Therefore, this paper would focus on transporterome and summarize the mechanisms of Chinese medicines in treating hyperuricemia.

  15. Pediatric migraine.

    PubMed

    Shah, Ubaid Hameed; Kalra, Veena

    2009-01-01

    Migraine is the most common cause of acute recurrent headaches in children. The pathophysiological concepts have evolved from a purely vascular etiology to a neuroinflammatory process. Clinical evaluation is the mainstay of diagnosis and should also include family history. Investigations help to rule out secondary causes. The role of new drugs in treatment of migraine is discussed and trials are quoted from literature. Indications for starting prophylaxis should be evaluated based on frequency of attacks and influence on quality of life. For management of acute attacks of migraine both acetaminophen and ibuprofen are recommended for use in children. Many drugs like antiepileptic drugs (AED), calcium channel blockers, and antidepressants have been used for prophylaxis of migraine in children. The data for use of newer drugs for migraine in children is limited, though AEDs are emerging a popular choice. Biofeedback and other nonmedicinal therapies are being used with promising results.

  16. Quality assessment of two- and three-dimensional unstructured meshes and validation of an upwind Euler flow solver

    NASA Technical Reports Server (NTRS)

    Woodard, Paul R.; Yang, Henry T. Y.; Batina, John T.

    1992-01-01

    Quality assessment procedures are described for two-dimensional and three-dimensional unstructured meshes. The procedures include measurement of minimum angles, element aspect ratios, stretching, and element skewness. Meshes about the ONERA M6 wing and the Boeing 747 transport configuration are generated using an advancing front method grid generation package of programs. Solutions of Euler's equations for these meshes are obtained at low angle-of-attack, transonic conditions. Results for these cases, obtained as part of a validation study demonstrate the accuracy of an implicit upwind Euler solution algorithm.

  17. An Engineering Report in Civil Engineering and Management.

    DTIC Science & Technology

    1987-12-01

    programs as the Apollo program and the Canaveral program. Progress in the late 70s and the 80s has seen advancements in the application of sophisticated...other forces in military operations; subsequent combat service support ashore and defense against overt or clandestine enemy attacks directed toward...construction execution plans; assigns construction projects to NCF units; monitors progress and assures adherence to quality standards: directs

  18. At the Edge of Danger: Elementary Teachers in Queens, New York, September 11, 2001

    ERIC Educational Resources Information Center

    Bisland, Beverly Milner (Lee)

    2006-01-01

    Teachers were among the public servants at work in New York City on September 11, 2001. This study focuses on the feelings and actions of a representative group of elementary teachers in Queens, New York. As they became aware of the unfolding tragedy of the World Trade Center attacks, they demonstrated the essential qualities of public service,…

  19. Assessing wood quality of borer-infested red oak logs with a resonance acoustic technique

    Treesearch

    Xiping Wang; Henry E. Stelzer; Jan Wiedenbeck; Patricia K. Lebow; Robert J. Ross

    2009-01-01

    Large numbers of black oak (Quercus velutina Lam.) and scarlet oak (Quercus coccinea Muenchh.) trees are declining and dying in the Missouri Ozark forest as a result of oak decline. Red oak borer-infested trees produce low-grade logs that become extremely difficult to merchandize as the level of insect attack increases. The objective of this study was to investigate...

  20. School or Madrassa? Parents' Choice and the Failure of State-Run Education in Pakistan

    ERIC Educational Resources Information Center

    Khan, Jehanzaib

    2012-01-01

    Two major assumptions have dominated much of the discourse on Islamic schools in Pakistan since the rise of the Taliban in the 1990s and following the US attack on Afghanistan in October 2001. First, the Pakistani state-run education system is failing. Because of the poor quality of education at public schools, parents choose to send their…

  1. The relationship between anxiety and quality of life in children with hereditary angioedema.

    PubMed

    Kessel, Aharon; Farkas, Henriette; Kivity, Shmuel; Veszeli, Nóra; Kőhalmi, Kinga V; Engel-Yeger, Batya

    2017-11-01

    The severe life-threatening characteristics of hereditary angioedema (HAE) with C1-inhibitor deficiency (C1-INH-HAE) can affect anxiety levels among pediatric patients. This emotional burden together with the physical restrictions of C1-INH-HAE may decrease children's health-related quality of life (HRQoL). (i) To compare anxiety state and trait between children with C1-INH-HAE and healthy controls; (ii) to examine the relationship between the level of anxiety of children with C1-INH-HAE, their disease activity/affected sites and their HRQoL; and (iii) to predict the HRQoL of children with C1-INH-HAE based on their anxiety level and disease activity/affected sites METHODS: Thirty-three children with C1-INH-HAE (aged 5-18 years) and 52 healthy controls were recruited from Israel and Hungary. All children completed the State-Trait Anxiety Inventory for Children (STAIC), the Pediatric Quality of Life Inventory (Peds-QL) demographic questionnaire and a disease activity and site questionnaire . Disease activity was defined as the number of attacks in last year. Both anxiety state and trait were significantly higher among children with C1-INH-HAE as compared to the controls (44.74±10.56 vs 38.76±10.67, P<.01, 29.21±5.16 vs 25.23±4.09, P<.001 in comparison). Significant differences were found between C1-INH-HAE patients with HAE attacks, asymptomatic C1-INH-HAE patients, and healthy controls in both anxiety state (F 56,2 =4.69, P=.001) and trait (F 56,2 =9.06, P<.0001). A higher anxiety trait was correlated with the number of angioedema-affected sites (r=.52, P=.003). The presence of HAE attacks and higher anxiety trait predicted a lower HRQoL in children with C1-INH-HAE. C1-INH-HAE children have higher anxiety trait and state, which correlate with reduced HRQoL domains. © 2017 EAACI and John Wiley and Sons A/S. Published by John Wiley and Sons Ltd.

  2. Nitrates for stable angina: a systematic review and meta-analysis of randomized clinical trials.

    PubMed

    Wei, Jiafu; Wu, Taixiang; Yang, Qing; Chen, Mao; Ni, Juan; Huang, Dejia

    2011-01-07

    To assess the effect (harms and benefits) of nitrates for stable angina. We searched the Cochrane Central Register of Controlled Trials (CENTRAL), MEDLINE and EMBASE. Randomized controlled trials with both parallel and crossover design were included. The following outcome measures were evaluated: number of angina attacks weekly and nitroglycerin consumption, quality of life, total exercise duration, time to onset of angina and time to 1 mm ST depression. Fifty-one trials with 3595 patients meeting inclusion criteria were analyzed. Both intermittent and continuous regimens of nitrates lengthened exercise duration significantly by 31 and 53 s respectively. The number of angina attacks was significantly reduced by 2.89 episodes weekly for continuous administration and 1.5 episodes weekly for intermittent administration. With intermittent administration, increased dose provided with 21 s more length of exercise duration. With continuous administration, exercise duration was pronged more in low-dose group. Quality of life was not improved by continuous application of GTN patches and was similar between continuous and intermittent groups. In addition, 51.6% patients receiving nitrates complained with headache. Long-term administration of nitrates was beneficial for angina prophylaxis and improved exercise performance but might be ineffective for improving quality of life. With continuous regimen, low-dose nitrates were more effective than high-dose ones for improving exercise performance. By contrast, with intermittent regimen, high-dose nitrates were more effective. In addition, intermittent administration could bring zero-hour effect. Copyright © 2010 Elsevier Ireland Ltd. All rights reserved.

  3. Robustness of non-interdependent and interdependent networks against dependent and adaptive attacks

    NASA Astrophysics Data System (ADS)

    Tyra, Adam; Li, Jingtao; Shang, Yilun; Jiang, Shuo; Zhao, Yanjun; Xu, Shouhuai

    2017-09-01

    Robustness of complex networks has been extensively studied via the notion of site percolation, which typically models independent and non-adaptive attacks (or disruptions). However, real-life attacks are often dependent and/or adaptive. This motivates us to characterize the robustness of complex networks, including non-interdependent and interdependent ones, against dependent and adaptive attacks. For this purpose, dependent attacks are accommodated by L-hop percolation where the nodes within some L-hop (L ≥ 0) distance of a chosen node are all deleted during one attack (with L = 0 degenerating to site percolation). Whereas, adaptive attacks are launched by attackers who can make node-selection decisions based on the network state in the beginning of each attack. The resulting characterization enriches the body of knowledge with new insights, such as: (i) the Achilles' Heel phenomenon is only valid for independent attacks, but not for dependent attacks; (ii) powerful attack strategies (e.g., targeted attacks and dependent attacks, dependent attacks and adaptive attacks) are not compatible and cannot help the attacker when used collectively. Our results shed some light on the design of robust complex networks.

  4. Cross-layer design for intrusion detection and data security in wireless ad hoc sensor networks

    NASA Astrophysics Data System (ADS)

    Hortos, William S.

    2007-09-01

    A wireless ad hoc sensor network is a configuration for area surveillance that affords rapid, flexible deployment in arbitrary threat environments. There is no infrastructure support and sensor nodes communicate with each other only when they are in transmission range. The nodes are severely resource-constrained, with limited processing, memory and power capacities and must operate cooperatively to fulfill a common mission in typically unattended modes. In a wireless sensor network (WSN), each sensor at a node can observe locally some underlying physical phenomenon and sends a quantized version of the observation to sink (destination) nodes via wireless links. Since the wireless medium can be easily eavesdropped, links can be compromised by intrusion attacks from nodes that may mount denial-of-service attacks or insert spurious information into routing packets, leading to routing loops, long timeouts, impersonation, and node exhaustion. A cross-layer design based on protocol-layer interactions is proposed for detection and identification of various intrusion attacks on WSN operation. A feature set is formed from selected cross-layer parameters of the WSN protocol to detect and identify security threats due to intrusion attacks. A separate protocol is not constructed from the cross-layer design; instead, security attributes and quantified trust levels at and among nodes established during data exchanges complement customary WSN metrics of energy usage, reliability, route availability, and end-to-end quality-of-service (QoS) provisioning. Statistical pattern recognition algorithms are applied that use observed feature-set patterns observed during network operations, viewed as security audit logs. These algorithms provide the "best" network global performance in the presence of various intrusion attacks. A set of mobile (software) agents distributed at the nodes implement the algorithms, by moving among the layers involved in the network response at each active node and trust neighborhood, collecting parametric information and executing assigned decision tasks. The communications overhead due to security mechanisms and the latency in network response are thus minimized by reducing the need to move large amounts of audit data through resource-limited nodes and by locating detection/identification programs closer to audit data. If network partitioning occurs due to uncoordinated node exhaustion, data compromise or other effects of the attacks, the mobile agents can continue to operate, thereby increasing fault tolerance in the network response to intrusions. Since the mobile agents behave like an ant colony in securing the WSN, published ant colony optimization (ACO) routines and other evolutionary algorithms are adapted to protect network security, using data at and through nodes to create audit records to detect and respond to denial-of-service attacks. Performance evaluations of algorithms are performed by simulation of a few intrusion attacks, such as black hole, flooding, Sybil and others, to validate the ability of the cross-layer algorithms to enable WSNs to survive the attacks. Results are compared for the different algorithms.

  5. FSM-F: Finite State Machine Based Framework for Denial of Service and Intrusion Detection in MANET

    PubMed Central

    N. Ahmed, Malik; Abdullah, Abdul Hanan; Kaiwartya, Omprakash

    2016-01-01

    Due to the continuous advancements in wireless communication in terms of quality of communication and affordability of the technology, the application area of Mobile Adhoc Networks (MANETs) significantly growing particularly in military and disaster management. Considering the sensitivity of the application areas, security in terms of detection of Denial of Service (DoS) and intrusion has become prime concern in research and development in the area. The security systems suggested in the past has state recognition problem where the system is not able to accurately identify the actual state of the network nodes due to the absence of clear definition of states of the nodes. In this context, this paper proposes a framework based on Finite State Machine (FSM) for denial of service and intrusion detection in MANETs. In particular, an Interruption Detection system for Adhoc On-demand Distance Vector (ID-AODV) protocol is presented based on finite state machine. The packet dropping and sequence number attacks are closely investigated and detection systems for both types of attacks are designed. The major functional modules of ID-AODV includes network monitoring system, finite state machine and attack detection model. Simulations are carried out in network simulator NS-2 to evaluate the performance of the proposed framework. A comparative evaluation of the performance is also performed with the state-of-the-art techniques: RIDAN and AODV. The performance evaluations attest the benefits of proposed framework in terms of providing better security for denial of service and intrusion detection attacks. PMID:27285146

  6. Non-Native Ambrosia Beetles as Opportunistic Exploiters of Living but Weakened Trees

    PubMed Central

    Ranger, Christopher M.; Schultz, Peter B.; Frank, Steven D.; Chong, Juang H.; Reding, Michael E.

    2015-01-01

    Exotic Xylosandrus spp. ambrosia beetles established in non-native habitats have been associated with sudden and extensive attacks on a diverse range of living trees, but factors driving their shift from dying/dead hosts to living and healthy ones are not well understood. We sought to characterize the role of host physiological condition on preference and colonization by two invaders, Xylosandrus germanus and Xylosandrus crassiusculus. When given free-choice under field conditions among flooded and non-flooded deciduous tree species of varying intolerance to flooding, beetles attacked flood-intolerant tree species over more tolerant species within 3 days of initiating flood stress. In particular, flood-intolerant flowering dogwood (Cornus florida) sustained more attacks than flood-tolerant species, including silver maple (Acer saccharinum) and swamp white oak (Quercus bicolor). Ethanol, a key host-derived attractant, was detected at higher concentrations 3 days after initiating flooding within stems of flood intolerant species compared to tolerant and non-flooded species. A positive correlation was also detected between ethanol concentrations in stem tissue and cumulative ambrosia beetle attacks. When adult X. germanus and X. crassiusculus were confined with no-choice to stems of flood-stressed and non-flooded C. florida, more ejected sawdust resulting from tunneling activity was associated with the flood-stressed trees. Furthermore, living foundresses, eggs, larvae, and pupae were only detected within galleries created in stems of flood-stressed trees. Despite a capability to attack diverse tree genera, X. germanus and X. crassiusculus efficiently distinguished among varying host qualities and preferentially targeted trees based on their intolerance of flood stress. Non-flooded trees were not preferred or successfully colonized. This study demonstrates the host-selection strategy exhibited by X. germanus and X. crassiusculus in non-native habitats involves detection of stress-induced ethanol emission and early colonization of living but weakened trees. PMID:26134522

  7. Non-Native Ambrosia Beetles as Opportunistic Exploiters of Living but Weakened Trees.

    PubMed

    Ranger, Christopher M; Schultz, Peter B; Frank, Steven D; Chong, Juang H; Reding, Michael E

    2015-01-01

    Exotic Xylosandrus spp. ambrosia beetles established in non-native habitats have been associated with sudden and extensive attacks on a diverse range of living trees, but factors driving their shift from dying/dead hosts to living and healthy ones are not well understood. We sought to characterize the role of host physiological condition on preference and colonization by two invaders, Xylosandrus germanus and Xylosandrus crassiusculus. When given free-choice under field conditions among flooded and non-flooded deciduous tree species of varying intolerance to flooding, beetles attacked flood-intolerant tree species over more tolerant species within 3 days of initiating flood stress. In particular, flood-intolerant flowering dogwood (Cornus florida) sustained more attacks than flood-tolerant species, including silver maple (Acer saccharinum) and swamp white oak (Quercus bicolor). Ethanol, a key host-derived attractant, was detected at higher concentrations 3 days after initiating flooding within stems of flood intolerant species compared to tolerant and non-flooded species. A positive correlation was also detected between ethanol concentrations in stem tissue and cumulative ambrosia beetle attacks. When adult X. germanus and X. crassiusculus were confined with no-choice to stems of flood-stressed and non-flooded C. florida, more ejected sawdust resulting from tunneling activity was associated with the flood-stressed trees. Furthermore, living foundresses, eggs, larvae, and pupae were only detected within galleries created in stems of flood-stressed trees. Despite a capability to attack diverse tree genera, X. germanus and X. crassiusculus efficiently distinguished among varying host qualities and preferentially targeted trees based on their intolerance of flood stress. Non-flooded trees were not preferred or successfully colonized. This study demonstrates the host-selection strategy exhibited by X. germanus and X. crassiusculus in non-native habitats involves detection of stress-induced ethanol emission and early colonization of living but weakened trees.

  8. Predicting Factors of Zone 4 Attack in Volleyball.

    PubMed

    Costa, Gustavo C; Castro, Henrique O; Evangelista, Breno F; Malheiros, Laura M; Greco, Pablo J; Ugrinowitsch, Herbert

    2017-06-01

    This study examined 142 volleyball games of the Men's Super League 2014/2015 seasons in Brazil from which we analyzed 24-26 games of each participating team, identifying 5,267 Zone 4 attacks for further analysis. Within these Zone 4 attacks, we analyzed the association between the effect of the attack carried out and the separate effects of serve reception, tempo and type of attack. We found that the reception, tempo of attack, second tempo of attack, and power of diagonal attack were predictors of the attack effect in Zone 4. Moreover, placed attacks showed a tendency to not yield a score. In conclusion, winning points in high-level men's volleyball requires excellent receptions, a fast attack tempo and powerfully executed of attacks.

  9. Recovering DC coefficients in block-based DCT.

    PubMed

    Uehara, Takeyuki; Safavi-Naini, Reihaneh; Ogunbona, Philip

    2006-11-01

    It is a common approach for JPEG and MPEG encryption systems to provide higher protection for dc coefficients and less protection for ac coefficients. Some authors have employed a cryptographic encryption algorithm for the dc coefficients and left the ac coefficients to techniques based on random permutation lists which are known to be weak against known-plaintext and chosen-ciphertext attacks. In this paper we show that in block-based DCT, it is possible to recover dc coefficients from ac coefficients with reasonable image quality and show the insecurity of image encryption methods which rely on the encryption of dc values using a cryptoalgorithm. The method proposed in this paper combines dc recovery from ac coefficients and the fact that ac coefficients can be recovered using a chosen ciphertext attack. We demonstrate that a method proposed by Tang to encrypt and decrypt MPEG video can be completely broken.

  10. A bilinear pairing based anonymous authentication scheme in wireless body area networks for mHealth.

    PubMed

    Jiang, Qi; Lian, Xinxin; Yang, Chao; Ma, Jianfeng; Tian, Youliang; Yang, Yuanyuan

    2016-11-01

    Wireless body area networks (WBANs) have become one of the key components of mobile health (mHealth) which provides 24/7 health monitoring service and greatly improves the quality and efficiency of healthcare. However, users' concern about the security and privacy of their health information has become one of the major obstacles that impede the wide adoption of WBANs. Anonymous and unlinkable authentication is critical to protect the security and privacy of sensitive physiological information in transit from the client to the application provider. We first show that the anonymous authentication scheme of Wang and Zhang based on bilinear pairing is prone to client impersonation attack. Then, we propose an enhanced anonymous authentication scheme to remedy the flaw in Wang and Zhang's scheme. We give the security analysis to demonstrate that the enhanced scheme achieves the desired security features and withstands various known attacks.

  11. Two-Layer Fragile Watermarking Method Secured with Chaotic Map for Authentication of Digital Holy Quran

    PubMed Central

    Khalil, Mohammed S.; Khan, Muhammad Khurram; Alginahi, Yasser M.

    2014-01-01

    This paper presents a novel watermarking method to facilitate the authentication and detection of the image forgery on the Quran images. Two layers of embedding scheme on wavelet and spatial domain are introduced to enhance the sensitivity of fragile watermarking and defend the attacks. Discrete wavelet transforms are applied to decompose the host image into wavelet prior to embedding the watermark in the wavelet domain. The watermarked wavelet coefficient is inverted back to spatial domain then the least significant bits is utilized to hide another watermark. A chaotic map is utilized to blur the watermark to make it secure against the local attack. The proposed method allows high watermark payloads, while preserving good image quality. Experiment results confirm that the proposed methods are fragile and have superior tampering detection even though the tampered area is very small. PMID:25028681

  12. Two-layer fragile watermarking method secured with chaotic map for authentication of digital Holy Quran.

    PubMed

    Khalil, Mohammed S; Kurniawan, Fajri; Khan, Muhammad Khurram; Alginahi, Yasser M

    2014-01-01

    This paper presents a novel watermarking method to facilitate the authentication and detection of the image forgery on the Quran images. Two layers of embedding scheme on wavelet and spatial domain are introduced to enhance the sensitivity of fragile watermarking and defend the attacks. Discrete wavelet transforms are applied to decompose the host image into wavelet prior to embedding the watermark in the wavelet domain. The watermarked wavelet coefficient is inverted back to spatial domain then the least significant bits is utilized to hide another watermark. A chaotic map is utilized to blur the watermark to make it secure against the local attack. The proposed method allows high watermark payloads, while preserving good image quality. Experiment results confirm that the proposed methods are fragile and have superior tampering detection even though the tampered area is very small.

  13. Air pollution and asthma attacks in children: A case-crossover analysis in the city of Chongqing, China.

    PubMed

    Ding, Ling; Zhu, Daojuan; Peng, Donghong; Zhao, Yao

    2017-01-01

    Data on particulate matter of diameter <2.5 μm (PM 2.5 ) in the city of Chongqing were first announced in 2013. We wished to assess the effects of pollutants on asthmatic children in Chongqing, China. Daily numbers of hospital visits because of asthma attacks in children aged 0-18 years in 2013 were collected from the Children's Hospital of Chongqing Medical University. Data on pollutants were accessed from the nine air quality-monitoring stations in Chongqing. A time-stratified case-crossover design was applied and conditional logistic regression was undertaken to analyze the data. We found that short-term exposure to PM 10 , PM 2.5 , sodium dioxide, nitrogen and carbon monoxide could trigger hospital visits for asthma in children. Nitrogen dioxide had an important role, whereas ozone had no effect. Copyright © 2016 Elsevier Ltd. All rights reserved.

  14. Cascading trait-mediated interactions induced by ant pheromones

    PubMed Central

    Hsieh, Hsun-Yi; Liere, Heidi; Soto, Estelí J; Perfecto, Ivette

    2012-01-01

    Trait-mediated indirect interactions (TMII) can be as important as density-mediated indirect interactions. Here, we provide evidence for a novel trait-mediated cascade (where one TMII affects another TMII) and demonstrate that the mechanism consists of a predator eavesdropping on chemical signaling. Ants protect scale insects from predation by adult coccinellid beetles – the first TMII. However, parasitic phorid flies reduce ant foraging activity by 50% – the second TMII, providing a window of opportunity for female beetles to oviposit in high-quality microsites. Beetle larvae are protected from ant predation and benefit from living in patches with high scale densities. We demonstrate that female beetles can detect pheromones released by the ant when attacked by phorids, and that only females, and especially gravid females, are attracted to the ant pheromone. As ants reduce their movement when under attack by phorids, we conclude that phorids facilitate beetle oviposition, thus producing the TMII cascade. PMID:23139877

  15. Breakthrough attacks in patients with hereditary angioedema receiving long-term prophylaxis are responsive to icatibant: findings from the Icatibant Outcome Survey.

    PubMed

    Aberer, Werner; Maurer, Marcus; Bouillet, Laurence; Zanichelli, Andrea; Caballero, Teresa; Longhurst, Hilary J; Perrin, Amandine; Andresen, Irmgard

    2017-01-01

    Patients with hereditary angioedema (HAE) due to C1-inhibitor deficiency (C1-INH-HAE) experience recurrent attacks of cutaneous or submucosal edema that may be frequent and severe; prophylactic treatments can be prescribed to prevent attacks. However, despite the use of long-term prophylaxis (LTP), breakthrough attacks are known to occur. We used data from the Icatibant Outcome Survey (IOS) to evaluate the characteristics of breakthrough attacks and the effectiveness of icatibant as a treatment option. Data on LTP use, attacks, and treatments were recorded. Attack characteristics, treatment characteristics, and outcomes (time to treatment, time to resolution, and duration of attack) were compared for attacks that occurred with versus without LTP. Data on 3228 icatibant-treated attacks from 448 patients with C1-INH-HAE were analyzed; 30.1% of attacks occurred while patients were using LTP. Attack rate, attack severity, and the distribution of attack sites were similar across all types of LTP used, and were comparable to the results found in patients who did not receive LTP. Attacks were successfully treated with icatibant; 82.5% of all breakthrough attacks were treated with a single icatibant injection without C1-INH rescue medication. Treatment outcomes were comparable for breakthrough attacks across all LTP types, and for attacks without LTP. Patients who use LTP should be aware that breakthrough attacks can occur, and such attacks can be severe. Thus, patients with C1-INH-HAE using LTP should have emergency treatment readily available. Data from IOS show that icatibant is effective for the treatment of breakthrough attacks. Trial Registration NCT01034969.

  16. A graph-based network-vulnerability analysis system

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Swiler, L.P.; Phillips, C.; Gaylor, T.

    1998-05-03

    This paper presents a graph based approach to network vulnerability analysis. The method is flexible, allowing analysis of attacks from both outside and inside the network. It can analyze risks to a specific network asset, or examine the universe of possible consequences following a successful attack. The analysis system requires as input a database of common attacks, broken into atomic steps, specific network configuration and topology information, and an attacker profile. The attack information is matched with the network configuration information and an attacker profile to create a superset attack graph. Nodes identify a stage of attack, for example themore » class of machines the attacker has accessed and the user privilege level he or she has compromised. The arcs in the attack graph represent attacks or stages of attacks. By assigning probabilities of success on the arcs or costs representing level of effort for the attacker, various graph algorithms such as shortest path algorithms can identify the attack paths with the highest probability of success.« less

  17. A graph-based network-vulnerability analysis system

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Swiler, L.P.; Phillips, C.; Gaylor, T.

    1998-01-01

    This report presents a graph-based approach to network vulnerability analysis. The method is flexible, allowing analysis of attacks from both outside and inside the network. It can analyze risks to a specific network asset, or examine the universe of possible consequences following a successful attack. The analysis system requires as input a database of common attacks, broken into atomic steps, specific network configuration and topology information, and an attacker profile. The attack information is matched with the network configuration information and an attacker profile to create a superset attack graph. Nodes identify a stage of attack, for example the classmore » of machines the attacker has accessed and the user privilege level he or she has compromised. The arcs in the attack graph represent attacks or stages of attacks. By assigning probabilities of success on the arcs or costs representing level-of-effort for the attacker, various graph algorithms such as shortest-path algorithms can identify the attack paths with the highest probability of success.« less

  18. Method and tool for network vulnerability analysis

    DOEpatents

    Swiler, Laura Painton [Albuquerque, NM; Phillips, Cynthia A [Albuquerque, NM

    2006-03-14

    A computer system analysis tool and method that will allow for qualitative and quantitative assessment of security attributes and vulnerabilities in systems including computer networks. The invention is based on generation of attack graphs wherein each node represents a possible attack state and each edge represents a change in state caused by a single action taken by an attacker or unwitting assistant. Edges are weighted using metrics such as attacker effort, likelihood of attack success, or time to succeed. Generation of an attack graph is accomplished by matching information about attack requirements (specified in "attack templates") to information about computer system configuration (contained in a configuration file that can be updated to reflect system changes occurring during the course of an attack) and assumed attacker capabilities (reflected in "attacker profiles"). High risk attack paths, which correspond to those considered suited to application of attack countermeasures given limited resources for applying countermeasures, are identified by finding "epsilon optimal paths."

  19. Subjective Cognitive Impairment, Depressive Symptoms, and Fatigue after a TIA or Transient Neurological Attack: A Prospective Study.

    PubMed

    van Rooij, Frank G; Plaizier, Nicole O; Vermeer, Sarah E; Góraj, Bozena M; Koudstaal, Peter J; Richard, Edo; de Leeuw, Frank-Erik; Kessels, Roy P C; van Dijk, Ewoud J

    2017-01-01

    Subjective cognitive impairment (SCI), depressive symptoms, and fatigue are common after stroke and are associated with reduced quality of life. We prospectively investigated their prevalence and course after a transient ischemic attack (TIA) or nonfocal transient neurological attack (TNA) and the association with diffusion-weighted imaging (DWI) lesions. The Cognitive Failures Questionnaire, Hospital Anxiety and Depression Scale, and Subjective Fatigue subscale from the Checklist Individual Strength were used to assess subjective complaints shortly after TIA or TNA and six months later. With repeated measure analysis, the associations between DWI lesion presence or clinical diagnosis (TIA or TNA) and subjective complaints over time were determined. We included 103 patients (28 DWI positive). At baseline, SCI and fatigue were less severe in DWI positive than in DWI negative patients, whereas at follow-up, there were no differences. SCI ( p = 0.02) and fatigue ( p = 0.01) increased in severity only in DWI positive patients. There were no differences between TIA and TNA. Subjective complaints are highly prevalent in TIA and TNA patients. The short-term prognosis is not different between DWI-positive and DWI negative patients, but SCI and fatigue increase in severity within six months after the event when an initial DWI lesion is present.

  20. Reynolds Number Effects at High Angles of Attack

    NASA Technical Reports Server (NTRS)

    Fisher, David F.; Cobleigh, Brent R.; Banks, Daniel W.; Hall, Robert M.; Wahls, Richard A.

    1998-01-01

    Lessons learned from comparisons between ground-based tests and flight measurements for the high-angle-of-attack programs on the F-18 High Alpha Research Vehicle (HARV), the X-29 forward-swept wing aircraft, and the X-31 enhanced fighter maneuverability aircraft are presented. On all three vehicles, Reynolds number effects were evident on the forebodies at high angles of attack. The correlation between flight and wind tunnel forebody pressure distributions for the F-18 HARV were improved by using twin longitudinal grit strips on the forebody of the wind-tunnel model. Pressure distributions obtained on the X-29 wind-tunnel model at flight Reynolds numbers showed excellent correlation with the flight data up to alpha = 50 deg. Above (alpha = 50 deg. the pressure distributions for both flight and wind tunnel became asymmetric and showed poorer agreement, possibly because of the different surface finish of the model and aircraft. The detrimental effect of a very sharp nose apex was demonstrated on the X-31 aircraft. Grit strips on the forebody of the X-31 reduced the randomness but increased the magnitude of the asymmetry. Nose strakes were required to reduce the forebody yawing moment asymmetries and the grit strips on the flight test noseboom improved the aircraft handling qualities.

  1. Linearized Poststall Aerodynamic and Control Law Models of the X-31A Aircraft and Comparison with Flight Data

    NASA Technical Reports Server (NTRS)

    Stoliker, Patrick C.; Bosworth, John T.; Georgie, Jennifer

    1997-01-01

    The X-31A aircraft has a unique configuration that uses thrust-vector vanes and aerodynamic control effectors to provide an operating envelope to a maximum 70 deg angle of attack, an inherently nonlinear portion of the flight envelope. This report presents linearized versions of the X-31A longitudinal and lateral-directional control systems, with aerodynamic models sufficient to evaluate characteristics in the poststall envelope at 30 deg, 45 deg, and 60 deg angle of attack. The models are presented with detail sufficient to allow the reader to reproduce the linear results or perform independent control studies. Comparisons between the responses of the linear models and flight data are presented in the time and frequency domains to demonstrate the strengths and weaknesses of the ability to predict high-angle-of-attack flight dynamics using linear models. The X-31A six-degree-of-freedom simulation contains a program that calculates linear perturbation models throughout the X-31A flight envelope. The models include aerodynamics and flight control system dynamics that are used for stability, controllability, and handling qualities analysis. The models presented in this report demonstrate the ability to provide reasonable linear representations in the poststall flight regime.

  2. Higher coronary heart disease and heart attack morbidity in Appalachian coal mining regions.

    PubMed

    Hendryx, Michael; Zullig, Keith J

    2009-11-01

    This study analyzes the U.S. 2006 Behavioral Risk Factor Surveillance System survey data (N=235,783) to test whether self-reported cardiovascular disease rates are higher in Appalachian coal mining counties compared to other counties after control for other risks. Dependent variables include self-reported measures of ever (1) being diagnosed with cardiovascular disease (CVD) or with a specific form of CVD including (2) stroke, (3) heart attack, or (4) angina or coronary heart disease (CHD). Independent variables included coal mining, smoking, BMI, drinking, physician supply, diabetes co-morbidity, age, race/ethnicity, education, income, and others. SUDAAN Multilog models were estimated, and odds ratios tested for coal mining effects. After control for covariates, people in Appalachian coal mining areas reported significantly higher risk of CVD (OR=1.22, 95% CI=1.14-1.30), angina or CHD (OR=1.29, 95% CI=1.19-1.39) and heart attack (OR=1.19, 95% CI=1.10-1.30). Effects were present for both men and women. Cardiovascular diseases have been linked to both air and water contamination in ways consistent with toxicants found in coal and coal processing. Future research is indicated to assess air and water quality in coal mining communities in Appalachia, with corresponding environmental programs and standards established as indicated.

  3. The effect of differences in altitude location of an aquaculture on fish’s hematocrit and fish’s haemoglobin of Carp fish and resistance to bacterial attack

    NASA Astrophysics Data System (ADS)

    Rosidah; Rizal, A.; Rustikawati, I.; Octavia, F.

    2018-04-01

    The aim for this research is to analyze the relation between the height place of aquaculture and life directness towards Aeromonas hydrophila attack for hematocrit and hemoglobin degrees on Cyprinus carpio L. This research have been doing on February - March 2017 at UPT PTBP Kepanjen (as Group 1), Malang (332 amsl) and UPT PBAT Umbulan IBAT as Group 2 (955 amsl). The treatment that be used is Cyprinus carpio infected by Aeromonas hydrophila. Parameters was observed, are hematocrit, hemoglobin degrees, clinical symptom of fish and the quality of water. The result of this investigation, hematocrit and hemoglobin degrees of Cyprinus carpio in level low land (Group 1, 332 amsl) around 12.8 % and 9.58 g/dL, meanwhile hematocrit and hemoglobin degrees in level up land (Group 2, 955 amsl) around 24.19 % and 12.64 g/dL. Cyprinus carpio L. after infected by Aeromonas hydrophila, it shows the clinical symptoms : its mucus be left, bleeding, its scale get peeled off and dropsy. The life directness of that Cyprinus carpio L. maintaining in 15 days 0 %. The differences between the height level of aquaculture for hematocrit and hemoglobin degrees also life directness towards Aeromonas hydrophila attack on Cyprinus carpio L.

  4. Animals as sentinels of chemical terrorism agents: an evidence-based review.

    PubMed

    Rabinowitz, Peter; Wiley, James; Odofin, Lynda; Wilcox, Matthew; Dein, F Joshua

    2008-02-01

    The goal of this systematic review was to identify evidence that animals could serve as sentinels of an attack with a chemical terrorism agent. The biomedical literature was systematically searched for evidence that wild or domestic animals exposed to certain chemical weapons of terrorism had either greater susceptibility, shorter latency period, or increased exposure risk versus humans. Additionally, we searched for documented reports of such animals historically serving as sentinels for chemical warfare agents. For a small number of agents, there was limited evidence that domestic and/or wild animals could provide sentinel information to humans following an airborne attack with chemical agents, usually related to increased potential for environmental exposure. Some of this evidence was based on anecdotal case reports, and in many cases high quality chemical terrorism agent evidence regarding comparative susceptibility, exposure, and latency between humans and sentinel animal species was not found. Currently, there is insufficient evidence for routine use of animals as sentinels for airborne chemical warfare agents. At the same time, Poison Center surveillance systems should include animal calls, and greater communication between veterinarians and physicians could help with preparedness for a chemical terrorism attack. Further analysis of comparative chemical warfare agent toxicity between sentinel animal species and humans is needed.

  5. Implementation of a 12-week disease management program improved clinical outcomes and quality of life in adults with asthma in a rural district hospital: pre- and post-intervention study.

    PubMed

    Chamnan, Parinya; Boonlert, Kittipa; Pasi, Wanit; Yodsiri, Songkran; Pong-on, Sirinya; Khansa, Bhoonsab; Yongkulwanitchanan, Pichapat

    2010-03-01

    Despite the availability of effective medical treatment and disease management guidelines, asthma remains a poorly controlled disease in developing countries. There is little evidence of the effectiveness of disease management guidelines in rural clinical practice. The effect of disease management guidelines on clinical outcomes and quality of life in asthmatic patients in a rural community hospital was examined. Fifty-seven patients aged > or = 16 years with physician-diagnosed asthma from a hospital outpatient clinic in Ubon-ratchathani, Thailand, were recruited. Asthma diagnosis was confirmed by reviewing clinical records. We implemented a 12-week disease management program, including the use of written asthma treatment plan and asthma action plan tailored to individual patients. Using one-group pre- and post-intervention design, we compared the average number of emergency visits and hospitalizations from acute asthmatic attacks before and after the implementation of interventions using the Wilcoxon matched-pairs signed-rank test. We also compared patient's asthma quality of life (AQL) scores, measured using the 7-point scaled Mini Asthma Quality of Life Questionnaire. It was found that among the 57 patients, 38 (67%) were women, and the mean age (SD) of the patients was 47.6 (17.0) years. Sixteen patients (28%) had a family history of asthma. Emergency visits decreased from 0.48 (SD = 0.83) per patient before implementation of interventions to 0.11 (0.37) per patient after implementation of interventions (p = 0.003). Hospitalizations with acute asthma attacks reduced from 0.14 (0.35) per patient to 0.04 (0.27) per patient (p = 0.034). Overall AQL scores increased significantly from 3.7 to 5.4 (p < 0.001), with most improvement observed in symptoms and emotions. It was concluded that implementation of a 12-week asthma disease management program could reduce emergency visits and hospitalizations, and improve patients' quality of life in a rural practice setting.

  6. Supporting Military Families with Young Children throughout the Deployment Lifecycle

    DTIC Science & Technology

    2017-10-01

    military service since the September 11th, 2001 terrorist attacks has placed tremendous demands on families. Approximately 43% of the Total Forces are...Parents program on the primary outcomes of interest including parental reflective capacity, parent-child relationship quality, and parenting stress...Hire and train SFSF2 staff at BU and UTHSCSA (for Ft. Hood site) 4a) Provide intensive training on home-based intervention (Strong Families

  7. ENVIRONMENTAL AND ENERGY QUALITY TECHNOLOGIES Task Order 0005: Organic Finishing Technologies Sub Task 11: High Speed, Substrate Safe Specialty Coating Laser Stripping

    DTIC Science & Technology

    2015-06-22

    hazardous materials and eliminating the hazardous waste streams associated with wheat starch , chemical strippers and hand sanding. Additionally, the laser...chemical attack resistance and other special characteristics while providing corrosion protection. The materials used for these purposes are designed...inspection and/or replacement. Standard coating removal methods include chemical strippers, media blasting (i.e., wheat starch , plastic

  8. Software Assurance: Five Essential Considerations for Acquisition Officials

    DTIC Science & Technology

    2007-05-01

    May 2007 www.stsc.hill.af.mil 17 2 • address security concerns in the software development life cycle ( SDLC )? • Are there formal software quality...What threat modeling process, if any, is used when designing the software ? What analysis, design, and construction tools are used by your software design...the-shelf (COTS), government off-the-shelf (GOTS), open- source, embedded, and legacy software . Attackers exploit unintentional vulnerabil- ities or

  9. A FORCEnet Framework for Analysis of Existing Naval C4I Architectures

    DTIC Science & Technology

    2003-06-01

    best qualities of humans and computers. f. Information Weapons Information weapons integrate the use of military deception, psychological ...operations, to include electronic warfare, psychological operations, computer network attack, computer network defense, operations security, and military...F/A-18 ( ATARS /SHARP), S-3B (SSU), SH-60 LAMPS (HAWKLINK) and P-3C (AIP, Special Projects). CDL-N consists of two antennas (one meter diameter

  10. Some views on the manifestation of the death instinct in clinical work.

    PubMed

    Feldman, M

    2000-02-01

    The author argues that the postulation of the instinctual drive towards death can be seen as an attempt to account for the manifestation of a destructive psychological force that is palpably present in many of our patients. He discusses some of the experiences, activities and aims that reflect this destructive psychic force, and the conscious and unconscious gratification that is intrinsically bound up with it. What is 'deadly' is the way in which meaning, specificity and differences are attacked, and any developmental processes retarded or undermined. The vitality is taken out of the patient himself as well as his objects, and although in an important sense these drives are 'anti-life', the author suggests that their aim is not literally to kill or to annihilate, but that the patient feels compelled to maintain a link with the object that often has an evidently tormenting quality. Using a detailed clinical illustration, the author argues that the gratification that is bound up in these activities, and which gives them such a compulsive quality, does not result from fusion with the life instinct, with the resultant libidinisation of the death instinct. On the contrary, the gratification obtained from attacking, spoiling and undermining, whether directed to the self or the object, is an essential element of such a destructive drive.

  11. Validation of Diagnoses of Transient Ischemic Attack in the Swedish Stroke Register (Riksstroke) TIA-Module.

    PubMed

    Buchwald, Fredrik; Ström, Jakob O; Norrving, Bo; Petersson, Jesper

    2015-01-01

    In 2010, the Swedish Stroke Register (Riksstroke; RS) established a module for transient ischemic attacks (RS-TIA). We report a diagnostic validation study of patients included in RS-TIA. During the first year, 7,825 patients were registered at 59 out of 74 Swedish hospitals. A time-based TIA definition was applied. A sample of 180 patients (30 patients each from 6 hospitals), with a similar distribution of age and sex as in RS-TIA, was prepared. Two independent observers assessed medical records for quality of documentation and assigned a diagnosis of likely, possible, unlikely TIA or ischemic stroke, according to prespecified criteria. The 2 observers agreed in 77% of cases that the event was a likely or possible TIA, in 3% that the event was an ischemic stroke, and in 2% that the event was an unlikely TIA. The observers disagreed in 8% of patients on TIA vs. ischemic stroke, and in 11% on a vascular vs. non-vascular cause. Quality of documentation was fair. There was interobserver agreement on diagnosis of TIA in the majority of patients included in RS-TIA. Diagnostic accuracy may be further improved by more systematic documentation of symptoms and signs. © 2015 S. Karger AG, Basel.

  12. A piloted evaluation of an oblique-wing research aircraft motion simulation with decoupling control laws

    NASA Technical Reports Server (NTRS)

    Kempel, Robert W.; Mcneill, Walter E.; Gilyard, Glenn B.; Maine, Trindel A.

    1988-01-01

    The NASA Ames Research Center developed an oblique-wing research plane from NASA's digital fly-by-wire airplane. Oblique-wing airplanes show large cross-coupling in control and dynamic behavior which is not present on conventional symmetric airplanes and must be compensated for to obtain acceptable handling qualities. The large vertical motion simulator at NASA Ames-Moffett was used in the piloted evaluation of a proposed flight control system designed to provide decoupled handling qualities. Five discrete flight conditions were evaluated ranging from low altitude subsonic Mach numbers to moderate altitude supersonic Mach numbers. The flight control system was effective in generally decoupling the airplane. However, all participating pilots objected to the high levels of lateral acceleration encountered in pitch maneuvers. In addition, the pilots were more critical of left turns (in the direction of the trailing wingtip when skewed) than they were of right turns due to the tendency to be rolled into the left turns and out of the right turns. Asymmetric side force as a function of angle of attack was the primary cause of lateral acceleration in pitch. Along with the lateral acceleration in pitch, variation of rolling and yawing moments as functions of angle of attack caused the tendency to roll into left turns and out of right turns.

  13. Society of Vascular and Interventional Neurology (SVIN) Stroke Interventional Laboratory Consensus (SILC) Criteria: A 7M Management Approach to Developing a Stroke Interventional Laboratory in the Era of Stroke Thrombectomy for Large Vessel Occlusions

    PubMed Central

    Shams, Tanzila; Zaidat, Osama; Yavagal, Dileep; Xavier, Andrew; Jovin, Tudor; Janardhan, Vallabh

    2016-01-01

    Brain attack care is rapidly evolving with cutting-edge stroke interventions similar to the growth of heart attack care with cardiac interventions in the last two decades. As the field of stroke intervention is growing exponentially globally, there is clearly an unmet need to standardize stroke interventional laboratories for safe, effective, and timely stroke care. Towards this goal, the Society of Vascular and Interventional Neurology (SVIN) Writing Committee has developed the Stroke Interventional Laboratory Consensus (SILC) criteria using a 7M management approach for the development and standardization of each stroke interventional laboratory within stroke centers. The SILC criteria include: (1) manpower: personnel including roles of medical and administrative directors, attending physicians, fellows, physician extenders, and all the key stakeholders in the stroke chain of survival; (2) machines: resources needed in terms of physical facilities, and angiography equipment; (3) materials: medical device inventory, medications, and angiography supplies; (4) methods: standardized protocols for stroke workflow optimization; (5) metrics (volume): existing credentialing criteria for facilities and stroke interventionalists; (6) metrics (quality): benchmarks for quality assurance; (7) metrics (safety): radiation and procedural safety practices. PMID:27610118

  14. About Heart Attacks

    MedlinePlus

    ... Artery Disease Venous Thromboembolism Aortic Aneurysm More About Heart Attacks Updated:Jan 11,2018 A heart attack is ... coronary artery damage leads to a heart attack . Heart Attack Questions and Answers What is a heart attack? ...

  15. A graph-based system for network-vulnerability analysis

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Swiler, L.P.; Phillips, C.

    1998-06-01

    This paper presents a graph-based approach to network vulnerability analysis. The method is flexible, allowing analysis of attacks from both outside and inside the network. It can analyze risks to a specific network asset, or examine the universe of possible consequences following a successful attack. The graph-based tool can identify the set of attack paths that have a high probability of success (or a low effort cost) for the attacker. The system could be used to test the effectiveness of making configuration changes, implementing an intrusion detection system, etc. The analysis system requires as input a database of common attacks,more » broken into atomic steps, specific network configuration and topology information, and an attacker profile. The attack information is matched with the network configuration information and an attacker profile to create a superset attack graph. Nodes identify a stage of attack, for example the class of machines the attacker has accessed and the user privilege level he or she has compromised. The arcs in the attack graph represent attacks or stages of attacks. By assigning probabilities of success on the arcs or costs representing level-of-effort for the attacker, various graph algorithms such as shortest-path algorithms can identify the attack paths with the highest probability of success.« less

  16. Application of Cellular Automata to Detection of Malicious Network Packets

    ERIC Educational Resources Information Center

    Brown, Robert L.

    2014-01-01

    A problem in computer security is identification of attack signatures in network packets. An attack signature is a pattern of bits that characterizes a particular attack. Because there are many kinds of attacks, there are potentially many attack signatures. Furthermore, attackers may seek to avoid detection by altering the attack mechanism so that…

  17. Cooperating attackers in neural cryptography.

    PubMed

    Shacham, Lanir N; Klein, Einat; Mislovaty, Rachel; Kanter, Ido; Kinzel, Wolfgang

    2004-06-01

    A successful attack strategy in neural cryptography is presented. The neural cryptosystem, based on synchronization of neural networks by mutual learning, has been recently shown to be secure under different attack strategies. The success of the advanced attacker presented here, called the "majority-flipping attacker," does not decay with the parameters of the model. This attacker's outstanding success is due to its using a group of attackers which cooperate throughout the synchronization process, unlike any other attack strategy known. An analytical description of this attack is also presented, and fits the results of simulations.

  18. Terrorist Attacks Escalate in Frequency and Fatalities Preceding Highly Lethal Attacks

    PubMed Central

    Martens, Andy; Sainudiin, Raazesh; Sibley, Chris G.; Schimel, Jeff; Webber, David

    2014-01-01

    Highly lethal terrorist attacks, which we define as those killing 21 or more people, account for 50% of the total number of people killed in all terrorist attacks combined, yet comprise only 3.5% of terrorist attacks. Given the disproportionate influence of these incidents, uncovering systematic patterns in attacks that precede and anticipate these highly lethal attacks may be of value for understanding attacks that exact a heavy toll on life. Here we examined whether the activity of terrorist groups escalates–both in the number of people killed per attack and in the frequency of attacks–leading up to highly lethal attacks. Analyses of terrorist attacks drawn from a state-of-the-art international terrorism database (The Global Terrorism Database) showed evidence for both types of escalation leading up to highly lethal attacks, though complexities to the patterns emerged as well. These patterns of escalation do not emerge among terrorist groups that never commit a highly lethal attack. PMID:24755753

  19. Determining hospital performance based on rank ordering: is it appropriate?

    PubMed

    Anderson, Judy; Hackman, Mark; Burnich, Jeff; Gurgiolo, Thomas R

    2007-01-01

    An increasing number of "pay for performance" initiatives for hospitals and physicians ascribe performance by ranking hospitals or physicians on quality of care measures. Payment is subsequently based on where a hospital or physician ranks among peers. This study examines the variability of ranking hospitals on quality of care measures and its impact on comparing hospital performance. Variability in the ranks of 3 quality of care measures was examined: discharge instruction for congestive heart failure, use of beta-blockers at discharge for heart attack, and timing of initial antibiotic therapy within 4 hours of admission to the hospital for pneumonia. The data are available on the Centers for Medicare and Medicaid Services Web site as part of the Hospital Quality Alliance project. We found that considerable uncertainty exists in ranking of hospitals on these measures, which calls into question the use of rank ordering as a determinant of performance.

  20. Causal Attribution, Perceived Benefits, and Morbidity After a Heart Attack: An 8-Year Study.

    ERIC Educational Resources Information Center

    Affleck, Glenn; And Others

    1987-01-01

    Interviewed heart attack victims (N=287) seven weeks and eight years after their attack. Explored interrelations among causal attributions for the attack, survivor morbidity, and heart attack recurrence. Found that patients who cited benefits from their misfortune seven weeks after the first attack were less likely to have another attack and had…

  1. On Patarin's Attack against the lIC Scheme

    NASA Astrophysics Data System (ADS)

    Ogura, Naoki; Uchiyama, Shigenori

    In 2007, Ding et al. proposed an attractive scheme, which is called the l-Invertible Cycles (lIC) scheme. lIC is one of the most efficient multivariate public-key cryptosystems (MPKC); these schemes would be suitable for using under limited computational resources. In 2008, an efficient attack against lIC using Gröbner basis algorithms was proposed by Fouque et al. However, they only estimated the complexity of their attack based on their experimental results. On the other hand, Patarin had proposed an efficient attack against some multivariate public-key cryptosystems. We call this attack Patarin's attack. The complexity of Patarin's attack can be estimated by finding relations corresponding to each scheme. In this paper, we propose an another practical attack against the lIC encryption/signature scheme. We estimate the complexity of our attack (not experimentally) by adapting Patarin's attack. The attack can be also applied to the lIC- scheme. Moreover, we show some experimental results of a practical attack against the lIC/lIC- schemes. This is the first implementation of both our proposed attack and an attack based on Gröbner basis algorithm for the even case, that is, a parameter l is even.

  2. Machine Learning Methods for Attack Detection in the Smart Grid.

    PubMed

    Ozay, Mete; Esnaola, Inaki; Yarman Vural, Fatos Tunay; Kulkarni, Sanjeev R; Poor, H Vincent

    2016-08-01

    Attack detection problems in the smart grid are posed as statistical learning problems for different attack scenarios in which the measurements are observed in batch or online settings. In this approach, machine learning algorithms are used to classify measurements as being either secure or attacked. An attack detection framework is provided to exploit any available prior knowledge about the system and surmount constraints arising from the sparse structure of the problem in the proposed approach. Well-known batch and online learning algorithms (supervised and semisupervised) are employed with decision- and feature-level fusion to model the attack detection problem. The relationships between statistical and geometric properties of attack vectors employed in the attack scenarios and learning algorithms are analyzed to detect unobservable attacks using statistical learning methods. The proposed algorithms are examined on various IEEE test systems. Experimental analyses show that machine learning algorithms can detect attacks with performances higher than attack detection algorithms that employ state vector estimation methods in the proposed attack detection framework.

  3. Split-second escape decisions in blue tits (Parus caeruleus)

    NASA Astrophysics Data System (ADS)

    Lind, Johan; Kaby, Ulrika; Jakobsson, Sven

    2002-07-01

    Bird mortality is heavily affected by birds of prey. Under attack, take-off is crucial for survival and even minor mistakes in initial escape response can have devastating consequences. Birds may respond differently depending on the character of the predator's attack and these split-second decisions were studied using a model merlin (Falco columbarius) that attacked feeding blue tits (Parus caeruleus) from two different attack angles in two different speeds. When attacked from a low attack angle they took off more steeply than when attacked from a high angle. This is the first study to show that escape behaviour also depends on predator attack speed. The blue tits responded to a high-speed attack by dodging sideways more often than when attacked at a low speed. Escape speed was not significantly affected by the different treatments. Although they have only a split-second before escaping an attack, blue tits do adjust their escape strategy to the prevailing attack conditions.

  4. Hybrid attacks on model-based social recommender systems

    NASA Astrophysics Data System (ADS)

    Yu, Junliang; Gao, Min; Rong, Wenge; Li, Wentao; Xiong, Qingyu; Wen, Junhao

    2017-10-01

    With the growing popularity of the online social platform, the social network based approaches to recommendation emerged. However, because of the open nature of rating systems and social networks, the social recommender systems are susceptible to malicious attacks. In this paper, we present a certain novel attack, which inherits characteristics of the rating attack and the relation attack, and term it hybrid attack. Furtherly, we explore the impact of the hybrid attack on model-based social recommender systems in multiple aspects. The experimental results show that, the hybrid attack is more destructive than the rating attack in most cases. In addition, users and items with fewer ratings will be influenced more when attacked. Last but not the least, the findings suggest that spammers do not depend on the feedback links from normal users to become more powerful, the unilateral links can make the hybrid attack effective enough. Since unilateral links are much cheaper, the hybrid attack will be a great threat to model-based social recommender systems.

  5. Detecting Pulsing Denial-of-Service Attacks with Nondeterministic Attack Intervals

    NASA Astrophysics Data System (ADS)

    Luo, Xiapu; Chan, Edmond W. W.; Chang, Rocky K. C.

    2009-12-01

    This paper addresses the important problem of detecting pulsing denial of service (PDoS) attacks which send a sequence of attack pulses to reduce TCP throughput. Unlike previous works which focused on a restricted form of attacks, we consider a very broad class of attacks. In particular, our attack model admits any attack interval between two adjacent pulses, whether deterministic or not. It also includes the traditional flooding-based attacks as a limiting case (i.e., zero attack interval). Our main contribution is Vanguard, a new anomaly-based detection scheme for this class of PDoS attacks. The Vanguard detection is based on three traffic anomalies induced by the attacks, and it detects them using a CUSUM algorithm. We have prototyped Vanguard and evaluated it on a testbed. The experiment results show that Vanguard is more effective than the previous methods that are based on other traffic anomalies (after a transformation using wavelet transform, Fourier transform, and autocorrelation) and detection algorithms (e.g., dynamic time warping).

  6. Anxiety After Stroke

    PubMed Central

    Whiteley, William N.; Dennis, Martin S.; Mead, Gillian E.; Carson, Alan J.

    2018-01-01

    Background and Purpose— Anxiety after stroke is common and disabling. Stroke trialists have treated anxiety as a homogenous condition, and intervention studies have followed suit, neglecting the different treatment approaches for phobic and generalized anxiety. Using diagnostic psychiatric interviews, we aimed to report the frequency of phobic and generalized anxiety, phobic avoidance, predictors of anxiety, and patient outcomes at 3 months poststroke/transient ischemic attack. Methods— We followed prospectively a cohort of new diagnosis of stroke/transient ischemic attack at 3 months with a telephone semistructured psychiatric interview, Fear Questionnaire, modified Rankin Scale, EuroQol-5D5L, and Work and Social Adjustment Scale. Results— Anxiety disorder was common (any anxiety disorder, 38 of 175 [22%]). Phobic disorder was the predominant anxiety subtype: phobic disorder only, 18 of 175 (10%); phobic and generalized anxiety disorder, 13 of 175 (7%); and generalized anxiety disorder only, 7 of 175 (4%). Participants with anxiety disorder reported higher level of phobic avoidance across all situations on the Fear Questionnaire. Younger age (per decade increase in odds ratio, 0.64; 95% confidence interval, 0.45–0.91) and having previous anxiety/depression (odds ratio, 4.38; 95% confidence interval, 1.94–9.89) were predictors for anxiety poststroke/transient ischemic attack. Participants with anxiety disorder were more dependent (modified Rankin Scale score 3–5, [anxiety] 55% versus [no anxiety] 29%; P<0.0005), had poorer quality of life on EQ-5D5L, and restricted participation (Work and Social Adjustment Scale: median, interquartile range, [anxiety] 19.5, 10–27 versus [no anxiety] 0, 0–5; P<0.001). Conclusions— Anxiety after stroke/transient ischemic attack is predominantly phobic and is associated with poorer patient outcomes. Trials of anxiety intervention in stroke should consider the different treatment approaches needed for phobic and generalized anxiety. PMID:29437982

  7. Anxiety After Stroke: The Importance of Subtyping.

    PubMed

    Chun, Ho-Yan Yvonne; Whiteley, William N; Dennis, Martin S; Mead, Gillian E; Carson, Alan J

    2018-03-01

    Anxiety after stroke is common and disabling. Stroke trialists have treated anxiety as a homogenous condition, and intervention studies have followed suit, neglecting the different treatment approaches for phobic and generalized anxiety. Using diagnostic psychiatric interviews, we aimed to report the frequency of phobic and generalized anxiety, phobic avoidance, predictors of anxiety, and patient outcomes at 3 months poststroke/transient ischemic attack. We followed prospectively a cohort of new diagnosis of stroke/transient ischemic attack at 3 months with a telephone semistructured psychiatric interview, Fear Questionnaire, modified Rankin Scale, EuroQol-5D5L, and Work and Social Adjustment Scale. Anxiety disorder was common (any anxiety disorder, 38 of 175 [22%]). Phobic disorder was the predominant anxiety subtype: phobic disorder only, 18 of 175 (10%); phobic and generalized anxiety disorder, 13 of 175 (7%); and generalized anxiety disorder only, 7 of 175 (4%). Participants with anxiety disorder reported higher level of phobic avoidance across all situations on the Fear Questionnaire. Younger age (per decade increase in odds ratio, 0.64; 95% confidence interval, 0.45-0.91) and having previous anxiety/depression (odds ratio, 4.38; 95% confidence interval, 1.94-9.89) were predictors for anxiety poststroke/transient ischemic attack. Participants with anxiety disorder were more dependent (modified Rankin Scale score 3-5, [anxiety] 55% versus [no anxiety] 29%; P <0.0005), had poorer quality of life on EQ-5D5L, and restricted participation (Work and Social Adjustment Scale: median, interquartile range, [anxiety] 19.5, 10-27 versus [no anxiety] 0, 0-5; P <0.001). Anxiety after stroke/transient ischemic attack is predominantly phobic and is associated with poorer patient outcomes. Trials of anxiety intervention in stroke should consider the different treatment approaches needed for phobic and generalized anxiety. © 2018 The Authors.

  8. Circadian variations in the clinical presentation of headaches among migraineurs: A study using a smartphone headache diary.

    PubMed

    Park, Jeong-Wook; Cho, Soo-Jin; Park, Sang-Gue; Chu, Min Kyung

    2018-04-01

    Migraines occur within certain time frames. Nevertheless, information regarding circadian variation in the clinical presentation of migraine is limited. We investigated circadian variations in the clinical presentation of migraine using a smartphone headache diary (SHD). We enrolled adult participants with the diagnosis of migraine according to the third beta edition of the International Classification of Headache Disorders. Participants were asked to log in to the SHD every day for 90 days to record the occurrence of headaches. We compared the occurrence and clinical presentation of headaches during four 6-hour quadrants per day (00:00-05:59, 06:00-11:59, 12:00-17:59, and 18:00-23:59). Migraine-type headache was defined as a headache attack that fulfilled all criteria of migraine, except for the criterion regarding typical headache duration. Eighty-two participants kept a dairy for at least 50% of the study period and recorded 1491 headache attacks. Among the 1491 headache attacks, 474 (31.8%) were classified as migraine-type headaches and 1017 (68.2%) were classified as non-migraine-type headaches. All headaches, migraine-type headaches and non-migraine-type headaches occurred most frequently between 06:00 and 11:59, and least frequently between 18:00 and 23:59, and between 00:00 and 05:59. Migrainous headache characteristics, such as unilateral pain, pulsating quality, severe headache intensity, aggravation by movement, nausea, photophobia, and phonophobia presented most frequently between 06:00 and 11:59, and least frequently between 18:00 and 23:59, and 00:00 and 05:59 among 1491 all headache attacks. Headache clinical presentation as well as headache occurrence exhibited circadian periodicity among migraineurs. SHD: smartphone headache diary; ICHD-3 beta: the third edition beta version of the International Classification of Headache Disorders.

  9. Depression, anxiety, and quality of life in paroxysmal kinesigenic dyskinesia patients.

    PubMed

    Tian, Wo-Tu; Huang, Xiao-Jun; Liu, Xiao-Li; Shen, Jun-Yi; Liang, Gui-Ling; Zhu, Chen-Xi; Tang, Wei-Guo; Chen, Sheng-Di; Song, Yan-Yan; Cao, Li

    2017-09-05

    Paroxysmal kinesigenic dyskinesia (PKD) is a rare movement disorder characterized by recurrent dystonic or choreoathetoid attacks triggered by sudden voluntary movements. Under the condition of psychological burden, some patients' attacks may get worsened with longer duration and higher frequency. This study aimed to assess nonmotor symptoms and quality of life of patients with PKD in a large population. We performed a cross-sectional survey in 165 primary PKD patients from August 2008 to October 2016 in Rui Jin Hospital, using Symptom Check List-90-Revised (SCL-90-R), World Health Organization Quality of Life-100 (WHOQoL-100), Self-Rating Depression Scale, and Self-Rating Anxiety Scale. We evaluated the differences of SCL-90-R and WHOQOL-100 scores in patients and Chinese normative data (taken from literature) by using the unpaired Student's t-test. We applied multivariate linear regression to analyze the relationships between motor manifestations, mental health, and quality of life among PKD patients. Compared with Chinese normative data taken from literature, patients with PKD exhibited significantly higher (worse) scores across all SCL-90-R subscales (somatization, obsessive-compulsive, interpersonal sensitivity, depression, anxiety, hostility, phobic anxiety, paranoid ideation, and psychoticism; P= 0.000 for all) and significantly lower (worse) scores of five domains in WHOQoL-100 (physical domain, psychological domain, independence domain, social relationship domain, and general quality of life; P= 0.000 for all). Nonremission of dyskinesia episodes (P = 0.011) and higher depression score (P = 0.000) were significantly associated with lower levels of quality of life. The rates of depression and anxiety in patients with PKD were 41.2% (68/165) and 26.7% (44/165), respectively. Depression, anxiety, and low levels of quality of life were prevalent in patients with PKD. Co-occurrence of depression and anxiety was common among these patients. Regular mental health interventions could set depression and anxiety as intervention targets. Considering that the motor episodes could be elicited by voluntary movements and sometimes also by emotional stress, and that symptoms may get worsened with longer duration and higher frequency when patients are stressed out, intervention or treatment of depression and anxiety might improve the motor symptoms and overall quality of life in PKD patients.

  10. Sumatriptan plus naproxen for the treatment of acute migraine attacks in adults.

    PubMed

    Law, Simon; Derry, Sheena; Moore, R Andrew

    2016-04-20

    This is an updated version of the original Cochrane review published in October 2013 on 'Sumatriptan plus naproxen for acute migraine attacks in adults'.Migraine is a common disabling condition and a burden for the individual, health services, and society. It affects two to three times more women than men, and is most common in the age range 30 to 50 years. Effective abortive treatments include the triptan and non-steroidal anti-inflammatory classes of drugs. These drugs have different mechanisms of action and combining them may provide better relief. Sumatriptan plus naproxen is now available in combination form for the acute treatment of migraine. To determine the efficacy and tolerability of sumatriptan plus naproxen, administered together as separate tablets or taken as a fixed-dose combination tablet, compared with placebo and other active interventions in the treatment of acute migraine attacks in adults. For this update we searched the Cochrane Central Register of Controlled Trials (CENTRAL) via The Cochrane Register of Studies Online (CRSO) to 28 October 2015, MEDLINE (via Ovid) from 1946 to 28 October 2015, and EMBASE (via Ovid) from 1974 to 28 October 2015, and two online databases (www.gsk-clinicalstudyregister.com and www.clinicaltrials.gov). We also searched the reference lists of included studies and relevant reviews. We included randomised, double-blind, placebo- or active-controlled studies, with at least 10 participants per treatment arm, using sumatriptan plus naproxen to treat a migraine headache episode. Two review authors independently assessed trial quality and extracted data. We used numbers of participants achieving each outcome to calculate risk ratio and numbers needed to treat for an additional beneficial outcome (NNT) or for an additional harmful outcome (NNH) compared with placebo or a different active treatment. For this update we identified one new study (43 participants), but it did not contribute any data for analysis. The review included 13 studies using sumatriptan 85 mg or 50 mg plus naproxen 500 mg to treat attacks of mild, moderate, or severe pain intensity. Twelve studies contributed data for analyses: 3663 participants received combination treatment, 3682 placebo, 964 sumatriptan, and 982 naproxen. We judged only one small study to be at high risk of bias for any of the criteria evaluated; it did not contribute to any analyses.Overall, the combination was better than placebo for the primary outcomes of pain-free and headache relief at two hours. The NNT for pain-free at two hours was 3.1 (95% confidence interval 2.9 to 3.5) when the baseline pain was mild (50% response with sumatriptan plus naproxen compared with 18% with placebo), and 4.9 (4.3 to 5.7) when baseline pain was moderate or severe (28% with sumatriptan plus naproxen compared with 8% with placebo) (high quality evidence). Using 50 mg of sumatriptan, rather than 85 mg, in the combination did not significantly change the result. Treating early, when pain was still mild, was significantly better than treating once pain was moderate or severe for pain-free responses at two hours and during the 24 hours post dose. Adverse events were mostly mild or moderate in severity and rarely led to withdrawal; they were more common with the combination than with placebo (moderate quality evidence).Where the data allowed direct comparison, combination treatment was superior to either monotherapy, but adverse events were less frequent with naproxen than with sumatriptan (moderate quality evidence). The conclusions of this review were not changed. Combination treatment was effective in the acute treatment of migraine headaches. The effect was greater than for the same dose of either sumatriptan or naproxen alone, but additional benefits over sumatriptan alone were not large. More participants achieved good relief when medication was taken early in the attack, when pain was still mild. Adverse events were more common with the combination and sumatriptan alone than with placebo or naproxen alone.

  11. Cyber-Physical Attacks With Control Objectives

    DOE PAGES

    Chen, Yuan; Kar, Soummya; Moura, Jose M. F.

    2017-08-18

    This study studies attackers with control objectives against cyber-physical systems (CPSs). The goal of the attacker is to counteract the CPS's controller and move the system to a target state while evading detection. We formulate a cost function that reflects the attacker's goals, and, using dynamic programming, we show that the optimal attack strategy reduces to a linear feedback of the attacker's state estimate. By changing the parameters of the cost function, we show how an attacker can design optimal attacks to balance the control objective and the detection avoidance objective. In conclusion, we provide a numerical illustration based onmore » a remotely controlled helicopter under attack.« less

  12. Cyber-Physical Attacks With Control Objectives

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chen, Yuan; Kar, Soummya; Moura, Jose M. F.

    This study studies attackers with control objectives against cyber-physical systems (CPSs). The goal of the attacker is to counteract the CPS's controller and move the system to a target state while evading detection. We formulate a cost function that reflects the attacker's goals, and, using dynamic programming, we show that the optimal attack strategy reduces to a linear feedback of the attacker's state estimate. By changing the parameters of the cost function, we show how an attacker can design optimal attacks to balance the control objective and the detection avoidance objective. In conclusion, we provide a numerical illustration based onmore » a remotely controlled helicopter under attack.« less

  13. JPRS Report - Science & Technology USSR: Life Sciences.

    DTIC Science & Technology

    1988-10-17

    a plant that is attacked by many phytopathogens both during growth and during storage—was exposed to Botrytis allii Munn., JPRS-ULS-88-017 17...October 1988 AGRICULTURAL SCIENCE Botrytis cinerea Pers., and Fusarium solani App. et Wr. The onions were then incubated in a damp container at 19-23T...new growth regulators; government test- ing; the role of growth regulators in controlling harvest and its quality; and the scientific and practical

  14. Environmental and Energy Quality Technologies. Task Order 0005: Organic Finishing Technologies, Sub Task 11: High Speed, Substrate Safe Specialty Coating Laser Stripping : Project: WP 2146

    DTIC Science & Technology

    2015-06-22

    hazardous materials and eliminating the hazardous waste streams associated with wheat starch , chemical strippers and hand sanding. Additionally, the laser...chemical attack resistance and other special characteristics while providing corrosion protection. The materials used for these purposes are designed...inspection and/or replacement. Standard coating removal methods include chemical strippers, media blasting (i.e., wheat starch , plastic

  15. X-29 High Angle-of-Attack Flying Qualities

    DTIC Science & Technology

    1991-06-01

    Pellicano, P., Evolution oj the X-29 Aerodynamic Mat/h Model (AEI?09B), Grumman Aircraft Systems, Edwards AFB, CA, May 199 1 . 7. Murray, James E. and...Kurt Schroeder Grumman Aircraft Systems Division Mail Stop B 19-007 Calverton, NY 11933 Glenn Spacht Grumman Aircraft Systems Division Mail Stop C3 1 ...Binghamton, NY 13902 Juri Kalviste Northrop Corporation 3836/82 I Northrop Avenue Hawthorne, CA 90250 Haig Asdurian Northrop Corporation 1 Northrop

  16. Design and pilot evaluation of the RAH-66 Comanche Core AFCS

    NASA Technical Reports Server (NTRS)

    Fogler, Donald L., Jr.; Keller, James F.

    1993-01-01

    This paper addresses the design and pilot evaluation of the Core Automatic Flight Control System (AFCS) for the Reconnaissance/Attack Helicopter (RAH-66) Comanche. During the period from November 1991 through February 1992, the RAH-66 Comanche control laws were evaluated through a structured pilot acceptance test using a motion base simulator. Design requirements, descriptions of the control law design, and handling qualities data collected from ADS-33 maneuvers are presented.

  17. Performance Improvement of Power Analysis Attacks on AES with Encryption-Related Signals

    NASA Astrophysics Data System (ADS)

    Lee, You-Seok; Lee, Young-Jun; Han, Dong-Guk; Kim, Ho-Won; Kim, Hyoung-Nam

    A power analysis attack is a well-known side-channel attack but the efficiency of the attack is frequently degraded by the existence of power components, irrelative to the encryption included in signals used for the attack. To enhance the performance of the power analysis attack, we propose a preprocessing method based on extracting encryption-related parts from the measured power signals. Experimental results show that the attacks with the preprocessed signals detect correct keys with much fewer signals, compared to the conventional power analysis attacks.

  18. Attacks on public telephone networks: technologies and challenges

    NASA Astrophysics Data System (ADS)

    Kosloff, T.; Moore, Tyler; Keller, J.; Manes, Gavin W.; Shenoi, Sujeet

    2003-09-01

    Signaling System 7 (SS7) is vital to signaling and control in America's public telephone networks. This paper describes a class of attacks on SS7 networks involving the insertion of malicious signaling messages via compromised SS7 network components. Three attacks are discussed in detail: IAM flood attacks, redirection attacks and point code spoofing attacks. Depending on their scale of execution, these attacks can produce effects ranging from network congestion to service disruption. Methods for detecting these denial-of-service attacks and mitigating their effects are also presented.

  19. Novel mechanism of network protection against the new generation of cyber attacks

    NASA Astrophysics Data System (ADS)

    Milovanov, Alexander; Bukshpun, Leonid; Pradhan, Ranjit

    2012-06-01

    A new intelligent mechanism is presented to protect networks against the new generation of cyber attacks. This mechanism integrates TCP/UDP/IP protocol stack protection and attacker/intruder deception to eliminate existing TCP/UDP/IP protocol stack vulnerabilities. It allows to detect currently undetectable, highly distributed, low-frequency attacks such as distributed denial-of-service (DDoS) attacks, coordinated attacks, botnet, and stealth network reconnaissance. The mechanism also allows insulating attacker/intruder from the network and redirecting the attack to a simulated network acting as a decoy. As a result, network security personnel gain sufficient time to defend the network and collect the attack information. The presented approach can be incorporated into wireless or wired networks that require protection against known and the new generation of cyber attacks.

  20. Fast WEP-Key Recovery Attack Using Only Encrypted IP Packets

    NASA Astrophysics Data System (ADS)

    Teramura, Ryoichi; Asakura, Yasuo; Ohigashi, Toshihiro; Kuwakado, Hidenori; Morii, Masakatu

    Conventional efficient key recovery attacks against Wired Equivalent Privacy (WEP) require specific initialization vectors or specific packets. Since it takes much time to collect the packets sufficiently, any active attack should be performed. An Intrusion Detection System (IDS), however, will be able to prevent the attack. Since the attack logs are stored at the servers, it is possible to prevent such an attack. This paper proposes an algorithm for recovering a 104-bit WEP key from any IP packets in a realistic environment. This attack needs about 36, 500 packets with a success probability 0.5, and the complexity of our attack is equivalent to about 220 computations of the RC4 key setups. Since our attack is passive, it is difficult for both WEP users and administrators to detect our attack.

  1. Raynaud's phenomenon and digital ischaemia--pharmacologic approach and alternative treatment options.

    PubMed

    Linnemann, Birgit; Erbe, Matthias

    2016-01-01

    The primary goal of therapy is to reduce the frequency and intensity of Raynaud's attacks and to minimize the related morbidity rather than to cure the underlying condition. Treatment strategies depend on whether Raynaud's phenomenon (RP) is primary or secondary. All patients should be instructed about general measures to maintain body warmth and to avoid triggers of RP attacks. Pharmacologic intervention can be useful for patients with severe and frequent RP episodes that impair the patient's quality of life. Calcium channel blockers are currently the most prescribed and studied medications for this purpose. There has been limited evidence for the efficacy of alpha-1-adrenergic receptor antagonists, angiotensin receptor blockers, topical nitrates or fluoxetine to treat RP. The intravenously administered prostacyclin analogue iloprost can reduce the frequency and severity of RP attacks and is considered a second-line therapy in patients with markedly impaired quality of life, critical digital ischaemia and skin ulcers who are at risk for substantial tissue loss and amputation. Phosphodiesterase inhibitors (e.g., sildenafil) can also improve RP symptoms and ulcer healing whereas endothelin-1 receptor antagonists (e.g., bosentan) are mainly considered treatment options in secondary prevention for patients with digital skin ulcers related to systemic sclerosis. However, their use in clinical practice has been limited by their high cost. Antiplatelet therapy with low-dose aspirin is recommended for all patients who suffer from secondary RP due to ischaemia caused by structural vessel damage. Anticoagulant therapy can be considered during the acute phase of digital ischaemia in patients with suspected vascular occlusive disease attributed to the occurrence of new thromboses. In patients with critical digital ischaemia, consideration should be given to hospitalisation, optimisation of medical treatment in accordance with the underlying disease and evaluation for a secondary, possibly reversible process that is causing or aggravating the clinical symptoms.

  2. Migraine attacks among medical students in Soochow University, Southeast China: a cross-sectional study.

    PubMed

    Gu, Xiao; Xie, Yaojie

    2018-01-01

    Migraine is one of the most common primary headache disorders and is burdensome to both the individual and society, influencing the academic performance and quality of daily lives of medical students worldwide. This study aimed to investigate the migraine prevalence in a sample of university medical students in China and to examine the features and typical trigger factors of migraine among these students. From May 2016 to August 2016, a total of 1,060 medical students who were enrolled in Soochow University in Jiangsu Province in China were chosen through stratified random sampling. A self-administered questionnaire that included the ID Migraine™ for screening of migraine cases was used to collect data. The frequency, severity, duration of migraine attacks, and relevant trigger factors were measured for migraine cases. In total, 986 students completed the questionnaire. The overall migraine prevalence among students was 7.91%, with 4.64% in male and 9.84% in female students. Junior-grade students had a higher migraine prevalence than senior students (prevalence of migraine of year 1 to year 5 undergraduates: 10.83%, 8.9% vs. 6.25%, 4.42%, 5.33%, P <0.05; prevalence of migraine of year 1 to year 3 graduates: 9.68%, 9.71% vs. 6.38%, P <0.05). Students with a positive family history were more likely to suffer migraine than those without (OR=8.48, 95% CI: 4.33-16.59). Stress (n=73, 93.59%), lack of sleep (n=72, 92.31%), and change of sleeping time (n=68, 87.18%) were the top three trigger factors among the students. Migraine was common among medical students from a university in China, and especially higher in female and junior-grade students, and those with a family history of migraine. Reducing stress and improving sleep quality might be effective to reduce migraine attacks in this population.

  3. Multi-application controls: Robust nonlinear multivariable aerospace controls applications

    NASA Technical Reports Server (NTRS)

    Enns, Dale F.; Bugajski, Daniel J.; Carter, John; Antoniewicz, Bob

    1994-01-01

    This viewgraph presentation describes the general methodology used to apply Honywell's Multi-Application Control (MACH) and the specific application to the F-18 High Angle-of-Attack Research Vehicle (HARV) including piloted simulation handling qualities evaluation. The general steps include insertion of modeling data for geometry and mass properties, aerodynamics, propulsion data and assumptions, requirements and specifications, e.g. definition of control variables, handling qualities, stability margins and statements for bandwidth, control power, priorities, position and rate limits. The specific steps include choice of independent variables for least squares fits to aerodynamic and propulsion data, modifications to the management of the controls with regard to integrator windup and actuation limiting and priorities, e.g. pitch priority over roll, and command limiting to prevent departures and/or undesirable inertial coupling or inability to recover to a stable trim condition. The HARV control problem is characterized by significant nonlinearities and multivariable interactions in the low speed, high angle-of-attack, high angular rate flight regime. Systematic approaches to the control of vehicle motions modeled with coupled nonlinear equations of motion have been developed. This paper will discuss the dynamic inversion approach which explicity accounts for nonlinearities in the control design. Multiple control effectors (including aerodynamic control surfaces and thrust vectoring control) and sensors are used to control the motions of the vehicles in several degrees-of-freedom. Several maneuvers will be used to illustrate performance of MACH in the high angle-of-attack flight regime. Analytical methods for assessing the robust performance of the multivariable control system in the presence of math modeling uncertainty, disturbances, and commands have reached a high level of maturity. The structured singular value (mu) frequency response methodology is presented as a method for analyzing robust performance and the mu-synthesis method will be presented as a method for synthesizing a robust control system. The paper concludes with the author's expectations regarding future applications of robust nonlinear multivariable controls.

  4. Security under Uncertainty: Adaptive Attackers Are More Challenging to Human Defenders than Random Attackers

    PubMed Central

    Moisan, Frédéric; Gonzalez, Cleotilde

    2017-01-01

    Game Theory is a common approach used to understand attacker and defender motives, strategies, and allocation of limited security resources. For example, many defense algorithms are based on game-theoretic solutions that conclude that randomization of defense actions assures unpredictability, creating difficulties for a human attacker. However, many game-theoretic solutions often rely on idealized assumptions of decision making that underplay the role of human cognition and information uncertainty. The consequence is that we know little about how effective these algorithms are against human players. Using a simplified security game, we study the type of attack strategy and the uncertainty about an attacker's strategy in a laboratory experiment where participants play the role of defenders against a simulated attacker. Our goal is to compare a human defender's behavior in three levels of uncertainty (Information Level: Certain, Risky, Uncertain) and three types of attacker's strategy (Attacker's strategy: Minimax, Random, Adaptive) in a between-subjects experimental design. Best defense performance is achieved when defenders play against a minimax and a random attack strategy compared to an adaptive strategy. Furthermore, when payoffs are certain, defenders are as efficient against random attack strategy as they are against an adaptive strategy, but when payoffs are uncertain, defenders have most difficulties defending against an adaptive attacker compared to a random attacker. We conclude that given conditions of uncertainty in many security problems, defense algorithms would be more efficient if they are adaptive to the attacker actions, taking advantage of the attacker's human inefficiencies. PMID:28690557

  5. Numerical simulation of the optimal two-mode attacks for two-way continuous-variable quantum cryptography in reverse reconciliation

    NASA Astrophysics Data System (ADS)

    Zhang, Yichen; Li, Zhengyu; Zhao, Yijia; Yu, Song; Guo, Hong

    2017-02-01

    We analyze the security of the two-way continuous-variable quantum key distribution protocol in reverse reconciliation against general two-mode attacks, which represent all accessible attacks at fixed channel parameters. Rather than against one specific attack model, the expression of secret key rates of the two-way protocol are derived against all accessible attack models. It is found that there is an optimal two-mode attack to minimize the performance of the protocol in terms of both secret key rates and maximal transmission distances. We identify the optimal two-mode attack, give the specific attack model of the optimal two-mode attack and show the performance of the two-way protocol against the optimal two-mode attack. Even under the optimal two-mode attack, the performances of two-way protocol are still better than the corresponding one-way protocol, which shows the advantage of making double use of the quantum channel and the potential of long-distance secure communication using a two-way protocol.

  6. Flying qualities design criteria applicable to supersonic cruise aircraft

    NASA Technical Reports Server (NTRS)

    Chalk, C. R.

    1980-01-01

    A comprehensive set of flying qualities design criteria was prepared for use in the supersonic cruise research program. The framework for stating the design criteria is established and design criteria are included which address specific failures, approach to dangerous flight conditions, flight at high angle of attack, longitudinal and lateral directional stability and control, the primary flight control system, and secondary flight controls. Examples are given of lateral directional design criteria limiting lateral accelerations at the cockpit, time to roll through 30 deg of bank, and time delay in the pilot's command path. Flight test data from the Concorde certification program are used to substantiate a number of the proposed design criteria.

  7. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hutton, D.

    The reasons for preservative treatment of cooling tower wood are reviewed along with a summary of which types of treatment are available, how they are applied, and a comparison of materials and processes. Industries often specify minimum quality preservatives for their cooling towers without understanding the loss of strength caused by decay and the economic losses due to a cooling tower failure and lost production. Wood is subject to both chemical (surface delignification and iron rot) and biological (soft rot) attack. A successful preservative treatment that protects against both must have retention and penetration qualities. Research efforts are examining themore » toxicity and environmental impacts of preservatives and exploring the possibility of chemically modifying wood. (DCK)« less

  8. Quality is good business

    NASA Astrophysics Data System (ADS)

    Mueller, Daniel L.

    1994-03-01

    Xerox virtually created the plain paper copier industry, it enjoyed unparalleled growth and its name became synonymous with copying. However, competition in the 1970s aggressively attacked this attractive growth market and took away market share. An evaluation of the competition told Xerox that its competitors were selling products for what it cost Xerox to make them, that their quality was better and that their goal was to capture all of Xerox' market share. The fundamental precept that Xerox pursued to meet this competitive threat and recapture market share was the recognition that long term success is dependent upon total mastery of quality, especially in manufacturing. In turning this precept into reality, Xerox Manufacturing made dramatic improvements in all of its processes and practices focusing on quality as defined by the customer. Actions to accomplish this result included training all people in basic statistical tools and their applications, the use of employee involvement teams and continuous quality improvement techniques. These and other actions were successful in not only enabling Xerox to turn the competitive threat and recover market share, but to also win the Malcolm Baldrige Award for Quality in 1989.

  9. Improving Population Health Through an Innovative Collaborative: The Be There San Diego Data for Quality Group.

    PubMed

    Fremont, Allen; Kranz, Ashley M; Phillips, Jessica; Garber, Chandra

    2017-06-01

    In 2012, leaders from disparate health care organizations established a data group aligned around a regional goal of preventing heart attacks and strokes in San Diego. The group---now named the Be There San Diego Data for Quality (DFQ) Group---is a safe venue for medical directors and other quality-improvement leaders to share performance data on quality-of-care measures for diabetes, hypertension, and cardiovascular disease, as well as insights, lessons learned, and challenges faced by each organization in treating these conditions. The DFQ Group has focused its efforts on improving the quality of services provided by each participating health care organization, and has placed a strong emphasis on analyzing trends in combined quality data to better understand the health of the entire San Diego population. By fostering collaboration among organizations that collectively serve a large portion of the local population and other key community stakeholders, the DFQ Group has helped form the foundation of a unique, multifaceted, multi-stakeholder, regional effort that is gaining national attention and funding for its community-driven approach.

  10. Blind Data Attack on BGP Routers

    DTIC Science & Technology

    2017-03-01

    implement blind attack protection, leaving long -standing connections, such as Border Gateway Protocol (BGP) sessions, vulnerable to exploitation. This...protection measures should a discovered vulnerability reduce attack complexity. 14. SUBJECT TERMS BGP, TCP, blind attack, blind data attack 15. NUMBER OF...implementations may not properly implement blind attack protection, leaving long -standing connections, such as BorderGateway Protocol (BGP) sessions

  11. Stability assessment of QKD procedures in commercial quantum cryptography systems versus quality of dark channel

    NASA Astrophysics Data System (ADS)

    Jacak, Monika; Melniczuk, Damian; Jacak, Janusz; Jóźwiak, Ireneusz; Gruber, Jacek; Jóźwiak, Piotr

    2015-02-01

    In order to assess the susceptibility of the quantum key distribution (QKD) systems to the hacking attack including simultaneous and frequent system self-decalibrations, we analyze the stability of the QKD transmission organized in two commercially available systems. The first one employs non-entangled photons as flying qubits in the dark quantum channel for communication whereas the second one utilizes the entangled photon pairs to secretly share the cryptographic key. Applying standard methods of the statistical data analysis to the characteristic indicators of the quality of the QKD communication (the raw key exchange rate [RKER] and the quantum bit error rate [QBER]), we have estimated the pace of the self-decalibration of both systems and the repeatability rate in the case of controlled worsening of the dark channel quality.

  12. Warning Signs of Heart Attack, Stroke and Cardiac Arrest

    MedlinePlus

    ... a Heart Attack WARNING SIGNS OF HEART ATTACK, STROKE & CARDIAC ARREST HEART ATTACK WARNING SIGNS CHEST DISCOMFORT ... nausea or lightheadedness. Learn more about heart attack STROKE WARNING SIGNS Spot a stroke F.A.S.T.: - ...

  13. The role of mental disorder in attacks on European politicians 1990-2004.

    PubMed

    James, D V; Mullen, P E; Meloy, J R; Pathé, M T; Farnham, F R; Preston, L; Darnley, B

    2007-11-01

    The only systematic studies of attacks on public figures come from the USA. These studies de-emphasize the role of mental illness and suggest threats are of no predictive value. This study re-examines these questions through a study of attacks on European politicians. All non-terrorist attacks on elected politicians in Western Europe between 1990 and 2004 were analysed. Twenty-four attacks were identified, including five involving fatalities, and eight serious injuries. Ten attackers were psychotic, four drunk, nine politically motivated and one unclassifiable. Eleven attackers evidenced warning behaviours. The mentally disordered, most of whom gave warnings, were responsible for most of the fatal and seriously injurious attacks. A greater awareness of the link between delusional fixations on public figures and subsequent attacks could aid prevention. Equally importantly, recognition would encourage earlier intervention in people who, irrespective of whether they eventually attack, have delusional preoccupations which ruin their lives.

  14. An Exploration of Hypotheses that Explain Herbivore and Pathogen Attack in Restored Plant Communities

    PubMed Central

    Blaisdell, G. Kai; Roy, Bitty A.; Pfeifer-Meister, Laurel; Bridgham, Scott D.

    2015-01-01

    Many hypotheses address the associations of plant community composition with natural enemies, including: (i) plant species diversity may reduce enemy attack, (ii) attack may increase as host abundance increases, (iii) enemy spillover may lead to increased attack on one host species due to transmission from another host species, or enemy dilution may lead to reduced attack on a host that would otherwise have more attack, (iv) physical characteristics of the plant community may influence attack, and (v) plant vigor may affect attack. Restoration experiments with replicated plant communities provide an exceptional opportunity to explore these hypotheses. To explore the relative predictive strengths of these related hypotheses and to investigate the potential effect of several restoration site preparation techniques, we surveyed arthropod herbivore and fungal pathogen attack on the six most common native plant species in a restoration experiment. Multi-model inference revealed a weak but consistent negative correlation with pathogen attack and host diversity across the plant community, and no correlation between herbivory and host diversity. Our analyses also revealed host species-specific relationships between attack and abundance of the target host species, other native plant species, introduced plant species, and physical community characteristics. We found no relationship between enemy attack and plant vigor. We found minimal differences in plant community composition among several diverse site preparation techniques, and limited effects of site preparation techniques on attack. The strongest associations of community characteristics with attack varied among plant species with no community-wide patterns, suggesting that no single hypothesis successfully predicts the dominant community-wide trends in enemy attack. PMID:25699672

  15. Higher coronary heart disease and heart attack morbidity in Appalachian coal mining regions

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hendryx, M.; Zullig, K.J.

    This study analyzes the U.S. 2006 Behavioral Risk Factor Surveillance System survey data (N = 235,783) to test whether self-reported cardiovascular disease rates are higher in Appalachian coal mining counties compared to other counties after control for other risks. Dependent variables include self-reported measures of ever (1) being diagnosed with cardiovascular disease (CVD) or with a specific form of CVD including (2) stroke, (3) heart attack, or (4) angina or coronary heart disease (CHD). Independent variables included coal mining, smoking, BMI, drinking, physician supply, diabetes co-morbidity, age, race/ethnicity, education, income, and others. SUDAAN Multilog models were estimated, and odds ratiosmore » tested for coal mining effects. After control for covariates, people in Appalachian coal mining areas reported significantly higher risk of CVD (OR = 1.22, 95% CI = 1.14-1.30), angina or CHO (OR = 1.29, 95% C1 = 1.19-1.39) and heart attack (OR = 1.19, 95% C1 = 1.10-1.30). Effects were present for both men and women. Cardiovascular diseases have been linked to both air and water contamination in ways consistent with toxicants found in coal and coal processing. Future research is indicated to assess air and water quality in coal mining communities in Appalachia, with corresponding environmental programs and standards established as indicated.« less

  16. Pediatric multiple sclerosis: Clinical features and outcome.

    PubMed

    Waldman, Amy; Ness, Jayne; Pohl, Daniela; Simone, Isabella Laura; Anlar, Banu; Amato, Maria Pia; Ghezzi, Angelo

    2016-08-30

    Multiple sclerosis (MS) in children manifests with a relapsing-remitting MS (RRMS) disease course. Acute relapses consist of new neurologic deficits persisting greater than 24 hours, in the absence of intercurrent illness, and occur with a higher frequency early in the disease as compared to adult-onset RRMS. Most pediatric patients with MS recover well from these early relapses, and cumulative physical disability is rare in the first 10 years of disease. Brainstem attacks, poor recovery from a single attack, and a higher frequency of attacks portend a greater likelihood of future disability. Although prospective pediatric-onset MS cohorts have been established in recent years, there remains very limited prospective data detailing the longer-term clinical outcome of pediatric-onset MS into adulthood. Whether the advent of MS therapies, and the largely off-label access to such therapies in pediatric MS, has improved prognosis is unknown. MS onset during the key formative academic years, concurrent with active cognitive maturation, is an important determinant of long-term outcome, and is discussed in detail in another article in this supplement. Finally, increasing recognition of pediatric MS worldwide, recent launch of phase III trials for new agents in the pediatric MS population, and the clear imperative to more fully appreciate health-related quality of life in pediatric MS through adulthood highlight the need for standardized, validated, and robust outcome measures. © 2016 American Academy of Neurology.

  17. Water security - Nation state and international security implications

    USGS Publications Warehouse

    Tindall, James A.; Andrew A. Campbell,

    2009-01-01

    A terrorist attack such as poisoning and sabotage of the national water supply and water-quality infrastructure of the continental United States or any country, could disrupt the delivery of vital human services, threaten both public health and the environment, potentially cause mass casualties and pose grave public concern for homeland security. Most significantly, an attack on water resources would weaken social cohesion and trust in government. A threat to continuity of services is a potential threat to continuity of government since both are necessary for continuity of operations. Water infrastructure is difficult to protect, as it extends over vast areas across the U.S. and for which ownership is overwhelmingly nonfederal (approximately 85 percent). Since the 9111 attacks, federal dam operators and water and wastewater utilities have established counter measures. Similar measures have been taken in countries around the world. These include enhanced physical security, improved coordination between corporate ownership, Department of Homeland Security, and local law enforcement, and research into risk assessment and vulnerability analysis to ensure greater system safety. A key issue is the proportionate additional resources directed at public and private sector specific priorities. Agencies that have the scientific and technological ability to leverage resources, exploit integrated science approaches, focus on interdisciplinary practices, utilize informatics expertise and employ a wide use of evolving technologies should play a key role in water security and related issues.

  18. Cyber attack analysis on cyber-physical systems: Detectability, severity, and attenuation strategy

    NASA Astrophysics Data System (ADS)

    Kwon, Cheolhyeon

    Security of Cyber-Physical Systems (CPS) against malicious cyber attacks is an important yet challenging problem. Since most cyber attacks happen in erratic ways, it is usually intractable to describe and diagnose them systematically. Motivated by such difficulties, this thesis presents a set of theories and algorithms for a cyber-secure architecture of the CPS within the control theoretic perspective. Here, instead of identifying a specific cyber attack model, we are focused on analyzing the system's response during cyber attacks. Firstly, we investigate the detectability of the cyber attacks from the system's behavior under cyber attacks. Specifically, we conduct a study on the vulnerabilities in the CPS's monitoring system against the stealthy cyber attack that is carefully designed to avoid being detected by its detection scheme. After classifying three kinds of cyber attacks according to the attacker's ability to compromise the system, we derive the necessary and sufficient conditions under which such stealthy cyber attacks can be designed to cause the unbounded estimation error while not being detected. Then, the analytical design method of the optimal stealthy cyber attack that maximizes the estimation error is developed. The proposed stealthy cyber attack analysis is demonstrated with illustrative examples on Air Traffic Control (ATC) system and Unmanned Aerial Vehicle (UAV) navigation system applications. Secondly, in an attempt to study the CPSs' vulnerabilities in more detail, we further discuss a methodology to identify potential cyber threats inherent in the given CPSs and quantify the attack severity accordingly. We then develop an analytical algorithm to test the behavior of the CPS under various cyber attack combinations. Compared to a numerical approach, the analytical algorithm enables the prediction of the most effective cyber attack combinations without computing the severity of all possible attack combinations, thereby greatly reducing the computational cost. The proposed algorithm is validated through a linearized longitudinal motion of a UAV example. Finally, we propose an attack attenuation strategy via the controller design for CPSs that are robust to various types of cyber attacks. While the previous studies have investigated a secure control by assuming a specific attack strategy, in this research we propose a hybrid robust control scheme that contains multiple sub-controllers, each matched to a specific type of cyber attacks. Then the system can be adapted to various cyber attacks (including those that are not assumed for sub-controller design) by switching its sub-controllers to achieve the best performance. Then, a method for designing a secure switching logic to counter all possible cyber attacks is proposed and it verifies mathematically the system's performance and stability as well. The performance of the proposed control scheme is demonstrated by an example with the hybrid H2 - H-infinity controller applied to a UAV example.

  19. Method for Integrated Simulation (MINTSIM)

    DTIC Science & Technology

    1976-01-01

    sorties allocated to attack SAMs. FAPA = fraction of striking aircraft attacking air bases which attack parked aircraft in the open. TAAB...each striking aircraft. FAS = fraction of striking aircraft attacking air bases which attack sheltered aircraft. (NOTE: FAPA + FAS = 1.0

  20. Finite Energy and Bounded Actuator Attacks on Cyber-Physical Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Djouadi, Seddik M; Melin, Alexander M; Ferragut, Erik M

    As control system networks are being connected to enterprise level networks for remote monitoring, operation, and system-wide performance optimization, these same connections are providing vulnerabilities that can be exploited by malicious actors for attack, financial gain, and theft of intellectual property. Much effort in cyber-physical system (CPS) protection has focused on protecting the borders of the system through traditional information security techniques. Less effort has been applied to the protection of cyber-physical systems from intelligent attacks launched after an attacker has defeated the information security protections to gain access to the control system. In this paper, attacks on actuator signalsmore » are analyzed from a system theoretic context. The threat surface is classified into finite energy and bounded attacks. These two broad classes encompass a large range of potential attacks. The effect of theses attacks on a linear quadratic (LQ) control are analyzed, and the optimal actuator attacks for both finite and infinite horizon LQ control are derived, therefore the worst case attack signals are obtained. The closed-loop system under the optimal attack signals is given and a numerical example illustrating the effect of an optimal bounded attack is provided.« less

  1. Web Forms and Untraceable DDoS Attacks

    NASA Astrophysics Data System (ADS)

    Jakobsson, Markus; Menczer, Filippo

    We analyze a Web vulnerability that allows an attacker to perform an email-based attack on selected victims, using standard scripts and agents. What differentiates the attack we describe from other, already known forms of distributed denial of service (DDoS) attacks is that an attacker does not need to infiltrate the network in any manner - as is normally required to launch a DDoS attack. Thus, we see this type of attack as a poor man's DDoS. Not only is the attack easy to mount, but it is also almost impossible to trace back to the perpetrator. Along with descriptions of our attack, we demonstrate its destructive potential with (limited and contained) experimental results. We illustrate the potential impact of our attack by describing how an attacker can disable an email account by flooding its inbox; block competition during on-line auctions; harm competitors with an on-line presence; disrupt phone service to a given victim; disconnect mobile corporate leaders from their networks; and disrupt electronic elections. Finally, we propose a set of countermeasures that are light-weight, do not require modifications to the infrastructure, and can be deployed in a gradual manner.

  2. Tanacetum parthenium and Salix alba (Mig-RL) combination in migraine prophylaxis: a prospective, open-label study.

    PubMed

    Shrivastava, R; Pechadre, J C; John, G W

    2006-01-01

    Tanacetum parthenium (feverfew) has been used traditionally to treat migraine, and although its mechanism of action is not fully understood, serotonin 5-HT receptor blocking effects have been suggested. T. parthenium and Salix alba (white willow) either alone or in combination (Mig-RL) were recently shown to inhibit binding to 5-HT(2A/2C) receptors; T. parthenium failed to recognise 5-HT(1D) receptors, whereas S. alba or the combination did. It was hypothesised that S. alba in combination with T. parthenium may provide superior migraine prophylactic activity compared with T. parthenium alone. A prospective, open-label study was performed in 12 patients diagnosed with migraine without aura. Twelve weeks' treatment with T. parthenium 300 mg plus S. alba 300 mg (Mig-RL) twice daily was administered to determine the effects of therapy on migraine attack frequency (primary efficacy criterion), intensity and duration (secondary efficacy criteria), and quality of life, together with tolerability for patients. Attack frequency was reduced by 57.2% at 6 weeks (p < 0.029) and by 61.7% at 12 weeks (p < 0.025) in nine of ten patients, with 70% patients having a reduction of at least 50%. Attack intensity was reduced by 38.7% at 6 weeks (p < 0.005) and by 62.6% at 12 weeks (p < 0.004) in ten of ten patients, with 70% of patients having a reduction of at least 50%. Attack duration decreased by 67.2% at 6 weeks (p < 0.001) and by 76.2% at 12 weeks (p < 0.001) in ten of ten patients. Two patients were excluded for reasons unrelated to treatment. Self-assessed general health, physical performance, memory and anxiety also improved by the end of the study. Mig-RL treatment was well tolerated and no adverse events occurred. The remarkable efficacy of Mig-RL in not only reducing the frequency of migraine attacks but also their pain intensity and duration in this trial warrants further investigation of this therapy in a double-blind, randomised, placebo-controlled investigation involving a larger patient population.

  3. Replacement Attack: A New Zero Text Watermarking Attack

    NASA Astrophysics Data System (ADS)

    Bashardoost, Morteza; Mohd Rahim, Mohd Shafry; Saba, Tanzila; Rehman, Amjad

    2017-03-01

    The main objective of zero watermarking methods that are suggested for the authentication of textual properties is to increase the fragility of produced watermarks against tampering attacks. On the other hand, zero watermarking attacks intend to alter the contents of document without changing the watermark. In this paper, the Replacement attack is proposed, which focuses on maintaining the location of the words in the document. The proposed text watermarking attack is specifically effective on watermarking approaches that exploit words' transition in the document. The evaluation outcomes prove that tested word-based method are unable to detect the existence of replacement attack in the document. Moreover, the comparison results show that the size of Replacement attack is estimated less accurate than other common types of zero text watermarking attacks.

  4. Design and Analysis of an Enhanced Patient-Server Mutual Authentication Protocol for Telecare Medical Information System.

    PubMed

    Amin, Ruhul; Islam, S K Hafizul; Biswas, G P; Khan, Muhammad Khurram; Obaidat, Mohammad S

    2015-11-01

    In order to access remote medical server, generally the patients utilize smart card to login to the server. It has been observed that most of the user (patient) authentication protocols suffer from smart card stolen attack that means the attacker can mount several common attacks after extracting smart card information. Recently, Lu et al.'s proposes a session key agreement protocol between the patient and remote medical server and claims that the same protocol is secure against relevant security attacks. However, this paper presents several security attacks on Lu et al.'s protocol such as identity trace attack, new smart card issue attack, patient impersonation attack and medical server impersonation attack. In order to fix the mentioned security pitfalls including smart card stolen attack, this paper proposes an efficient remote mutual authentication protocol using smart card. We have then simulated the proposed protocol using widely-accepted AVISPA simulation tool whose results make certain that the same protocol is secure against active and passive attacks including replay and man-in-the-middle attacks. Moreover, the rigorous security analysis proves that the proposed protocol provides strong security protection on the relevant security attacks including smart card stolen attack. We compare the proposed scheme with several related schemes in terms of computation cost and communication cost as well as security functionalities. It has been observed that the proposed scheme is comparatively better than related existing schemes.

  5. Simulation of Attacks for Security in Wireless Sensor Network.

    PubMed

    Diaz, Alvaro; Sanchez, Pablo

    2016-11-18

    The increasing complexity and low-power constraints of current Wireless Sensor Networks (WSN) require efficient methodologies for network simulation and embedded software performance analysis of nodes. In addition, security is also a very important feature that has to be addressed in most WSNs, since they may work with sensitive data and operate in hostile unattended environments. In this paper, a methodology for security analysis of Wireless Sensor Networks is presented. The methodology allows designing attack-aware embedded software/firmware or attack countermeasures to provide security in WSNs. The proposed methodology includes attacker modeling and attack simulation with performance analysis (node's software execution time and power consumption estimation). After an analysis of different WSN attack types, an attacker model is proposed. This model defines three different types of attackers that can emulate most WSN attacks. In addition, this paper presents a virtual platform that is able to model the node hardware, embedded software and basic wireless channel features. This virtual simulation analyzes the embedded software behavior and node power consumption while it takes into account the network deployment and topology. Additionally, this simulator integrates the previously mentioned attacker model. Thus, the impact of attacks on power consumption and software behavior/execution-time can be analyzed. This provides developers with essential information about the effects that one or multiple attacks could have on the network, helping them to develop more secure WSN systems. This WSN attack simulator is an essential element of the attack-aware embedded software development methodology that is also introduced in this work.

  6. Examination of Various Methods Used in Support of Concurrent Engineering

    DTIC Science & Technology

    1990-03-01

    1989. F.Y.I. Drawing a2Ther Productivity. Industrial Engineering 21: 80. Ishi82 Ishikawa , Kaoru . 1982. Guide to Quality Control. White Plains, NY: Kraus...observe it in practice have an easier time identifying the different methods or tech- niques (such as the Ishikawa tools) used than understanding the...simple histogram to show what prob- lems should be attacked first. Cause and Effect Diagrams Sometimes called the fishbone or Ishikawa diagrams-a kind

  7. A New Therapeutic Paradigm for Breast Cancer Exploiting Low Dose Estrogen-Induced Apoptosis

    DTIC Science & Technology

    2014-08-01

    incidences of stroke, pulmonary embolism , colorectal cancer, hip fractures , and death from other causes. After a mean follow-up of 6.8 years, no signifi- cant... embolism , DVT, transient ischemic attack, osteoporotic fracture , cataracts, death, and quality of life. The data was reported at a median follow-up time...injected into the axillary mammary fat pads of ovariectomized athymic mice. The mice were then divided into 4 groups and treated as follows: placebo

  8. A New Therapeutic Paradigm for Breast Cancer Exploiting Low Dose Estrogen-Induce Apoptosis

    DTIC Science & Technology

    2008-09-01

    pulmonary embolism , DVT, transient ischemic attack, osteoporotic fractures , cataracts, death and quality of life (Vogel, Costantino et al. 2006...transplanting 1 mm3 tumor pieces (from other tumor bearing animals) into recipient mouse axillary mammary fat pads. This procedure was also used to...per site into the axillary mammary fat pads to generate tumors. In culture, MCF-7/RAL2 were maintained in phenol red-free MEM supplemented with 1 µM

  9. Forensic DNA testing.

    PubMed

    Butler, John M

    2011-12-01

    Forensic DNA testing has a number of applications, including parentage testing, identifying human remains from natural or man-made disasters or terrorist attacks, and solving crimes. This article provides background information followed by an overview of the process of forensic DNA testing, including sample collection, DNA extraction, PCR amplification, short tandem repeat (STR) allele separation and sizing, typing and profile interpretation, statistical analysis, and quality assurance. The article concludes with discussions of possible problems with the data and other forensic DNA testing techniques.

  10. Evaluation of popcorn germplasm for resistance to Sesamia nonagrioides attack.

    PubMed

    Butrón, A; Sandoya, G; Revilla, P; Ordás, A; Malvar, R A

    2005-10-01

    Popcorn adapted to Spanish conditions could be an interesting and profitable alternative to field corn. However, little is known about breeding popcorn germplasm for adaptation to Spain. Sesamia nonagrioides Lefèvbre is the main insect pest affecting popcorn quality and yield under Spanish growing conditions. The objectives of the study were the search for sources of resistance to S. nonagrioides among popcorn germplasm and to study the genetics of the resistance to S. nonagrioides attack. Eight breeding populations along with a five-inbred line diallel and two popcorn commercial checks were evaluated under S. nonagrioides infestation in 2 yr. Significant differences were found among general combining ability (GCA) effects for days to silking, S. nonagrioides tunnel length, general appearance of the ear, kernel moisture, and yield. Specific combining ability (SCA) effects were found to be significant for yield and ear damage. Therefore, heterotic patterns among popcorn materials should be taken into account to generate new popcorn hybrids that are not only more productive but also have higher kernel quality. Breeding popcorn populations BSP4APC0 and PSPW1C1 could be base germplasms in a breeding program for obtaining parental inbreds of healthy kernel popcorn hybrids. New inbred lines could be generated from the cross BP1 x BP2 that would have improved GCA and SCA effects for S. nonagrioides resistance when crossed to South American inbreds.

  11. An open-label, flexible dose adaptive study evaluating the efficacy of vortioxetine in subjects with panic disorder.

    PubMed

    Shah, Anish; Northcutt, Joanne

    2018-01-01

    Despite the current treatments available for panic disorder (PD), as many as one-third of patients have persistent and treatment-resistant panic attacks. Vortioxetine is an approved medicine for major depressive disorder and has been shown to have anxiolytic properties. The purpose of this study was to evaluate its efficacy and safety in an adult population with a diagnosis of PD. The study design was open label with flexible dose strategies (5, 10, or 20 mg) with a treatment period of 10 weeks. 27 male and female subjects aged between 18 and 60 years, who met DSM-IV criteria for PD with or without agoraphobia, or who had a Panic Disorder Severity Scale (PDSS) score > 8 at baseline were enrolled. Statistical significance was established by the Student's T test. A statistically significant decrease in the occurrence of panic attacks was measured with the PDSS with vortioxetine. In addition, a moderate improvement in the quality of life and no significant side effects were observed using the Quality-of-Life Scale and Monitoring of Side Effects Scale, respectively. These results provide some support for the use of vortioxetine in the management of panic disorder. Trial registration ClinicalTrials.gov ID#: NCT02395510. Registered March 23, 2015, https://clinicaltrials.gov/ct2/show/NCT02395510.

  12. Self-recovery reversible image watermarking algorithm

    PubMed Central

    Sun, He; Gao, Shangbing; Jin, Shenghua

    2018-01-01

    The integrity of image content is essential, although most watermarking algorithms can achieve image authentication but not automatically repair damaged areas or restore the original image. In this paper, a self-recovery reversible image watermarking algorithm is proposed to recover the tampered areas effectively. First of all, the original image is divided into homogeneous blocks and non-homogeneous blocks through multi-scale decomposition, and the feature information of each block is calculated as the recovery watermark. Then, the original image is divided into 4×4 non-overlapping blocks classified into smooth blocks and texture blocks according to image textures. Finally, the recovery watermark generated by homogeneous blocks and error-correcting codes is embedded into the corresponding smooth block by mapping; watermark information generated by non-homogeneous blocks and error-correcting codes is embedded into the corresponding non-embedded smooth block and the texture block via mapping. The correlation attack is detected by invariant moments when the watermarked image is attacked. To determine whether a sub-block has been tampered with, its feature is calculated and the recovery watermark is extracted from the corresponding block. If the image has been tampered with, it can be recovered. The experimental results show that the proposed algorithm can effectively recover the tampered areas with high accuracy and high quality. The algorithm is characterized by sound visual quality and excellent image restoration. PMID:29920528

  13. Heartburn or Chest Pain: When Is It Heart Attack?

    MedlinePlus

    Heartburn or heart attack: When to worry Severe heartburn and heart attack can be hard to tell apart. Understand how they typically ... flow to your heart (angina) or an actual heart attack. Heartburn, angina and heart attack may feel very ...

  14. Know the Warning Signs of a Heart Attack

    MedlinePlus

    ... No. 22 Know the Warning Signs of a Heart Attack What is a heart attack? Aheart attack happens when the blood vessels that ... hurting your heart muscle. Another name for a heart attack is myocardial infarction, or MI. If you have ...

  15. Percolation of localized attack on isolated and interdependent random networks

    NASA Astrophysics Data System (ADS)

    Shao, Shuai; Huang, Xuqing; Stanley, H. Eugene; Havlin, Shlomo

    2014-03-01

    Percolation properties of isolated and interdependent random networks have been investigated extensively. The focus of these studies has been on random attacks where each node in network is attacked with the same probability or targeted attack where each node is attacked with a probability being a function of its centrality, such as degree. Here we discuss a new type of realistic attacks which we call a localized attack where a group of neighboring nodes in the networks are attacked. We attack a randomly chosen node, its neighbors, and its neighbor of neighbors and so on, until removing a fraction (1 - p) of the network. This type of attack reflects damages due to localized disasters, such as earthquakes, floods and war zones in real-world networks. We study, both analytically and by simulations the impact of localized attack on percolation properties of random networks with arbitrary degree distributions and discuss in detail random regular (RR) networks, Erdős-Rényi (ER) networks and scale-free (SF) networks. We extend and generalize our theoretical and simulation results of single isolated networks to networks formed of interdependent networks.

  16. Stealthy false data injection attacks using matrix recovery and independent component analysis in smart grid

    NASA Astrophysics Data System (ADS)

    JiWei, Tian; BuHong, Wang; FuTe, Shang; Shuaiqi, Liu

    2017-05-01

    Exact state estimation is vital important to maintain common operations of smart grids. Existing researches demonstrate that state estimation output could be compromised by malicious attacks. However, to construct the attack vectors, a usual presumption in most works is that the attacker has perfect information regarding the topology and so on even such information is difficult to acquire in practice. Recent research shows that Independent Component Analysis (ICA) can be used for inferring topology information which can be used to originate undetectable attacks and even to alter the price of electricity for the profits of attackers. However, we found that the above ICA-based blind attack tactics is merely feasible in the environment with Gaussian noises. If there are outliers (device malfunction and communication errors), the Bad Data Detector will easily detect the attack. Hence, we propose a robust ICA based blind attack strategy that one can use matrix recovery to circumvent the outlier problem and construct stealthy attack vectors. The proposed attack strategies are tested with IEEE representative 14-bus system. Simulations verify the feasibility of the proposed method.

  17. Shilling Attacks Detection in Recommender Systems Based on Target Item Analysis

    PubMed Central

    Zhou, Wei; Wen, Junhao; Koh, Yun Sing; Xiong, Qingyu; Gao, Min; Dobbie, Gillian; Alam, Shafiq

    2015-01-01

    Recommender systems are highly vulnerable to shilling attacks, both by individuals and groups. Attackers who introduce biased ratings in order to affect recommendations, have been shown to negatively affect collaborative filtering (CF) algorithms. Previous research focuses only on the differences between genuine profiles and attack profiles, ignoring the group characteristics in attack profiles. In this paper, we study the use of statistical metrics to detect rating patterns of attackers and group characteristics in attack profiles. Another question is that most existing detecting methods are model specific. Two metrics, Rating Deviation from Mean Agreement (RDMA) and Degree of Similarity with Top Neighbors (DegSim), are used for analyzing rating patterns between malicious profiles and genuine profiles in attack models. Building upon this, we also propose and evaluate a detection structure called RD-TIA for detecting shilling attacks in recommender systems using a statistical approach. In order to detect more complicated attack models, we propose a novel metric called DegSim’ based on DegSim. The experimental results show that our detection model based on target item analysis is an effective approach for detecting shilling attacks. PMID:26222882

  18. TANDI: threat assessment of network data and information

    NASA Astrophysics Data System (ADS)

    Holsopple, Jared; Yang, Shanchieh Jay; Sudit, Moises

    2006-04-01

    Current practice for combating cyber attacks typically use Intrusion Detection Sensors (IDSs) to passively detect and block multi-stage attacks. This work leverages Level-2 fusion that correlates IDS alerts belonging to the same attacker, and proposes a threat assessment algorithm to predict potential future attacker actions. The algorithm, TANDI, reduces the problem complexity by separating the models of the attacker's capability and opportunity, and fuse the two to determine the attacker's intent. Unlike traditional Bayesian-based approaches, which require assigning a large number of edge probabilities, the proposed Level-3 fusion procedure uses only 4 parameters. TANDI has been implemented and tested with randomly created attack sequences. The results demonstrate that TANDI predicts future attack actions accurately as long as the attack is not part of a coordinated attack and contains no insider threats. In the presence of abnormal attack events, TANDI will alarm the network analyst for further analysis. The attempt to evaluate a threat assessment algorithm via simulation is the first in the literature, and shall open up a new avenue in the area of high level fusion.

  19. Identifying and tracking attacks on networks: C3I displays and related technologies

    NASA Astrophysics Data System (ADS)

    Manes, Gavin W.; Dawkins, J.; Shenoi, Sujeet; Hale, John C.

    2003-09-01

    Converged network security is extremely challenging for several reasons; expanded system and technology perimeters, unexpected feature interaction, and complex interfaces all conspire to provide hackers with greater opportunities for compromising large networks. Preventive security services and architectures are essential, but in and of themselves do not eliminate all threat of compromise. Attack management systems mitigate this residual risk by facilitating incident detection, analysis and response. There are a wealth of attack detection and response tools for IP networks, but a dearth of such tools for wireless and public telephone networks. Moreover, methodologies and formalisms have yet to be identified that can yield a common model for vulnerabilities and attacks in converged networks. A comprehensive attack management system must coordinate detection tools for converged networks, derive fully-integrated attack and network models, perform vulnerability and multi-stage attack analysis, support large-scale attack visualization, and orchestrate strategic responses to cyber attacks that cross network boundaries. We present an architecture that embodies these principles for attack management. The attack management system described engages a suite of detection tools for various networking domains, feeding real-time attack data to a comprehensive modeling, analysis and visualization subsystem. The resulting early warning system not only provides network administrators with a heads-up cockpit display of their entire network, it also supports guided response and predictive capabilities for multi-stage attacks in converged networks.

  20. Monitoring from source to tap: the new paradigm for ensuring water security and quality

    NASA Astrophysics Data System (ADS)

    Kroll, Dan

    2011-06-01

    The threat of terrorist action targeting water supplies is often overlooked for the more historically obvious threats of an air attack or a dirty bomb. Studies have shown that an attack on water is simple to orchestrate, inexpensive and can result in mass casualties. The twin motivators of the terrorist threat to water along with consumer demands for safe and potable supplies has lead to a sea change in the drinking water industry. From a historical perspective, most monitoring in the distribution system as well as source water has been relegated to the occasional snapshot provided by grab sampling for a few limited parameters or the infrequent regulatory testing required by mandates such as the Total Coliform Rule. New technologies are being deployed to ameliorate the threat from both intentional and accidental water contamination. The threat to water and these new technologies are described as well as needs and requirements for new sensors to improve the monitoring structure.

  1. Mudslide and/or animal attack are more plausible causes and circumstances of death for AL 288 ('Lucy'): A forensic anthropology analysis.

    PubMed

    Charlier, Phillippe; Coppens, Yves; Augias, Anaïs; Deo, Saudamini; Froesch, Philippe; Huynh-Charlier, Isabelle

    2018-01-01

    Following a global morphological and micro-CT scan examination of the original and cast of the skeleton of Australopithecus afarensis AL 288 ('Lucy'), Kappelman et al. have recently proposed a diagnosis of a fall from a significant height (a tree) as a cause of her death. According to topographical data from the discovery site, complete re-examination of a high-quality resin cast of the whole skeleton and forensic experience, we propose that the physical process of a vertical deceleration cannot be the only cause for her observed injuries. Two different factors were involved: rolling and multiple impacts in the context of a mudslide and an animal attack with bite marks, multi-focal fractures and violent movement of the body. It is important to consider a differential diagnosis of the observed fossil lesions because environmental factors should not be excluded in this ancient archaeological context as with any modern forensic anthropological case.

  2. Pre-attack signs and symptoms in cluster headache: Characteristics and time profile.

    PubMed

    Snoer, Agneta; Lund, Nunu; Beske, Rasmus; Jensen, Rigmor; Barloese, Mads

    2018-05-01

    Introduction In contrast to the premonitory phase of migraine, little is known about the pre-attack (prodromal) phase of a cluster headache. We aimed to describe the nature, prevalence, and duration of pre-attack symptoms in cluster headache. Methods Eighty patients with episodic cluster headache or chronic cluster headache, according to ICHD-3 beta criteria, were invited to participate. In this observational study, patients underwent a semi-structured interview where they were asked about the presence of 31 symptoms/signs in relation to a typical cluster headache attack. Symptoms included previously reported cluster headache pre-attack symptoms, premonitory migraine symptoms and accompanying symptoms of migraine and cluster headache. Results Pre-attack symptoms were reported by 83.3% of patients, with an average of 4.25 (SD 3.9) per patient. Local and painful symptoms, occurring with a median of 10 minutes before attack, were reported by 70%. Local and painless symptoms and signs, occurring with a median of 10 minutes before attack, were reported by 43.8% and general symptoms, occurring with a median of 20 minutes before attack, were reported by 62.5% of patients. Apart from a dull/aching sensation in the attack area being significantly ( p < 0.05) more frequent among men and episodic patients, compared with women and chronic patients respectively, no other differences in the prevalence of pre-attack symptoms were identified between groups. Conclusion Pre-attack symptoms are frequent in cluster headache. Since the origin of cluster headache attacks is still unresolved, studies of pre-attack symptoms could contribute to the understanding of cluster headache pathophysiology. Furthermore, identification and recognition of pre-attack symptoms could potentially allow earlier abortive treatment.

  3. Shark attack-related injuries: Epidemiology and implications for plastic surgeons.

    PubMed

    Ricci, Joseph A; Vargas, Christina R; Singhal, Dhruv; Lee, Bernard T

    2016-01-01

    The increased media attention to shark attacks has led to a heightened fear and public awareness. Although few sharks are considered dangerous, attacks on humans can result in large soft tissue defects necessitating the intervention of reconstructive surgeons. This study aims to evaluate and describe the characteristics of shark-related injuries in order to improve treatment. The Global Shark Accident File, maintained by the Shark Research Institute (Princeton, NJ, USA), is a compilation of all known worldwide shark attacks. Database records since the 1900s were reviewed to identify differences between fatal and nonfatal attacks, including: geography, injury pattern, shark species, and victim activity. Since the 1900s, there have been 5034 reported shark attacks, of which 1205 (22.7%) were fatal. Although the incidence of attacks per decade has increased, the percentage of fatalities has decreased. Characteristics of fatal attacks included swimming (p = 0.001), boating (p = 0.001), three or more bite sites (p = 0.03), limb loss (p = 0.001), or tiger shark attack (p = 0.002). The most common attacks were bites to the legs (41.8%) or arms (18.4%), with limb loss occurring in 7% of attacks. Geographically, the majority of attacks occurred in North America (36.7%) and Australia (26.5%). Most attacks in the USA occurred in Florida (49.1%) and California (13.6%). Although rare, shark attacks result in devastating injuries to patients. As these injuries often involve multiple sites and limb loss, this creates a significant challenge for reconstructive surgeons. Proper identification of the characteristics of the attack can aid in providing optimal care for those affected. Copyright © 2015 British Association of Plastic, Reconstructive and Aesthetic Surgeons. Published by Elsevier Ltd. All rights reserved.

  4. Hereditary Angioedema Attacks Resolve Faster and Are Shorter after Early Icatibant Treatment

    PubMed Central

    Maurer, Marcus; Kaplan, Allen; Investigators, on behalf of I. O. S.

    2013-01-01

    Background Attacks of hereditary angioedema (HAE) are unpredictable and, if affecting the upper airway, can be lethal. Icatibant is used for physician- or patient self-administered symptomatic treatment of HAE attacks in adults. Its mode of action includes disruption of the bradykinin pathway via blockade of the bradykinin B2 receptor. Early treatment is believed to shorten attack duration and prevent severe outcomes; however, evidence to support these benefits is lacking. Objective To examine the impact of timing of icatibant administration on the duration and resolution of HAE type I and II attacks. Methods The Icatibant Outcome Survey is an international, prospective, observational study for patients treated with icatibant. Data on timings and outcomes of icatibant treatment for HAE attacks were collected between July 2009–February 2012. A mixed-model of repeated measures was performed for 426 attacks in 136 HAE type I and II patients. Results Attack duration was significantly shorter in patients treated <1 hour of attack onset compared with those treated ≥1 hour (6.1 hours versus 16.8 hours [p<0.001]). Similar significant effects were observed for <2 hours versus ≥2 hours (7.2 hours versus 20.2 hours [p<0.001]) and <5 hours versus ≥5 hours (8.0 hours versus 23.5 hours [p<0.001]). Treatment within 1 hour of attack onset also significantly reduced time to attack resolution (5.8 hours versus 8.8 hours [p<0.05]). Self-administrators were more likely to treat early and experience shorter attacks than those treated by a healthcare professional. Conclusion Early blockade of the bradykinin B2 receptor with icatibant, particularly within the first hour of attack onset, significantly reduced attack duration and time to attack resolution. PMID:23390491

  5. Adaptive optimisation-offline cyber attack on remote state estimator

    NASA Astrophysics Data System (ADS)

    Huang, Xin; Dong, Jiuxiang

    2017-10-01

    Security issues of cyber-physical systems have received increasing attentions in recent years. In this paper, deception attacks on the remote state estimator equipped with the chi-squared failure detector are considered, and it is assumed that the attacker can monitor and modify all the sensor data. A novel adaptive optimisation-offline cyber attack strategy is proposed, where using the current and previous sensor data, the attack can yield the largest estimation error covariance while ensuring to be undetected by the chi-squared monitor. From the attacker's perspective, the attack is better than the existing linear deception attacks to degrade the system performance. Finally, some numerical examples are provided to demonstrate theoretical results.

  6. Public knowledge of heart attack symptoms in Beijing residents.

    PubMed

    Zhang, Qing-Tan; Hu, Da-Yi; Yang, Jin-Gang; Zhang, Shou-Yan; Zhang, Xin-Quan; Liu, Shu-Shan

    2007-09-20

    Definitive treatment for heart attack is early reperfusion with either angioplasty or thrombolytic therapy, and the benefit is strictly time-dependent. Patient outcomes are improved with either therapy when initiated as soon as possible. Recognition of heart attack symptoms is logically tied to taking action to receive prompt emergency care. Inadequate knowledge of heart attack symptoms may prolong delay. The purpose of this study was to document knowledge about heart attack symptoms in Beijing residents and to identify the characteristics associated with increased knowledge of heart attack. A structured survey was conducted in 18 communities in Beijing from March 1 through June 10 in 2006. Addresses and participants were selected randomly following a stratification. The survey was designed to collect knowledge of heart attack symptoms from sampled adults in each community. A total of 4627 respondents completed the questionnaires correctly, and 50.29% of them were female. Totally 64.15% of the respondents reported chest pain or discomfort (common symptoms) as a symptom of heart attack; 75.38% reported at least one of the following eight symptoms as a symptom of heart attack: back pain, shortness of breath, arm pain or numbness, nausea or vomiting, neck, jaw or shoulder pain, epigastric pain, sweating, weakness (less common symptoms); 20.36% correctly reported four or more heart attack symptoms, only 7.4% knew all the correct heart attack symptoms, and 28.94% knew about reperfusion therapy for heart attack; 31.7% reported to call 120 or 999 while having a heart attack themselves; however 89.6% reported to call 120 or 999 when someone else is suffering from a heart attack. Very old persons and those with health insurance coverage, high education level, high household income, longer living in Beijing and previous experience with heart disease had greater knowledge of heart attack symptoms. Public knowledge of common heart attack symptoms as well as less common heart attack symptoms is deficient in Beijing residents. But their knowledge of calling emergency medical services when someone is having a heart attack is relatively adequate. Public health efforts are needed to increase the recognition of the major heart attack symptoms in both the general public and groups at high risk for an acute cardiac event, especially in socioeconomically disadvantaged subgroups, including persons with low education level, low household income, and no health insurance coverage.

  7. Application distribution model and related security attacks in VANET

    NASA Astrophysics Data System (ADS)

    Nikaein, Navid; Kanti Datta, Soumya; Marecar, Irshad; Bonnet, Christian

    2013-03-01

    In this paper, we present a model for application distribution and related security attacks in dense vehicular ad hoc networks (VANET) and sparse VANET which forms a delay tolerant network (DTN). We study the vulnerabilities of VANET to evaluate the attack scenarios and introduce a new attacker`s model as an extension to the work done in [6]. Then a VANET model has been proposed that supports the application distribution through proxy app stores on top of mobile platforms installed in vehicles. The steps of application distribution have been studied in detail. We have identified key attacks (e.g. malware, spamming and phishing, software attack and threat to location privacy) for dense VANET and two attack scenarios for sparse VANET. It has been shown that attacks can be launched by distributing malicious applications and injecting malicious codes to On Board Unit (OBU) by exploiting OBU software security holes. Consequences of such security attacks have been described. Finally, countermeasures including the concepts of sandbox have also been presented in depth.

  8. An Approach for Assessing Consequences of Potential Supply Chain and Insider Contributed Cyber Attacks on Nuclear Power Plants

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chu, Tsong L.

    The Stuxnet attack at the Natanz facility is an example of a targeted and successful cyber attack on a nuclear facility. Snowden's release of National Security Agency documents demonstrated the consequences of the insider threat. More recently, the United States tried to attack North Korea but failed, South Korea was attempting to attack North Korea, and both applied Stuxnet-like approaches. These sophisticated targeted attacks differ from web-site hacking events that are reported almost daily in the news mainly because targeted attacks require detailed design and operation information of the systems attacked and/or are often carried out by insiders. For instance,more » in order to minimize disruption of facilities around the world, Stuxnet remained idle until it recognized the specific configuration of the Natanz facility, demonstrating that the attackers possessed extremely detailed information about the facility. Such targeted cyber attacks could become a national-level military weapon and be used in coercion of hostile countries.« less

  9. Improving the Rainbow Attack by Reusing Colours

    NASA Astrophysics Data System (ADS)

    Ågren, Martin; Johansson, Thomas; Hell, Martin

    Hashing or encrypting a key or a password is a vital part in most network security protocols. The most practical generic attack on such schemes is a time memory trade-off attack. Such an attack inverts any one-way function using a trade-off between memory and execution time. Existing techniques include the Hellman attack and the rainbow attack, where the latter uses different reduction functions ("colours") within a table.

  10. Simulation of Attacks for Security in Wireless Sensor Network

    PubMed Central

    Diaz, Alvaro; Sanchez, Pablo

    2016-01-01

    The increasing complexity and low-power constraints of current Wireless Sensor Networks (WSN) require efficient methodologies for network simulation and embedded software performance analysis of nodes. In addition, security is also a very important feature that has to be addressed in most WSNs, since they may work with sensitive data and operate in hostile unattended environments. In this paper, a methodology for security analysis of Wireless Sensor Networks is presented. The methodology allows designing attack-aware embedded software/firmware or attack countermeasures to provide security in WSNs. The proposed methodology includes attacker modeling and attack simulation with performance analysis (node’s software execution time and power consumption estimation). After an analysis of different WSN attack types, an attacker model is proposed. This model defines three different types of attackers that can emulate most WSN attacks. In addition, this paper presents a virtual platform that is able to model the node hardware, embedded software and basic wireless channel features. This virtual simulation analyzes the embedded software behavior and node power consumption while it takes into account the network deployment and topology. Additionally, this simulator integrates the previously mentioned attacker model. Thus, the impact of attacks on power consumption and software behavior/execution-time can be analyzed. This provides developers with essential information about the effects that one or multiple attacks could have on the network, helping them to develop more secure WSN systems. This WSN attack simulator is an essential element of the attack-aware embedded software development methodology that is also introduced in this work. PMID:27869710

  11. An intermediate significant bit (ISB) watermarking technique using neural networks.

    PubMed

    Zeki, Akram; Abubakar, Adamu; Chiroma, Haruna

    2016-01-01

    Prior research studies have shown that the peak signal to noise ratio (PSNR) is the most frequent watermarked image quality metric that is used for determining the levels of strength and weakness of watermarking algorithms. Conversely, normalised cross correlation (NCC) is the most common metric used after attacks were applied to a watermarked image to verify the strength of the algorithm used. Many researchers have used these approaches to evaluate their algorithms. These strategies have been used for a long time, however, which unfortunately limits the value of PSNR and NCC in reflecting the strength and weakness of the watermarking algorithms. This paper considers this issue to determine the threshold values of these two parameters in reflecting the amount of strength and weakness of the watermarking algorithms. We used our novel watermarking technique for embedding four watermarks in intermediate significant bits (ISB) of six image files one-by-one through replacing the image pixels with new pixels and, at the same time, keeping the new pixels very close to the original pixels. This approach gains an improved robustness based on the PSNR and NCC values that were gathered. A neural network model was built that uses the image quality metrics (PSNR and NCC) values obtained from the watermarking of six grey-scale images that use ISB as the desired output and that are trained for each watermarked image's PSNR and NCC. The neural network predicts the watermarked image's PSNR together with NCC after the attacks when a portion of the output of the same or different types of image quality metrics (PSNR and NCC) are obtained. The results indicate that the NCC metric fluctuates before the PSNR values deteriorate.

  12. Sleep quality and arousal in migraine and tension-type headache: the headache-sleep study.

    PubMed

    Engstrøm, M; Hagen, K; Bjørk, M H; Stovner, L J; Sand, T

    2014-01-01

    The present paper summarizes and compares data from our studies on subjective and objective sleep quality and pain thresholds in tension-type headache (TTH), migraine, and controls. In a blinded controlled explorative study, we recorded polysomnography (PSG) and pressure, heat, and cold pain thresholds in 34 controls, 20 TTH, and 53 migraine patients. Sleep quality was assessed by questionnaires, sleep diaries, and PSG. Migraineurs who had their recordings more than 2 days from an attack were classified as interictal while the rest were classified as either preictal or postictal. Interictal migraineurs (n=33) were also divided into two groups if their headache onsets mainly were during sleep and awakening (sleep migraine, SM), or during daytime and no regular onset pattern (non-sleep migraine, NSM). TTH patients were divided into a chronic or episodic group according to headache days per month. Compared to controls, all headache groups reported more anxiety and sleep-related symptoms. TTH and NSM patients reported more daytime tiredness and tended to have lower pain thresholds. Despite normal sleep times in diary, TTH and NSM had increased slow-wave sleep as seen after sleep deprivation. Migraineurs in the preictal phase had shorter latency to sleep onset than controls. Except for a slight but significantly increased awakening index SM, patients differed little from controls in objective measurements. We hypothesize that TTH and NSM patients on the average need more sleep than healthy controls. SM patients seem more susceptible to sleep disturbances. Inadequate rest might be an attack-precipitating- and hyperalgesia-inducing factor. © 2014 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.

  13. Analytical Characterization of Internet Security Attacks

    ERIC Educational Resources Information Center

    Sellke, Sarah H.

    2010-01-01

    Internet security attacks have drawn significant attention due to their enormously adverse impact. These attacks includes Malware (Viruses, Worms, Trojan Horse), Denial of Service, Packet Sniffer, and Password Attacks. There is an increasing need to provide adequate defense mechanisms against these attacks. My thesis proposal deals with analytical…

  14. The anatomy of a shark attack: a case report and review of the literature.

    PubMed

    Caldicott, D G; Mahajani, R; Kuhn, M

    2001-07-01

    Shark attacks are rare but are associated with a high morbidity and significant mortality. We report the case of a patient's survival from a shark attack and their subsequent emergency medical and surgical management. Using data from the International Shark Attack File, we review the worldwide distribution and incidence of shark attack. A review of the world literature examines the features which make shark attacks unique pathological processes. We offer suggestions for strategies of management of shark attack, and techniques for avoiding adverse outcomes in human encounters with these endangered creatures.

  15. Distinguishing attack and second-preimage attack on encrypted message authentication codes (EMAC)

    NASA Astrophysics Data System (ADS)

    Ariwibowo, Sigit; Windarta, Susila

    2016-02-01

    In this paper we show that distinguisher on CBC-MAC can be applied to Encrypted Message Authentication Code (EMAC) scheme. EMAC scheme in general is vulnerable to distinguishing attack and second preimage attack. Distinguishing attack simulation on AES-EMAC using 225 message modifications, no collision have been found. According to second preimage attack simulation on AES-EMAC no collision found between EMAC value of S1 and S2, i.e. no second preimage found for messages that have been tested. Based on distinguishing attack simulation on truncated AES-EMAC we found collision in every message therefore we cannot distinguish truncated AES-EMAC with random function. Second-preimage attack is successfully performed on truncated AES-EMAC.

  16. Novel Method For Low-Rate Ddos Attack Detection

    NASA Astrophysics Data System (ADS)

    Chistokhodova, A. A.; Sidorov, I. D.

    2018-05-01

    The relevance of the work is associated with an increasing number of advanced types of DDoS attacks, in particular, low-rate HTTP-flood. Last year, the power and complexity of such attacks increased significantly. The article is devoted to the analysis of DDoS attacks detecting methods and their modifications with the purpose of increasing the accuracy of DDoS attack detection. The article details low-rate attacks features in comparison with conventional DDoS attacks. During the analysis, significant shortcomings of the available method for detecting low-rate DDoS attacks were found. Thus, the result of the study is an informal description of a new method for detecting low-rate denial-of-service attacks. The architecture of the stand for approbation of the method is developed. At the current stage of the study, it is possible to improve the efficiency of an already existing method by using a classifier with memory, as well as additional information.

  17. Heavy-tailed distribution of the SSH Brute-force attack duration in a multi-user environment

    NASA Astrophysics Data System (ADS)

    Lee, Jae-Kook; Kim, Sung-Jun; Park, Chan Yeol; Hong, Taeyoung; Chae, Huiseung

    2016-07-01

    Quite a number of cyber-attacks to be place against supercomputers that provide highperformance computing (HPC) services to public researcher. Particularly, although the secure shell protocol (SSH) brute-force attack is one of the traditional attack methods, it is still being used. Because stealth attacks that feign regular access may occur, they are even harder to detect. In this paper, we introduce methods to detect SSH brute-force attacks by analyzing the server's unsuccessful access logs and the firewall's drop events in a multi-user environment. Then, we analyze the durations of the SSH brute-force attacks that are detected by applying these methods. The results of an analysis of about 10 thousands attack source IP addresses show that the behaviors of abnormal users using SSH brute-force attacks are based on human dynamic characteristics of a typical heavy-tailed distribution.

  18. An entangling-probe attack on Shor's algorithm for factorization

    NASA Astrophysics Data System (ADS)

    Azuma, Hiroo

    2018-02-01

    We investigate how to attack Shor's quantum algorithm for factorization with an entangling probe. We show that an attacker can steal an exact solution of Shor's algorithm outside an institute where the quantum computer is installed if he replaces its initialized quantum register with entangled qubits, namely the entangling probe. He can apply arbitrary local operations to his own probe. Moreover, we assume that there is an unauthorized person who helps the attacker to commit a crime inside the institute. He tells garbage data obtained from measurements of the quantum register to the attacker secretly behind a legitimate user's back. If the attacker succeeds in cracking Shor's algorithm, the legitimate user obtains a random answer and does not notice the attacker's illegal acts. We discuss how to detect the attacker. Finally, we estimate a probability that the quantum algorithm inevitably makes an error, of which the attacker can take advantage.

  19. Use of the Panic Attack Questionnaire-IV to assess non-clinical panic attacks and limited symptom panic attacks in student and community samples.

    PubMed

    Norton, Peter J; Zvolensky, Michael J; Bonn-Miller, Marcel O; Cox, Brian J; Norton, G Ron

    2008-10-01

    Since its development in the mid-1980s, the Panic Attack Questionnaire (PAQ) has been one of the more, if not the most, commonly used self-report tools for assessing panic attacks. The usage of the instrument, however, has come amid potential concerns that instructions and descriptions may lead to an over-estimate of the prevalence of panic attacks. Furthermore, the instrument has not been revised since 1992, despite changes in DSM-IV criteria and more recent developments in the understanding of panic attacks. As a result, this paper describes a revision of the PAQ to improve the instruction and descriptive set, and to fully assess features of panic derived from recent conceptualizations. Students meeting DSM-IV panic attack criteria and those endorsing panic attacks, but not meeting criteria, showed few differences with the exception that those not meeting DSM-IV criteria typically reported a longer onset-to-peak intensity time than did Panickers. Results were cross-validated and extended using an independent Community Sample. A full descriptive phenomenology of panic attacks is described, and future directions for studying panic attacks using the PAQ are presented.

  20. Command Disaggregation Attack and Mitigation in Industrial Internet of Things

    PubMed Central

    Zhu, Pei-Dong; Hu, Yi-Fan; Cui, Peng-Shuai; Zhang, Yan

    2017-01-01

    A cyber-physical attack in the industrial Internet of Things can cause severe damage to physical system. In this paper, we focus on the command disaggregation attack, wherein attackers modify disaggregated commands by intruding command aggregators like programmable logic controllers, and then maliciously manipulate the physical process. It is necessary to investigate these attacks, analyze their impact on the physical process, and seek effective detection mechanisms. We depict two different types of command disaggregation attack modes: (1) the command sequence is disordered and (2) disaggregated sub-commands are allocated to wrong actuators. We describe three attack models to implement these modes with going undetected by existing detection methods. A novel and effective framework is provided to detect command disaggregation attacks. The framework utilizes the correlations among two-tier command sequences, including commands from the output of central controller and sub-commands from the input of actuators, to detect attacks before disruptions occur. We have designed components of the framework and explain how to mine and use these correlations to detect attacks. We present two case studies to validate different levels of impact from various attack models and the effectiveness of the detection framework. Finally, we discuss how to enhance the detection framework. PMID:29065461

  1. Command Disaggregation Attack and Mitigation in Industrial Internet of Things.

    PubMed

    Xun, Peng; Zhu, Pei-Dong; Hu, Yi-Fan; Cui, Peng-Shuai; Zhang, Yan

    2017-10-21

    A cyber-physical attack in the industrial Internet of Things can cause severe damage to physical system. In this paper, we focus on the command disaggregation attack, wherein attackers modify disaggregated commands by intruding command aggregators like programmable logic controllers, and then maliciously manipulate the physical process. It is necessary to investigate these attacks, analyze their impact on the physical process, and seek effective detection mechanisms. We depict two different types of command disaggregation attack modes: (1) the command sequence is disordered and (2) disaggregated sub-commands are allocated to wrong actuators. We describe three attack models to implement these modes with going undetected by existing detection methods. A novel and effective framework is provided to detect command disaggregation attacks. The framework utilizes the correlations among two-tier command sequences, including commands from the output of central controller and sub-commands from the input of actuators, to detect attacks before disruptions occur. We have designed components of the framework and explain how to mine and use these correlations to detect attacks. We present two case studies to validate different levels of impact from various attack models and the effectiveness of the detection framework. Finally, we discuss how to enhance the detection framework.

  2. Lethality of sea lamprey attacks on lake trout in relation to location on the body surface

    USGS Publications Warehouse

    Bergstedt, Roger A.; Schneider, Clifford P.; O'Gorman, Robert

    2001-01-01

    We compared the locations of healed attack marks of the sea lamprey Petromyzon marinus on live lake trout Salvelinus namaycush with those of unhealed attack marks on dead lake trout to determine if the lethality of a sea lamprey attack was related to attack location. Lake trout were collected from Lake Ontario, live fish with gill nets in September 1985 and dead fish with trawls in October 1983−1986. Attack location was characterized by the percent distances from snout to tail and from the ventral to the dorsal midline. Kolmogorov−Smirnov two-sample tests did not detect significant differences in the distribution of attack location along either the anteroposterior axis or the dorsoventral axis. When attack locations were grouped into six anatomical regions historically used to record sea lamprey attacks, dead fish did not exhibit a significantly higher proportion of attacks in the more anterior regions. Even if the differences in attack location on live and dead fish were significant, they were too small to imply substantial spatial differences in attack lethality that should be accounted for when modeling the effects of sea lampreys feeding on lake trout. We suggest that the tendency for sea lamprey attacks to occur on the anterior half of the fish is related to the lower amplitude of lateral body movement there during swimming and thus the lower likelihood of being dislodged.

  3. Serial agonistic attacks by greylag goose families, Anser anser, against the same opponent

    PubMed Central

    Scheiber, Isabella B.R.; Kotrschal, Kurt; Weiß, Brigitte M.

    2011-01-01

    It is known from primates that alliance partners may support each other’s interests in competition with others, for example, through repeated agonistic attacks against a particular individual. We examined serial aggressive interactions between greylag goose families and other flock members. We found that repeated attacks towards the same individual were common and that up to five serial attacks by family members followed an initial attack. Family size did not affect the frequency of such serial attacks. Juvenile geese evidently benefited most from active social support through serial attacks. About 60% of the juveniles’ lost primary interactions were subsequently reversed by another family member. This may be one of the reasons why juveniles rank higher in the social hierarchy than would be expected from their age and size alone. Losses in serial attacks predominantly occurred against other, presumably higher-ranking, family geese and ganders. We propose three major functions/consequences of serial attacks. Analogous to primates, serial attacks in greylag geese may serve to reinforce a losing experience of an opponent defeated in a preceding attack. On the side of the winning family, serial attacks may reinforce the experience of winning. Both winning and losing experiences are linked with physiological consequences in higher vertebrates, affecting the future social performance of winners or losers. Finally, serial attacks may signal the agonistic potential of a family to other flock members. This is supported by heart rate data, which indicate that greylags are competent to interpret third-party relationships. PMID:21984838

  4. Khyâl attacks: a key idiom of distress among traumatized cambodia refugees.

    PubMed

    Hinton, Devon E; Pich, Vuth; Marques, Luana; Nickerson, Angela; Pollack, Mark H

    2010-06-01

    Traumatized Cambodian refugees with PTSD often complain of khyâl attacks. The current study investigates khyâl attacks from multiple perspectives and examines the validity of a model of how khyâl attacks are generated. The study found that khyâl attacks had commonly been experienced in the previous 4 weeks and that their severity was strongly correlated with the severity of PTSD (PTSD Checklist). It was found that khyâl attacks were triggered by various processes--such as worry, trauma recall, standing up, going to a mall--and that khyâl attacks almost always met panic attack criteria. It was also found that during a khyâl attack there was great fear that death might occur from bodily dysfunction. It was likewise found that a complex nosology of khyâl attacks exists that rates the attacks on a scale of severity, that the severity determines how the khyâl attacks should be treated and that those treatments are often complex. As illustrated by the article, khyâl attacks constitute a key aspect of trauma ontology in this group, a culturally specific experiencing of anxiety and trauma-related disorder. The article also contributes to the study of trauma somatics, that is, to the study of how trauma results in specific symptoms in a specific cultural context, showing that a key part of the trauma-somatic reticulum is often a cultural syndrome.

  5. Cyber attacks against state estimation in power systems: Vulnerability analysis and protection strategies

    NASA Astrophysics Data System (ADS)

    Liu, Xuan

    Power grid is one of the most critical infrastructures in a nation and could suffer a variety of cyber attacks. With the development of Smart Grid, false data injection attack has recently attracted wide research interest. This thesis proposes a false data attack model with incomplete network information and develops optimal attack strategies for attacking load measurements and the real-time topology of a power grid. The impacts of false data on the economic and reliable operations of power systems are quantitatively analyzed in this thesis. To mitigate the risk of cyber attacks, a distributed protection strategies are also developed. It has been shown that an attacker can design false data to avoid being detected by the control center if the network information of a power grid is known to the attacker. In practice, however, it is very hard or even impossible for an attacker to obtain all network information of a power grid. In this thesis, we propose a local load redistribution attacking model based on incomplete network information and show that an attacker only needs to obtain the network information of the local attacking region to inject false data into smart meters in the local region without being detected by the state estimator. A heuristic algorithm is developed to determine a feasible attacking region by obtaining reduced network information. This thesis investigates the impacts of false data on the operations of power systems. It has been shown that false data can be designed by an attacker to: 1) mask the real-time topology of a power grid; 2) overload a transmission line; 3) disturb the line outage detection based on PMU data. To mitigate the risk of cyber attacks, this thesis proposes a new protection strategy, which intends to mitigate the damage effects of false data injection attacks by protecting a small set of critical measurements. To further reduce the computation complexity, a mixed integer linear programming approach is also proposed to separate the power grid into several subnetworks, then distributed protection strategy is applied to each subnetwork.

  6. Public knowledge of heart attack in a Nepalese population survey.

    PubMed

    Limbu, Yuba R; Malla, Rabi; Regmi, Shyam R; Dahal, Ramesh; Nakarmi, Hari L; Yonzan, Ganesh; Gartaula, Ritu P

    2006-01-01

    Limited knowledge of heart attack symptoms may prevent patients from seeking time-dependent thrombolytic therapy, an intervention that offers impressive survival benefit. Previous studies carried out in developed countries demonstrated a deficit of knowledge about a wide range of heart attack symptoms. The aim of this study was to describe knowledge of heart attack, knowledge of heart attack symptoms, and anticipated first response to symptoms among the lay public in Nepal. A total of 1192 participants (657 men and 535 women age 16 to 88 years old) were interviewed in a cross-sectional manner. Those <16 years of age, all health professionals, and individuals with a history of heart attack were excluded. A total of 862 (72.3%) participants had heard of heart attack. Significantly more male than female participants had heard of heart attack (P <.001). Of the respondents, 91.7% with >or=10 years of education (ED-2) had heard of heart of attack, whereas only 54% respondents with <10 years of education or who were illiterate (unable to read and write) (ED-1) had heard of heart attack, and in both the male and female populations, a higher percentage of the ED-2 group had heard of heart attack than the ED-1 group (92.6% vs. 60% and 85.6% vs. 49.6%, respectively). A significantly higher number of respondents from 31 to 50 years of age (AGE-2) had heard of heart attack than those 16 to 30 years of age (AGE-1) and those >50 years of age (AGE-3) (P <.001). Among 862 respondents who had heard of heart attack, 21.3% could not name any heart attack symptoms. A total of 16 different heart attack symptoms were named. Fainting or collapsing (48%), chest pain (22.4%), shortness of breath (9%), dizziness (8.4%), palpitations (7.4%), and sweating (7.4%) were the leading symptoms named by respondents. Fainting or collapsing and chest pain and shortness of breath were named more frequently among the ED-2 group respondents and the AGE-3 group men. Only 3.7% could name >or=2 typical heart attack symptoms. A significantly larger number of the ED-2 group named >or=2 typical symptoms than their counterparts (P <0.001). A large number (77.6%) of respondents preferred immediate hospital referral and/or doctor consultation after a heart attack. In Nepal, better-educated men are more aware of heart attack. Fainting or collapsing and chest pain and shortness of breath were leading heart attack symptoms named by the general population. Public heart attack awareness is not adequate and knowledge of wide range of heart attack symptoms is deficient in the Nepalese general population.

  7. The effect of soft budget constraints on access and quality in hospital care.

    PubMed

    Shen, Yu-Chu; Eggleston, Karen

    2009-06-01

    Given an increasingly complex web of financial pressures on providers, studies have examined how hospitals' overall financial health affects different aspects of hospital operations. In our study, we develop an empirical proxy for the concept of soft budget constraint (SBC, Kornai, Kyklos 39:3-30, 1986) as an alternative financial measure of a hospital's overall financial health and offer an initial estimate of the effect of SBCs on hospital access and quality. An organization has a SBC if it can expect to be bailed out rather than shut down. Our conceptual model predicts that hospitals facing softer budget constraints will be associated with less aggressive cost control, and their quality may be better or worse, depending on the scope for damage to quality from noncontractible aspects of cost control. We find that hospitals with softer budget constraints are less likely to shut down safety net services. In addition, hospitals with softer budget constraints appear to have better mortality outcomes for elderly heart attack patients.

  8. Heart attack

    MedlinePlus

    ... infarction; Non-ST - elevation myocardial infarction; NSTEMI; CAD - heart attack; Coronary artery disease - heart attack ... made up of cholesterol and other cells. A heart attack may occur when: A tear in the ...

  9. The effect of climate variability on urinary stone attacks: increased incidence associated with temperature over 18 °C: a population-based study.

    PubMed

    Park, Hyoung Keun; Bae, Sang Rak; Kim, Satbyul E; Choi, Woo Suk; Paick, Sung Hyun; Ho, Kim; Kim, Hyeong Gon; Lho, Yong Soo

    2015-02-01

    The aim of this study was to evaluate the effect of seasonal variation and climate parameters on urinary tract stone attack and investigate whether stone attack is increased sharply at a specific point. Nationwide data of total urinary tract stone attack numbers per month between January 2006 and December 2010 were obtained from the Korean Health Insurance Review and Assessment Service. The effects of climatic factors on monthly urinary stone attack were assessed using auto-regressive integrated moving average (ARIMA) regression method. A total of 1,702,913 stone attack cases were identified. Mean monthly and monthly average daily urinary stone attack cases were 28,382 ± 2,760 and 933 ± 85, respectively. The stone attack showed seasonal trends of sharp incline in June, a peak plateau from July to September, and a sharp decline after September. The correlation analysis showed that ambient temperature (r = 0.557, p < 0.001) and relative humidity (r = 0.513, p < 0.001) were significantly associated with urinary stone attack cases. However, after adjustment for trends and seasonality, ambient temperature was the only climate factor associated with the stone attack cases in ARIMA regression test (p = 0.04). Threshold temperature was estimated as 18.4 °C. Risk of urinary stone attack significantly increases 1.71% (1.02-2.41 %, 95% confidence intervals) with a 1 °C increase of ambient temperature above the threshold point. In conclusion, monthly urinary stone attack cases were changed according to seasonal variation. Among the climates variables, only temperature had consistent association with stone attack and when the temperature is over 18.4 °C, urinary stone attack would be increased sharply.

  10. Reexperiencing symptoms, dissociation, and avoidance behaviors in daily life of patients with PTSD and patients with panic disorder with agoraphobia.

    PubMed

    Pfaltz, Monique C; Michael, Tanja; Meyer, Andrea H; Wilhelm, Frank H

    2013-08-01

    Panic attacks are frequently perceived as life threatening. Panic disorder (PD) patients may therefore experience symptoms of posttraumatic stress disorder (PTSD). The authors explored this in 28 healthy controls, 17 PTSD patients, and 24 PD patients with agoraphobia who completed electronic diaries 36 times during 1 week. Patient groups frequently reported dissociation as well as thoughts, memories, and reliving of their trauma or panic attacks. PTSD patients reported more trauma/panic attack thoughts (incidence rate ratio [IRR] = 2.9) and memories (IRR = 2.8) than PD patients. Patient groups relived their trauma or panic attacks equally frequently, and reported comparable bodily reactions and distress associated with trauma or panic attack memories. Clinical groups avoided trauma or panic attack reminders more often than healthy controls (avoidance of trauma- or panic attack-related thoughts (IRR = 8.0); avoidance of things associated with the trauma or panic attack (IRR = 40.7). PD patients avoided trauma or panic attack reminders less often than PTSD patients (avoidance of trauma- or panic attack-related thoughts [IRR = 2.5]; avoidance of things associated with the trauma or panic attack [IRR = 4.1]), yet these differences were nonsignificant when controlling for functional impairment. In conclusion, trauma-like symptoms are common in PD with agoraphobia and panic attacks may be processed similarly as trauma in PTSD. Copyright © 2013 International Society for Traumatic Stress Studies.

  11. False Positive and False Negative Effects on Network Attacks

    NASA Astrophysics Data System (ADS)

    Shang, Yilun

    2018-01-01

    Robustness against attacks serves as evidence for complex network structures and failure mechanisms that lie behind them. Most often, due to detection capability limitation or good disguises, attacks on networks are subject to false positives and false negatives, meaning that functional nodes may be falsely regarded as compromised by the attacker and vice versa. In this work, we initiate a study of false positive/negative effects on network robustness against three fundamental types of attack strategies, namely, random attacks (RA), localized attacks (LA), and targeted attack (TA). By developing a general mathematical framework based upon the percolation model, we investigate analytically and by numerical simulations of attack robustness with false positive/negative rate (FPR/FNR) on three benchmark models including Erdős-Rényi (ER) networks, random regular (RR) networks, and scale-free (SF) networks. We show that ER networks are equivalently robust against RA and LA only when FPR equals zero or the initial network is intact. We find several interesting crossovers in RR and SF networks when FPR is taken into consideration. By defining the cost of attack, we observe diminishing marginal attack efficiency for RA, LA, and TA. Our finding highlights the potential risk of underestimating or ignoring FPR in understanding attack robustness. The results may provide insights into ways of enhancing robustness of network architecture and improve the level of protection of critical infrastructures.

  12. The non-trusty clown attack on model-based speaker recognition systems

    NASA Astrophysics Data System (ADS)

    Farrokh Baroughi, Alireza; Craver, Scott

    2015-03-01

    Biometric detectors for speaker identification commonly employ a statistical model for a subject's voice, such as a Gaussian Mixture Model, that combines multiple means to improve detector performance. This allows a malicious insider to amend or append a component of a subject's statistical model so that a detector behaves normally except under a carefully engineered circumstance. This allows an attacker to force a misclassification of his or her voice only when desired, by smuggling data into a database far in advance of an attack. Note that the attack is possible if attacker has access to database even for a limited time to modify victim's model. We exhibit such an attack on a speaker identification, in which an attacker can force a misclassification by speaking in an unusual voice, and replacing the least weighted component of victim's model by the most weighted competent of the unusual voice of the attacker's model. The reason attacker make his or her voice unusual during the attack is because his or her normal voice model can be in database, and by attacking with unusual voice, the attacker has the option to be recognized as himself or herself when talking normally or as the victim when talking in the unusual manner. By attaching an appropriately weighted vector to a victim's model, we can impersonate all users in our simulations, while avoiding unwanted false rejections.

  13. 44 CFR 312.2 - Definitions.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... meaning of the listed terms are as follows: (a) The term attack means any attack or series of attacks by... population caused, or which would be caused, by an attack upon the United States, or by natural disaster, (2) to deal with the immediate emergency conditions which would be created by any such attack, or natural...

  14. 44 CFR 312.2 - Definitions.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... meaning of the listed terms are as follows: (a) The term attack means any attack or series of attacks by... population caused, or which would be caused, by an attack upon the United States, or by natural disaster, (2) to deal with the immediate emergency conditions which would be created by any such attack, or natural...

  15. 44 CFR 312.2 - Definitions.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... meaning of the listed terms are as follows: (a) The term attack means any attack or series of attacks by... population caused, or which would be caused, by an attack upon the United States, or by natural disaster, (2) to deal with the immediate emergency conditions which would be created by any such attack, or natural...

  16. [Comparative analysis of phenomenology of paroxysms of atrial fibrillation and panic attacks].

    PubMed

    San'kova, T A; Solov'eva, A D; Nedostup, A V

    2004-01-01

    To study phenomenology of attacks of atrial fibrillation (AF) and to compare it with phenomenology of panic attacks for elucidation of pathogenesis of atrial fibrillation and for elaboration of rational therapeutic intervention including those aimed at correction of psychovegetative abnormalities. Patients with nonrheumatic paroxysmal AF (n=105) and 100 patients with panic attacks (n=100). Clinical, cardiological and neurological examination, analysis of patients complaints during attacks of AF, and comparison them with diagnostic criteria for panic attack. It was found that clinical picture of attacks of AF comprised vegetative, emotional and functional neurological phenomena similar to those characteristic for panic attacks. This similarity as well as positive therapeutic effect of clonazepam allowed to propose a novel pathogenic mechanism of AF attacks. Severity of psychovegetative disorders during paroxysm of AF could be evaluated by calculation of psychovegetative iudex: Psychovegetative index should be used for detection of panic attack-like component in clinical picture of AF paroxysm and thus for determination of indications for inclusion of vegetotropic drugs, e. g. clonazepam, in complex preventive therapy.

  17. Security Assessment of Cyberphysical Digital Microfluidic Biochips.

    PubMed

    Ali, Sk Subidh; Ibrahim, Mohamed; Sinanoglu, Ozgur; Chakrabarty, Krishnendu; Karri, Ramesh

    2016-01-01

    A digital microfluidic biochip (DMFB) is an emerging technology that enables miniaturized analysis systems for point-of-care clinical diagnostics, DNA sequencing, and environmental monitoring. A DMFB reduces the rate of sample and reagent consumption, and automates the analysis of assays. In this paper, we provide the first assessment of the security vulnerabilities of DMFBs. We identify result-manipulation attacks on a DMFB that maliciously alter the assay outcomes. Two practical result-manipulation attacks are shown on a DMFB platform performing enzymatic glucose assay on serum. In the first attack, the attacker adjusts the concentration of the glucose sample and thereby modifies the final result. In the second attack, the attacker tampers with the calibration curve of the assay operation. We then identify denial-of-service attacks, where the attacker can disrupt the assay operation by tampering either with the droplet-routing algorithm or with the actuation sequence. We demonstrate these attacks using a digital microfluidic synthesis simulator. The results show that the attacks are easy to implement and hard to detect. Therefore, this work highlights the need for effective protections against malicious modifications in DMFBs.

  18. Food additives

    PubMed Central

    Spencer, Michael

    1974-01-01

    Food additives are discussed from the food technology point of view. The reasons for their use are summarized: (1) to protect food from chemical and microbiological attack; (2) to even out seasonal supplies; (3) to improve their eating quality; (4) to improve their nutritional value. The various types of food additives are considered, e.g. colours, flavours, emulsifiers, bread and flour additives, preservatives, and nutritional additives. The paper concludes with consideration of those circumstances in which the use of additives is (a) justified and (b) unjustified. PMID:4467857

  19. Fundamentals and Methods of High Angle-of-Attack Flying Qualities Research

    DTIC Science & Technology

    1988-01-01

    the subject, Carr sites the work of Ham and Gorelick (1968) (Reference (26)) which showed that additional lift could be created by rapid pitching of...the laminar boundary layer near the leading-edge. Thicker airfoils (t/c > 0. 12), 32 NADC 88020-60 representative of figure 24b, typically create ...lift-curve can result from leading-edge flow separation as shown in figure 24a. An airplance with this type of lift-curve would exhibit little or no

  20. An introduction to the physical aspects of helicopter stability

    NASA Technical Reports Server (NTRS)

    Gessow, Alfred; Amer, Kenneth B

    1950-01-01

    In order to provide engineers interested in rotating-wing aircraft, but with no specialized training in stability theory, some understanding of the factors that influence the flying qualities of the helicopter, an explanation is made of both the static stability and the stick-fixed oscillation in hovering and forward flight in terms of fundamental physical quantities. Three significant stability factors -- static stability with angle of attack, static stability with speed, and damping due to a pitching or rolling velocity -- are explained in detail.

  1. Managing burn victims of suicide bombing attacks: outcomes, lessons learnt, and changes made from three attacks in Indonesia.

    PubMed

    Chim, Harvey; Yew, Woon Si; Song, Colin

    2007-01-01

    Terror attacks in Southeast Asia were almost nonexistent until the 2002 Bali bomb blast, considered the deadliest attack in Indonesian history. Further attacks in 2003 (Jakarta), 2004 (Jakarta), and 2005 (Bali) have turned terrorist attacks into an ever-present reality. The authors reviewed medical charts of victims evacuated to the Singapore General Hospital (SGH) Burns Centre during three suicide attacks involving Bali (2002 and 2005) and the Jakarta Marriott hotel (2003). Problems faced, lessons learnt, and costs incurred are discussed. A burns disaster plan drawing on lessons learnt from these attacks is presented. Thirty-one patients were treated at the SGH Burns Centre in three attacks (2002 Bali attack [n = 15], 2003 Jakarta attack [n = 14], and 2005 Bali attack [n = 2]). For the 2002 Bali attack, median age was 29 years (range 20 to 50 years), median percentage of total burn surface area (TBSA) was 29% (range 5% to 55%), and median abbreviated burn severity index (ABSI) was 6 (range 3 to 10). Eight of 15 patients were admitted to the intensive care unit. For the 2003 Jakarta attack, median age was 35 years (range 24 to 56 years), median percentage of TBSA was 10% (range 2% to 46%), and median ABSI was 4 (range 3 to 9). A large number of patients had other injuries. Problems faced included manpower issues, lack of bed space, shortage of blood products, and lack of cadaver skin. The changing nature of terror attacks mandates continued vigilance and disaster preparedness. The multidimensional burns patient, complicated by other injuries, is likely to become increasingly common. A burns disaster plan with emphasis on effective command, control, and communication as well as organisation of health care personnel following a 'team concept' will do much to ensure that the sudden onset of a crisis situation at an unexpected time does not overwhelm hospital manpower and resources.

  2. Managing burn victims of suicide bombing attacks: outcomes, lessons learnt, and changes made from three attacks in Indonesia

    PubMed Central

    Chim, Harvey; Yew, Woon Si; Song, Colin

    2007-01-01

    Introduction Terror attacks in Southeast Asia were almost nonexistent until the 2002 Bali bomb blast, considered the deadliest attack in Indonesian history. Further attacks in 2003 (Jakarta), 2004 (Jakarta), and 2005 (Bali) have turned terrorist attacks into an ever-present reality. Methods The authors reviewed medical charts of victims evacuated to the Singapore General Hospital (SGH) Burns Centre during three suicide attacks involving Bali (2002 and 2005) and the Jakarta Marriott hotel (2003). Problems faced, lessons learnt, and costs incurred are discussed. A burns disaster plan drawing on lessons learnt from these attacks is presented. Results Thirty-one patients were treated at the SGH Burns Centre in three attacks (2002 Bali attack [n = 15], 2003 Jakarta attack [n = 14], and 2005 Bali attack [n = 2]). For the 2002 Bali attack, median age was 29 years (range 20 to 50 years), median percentage of total burn surface area (TBSA) was 29% (range 5% to 55%), and median abbreviated burn severity index (ABSI) was 6 (range 3 to 10). Eight of 15 patients were admitted to the intensive care unit. For the 2003 Jakarta attack, median age was 35 years (range 24 to 56 years), median percentage of TBSA was 10% (range 2% to 46%), and median ABSI was 4 (range 3 to 9). A large number of patients had other injuries. Problems faced included manpower issues, lack of bed space, shortage of blood products, and lack of cadaver skin. Conclusion The changing nature of terror attacks mandates continued vigilance and disaster preparedness. The multidimensional burns patient, complicated by other injuries, is likely to become increasingly common. A burns disaster plan with emphasis on effective command, control, and communication as well as organisation of health care personnel following a 'team concept' will do much to ensure that the sudden onset of a crisis situation at an unexpected time does not overwhelm hospital manpower and resources. PMID:17274813

  3. Robustness analysis of interdependent networks under multiple-attacking strategies

    NASA Astrophysics Data System (ADS)

    Gao, Yan-Li; Chen, Shi-Ming; Nie, Sen; Ma, Fei; Guan, Jun-Jie

    2018-04-01

    The robustness of complex networks under attacks largely depends on the structure of a network and the nature of the attacks. Previous research on interdependent networks has focused on two types of initial attack: random attack and degree-based targeted attack. In this paper, a deliberate attack function is proposed, where six kinds of deliberate attacking strategies can be derived by adjusting the tunable parameters. Moreover, the robustness of four types of interdependent networks (BA-BA, ER-ER, BA-ER and ER-BA) with different coupling modes (random, positive and negative correlation) is evaluated under different attacking strategies. Interesting conclusions could be obtained. It can be found that the positive coupling mode can make the vulnerability of the interdependent network to be absolutely dependent on the most vulnerable sub-network under deliberate attacks, whereas random and negative coupling modes make the vulnerability of interdependent network to be mainly dependent on the being attacked sub-network. The robustness of interdependent network will be enhanced with the degree-degree correlation coefficient varying from positive to negative. Therefore, The negative coupling mode is relatively more optimal than others, which can substantially improve the robustness of the ER-ER network and ER-BA network. In terms of the attacking strategies on interdependent networks, the degree information of node is more valuable than the betweenness. In addition, we found a more efficient attacking strategy for each coupled interdependent network and proposed the corresponding protection strategy for suppressing cascading failure. Our results can be very useful for safety design and protection of interdependent networks.

  4. Continuous-variable quantum cryptography is secure against non-Gaussian attacks.

    PubMed

    Grosshans, Frédéric; Cerf, Nicolas J

    2004-01-30

    A general study of arbitrary finite-size coherent attacks against continuous-variable quantum cryptographic schemes is presented. It is shown that, if the size of the blocks that can be coherently attacked by an eavesdropper is fixed and much smaller than the key size, then the optimal attack for a given signal-to-noise ratio in the transmission line is an individual Gaussian attack. Consequently, non-Gaussian coherent attacks do not need to be considered in the security analysis of such quantum cryptosystems.

  5. A comparison of the nature and correlates of panic attacks in the context of Panic Disorder and Social Anxiety Disorder.

    PubMed

    Brown, Lily A; LeBeau, Richard; Liao, Betty; Niles, Andrea N; Glenn, Daniel; Craske, Michelle G

    2016-01-30

    Panic attacks occurring outside of Panic Disorder are not well-understood despite their inclusion as a diagnostic specifier in the Diagnostic and Statistical Manual for Mental Disorders (DSM-5). This study compares panic attacks in the context of Panic Disorder compared to social anxiety in terms of their symptom frequency, severity, and clinical correlates. Participants (n=404) were interviewed using the Anxiety Disorders Interview Schedule (ADIS-IV-L; Brown et al., 1994), from which we analyzed interviewer ratings of panic attacks and panic attack symptoms, as well as other demographic and clinical characteristics. Panic attacks in the context of Panic Disorder were characterized by a greater number and severity of symptoms compared to panic attacks in the context of Social Anxiety Disorder, and were associated with a history of traumatization, inpatient psychiatric treatment, and benzodiazepine use. Social anxiety panic attacks were associated with reduced physical health concerns. Cognitive panic attack symptoms were more prevalent in Panic Disorder and were associated with a variety of poor clinical correlates. Panic attacks in the context of Panic Disorder are more severe than those in social anxiety, and this may be driven by cognitive disturbances during those attacks. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.

  6. Heart Attack Recovery FAQs

    MedlinePlus

    ... recommendations to make a full recovery. View an animation of a heart attack . Heart Attack Recovery Questions ... Support Network Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...

  7. Detecting Distributed SQL Injection Attacks in a Eucalyptus Cloud Environment

    NASA Technical Reports Server (NTRS)

    Kebert, Alan; Barnejee, Bikramjit; Solano, Juan; Solano, Wanda

    2013-01-01

    The cloud computing environment offers malicious users the ability to spawn multiple instances of cloud nodes that are similar to virtual machines, except that they can have separate external IP addresses. In this paper we demonstrate how this ability can be exploited by an attacker to distribute his/her attack, in particular SQL injection attacks, in such a way that an intrusion detection system (IDS) could fail to identify this attack. To demonstrate this, we set up a small private cloud, established a vulnerable website in one instance, and placed an IDS within the cloud to monitor the network traffic. We found that an attacker could quite easily defeat the IDS by periodically altering its IP address. To detect such an attacker, we propose to use multi-agent plan recognition, where the multiple source IPs are considered as different agents who are mounting a collaborative attack. We show that such a formulation of this problem yields a more sophisticated approach to detecting SQL injection attacks within a cloud computing environment.

  8. Sensitivity to carbon dioxide in subjects with a single lifetime panic attack: possible clinical "bedside" predictive test for panic disorder after a first attack.

    PubMed

    Berzak, Elina; Reznik, Mila; Narsia, Oxana; Benjamin, Jonathan

    2004-01-01

    There is currently no way of knowing whether a patient who has recently had a single panic attack has incipient panic disorder. Sensitivity to carbon dioxide (CO2) is lower in healthy volunteers than in panic disorder patients. If this is also true of people who experience a single lifetime panic attack, it could be used as a prognostic test. Subjects with a single lifetime panic attack and subjects with panic disorder received an inhalation of 35% CO2. Subjects completed the panic symptoms scale (PSS), and also stated whether they considered that they had experienced an attack. None of 14 subjects with a single lifetime panic attack, compared to 7 of 17 subjects with panic disorder (P=.009), had an attack. The PSS also distinguished between the groups. The 35% CO2 challenge warrants further investigation as a predictive test after a first panic attack.

  9. Exploiting Small Leakages in Masks to Turn a Second-Order Attack into a First-Order Attack and Improved Rotating Substitution Box Masking with Linear Code Cosets.

    PubMed

    DeTrano, Alexander; Karimi, Naghmeh; Karri, Ramesh; Guo, Xiaofei; Carlet, Claude; Guilley, Sylvain

    2015-01-01

    Masking countermeasures, used to thwart side-channel attacks, have been shown to be vulnerable to mask-extraction attacks. State-of-the-art mask-extraction attacks on the Advanced Encryption Standard (AES) algorithm target S-Box recomputation schemes but have not been applied to scenarios where S-Boxes are precomputed offline. We propose an attack targeting precomputed S-Boxes stored in nonvolatile memory. Our attack targets AES implemented in software protected by a low entropy masking scheme and recovers the masks with 91% success rate. Recovering the secret key requires fewer power traces (in fact, by at least two orders of magnitude) compared to a classical second-order attack. Moreover, we show that this attack remains viable in a noisy environment or with a reduced number of leakage points. Eventually, we specify a method to enhance the countermeasure by selecting a suitable coset of the masks set.

  10. The effect of nursing professional pay structures and pay levels on hospitals' heart attack outcomes.

    PubMed

    Brown, Mark P

    2006-01-01

    The effect of nursing professionals (i.e., nurse aid/orderly, licensed practical nurse, registered nurse) pay structures and pay levels on hospitals risk-adjusted heart attack outcomes was determined. Operationalizing hospitals' heart attack outcomes as their thirty-day risk-adjusted mortality rates, a positive curvilinear relation is hypothesized between pay dispersion and hospitals' heart attack outcomes, whereas a direct relation is hypothesized between pay level and hospitals' heart attack outcomes. Pay level is also hypothesized as a moderator of the relation between pay dispersion and hospitals' heart attack outcomes. Using a sample of 138 California hospitals, support is not found for either the curvilinear relation between hospitals' nursing professionals pay dispersion and hospitals' heart attack outcomes, or the direct relation between nursing professionals' pay level and hospitals' heart attack outcomes. Support is found for the moderation hypothesis in which nursing professionals' pay level moderates the relation between hospitals' nursing professionals pay dispersion and hospitals' heart attack outcomes. Implications for practice are discussed in light of the study's results.

  11. Exploiting Small Leakages in Masks to Turn a Second-Order Attack into a First-Order Attack and Improved Rotating Substitution Box Masking with Linear Code Cosets

    PubMed Central

    DeTrano, Alexander; Karimi, Naghmeh; Karri, Ramesh; Guo, Xiaofei; Carlet, Claude; Guilley, Sylvain

    2015-01-01

    Masking countermeasures, used to thwart side-channel attacks, have been shown to be vulnerable to mask-extraction attacks. State-of-the-art mask-extraction attacks on the Advanced Encryption Standard (AES) algorithm target S-Box recomputation schemes but have not been applied to scenarios where S-Boxes are precomputed offline. We propose an attack targeting precomputed S-Boxes stored in nonvolatile memory. Our attack targets AES implemented in software protected by a low entropy masking scheme and recovers the masks with 91% success rate. Recovering the secret key requires fewer power traces (in fact, by at least two orders of magnitude) compared to a classical second-order attack. Moreover, we show that this attack remains viable in a noisy environment or with a reduced number of leakage points. Eventually, we specify a method to enhance the countermeasure by selecting a suitable coset of the masks set. PMID:26491717

  12. The Icatibant Outcome Survey: treatment of laryngeal angioedema attacks

    PubMed Central

    Aberer, Werner; Bouillet, Laurence; Caballero, Teresa; Maurer, Marcus; Fabien, Vincent; Zanichelli, Andrea

    2016-01-01

    Objective To characterize the management and outcomes of life-threatening laryngeal attacks of hereditary angioedema (HAE) treated with icatibant in the observational Icatibant Outcome Survey (NCT01034969) registry. Methods This retrospective analysis was based on data from patients with HAE type I/II who received healthcare professional-administered or self-administered icatibant to treat laryngeal attacks between September 2008 and May 2013. Results Twenty centers in seven countries contributed data. Overall, 42 patients with HAE experienced 67 icatibant-treated laryngeal attacks. Icatibant was self-administered for 62.3% of attacks (healthcare professional-administered, 37.7%). One icatibant injection was used for 87.9% of attacks, with rescue or concomitant medication used for 9.0%. The median time to treatment was 2.0 h (n=31 attacks) and the median time to resolution was 6.0 h (n=35 attacks). Conclusions This analysis describes successful use of icatibant for the treatment of laryngeal HAE attacks in a real-world setting. PMID:27116379

  13. Heart Attack

    MedlinePlus

    Each year almost 800,000 Americans have a heart attack. A heart attack happens when blood flow to the heart suddenly ... it's important to know the symptoms of a heart attack and call 9-1-1 if you or ...

  14. Microvascular Angina

    MedlinePlus

    ... to the Terms and Conditions and Privacy Policy Heart Attack Tools & Resources My Cardiac Coach What Is a ... Heart Attack Warning Signs: Patient sheet | Infographic | Quiz Heart Attack • Home • About Heart Attacks Acute Coronary Syndrome (ACS) ...

  15. Using the Domain Name System to Thwart Automated Client-Based Attacks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Taylor, Curtis R; Shue, Craig A

    2011-09-01

    On the Internet, attackers can compromise systems owned by other people and then use these systems to launch attacks automatically. When attacks such as phishing or SQL injections are successful, they can have negative consequences including server downtime and the loss of sensitive information. Current methods to prevent such attacks are limited in that they are application-specific, or fail to block attackers. Phishing attempts can be stopped with email filters, but if the attacker manages to successfully bypass these filters, then the user must determine if the email is legitimate or not. Unfortunately, they often are unable to do so.more » Since attackers have a low success rate, they attempt to compensate for it in volume. In order to have this high throughput, attackers take shortcuts and break protocols. We use this knowledge to address these issues by implementing a system that can detect malicious activity and use it to block attacks. If the client fails to follow proper procedure, they can be classified as an attacker. Once an attacker has been discovered, they will be isolated and monitored. This can be accomplished using existing software in Ubuntu Linux applications, along with our custom wrapper application. After running the system and seeing its performance on three popular Web browsers Chromium, Firefox and Internet Explorer as well as two popular email clients, Thunderbird and Evolution, we found that not only is this system conceivable, it is effective and has low overhead.« less

  16. Incidence and impact of dog attacks on guide dogs in the UK.

    PubMed

    Brooks, A; Moxon, R; England, G C W

    2010-06-19

    In a retrospective survey, researchers identified 100 incidents of attacks on guide dogs by other dogs. These were reviewed in order to determine the number, severity and impact on the handler and dog, and the characteristics of the aggressors and victims. During the study period there were more than three attacks reported each month, with 61 per cent of the attacks being upon dogs that were in harness and working with an owner or trainer. The majority of the dogs that were attacked were male (62 per cent), and the breeds that were over-represented (relative to their prevalence in the general guide dog population) were the labrador and the golden retriever x flat-coated retriever crossbreed. Most of the attacks occurred in public places between 09.00 and 15.00 and the majority (61 per cent) of the attacking dogs were off the lead at the time of the attack. Thirty-eight per cent of the attacking dogs were of bull breeds, which were over-represented among attackers compared with the proportion of this breed type in the general dog population. Veterinary attention was sought after 41 per cent of the attacks, and in 19 per cent of instances there was injury to the handler or to a member of the public. The attacks were reported to have affected the working performance and behaviour of the victim dog in 45 per cent of the instances, and two dogs had to be subsequently withdrawn from working as guide dogs.

  17. X-29 in Protective Cover Being Transported by Truck to Dryden

    NASA Technical Reports Server (NTRS)

    1988-01-01

    In a stark juxtaposition of nature and technology, the second X-29 forward-swept-wing research aircraft is shown here passing by one of the classic, spiny Joshua trees that populate the Mojave desert while being transported by truck to NASA's Ames-Dryden Flight Research Facility (later the Dryden Flight Research Center), Edwards, California, on November 7, 1988. The aircraft, with its protective covering, traveled by ship from the manufacturer's plant on Long Island through the Panama Canal to Port Hueneme and then was trucked to Dryden. X-29 No. 2 was used in a high angle-of-attack research program which began in spring 1989. Two X-29 aircraft, featuring one of the most unusual designs in aviation history, flew at the Ames-Dryden Flight Research Facility (now the Dryden Flight Research Center, Edwards, California) from 1984 to 1992. The fighter-sized X-29 technology demonstrators explored several concepts and technologies including: the use of advanced composites in aircraft construction; variable-camber wing surfaces; a unique forward- swept wing and its thin supercritical airfoil; strakes; close-coupled canards; and a computerized fly-by-wire flight control system used to maintain control of the otherwise unstable aircraft. Research results showed that the configuration of forward-swept wings, coupled with movable canards, gave pilots excellent control response at angles of attack of up to 45 degrees. During its flight history, the X-29 aircraft flew 422 research missions and a total of 436 missions. Sixty of the research flights were part of the X-29 follow-on 'vortex control' phase. The forward-swept wing of the X-29 resulted in reverse airflow, toward the fuselage rather than away from it, as occurs on the usual aft-swept wing. Consequently, on the forward-swept wing, the ailerons remained unstalled at high angles of attack. This provided better airflow over the ailerons and prevented stalling (loss of lift) at high angles of attack. Introduction of composite materials in the 1970s opened a new field of aircraft construction. It also made possible the construction of the X-29's thin supercritical wing. State-of-the-art composites allowed aeroelastic tailoring which, in turn, allowed the wing some bending but limited twisting and eliminated structural divergence within the flight envelope (i.e. deformation of the wing or the wing breaking off in flight). Additionally, composite materials allowed the wing to be sufficiently rigid for safe flight without adding an unacceptable weight penalty. The X-29 project consisted of two phases plus the follow-on vortex-control phase. Phase 1 demonstrated that the forward sweep of the X-29 wings kept the wing tips unstalled at the moderate angles of attack flown in that phase (a maximum of 21 degrees). Phase I also demonstrated that the aeroelastic tailored wing prevented structural divergence of the wing within the flight envelope, and that the control laws and control-surface effectiveness were adequate to provide artificial stability for an otherwise unstable aircraft. Phase 1 further demonstrated that the X-29 configuration could fly safely and reliably, even in tight turns. During Phase 2 of the project, the X-29, flying at an angle of attack of up to 67 degrees, demonstrated much better control and maneuvering qualities than computational methods and simulation models had predicted . During 120 research flights in this phase, NASA, Air Force, and Grumman project pilots reported the X-29 aircraft had excellent control response to an angle of attack of 45 degrees and still had limited controllability at a 67-degree angle of attack. This controllability at high angles of attack can be attributed to the aircraft's unique forward-swept wing- canard design. The NASA/Air Force-designed high-gain flight control laws also contributed to the good flying qualities. During the Air Force-initiated vortex-control phase, the X-29 successfully demonstrated vortex flow control (VFC). This VFC was more effective than expected in generating yaw forces, especially in high angles of attack where the rudder is less effective. VFC was less effective in providing control when sideslip (wind pushing on the side of the aircraft) was present, and it did little to decrease rocking oscillation of the aircraft. The X-29 vehicle was a single-engine aircraft, 48.1 feet long with a wing span of 27.2 feet. Each aircraft was powered by a General Electric F404-GE-400 engine producing 16,000 pounds of thrust. The program was a joint effort of the Department of Defense's Defense Advanced Research Projects Agency (DARPA), the U.S. Air Force, the Ames-Dryden Flight Research Facility, the Air Force Flight Test Center, and the Grumman Corporation. The program was managed by the Air Force's Wright Laboratory, Wright Patterson Air Force Base, Ohio.

  18. Robustness and structure of complex networks

    NASA Astrophysics Data System (ADS)

    Shao, Shuai

    This dissertation covers the two major parts of my PhD research on statistical physics and complex networks: i) modeling a new type of attack -- localized attack, and investigating robustness of complex networks under this type of attack; ii) discovering the clustering structure in complex networks and its influence on the robustness of coupled networks. Complex networks appear in every aspect of our daily life and are widely studied in Physics, Mathematics, Biology, and Computer Science. One important property of complex networks is their robustness under attacks, which depends crucially on the nature of attacks and the structure of the networks themselves. Previous studies have focused on two types of attack: random attack and targeted attack, which, however, are insufficient to describe many real-world damages. Here we propose a new type of attack -- localized attack, and study the robustness of complex networks under this type of attack, both analytically and via simulation. On the other hand, we also study the clustering structure in the network, and its influence on the robustness of a complex network system. In the first part, we propose a theoretical framework to study the robustness of complex networks under localized attack based on percolation theory and generating function method. We investigate the percolation properties, including the critical threshold of the phase transition pc and the size of the giant component Pinfinity. We compare localized attack with random attack and find that while random regular (RR) networks are more robust against localized attack, Erdoḧs-Renyi (ER) networks are equally robust under both types of attacks. As for scale-free (SF) networks, their robustness depends crucially on the degree exponent lambda. The simulation results show perfect agreement with theoretical predictions. We also test our model on two real-world networks: a peer-to-peer computer network and an airline network, and find that the real-world networks are much more vulnerable to localized attack compared with random attack. In the second part, we extend the tree-like generating function method to incorporating clustering structure in complex networks. We study the robustness of a complex network system, especially a network of networks (NON) with clustering structure in each network. We find that the system becomes less robust as we increase the clustering coefficient of each network. For a partially dependent network system, we also find that the influence of the clustering coefficient on network robustness decreases as we decrease the coupling strength, and the critical coupling strength qc, at which the first-order phase transition changes to second-order, increases as we increase the clustering coefficient.

  19. Phenomenology of panic attacks: a descriptive study of panic disorder patients' self-reports.

    PubMed

    Aronson, T A; Logue, C M

    1988-01-01

    The phenomenology of panic disorder and panic attacks was systematically assessed in 46 consecutive patients. The results suggest that DSM-III criteria include several symptoms that are not frequently present during a panic attack and that DSM-III's characterization of a panic attack is imprecise and misleading. Panic attacks were found to vary in intensity, frequency, spontaneity, and associated symptoms. A panic attack typically presents as a unified symptom complex of psychic anxiety and multiple somatic symptoms in multiple body systems. It occurs in a crescendolike pattern, is self-limited, and often leaves the subject weak or shaken. The temporal course as much as the symptomatic presentation defines a panic attack.

  20. Finite Energy and Bounded Attacks on Control System Sensor Signals

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Djouadi, Seddik M; Melin, Alexander M; Ferragut, Erik M

    Control system networks are increasingly being connected to enterprise level networks. These connections leave critical industrial controls systems vulnerable to cyber-attacks. Most of the effort in protecting these cyber-physical systems (CPS) has been in securing the networks using information security techniques and protection and reliability concerns at the control system level against random hardware and software failures. However, besides these failures the inability of information security techniques to protect against all intrusions means that the control system must be resilient to various signal attacks for which new analysis and detection methods need to be developed. In this paper, sensor signalmore » attacks are analyzed for observer-based controlled systems. The threat surface for sensor signal attacks is subdivided into denial of service, finite energy, and bounded attacks. In particular, the error signals between states of attack free systems and systems subject to these attacks are quantified. Optimal sensor and actuator signal attacks for the finite and infinite horizon linear quadratic (LQ) control in terms of maximizing the corresponding cost functions are computed. The closed-loop system under optimal signal attacks are provided. Illustrative numerical examples are provided together with an application to a power network with distributed LQ controllers.« less

  1. Multi-Layer Approach for the Detection of Selective Forwarding Attacks

    PubMed Central

    Alajmi, Naser; Elleithy, Khaled

    2015-01-01

    Security breaches are a major threat in wireless sensor networks (WSNs). WSNs are increasingly used due to their broad range of important applications in both military and civilian domains. WSNs are prone to several types of security attacks. Sensor nodes have limited capacities and are often deployed in dangerous locations; therefore, they are vulnerable to different types of attacks, including wormhole, sinkhole, and selective forwarding attacks. Security attacks are classified as data traffic and routing attacks. These security attacks could affect the most significant applications of WSNs, namely, military surveillance, traffic monitoring, and healthcare. Therefore, there are different approaches to detecting security attacks on the network layer in WSNs. Reliability, energy efficiency, and scalability are strong constraints on sensor nodes that affect the security of WSNs. Because sensor nodes have limited capabilities in most of these areas, selective forwarding attacks cannot be easily detected in networks. In this paper, we propose an approach to selective forwarding detection (SFD). The approach has three layers: MAC pool IDs, rule-based processing, and anomaly detection. It maintains the safety of data transmission between a source node and base station while detecting selective forwarding attacks. Furthermore, the approach is reliable, energy efficient, and scalable. PMID:26610499

  2. Cougar attacks on children: injury patterns and treatment.

    PubMed

    Kadesky, K M; Manarey, C; Blair, G K; Murphy, J J; Verchere, C; Atkinson, K

    1998-06-01

    Cougar attacks on humans appear to be on the rise. A review of all attacks on children was performed to determine the method of attack and injury patterns so that a treatment regimen as well as possible preventative measures could be determined. A review of all attacks, including attacks on children, was performed, including three recent attacks treated at our institution. Situation, adult supervision, patient age, injuries recorded, survival, and mode of attack, if known, were reviewed. There were 50 documented attacks on children with a 25% fatality rate. Most children were not alone at the time of the attack (92%), and in many instances adult supervision was present or nearby. Severe head and neck lacerations along with puncture wounds were the most common injury. Examples of typical cervical injuries include a nonfatal vertebral artery injury, phrenic nerve injury, a fatal internal carotid artery injury, and a fatal cervical spine injury. The cougar was rabid in two cases. Pasteurella resulted in late infections in two patients. Based on the pattern of injuries, the authors recommend aggressive evaluation for occult cervical injuries as well as surgical debridement. Antibiotics should cover oropharyngeal flora including Pasteurella multocida. Rabies prophylaxis is indicated. Adult supervision in wilderness areas is not necessarily protective.

  3. Multi-Layer Approach for the Detection of Selective Forwarding Attacks.

    PubMed

    Alajmi, Naser; Elleithy, Khaled

    2015-11-19

    Security breaches are a major threat in wireless sensor networks (WSNs). WSNs are increasingly used due to their broad range of important applications in both military and civilian domains. WSNs are prone to several types of security attacks. Sensor nodes have limited capacities and are often deployed in dangerous locations; therefore, they are vulnerable to different types of attacks, including wormhole, sinkhole, and selective forwarding attacks. Security attacks are classified as data traffic and routing attacks. These security attacks could affect the most significant applications of WSNs, namely, military surveillance, traffic monitoring, and healthcare. Therefore, there are different approaches to detecting security attacks on the network layer in WSNs. Reliability, energy efficiency, and scalability are strong constraints on sensor nodes that affect the security of WSNs. Because sensor nodes have limited capabilities in most of these areas, selective forwarding attacks cannot be easily detected in networks. In this paper, we propose an approach to selective forwarding detection (SFD). The approach has three layers: MAC pool IDs, rule-based processing, and anomaly detection. It maintains the safety of data transmission between a source node and base station while detecting selective forwarding attacks. Furthermore, the approach is reliable, energy efficient, and scalable.

  4. Incidence and impact of dog attacks on guide dogs in the UK: an update.

    PubMed

    Moxon, R; Whiteside, H; England, G C W

    2016-04-09

    Data on dog attacks on Guide Dogs' stock were reviewed to investigate the characteristics of the attacks. An average of 11.2 attacks occurred each month. Nearly all of the attacks occurred in public areas, 68.4 per cent of victim dogs were qualified guide dogs and 55.5 per cent of victim dogs were working in harness when they were attacked. Guide Dogs' stock were injured in 43.2 per cent of attacks and veterinary costs for attacks were estimated at £34,514.30. Over 40 per cent of qualified guide dogs' working ability was affected and >20 per cent of qualified guide dogs required some time off from working after a dog attack. Twenty dogs were permanently withdrawn from the Guide Dogs' programme as a result of dog attacks, 13 of which were qualified and working with guide dog owners at the time of the withdrawal; this resulted in a financial cost of >£600,000 to the charity. More importantly perhaps, temporary and permanent withdrawals have a significant impact upon the mobility and independence of guide dog owners and in many cases significantly impacted their emotional well-being. British Veterinary Association.

  5. Childhood internalizing and externalizing problems predict the onset of clinical panic attacks over adolescence: the TRAILS study.

    PubMed

    Mathyssek, Christina M; Olino, Thomas M; Verhulst, Frank C; van Oort, Floor V A

    2012-01-01

    Panic attacks are a source of individual suffering and are an independent risk factor for later psychopathology. However, much less is known about risk factors for the development of panic attacks, particularly during adolescence when the incidence of panic attacks increases dramatically. We examined whether internalizing and externalizing problems in childhood predict the onset of panic attacks in adolescence. This study is part of the TRacking Adolescents' Individual Lives Survey (TRAILS), a Dutch longitudinal population cohort study (N = 1,584). Internalizing and Externalizing Problems were collected using the Youth Self-Report (YSR) and the parent-report Child Behavior Checklist (CBCL) at baseline (age 10-12). At age 18-20, DSM-IV defined panic attacks since baseline were assessed with the Composite International Diagnostic Interview (CIDI). We investigated whether early adolescent Internalizing and Externalizing Problems predicted panic attacks between ages 10-20 years, using survival analysis in univariate and multivariate models. There were N = 314 (19.8%) cases who experienced at least one DSM-IV defined panic attack during adolescence and N = 18 (1.2%) who developed panic disorder during adolescence. In univariate analyses, CBCL Total Problems, Internalizing Problems and three of the eight syndrome scales predicted panic attack onset, while on the YSR all broad-band problem scales and each narrow-band syndrome scale predicted panic attack onset. In multivariate analyses, CBCL Social Problems (HR 1.19, p<.05), and YSR Thought Problems (HR 1.15, p<.05) and Social Problems (HR 1.26, p<.01) predicted panic attack onset. Risk indicators of panic attack include the wide range of internalizing and externalizing problems. Yet, when adjusted for co-occurring problem behaviors, Social Problems were the most consistent risk factor for panic attack onsets in adolescence.

  6. Countermeasures for unintentional and intentional video watermarking attacks

    NASA Astrophysics Data System (ADS)

    Deguillaume, Frederic; Csurka, Gabriela; Pun, Thierry

    2000-05-01

    These last years, the rapidly growing digital multimedia market has revealed an urgent need for effective copyright protection mechanisms. Therefore, digital audio, image and video watermarking has recently become a very active area of research, as a solution to this problem. Many important issues have been pointed out, one of them being the robustness to non-intentional and intentional attacks. This paper studies some attacks and proposes countermeasures applied to videos. General attacks are lossy copying/transcoding such as MPEG compression and digital/analog (D/A) conversion, changes of frame-rate, changes of display format, and geometrical distortions. More specific attacks are sequence edition, and statistical attacks such as averaging or collusion. Averaging attack consists of averaging locally consecutive frames to cancel the watermark. This attack works well for schemes which embed random independent marks into frames. In the collusion attack the watermark is estimated from single frames (based on image denoising), and averaged over different scenes for better accuracy. The estimated watermark is then subtracted from each frame. Collusion requires that the same mark is embedded into all frames. The proposed countermeasures first ensures robustness to general attacks by spread spectrum encoding in the frequency domain and by the use of an additional template. Secondly, a Bayesian criterion, evaluating the probability of a correctly decoded watermark, is used for rejection of outliers, and to implement an algorithm against statistical attacks. The idea is to embed randomly chosen marks among a finite set of marks, into subsequences of videos which are long enough to resist averaging attacks, but short enough to avoid collusion attacks. The Bayesian criterion is needed to select the correct mark at the decoding step. Finally, the paper presents experimental results showing the robustness of the proposed method.

  7. Unstable Angina

    MedlinePlus

    ... Women This content was last reviewed July 2015. Heart Attack • Home • About Heart Attacks Acute Coronary Syndrome (ACS) ... Recovery FAQs • Heart Attack Tools & Resources • Support Network Heart Attack Tools & Resources My Cardiac Coach What Is a ...

  8. Acute Coronary Syndrome

    MedlinePlus

    ... angina? This content was last reviewed July 2015. Heart Attack • Home • About Heart Attacks Acute Coronary Syndrome (ACS) ... Recovery FAQs • Heart Attack Tools & Resources • Support Network Heart Attack Tools & Resources My Cardiac Coach What Is a ...

  9. Near-death experiences, attacks by family members, and absence of health care in their home countries affect the quality of life of refugee women in Germany: a multi-region, cross-sectional, gender-sensitive study.

    PubMed

    Jesuthasan, Jenny; Sönmez, Ekin; Abels, Ingar; Kurmeyer, Christine; Gutermann, Jana; Kimbel, Renate; Krüger, Antje; Niklewski, Guenter; Richter, Kneginja; Stangier, Ulrich; Wollny, Anja; Zier, Ulrike; Oertelt-Prigione, Sabine; Shouler-Ocak, Meryam

    2018-02-01

    The year 2016 has marked the highest number of displaced people worldwide on record. A large number of these refugees are women, yet little is known about their specific situation and the hurdles they have to face during their journey. Herein, we investigated whether sociodemographic characteristics and traumatic experiences in the home country and during the flight affected the quality of life of refugee women arriving in Germany in 2015-2016. Six hundred sixty-three women from six countries (Afghanistan, Syria, Iran, Iraq, Somalia, and Eritrea) living in shared reception facilities in five distinct German regions were interviewed by native speakers using a structured questionnaire. Sociodemographic data and information about reasons for fleeing, traumatic experiences, symptoms, quality of life, and expectations towards their future were elicited. All information was stored in a central database in Berlin. Descriptive analyses, correlations, and multivariate analyses were performed. The most frequent reasons cited for fleeing were war, terror, and threat to one's life or the life of a family member. Eighty-seven percent of women resorted to smugglers to make the journey to Europe, and this significantly correlated to residence in a war zone (odds ratio (OR) = 2.5, 95% confidence interval (CI) = 1.4-4.6, p = 0.003) and homelessness prior to fleeing (OR = 2.1, 95% CI = 1-4.3, p = 0.04). Overall the described quality of life by the women was moderate (overall mean = 3.23, range of 1-5) and slightly worse than that of European populations (overall mean = 3.68, p < 0.0001). The main reasons correlating with lower quality of life were older age, having had a near-death experience, having been attacked by a family member, and absence of health care in case of illness. Refugee women experience multiple traumatic experiences before and/or during their journey, some of which are gender-specific. These experiences affect the quality of life in their current country of residence and might impact their integration. We encourage the early investigation of these traumatic experiences to rapidly identify women at higher risk and to improve health care for somatic and mental illness.

  10. Corrosion of stainless steels in the riser during co-processing of bio-oils in a fluid catalytic cracking pilot plant

    DOE PAGES

    Brady, M. P.; Keiser, J. R.; Leonard, D. N.; ...

    2017-01-31

    Co-processing of bio-oils with conventional petroleum-based feedstocks is an attractive initial option to make use of renewable biomass as a fuel source while leveraging existing refinery infrastructures. But, bio-oils and their processing intermediates have high concentrations of organic oxygenates, which, among their other negative qualities, can result in increased corrosion issues. A range of stainless steel alloys (409, 410, 304L, 316L, 317L, and 201) was exposed at the base of the riser in a fluid catalytic cracking pilot plant while co-processing vacuum gas oil with pine-derived pyrolysis bio-oils that had been catalytically hydrodeoxygenated to ~ 2 to 28% oxygen. Wemore » studied the processing using a catalyst temperature of 704 °C, a reaction exit temperature of 520 °C, and total co-processing run times of 57–75 h. External oxide scaling 5–30 μm thick and internal attack 1–5 μm deep were observed in these short-duration exposures. The greatest extent of internal attack was observed for co-processing with the least stabilized bio-oil, and more so for types 409, 410, 304L, 316L, 317L stainless steel than for type 201. Finally, the internal attack involved porous Cr-rich oxide formation, associated with local Ni-metal enrichment and S-rich nanoparticles, primarily containing Cr or Mn. Implications for alloy selection and corrosion are discussed.« less

  11. Corrosion of stainless steels in the riser during co-processing of bio-oils in a fluid catalytic cracking pilot plant

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Brady, M. P.; Keiser, J. R.; Leonard, D. N.

    Co-processing of bio-oils with conventional petroleum-based feedstocks is an attractive initial option to make use of renewable biomass as a fuel source while leveraging existing refinery infrastructures. But, bio-oils and their processing intermediates have high concentrations of organic oxygenates, which, among their other negative qualities, can result in increased corrosion issues. A range of stainless steel alloys (409, 410, 304L, 316L, 317L, and 201) was exposed at the base of the riser in a fluid catalytic cracking pilot plant while co-processing vacuum gas oil with pine-derived pyrolysis bio-oils that had been catalytically hydrodeoxygenated to ~ 2 to 28% oxygen. Wemore » studied the processing using a catalyst temperature of 704 °C, a reaction exit temperature of 520 °C, and total co-processing run times of 57–75 h. External oxide scaling 5–30 μm thick and internal attack 1–5 μm deep were observed in these short-duration exposures. The greatest extent of internal attack was observed for co-processing with the least stabilized bio-oil, and more so for types 409, 410, 304L, 316L, 317L stainless steel than for type 201. Finally, the internal attack involved porous Cr-rich oxide formation, associated with local Ni-metal enrichment and S-rich nanoparticles, primarily containing Cr or Mn. Implications for alloy selection and corrosion are discussed.« less

  12. Analysis of characteristics associated with reinjection of icatibant: Results from the icatibant outcome survey.

    PubMed

    Longhurst, Hilary J; Aberer, Werner; Bouillet, Laurence; Caballero, Teresa; Fabien, Vincent; Zanichelli, Andrea; Maurer, Marcus

    2015-01-01

    Phase 3 icatibant trials showed that most hereditary angioedema (HAE) (C1 inhibitor deficiency) acute attacks were treated successfully with one injection of icatibant, a selective bradykinin B2 receptor antagonist. We conducted a post hoc analysis of icatibant reinjection for HAE type I and II attacks in a real-world setting by using data from the Icatibant Outcome Survey, an ongoing observational study that monitors the safety and effectiveness of icatibant treatment. Descriptive retrospective analyses of icatibant reinjection were performed on Icatibant Outcome Survey data (February 2008 to December 2012). New attacks were defined as the onset of new symptoms after full resolution of the previous attack. Potential associations between the patient and attack characteristics and reinjection were explored by using logistic regression analysis. Icatibant was administered for 652 attacks in 170 patients with HAE type I or II. Most attacks (89.1%) were treated with a single icatibant injection. For attacks that required two or three injections, the second injection was given a median of 11.0 hours after the first injection, with 90.4% of second injections administered ≥6 hours after the first injection. Time to resolution and attack duration were significantly longer for two or three injections versus one icatibant injection (p < 0.0001 and p < 0.05, respectively). Multivariate logistic regression analysis identified sex, attack severity, and laryngeal attacks as significantly correlated with reinjection (all p ≤ 0.05). These factors did not remain predictors for reinjection when two outlier patients with distinct patterns of icatibant use were excluded. In this real-world setting, most HAE attacks resolved with one icatibant injection. There was no distinct profile for patients or attacks that required reinjection when outliers with substantially different patterns of use were excluded. Because new attacks were not distinguished from the recurrence of symptoms, reinjection rates may be slightly higher than shown here. Clinical trial identifier: NCT01034969.

  13. Enhanced diffie-hellman algorithm for reliable key exchange

    NASA Astrophysics Data System (ADS)

    Aryan; Kumar, Chaithanya; Vincent, P. M. Durai Raj

    2017-11-01

    The Diffie -Hellman is one of the first public-key procedure and is a certain way of exchanging the cryptographic keys securely. This concept was introduced by Ralph Markel and it is named after Whitfield Diffie and Martin Hellman. Sender and Receiver make a common secret key in Diffie-Hellman algorithm and then they start communicating with each other over the public channel which is known to everyone. A number of internet services are secured by Diffie -Hellman. In Public key cryptosystem, the sender has to trust while receiving the public key of the receiver and vice-versa and this is the challenge of public key cryptosystem. Man-in-the-Middle attack is very much possible on the existing Diffie-Hellman algorithm. In man-in-the-middle attack, the attacker exists in the public channel, the attacker receives the public key of both sender and receiver and sends public keys to sender and receiver which is generated by his own. This is how man-in-the-middle attack is possible on Diffie-Hellman algorithm. Denial of service attack is another attack which is found common on Diffie-Hellman. In this attack, the attacker tries to stop the communication happening between sender and receiver and attacker can do this by deleting messages or by confusing the parties with miscommunication. Some more attacks like Insider attack, Outsider attack, etc are possible on Diffie-Hellman. To reduce the possibility of attacks on Diffie-Hellman algorithm, we have enhanced the Diffie-Hellman algorithm to a next level. In this paper, we are extending the Diffie -Hellman algorithm by using the concept of the Diffie -Hellman algorithm to get a stronger secret key and that secret key is further exchanged between the sender and the receiver so that for each message, a new secret shared key would be generated. The second secret key will be generated by taking primitive root of the first secret key.

  14. The panic attack-posttraumatic stress disorder model: applicability to orthostatic panic among Cambodian refugees.

    PubMed

    Hinton, Devon E; Hofmann, Stefan G; Pitman, Roger K; Pollack, Mark H; Barlow, David H

    2008-01-01

    This article examines the ability of the panic attack-posttraumatic stress disorder (PTSD) model to predict how panic attacks are generated and how panic attacks worsen PTSD. The article does so by determining the validity of the panic attack-PTSD model in respect to one type of panic attack among traumatized Cambodian refugees: orthostatic panic (OP) attacks (i.e. panic attacks generated by moving from lying or sitting to standing). Among Cambodian refugees attending a psychiatric clinic, the authors conducted two studies to explore the validity of the panic attack-PTSD model as applied to OP patients (i.e. patients with at least one episode of OP in the previous month). In Study 1, the panic attack-PTSD model accurately indicated how OP is seemingly generated: among OP patients (N = 58), orthostasis-associated flashbacks and catastrophic cognitions predicted OP severity beyond a measure of anxious-depressive distress (Symptom Checklist-90-R subscales), and OP severity significantly mediated the effect of anxious-depressive distress on Clinician-Administered PTSD Scale severity. In Study 2, as predicted by the panic attack-PTSD model, OP had a mediational role in respect to the effect of treatment on PTSD severity: among Cambodian refugees with PTSD and comorbid OP who participated in a cognitive behavioural therapy study (N = 56), improvement in PTSD severity was partially mediated by improvement in OP severity.

  15. Epileptic negative drop attacks in atypical benign partial epilepsy: a neurophysiological study.

    PubMed

    Hirano, Yoshiko; Oguni, Hirokazu; Osawa, Makiko

    2009-03-01

    We conducted a computer-assisted polygraphic analysis of drop attacks in a child with atypical benign partial epilepsy (ABPE) to investigate neurophysiological characteristics. The patient was a six-year two-month-old girl, who had started to have focal motor seizures, later combined with daily epileptic negative myoclonus (ENM) and drop attacks, causing multiple injuries. We studied episodes of ENM and drop attacks using video-polygraphic and computer-assisted back-averaging analysis. A total of 12 ENM episodes, seven involving the left arm (ENMlt) and five involving both arms (ENMbil), and five drop attacks were captured for analysis. All episodes were time-locked to spike-and-wave complexes (SWC) arising from both centro-temporo-parietal (CTP) areas. The latency between the onset of SWC and ENMlt, ENMbil, and drop attacks reached 68 ms, 42 ms, and 8 ms, respectively. The height of the spike as well as the slow-wave component of SWC for drop attacks were significantly larger than that for both ENMlt and ENMbil (p < 0.05). Drop attacks were considered to be epileptic negative myoclonus involving not only upper proximal but also axial muscles, causing the body to fall. Thus, drop attacks in ABPE are considered to be epileptic negative drop attacks arising from bilateral CTP foci and differ from drop attacks of a generalized origin seen in Lennox-Gastaut syndrome and myoclonic-astatic epilepsy.

  16. Seven Deadliest Network Attacks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Prowell, Stacy J; Borkin, Michael; Kraus, Robert

    2010-05-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you need "Seven Deadliest Network Attacks". This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Denial of Service; War Dialing; Penetration 'Testing'; Protocol Tunneling; Spanning Tree Attacks; Man-in-the-Middle; and, Password Replay. Knowledge is power, findmore » out about the most dominant attacks currently waging war on computers and networks globally. Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how. Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable.« less

  17. Dynamic defense and network randomization for computer systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chavez, Adrian R.; Stout, William M. S.; Hamlet, Jason R.

    The various technologies presented herein relate to determining a network attack is taking place, and further to adjust one or more network parameters such that the network becomes dynamically configured. A plurality of machine learning algorithms are configured to recognize an active attack pattern. Notification of the attack can be generated, and knowledge gained from the detected attack pattern can be utilized to improve the knowledge of the algorithms to detect a subsequent attack vector(s). Further, network settings and application communications can be dynamically randomized, wherein artificial diversity converts control systems into moving targets that help mitigate the early reconnaissancemore » stages of an attack. An attack(s) based upon a known static address(es) of a critical infrastructure network device(s) can be mitigated by the dynamic randomization. Network parameters that can be randomized include IP addresses, application port numbers, paths data packets navigate through the network, application randomization, etc.« less

  18. Education and non-pharmacological approaches for gout.

    PubMed

    Abhishek, Abhishek; Doherty, Michael

    2018-01-01

    The objectives of this review are as follows: to highlight the gaps in patient and physician knowledge of gout and how this might impede optimal disease management; to provide recommended core knowledge points that should be conveyed to people with gout; and to review non-pharmacological interventions that can be used in gout management. MeSH terms were used to identify eligible studies examining patients' and health-care professionals' knowledge about gout and its management. A narrative review of non-pharmacological management of gout is provided. Many health-care professionals have significant gaps in their knowledge about gout that have the potential to impede optimal management. Likewise, people with gout and the general population lack knowledge about causes, consequences and treatment of this condition. Full explanation about gout, including the potential benefits of urate-lowering treatment (ULT), motivates people with gout to want to start such treatment, and there is evidence, albeit limited, that educational interventions can improve uptake and adherence to ULT. Additionally, several non-pharmacological approaches, such as rest and topical ice application for acute attacks, avoidance of risk factors that can trigger acute attacks, and dietary interventions that may reduce gout attack frequency (e.g. cherry or cherry juice extract, skimmed milk powder or omega-3 fatty acid intake) or lower serum uric acid (e.g. vitamin C), can be used as adjuncts to ULT. There is a pressing need to educate health-care professionals, people with gout and society at large to remove the negative stereotypes associated with gout, which serve as barriers to optimal gout management, and to perceive gout as a significant medical condition. Moreover, there is a paucity of high-quality trial evidence on whether certain simple individual dietary and lifestyle factors can reduce the risk of recurrent gout attacks, and further studies are required in this field. © The Author 2018. Published by Oxford University Press on behalf of the British Society for Rheumatology. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  19. Automatic Inference of Cryptographic Key Length Based on Analysis of Proof Tightness

    DTIC Science & Technology

    2016-06-01

    within an attack tree structure, then expand attack tree methodology to include cryptographic reductions. We then provide the algorithms for...maintaining and automatically reasoning about these expanded attack trees . We provide a software tool that utilizes machine-readable proof and attack metadata...and the attack tree methodology to provide rapid and precise answers regarding security parameters and effective security. This eliminates the need

  20. Cyber Signal/Noise Characteristics and Sensor Models for Early Cyber Indications and Warning

    DTIC Science & Technology

    2005-09-01

    investigating and simulating attack scenarios. The sensors are, in effect , mathematical functions. These functions range from simple functions of...172 8.1.2 Examine each attack scenario or case to derive the cause- effect network for the attack scenario...threat profiles............................ 174 8.1.4 Develop attack profiles by enlarging the cause- effect network of each attack scenario with

  1. Attack Coverage in High-Level Men’s Volleyball: Organization on the Edge of Chaos?

    PubMed Central

    Laporta, Lorenzo; Nikolaidis, Pantelis; Thomas, Luke; Afonso, José

    2015-01-01

    Change is pervasive, but emerging patterns are occasionally detectable through analysis of systemic behaviors. Match analysis uses these patterns in order to reduce the degree of improvisation and to optimize the training process. However, it is possible that certain game phases elude systematic patterning. In this vein, our aim was to analyze the case of attack coverage in men’s volleyball, as we suspected it would elude systematic patterning and has received negligible attention in scientific research. We analyzed the occurrence of attack coverage in 4544 plays of the 2011 Volleyball World League. A Chi-square test with residual adjusted values was applied to explore significant associations between variables. A Monte Carlo correction was applied, as some cells had n<5. Effect sizes were determined using Cramer’s V. Overall, attack coverage occurred in 3.89% of ball possessions, and 23 distinct structures emerged. These structures lacked significant associations with the game complex, setting zone, and effect of attack coverage. Conversely, attack coverage structures showed significant associations with the attack zone and tempo, with very strong effect sizes (V=0.472 and V=0.521, respectively). As certain attack zones are deeply associated with attack tempo, it is apparent that quicker attack plays affect attack coverage structuring, promoting the formation of less complex structures. Ultimately, attack coverage structures seem to depend on momentary constraints, thereby rendering rigid systematization impracticable. Still, we contended that a principle-based approach might be suitable. This invites researchers to rethink how to interpret game regularities. PMID:26557208

  2. Randomness determines practical security of BB84 quantum key distribution.

    PubMed

    Li, Hong-Wei; Yin, Zhen-Qiang; Wang, Shuang; Qian, Yong-Jun; Chen, Wei; Guo, Guang-Can; Han, Zheng-Fu

    2015-11-10

    Unconditional security of the BB84 quantum key distribution protocol has been proved by exploiting the fundamental laws of quantum mechanics, but the practical quantum key distribution system maybe hacked by considering the imperfect state preparation and measurement respectively. Until now, different attacking schemes have been proposed by utilizing imperfect devices, but the general security analysis model against all of the practical attacking schemes has not been proposed. Here, we demonstrate that the general practical attacking schemes can be divided into the Trojan horse attack, strong randomness attack and weak randomness attack respectively. We prove security of BB84 protocol under randomness attacking models, and these results can be applied to guarantee the security of the practical quantum key distribution system.

  3. Attacks by jaguars (Panthera onca) on humans in central Brazil: report of three cases, with observation of a death.

    PubMed

    Neto, Manoel Francisco Campos; Garrone Neto, Domingos; Haddad, Vidal

    2011-06-01

    Conflicts between humans and big cats have been known for centuries throughout the world, but have intensified in recent decades. Recently, attacks by Panthera onca on humans in Brazil have been brought to the forefront through exposure in the press and because of the severity of the attacks. We report 3 cases of patients attacked by jaguars in provoked and predatory situations. Two patients survived the attacks and one died. Attack mechanisms and lesions in victims are discussed. The attacks demonstrate a real risk of accidents from jaguars in certain regions, such as the Pantanal and the Amazon. Copyright © 2011 Wilderness Medical Society. Published by Elsevier Inc. All rights reserved.

  4. Randomness determines practical security of BB84 quantum key distribution

    PubMed Central

    Li, Hong-Wei; Yin, Zhen-Qiang; Wang, Shuang; Qian, Yong-Jun; Chen, Wei; Guo, Guang-Can; Han, Zheng-Fu

    2015-01-01

    Unconditional security of the BB84 quantum key distribution protocol has been proved by exploiting the fundamental laws of quantum mechanics, but the practical quantum key distribution system maybe hacked by considering the imperfect state preparation and measurement respectively. Until now, different attacking schemes have been proposed by utilizing imperfect devices, but the general security analysis model against all of the practical attacking schemes has not been proposed. Here, we demonstrate that the general practical attacking schemes can be divided into the Trojan horse attack, strong randomness attack and weak randomness attack respectively. We prove security of BB84 protocol under randomness attacking models, and these results can be applied to guarantee the security of the practical quantum key distribution system. PMID:26552359

  5. Randomness determines practical security of BB84 quantum key distribution

    NASA Astrophysics Data System (ADS)

    Li, Hong-Wei; Yin, Zhen-Qiang; Wang, Shuang; Qian, Yong-Jun; Chen, Wei; Guo, Guang-Can; Han, Zheng-Fu

    2015-11-01

    Unconditional security of the BB84 quantum key distribution protocol has been proved by exploiting the fundamental laws of quantum mechanics, but the practical quantum key distribution system maybe hacked by considering the imperfect state preparation and measurement respectively. Until now, different attacking schemes have been proposed by utilizing imperfect devices, but the general security analysis model against all of the practical attacking schemes has not been proposed. Here, we demonstrate that the general practical attacking schemes can be divided into the Trojan horse attack, strong randomness attack and weak randomness attack respectively. We prove security of BB84 protocol under randomness attacking models, and these results can be applied to guarantee the security of the practical quantum key distribution system.

  6. A Novel Network Attack Audit System based on Multi-Agent Technology

    NASA Astrophysics Data System (ADS)

    Jianping, Wang; Min, Chen; Xianwen, Wu

    A network attack audit system which includes network attack audit Agent, host audit Agent and management control center audit Agent is proposed. And the improved multi-agent technology is carried out in the network attack audit Agent which has achieved satisfactory audit results. The audit system in terms of network attack is just in-depth, and with the function improvement of network attack audit Agent, different attack will be better analyzed and audit. In addition, the management control center Agent should manage and analyze audit results from AA (or HA) and audit data on time. And the history files of network packets and host log data should also be audit to find deeper violations that cannot be found in real time.

  7. Extended Password Recovery Attacks against APOP, SIP, and Digest Authentication

    NASA Astrophysics Data System (ADS)

    Sasaki, Yu; Wang, Lei; Ohta, Kazuo; Kunihiro, Noboru

    In this paper, we propose password recovery attacks against challenge-response authentication protocols. Our attacks use a message difference for a MD5 collision attack proposed in IEICE 2008. First, we show how to efficiently find a message pair that collides with the above message difference. Second, we show that a password used in authenticated post office protocol (APOP) can be recovered practically. We also show that the password recovery attack can be applied to a session initiation protocol (SIP) and digest authentication. Our attack can recover up to the first 31 password characters in a short time and up to the first 60 characters faster than the naive search method. We have implemented our attack and confirmed that 31 characters can be successfully recovered.

  8. Percolation of localized attack on complex networks

    NASA Astrophysics Data System (ADS)

    Shao, Shuai; Huang, Xuqing; Stanley, H. Eugene; Havlin, Shlomo

    2015-02-01

    The robustness of complex networks against node failure and malicious attack has been of interest for decades, while most of the research has focused on random attack or hub-targeted attack. In many real-world scenarios, however, attacks are neither random nor hub-targeted, but localized, where a group of neighboring nodes in a network are attacked and fail. In this paper we develop a percolation framework to analytically and numerically study the robustness of complex networks against such localized attack. In particular, we investigate this robustness in Erdős-Rényi networks, random-regular networks, and scale-free networks. Our results provide insight into how to better protect networks, enhance cybersecurity, and facilitate the design of more robust infrastructures.

  9. Face liveness detection for face recognition based on cardiac features of skin color image

    NASA Astrophysics Data System (ADS)

    Suh, Kun Ha; Lee, Eui Chul

    2016-07-01

    With the growth of biometric technology, spoofing attacks have been emerged a threat to the security of the system. Main spoofing scenarios in the face recognition system include the printing attack, replay attack, and 3D mask attack. To prevent such attacks, techniques that evaluating liveness of the biometric data can be considered as a solution. In this paper, a novel face liveness detection method based on cardiac signal extracted from face is presented. The key point of proposed method is that the cardiac characteristic is detected in live faces but not detected in non-live faces. Experimental results showed that the proposed method can be effective way for determining printing attack or 3D mask attack.

  10. Hereditary Angioedema Attacks: Local Swelling at Multiple Sites.

    PubMed

    Hofman, Zonne L M; Relan, Anurag; Hack, C Erik

    2016-02-01

    Hereditary angioedema (HAE) patients experience recurrent local swelling in various parts of the body including painful swelling of the intestine and life-threatening laryngeal oedema. Most HAE literature is about attacks located in one anatomical site, though it is mentioned that HAE attacks may also involve multiple anatomical sites simultaneously. A detailed description of such multi-location attacks is currently lacking. This study investigated the occurrence, severity and clinical course of HAE attacks with multiple anatomical locations. HAE patients included in a clinical database of recombinant human C1-inhibitor (rhC1INH) studies were evaluated. Visual analog scale scores filled out by the patients for various symptoms at various locations and investigator symptoms scores during the attack were analysed. Data of 219 eligible attacks in 119 patients was analysed. Thirty-three patients (28%) had symptoms at multiple locations in anatomically unrelated regions at the same time during their first attack. Up to five simultaneously affected locations were reported. The observation that severe HAE attacks often affect multiple sites in the body suggests that HAE symptoms result from a systemic rather than from a local process as is currently believed.

  11. Tobacco control advocates must demand high-quality media campaigns: the California experience.

    PubMed

    Balbach, E D; Glantz, S A

    1998-01-01

    To document efforts on the part of public officials in California to soften the media campaign's attack on the tobacco industry and to analyse strategies to counter those efforts on the part of tobacco control advocates. Data were gathered from interviews with programme participants, direct observation, written materials, and media stories. In addition, internal documents were released by the state's Department of Health Services in response to requests made under the California Public Records Act by Americans for Nonsmokers' Rights. Finally, a draft of the paper was circulated to 11 key players for their comments. In 1988 california voters enacted Proposition 99, an initiative that raised the tobacco tax by $0.25 and allocated 20% of the revenues to anti-tobacco education. A media campaign, which was part of the education programme, directly attacked the tobacco industry, exposing the media campaign to politically based efforts to shut it down or soften it. Through use of outsider strategies such as advertising, press conferences, and public meetings, programme advocates were able to counter the efforts to soften the campaign. Anti-tobacco media campaigns that expose industry manipulation are a key component of an effective tobacco control programme. The effectiveness of these campaigns, however, makes them a target for elimination by the tobacco industry. The experience from California demonstrates the need for continuing, aggressive intervention by nongovernmental organisations in order to maintain the quality of anti-tobacco media campaigns.

  12. Heart Attack or Sudden Cardiac Arrest: How Are They Different?

    MedlinePlus

    ... Peripheral Artery Disease Venous Thromboembolism Aortic Aneurysm More Heart Attack or Sudden Cardiac Arrest: How Are They Different? ... and procedures related to heart disease and stroke. Heart Attack • Home • About Heart Attacks Acute Coronary Syndrome (ACS) ...

  13. Risk Management

    DTIC Science & Technology

    2011-06-02

    actively attack the risks, they will actively attack you.” -Tom Gib Why do Risk Management? 8 “The first step in the risk management process is to...opportunities to manage and improve our chances of success. - Roger Vanscoy “If you do not actively attack the risks, they will actively attack ...our risks provides opportunities to manage and improve our chances of success. - Roger Vanscoy “If you do not actively attack the risks, they will

  14. Experimental implementation of non-Gaussian attacks on a continuous-variable quantum-key-distribution system.

    PubMed

    Lodewyck, Jérôme; Debuisschert, Thierry; García-Patrón, Raúl; Tualle-Brouri, Rosa; Cerf, Nicolas J; Grangier, Philippe

    2007-01-19

    An intercept-resend attack on a continuous-variable quantum-key-distribution protocol is investigated experimentally. By varying the interception fraction, one can implement a family of attacks where the eavesdropper totally controls the channel parameters. In general, such attacks add excess noise in the channel, and may also result in non-Gaussian output distributions. We implement and characterize the measurements needed to detect these attacks, and evaluate experimentally the information rates available to the legitimate users and the eavesdropper. The results are consistent with the optimality of Gaussian attacks resulting from the security proofs.

  15. DOE Office of Scientific and Technical Information (OSTI.GOV)

    John Homer; Ashok Varikuti; Xinming Ou

    Various tools exist to analyze enterprise network systems and to produce attack graphs detailing how attackers might penetrate into the system. These attack graphs, however, are often complex and difficult to comprehend fully, and a human user may find it problematic to reach appropriate configuration decisions. This paper presents methodologies that can 1) automatically identify portions of an attack graph that do not help a user to understand the core security problems and so can be trimmed, and 2) automatically group similar attack steps as virtual nodes in a model of the network topology, to immediately increase the understandability ofmore » the data. We believe both methods are important steps toward improving visualization of attack graphs to make them more useful in configuration management for large enterprise networks. We implemented our methods using one of the existing attack-graph toolkits. Initial experimentation shows that the proposed approaches can 1) significantly reduce the complexity of attack graphs by trimming a large portion of the graph that is not needed for a user to understand the security problem, and 2) significantly increase the accessibility and understandability of the data presented in the attack graph by clearly showing, within a generated visualization of the network topology, the number and type of potential attacks to which each host is exposed.« less

  16. On resilience studies of system detection and recovery techniques against stealthy insider attacks

    NASA Astrophysics Data System (ADS)

    Wei, Sixiao; Zhang, Hanlin; Chen, Genshe; Shen, Dan; Yu, Wei; Pham, Khanh D.; Blasch, Erik P.; Cruz, Jose B.

    2016-05-01

    With the explosive growth of network technologies, insider attacks have become a major concern to business operations that largely rely on computer networks. To better detect insider attacks that marginally manipulate network traffic over time, and to recover the system from attacks, in this paper we implement a temporal-based detection scheme using the sequential hypothesis testing technique. Two hypothetical states are considered: the null hypothesis that the collected information is from benign historical traffic and the alternative hypothesis that the network is under attack. The objective of such a detection scheme is to recognize the change within the shortest time by comparing the two defined hypotheses. In addition, once the attack is detected, a server migration-based system recovery scheme can be triggered to recover the system to the state prior to the attack. To understand mitigation of insider attacks, a multi-functional web display of the detection analysis was developed for real-time analytic. Experiments using real-world traffic traces evaluate the effectiveness of Detection System and Recovery (DeSyAR) scheme. The evaluation data validates the detection scheme based on sequential hypothesis testing and the server migration-based system recovery scheme can perform well in effectively detecting insider attacks and recovering the system under attack.

  17. Impact of Tumarkin attacks on complaints and work ability in Ménière's disease.

    PubMed

    Pyykkö, Ilmari; Manchaiah, Vinaya; Zou, Jing; Levo, Hilla; Kentala, Erna

    2018-05-22

    The purpose of the present study was to characterize the occurrence of Tumarkin attacks in patients with Ménière'sdisease (MD), and to study its association with reported complaints, severity of consequences, and also self-reported work ability. The study used a cross-sectional design. Data obtained from the Finnish Ménière Federation using an electronic survey was analyzed. 602 people with MD responded to the survey (62% response rate) with a mean age of 56.7 years and a mean duration of the disease 12.4 years. 49% of the respondents experienced Tumarkin attacks, which lasted for a few seconds to a few minutes. There were significant differences in complaints reported by MD patients with and without Tumarkin attacks. Respondents with Tumarkin attacks experienced various consequences, including tripping, falls, fear, anxiety, problems in dyadic life, and even transient loss of consciousness. Respondents with Tumarkin attacks had more frequently applied for pension than those not having Tumarkin attacks. On an average, respondents with Tumarkin attacks had less self-reported working ability when compared to those without Tumarkin attacks. The current study results suggest various differences in terms of complaints reported, severity of consequences, and the self-reported working ability in MD patients with and without Tumarkin attacks. Hearing healthcare professionals must examine Tumarkin attacks and their consequences in patients with MD during clinical examinations. In addition, the therapy should focus on alleviating the consequences and improving work ability.

  18. Netwar

    NASA Astrophysics Data System (ADS)

    Keen, Arthur A.

    2006-04-01

    This paper describes technology being developed at 21st Century Technologies to automate Computer Network Operations (CNO). CNO refers to DoD activities related to Attacking and Defending Computer Networks (CNA & CND). Next generation cyber threats are emerging in the form of powerful Internet services and tools that automate intelligence gathering, planning, testing, and surveillance. We will focus on "Search-Engine Hacks", queries that can retrieve lists of router/switch/server passwords, control panels, accessible cameras, software keys, VPN connection files, and vulnerable web applications. Examples include "Titan Rain" attacks against DoD facilities and the Santy worm, which identifies vulnerable sites by searching Google for URLs containing application-specific strings. This trend will result in increasingly sophisticated and automated intelligence-driven cyber attacks coordinated across multiple domains that are difficult to defeat or even understand with current technology. One traditional method of CNO relies on surveillance detection as an attack predictor. Unfortunately, surveillance detection is difficult because attackers can perform search engine-driven surveillance such as with Google Hacks, and avoid touching the target site. Therefore, attack observables represent only about 5% of the attacker's total attack time, and are inadequate to provide warning. In order to predict attacks and defend against them, CNO must also employ more sophisticated techniques and work to understand the attacker's Motives, Means and Opportunities (MMO). CNO must use automated reconnaissance tools, such as Google, to identify information vulnerabilities, and then utilize Internet tools to observe the intelligence gathering, planning, testing, and collaboration activities that represent 95% of the attacker's effort.

  19. Securing internet by eliminating DDOS attacks

    NASA Astrophysics Data System (ADS)

    Niranchana, R.; Gayathri Devi, N.; Santhi, H.; Gayathri, P.

    2017-11-01

    The major threat caused to the authorised usage of Internet is Distributed Denial of Service attack. The mechanisms used to prevent the DDoS attacks are said to overcome the attack’s ability in spoofing the IP packets source addresses. By utilising Internet Protocol spoofing, the attackers cause a consequential load over the networks destination for policing attack packets. To overcome the IP Spoofing level on the Internet, We propose an Inter domain Packet Filter (IPF) architecture. The proposed scheme is not based on global routing information. The packets with reliable source addresses are not rejected, the IPF frame work works in such a manner. The spoofing capability of attackers is confined by IPF, and also the filter identifies the source of an attack packet by minimal number of candidate network.

  20. Monitoring the Attack Incidences and Damage Caused by the Almond Bark Beetle, Scolytus amygdali, in Almond Orchards

    PubMed Central

    Cuthbertson, Andrew G. S.; Braham, Mohamed

    2018-01-01

    The almond bark beetle, Scolytus amygdali Geurin-Meneville, is responsible for significant loss of fruit production in almond orchards throughout the world. Here, we studied the damage and the incidences of S. amygdali attack on two different scales: (1) at the level of a single tree; and (2) in an entire orchard. Our results revealed no differences in attack level among four orientations (east, west, south and north sides) for the whole tree. However, the bark that was facing west side in the direction of the prevailing wind was found to be the most suitable for females to initiate attack in Stratum S2. Attack distribution remains the same among different strata (strata is vertical divisions of the tree from the ground to the uppermost twigs with ~40 cm intervals). More than 50% of attack was observed in the trunk of the tree and upper strata. However, multiplication rate (number of emerged adults/maternal gallery) varies significantly between strata. In addition, we studied attack intensity (holes produced by beetle per tree) comparing it to tree morphology (flowers, leaves and circumferences) and gum deposit. Our results revealed a positive correlation between attack intensity and gum deposits, and a negative correlation between attack intensity and tree morphology. This revealed that gum on the tree was an indicator for attack intensity. A positive correlation between attack intensity and the circumference of the tree revealed that older trees were more susceptible to S. amygdali attack. These results, while preliminary, aim to help in the monitoring of S. amygdali populations before deciding to apply any control measures. PMID:29301271

  1. On the IDAGAM I Combat Model.

    DTIC Science & Technology

    1977-06-01

    defense missions in locations between the FEBA and the attackers’ targets; b) AAA can attack only aircraft attacking the guns them- selves or the targets...the guns are defending; c) SAM weapon systems can attack not only aircraft attack- ing them and the targets they defend but also, although possibly...Corporation), P.E. Louer (Department of the Army) and B.R. McEnany (Joint Chiefs of Staff/Studies, Analysis and Gaming Agency) for their help- ful

  2. Terror attacks influence driving behavior in Israel

    PubMed Central

    Stecklov, Guy; Goldstein, Joshua R.

    2004-01-01

    Terror attacks in Israel produce a temporary lull in light accidents followed by a 35% spike in fatal accidents on Israeli roads 3 days after the attack. Our results are based on time-series analysis of Israeli traffic flows, accidents, and terror attacks from January 2001 through June 2002. Whereas prior studies have focused on subjective reports of posttraumatic stress, our study shows a population-level behavioral response to violent terror attacks. PMID:15448203

  3. Childhood Internalizing and Externalizing Problems Predict the Onset of Clinical Panic Attacks over Adolescence: The TRAILS Study

    PubMed Central

    Mathyssek, Christina M.; Olino, Thomas M.; Verhulst, Frank C.; van Oort, Floor V. A.

    2012-01-01

    Background Panic attacks are a source of individual suffering and are an independent risk factor for later psychopathology. However, much less is known about risk factors for the development of panic attacks, particularly during adolescence when the incidence of panic attacks increases dramatically. We examined whether internalizing and externalizing problems in childhood predict the onset of panic attacks in adolescence. Method This study is part of the TRacking Adolescents’ Individual Lives Survey (TRAILS), a Dutch longitudinal population cohort study (N = 1,584). Internalizing and Externalizing Problems were collected using the Youth Self-Report (YSR) and the parent-report Child Behavior Checklist (CBCL) at baseline (age 10–12). At age 18–20, DSM-IV defined panic attacks since baseline were assessed with the Composite International Diagnostic Interview (CIDI). We investigated whether early adolescent Internalizing and Externalizing Problems predicted panic attacks between ages 10–20 years, using survival analysis in univariate and multivariate models. Results There were N = 314 (19.8%) cases who experienced at least one DSM-IV defined panic attack during adolescence and N = 18 (1.2%) who developed panic disorder during adolescence. In univariate analyses, CBCL Total Problems, Internalizing Problems and three of the eight syndrome scales predicted panic attack onset, while on the YSR all broad-band problem scales and each narrow-band syndrome scale predicted panic attack onset. In multivariate analyses, CBCL Social Problems (HR 1.19, p<.05), and YSR Thought Problems (HR 1.15, p<.05) and Social Problems (HR 1.26, p<.01) predicted panic attack onset. Conclusion Risk indicators of panic attack include the wide range of internalizing and externalizing problems. Yet, when adjusted for co-occurring problem behaviors, Social Problems were the most consistent risk factor for panic attack onsets in adolescence. PMID:23251576

  4. Effectiveness of icatibant for treatment of hereditary angioedema attacks is not affected by body weight: findings from the Icatibant Outcome Survey, a cohort observational study.

    PubMed

    Caballero, Teresa; Zanichelli, Andrea; Aberer, Werner; Maurer, Marcus; Longhurst, Hilary J; Bouillet, Laurence; Andresen, Irmgard

    2018-01-01

    Icatibant is a bradykinin B2-receptor antagonist used for the treatment of hereditary angioedema attacks resulting from C1-inhibitor deficiency. Treatment is not adjusted by body weight however the impact of body mass index (BMI) on the effectiveness of icatibant is not documented in the literature. We examined disease characteristics and icatibant treatment effectiveness in patients stratified by BMI in the Icatibant Outcome Survey, an ongoing, international, observational study monitoring the real-world safety and effectiveness of icatibant. Attack and treatment characteristics as well as outcomes following treatment with icatibant were compared among patients with underweight, normal, overweight, and obese BMI. Data from 2697 icatibant-treated attacks in 342 patients (3.5, 44.7, 34.8, and 17.0% patients of underweight, normal, overweight, and obese BMI, respectively) were analyzed. There was no significant difference in the frequency and severity of attacks across BMI groups, although obese patients tended to have more attacks of high severity. There was no impact of BMI on the frequency of laryngeal attacks, but patients with normal BMI had fewer cutaneous attacks and more abdominal attacks. Most attacks (71.9-83.8%) were treated with a single icatibant injection without the need for rescue with plasma-derived C1-inhibitor (pdC1-INH), regardless of BMI. Patients with obese BMI used pdC1-INH as rescue treatment more often (P < 0.0001; P = 0.0232 excluding 2 outliers) and treated attacks earlier than patients with normal BMI (P = 0.007). Furthermore, time to resolution and duration of attack were shorter for patients with high BMI (P < 0.001 for overweight and P < 0.05 for obese versus normal). Overall, icatibant was comparatively effective in treating attacks in patients across all BMI groups. Trial registration NCT01034969.

  5. Somatic panic-attack equivalents in a community sample of Rwandan widows who survived the 1994 genocide

    PubMed Central

    Hagengimana, Athanase; Hinton, Devon; Bird, Bruce; Pollack, Mark; Pitman, Roger K.

    2009-01-01

    The present study is the first to attempt to determine rates of panic attacks, especially ‘somatically focused’ panic attacks, panic disorder, symptoms of post-traumatic stress disorder (PTSD), and depression levels in a population of Rwandans traumatized by the 1994 genocide. The following measures were utilized: the Rwandan Panic-Disorder Survey (RPDS); the Beck Depression Inventory (BDI); the Harvard Trauma Questionnaire (HTQ); and the PTSD Checklist (PCL). Forty of 100 Rwandan widows suffered somatically focused panic attacks during the previous 4 weeks. Thirty-five (87%) of those having panic attacks suffered panic disorder, making the rate of panic disorder for the entire sample 35%. Rwandan widows with panic attacks had greater psychopathology on all measures. Somatically focused panic-attack subtypes seem to constitute a key response to trauma in the Rwandan population. Future studies of traumatized non-Western populations should carefully assess not only somatoform disorder but also somatically focused panic attacks. PMID:12581815

  6. Sub-threshold panic attacks and agoraphobic avoidance increase comorbidity of mental disorders: results from an adult general population sample.

    PubMed

    Pané-Farré, Christiane A; Fenske, Kristin; Stender, Jan P; Meyer, Christian; John, Ulrich; Rumpf, Hans-Jürgen; Hapke, Ulfert; Hamm, Alfons O

    2013-06-01

    Full-blown panic attacks are frequently associated with other mental disorders. Most comorbidity analyses did not discriminate between isolated panic attacks vs. panic attacks that occurred in the context of a panic disorder and rarely evaluated the impact of comorbid agoraphobia. Moreover, there are no larger scale epidemiological studies regarding the influence of sub-threshold panic attacks. 4075 German-speaking respondents aged 18-64 were interviewed using the fully structured Munich Composite International Diagnostic Interview. Limited symptom attacks, isolated panic attacks, and panic disorder were associated with other lifetime DSM-IV disorders with monotonically increasing odds and increasing tendency for multiple comorbidities across the three groups. The presence of agoraphobia was associated with more frequent comorbidity in all panic subgroups and also in persons who never experienced panic attacks. The present study suggests that populations with isolated or limited symptom should be carefully attended to in clinical practice, especially if agoraphobia is present. Copyright © 2013 Elsevier Ltd. All rights reserved.

  7. Context aware adaptive security service model

    NASA Astrophysics Data System (ADS)

    Tunia, Marcin A.

    2015-09-01

    Present systems and devices are usually protected against different threats concerning digital data processing. The protection mechanisms consume resources, which are either highly limited or intensively utilized by many entities. The optimization of these resources usage is advantageous. The resources that are saved performing optimization may be utilized by other mechanisms or may be sufficient for longer time. It is usually assumed that protection has to provide specific quality and attack resistance. By interpreting context situation of business services - users and services themselves, it is possible to adapt security services parameters to countermeasure threats associated with current situation. This approach leads to optimization of used resources and maintains sufficient security level. This paper presents architecture of adaptive security service, which is context-aware and exploits quality of context data issue.

  8. A Game Theoretical Approach to Hacktivism: Is Attack Likelihood a Product of Risks and Payoffs?

    PubMed

    Bodford, Jessica E; Kwan, Virginia S Y

    2018-02-01

    The current study examines hacktivism (i.e., hacking to convey a moral, ethical, or social justice message) through a general game theoretic framework-that is, as a product of costs and benefits. Given the inherent risk of carrying out a hacktivist attack (e.g., legal action, imprisonment), it would be rational for the user to weigh these risks against perceived benefits of carrying out the attack. As such, we examined computer science students' estimations of risks, payoffs, and attack likelihood through a game theoretic design. Furthermore, this study aims at constructing a descriptive profile of potential hacktivists, exploring two predicted covariates of attack decision making, namely, peer prevalence of hacking and sex differences. Contrary to expectations, results suggest that participants' estimations of attack likelihood stemmed solely from expected payoffs, rather than subjective risks. Peer prevalence significantly predicted increased payoffs and attack likelihood, suggesting an underlying descriptive norm in social networks. Notably, we observed no sex differences in the decision to attack, nor in the factors predicting attack likelihood. Implications for policymakers and the understanding and prevention of hacktivism are discussed, as are the possible ramifications of widely communicated payoffs over potential risks in hacking communities.

  9. Sequential defense against random and intentional attacks in complex networks.

    PubMed

    Chen, Pin-Yu; Cheng, Shin-Ming

    2015-02-01

    Network robustness against attacks is one of the most fundamental researches in network science as it is closely associated with the reliability and functionality of various networking paradigms. However, despite the study on intrinsic topological vulnerabilities to node removals, little is known on the network robustness when network defense mechanisms are implemented, especially for networked engineering systems equipped with detection capabilities. In this paper, a sequential defense mechanism is first proposed in complex networks for attack inference and vulnerability assessment, where the data fusion center sequentially infers the presence of an attack based on the binary attack status reported from the nodes in the network. The network robustness is evaluated in terms of the ability to identify the attack prior to network disruption under two major attack schemes, i.e., random and intentional attacks. We provide a parametric plug-in model for performance evaluation on the proposed mechanism and validate its effectiveness and reliability via canonical complex network models and real-world large-scale network topology. The results show that the sequential defense mechanism greatly improves the network robustness and mitigates the possibility of network disruption by acquiring limited attack status information from a small subset of nodes in the network.

  10. Induction of panic attack by stimulation of the ventromedial hypothalamus.

    PubMed

    Wilent, W Bryan; Oh, Michael Y; Buetefisch, Cathrin M; Bailes, Julian E; Cantella, Diane; Angle, Cindy; Whiting, Donald M

    2010-06-01

    Panic attacks are sudden debilitating attacks of intense distress often accompanied by physical symptoms such as shortness of breath and heart palpitations. Numerous brain regions, hormones, and neurotransmitter systems are putatively involved, but the etiology and neurocircuitry of panic attacks is far from established. One particular brain region of interest is the ventromedial hypothalamus (VMH). In cats and rats, electrical stimulation delivered to the VMH has been shown to evoke an emotional "panic attack-like" escape behavior, and in humans, stimulation targeting nuclei just posterior or anterior to the VMH has reportedly induced panic attacks. The authors report findings obtained in an awake patient undergoing bilateral implantation of deep brain stimulation electrodes into the hypothalamus that strongly implicates the VMH as being critically involved in the genesis of panic attacks. First, as the stimulating electrode progressed deeper into the VMH, the intensity of stimulation required to evoke an attack systematically decreased; second, while stimulation of the VMH in either hemisphere evoked panic, stimulation that appeared to be in the center of the VMH was more potent. Thus, this evidence supports the role of the VMH in the induction of panic attacks purported by animal studies.

  11. Random Visitor: Defense against Identity Attacks in P2P Networks

    NASA Astrophysics Data System (ADS)

    Gu, Jabeom; Nah, Jaehoon; Kwon, Hyeokchan; Jang, Jonsoo; Park, Sehyun

    Various advantages of cooperative peer-to-peer networks are strongly counterbalanced by the open nature of a distributed, serverless network. In such networks, it is relatively easy for an attacker to launch various attacks such as misrouting, corrupting, or dropping messages as a result of a successful identifier forgery. The impact of an identifier forgery is particularly severe because the whole network can be compromised by attacks such as Sybil or Eclipse. In this paper, we present an identifier authentication mechanism called random visitor, which uses one or more randomly selected peers as delegates of identity proof. Our scheme uses identity-based cryptography and identity ownership proof mechanisms collectively to create multiple, cryptographically protected indirect bindings between two peers, instantly when needed, through the delegates. Because of these bindings, an attacker cannot achieve an identifier forgery related attack against interacting peers without breaking the bindings. Therefore, our mechanism limits the possibility of identifier forgery attacks efficiently by disabling an attacker's ability to break the binding. The design rationale and framework details are presented. A security analysis shows that our scheme is strong enough against identifier related attacks and that the strength increases if there are many peers (more than several thousand) in the network.

  12. Detecting and Preventing Sybil Attacks in Wireless Sensor Networks Using Message Authentication and Passing Method.

    PubMed

    Dhamodharan, Udaya Suriya Raj Kumar; Vayanaperumal, Rajamani

    2015-01-01

    Wireless sensor networks are highly indispensable for securing network protection. Highly critical attacks of various kinds have been documented in wireless sensor network till now by many researchers. The Sybil attack is a massive destructive attack against the sensor network where numerous genuine identities with forged identities are used for getting an illegal entry into a network. Discerning the Sybil attack, sinkhole, and wormhole attack while multicasting is a tremendous job in wireless sensor network. Basically a Sybil attack means a node which pretends its identity to other nodes. Communication to an illegal node results in data loss and becomes dangerous in the network. The existing method Random Password Comparison has only a scheme which just verifies the node identities by analyzing the neighbors. A survey was done on a Sybil attack with the objective of resolving this problem. The survey has proposed a combined CAM-PVM (compare and match-position verification method) with MAP (message authentication and passing) for detecting, eliminating, and eventually preventing the entry of Sybil nodes in the network. We propose a scheme of assuring security for wireless sensor network, to deal with attacks of these kinds in unicasting and multicasting.

  13. Detecting and Preventing Sybil Attacks in Wireless Sensor Networks Using Message Authentication and Passing Method

    PubMed Central

    Dhamodharan, Udaya Suriya Raj Kumar; Vayanaperumal, Rajamani

    2015-01-01

    Wireless sensor networks are highly indispensable for securing network protection. Highly critical attacks of various kinds have been documented in wireless sensor network till now by many researchers. The Sybil attack is a massive destructive attack against the sensor network where numerous genuine identities with forged identities are used for getting an illegal entry into a network. Discerning the Sybil attack, sinkhole, and wormhole attack while multicasting is a tremendous job in wireless sensor network. Basically a Sybil attack means a node which pretends its identity to other nodes. Communication to an illegal node results in data loss and becomes dangerous in the network. The existing method Random Password Comparison has only a scheme which just verifies the node identities by analyzing the neighbors. A survey was done on a Sybil attack with the objective of resolving this problem. The survey has proposed a combined CAM-PVM (compare and match-position verification method) with MAP (message authentication and passing) for detecting, eliminating, and eventually preventing the entry of Sybil nodes in the network. We propose a scheme of assuring security for wireless sensor network, to deal with attacks of these kinds in unicasting and multicasting. PMID:26236773

  14. Attack Detection in Sensor Network Target Localization Systems With Quantized Data

    NASA Astrophysics Data System (ADS)

    Zhang, Jiangfan; Wang, Xiaodong; Blum, Rick S.; Kaplan, Lance M.

    2018-04-01

    We consider a sensor network focused on target localization, where sensors measure the signal strength emitted from the target. Each measurement is quantized to one bit and sent to the fusion center. A general attack is considered at some sensors that attempts to cause the fusion center to produce an inaccurate estimation of the target location with a large mean-square-error. The attack is a combination of man-in-the-middle, hacking, and spoofing attacks that can effectively change both signals going into and coming out of the sensor nodes in a realistic manner. We show that the essential effect of attacks is to alter the estimated distance between the target and each attacked sensor to a different extent, giving rise to a geometric inconsistency among the attacked and unattacked sensors. Hence, with the help of two secure sensors, a class of detectors are proposed to detect the attacked sensors by scrutinizing the existence of the geometric inconsistency. We show that the false alarm and miss probabilities of the proposed detectors decrease exponentially as the number of measurement samples increases, which implies that for sufficiently large number of samples, the proposed detectors can identify the attacked and unattacked sensors with any required accuracy.

  15. A fragile zero watermarking scheme to detect and characterize malicious modifications in database relations.

    PubMed

    Khan, Aihab; Husain, Syed Afaq

    2013-01-01

    We put forward a fragile zero watermarking scheme to detect and characterize malicious modifications made to a database relation. Most of the existing watermarking schemes for relational databases introduce intentional errors or permanent distortions as marks into the database original content. These distortions inevitably degrade the data quality and data usability as the integrity of a relational database is violated. Moreover, these fragile schemes can detect malicious data modifications but do not characterize the tempering attack, that is, the nature of tempering. The proposed fragile scheme is based on zero watermarking approach to detect malicious modifications made to a database relation. In zero watermarking, the watermark is generated (constructed) from the contents of the original data rather than introduction of permanent distortions as marks into the data. As a result, the proposed scheme is distortion-free; thus, it also resolves the inherent conflict between security and imperceptibility. The proposed scheme also characterizes the malicious data modifications to quantify the nature of tempering attacks. Experimental results show that even minor malicious modifications made to a database relation can be detected and characterized successfully.

  16. Extraction of Lateral-Directional Stability and Control Derivatives for the Basic F-18 Aircraft at High Angles of Attack

    NASA Technical Reports Server (NTRS)

    Iliff, Kenneth W.; Wang, Kon-Sheng Charles

    1997-01-01

    The results of parameter identification to determine the lateral-directional stability and control derivatives of an F-18 research aircraft in its basic hardware and software configuration are presented. The derivatives are estimated from dynamic flight data using a specialized identification program developed at NASA Dryden Flight Research Center. The formulation uses the linearized aircraft equations of motions in their continuous/discrete form and a maximum likelihood estimator that accounts for both state and measurement noise. State noise is used to model the uncommanded forcing function caused by unsteady aerodynamics, such as separated and vortical flows, over the aircraft. The derivatives are plotted as functions of angle of attack between 3 deg and 47 deg and compared with wind-tunnel predictions. The quality of the derivative estimates obtained by parameter identification is somewhat degraded because the maneuvers were flown with the aircraft's control augmentation system engaged, which introduced relatively high correlations between the control variables and response variables as a result of control motions from the feedback control system.

  17. Realisation and robustness evaluation of a blind spatial domain watermarking technique

    NASA Astrophysics Data System (ADS)

    Parah, Shabir A.; Sheikh, Javaid A.; Assad, Umer I.; Bhat, Ghulam M.

    2017-04-01

    A blind digital image watermarking scheme based on spatial domain is presented and investigated in this paper. The watermark has been embedded in intermediate significant bit planes besides the least significant bit plane at the address locations determined by pseudorandom address vector (PAV). The watermark embedding using PAV makes it difficult for an adversary to locate the watermark and hence adds to security of the system. The scheme has been evaluated to ascertain the spatial locations that are robust to various image processing and geometric attacks JPEG compression, additive white Gaussian noise, salt and pepper noise, filtering and rotation. The experimental results obtained, reveal an interesting fact, that, for all the above mentioned attacks, other than rotation, higher the bit plane in which watermark is embedded more robust the system. Further, the perceptual quality of the watermarked images obtained in the proposed system has been compared with some state-of-art watermarking techniques. The proposed technique outperforms the techniques under comparison, even if compared with the worst case peak signal-to-noise ratio obtained in our scheme.

  18. Emergency medical service providers' role in the early heart attack care program: prevention and stratification strategies.

    PubMed

    MacDonald, G S; Steiner, S R

    1997-01-01

    Emergency Medical Services-Early Heart Attack Care (EMS-EHAC) is a community-based program where paramedics increase the consumer's awareness about early chest pain symptom recognition. EMS-EHAC prevention, along with seamless chest pain care (between the paramedic and chest pain emergency department) can be the basis for an outcome-based study to examine the impact of advanced life support EMS. Studies that show the impact of care given by paramedics on the outcome of patient care must be designed to demonstrate the value and the cost benefit of providing advanced life support (ALS). Third party payers are going to examine if there are significant quality differences between ALS and basic life support (BLS) services. If significant benefits of ALS care cannot be demonstrated, the cost differences could potentially place the future of advanced life support paramedic programs in jeopardy. A positive outcome resulting in a lower acute cardiac event, and the realization of the cost benefits from the EMS-EHAC program could be utilized by EMS management to justify or expand advanced life support programs.

  19. Numerical investigation of the origin of vortex asymmetry of flows over bodies at large angle of attack

    NASA Technical Reports Server (NTRS)

    Degani, David

    1990-01-01

    The occurrence of the flow about a slender body of revolution placed at incidence to an incoming stream is numerically examined for angles of attack ranging from 20 to 80 degrees and a Reynolds number of 200,000 based on maximum body diameter. Over a certain range of Reynolds numbers, the trend of flowfields around slender bodies at incidence can be roughly divided into three main categories: (1) at alpha = 0-30 deg, the flow is steady and symmetric; (2) at alpha = 30-60 deg, the flow under normal conditions is usually asymmetric, but the level of the asymmetry depends on the amount of disturbances present on the tip of the body; and (3) at alpha 60-90 deg, the flow in the wake of the body acts in a fashion similar to that of the Karman vortex shedding behind a two-dimensional circular cylinder. For each of these categories the range of incidence may change by + or - 10 degrees, depending on the quality of flow, or body finish.

  20. Contribution of insectivorous avifauna to top down control of Lindera benzoin herbivores at forest edge and interior habitats

    NASA Astrophysics Data System (ADS)

    Skoczylas, Daniel R.; Muth, Norris Z.; Niesenbaum, Richard A.

    2007-11-01

    Predation of herbivorous Lepidoptera larvae by insectivorous avifauna was estimated on Lindera benzoin in edge and interior habitats at two sites in eastern Pennsylvania (USA). Clay baits modeled after Epimecis hortaria (Geometridae) larvae, the primary herbivore of L. benzoin at our study sites, were used to estimate predation by birds. In both habitat types, models were placed on uninjured L. benzoin leaves as well as on leaves that had prior insect herbivore damage. Rates of model attack were greater, and model longevity reduced, in forest edge plots compared to interiors. Naturally occurring herbivore damage on L. benzoin was greater in forest interiors. However, model attack was not significantly greater on leaves with prior herbivory damage, suggesting that birds do not effectively use this type of leaf damage as a cue in their foraging. Our findings are consistent with a contribution of bird predation towards top-down control of herbivory in this system. We further discuss these results in a broader context considering the possible effects of habitat type on leaf quality, leaf defense, and herbivore performance.

  1. 39 CFR 501.11 - Reporting Postage Evidencing System security weaknesses.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... any repeatable deviation from normal Postage Evidencing System performance. (3) Cyber attacks that... misappropriating assets or sensitive information, corrupting data, or causing operational disruption. Cyber attacks... causing denial-of-service attacks on Web sites. Cyber attacks may be carried out by third parties or...

  2. 39 CFR 501.11 - Reporting Postage Evidencing System security weaknesses.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... any repeatable deviation from normal Postage Evidencing System performance. (3) Cyber attacks that... misappropriating assets or sensitive information, corrupting data, or causing operational disruption. Cyber attacks... causing denial-of-service attacks on Web sites. Cyber attacks may be carried out by third parties or...

  3. 39 CFR 501.11 - Reporting Postage Evidencing System security weaknesses.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... any repeatable deviation from normal Postage Evidencing System performance. (3) Cyber attacks that... misappropriating assets or sensitive information, corrupting data, or causing operational disruption. Cyber attacks... causing denial-of-service attacks on Web sites. Cyber attacks may be carried out by third parties or...

  4. Sustaining U.S. Nuclear Submarine Design Capabilities

    DTIC Science & Technology

    2007-01-01

    lost learning because there is an inherent novelty to each succeeding design effort, but on the other hand, higher 2 Note there is a unique “do...Nautilus 1 1954 Attack Seawolf 1 1957 Attack Skate 4 1958–1959 Attack Skipjack 6 1959–1961 Attack Triton 1 1959 Attack George Washington 5 1960–1962...development, electric motors and controls development, or equipment acoustic analysis (listed to the right of the pyramid). All of these skills have some

  5. National Counterterrorism Center: 2007 Report on Terrorism

    DTIC Science & Technology

    2008-04-30

    Approximately one half of the attacks in the NCTC database involve no loss of life. An attack that damages a pipeline and a car bomb attack that kills 100...rose by about 30 percent and 20 percent, respectively. Overall, suicide bombing attacks rose by about 50 percent and suicide car bombings about 40...January 2007, in Nukhaib, Al Anbar, Iraq, armed assailants in three cars attacked two buses transporting Shiite pilgrims back from the Hajj in Mecca to Al

  6. Combating Paramilitary Terrorism on the Homefront: An Examination of Capabilities and Limitations of U.S. Response Forces

    DTIC Science & Technology

    2015-12-01

    paramilitary methods with devastating results. This thesis examines the paramilitary terrorist attacks that occurred in Beslan in 2004 and in Mumbai in...paramilitary attack to be established. 14. SUBJECT TERMS paramilitary terrorism, North Hollywood shootout, Mumbai attack, Beslan school attack, posse...paramilitary terrorist attacks that occurred in Beslan in 2004 and in Mumbai in 2008 in an attempt to understand the threat and to establish the criteria for

  7. US Army Attack Aviation in a Decisive Action Environment: History, Doctrine, and a Need for Doctrinal Refinement

    DTIC Science & Technology

    2015-05-23

    flight. The design used the engine, transmission, and rotor system of the UH-1 design. In doing so, Bell helicopters publicly declared that the Cobra...Public Release; Distribution is Unlimited 13. SUPPLEMENTARY NOTES 14. ABSTRACT The attack helicopter airframe and role evolved slowly, over time, to...attack helicopter doctrine, heavily influenced by the Global War on Terror and the 11th Attack Helicopter Regiment’s disastrous deep attack during

  8. Attack rates of Sirex noctilio and patterns of pine tree defenses and mortality in northern Patagonia.

    PubMed

    Martinson, S J; Fernádez Ajó, A A; Martínez, A S; Krivak-Tetley, F E; Villacide, J M; Ayres, M P; Corley, J C

    2018-04-18

    Accidental and intentional global movement of species has increased the frequency of novel plant-insect interactions. In Patagonia, the European woodwasp, Sirex noctilio, has invaded commercial plantations of North American pines. We compared the patterns of resin defenses and S. noctilio-caused mortality at two mixed-species forests near San Carlos de Bariloche, Argentina. We observed lower levels of resin flow and higher levels of mortality in Pinus contorta compared with Pinus ponderosa. In general, S. noctilio attacked trees with lower resin compared with neighboring trees. Resin production in P. ponderosa was not related to growth rates, but for P. contorta, slower growing trees produced less resin than faster growing conspecifics. For all infested trees, attack density and number of drills (ovipositor probes) per attack did not vary with resin production. Most attacks resulted in one or two drills. Attack rates and drills/attack were basically uniform across the bole of the tree except for a decrease in both drills/attack and attack density in the upper portion of the crown, and an increase in the attack density for the bottom 10% of the tree. Planted pines in Patagonia grow faster than their counterparts in North America, and produce less resin, consistent with the growth-differentiation balance hypothesis. Limited resin defenses may help to explain the high susceptibility of P. contorta to woodwasps in Patagonia.

  9. Alligator attacks in southwest Florida.

    PubMed

    Harding, Brett E; Wolf, Barbara C

    2006-05-01

    The American alligator inhabits bodies of fresh water in Florida and other southeastern states. Although attacks on pets are frequent, alligator attacks on humans are relatively rare because of the animal's natural fear of man. Because of the rarity of attacks on humans, the pathologic findings and pathophysiology of death in such cases have not been well characterized in the literature. We report three cases of fatal alligator attacks that occurred in southwest Florida, each with different pathologic findings and mechanisms of death. Although the cause of death in each case was attributed to the alligator attack, the mechanisms of death differed and included exsanguination because of amputation of an extremity, overwhelming sepsis, and drowning. These cases illustrate the varied pathophysiologies associated with deaths due to alligator attacks on humans and the features that distinguish alligator bites from those of other aquatic predators.

  10. A closer look at the relationships between panic attacks, emergency department visits and non-cardiac chest pain.

    PubMed

    Foldes-Busque, Guillaume; Denis, Isabelle; Poitras, Julien; Fleet, Richard P; Archambault, Patrick; Dionne, Clermont E

    2017-01-01

    This study examined the prevalence of emergency department visits prompted by panic attacks in patients with non-cardiac chest pain. A validated structured telephone interview was used to assess panic attacks and their association with the emergency department consultation in 1327 emergency department patients with non-cardiac chest pain. Patients reported at least one panic attack in the past 6 months in 34.5 per cent (95% confidence interval: 32.0%-37.1%) of cases, and 77.1 per cent (95% confidence interval: 73.0%-80.7%) of patients who reported panic attacks had visited the emergency department with non-cardiac chest pain following a panic attack. These results indicate that panic attacks may explain a significant proportion of emergency department visits for non-cardiac chest pain.

  11. Develop a solution for protecting and securing enterprise networks from malicious attacks

    NASA Astrophysics Data System (ADS)

    Kamuru, Harshitha; Nijim, Mais

    2014-05-01

    In the world of computer and network security, there are myriad ways to launch an attack, which, from the perspective of a network, can usually be defined as "traffic that has huge malicious intent." Firewall acts as one of the measure in order to secure the device from incoming unauthorized data. There are infinite number of computer attacks that no firewall can prevent, such as those executed locally on the machine by a malicious user. From the network's perspective, there are numerous types of attack. All the attacks that degrade the effectiveness of data can be grouped into two types: brute force and precision. The Firewall that belongs to Juniper has the capability to protect against both types of attack. Denial of Service (DoS) attacks are one of the most well-known network security threats under brute force attacks, which is largely due to the high-profile way in which they can affect networks. Over the years, some of the largest, most respected Internet sites have been effectively taken offline by Denial of Service (DOS) attacks. A DoS attack typically has a singular focus, namely, to cause the services running on a particular host or network to become unavailable. Some DoS attacks exploit vulnerabilities in an operating system and cause it to crash, such as the infamous Win nuke attack. Others submerge a network or device with traffic so that there are no more resources to handle legitimate traffic. Precision attacks typically involve multiple phases and often involves a bit more thought than brute force attacks, all the way from reconnaissance to machine ownership. Before a precision attack is launched, information about the victim needs to be gathered. This information gathering typically takes the form of various types of scans to determine available hosts, networks, and ports. The hosts available on a network can be determined by ping sweeps. The available ports on a machine can be located by port scans. Screens cover a wide variety of attack traffic as they are configured on a per-zone basis. Depending on the type of screen being configured, there may be additional settings beyond simply blocking the traffic. Attack prevention is also a native function of any firewall. Juniper Firewall handles traffic on a per-flow basis. We can use flows or sessions as a way to determine whether traffic attempting to traverse the firewall is legitimate. We control the state-checking components resident in Juniper Firewall by configuring "flow" settings. These settings allow you to configure state checking for various conditions on the device. You can use flow settings to protect against TCP hijacking, and to generally ensure that the fire-wall is performing full state processing when desired. We take a case study of attack on a network and perform study of the detection of the malicious packets on a Net screen Firewall. A new solution for securing enterprise networks will be developed here.

  12. Percolation Features on Climate Network under Attacks of El Niño Events

    NASA Astrophysics Data System (ADS)

    Lu, Z.

    2015-12-01

    Percolation theory under different attacks is one of the main research areas in complex networks but never be applied to investigate climate network. In this study, for the first time we construct a climate network of surface air temperature field to analyze its percolation features. Here, we regard El Niño event as a kind of naturally attacks generated from Pacific Ocean to attack its upper climate network. We find that El Niño event leads an abrupt percolation phase transition to the climate network which makes it splitting and unstable suddenly. Comparing the results of the climate network under three different forms of attacks, including most connected attack (MA), localized attack (LA) and random attack (RA) respectively, it is found that both MA and LA lead first-order transition and RA leads second-order transition to the climate network. Furthermore, we find that most real attacks consist of all these three forms of attacks. With El Niño event emerging, the ratios of LA and MA increase and dominate the style of attack while RA decreasing. It means the percolation phase transition due to El Niño events is close to first-order transition mostly affected by LA and MA. Our research may help us further understand two questions from perspective of percolation on network: (1) Why not all warming in Pacific Ocean but El Niño events could affect the climate. (2) Why the climate affected by El Niño events changes abruptly.

  13. Symptom Induction and De-escalation in the Treatment of Panic Attacks.

    ERIC Educational Resources Information Center

    Dattilio, Frank M.

    1990-01-01

    Describes technique known as symptom induction and de-escalation for panic attacks in which goal is to reproduce the type of situation that may precipitate an attack and then to show the client how the attacks can be "turned on" as well as "turned off." (ABL)

  14. Don't Take a Chance with a Heart Attack: Know the Facts and Act Fast

    MedlinePlus

    heart attack Know the symptoms. Take action. call Don’t Take a Chance With a Heart Attack: Know the Facts and Act Fast “ One evening ... didn’t think I could be having a heart attack. I didn’t expect it to happen to ...

  15. Learn What a Heart Attack Feels Like--It Could Save Your Life

    MedlinePlus

    Learn What a Heart Attack Feels Like— It Could Save Your Life. This fact sheet tells you about heart attack signs. It also tells you what to ... heart attack warning signs. Your chest hurts or feels squeezed. One or both arms, your back, shoulders, ...

  16. Construction of a 3D model of nattokinase, a novel fibrinolytic enzyme from Bacillus natto. A novel nucleophilic catalytic mechanism for nattokinase.

    PubMed

    Zheng, Zhong-liang; Zuo, Zhen-yu; Liu, Zhi-gang; Tsai, Keng-chang; Liu, Ai-fu; Zou, Guo-lin

    2005-01-01

    A three-dimensional structural model of nattokinase (NK) from Bacillus natto was constructed by homology modeling. High-resolution X-ray structures of Subtilisin BPN' (SB), Subtilisin Carlsberg (SC), Subtilisin E (SE) and Subtilisin Savinase (SS), four proteins with sequential, structural and functional homology were used as templates. Initial models of NK were built by MODELLER and analyzed by the PROCHECK programs. The best quality model was chosen for further refinement by constrained molecular dynamics simulations. The overall quality of the refined model was evaluated. The refined model NKC1 was analyzed by different protein analysis programs including PROCHECK for the evaluation of Ramachandran plot quality, PROSA for testing interaction energies and WHATIF for the calculation of packing quality. This structure was found to be satisfactory and also stable at room temperature as demonstrated by a 300ps long unconstrained molecular dynamics (MD) simulation. Further docking analysis promoted the coming of a new nucleophilic catalytic mechanism for NK, which is induced by attacking of hydroxyl rich in catalytic environment and locating of S221.

  17. Case report: Pig attack with successful postexposure prophylaxis management.

    PubMed

    Hall, A Brad; Smith, David; Palmer, Jillian

    2014-05-01

    The domesticated pig or boar is ubiquitous to agriculture around the world and is an important food product in most countries. The males that are able to grow tusks that can approach 5 in are the primary contributor to morbidity and mortality from boar attacks. Literature surrounding domesticated boar attacks is sparse. There are no published cases of domesticated boar attacks that describe successful bacterial postexposure prophylaxis. We present a case report of an attack on an adult female by a domesticated boar.

  18. Cougar attacks on humans: a case report.

    PubMed

    McKee, Denise

    2003-01-01

    Cougar attacks on humans are increasing. Presented is a case report of a nonfatal 2-year-old male cougar attack on an 8-year-old girl in British Columbia. Discussions of wound management, rabies postexposure prophylaxis (RPEP), and the possible psychologic ramifications of such an attack are presented. Also reviewed are recommendations on actions that may be helpful in preventing an attack following a sudden encounter with a cougar. Humans must learn to coexist with cougars, which present a small but real threat to people.

  19. Epidemics of panic during a bioterrorist attack--a mathematical model.

    PubMed

    Radosavljevic, Vladan; Radunovic, Desanka; Belojevic, Goran

    2009-09-01

    A bioterrorist attacks usually cause epidemics of panic in a targeted population. We have presented epidemiologic aspect of this phenomenon as a three-component model--host, information on an attack and social network. We have proposed a mathematical model of panic and counter-measures as the function of time in a population exposed to a bioterrorist attack. The model comprises ordinary differential equations and graphically presented combinations of the equations parameters. Clinically, we have presented a model through a sequence of psychic conditions and disorders initiated by an act of bioterrorism. This model might be helpful for an attacked community to timely and properly apply counter-measures and to minimize human mental suffering during a bioterrorist attack.

  20. Framework and methodology for supply chain lifecycle analytics

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hamlet, Jason; Eames, Brandon K.; Kao, Gio K.

    The various technologies presented herein relate to pertaining to identifying and mitigating risks and attacks on a supply chain. A computer-implemented representation of a supply chain is generated comprising nodes (locations) and edges (objects, information). Risk to attack and different attack vectors can be defined for the various nodes and edges, and further, based upon the risks and attacks, (difficulty, consequence) pairs can be determined. One or more mitigations can be generated to increase a difficulty of attack and/or reduce consequence of an attack. The one or more mitigations can be constrained, e.g., by cost, time, etc., to facilitate determinationmore » of how feasible a respective mitigation is to implement with regard to finances available, duration to implement, etc. A context-free grammar can be utilized to identify one or more attacks in the supply chain. Further, the risks can undergo a ranking to enable mitigation priority to be determined.« less

  1. Wind-tunnel investigation of the flow correction for a model-mounted angle of attack sensor at angles of attack from -10 deg to 110 deg. [Langley 12-foot low speed wind tunnel test

    NASA Technical Reports Server (NTRS)

    Moul, T. M.

    1979-01-01

    A preliminary wind tunnel investigation was undertaken to determine the flow correction for a vane angle of attack sensor over an angle of attack range from -10 deg to 110 deg. The sensor was mounted ahead of the wing on a 1/5 scale model of a general aviation airplane. It was shown that the flow correction was substantial, reaching about 15 deg at an angle of attack of 90 deg. The flow correction was found to increase as the sensor was moved closer to the wing or closer to the fuselage. The experimentally determined slope of the flow correction versus the measured angle of attack below the stall angle of attack agreed closely with the slope of flight data from a similar full scale airplane.

  2. Modeling and Managing Risk in Billing Infrastructures

    NASA Astrophysics Data System (ADS)

    Baiardi, Fabrizio; Telmon, Claudio; Sgandurra, Daniele

    This paper discusses risk modeling and risk management in information and communications technology (ICT) systems for which the attack impact distribution is heavy tailed (e.g., power law distribution) and the average risk is unbounded. Systems with these properties include billing infrastructures used to charge customers for services they access. Attacks against billing infrastructures can be classified as peripheral attacks and backbone attacks. The goal of a peripheral attack is to tamper with user bills; a backbone attack seeks to seize control of the billing infrastructure. The probability distribution of the overall impact of an attack on a billing infrastructure also has a heavy-tailed curve. This implies that the probability of a massive impact cannot be ignored and that the average impact may be unbounded - thus, even the most expensive countermeasures would be cost effective. Consequently, the only strategy for managing risk is to increase the resilience of the infrastructure by employing redundant components.

  3. Attack-tolerant networked control system: an approach for detection the controller stealthy hijacking attack

    NASA Astrophysics Data System (ADS)

    Atta Yaseen, Amer; Bayart, Mireille

    2017-01-01

    In this work, a new approach will be introduced as a development for the attack-tolerant scheme in the Networked Control System (NCS). The objective is to be able to detect an attack such as the Stuxnet case where the controller is reprogrammed and hijacked. Besides the ability to detect the stealthy controller hijacking attack, the advantage of this approach is that there is no need for a priori mathematical model of the controller. In order to implement the proposed scheme, a specific detector for the controller hijacking attack is designed. The performance of this scheme is evaluated be connected the detector to NCS with basic security elements such as Data Encryption Standard (DES), Message Digest (MD5), and timestamp. The detector is tested along with networked PI controller under stealthy hijacking attack. The test results of the proposed method show that the hijacked controller can be significantly detected and recovered.

  4. Mental health service use among American Red Cross disaster workers responding to the September 11, 2001 U.S. terrorist attacks.

    PubMed

    Elhai, Jon D; Jacobs, Gerard A; Kashdan, Todd B; DeJong, Gary L; Meyer, David L; Frueh, B Christopher

    2006-06-30

    In this article, we explored 1) the extent of mental health (MH) service use by American Red Cross disaster relief workers, both before (lifetime) and 1 year after the September 11, 2001 terrorist attacks, and 2) demographic, disaster and MH variables predicting (1-year) post-September 11 MH service use in this population. A sample of 3015 Red Cross disaster workers was surveyed 1 year after the attacks, regarding demographic characteristics, MH service use before and since the attacks, and posttraumatic stress disorder (PTSD) symptoms. Findings revealed that while 13.5% used MH services before the attacks, 10.7% used services after. Variables increasing the likelihood of MH service use after the attacks included the following: no previous MH treatment, younger age, being divorced/widowed, and higher PTSD intrusion or hyperarousal symptoms. Findings support other recent research on MH service use after the September 11 attacks.

  5. Monitoring of continuous-variable quantum key distribution system in real environment.

    PubMed

    Liu, Weiqi; Peng, Jinye; Huang, Peng; Huang, Duan; Zeng, Guihua

    2017-08-07

    How to guarantee the practical security of continuous-variable quantum key distribution (CVQKD) system has been an important issue in the quantum cryptography applications. In contrast to the previous practical security strategies, which focus on the intercept-resend attack or the Gaussian attack, we investigate the practical security strategy based on a general attack, i.e., an arbitrated individual attack or collective attack on the system by Eve in this paper. The low bound of intensity disturbance of the local oscillator signal for eavesdropper successfully concealing herself is obtained, considering all noises can be used by Eve in the practical environment. Furthermore, we obtain an optimal monitoring condition for the practical CVQKD system so that legitimate communicators can monitor the general attack in real-time. As examples, practical security of two special systems, i.e., the Gaussian modulated coherent state CVQKD system and the middle-based CVQKD system, are investigated under the intercept-resend attacks.

  6. An analysis of influenza outbreaks in institutions and enclosed societies.

    PubMed

    Finnie, T J R; Copley, V R; Hall, I M; Leach, S

    2014-01-01

    This paper considers the reported attack ratio arising from outbreaks of influenza in enclosed societies. These societies are isolated from the wider community and have greater opportunities for contact between members which would aid the spread of disease. While the particular kind of society (prison, care home, school, barracks, etc.) was not a significant factor in an adjusted model of attack ratio, a person's occupation within the society was. In particular, children and military personnel suffer a greater attack ratio than other occupational types (staff, prisoners, etc.). There was no temporal trend in final attack ratio nor, with the exception of 1918, do pandemic years show abnormal attack ratios. We also observed that as community size increases, the attack ratio undergoes steep nonlinear decline. This statistical analysis draws attention to how the organization of such societies, their size and the occupations of individuals within them affect the final attack ratio.

  7. Analysis of Network Vulnerability Under Joint Node and Link Attacks

    NASA Astrophysics Data System (ADS)

    Li, Yongcheng; Liu, Shumei; Yu, Yao; Cao, Ting

    2018-03-01

    The security problem of computer network system is becoming more and more serious. The fundamental reason is that there are security vulnerabilities in the network system. Therefore, it’s very important to identify and reduce or eliminate these vulnerabilities before they are attacked. In this paper, we are interested in joint node and link attacks and propose a vulnerability evaluation method based on the overall connectivity of the network to defense this attack. Especially, we analyze the attack cost problem from the attackers’ perspective. The purpose is to find the set of least costs for joint links and nodes, and their deletion will lead to serious network connection damage. The simulation results show that the vulnerable elements obtained from the proposed method are more suitable for the attacking idea of the malicious persons in joint node and link attack. It is easy to find that the proposed method has more realistic protection significance.

  8. On Mitigating Distributed Denial of Service Attacks

    ERIC Educational Resources Information Center

    Gao, Zhiqiang

    2006-01-01

    Denial of service (DoS) attacks and distributed denial of service (DDoS) attacks are probably the most ferocious threats in the Internet, resulting in tremendous economic and social implications/impacts on our daily lives that are increasingly depending on the well-being of the Internet. How to mitigate these attacks effectively and efficiently…

  9. Cyberprints: Identifying Cyber Attackers by Feature Analysis

    ERIC Educational Resources Information Center

    Blakely, Benjamin A.

    2012-01-01

    The problem of attributing cyber attacks is one of increasing importance. Without a solid method of demonstrating the origin of a cyber attack, any attempts to deter would-be cyber attackers are wasted. Existing methods of attribution make unfounded assumptions about the environment in which they will operate: omniscience (the ability to gather,…

  10. 77 FR 61433 - Applications and Amendments to Facility Operating Licenses and Combined Licenses Involving...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-09

    ... attacks up to and including the design basis cyber attack threat, thereby achieving high assurance that... provide assurance that safety-related SSCs are protected from cyber attacks. Implementation of 10 CFR 73... of ``high assurance of adequate protection against cyber attacks.'' The proposed revision would not...

  11. Do attacks by jaguars Panthera onca and pumas Puma concolor (Carnivora: Felidae) on livestock correlate with species richness and relative abundance of wild prey?

    PubMed

    Burgas, Albert; Amit, Ronit; Lopez, Bernat C

    2014-12-01

    Abstract: Attacks by big cats on livestock are one of the major causes of human-felid conflicts and, therefore, an important factor in the conservation of these species. It has been argued that a reduction in natural prey abundance promotes attacks on domestic species, but few studies have tested this statement, and some have delivered contradictory results. We investigated whether the occurrence of attacks to livestock by jaguar and puma relates to the abundance and richness of their natural prey. In the rainy season 2009, we tracked potential prey species counting signs of presence along linear transects in 14 non-attacked cattle farms (control) and in 14 attacked cattle farms in NW Costa Rica. There was a negative relationship between the occurrence of attacks and both species richness (p = 0.0014) and abundance (p = 0.0012) of natural prey. Our results support the establishment of actions to promote support and recovery of natural prey, in order to diminish attacks on livestock, while maintaining jaguar and puma populations.

  12. Optimal Attack Strategies Subject to Detection Constraints Against Cyber-Physical Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chen, Yuan; Kar, Soummya; Moura, Jose M. F.

    This paper studies an attacker against a cyberphysical system (CPS) whose goal is to move the state of a CPS to a target state while ensuring that his or her probability of being detected does not exceed a given bound. The attacker’s probability of being detected is related to the nonnegative bias induced by his or her attack on the CPS’s detection statistic. We formulate a linear quadratic cost function that captures the attacker’s control goal and establish constraints on the induced bias that reflect the attacker’s detection-avoidance objectives. When the attacker is constrained to be detected at the false-alarmmore » rate of the detector, we show that the optimal attack strategy reduces to a linear feedback of the attacker’s state estimate. In the case that the attacker’s bias is upper bounded by a positive constant, we provide two algorithms – an optimal algorithm and a sub-optimal, less computationally intensive algorithm – to find suitable attack sequences. Lastly, we illustrate our attack strategies in numerical examples based on a remotely-controlled helicopter under attack.« less

  13. Application of the PageRank Algorithm to Alarm Graphs

    NASA Astrophysics Data System (ADS)

    Treinen, James J.; Thurimella, Ramakrishna

    The task of separating genuine attacks from false alarms in large intrusion detection infrastructures is extremely difficult. The number of alarms received in such environments can easily enter into the millions of alerts per day. The overwhelming noise created by these alarms can cause genuine attacks to go unnoticed. As means of highlighting these attacks, we introduce a host ranking technique utilizing Alarm Graphs. Rather than enumerate all potential attack paths as in Attack Graphs, we build and analyze graphs based on the alarms generated by the intrusion detection sensors installed on a network. Given that the alarms are predominantly false positives, the challenge is to identify, separate, and ideally predict future attacks. In this paper, we propose a novel approach to tackle this problem based on the PageRank algorithm. By elevating the rank of known attackers and victims we are able to observe the effect that these hosts have on the other nodes in the Alarm Graph. Using this information we are able to discover previously overlooked attacks, as well as defend against future intrusions.

  14. Localized attacks on spatially embedded networks with dependencies.

    PubMed

    Berezin, Yehiel; Bashan, Amir; Danziger, Michael M; Li, Daqing; Havlin, Shlomo

    2015-03-11

    Many real world complex systems such as critical infrastructure networks are embedded in space and their components may depend on one another to function. They are also susceptible to geographically localized damage caused by malicious attacks or natural disasters. Here, we study a general model of spatially embedded networks with dependencies under localized attacks. We develop a theoretical and numerical approach to describe and predict the effects of localized attacks on spatially embedded systems with dependencies. Surprisingly, we find that a localized attack can cause substantially more damage than an equivalent random attack. Furthermore, we find that for a broad range of parameters, systems which appear stable are in fact metastable. Though robust to random failures-even of finite fraction-if subjected to a localized attack larger than a critical size which is independent of the system size (i.e., a zero fraction), a cascading failure emerges which leads to complete system collapse. Our results demonstrate the potential high risk of localized attacks on spatially embedded network systems with dependencies and may be useful for designing more resilient systems.

  15. Optimal Attack Strategies Subject to Detection Constraints Against Cyber-Physical Systems

    DOE PAGES

    Chen, Yuan; Kar, Soummya; Moura, Jose M. F.

    2017-03-31

    This paper studies an attacker against a cyberphysical system (CPS) whose goal is to move the state of a CPS to a target state while ensuring that his or her probability of being detected does not exceed a given bound. The attacker’s probability of being detected is related to the nonnegative bias induced by his or her attack on the CPS’s detection statistic. We formulate a linear quadratic cost function that captures the attacker’s control goal and establish constraints on the induced bias that reflect the attacker’s detection-avoidance objectives. When the attacker is constrained to be detected at the false-alarmmore » rate of the detector, we show that the optimal attack strategy reduces to a linear feedback of the attacker’s state estimate. In the case that the attacker’s bias is upper bounded by a positive constant, we provide two algorithms – an optimal algorithm and a sub-optimal, less computationally intensive algorithm – to find suitable attack sequences. Lastly, we illustrate our attack strategies in numerical examples based on a remotely-controlled helicopter under attack.« less

  16. Robust ECC-based authenticated key agreement scheme with privacy protection for Telecare medicine information systems.

    PubMed

    Zhang, Liping; Zhu, Shaohui

    2015-05-01

    To protect the transmission of the sensitive medical data, a secure and efficient authenticated key agreement scheme should be deployed when the healthcare delivery session is established via Telecare Medicine Information Systems (TMIS) over the unsecure public network. Recently, Islam and Khan proposed an authenticated key agreement scheme using elliptic curve cryptography for TMIS. They claimed that their proposed scheme is provably secure against various attacks in random oracle model and enjoys some good properties such as user anonymity. In this paper, however, we point out that any legal but malicious patient can reveal other user's identity. Consequently, their scheme suffers from server spoofing attack and off-line password guessing attack. Moreover, if the malicious patient performs the same time of the registration as other users, she can further launch the impersonation attack, man-in-the-middle attack, modification attack, replay attack, and strong replay attack successfully. To eliminate these weaknesses, we propose an improved ECC-based authenticated key agreement scheme. Security analysis demonstrates that the proposed scheme can resist various attacks and enables the patient to enjoy the remote healthcare services with privacy protection. Through the performance evaluation, we show that the proposed scheme achieves a desired balance between security and performance in comparisons with other related schemes.

  17. Public Figure Attacks in the United States, 1995-2015.

    PubMed

    Meloy, J Reid; Amman, Molly

    2016-09-01

    An archival descriptive study of public figure attackers in the United States between 1995 and 2015 was undertaken. Fifty-six incidents were identified, primarily through exhaustive internet searches, composed of 58 attackers and 58 victims. A code book was developed which focused upon victims, offenders, pre-attack behaviors including direct threats, attack characteristics, post-offense and other outcomes, motivations and psychological abstracts. The average interrater agreement for coding of bivariate variables was 0.835 (intraclass correlation coefficient). The three most likely victim categories were politicians, judges, and athletes. Attackers were males, many with a psychiatric disorder, most were grandiose, and most had both a violent and nonviolent criminal history. The known motivations for the attacks were often angry and personal, the most common being dissatisfaction with a judicial or other governmental process (23%). In only one case was the primary motivation to achieve notoriety. Lethality risk during an attack was 55%. Collateral injury or death occurred in 29% of the incidents. Only 5% communicated a direct threat to the target beforehand. The term "publicly intimate figure" is introduced to describe the sociocultural blurring of public and private lives among the targets, and its possible role in some attackers' perceptions and motivations. Copyright © 2016 John Wiley & Sons, Ltd. Copyright © 2016 John Wiley & Sons, Ltd.

  18. Differential Fault Analysis on CLEFIA with 128, 192, and 256-Bit Keys

    NASA Astrophysics Data System (ADS)

    Takahashi, Junko; Fukunaga, Toshinori

    This paper describes a differential fault analysis (DFA) attack against CLEFIA. The proposed attack can be applied to CLEFIA with all supported keys: 128, 192, and 256-bit keys. DFA is a type of side-channel attack. This attack enables the recovery of secret keys by injecting faults into a secure device during its computation of the cryptographic algorithm and comparing the correct ciphertext with the faulty one. CLEFIA is a 128-bit blockcipher with 128, 192, and 256-bit keys developed by the Sony Corporation in 2007. CLEFIA employs a generalized Feistel structure with four data lines. We developed a new attack method that uses this characteristic structure of the CLEFIA algorithm. On the basis of the proposed attack, only 2 pairs of correct and faulty ciphertexts are needed to retrieve the 128-bit key, and 10.78 pairs on average are needed to retrieve the 192 and 256-bit keys. The proposed attack is more efficient than any previously reported. In order to verify the proposed attack and estimate the calculation time to recover the secret key, we conducted an attack simulation using a PC. The simulation results show that we can obtain each secret key within three minutes on average. This result shows that we can obtain the entire key within a feasible computational time.

  19. Relevance of terrorism for Italian students not directly exposed to it: The affective impact of the 2015 Paris and the 2016 Brussels attacks.

    PubMed

    Raccanello, Daniela; Burro, Roberto; Brondino, Margherita; Pasini, Margherita

    2018-04-01

    Notwithstanding the dramatically increasing frequency of acts of terrorism in Europe and the extent of their media coverage, there is lack of knowledge on people's affective reactions and associated emotion regulation strategies. We explored the affective impact on two cohorts of Italian students (n = 193) possibly exposed vicariously through the mass media to the 2015 Paris or the 2016 Brussels terrorist attacks, respectively. We accessed data from three online questionnaires: one on emotion regulation administered before each attack; one on daily affect administered just before and after each attack; and one on causes of weekly affect and life satisfaction administered at the end of the week in which each attack occurred. The attacks were perceived as relevant for influencing negative affect for 22% of the students. For them, suppression-less frequently used than reappraisal-was associated with an improvement of affect after each attack but negatively related to life satisfaction concerning the week in which the attacks occurred. Our data showed that the recent terrorist attacks occurring in Europe had an affective impact on people at some distance who were vicariously exposed and point to the protective role of emotion regulation as a key resource for individuals' well-being. Copyright © 2017 John Wiley & Sons, Ltd.

  20. Fear of Terrorism in New York After the September 11 Terrorist Attacks: Implications for Emergency Mental Health and Preparedness

    PubMed Central

    Boscarino, Joseph A.; Figley, Charles R.; Adams, Richard E.

    2009-01-01

    To examine the public’s response to future terrorist attacks, we surveyed 1,001 New Yorkers in the community one year after the September 11 attacks. Overall, New Yorkers were very concerned about future terrorist attacks and also concerned about attacks involving biological or nuclear weapons. In addition, while most New Yorkers reported that if a biological or nuclear attack occurred they would evaluate available information before evacuating, a significant number reported they would immediately evacuate, regardless of police or public health communications to the contrary. The level of public concern was significantly higher on all measures among New York City and Long Island residents (downstate) compared to the rest of the state. A model predicting higher fear of terrorism indicated that downstate residents, women, those 45 to 64 years old, African Americans and Hispanics, those with less education/income, and those more likely to flee, were more fearful of future attacks. In addition, making disaster preparations and carefully evaluating emergency information also predicted a higher level of fear as well. A second model predicting who would flee suggested that those more likely to evaluate available information were less likely to immediately evacuate, while those with a higher fear of future attacks were more likely to flee the area. Given these findings and the possibility of future attacks, mental health professionals need to be more involved in preparedness efforts, especially related to the psychological impact of attacks involving weapons of mass destruction. PMID:14730761

  1. Ethanol injection of ornamental trees facilitates testing insecticide efficacy against ambrosia beetles (Coleoptera: Curculionidae: Scolytinae).

    PubMed

    Reding, Michael E; Oliver, Jason B; Schultz, Peter B; Ranger, Christopher M; Youssef, Nadeer N

    2013-02-01

    Exotic ambrosia beetles are damaging pests in ornamental tree nurseries in North America. The species Xylosandrus crassiusculus (Motshulsky) and Xylosandrus germanus (Blandford) are especially problematic. Management of these pests relies on preventive treatments of insecticides. However, field tests of recommended materials on nursery trees have been limited because of unreliable attacks by ambrosia beetles on experimental trees. Ethanol-injection of trees was used to induce colonization by ambrosia beetles to evaluate insecticides and botanical formulations for preventing attacks by ambrosia beetles. Experiments were conducted in Ohio, Tennessee, and Virginia. Experimental trees injected with ethanol had more attacks by ambrosia beetles than uninjected control trees in all but one experiment. Xylosandrus crassiusculus and X. germanus colonized trees injected with ethanol. In most experiments, attack rates declined 8 d after ethanol-injection. Ethanol-injection induced sufficient pressure from ambrosia beetles to evaluate the efficacy of insecticides for preventing attacks. Trunk sprays of permethrin suppressed cumulative total attacks by ambrosia beetles in most tests. Trunk sprays of the botanical formulations Armorex and Veggie Pharm suppressed cumulative total attacks in Ohio. Armorex, Armorex + Permethrin, and Veggie Pharm + Permethrin suppressed attacks in Tennessee. The bifenthrin product Onyx suppressed establishment of X. germanus in one Ohio experiment, and cumulative total ambrosia beetle attacks in Virginia. Substrate drenches and trunk sprays of neonicotinoids, or trunk sprays of anthranilic diamides or tolfenpyrad were not effective. Ethanol-injection is effective for inducing attacks and ensuring pressure by ambrosia beetles for testing insecticide efficacy on ornamental trees.

  2. Do Unexpected Panic Attacks Occur Spontaneously?

    PubMed Central

    Meuret, Alicia E.; Rosenfield, David; Wilhelm, Frank H.; Zhou, Enlu; Conrad, Ansgar; Ritz, Thomas; Roth, Walton T.

    2012-01-01

    Background Spontaneous or unexpected panic attacks, per definition, occur out-of-the blue, in absence of cues or triggers. Accordingly, physiological arousal or instability should occur at the onset of or during the attack, but not preceding it. To test this hypothesisweexaminedif points of significant autonomic changes preceded the onset of spontaneous panic attacks. Methods Forty-three panic disorder patients underwent repeated 24-hour ambulatory monitoring. Thirteen naturally panic attacks were recorded during 1,960 hours of monitoring. Minute-by-minute epochs beginning 60 minutes before, and continuing to 10 minutes after, the onset of individual attacks were examined for respiration, heart rate, and skin conductance level. Measures were controlled for physical activity and vocalization, and compared to time matched control periods within the same person. Results Significant patterns of instability across a numberof autonomic and respiratory variables were detected as early as 47 minutes before panic onset. The final minutes prior to onset were dominated by respiratory changes, with significant decreases in tidal volume followed by abrupt PCO2 increases. Panic attack onset was characterized by heart rate and tidal volume increases and a drop in PCO2. Symptom report was consistent with these changes. Skin conductance levels were generally elevated in the hour before and duringthe attacks. Changes in the matched control periods were largely absent. Conclusions Significant autonomic irregularities preceded the onset of attacks that were reported as abrupt and unexpected. The findings invite reconsideration of the current diagnostic distinction betweenuncuedand cued panic attacks. PMID:21783179

  3. Insecurity of Wireless Networks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sheldon, Frederick T; Weber, John Mark; Yoo, Seong-Moo

    Wireless is a powerful core technology enabling our global digital infrastructure. Wi-Fi networks are susceptible to attacks on Wired Equivalency Privacy, Wi-Fi Protected Access (WPA), and WPA2. These attack signatures can be profiled into a system that defends against such attacks on the basis of their inherent characteristics. Wi-Fi is the standard protocol for wireless networks used extensively in US critical infrastructures. Since the Wired Equivalency Privacy (WEP) security protocol was broken, the Wi-Fi Protected Access (WPA) protocol has been considered the secure alternative compatible with hardware developed for WEP. However, in November 2008, researchers developed an attack on WPA,more » allowing forgery of Address Resolution Protocol (ARP) packets. Subsequent enhancements have enabled ARP poisoning, cryptosystem denial of service, and man-in-the-middle attacks. Open source systems and methods (OSSM) have long been used to secure networks against such attacks. This article reviews OSSMs and the results of experimental attacks on WPA. These experiments re-created current attacks in a laboratory setting, recording both wired and wireless traffic. The article discusses methods of intrusion detection and prevention in the context of cyber physical protection of critical Internet infrastructure. The basis for this research is a specialized (and undoubtedly incomplete) taxonomy of Wi-Fi attacks and their adaptations to existing countermeasures and protocol revisions. Ultimately, this article aims to provide a clearer picture of how and why wireless protection protocols and encryption must achieve a more scientific basis for detecting and preventing such attacks.« less

  4. Fear of terrorism in New York after the September 11 terrorist attacks: implications for emergency mental health and preparedness.

    PubMed

    Boscarino, Joseph A; Figley, Charles R; Adams, Richard E

    2003-01-01

    To examine the public's response to future terrorist attacks, we surveyed 1,001 New Yorkers in the community one year after the September 11 attacks. Overall, New Yorkers were very concerned about future terrorist attacks and also concerned about attacks involving biological or nuclear weapons. In addition, while most New Yorkers reported that if a biological or nuclear attack occurred they would evaluate available information before evacuating, a significant number reported they would immediately evacuate, regardless of police or public health communications to the contrary. The level of public concern was significantly higher on all measures among New York City and Long Island residents (downstate) compared to the rest of the state. A model predicting higher fear of terrorism indicated that downstate residents, women, those 45 to 64 years old, African Americans and Hispanics, those with less education/income, and those more likely to flee, were more fearful of future attacks. In addition, making disaster preparations and carefully evaluating emergency information also predicted a higher level of fear as well. A second model predicting who would flee suggested that those more likely to evaluate available information were less likely to immediately evacuate, while those with a higher fear of future attacks were more likely to flee the area. Given these findings and the possibility of future attacks, mental health professionals need to be more involved in preparedness efforts, especially related to the psychological impact of attacks involving weapons of mass destruction.

  5. Metrics for Assessment of Smart Grid Data Integrity Attacks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Annarita Giani; Miles McQueen; Russell Bent

    2012-07-01

    There is an emerging consensus that the nation’s electricity grid is vulnerable to cyber attacks. This vulnerability arises from the increasing reliance on using remote measurements, transmitting them over legacy data networks to system operators who make critical decisions based on available data. Data integrity attacks are a class of cyber attacks that involve a compromise of information that is processed by the grid operator. This information can include meter readings of injected power at remote generators, power flows on transmission lines, and relay states. These data integrity attacks have consequences only when the system operator responds to compromised datamore » by redispatching generation under normal or contingency protocols. These consequences include (a) financial losses from sub-optimal economic dispatch to service loads, (b) robustness/resiliency losses from placing the grid at operating points that are at greater risk from contingencies, and (c) systemic losses resulting from cascading failures induced by poor operational choices. This paper is focused on understanding the connections between grid operational procedures and cyber attacks. We first offer two examples to illustrate how data integrity attacks can cause economic and physical damage by misleading operators into taking inappropriate decisions. We then focus on unobservable data integrity attacks involving power meter data. These are coordinated attacks where the compromised data are consistent with the physics of power flow, and are therefore passed by any bad data detection algorithm. We develop metrics to assess the economic impact of these attacks under re-dispatch decisions using optimal power flow methods. These metrics can be use to prioritize the adoption of appropriate countermeasures including PMU placement, encryption, hardware upgrades, and advance attack detection algorithms.« less

  6. Prediction of first episode of panic attack among white-collar workers.

    PubMed

    Watanabe, Akira; Nakao, Kazuhisa; Tokuyama, Madoka; Takeda, Masatoshi

    2005-04-01

    The purpose of the present study was to elucidate a longitudinal matrix of the etiology for first-episode panic attack among white-collar workers. A path model was designed for this purpose. A 5-year, open-cohort study was carried out in a Japanese company. To evaluate the risk factors associated with the onset of a first episode of panic attack, the odds ratios of a new episode of panic attack were calculated by logistic regression. The path model contained five predictor variables: gender difference, overprotection, neuroticism, lifetime history of major depression, and recent stressful life events. The logistic regression analysis indicated that a person with a lifetime history of major depression and recent stressful life events had a fivefold and a threefold higher risk of panic attacks at follow up, respectively. The path model for the prediction of a first episode of panic attack fitted the data well. However, this model presented low accountability for the variance in the ultimate dependent variables, the first episode of panic attack. Three predictors (neuroticism, lifetime history of major depression, and recent stressful life events) had a direct effect on the risk for a first episode of panic attack, whereas gender difference and overprotection had no direct effect. The present model could not fully predict first episodes of panic attack in white-collar workers. To make a path model for the prediction of the first episode of panic attack, other strong predictor variables, which were not surveyed in the present study, are needed. It is suggested that genetic variables are among the other strong predictor variables. A new path model containing genetic variables (e.g. family history etc.) will be needed to predict the first episode of panic attack.

  7. Dopaminergic regulation of sleep and cataplexy in a murine model of narcolepsy.

    PubMed

    Burgess, Christian R; Tse, Gavin; Gillis, Lauren; Peever, John H

    2010-10-01

    To determine if the dopaminergic system modulates cataplexy, sleep attacks and sleep-wake behavior in narcoleptic mice. Hypocretin/orexin knockout (i.e., narcoleptic) and wild-type mice were administered amphetamine and specific dopamine receptor modulators to determine their effects on sleep, cataplexy and sleep attacks. Hypocretin knockout (n = 17) and wild-type mice (n = 21). Cataplexy, sleep attacks and sleep-wake behavior were identified using electroencephalogram, electromyogram and videography. These behaviors were monitored for 4 hours after an i.p. injection of saline, amphetamine and specific dopamine receptor modulators (D1- and D2-like receptor modulators). Amphetamine (2 mg/kg), which increases brain dopamine levels, decreased sleep attacks and cataplexy by 61% and 67%, suggesting that dopamine transmission modulates such behaviors. Dopamine receptor modulation also had powerful effects on sleep attacks and cataplexy. Activation (SKF 38393; 20 mg/kg) and blockade (SCH 23390; 1 mg/kg) of D1-like receptors decreased and increased sleep attacks by 77% and 88%, without affecting cataplexy. Pharmacological activation of D2-like receptors (quinpirole; 0.5 mg/kg) increased cataplectic attacks by 172% and blockade of these receptors (eticlopride; 1 mg/kg) potently suppressed them by 97%. Manipulation of D2-like receptors did not affect sleep attacks. We show that the dopaminergic system plays a role in regulating both cataplexy and sleep attacks in narcoleptic mice. We found that cataplexy is modulated by a D2-like receptor mechanism, whereas dopamine modulates sleep attacks by a D1-like receptor mechanism. These results support a role for the dopamine system in regulating sleep attacks and cataplexy in a murine model of narcolepsy.

  8. Economic burden of gouty arthritis attacks for employees with frequent and infrequent attacks.

    PubMed

    Lynch, Wendy; Chan, Wing; Kleinman, Nathan; Andrews, L M; Yadao, Anthony M

    2013-04-01

    The objective of this study was to compare episode-related and annual costs and work absence days for employees with <3 versus ≥ 3 annual gout attacks. Human Capital Management Services data (2009-2010) from adult employees with gout (International Classification of Diseases, Ninth Revision code 274.x) and ≥ 12 months of medical and pharmacy benefits were studied. Outcomes of interest included medical and drug costs, number of emergency department and urgent care visits, number of inpatient days, short- and long-term disability, sick leave, workers' compensation costs, and work absence days. An algorithm based on diagnosis code and antigout medication use identified acute gout treatment episodes. Multivariate analysis compared annual and pre-episode vs. during-episode outcomes for employees with ≥ 3 vs. <3 gout annual attacks. Of 3361 employees with gout, 76 had ≥ 3 attacks; these employees had higher short-term disability costs ($1663 vs. $643, P=0.06) and days (11.68 versus 4.61, P<0.05), more emergency room visits (0.55 vs. 0.23, P<0.0001), and urgent care visits (0.07 vs. 0.04, P<0.01), and lower pharmacy costs ($1677 vs. $1108, P<0.0001) than those with <3 attacks. Medical costs both before ($203 higher) and during attacks ($136 higher) were significantly higher for those with ≥ 3 attacks than for those with <3 attacks. Additionally, a quadratic increasing relationship was found between number of attacks and cost. Frequency of acute gout attacks (≥ 3 episodes per year) among employees with gout was associated with greater short-term disability cost, absence days, and emergency department and urgent care visits, and trends toward higher overall costs.

  9. Quality of life, needs and the mode of coping of the health personnel at Naradhiwasrajanagarindra Hospital in terrorism influence area in Thailand.

    PubMed

    Thomyangkoon, Prakarn; Kongsakon, Ronnachai; Pornputkul, Virul; Putthavarang, Thanuch

    2012-03-01

    The present study was to identify the quality of life (QOL), the needs of help and the mode of coping among the health personnel of Naradhiwasrajana garindra Hospital in a terrorism situation, the first research in Thailand. The chaos of separatist insurgency in the southern part of Thailand has been re-emerged since 2004. The present study was seeking for ways the health personnel coped with the situation while their quality of life and needs that were affected how they had handled the events were explored. General questionnaire, quality of life rand 36 SF-36 questionnaires, help seeking questionnaire and Mode of coping with the terrorism questionnaire were sent to all health personnel in the hospital in November 2007. 392 (65.3%) complete questionnaire were received from 600 distributed papers. They were female 328 (83.7%) and male 64 (16.3%), at the age of 21-59 years old (the mean age of 39.05 SD +/- 9.82), with three different religions, Buddhist 269 (68.6%), Muslim 122 (31.1%) and Christian 1 (0.30%). Thirty nine responses (9.9%) had been directly exposed to a terrorist attack, while 353 responses (90.1%) had a family member or friends who had been exposed. The results revealed that the overall mean scores of QOL were 73.1 +/- SD 15.5. Mean scores of male were significantly lower than female in general health, social functioning and role-emotional subscales. QOL mean scores of those with no terrorism exposure were significantly higher than those with terrorism exposure in role-physical, social functioning and mental health subscales. The most need of help for the personnel was safety of life and belongings (30.6%) followed by the need of money (23.0%). To cope with the terrorist attack, people (81.7%) would always resort to religious beliefs (72.0%) talk it out with coworkers, friends about their feelings, and (68.7%) inquire about the safety of their families and friends after the incident. Certainly, terrorism affected QOL and the most need of people in violent areas was life safety which agrees with Maslow's hierarchy of needs.

  10. Clinical and Economic Implications of Apixaban Versus Aspirin in the Low-Risk Nonvalvular Atrial Fibrillation Patients.

    PubMed

    Lip, Gregory Y H; Lanitis, Tereza; Mardekian, Jack; Kongnakorn, Thitima; Phatak, Hemant; Dorian, Paul

    2015-10-01

    Although recommended by guidelines, the benefits of treating patients with atrial fibrillation with a low-stroke risk score, with aspirin or anticoagulants, have not been clearly established. With advent of safer non-vitamin K antagonist oral anticoagulant, we assessed the clinical and economic implications of 5 mg BID of apixaban versus aspirin among patients with a relative low risk of stroke as assessed using the CHADS2 (congestive heart failure, hypertension, age>75, diabetes mellitus, stroke/transient ischemic attack) and CHA2DS2-VASc (congestive heart failure, hypertension, age, diabetes mellitus, stroke/transient ischemic attack, vascular disease) stroke risk classification. A previously developed and validated Markov model was adapted. A secondary analysis of the Apixaban Versus Acetylsalicylic Acid to Prevent Stroke in Atrial Fibrillation Patients Who Have Failed or Are Unsuitable for Vitamin K Antagonist Treatment (AVERROES) study was conducted to estimate event rates in different low-risk cohorts by treatment. Three cohorts (n=1000) with a CHADS2 score of 1, CHA2DS2-VASc score of 1, and CHA2DS2-VASc of score 2 to 4 were simulated to assess the number of clinical events avoided in terms of strokes and major bleeds, as well as life years gained, quality-adjusted life years gained, costs, and incremental costs per quality-adjusted life year gained. Apixaban was associated with fewer strokes and systemic embolism versus aspirin across all subgroups; however, it caused more major bleeding events. The reduction in systemic embolism offset the increase in major bleeding events leading to increased life expectancy and quality-adjusted life year gains, achieved at an increased cost that was lower than the UK threshold of $44,400 (ie, £30,000) per quality-adjusted life year gained across the 3 cohorts examined. Anticoagulant treatment with apixaban versus aspirin in low-risk patients, as identified using CHADS2 or CHA2DS2-VASc, is projected to increase life expectancy and provide clinical benefits that are cost effective. © 2015 American Heart Association, Inc.

  11. Correlation of forebody pressures and aircraft yawing moments on the X-29A aircraft at high angles of attack

    NASA Technical Reports Server (NTRS)

    Fisher, David F.; Richwine, David M.; Landers, Stephen

    1992-01-01

    In-flight pressure distributions at four fuselage stations on the forebody of the X-29A aircraft have been reported at angles of attack from 15 to 66 deg and at Mach numbers from 0.22 to 0.60. At angles of attack of 20 deg and higher, vortices shed from the nose strake caused suction peaks in the pressure distributions that generally increased in magnitude with angle of attack. Above 30 deg-angle of attack, the forebody pressure distributions became asymmetrical at the most forward station, while they remained nearly symmetrical until 50 to 55 deg-angle of attack for the aft stations. Between 59 to 66 deg-angle of attack, the asymmetry of the pressure distributions changed direction. Yawing moments for the forebody alone were obtained by integrating the forebody pressure distributions. At 45 deg-angle of attack, the aircraft yaws to the right and at 50 deg and higher, the aircraft yaws to the left. The forebody yawing moments correlated well with the aircraft left yawing moment at an angle of attack of 50 deg or higher. At a 45 deg-angle of attack, the forebody yawing moments did not correlate well with the aircraft yawing moment, but it is suggested that this was due to asymmetric pressures on the cockpit region of the fuselage which was not instrumented. The forebody was also shown to provide a positive component of directional stability of the aircraft at angles of attack of 25 deg or higher. A Mach number effect was noted at angles of attack of 30 deg or higher at the station where the nose strake was present. At this station, the suction peaks in the pressure distributions at the highest Mach number were reduced and much more symmetrical as compared to the lower Mach number pressure distributions.

  12. EVALUATION OF THE CHANGES IN THE NASAL CAVITY DURING THE MIGRAINE ATTACK

    PubMed Central

    Arslan, H. Hüseyin; Tokgöz, Erkan; Yıldızoğlu, Üzeyir; Durmaz, Abdullah; Bek, Semai; Gerek, Mustafa

    2012-01-01

    Objectives There are some subjective symptoms involving the nasal cavity such as nasal congestion during a migraine attack. In this study, we aimed to evaluate the possible changes occuring in the nasal cavity, during headache in migraine patients. Material and Methods Subjects with migraine were studied. The control group was consisted with tension-type headache patients. The severity of the headache and accompanying complaints were assessed by visual analog scale, and nasal mucosa was assessed by anterior rhinoscopy and endoscopy. Resistance of the nasal cavity was evaluated with anterior rhinomanometry. The data obtained during the attack periods and attack free periods were compared. Results 25 migraine patients and 15 tension-type headache patients were enrolled. It was found that 19 subjects (%76) of migraine group and 5 of tension-type headache group were suffering from nasal congestion during the attack, and that the differences between the groups were statistically significant (p<0.05). The average of total nasal resistance in migraine patients was 0,57±0,60 kPa/L/sn during migraine attacks and 0,28±0,14 kPa/L/sn during attack free periods. The average of total nasal resistance in tension-type headache patients was 0,32±0,14 kPa/L/sn during attack periods and 0,31±0,20 kPa/L/sn during attack free periods. In the migraine group, the change of nasal resistance between during the attack and attack free periods was found statistically significant, while there was no statistically significant difference in the tension-type headache group. Conclusion According to the results of this study, complaining of nasal obstruction and nasal airway resistance increases during migraine attacks. Cause and effect relationship between nasal obstruction and pain is not clear and clinical trials are needed to determine the effect of nasal obstruction treatment (mucosal decongestion etc.) on the complaint of pain. PMID:25072974

  13. Dead or Alive? Factors Affecting the Survival of Victims during Attacks by Saltwater Crocodiles (Crocodylus porosus) in Australia.

    PubMed

    Fukuda, Yusuke; Manolis, Charlie; Saalfeld, Keith; Zuur, Alain

    2015-01-01

    Conflicts between humans and crocodilians are a widespread conservation challenge and the number of crocodile attacks is increasing worldwide. We identified the factors that most effectively decide whether a victim is injured or killed in a crocodile attack by fitting generalized linear models to a 42-year dataset of 87 attacks (27 fatal and 60 non-fatal) by saltwater crocodiles (Crocodylus porosus) in Australia. The models showed that the most influential factors were the difference in body mass between crocodile and victim, and the position of victim in relation to the water at the time of an attack. In-water position (for diving, swimming, and wading) had a higher risk than on-water (boating) or on-land (fishing, and hunting near the water's edge) positions. In the in-water position a 75 kg person would have a relatively high probability of survival (0.81) if attacked by a 300 cm crocodile, but the probability becomes much lower (0.17) with a 400 cm crocodile. If attacked by a crocodile larger than 450 cm, the survival probability would be extremely low (<0.05) regardless of the victim's size. These results indicate that the main cause of death during a crocodile attack is drowning and larger crocodiles can drag a victim more easily into deeper water. A higher risk associated with a larger crocodile in relation to victim's size is highlighted by children's vulnerability to fatal attacks. Since the first recently recorded fatal attack involving a child in 2006, six out of nine fatal attacks (66.7%) involved children, and the average body size of crocodiles responsible for these fatal attacks was considerably smaller (384 cm, 223 kg) than that of crocodiles that killed adults (450 cm, 324 kg) during the same period (2006-2014). These results suggest that culling programs targeting larger crocodiles may not be an effective management option to improve safety for children.

  14. Dead or Alive? Factors Affecting the Survival of Victims during Attacks by Saltwater Crocodiles (Crocodylus porosus) in Australia

    PubMed Central

    Fukuda, Yusuke

    2015-01-01

    Conflicts between humans and crocodilians are a widespread conservation challenge and the number of crocodile attacks is increasing worldwide. We identified the factors that most effectively decide whether a victim is injured or killed in a crocodile attack by fitting generalized linear models to a 42-year dataset of 87 attacks (27 fatal and 60 non-fatal) by saltwater crocodiles (Crocodylus porosus) in Australia. The models showed that the most influential factors were the difference in body mass between crocodile and victim, and the position of victim in relation to the water at the time of an attack. In-water position (for diving, swimming, and wading) had a higher risk than on-water (boating) or on-land (fishing, and hunting near the water's edge) positions. In the in-water position a 75 kg person would have a relatively high probability of survival (0.81) if attacked by a 300 cm crocodile, but the probability becomes much lower (0.17) with a 400 cm crocodile. If attacked by a crocodile larger than 450 cm, the survival probability would be extremely low (<0.05) regardless of the victim’s size. These results indicate that the main cause of death during a crocodile attack is drowning and larger crocodiles can drag a victim more easily into deeper water. A higher risk associated with a larger crocodile in relation to victim’s size is highlighted by children’s vulnerability to fatal attacks. Since the first recently recorded fatal attack involving a child in 2006, six out of nine fatal attacks (66.7%) involved children, and the average body size of crocodiles responsible for these fatal attacks was considerably smaller (384 cm, 223 kg) than that of crocodiles that killed adults (450 cm, 324 kg) during the same period (2006–2014). These results suggest that culling programs targeting larger crocodiles may not be an effective management option to improve safety for children. PMID:25961294

  15. Wounding patterns and human performance in knife attacks: optimising the protection provided by knife-resistant body armour.

    PubMed

    Bleetman, A; Watson, C H; Horsfall, I; Champion, S M

    2003-12-01

    Stab attacks generate high loads, and to defeat them, armour needs to be of a certain thickness and stiffness. Slash attacks produce much lower loads and armour designed to defeat them can be far lighter and more flexible. Phase 1: Human performance in slash attacks: 87 randomly selected students at the Royal Military College of Science were asked to make one slash attack with an instrumented blade on a vertically mounted target. No instructions on how to slash the target were given. The direction, contact forces and velocity of each attack were recorded. Phase 2: Clinical experience with edged weapon attacks: The location and severity of all penetrating injuries in patients attending the Glasgow Royal Infirmary between 1993 and 1996 were charted on anatomical figures. Phase 1: Two types of human slash behaviour were evident: a 'chop and drag' blow and a 'sweep motion' type of attack. 'Chop and drag' attacks had higher peak forces and velocities than sweep attacks. Shoulder to waist blows (diagonal) accounted for 82% of attacks, 71% of attackers used a long diagonal slash with an average cut length of 34 cm and 11% used short diagonal attacks with an average cut length of 25 cm. Only 18% of attackers slashed across the body (short horizontal); the average measured cut length of this type was 28 cm. The maximum peak force for the total sample population was 212 N; the maximum velocity was 14.88 m s(-1). The 95 percentile force for the total sample population was 181 N and the velocity was 9.89 m s(-1). Phase 2: 431 of the 500 patients had been wounded with edged weapons. The average number of wounds sustained by victims in knife assaults was 2.4. The distribution of wounds by frequency and severity are presented. Anti-slash protection is required for the arms, neck, shoulders, and thighs. The clinical experience of knife-attack victims provides information on the relative vulnerabilities of different regions of the body. It is anticipated that designing a tunic-type of Police uniform that is inherently stab and slash resistant will eventually replace the current obvious and often bulky extra protective vest. Attempts at making a combined garment will need to be guided by ergonomic considerations and field testing. A similar anatomical regional risk model might also be appropriate in the design of anti-ballistic armour and combined anti-ballistic and knife-resistant armour.

  16. Management of a severe forceful breather with Rett syndrome using carbogen.

    PubMed

    Smeets, Eric E J; Julu, Peter O O; van Waardenburg, Dick; Engerström, Ingegerd Witt; Hansen, Stig; Apartopoulos, Flora; Curfs, Leopold M G; Schrander-Stumpel, Connie T R M

    2006-11-01

    We have used a novel neurophysiological technique in the NeuroScope system in combination with conventional electroencephalography (EEG) to monitor both brainstem and cortical activity simultaneously in real-time in a girl with Rett syndrome. The presenting clinical features in our patient were severe sleep disturbances, irregular breathing in the awake state dominated by Valsalva's type of breathing followed by tachypnoea and very frequent attacks of seizures and vacant spells. Our novel neurophysiological data showed that the patient was a Forceful Breather according to the breathing categories in Rett syndrome. She had frequent abnormal spontaneous brainstem activation (ASBA) preceded by severe attacks of hypocapnoea, which was caused by a combination of Valsalva's type of breathing and tachypnoea and all these together were responsible for the seizures and non-epileptic vacant spells. The ASBA was not detectable in conventional EEG and there were no epileptiform changes in the EEG during the seizures and vacant spells caused by the hypocapnic attacks, therefore these were pseudo-seizures. The record of brainstem activity confirmed that these were autonomic events, a kind of "brainstem epilepsy". We successfully treated the sleep disturbance with Pipamperone, a 5-hydroxytryptophan antagonist of receptor type 2 and we prevented the severe hypocapnoea during Valsalva's type of breathing and during tachypnoea using carbogen (a mixture of 5% carbon dioxide and 95% oxygen), which we gave by inhalation. Our treatment drastically reduced the autonomic events, promoted whole night sleep and significantly improved the quality of life in our patient. She can now participate in normal family activity which was previously impossible before treatment.

  17. Surgical support during the terrorist attacks in Paris, November 13, 2015: Experience at Bégin Military Teaching Hospital.

    PubMed

    Barbier, Olivier; Malgras, Brice; Choufani, Camille; Bouchard, Antoine; Ollat, Didier; Versier, Gilbert

    2017-06-01

    Recent conflicts have allowed the French Army Health Service to improve management quality for wartime-injured people during military operations. On November 13, 2015, it was in Paris that France was directly attacked and Bégin Military Teaching Hospital, like several hospitals in Paris, had to face a large number of gunshot victims. Thanks to our operational experience, injured people hospitalized in military hospitals benefited from a management based on triage and damage control (DC) principles. Forty-five patients were taken care of in our hospital with an average age of 32 years. During triage, eight patients were categorized T1 (with four extreme emergencies) and 10 were classified T2 and 27 as T3. Twenty-two patients underwent emergency surgery, 15 for soft tissue lesions of limbs, 8 for ballistic fractures (one of which was a cervical wound), and 5 for abdominal wounds. Two patients classified T1 died early. In total, more than 50 operations were performed including iterative debridements, bone fixation, three amputations, and two flaps. After 9 months, all of the patients had healed. One woman with limb stiffness required an arthrolysis. This event showed that terrorist attacks and mass casualties with war wounds can occur in France. Acquired experience regarding war wounds by the French Army Health Service is precious. Everyone must understand the importance of triage and the principles of damage control. Every hospital must be ready to face this type of massive influx of injured people (white plan). Epidemiological study, level V.

  18. Hereditary Angioedema Caused By C1-Esterase Inhibitor Deficiency: A Literature-Based Analysis and Clinical Commentary on Prophylaxis Treatment Strategies

    PubMed Central

    2011-01-01

    Hereditary angioedema (HAE) caused by C1-esterase inhibitor deficiency is an autosomal-dominant disease resulting from a mutation in the C1-inhibitor gene. HAE is characterized by recurrent attacks of intense, massive, localized subcutaneous edema involving the extremities, genitalia, face, or trunk, or submucosal edema of upper airway or bowels. These symptoms may be disabling, have a dramatic impact on quality of life, and can be life-threatening when affecting the upper airways. Because the manifestations and severity of HAE are highly variable and unpredictable, patients need individualized care to reduce the burden of HAE on daily life. Although effective therapy for the treatment of HAE attacks has been available in many countries for more than 30 years, until recently, there were no agents approved in the United States to treat HAE acutely. Therefore, prophylactic therapy is an integral part of HAE treatment in the United States and for selected patients worldwide. Routine long-term prophylaxis with either attenuated androgens or C1-esterase inhibitor has been shown to reduce the frequency and severity of HAE attacks. Therapy with attenuated androgens, a mainstay of treatment in the past, has been marked by concern about potential adverse effects. C1-esterase inhibitor works directly on the complement and contact plasma cascades to reduce bradykinin release, which is the primary pathologic mechanism in HAE. Different approaches to long-term prophylactic therapy can be used to successfully manage HAE when tailored to meet the needs of the individual patient. PMID:23283143

  19. Combined prolonged exposure therapy and paroxetine for PTSD related to the World Trade Center attack: a randomized controlled trial.

    PubMed

    Schneier, Franklin R; Neria, Yuval; Pavlicova, Martina; Hembree, Elizabeth; Suh, Eun Jung; Amsel, Lawrence; Marshall, Randall D

    2012-01-01

    Selective serotonin reuptake inhibitors (SSRIs) are often recommended in combination with established cognitive-behavioral therapies (CBTs) for posttraumatic stress disorder (PTSD), but combined initial treatment of PTSD has not been studied under controlled conditions. There are also few studies of either SSRIs or CBT in treating PTSD related to terrorism. The authors compared prolonged exposure therapy (a CBT) plus paroxetine (an SSRI) with prolonged exposure plus placebo in the treatment of terrorism-related PTSD. Adult survivors of the World Trade Center attack of September 11, 2001, with PTSD were randomly assigned to 10 weeks of treatment with prolonged exposure (10 sessions) plus paroxetine (N=19) or prolonged exposure plus placebo (N=18). After week 10, patients discontinued prolonged exposure and were offered 12 additional weeks of continued randomized treatment. Patients treated with prolonged exposure plus paroxetine experienced significantly greater improvement in PTSD symptoms (incidence rate ratio=0.50, 95% CI=0.30-0.85) and remission status (odds ratio=12.6, 95% CI=1.23-129) during 10 weeks of combined treatment than patients treated with prolonged exposure plus placebo. Response rate and quality of life were also significantly more improved with combined treatment. The subset of patients who continued randomized treatment for 12 additional weeks showed no group differences. Initial treatment with paroxetine plus prolonged exposure was more efficacious than prolonged exposure plus placebo for PTSD related to the World Trade Center attack. Combined treatment medication and prolonged exposure therapy deserves further study in larger samples with diverse forms of PTSD and over longer follow-up periods.

  20. Determining the scope of attacks on health in four governorates of Syria in 2016: Results of a field surveillance program

    PubMed Central

    Risko, Casey B.; Rayes, Diana; Albaik, Ahmad; Alnajar, Mohammed; Kewara, Mazen; Baker, Elise; Rubenstein, Leonard S.

    2018-01-01

    Background Violent attacks on and interferences with hospitals, ambulances, health workers, and patients during conflict destroy vital health services during a time when they are most needed and undermine the long-term capacity of the health system. In Syria, such attacks have been frequent and intense and represent grave violations of the Geneva Conventions, but the number reported has varied considerably. A systematic mechanism to document these attacks could assist in designing more protection strategies and play a critical role in influencing policy, promoting justice, and addressing the health needs of the population. Methods and findings We developed a mobile data collection questionnaire to collect data on incidents of attacks on healthcare directly from the field. Data collectors from the Syrian American Medical Society (SAMS), using the tool or a text messaging system, recorded information on incidents across four of Syria’s northern governorates (Aleppo, Idleb, Hama, and Homs) from January 1, 2016, to December 31, 2016. SAMS recorded a total of 200 attacks on healthcare in 2016, 102 of them using the mobile data collection tool. Direct attacks on health facilities comprised the majority of attacks recorded (88.0%; n = 176). One hundred and twelve healthcare staff and 185 patients were killed in these incidents. Thirty-five percent of the facilities were attacked more than once over the data collection period; hospitals were significantly more likely to be attacked more than once compared to clinics and other types of healthcare facilities. Aerial bombs were used in the overwhelming majority of cases (91.5%). We also compared the SAMS data to a separate database developed by Physicians for Human Rights (PHR) based on media reports and matched the incidents to compare the results from the two methods (this analysis was limited to incidents at health facilities). Among 90 relevant incidents verified by PHR and 177 by SAMS, there were 60 that could be matched to each other, highlighting the differences in results from the two methods. This study is limited by the complexities of data collection in a conflict setting, only partial use of the standardized reporting tool, and the fact that limited accessibility of some health facilities and workers and may be biased towards the reporting of attacks on larger or more visible health facilities. Conclusions The use of field data collectors and use of consistent definitions can play an important role in the tracking incidents of attacks on health services. A mobile systematic data collection tool can complement other methods for tracking incidents of attacks on healthcare and ensure the collection of detailed information about each attack that may assist in better advocacy, programs, and accountability but can be practically challenging. Comparing attacks between SAMS and PHR suggests that there may have been significantly more attacks than previously captured by any one methodology. This scale of attacks suggests that targeting of healthcare in Syria is systematic and highlights the failure of condemnation by the international community and medical groups working in Syria of such attacks to stop them. PMID:29689085

  1. Reducing indoor residential exposures to outdoor pollutants

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sherman, Max H.; Matson, Nance E.

    2003-07-01

    The basic strategy for providing indoor air quality in residences is to dilute indoor sources with outdoor air. This strategy assumes that the outdoor air does not have pollutants at harmful levels or that the outdoor air is, at least, less polluted than the indoor air. When this is not the case, different strategies need to be employed to ensure adequate air quality in the indoor environment. These strategies include ventilation systems, filtration and other measures. These strategies can be used for several types of outdoor pollution, including smog, particulates and toxic air pollutants. This report reviews the impacts thatmore » typical outdoor air pollutants can have on the indoor environment and provides design and operational guidance for mitigating them. Poor quality air cannot be used for diluting indoor contaminants, but more generally it can become an indoor contaminant itself. This paper discusses strategies that use the building as protection against potentially hazardous outdoor pollutants, including widespread pollutants, accidental events, and potential attacks.« less

  2. Assessing the Associations Between Types of Green Space, Physical Activity, and Health Indicators Using GIS and Participatory Survey

    NASA Astrophysics Data System (ADS)

    Akpinar, A.

    2017-11-01

    This study explores whether specific types of green spaces (i.e. urban green spaces, forests, agricultural lands, rangelands, and wetlands) are associated with physical activity, quality of life, and cardiovascular disease prevalence. A sample of 8,976 respondents from the Behavioral Risk Factor Surveillance System, conducted in 2006 in Washington State across 291 zip-codes, was analyzed. Measures included physical activity status, quality of life, and cardiovascular disease prevalence (i.e. heart attack, angina, and stroke). Percentage of green spaces was derived from the National Land Cover Dataset and measured with Geographical Information System. Multilevel regression analyses were conducted to analyze the data while controlling for age, sex, race, weight, marital status, occupation, income, education level, and zip-code population and socio-economic situation. Regression results reveal that no green space types were associated with physical activity, quality of life, and cardiovascular disease prevalence. On the other hand, the analysis shows that physical activity was associated with general health, quality of life, and cardiovascular disease prevalence. The findings suggest that other factors such as size, structure and distribution (sprawled or concentrated, large or small), quality, and characteristics of green space might be important in general health, quality of life, and cardiovascular disease prevalence rather than green space types. Therefore, further investigations are needed.

  3. Efficacy and safety of betahistine treatment in patients with Meniere’s disease: primary results of a long term, multicentre, double blind, randomised, placebo controlled, dose defining trial (BEMED trial)

    PubMed Central

    Adrion, Christine; Fischer, Carolin Simone; Wagner, Judith; Gürkov, Robert; Mansmann, Ulrich

    2016-01-01

    Study question What is the long term efficacy of betahistine dihydrochloride on the incidence of vertigo attacks in patients with Meniere’s disease, compared with placebo? Methods The BEMED trial is a multicentre, double blind, randomised, placebo controlled, three arm, parallel group, phase III, dose defining superiority trial conducted in 14 German tertiary referral centres (for neurology or ear, nose, and throat). Adults aged 21-80 years (mean age 56 years) with definite unilateral or bilateral Meniere’s disease were recruited from March 2008 to November 2012. Participants received placebo (n=74), low dose betahistine (2×24 mg daily, (n=73)), or high dose betahistine (3×48 mg daily, (n=74)) over nine months. The primary outcome was the number of attacks per 30 days, based on patients’ diaries during a three month assessment period at months seven to nine. An internet based randomisation schedule performed a concealed 1:1:1 allocation, stratified by study site. Secondary outcomes included the duration and severity of attacks, change in quality of life scores, and several observer-reported parameters to assess changes in audiological and vestibular function. Study answer and limitations Incidence of attacks related to Meniere’s disease did not differ between the three treatment groups (P=0.759). Compared with placebo, attack rate ratios were 1.036 (95% confidence interval 0.942 to 1.140) and 1.012 (0.919 to 1.114) for low dose and high dose betahistine, respectively. The overall monthly attack rate fell significantly by the factor 0.758 (0.705 to 0.816; P<0.001). The population based, mean monthly incidence averaged over the assessment period was 2.722 (1.304 to 6.309), 3.204 (1.345 to 7.929), and 3.258 (1.685 to 7.266) for the placebo, low dose betahistine, and high dose betahistine groups, respectively. Results were consistent for all secondary outcomes. Treatment was well tolerated with no unexpected safety findings. Without a control group of patients who did not receive any intervention to follow the natural course of the disease, the placebo effect could not be accurately assessed and differentiated from spontaneous remission and fluctuation of symptoms. What this study adds Current evidence is limited as to whether betahistine prevents vertigo attacks caused by Meniere’s disease, compared with placebo. The trial provides information on symptom relief on placebo intervention which is relevant for the design of future studies on potential disease modifying treatments in patients with Meniere’s disease. Funding, competing interests, data sharing Support from the German Federal Ministry of Education and Research (BMBF support code 01KG0708). Potential competing interests have been reported in full at the end of the paper on thebmj.com. Data are available from the corresponding author (Michael.Strupp@med.uni-muenchen.de) or biostatistician (mansmann@ibe.med.uni-muenchen.de). Study registration EudraCT no 2005-000752-32; ISRCTN no ISRCTN44359668. PMID:26797774

  4. Douglas-fir beetle attack and tree mortality following wildfire

    Treesearch

    Sharon M. Hood; Barbara Bentz; Kevin C. Ryan

    2003-01-01

    A major concern after wildfires is the buildup of bark beetle populations in fire injured trees, and subsequent attack and population buildup in adjacent unburned areas. To examine this concern, we documented fire injury and insect attacks in Douglas-fir (Pseudotsuga menziesii) on the 2001 Green Knoll Fire, Wyoming to determine attack preferences, brood production, and...

  5. The Effects of Denial-of-Service Attacks on Secure Time-Critical Communications in the Smart Grid

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Zhang, Fengli; Li, QInghua; Mantooth, Homer Alan

    2016-04-02

    According to IEC 61850, many smart grid communications require messages to be delivered in a very short time. –Trip messages and sample values applied to the transmission level: 3 ms –Interlocking messages applied to the distribution level: 10 ms •Time-critical communications are vulnerable to denial-of-service (DoS) attacks –Flooding attack: Attacker floods many messages to the target network/machine. We conducted systematic, experimental study about how DoS attacks affect message delivery delays.

  6. The maul of the wild. Animal attacks can produce significant trauma.

    PubMed

    Conrad, L

    1994-03-01

    Wild-animal attacks are almost an anachronism in our day and age. They remind us that humans can still be food or prey. Cougar attacks, though rare, produce significant trauma. Characteristic patterns of injury and wound infection should be appropriately identified and treated. As we protect wild-animal species and acknowledge their right to share territory, interactions--and possibly attacks--are likely to increase. Awareness, education, knowledge and prevention, rather than the elimination of animal populations, may be the best way to control wild-animal attacks on humans in the future.

  7. Attacks and intrusion detection in wireless sensor networks of industrial SCADA systems

    NASA Astrophysics Data System (ADS)

    Kamaev, V. A.; Finogeev, A. G.; Finogeev, A. A.; Parygin, D. S.

    2017-01-01

    The effectiveness of automated process control systems (APCS) and supervisory control and data acquisition systems (SCADA) information security depends on the applied protection technologies of transport environment data transmission components. This article investigates the problems of detecting attacks in wireless sensor networks (WSN) of SCADA systems. As a result of analytical studies, the authors developed the detailed classification of external attacks and intrusion detection in sensor networks and brought a detailed description of attacking impacts on components of SCADA systems in accordance with the selected directions of attacks.

  8. SFTP: A Secure and Fault-Tolerant Paradigm against Blackhole Attack in MANET

    NASA Astrophysics Data System (ADS)

    KumarRout, Jitendra; Kumar Bhoi, Sourav; Kumar Panda, Sanjaya

    2013-02-01

    Security issues in MANET are a challenging task nowadays. MANETs are vulnerable to passive attacks and active attacks because of a limited number of resources and lack of centralized authority. Blackhole attack is an attack in network layer which degrade the network performance by dropping the packets. In this paper, we have proposed a Secure Fault-Tolerant Paradigm (SFTP) which checks the Blackhole attack in the network. The three phases used in SFTP algorithm are designing of coverage area to find the area of coverage, Network Connection algorithm to design a fault-tolerant model and Route Discovery algorithm to discover the route and data delivery from source to destination. SFTP gives better network performance by making the network fault free.

  9. Panic disorder, panic attacks and panic attack symptoms across race-ethnic groups: results of the collaborative psychiatric epidemiology studies.

    PubMed

    Asnaani, Anu; Gutner, Cassidy A; Hinton, Devon E; Hofmann, Stefan G

    2009-01-01

    The current study investigates race-ethnic differences in rates of panic disorder, panic attacks and certain panic attack symptoms by jointly combining three major national epidemiological databases. The compared groups were White, African American, Latino and Asian. The White group had significantly higher rates of panic disorder, and of many panic symptoms, including palpitations, as compared to the African American, Asian and Latino groups. Several expected race-ethnic differences were not found. An explanation for these findings are adduced, and suggestions are given for future studies so that possible ethnic-racial differences in panic disorder, panic attacks and panic attack symptoms can be investigated in a more rigorous manner.

  10. A Learning-Based Approach to Reactive Security

    NASA Astrophysics Data System (ADS)

    Barth, Adam; Rubinstein, Benjamin I. P.; Sundararajan, Mukund; Mitchell, John C.; Song, Dawn; Bartlett, Peter L.

    Despite the conventional wisdom that proactive security is superior to reactive security, we show that reactive security can be competitive with proactive security as long as the reactive defender learns from past attacks instead of myopically overreacting to the last attack. Our game-theoretic model follows common practice in the security literature by making worst-case assumptions about the attacker: we grant the attacker complete knowledge of the defender's strategy and do not require the attacker to act rationally. In this model, we bound the competitive ratio between a reactive defense algorithm (which is inspired by online learning theory) and the best fixed proactive defense. Additionally, we show that, unlike proactive defenses, this reactive strategy is robust to a lack of information about the attacker's incentives and knowledge.

  11. Network Security Risk Assessment System Based on Attack Graph and Markov Chain

    NASA Astrophysics Data System (ADS)

    Sun, Fuxiong; Pi, Juntao; Lv, Jin; Cao, Tian

    2017-10-01

    Network security risk assessment technology can be found in advance of the network problems and related vulnerabilities, it has become an important means to solve the problem of network security. Based on attack graph and Markov chain, this paper provides a Network Security Risk Assessment Model (NSRAM). Based on the network infiltration tests, NSRAM generates the attack graph by the breadth traversal algorithm. Combines with the international standard CVSS, the attack probability of atomic nodes are counted, and then the attack transition probabilities of ones are calculated by Markov chain. NSRAM selects the optimal attack path after comprehensive measurement to assessment network security risk. The simulation results show that NSRAM can reflect the actual situation of network security objectively.

  12. Attacks on Bluetooth Security Architecture and Its Countermeasures

    NASA Astrophysics Data System (ADS)

    Iqbal, Mian Muhammad Waseem; Kausar, Firdous; Wahla, Muhammad Arif

    WPANs compliment the traditional IEEE 802.11 wireless networks by facilitating the clients with flexibility in network topologies, higher mobility and relaxed configuration/hardware requirements. Bluetooth, a WPAN technology, is an open standard for short-range radio frequency (RF) communication. However, it is also susceptible to typical security threats found in wireless LANs. This paper discuses some of the attack scenarios against the bluetooth network such as hostile intrusion, active Man-in-the-Middle (MITM) attack using unit key and various forms of denial of service (DoS) attacks. These threats and attacks compromise the confidentiality and availability of bluetooth data and services. This paper proposes an improved security architecture for bluetooth device which provides protection against the above mentioned attacks.

  13. Design and implementation of dynamic hybrid Honeypot network

    NASA Astrophysics Data System (ADS)

    Qiao, Peili; Hu, Shan-Shan; Zhai, Ji-Qiang

    2013-05-01

    The method of constructing a dynamic and self-adaptive virtual network is suggested to puzzle adversaries, delay and divert attacks, exhaust attacker resources and collect attacking information. The concepts of Honeypot and Honeyd, which is the frame of virtual Honeypot are introduced. The techniques of network scanning including active fingerprint recognition are analyzed. Dynamic virtual network system is designed and implemented. A virtual network similar to real network topology is built according to the collected messages from real environments in this system. By doing this, the system can perplex the attackers when Hackers attack and can further analyze and research the attacks. The tests to this system prove that this design can successfully simulate real network environment and can be used in network security analysis.

  14. X-29 Research Pilot Rogers Smith

    NASA Technical Reports Server (NTRS)

    1988-01-01

    Rogers Smith, a NASA research pilot, is seen here at the cockpit of the X-29 forward-swept-wing technology demonstrator at NASA's Ames-Dryden Flight Research Facility (later the Dryden Flight Research Center), Edwards, California, in 1988. The X-29 explored the use of advanced composites in aircraft construction; variable camber wing surfaces; the unique forward-swept-wing and its thin supercritical airfoil; strake flaps; and a computerized fly-by-wire flight control system that overcame the aircraft's instability. Grumman Aircraft Corporation built two X-29s. They were flight tested at Dryden from 1984 to 1992 in a joint NASA, DARPA (Defense Advanced Research Projects Agency) and U.S. Air Force program. Two X-29 aircraft, featuring one of the most unusual designs in aviation history, flew at the Ames-Dryden Flight Research Facility (now the Dryden Flight Research Center, Edwards, California) from 1984 to 1992. The fighter-sized X-29 technology demonstrators explored several concepts and technologies including: the use of advanced composites in aircraft construction; variable-camber wing surfaces; a unique forward- swept wing and its thin supercritical airfoil; strakes; close-coupled canards; and a computerized fly-by-wire flight control system used to maintain control of the otherwise unstable aircraft. Research results showed that the configuration of forward-swept wings, coupled with movable canards, gave pilots excellent control response at angles of attack of up to 45 degrees. During its flight history, the X-29 aircraft flew 422 research missions and a total of 436 missions. Sixty of the research flights were part of the X-29 follow-on 'vortex control' phase. The forward-swept wing of the X-29 resulted in reverse airflow, toward the fuselage rather than away from it, as occurs on the usual aft-swept wing. Consequently, on the forward-swept wing, the ailerons remained unstalled at high angles of attack. This provided better airflow over the ailerons and prevented stalling (loss of lift) at high angles of attack. Introduction of composite materials in the 1970s opened a new field of aircraft construction. It also made possible the construction of the X-29's thin supercritical wing. State-of-the-art composites allowed aeroelastic tailoring which, in turn, allowed the wing some bending but limited twisting and eliminated structural divergence within the flight envelope (i.e. deformation of the wing or the wing breaking off in flight). Additionally, composite materials allowed the wing to be sufficiently rigid for safe flight without adding an unacceptable weight penalty. The X-29 project consisted of two phases plus the follow-on vortex-control phase. Phase 1 demonstrated that the forward sweep of the X-29 wings kept the wing tips unstalled at the moderate angles of attack flown in that phase (a maximum of 21 degrees). Phase I also demonstrated that the aeroelastic tailored wing prevented structural divergence of the wing within the flight envelope, and that the control laws and control-surface effectiveness were adequate to provide artificial stability for an otherwise unstable aircraft. Phase 1 further demonstrated that the X-29 configuration could fly safely and reliably, even in tight turns. During Phase 2 of the project, the X-29, flying at an angle of attack of up to 67 degrees, demonstrated much better control and maneuvering qualities than computational methods and simulation models had predicted . During 120 research flights in this phase, NASA, Air Force, and Grumman project pilots reported the X-29 aircraft had excellent control response to an angle of attack of 45 degrees and still had limited controllability at a 67-degree angle of attack. This controllability at high angles of attack can be attributed to the aircraft's unique forward-swept wing- canard design. The NASA/Air Force-designed high-gain flight control laws also contributed to the good flying qualities. During the Air Force-initiated vortex-control phase, the X-29 successfully demonstrated vortex flow control (VFC). This VFC was more effective than expected in generating yaw forces, especially in high angles of attack where the rudder is less effective. VFC was less effective in providing control when sideslip (wind pushing on the side of the aircraft) was present, and it did little to decrease rocking oscillation of the aircraft. The X-29 vehicle was a single-engine aircraft, 48.1 feet long with a wing span of 27.2 feet. Each aircraft was powered by a General Electric F404-GE-400 engine producing 16,000 pounds of thrust. The program was a joint effort of the Department of Defense's Defense Advanced Research Projects Agency (DARPA), the U.S. Air Force, the Ames-Dryden Flight Research Facility, the Air Force Flight Test Center, and the Grumman Corporation. The program was managed by the Air Force's Wright Laboratory, Wright Patterson Air Force Base, Ohio.

  15. A Investigation of the Verbal Description of Trombone Tone Quality with Respect to Selected Attributes of Sound

    NASA Astrophysics Data System (ADS)

    Stroeher, Michael Steven

    The purpose of this study was to determine the physical elements which experienced trombonists associate with selected descriptors in characterizing the tone quality of that instrument. Stimuli sampled from live trombone tones and synthesized into musical phrases represented 17 variations in (1) presence/absence of attack transient, (2) rise time, (3) duration, (4) number of harmonics, (5) upper limit of harmonicity, (6) spectral envelope shape, and (7) frequency. A vocabulary of 20 adjectives appropriate for describing trombone tone quality was established by a postal survey of 49 college trombone instructors. A pretest was presented to 28 University of North Texas trombone students, who rated the 17 stimuli in terms of the 20 adjectives on a Likert-type scale with reliability estimates of.8997 to.9439 (coefficient alpha). The pretest established the lack of significance of the attack transient in subjects' descriptions. Factor analysis of responses determined similarities in word usages and allowed the number of descriptors to be reduced to eight and the number of sound stimuli to nine for the final investigation. Subjects of the final study consisted of 161 trombonists at universities in Texas, Oklahoma, Colorado, Michigan and North Carolina, who rated the nine stimuli in terms of the eight chosen adjectives on Likert-type scales, with an overall reliability estimate of.7121 (coefficient alpha). Although the low reliability indicated some lack of agreement in descriptor usage, multiple regression analysis established relationships among subjects' use of descriptors and physical attributes of the stimuli. Subjects' judgements of bright were associated with tones of higher frequency; centered, good, dark and warm with faster rise time, longer duration and relatively fewer harmonics; pinched with a high number of harmonics and slower rise time; fuzzy with slow rise time and the presence of high-frequency inharmonic noise. Subjects did not use the word full with any degree of consistency.

  16. Role of short-acting nitroglycerin in the management of ischemic heart disease.

    PubMed

    Boden, William E; Padala, Santosh K; Cabral, Katherine P; Buschmann, Ivo R; Sidhu, Mandeep S

    2015-01-01

    Nitroglycerin is the oldest and most commonly prescribed short-acting anti-anginal agent; however, despite its long history of therapeutic usage, patient and health care provider education regarding the clinical benefits of the short-acting formulations in patients with angina remains under-appreciated. Nitrates predominantly induce vasodilation in large capacitance blood vessels, increase epicardial coronary arterial diameter and coronary collateral blood flow, and impair platelet aggregation. The potential for the prophylactic effect of short-acting nitrates remains an under-appreciated part of optimal medical therapy to reduce angina and decrease myocardial ischemia, thereby enhancing the quality of life. Short-acting nitroglycerin, administered either as a sublingual tablet or spray, can complement anti-anginal therapy as part of optimal medical therapy in patients with refractory and recurrent angina either with or without myocardial revascularization, and is most commonly used to provide rapid therapeutic relief of acute recurrent angina attacks. When administered prophylactically, both formulations increase angina-free walking time on treadmill testing, abolish or delay ST segment depression, and increase exercise tolerance. The sublingual spray formulation provides several clinical advantages compared to tablet formulations, including a lower incidence of headache and superiority to the sublingual tablet in terms of therapeutic action and time to onset, while the magnitude and duration of vasodilatory action appears to be comparable. Furthermore, the sublingual spray formulation may be advantageous to tablet preparations in patients with dry mouth. This review discusses the efficacy and utility of short-acting nitroglycerin (sublingual spray and tablet) therapy for both preventing and aborting an acute angina attack, thereby leading to an improved quality of life.

  17. Role of short-acting nitroglycerin in the management of ischemic heart disease

    PubMed Central

    Boden, William E; Padala, Santosh K; Cabral, Katherine P; Buschmann, Ivo R; Sidhu, Mandeep S

    2015-01-01

    Nitroglycerin is the oldest and most commonly prescribed short-acting anti-anginal agent; however, despite its long history of therapeutic usage, patient and health care provider education regarding the clinical benefits of the short-acting formulations in patients with angina remains under-appreciated. Nitrates predominantly induce vasodilation in large capacitance blood vessels, increase epicardial coronary arterial diameter and coronary collateral blood flow, and impair platelet aggregation. The potential for the prophylactic effect of short-acting nitrates remains an under-appreciated part of optimal medical therapy to reduce angina and decrease myocardial ischemia, thereby enhancing the quality of life. Short-acting nitroglycerin, administered either as a sublingual tablet or spray, can complement anti-anginal therapy as part of optimal medical therapy in patients with refractory and recurrent angina either with or without myocardial revascularization, and is most commonly used to provide rapid therapeutic relief of acute recurrent angina attacks. When administered prophylactically, both formulations increase angina-free walking time on treadmill testing, abolish or delay ST segment depression, and increase exercise tolerance. The sublingual spray formulation provides several clinical advantages compared to tablet formulations, including a lower incidence of headache and superiority to the sublingual tablet in terms of therapeutic action and time to onset, while the magnitude and duration of vasodilatory action appears to be comparable. Furthermore, the sublingual spray formulation may be advantageous to tablet preparations in patients with dry mouth. This review discusses the efficacy and utility of short-acting nitroglycerin (sublingual spray and tablet) therapy for both preventing and aborting an acute angina attack, thereby leading to an improved quality of life. PMID:26316714

  18. Sleep quality, morningness-eveningness preference, mood profile, and levels of serum melatonin in migraine patients: a case-control study.

    PubMed

    Kozak, Hasan Hüseyin; Boysan, Murat; Uca, Ali Ulvi; Aydın, Adem; Kılınç, İbrahim; Genç, Emine; Altaş, Mustafa; Güngör, Dilara Cari; Turgut, Keziban; Özer, Nejla

    2017-03-01

    The melatonin as the pineal gland's secretory product is implicated in the pathophysiology of migraine. Melatonin has critical functions in human physiology, and research underscores the importance of melatonin in circadian rhythm, sleep, and mood regulation. Clinical observations have indicated that migraine attacks have a seasonal, menstrual, and circadian timing, suggesting that chronobiological mechanisms and their alterations may causally involve in the etiology of the disease. However, the topic has received relatively little attention in the migraine literature. Associations between melatonin, circadian preference, sleep, and mood states were investigated in the current study. Fifty-five patients (47 females and 8 males) were compared to 57 gender and age-matched control subjects (40 females and 17 males). A socio-demographical questionnaire, the Beck Depression Inventory, Beck Anxiety Inventory (BAI), Pittsburgh Sleep Quality Index (PSQI), Profile of Mood States (POMS), and Morningness-Eveningness Questionnaire were administered to volunteers. Blood samples were taken from all participants at about 1:00 AM in an unlit room not to hamper melatonin secretion, and blood melatonin levels were measured using quantitative ELISA test. In comparison with controls, melatonin levels were significantly lower among migraine patients. Migraineurs reported significantly greater scores on the BAI, confusion-bewilderment subscale of the POMS, and total and sleep latency subscale of the PSQI. Migraine patients who had nausea during the migraine attacks and who reported bouts relevant to certain food consumption, such as cheese or chocolate, had significantly lower levels of melatonin. Contrarily, groups did not reveal statistically substantial difference in circadian preferences.

  19. Quality of Life in Physical and Psychological Health and Social Environment at Posthospitalization Period in Patients with Stroke.

    PubMed

    Karube, Narumi; Sasaki, Aya; Hondoh, Fumika; Odagiri, Chiyo; Hagii, Joji; Seino, Satoshi; Yasujima, Minoru; Osanai, Tomohiro

    2016-10-01

    Interaction of quality of life (QOL) in physical and psychological health and social environment has not been tested in stroke during a posthospitalization period, and a better understanding of the components of QOL would lead to a more integrated and person-centered approach to health management and outcome optimization. We investigated how QOL emerges from the sequelae of stroke and interacts with each other during the posthospitalization period. We performed a cross-sectional study in 53 outpatients of stroke survivors (39 men and 14 women with a mean age of 66 years, 46 infarctions, and 7 hemorrhages). Eight QOL domains of psychological health were scored by interview, and 2 of them ("desire to distend what they can do" or "desire to do rehabilitation") were associated with the improvement of physical health during the posthospitalization period (P < .05 and P = .08, respectively). These patients were characterized by the items like "I need to succeed for health improvement, to go home, to go back to work, and to see grandchildren" as goals to achieve their desire (P < .05). In interaction of QOL in psychological health and social environment, another psychological domain "to gain satisfaction from the experience" was closely related to the presence of hobby or work before stroke attack (P < .05). During the posthospitalization period, QOL of psychological health may support that of physical health, being associated with the presence of hobby or work before stroke attack. Copyright © 2016 National Stroke Association. Published by Elsevier Inc. All rights reserved.

  20. Tobacco control advocates must demand high-quality media campaigns: the California experience

    PubMed Central

    Balbach, E.; Glantz, S.

    1998-01-01

    OBJECTIVE—To document efforts on the part of public officials in California to soften the media campaign's attack on the tobacco industry and to analyse strategies to counter those efforts on the part of tobacco control advocates.
METHODS—Data were gathered from interviews with programme participants, direct observation, written materials, and media stories. In addition, internal documents were released by the state's Department of Health Services in response to requests made under the California Public Records Act by Americans for Nonsmokers' Rights. Finally, a draft of the paper was circulated to 11 key players for their comments.
RESULTS—In 1988 California voters enacted Proposition 99, an initiative that raised the tobacco tax by $0.25 and allocated 20% of the revenues to anti-tobacco education. A media campaign, which was part of the education programme, directly attacked the tobacco industry, exposing the media campaign to politically based efforts to shut it down or soften it. Through use of outsider strategies such as advertising, press conferences, and public meetings, programme advocates were able to counter the efforts to soften the campaign.
CONCLUSION—Anti-tobacco media campaigns that expose industry manipulation are a key component of an effective tobacco control programme. The effectiveness of these campaigns, however, makes them a target for elimination by the tobacco industry. The experience from California demonstrates the need for continuing, aggressive intervention by non-governmental organisations in order to maintain the quality of anti-tobacco media campaigns.


Keywords: media campaigns; anti-tobacco advocacy; California PMID:10093175

Top