NASA Astrophysics Data System (ADS)
Hu, Haibin
2017-05-01
Among numerous WEB security issues, SQL injection is the most notable and dangerous. In this study, characteristics and procedures of SQL injection are analyzed, and the method for detecting the SQL injection attack is illustrated. The defense resistance and remedy model of SQL injection attack is established from the perspective of non-intrusive SQL injection attack and defense. Moreover, the ability of resisting the SQL injection attack of the server has been comprehensively improved through the security strategies on operation system, IIS and database, etc.. Corresponding codes are realized. The method is well applied in the actual projects.
Detecting Distributed SQL Injection Attacks in a Eucalyptus Cloud Environment
NASA Technical Reports Server (NTRS)
Kebert, Alan; Barnejee, Bikramjit; Solano, Juan; Solano, Wanda
2013-01-01
The cloud computing environment offers malicious users the ability to spawn multiple instances of cloud nodes that are similar to virtual machines, except that they can have separate external IP addresses. In this paper we demonstrate how this ability can be exploited by an attacker to distribute his/her attack, in particular SQL injection attacks, in such a way that an intrusion detection system (IDS) could fail to identify this attack. To demonstrate this, we set up a small private cloud, established a vulnerable website in one instance, and placed an IDS within the cloud to monitor the network traffic. We found that an attacker could quite easily defeat the IDS by periodically altering its IP address. To detect such an attacker, we propose to use multi-agent plan recognition, where the multiple source IPs are considered as different agents who are mounting a collaborative attack. We show that such a formulation of this problem yields a more sophisticated approach to detecting SQL injection attacks within a cloud computing environment.
SiC: An Agent Based Architecture for Preventing and Detecting Attacks to Ubiquitous Databases
NASA Astrophysics Data System (ADS)
Pinzón, Cristian; de Paz, Yanira; Bajo, Javier; Abraham, Ajith; Corchado, Juan M.
One of the main attacks to ubiquitous databases is the structure query language (SQL) injection attack, which causes severe damages both in the commercial aspect and in the user’s confidence. This chapter proposes the SiC architecture as a solution to the SQL injection attack problem. This is a hierarchical distributed multiagent architecture, which involves an entirely new approach with respect to existing architectures for the prevention and detection of SQL injections. SiC incorporates a kind of intelligent agent, which integrates a case-based reasoning system. This agent, which is the core of the architecture, allows the application of detection techniques based on anomalies as well as those based on patterns, providing a great degree of autonomy, flexibility, robustness and dynamic scalability. The characteristics of the multiagent system allow an architecture to detect attacks from different types of devices, regardless of the physical location. The architecture has been tested on a medical database, guaranteeing safe access from various devices such as PDAs and notebook computers.
Protecting Database Centric Web Services against SQL/XPath Injection Attacks
NASA Astrophysics Data System (ADS)
Laranjeiro, Nuno; Vieira, Marco; Madeira, Henrique
Web services represent a powerful interface for back-end database systems and are increasingly being used in business critical applications. However, field studies show that a large number of web services are deployed with security flaws (e.g., having SQL Injection vulnerabilities). Although several techniques for the identification of security vulnerabilities have been proposed, developing non-vulnerable web services is still a difficult task. In fact, security-related concerns are hard to apply as they involve adding complexity to already complex code. This paper proposes an approach to secure web services against SQL and XPath Injection attacks, by transparently detecting and aborting service invocations that try to take advantage of potential vulnerabilities. Our mechanism was applied to secure several web services specified by the TPC-App benchmark, showing to be 100% effective in stopping attacks, non-intrusive and very easy to use.
Ultrabroadband photonic internet: safety aspects
NASA Astrophysics Data System (ADS)
Kalicki, Arkadiusz; Romaniuk, Ryszard
2008-11-01
Web applications became most popular medium in the Internet. Popularity, easiness of web application frameworks together with careless development results in high number of vulnerabilities and attacks. There are several types of attacks possible because of improper input validation. SQL injection is ability to execute arbitrary SQL queries in a database through an existing application. Cross-site scripting is the vulnerability which allows malicious web users to inject code into the web pages viewed by other users. Cross-Site Request Forgery (CSRF) is an attack that tricks the victim into loading a page that contains malicious request. Web spam in blogs. There are several techniques to mitigate attacks. Most important are web application strong design, correct input validation, defined data types for each field and parameterized statements in SQL queries. Server hardening with firewall, modern security policies systems and safe web framework interpreter configuration are essential. It is advised to keep proper security level on client side, keep updated software and install personal web firewalls or IDS/IPS systems. Good habits are logging out from services just after finishing work and using even separate web browser for most important sites, like e-banking.
Vulnerability Assessment of IPv6 Websites to SQL Injection and Other Application Level Attacks
Cho, Ying-Chiang; Pan, Jen-Yi
2013-01-01
Given the proliferation of internet connected devices, IPv6 has been proposed to replace IPv4. Aside from providing a larger address space which can be assigned to internet enabled devices, it has been suggested that the IPv6 protocol offers increased security due to the fact that with the large number of addresses available, standard IP scanning attacks will no longer become feasible. However, given the interest in attacking organizations rather than individual devices, most initial points of entry onto an organization's network and their attendant devices are visible and reachable through web crawling techniques, and, therefore, attacks on the visible application layer may offer ways to compromise the overall network. In this evaluation, we provide a straightforward implementation of a web crawler in conjunction with a benign black box penetration testing system and analyze the ease at which SQL injection attacks can be carried out. PMID:24574863
Vulnerability assessment of IPv6 websites to SQL injection and other application level attacks.
Cho, Ying-Chiang; Pan, Jen-Yi
2013-01-01
Given the proliferation of internet connected devices, IPv6 has been proposed to replace IPv4. Aside from providing a larger address space which can be assigned to internet enabled devices, it has been suggested that the IPv6 protocol offers increased security due to the fact that with the large number of addresses available, standard IP scanning attacks will no longer become feasible. However, given the interest in attacking organizations rather than individual devices, most initial points of entry onto an organization's network and their attendant devices are visible and reachable through web crawling techniques, and, therefore, attacks on the visible application layer may offer ways to compromise the overall network. In this evaluation, we provide a straightforward implementation of a web crawler in conjunction with a benign black box penetration testing system and analyze the ease at which SQL injection attacks can be carried out.
76 FR 26729 - Ceridian Corporation; Analysis of Proposed Consent Order to Aid Public Comment
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-09
... result of these failures, hackers executed an SQL injection attack on the Powerpay Web site and Web application. Through this attack, the hackers found personal information stored in Powerpay on Ceridian's...
Preventing SQL Code Injection by Combining Static and Runtime Analysis
2008-05-01
attacker changes the developer’s intended structure of an SQ L com- mand by inserting new SQ L keywords or operators. (Su and Wasser - mann provide a...FROM b o o k s WHERE a u t h o r = ’ ’ GROUP BY r a t i n g We use symbol as a placeholder for the indeterminate part of the command (in this...dialects of SQL.) In our model, we mark transitions that correspond to externally defined strings with the symbol . To illustrate, Figure 2 shows the SQL
Offense-Defense Balance in Cyberspace: A Proposed Model
2012-12-01
enable faster multitasking , the more computations per second can be accomplished. Increased processing speed will allow an attacker to send attacks...depend on what spam or DDoS needs to be accomplished with prices ranging from $30-$70 a day for DDoS to $10 for 1 million spam emails . 21 For...In addition to DDoS attacks on webservers, there were web defacements (using various tools such as SQL injections) and email flooding. The attacks
Network traffic anomaly prediction using Artificial Neural Network
NASA Astrophysics Data System (ADS)
Ciptaningtyas, Hening Titi; Fatichah, Chastine; Sabila, Altea
2017-03-01
As the excessive increase of internet usage, the malicious software (malware) has also increase significantly. Malware is software developed by hacker for illegal purpose(s), such as stealing data and identity, causing computer damage, or denying service to other user[1]. Malware which attack computer or server often triggers network traffic anomaly phenomena. Based on Sophos's report[2], Indonesia is the riskiest country of malware attack and it also has high network traffic anomaly. This research uses Artificial Neural Network (ANN) to predict network traffic anomaly based on malware attack in Indonesia which is recorded by Id-SIRTII/CC (Indonesia Security Incident Response Team on Internet Infrastructure/Coordination Center). The case study is the highest malware attack (SQL injection) which has happened in three consecutive years: 2012, 2013, and 2014[4]. The data series is preprocessed first, then the network traffic anomaly is predicted using Artificial Neural Network and using two weight update algorithms: Gradient Descent and Momentum. Error of prediction is calculated using Mean Squared Error (MSE) [7]. The experimental result shows that MSE for SQL Injection is 0.03856. So, this approach can be used to predict network traffic anomaly.
Operational Exercise Integration Recommendations for DoD Cyber Ranges
2015-08-05
be the precision and recall of a security information and event management (SIEM) system ’s notifications of unauthorized access to that directory...network traffic, port scanning Deplete Resources TCP flooding, memory leak exploitation Injection Cross-site scripting attacks, SQL injection Deceptive...requirements for personnel development; tactics, techniques, and procedures (TTPs) devel- opment; and mission rehearsals . While unique in their own
Comparisons of Attacks on Honeypots With Those on Real Networks
2006-03-01
Oracle , MySQL , or PostgreSQL. Figure 2 shows an incoming packet and the process involved before and after the Snort engine detects the suspicious...stored on a separate, secured system.”[2]. Honeypots have several other uses besides monitoring attackers. They serve to protect real networks and...interaction vs . high-interaction. Although, both low-interaction and high-interaction honeypots are effective in soliciting attacks, high-interaction
Multiple-Feature Extracting Modules Based Leak Mining System Design
Cho, Ying-Chiang; Pan, Jen-Yi
2013-01-01
Over the years, human dependence on the Internet has increased dramatically. A large amount of information is placed on the Internet and retrieved from it daily, which makes web security in terms of online information a major concern. In recent years, the most problematic issues in web security have been e-mail address leakage and SQL injection attacks. There are many possible causes of information leakage, such as inadequate precautions during the programming process, which lead to the leakage of e-mail addresses entered online or insufficient protection of database information, a loophole that enables malicious users to steal online content. In this paper, we implement a crawler mining system that is equipped with SQL injection vulnerability detection, by means of an algorithm developed for the web crawler. In addition, we analyze portal sites of the governments of various countries or regions in order to investigate the information leaking status of each site. Subsequently, we analyze the database structure and content of each site, using the data collected. Thus, we make use of practical verification in order to focus on information security and privacy through black-box testing. PMID:24453892
Multiple-feature extracting modules based leak mining system design.
Cho, Ying-Chiang; Pan, Jen-Yi
2013-01-01
Over the years, human dependence on the Internet has increased dramatically. A large amount of information is placed on the Internet and retrieved from it daily, which makes web security in terms of online information a major concern. In recent years, the most problematic issues in web security have been e-mail address leakage and SQL injection attacks. There are many possible causes of information leakage, such as inadequate precautions during the programming process, which lead to the leakage of e-mail addresses entered online or insufficient protection of database information, a loophole that enables malicious users to steal online content. In this paper, we implement a crawler mining system that is equipped with SQL injection vulnerability detection, by means of an algorithm developed for the web crawler. In addition, we analyze portal sites of the governments of various countries or regions in order to investigate the information leaking status of each site. Subsequently, we analyze the database structure and content of each site, using the data collected. Thus, we make use of practical verification in order to focus on information security and privacy through black-box testing.
PKI Layer Cake: New Collision Attacks against the Global X.509 Infrastructure
NASA Astrophysics Data System (ADS)
Kaminsky, Dan; Patterson, Meredith L.; Sassaman, Len
Research unveiled in December of 2008 [15] showed how MD5's long-known flaws could be actively exploited to attack the real-worldCertification Authority infrastructure. In this paper, we demonstrate two new classes of collision, which will be somewhat trickier to address than previous attacks against X.509: the applicability of MD2 preimage attacks against the primary root certificate for Verisign, and the difficulty of validating X.509 Names contained within PKCS#10 Certificate Requests.We also draw particular attention to two possibly unrecognized vectors for implementation flaws that have been problematic in the past: the ASN.1 BER decoder required to parsePKCS#10, and the potential for SQL injection fromtext contained within its requests. Finally, we explore why the implications of these attacks are broader than some have realized - first, because Client Authentication is sometimes tied to X.509, and second, because Extended Validation certificates were only intended to stop phishing attacks from names similar to trusted brands. As per the work of Adam Barth and Collin Jackson [4], EV does not prevent an attacker who can synthesize or acquire a "low assurance" certificate for a given name from acquiring the "green bar" EV experience.
Using the Domain Name System to Thwart Automated Client-Based Attacks
DOE Office of Scientific and Technical Information (OSTI.GOV)
Taylor, Curtis R; Shue, Craig A
2011-09-01
On the Internet, attackers can compromise systems owned by other people and then use these systems to launch attacks automatically. When attacks such as phishing or SQL injections are successful, they can have negative consequences including server downtime and the loss of sensitive information. Current methods to prevent such attacks are limited in that they are application-specific, or fail to block attackers. Phishing attempts can be stopped with email filters, but if the attacker manages to successfully bypass these filters, then the user must determine if the email is legitimate or not. Unfortunately, they often are unable to do so.more » Since attackers have a low success rate, they attempt to compensate for it in volume. In order to have this high throughput, attackers take shortcuts and break protocols. We use this knowledge to address these issues by implementing a system that can detect malicious activity and use it to block attacks. If the client fails to follow proper procedure, they can be classified as an attacker. Once an attacker has been discovered, they will be isolated and monitored. This can be accomplished using existing software in Ubuntu Linux applications, along with our custom wrapper application. After running the system and seeing its performance on three popular Web browsers Chromium, Firefox and Internet Explorer as well as two popular email clients, Thunderbird and Evolution, we found that not only is this system conceivable, it is effective and has low overhead.« less
Automatically Preparing Safe SQL Queries
NASA Astrophysics Data System (ADS)
Bisht, Prithvi; Sistla, A. Prasad; Venkatakrishnan, V. N.
We present the first sound program source transformation approach for automatically transforming the code of a legacy web application to employ PREPARE statements in place of unsafe SQL queries. Our approach therefore opens the way for eradicating the SQL injection threat vector from legacy web applications.
Survey of Machine Learning Methods for Database Security
NASA Astrophysics Data System (ADS)
Kamra, Ashish; Ber, Elisa
Application of machine learning techniques to database security is an emerging area of research. In this chapter, we present a survey of various approaches that use machine learning/data mining techniques to enhance the traditional security mechanisms of databases. There are two key database security areas in which these techniques have found applications, namely, detection of SQL Injection attacks and anomaly detection for defending against insider threats. Apart from the research prototypes and tools, various third-party commercial products are also available that provide database activity monitoring solutions by profiling database users and applications. We present a survey of such products. We end the chapter with a primer on mechanisms for responding to database anomalies.
Classification of HTTP Attacks: A Study on the ECML/PKDD 2007 Discovery Challenge
DOE Office of Scientific and Technical Information (OSTI.GOV)
Gallagher, Brian; Eliassi-Rad, Tina
2009-07-08
As the world becomes more reliant on Web applications for commercial, financial, and medical transactions, cyber attacks on the World Wide Web are increasing in frequency and severity. Web applications provide an attractive alternative to traditional desktop applications due to their accessibility and ease of deployment. However, the accessibility of Web applications also makes them extremely vulnerable to attack. This inherent vulnerability is intensified by the distributed nature ofWeb applications and the complexity of configuring application servers. These factors have led to a proliferation of Web-based attacks, in which attackers surreptitiously inject code into HTTP requests, allowing them to executemore » arbitrary commands on remote systems and perform malicious activities such as reading, altering, or destroying sensitive data. One approach for dealing with HTTP-based attacks is to identify malicious code in incoming HTTP requests and eliminate bad requests before they are processed. Using machine learning techniques, we can build a classifier to automatically label requests as “Valid” or “Attack.” For this study, we develop a simple, but effective HTTP attack classifier, based on the vector space model used commonly for Information Retrieval. Our classifier not only separates attacks from valid requests, but can also identify specific attack types (e.g., “SQL Injection” or “Path Traversal”). We demonstrate the effectiveness of our approach through experiments on the ECML/PKDD 2007 Discovery Challenge data set. Specifically, we show that our approach achieves higher precision and recall than previous methods. In addition, our approach has a number of desirable characteristics, including robustness to missing contextual information, interpretability of models, and scalability.« less
Methods to Secure Databases Against Vulnerabilities
2015-12-01
for several languages such as C, C++, PHP, Java and Python [16]. MySQL will work well with very large databases. The documentation references...using Eclipse and connected to each database management system using Python and Java drivers provided by MySQL , MongoDB, and Datastax (for Cassandra...tiers in Python and Java . Problem MySQL MongoDB Cassandra 1. Injection a. Tautologies Vulnerable Vulnerable Not Vulnerable b. Illegal query
2014-06-01
central location. Each of the SQLite databases are converted and stored in one MySQL database and the pcap files are parsed to extract call information...from the specific communications applications used during the experiment. This extracted data is then stored in the same MySQL database. With all...rhythm of the event. Figure 3 demonstrates the application usage over the course of the experiment for the EXDIR. As seen, the EXDIR spent the majority
Hardware Assisted Stealthy Diversity (CHECKMATE)
2013-09-01
applicable across multiple architectures. Figure 29 shows an example an attack against an interpreted environment with a Java executable. CHECKMATE can...Architectures ARM PPCx86 Java VM Java VMJava VM Java Executable Attack APPROVED FOR PUBLIC RELEASE; DISTRIBUTION UNLIMITED 33 a user executes “/usr/bin/wget...Server 1 - Administration Server 2 – Database ( mySQL ) Server 3 – Web server (Mongoose) Server 4 – File server (SSH) Server 5 – Email server
Design and implementation of website information disclosure assessment system.
Cho, Ying-Chiang; Pan, Jen-Yi
2015-01-01
Internet application technologies, such as cloud computing and cloud storage, have increasingly changed people's lives. Websites contain vast amounts of personal privacy information. In order to protect this information, network security technologies, such as database protection and data encryption, attract many researchers. The most serious problems concerning web vulnerability are e-mail address and network database leakages. These leakages have many causes. For example, malicious users can steal database contents, taking advantage of mistakes made by programmers and administrators. In order to mitigate this type of abuse, a website information disclosure assessment system is proposed in this study. This system utilizes a series of technologies, such as web crawler algorithms, SQL injection attack detection, and web vulnerability mining, to assess a website's information disclosure. Thirty websites, randomly sampled from the top 50 world colleges, were used to collect leakage information. This testing showed the importance of increasing the security and privacy of website information for academic websites.
Flexible network reconstruction from relational databases with Cytoscape and CytoSQL
2010-01-01
Background Molecular interaction networks can be efficiently studied using network visualization software such as Cytoscape. The relevant nodes, edges and their attributes can be imported in Cytoscape in various file formats, or directly from external databases through specialized third party plugins. However, molecular data are often stored in relational databases with their own specific structure, for which dedicated plugins do not exist. Therefore, a more generic solution is presented. Results A new Cytoscape plugin 'CytoSQL' is developed to connect Cytoscape to any relational database. It allows to launch SQL ('Structured Query Language') queries from within Cytoscape, with the option to inject node or edge features of an existing network as SQL arguments, and to convert the retrieved data to Cytoscape network components. Supported by a set of case studies we demonstrate the flexibility and the power of the CytoSQL plugin in converting specific data subsets into meaningful network representations. Conclusions CytoSQL offers a unified approach to let Cytoscape interact with relational databases. Thanks to the power of the SQL syntax, this tool can rapidly generate and enrich networks according to very complex criteria. The plugin is available at http://www.ptools.ua.ac.be/CytoSQL. PMID:20594316
Flexible network reconstruction from relational databases with Cytoscape and CytoSQL.
Laukens, Kris; Hollunder, Jens; Dang, Thanh Hai; De Jaeger, Geert; Kuiper, Martin; Witters, Erwin; Verschoren, Alain; Van Leemput, Koenraad
2010-07-01
Molecular interaction networks can be efficiently studied using network visualization software such as Cytoscape. The relevant nodes, edges and their attributes can be imported in Cytoscape in various file formats, or directly from external databases through specialized third party plugins. However, molecular data are often stored in relational databases with their own specific structure, for which dedicated plugins do not exist. Therefore, a more generic solution is presented. A new Cytoscape plugin 'CytoSQL' is developed to connect Cytoscape to any relational database. It allows to launch SQL ('Structured Query Language') queries from within Cytoscape, with the option to inject node or edge features of an existing network as SQL arguments, and to convert the retrieved data to Cytoscape network components. Supported by a set of case studies we demonstrate the flexibility and the power of the CytoSQL plugin in converting specific data subsets into meaningful network representations. CytoSQL offers a unified approach to let Cytoscape interact with relational databases. Thanks to the power of the SQL syntax, this tool can rapidly generate and enrich networks according to very complex criteria. The plugin is available at http://www.ptools.ua.ac.be/CytoSQL.
Vulnerabilities in Bytecode Removed by Analysis, Nuanced Confinement and Diversification (VIBRANCE)
2015-06-01
VIBRANCE tool starts with a vulnerable Java application and automatically hardens it against SQL injection, OS command injection, file path traversal...7 2.2 Java Front End...7 2.2.2 Java Byte Code Parser
Assessing the Effect of Honeypots on Cyber-Attackers
2006-12-01
provide a process for modeling threats and decision cycles. The third to fifth sections provide the history and overview of honeypots and anti-honeypot...XP Professional with SP2 Data Capture (SUSE Linux 10) Primary Goal Store Snort Data Storage PostgreSQL 8.1.1 Fake Self-contained Honeynet (SUSE
Longhurst, Hilary J; Aberer, Werner; Bouillet, Laurence; Caballero, Teresa; Fabien, Vincent; Zanichelli, Andrea; Maurer, Marcus
2015-01-01
Phase 3 icatibant trials showed that most hereditary angioedema (HAE) (C1 inhibitor deficiency) acute attacks were treated successfully with one injection of icatibant, a selective bradykinin B2 receptor antagonist. We conducted a post hoc analysis of icatibant reinjection for HAE type I and II attacks in a real-world setting by using data from the Icatibant Outcome Survey, an ongoing observational study that monitors the safety and effectiveness of icatibant treatment. Descriptive retrospective analyses of icatibant reinjection were performed on Icatibant Outcome Survey data (February 2008 to December 2012). New attacks were defined as the onset of new symptoms after full resolution of the previous attack. Potential associations between the patient and attack characteristics and reinjection were explored by using logistic regression analysis. Icatibant was administered for 652 attacks in 170 patients with HAE type I or II. Most attacks (89.1%) were treated with a single icatibant injection. For attacks that required two or three injections, the second injection was given a median of 11.0 hours after the first injection, with 90.4% of second injections administered ≥6 hours after the first injection. Time to resolution and attack duration were significantly longer for two or three injections versus one icatibant injection (p < 0.0001 and p < 0.05, respectively). Multivariate logistic regression analysis identified sex, attack severity, and laryngeal attacks as significantly correlated with reinjection (all p ≤ 0.05). These factors did not remain predictors for reinjection when two outlier patients with distinct patterns of icatibant use were excluded. In this real-world setting, most HAE attacks resolved with one icatibant injection. There was no distinct profile for patients or attacks that required reinjection when outliers with substantially different patterns of use were excluded. Because new attacks were not distinguished from the recurrence of symptoms, reinjection rates may be slightly higher than shown here. Clinical trial identifier: NCT01034969.
Design and Implementation of Website Information Disclosure Assessment System
Cho, Ying-Chiang; Pan, Jen-Yi
2015-01-01
Internet application technologies, such as cloud computing and cloud storage, have increasingly changed people’s lives. Websites contain vast amounts of personal privacy information. In order to protect this information, network security technologies, such as database protection and data encryption, attract many researchers. The most serious problems concerning web vulnerability are e-mail address and network database leakages. These leakages have many causes. For example, malicious users can steal database contents, taking advantage of mistakes made by programmers and administrators. In order to mitigate this type of abuse, a website information disclosure assessment system is proposed in this study. This system utilizes a series of technologies, such as web crawler algorithms, SQL injection attack detection, and web vulnerability mining, to assess a website’s information disclosure. Thirty websites, randomly sampled from the top 50 world colleges, were used to collect leakage information. This testing showed the importance of increasing the security and privacy of website information for academic websites. PMID:25768434
Reding, Michael E; Oliver, Jason B; Schultz, Peter B; Ranger, Christopher M; Youssef, Nadeer N
2013-02-01
Exotic ambrosia beetles are damaging pests in ornamental tree nurseries in North America. The species Xylosandrus crassiusculus (Motshulsky) and Xylosandrus germanus (Blandford) are especially problematic. Management of these pests relies on preventive treatments of insecticides. However, field tests of recommended materials on nursery trees have been limited because of unreliable attacks by ambrosia beetles on experimental trees. Ethanol-injection of trees was used to induce colonization by ambrosia beetles to evaluate insecticides and botanical formulations for preventing attacks by ambrosia beetles. Experiments were conducted in Ohio, Tennessee, and Virginia. Experimental trees injected with ethanol had more attacks by ambrosia beetles than uninjected control trees in all but one experiment. Xylosandrus crassiusculus and X. germanus colonized trees injected with ethanol. In most experiments, attack rates declined 8 d after ethanol-injection. Ethanol-injection induced sufficient pressure from ambrosia beetles to evaluate the efficacy of insecticides for preventing attacks. Trunk sprays of permethrin suppressed cumulative total attacks by ambrosia beetles in most tests. Trunk sprays of the botanical formulations Armorex and Veggie Pharm suppressed cumulative total attacks in Ohio. Armorex, Armorex + Permethrin, and Veggie Pharm + Permethrin suppressed attacks in Tennessee. The bifenthrin product Onyx suppressed establishment of X. germanus in one Ohio experiment, and cumulative total ambrosia beetle attacks in Virginia. Substrate drenches and trunk sprays of neonicotinoids, or trunk sprays of anthranilic diamides or tolfenpyrad were not effective. Ethanol-injection is effective for inducing attacks and ensuring pressure by ambrosia beetles for testing insecticide efficacy on ornamental trees.
Heavy-Ion Microbeam Fault Injection into SRAM-Based FPGA Implementations of Cryptographic Circuits
NASA Astrophysics Data System (ADS)
Li, Huiyun; Du, Guanghua; Shao, Cuiping; Dai, Liang; Xu, Guoqing; Guo, Jinlong
2015-06-01
Transistors hit by heavy ions may conduct transiently, thereby introducing transient logic errors. Attackers can exploit these abnormal behaviors and extract sensitive information from the electronic devices. This paper demonstrates an ion irradiation fault injection attack experiment into a cryptographic field-programmable gate-array (FPGA) circuit. The experiment proved that the commercial FPGA chip is vulnerable to low-linear energy transfer carbon irradiation, and the attack can cause the leakage of secret key bits. A statistical model is established to estimate the possibility of an effective fault injection attack on cryptographic integrated circuits. The model incorporates the effects from temporal, spatial, and logical probability of an effective attack on the cryptographic circuits. The rate of successful attack calculated from the model conforms well to the experimental results. This quantitative success rate model can help evaluate security risk for designers as well as for the third-party assessment organizations.
NASA Astrophysics Data System (ADS)
Liu, Xuan
Power grid is one of the most critical infrastructures in a nation and could suffer a variety of cyber attacks. With the development of Smart Grid, false data injection attack has recently attracted wide research interest. This thesis proposes a false data attack model with incomplete network information and develops optimal attack strategies for attacking load measurements and the real-time topology of a power grid. The impacts of false data on the economic and reliable operations of power systems are quantitatively analyzed in this thesis. To mitigate the risk of cyber attacks, a distributed protection strategies are also developed. It has been shown that an attacker can design false data to avoid being detected by the control center if the network information of a power grid is known to the attacker. In practice, however, it is very hard or even impossible for an attacker to obtain all network information of a power grid. In this thesis, we propose a local load redistribution attacking model based on incomplete network information and show that an attacker only needs to obtain the network information of the local attacking region to inject false data into smart meters in the local region without being detected by the state estimator. A heuristic algorithm is developed to determine a feasible attacking region by obtaining reduced network information. This thesis investigates the impacts of false data on the operations of power systems. It has been shown that false data can be designed by an attacker to: 1) mask the real-time topology of a power grid; 2) overload a transmission line; 3) disturb the line outage detection based on PMU data. To mitigate the risk of cyber attacks, this thesis proposes a new protection strategy, which intends to mitigate the damage effects of false data injection attacks by protecting a small set of critical measurements. To further reduce the computation complexity, a mixed integer linear programming approach is also proposed to separate the power grid into several subnetworks, then distributed protection strategy is applied to each subnetwork.
Combating Memory Corruption Attacks On Scada Devices
NASA Astrophysics Data System (ADS)
Bellettini, Carlo; Rrushi, Julian
Memory corruption attacks on SCADA devices can cause significant disruptions to control systems and the industrial processes they operate. However, despite the presence of numerous memory corruption vulnerabilities, few, if any, techniques have been proposed for addressing the vulnerabilities or for combating memory corruption attacks. This paper describes a technique for defending against memory corruption attacks by enforcing logical boundaries between potentially hostile data and safe data in protected processes. The technique encrypts all input data using random keys; the encrypted data is stored in main memory and is decrypted according to the principle of least privilege just before it is processed by the CPU. The defensive technique affects the precision with which attackers can corrupt control data and pure data, protecting against code injection and arc injection attacks, and alleviating problems posed by the incomparability of mitigation techniques. An experimental evaluation involving the popular Modbus protocol demonstrates the feasibility and efficiency of the defensive technique.
Physical Watermarking for Securing Cyber-Physical Systems via Packet Drop Injections
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ozel, Omur; Weekrakkody, Sean; Sinopoli, Bruno
Physical watermarking is a well known solution for detecting integrity attacks on Cyber-Physical Systems (CPSs) such as the smart grid. Here, a random control input is injected into the system in order to authenticate physical dynamics and sensors which may have been corrupted by adversaries. Packet drops may naturally occur in a CPS due to network imperfections. To our knowledge, previous work has not considered the role of packet drops in detecting integrity attacks. In this paper, we investigate the merit of injecting Bernoulli packet drops into the control inputs sent to actuators as a new physical watermarking scheme. Withmore » the classical linear quadratic objective function and an independent and identically distributed packet drop injection sequence, we study the effect of packet drops on meeting security and control objectives. Our results indicate that the packet drops could act as a potential physical watermark for attack detection in CPSs.« less
... causes pain, swelling, and damage) including the following: rheumatoid arthritis (a condition in which the body attacks its ... If you are using adalimumab injection to treat rheumatoid arthritis, your doctor may tell you to inject the ...
... body and causes pain, swelling, and damage) including: rheumatoid arthritis (condition in which the body attacks its own ... doctor.If golimumab injection is used to treat rheumatoid arthritis, it may also be injected intravenously (into a ...
Reset Tree-Based Optical Fault Detection
Lee, Dong-Geon; Choi, Dooho; Seo, Jungtaek; Kim, Howon
2013-01-01
In this paper, we present a new reset tree-based scheme to protect cryptographic hardware against optical fault injection attacks. As one of the most powerful invasive attacks on cryptographic hardware, optical fault attacks cause semiconductors to misbehave by injecting high-energy light into a decapped integrated circuit. The contaminated result from the affected chip is then used to reveal secret information, such as a key, from the cryptographic hardware. Since the advent of such attacks, various countermeasures have been proposed. Although most of these countermeasures are strong, there is still the possibility of attack. In this paper, we present a novel optical fault detection scheme that utilizes the buffers on a circuit's reset signal tree as a fault detection sensor. To evaluate our proposal, we model radiation-induced currents into circuit components and perform a SPICE simulation. The proposed scheme is expected to be used as a supplemental security tool. PMID:23698267
... rejection (attack of a transplanted organ by the immune system of a person receiving the organ) of kidney ... It works by decreasing the activity of the immune system to prevent it from attacking the transplanted kidney.
... rejection (attack of the transplanted organ by the immune system of the person receiving the organ) in people ... works by decreasing the activity of the body's immune system so it will not attack the transplanted organ.
Improved Information Retrieval Performance on SQL Database Using Data Adapter
NASA Astrophysics Data System (ADS)
Husni, M.; Djanali, S.; Ciptaningtyas, H. T.; Wicaksana, I. G. N. A.
2018-02-01
The NoSQL databases, short for Not Only SQL, are increasingly being used as the number of big data applications increases. Most systems still use relational databases (RDBs), but as the number of data increases each year, the system handles big data with NoSQL databases to analyze and access data more quickly. NoSQL emerged as a result of the exponential growth of the internet and the development of web applications. The query syntax in the NoSQL database differs from the SQL database, therefore requiring code changes in the application. Data adapter allow applications to not change their SQL query syntax. Data adapters provide methods that can synchronize SQL databases with NotSQL databases. In addition, the data adapter provides an interface which is application can access to run SQL queries. Hence, this research applied data adapter system to synchronize data between MySQL database and Apache HBase using direct access query approach, where system allows application to accept query while synchronization process in progress. From the test performed using data adapter, the results obtained that the data adapter can synchronize between SQL databases, MySQL, and NoSQL database, Apache HBase. This system spends the percentage of memory resources in the range of 40% to 60%, and the percentage of processor moving from 10% to 90%. In addition, from this system also obtained the performance of database NoSQL better than SQL database.
Passive Fingerprinting Of Computer Network Reconnaissance Tools
2009-09-01
v6 for version 6 MITM : Man-In-The-Middle Attack MSS: Maximum Segment Size NOP: No Operation Performed NPS: Naval Postgraduate School OS...specific, or man-in-the- middle ( MITM ) attacks. Depending on the attacker’s position to access the targeted network, the attacker may be able to...identification numbers. Both are ordinarily supposed to be initialized as a random number to make it difficult for an attacker to perform an injection MITM
Security attack detection algorithm for electric power gis system based on mobile application
NASA Astrophysics Data System (ADS)
Zhou, Chao; Feng, Renjun; Wang, Liming; Huang, Wei; Guo, Yajuan
2017-05-01
Electric power GIS is one of the key information technologies to satisfy the power grid construction in China, and widely used in power grid construction planning, weather, and power distribution management. The introduction of electric power GIS based on mobile applications is an effective extension of the geographic information system that has been widely used in the electric power industry. It provides reliable, cheap and sustainable power service for the country. The accurate state estimation is the important conditions to maintain the normal operation of the electric power GIS. Recent research has shown that attackers can inject the complex false data into the power system. The injection attack of this new type of false data (load integrity attack LIA) can successfully bypass the routine detection to achieve the purpose of attack, so that the control center will make a series of wrong decision. Eventually, leading to uneven distribution of power in the grid. In order to ensure the safety of the electric power GIS system based on mobile application, it is very important to analyze the attack mechanism and propose a new type of attack, and to study the corresponding detection method and prevention strategy in the environment of electric power GIS system based on mobile application.
Item Anomaly Detection Based on Dynamic Partition for Time Series in Recommender Systems
Gao, Min; Tian, Renli; Wen, Junhao; Xiong, Qingyu; Ling, Bin; Yang, Linda
2015-01-01
In recent years, recommender systems have become an effective method to process information overload. However, recommendation technology still suffers from many problems. One of the problems is shilling attacks-attackers inject spam user profiles to disturb the list of recommendation items. There are two characteristics of all types of shilling attacks: 1) Item abnormality: The rating of target items is always maximum or minimum; and 2) Attack promptness: It takes only a very short period time to inject attack profiles. Some papers have proposed item anomaly detection methods based on these two characteristics, but their detection rate, false alarm rate, and universality need to be further improved. To solve these problems, this paper proposes an item anomaly detection method based on dynamic partitioning for time series. This method first dynamically partitions item-rating time series based on important points. Then, we use chi square distribution (χ2) to detect abnormal intervals. The experimental results on MovieLens 100K and 1M indicate that this approach has a high detection rate and a low false alarm rate and is stable toward different attack models and filler sizes. PMID:26267477
Item Anomaly Detection Based on Dynamic Partition for Time Series in Recommender Systems.
Gao, Min; Tian, Renli; Wen, Junhao; Xiong, Qingyu; Ling, Bin; Yang, Linda
2015-01-01
In recent years, recommender systems have become an effective method to process information overload. However, recommendation technology still suffers from many problems. One of the problems is shilling attacks-attackers inject spam user profiles to disturb the list of recommendation items. There are two characteristics of all types of shilling attacks: 1) Item abnormality: The rating of target items is always maximum or minimum; and 2) Attack promptness: It takes only a very short period time to inject attack profiles. Some papers have proposed item anomaly detection methods based on these two characteristics, but their detection rate, false alarm rate, and universality need to be further improved. To solve these problems, this paper proposes an item anomaly detection method based on dynamic partitioning for time series. This method first dynamically partitions item-rating time series based on important points. Then, we use chi square distribution (χ2) to detect abnormal intervals. The experimental results on MovieLens 100K and 1M indicate that this approach has a high detection rate and a low false alarm rate and is stable toward different attack models and filler sizes.
... has not improved when treated with other medications, rheumatoid arthritis (a condition in which the body attacks its ... continues. When certolizumab injection is used to treat rheumatoid arthritis, it is usually given every other week and ...
Yalın, Osman Özgür; Uludüz, Derya; Özge, Aynur
2018-01-01
Short-lasting unilateral neuralgiform headache attacks with conjunctival injection and tearing (SUNCT) is a rare, primary headache syndrome, which is classified as a subtype of trigeminal autonomic cephalalgias. Although SUNCT is usually refractory to treatment, several antiepileptic drugs have recently shown promising results for its treatment. However, there is a lack of evidence regarding the course of SUNCT during pregnancy and the available treatment options. Here, we present a 30-week pregnant female with SUNCT who was successfully treated with infra- and supraorbital nerve blocks. Headache attacks completely diminished after the injection, and recurrence was not observed. Although lamotrigine may be relatively safe in pregnant patients with SUNCT attacks, peripheral nerve block may be a feasible technique and can be considered as a safe and effective treatment option. This is the first SUNCT case in the literature that was successfully treated with infra- and supraorbital nerve blocks during pregnancy.
Research on high availability architecture of SQL and NoSQL
NASA Astrophysics Data System (ADS)
Wang, Zhiguo; Wei, Zhiqiang; Liu, Hao
2017-03-01
With the advent of the era of big data, amount and importance of data have increased dramatically. SQL database develops in performance and scalability, but more and more companies tend to use NoSQL database as their databases, because NoSQL database has simpler data model and stronger extension capacity than SQL database. Almost all database designers including SQL database and NoSQL database aim to improve performance and ensure availability by reasonable architecture which can reduce the effects of software failures and hardware failures, so that they can provide better experiences for their customers. In this paper, I mainly discuss the architectures of MySQL, MongoDB, and Redis, which are high available and have been deployed in practical application environment, and design a hybrid architecture.
Smart Grid Integrity Attacks: Characterizations and Countermeasures
DOE Office of Scientific and Technical Information (OSTI.GOV)
Annarita Giani; Eilyan Bitar; Miles McQueen
2011-10-01
Real power injections at loads and generators, and real power flows on selected lines in a transmission network are monitored, transmitted over a SCADA network to the system operator, and used in state estimation algorithms to make dispatch, re-balance and other energy management system [EMS] decisions. Coordinated cyber attacks of power meter readings can be arranged to be undetectable by any bad data detection algorithm. These unobservable attacks present a serious threat to grid operations. Of particular interest are sparse attacks that involve the compromise of a modest number of meter readings. An efficient algorithm to find all unobservable attacksmore » [under standard DC load flow approximations] involving the compromise of exactly two power injection meters and an arbitrary number of power meters on lines is presented. This requires O(n2m) flops for a power system with n buses and m line meters. If all lines are metered, there exist canonical forms that characterize all 3, 4, and 5-sparse unobservable attacks. These can be quickly detected in power systems using standard graph algorithms. Known secure phase measurement units [PMUs] can be used as countermeasures against an arbitrary collection of cyber attacks. Finding the minimum number of necessary PMUs is NP-hard. It is shown that p + 1 PMUs at carefully chosen buses are sufficient to neutralize a collection of p cyber attacks.« less
Carpenter, Russ E.; Korzan, Wayne J.; Bockholt, Craig; Watt, Michael J.; Forster, Gina L.; Renner, Kenneth J.; Summers, Cliff H.
2009-01-01
Salmonids establish social hierarchies as a result of aggressive social interactions. The establishment of dominant or subordinate status is strongly linked to neuroendocrine responses mediated through the stress axis. In this study, we tested the effects of icv CRF on the behavioral outcome, plasma cortisol and monoamine function in trout subjected to a socially aggressive encounter. Rainbow trout were treated with an icv injection of artificial cerebrospinal fluid (aCSF), 500 or 2000 ng ovine CRF, or not injected. Fish were allowed to interact with a similarly sized conspecific for 15 minutes. Following the behavioral interaction, plasma cortisol and central monoamine concentrations were analyzed. Trout treated with CRF were victorious in approximately 60% of the aggressive encounters against aCSF treated opponents. Trout injected with CRF exhibited a reduction in the total number of attacks and decreased latency to attack. When trout were divided winners and losers, only victorious CRF-treated fish exhibited a reduced latency to attack and fewer retreats. Social stress increased cortisol levels in both winners and losers of aggressive interaction. This effect was enhanced with the additional stress incurred from icv injection of aCSF. However, icv CRF in addition to social stress decreased plasma cortisol in both winners and losers. While aggression stimulated significant changes in serotonergic and dopaminergic activity, the magnitude and direction were dependent on limbic brain region, CRF dose, and outcome of social aggression. With broad effects on aggressive behavior, anxiety, stress responsiveness, and central monoaminergic activity, CRF plays an important role modulating the behavioral components of social interaction. PMID:18992791
Image counter-forensics based on feature injection
NASA Astrophysics Data System (ADS)
Iuliani, M.; Rossetto, S.; Bianchi, T.; De Rosa, Alessia; Piva, A.; Barni, M.
2014-02-01
Starting from the concept that many image forensic tools are based on the detection of some features revealing a particular aspect of the history of an image, in this work we model the counter-forensic attack as the injection of a specific fake feature pointing to the same history of an authentic reference image. We propose a general attack strategy that does not rely on a specific detector structure. Given a source image x and a target image y, the adversary processes x in the pixel domain producing an attacked image ~x, perceptually similar to x, whose feature f(~x) is as close as possible to f(y) computed on y. Our proposed counter-forensic attack consists in the constrained minimization of the feature distance Φ(z) =│ f(z) - f(y)│ through iterative methods based on gradient descent. To solve the intrinsic limit due to the numerical estimation of the gradient on large images, we propose the application of a feature decomposition process, that allows the problem to be reduced into many subproblems on the blocks the image is partitioned into. The proposed strategy has been tested by attacking three different features and its performance has been compared to state-of-the-art counter-forensic methods.
Optimal space-time attacks on system state estimation under a sparsity constraint
NASA Astrophysics Data System (ADS)
Lu, Jingyang; Niu, Ruixin; Han, Puxiao
2016-05-01
System state estimation in the presence of an adversary that injects false information into sensor readings has attracted much attention in wide application areas, such as target tracking with compromised sensors, secure monitoring of dynamic electric power systems, secure driverless cars, and radar tracking and detection in the presence of jammers. From a malicious adversary's perspective, the optimal strategy for attacking a multi-sensor dynamic system over sensors and over time is investigated. It is assumed that the system defender can perfectly detect the attacks and identify and remove sensor data once they are corrupted by false information injected by the adversary. With this in mind, the adversary's goal is to maximize the covariance matrix of the system state estimate by the end of attack period under a sparse attack constraint such that the adversary can only attack the system a few times over time and over sensors. The sparsity assumption is due to the adversary's limited resources and his/her intention to reduce the chance of being detected by the system defender. This becomes an integer programming problem and its optimal solution, the exhaustive search, is intractable with a prohibitive complexity, especially for a system with a large number of sensors and over a large number of time steps. Several suboptimal solutions, such as those based on greedy search and dynamic programming are proposed to find the attack strategies. Examples and numerical results are provided in order to illustrate the effectiveness and the reduced computational complexities of the proposed attack strategies.
Maintaining Multimedia Data in a Geospatial Database
2012-09-01
at PostgreSQL and MySQL as spatial databases was offered. Given their results, as each database produced result sets from zero to 100,000, it was...excelled given multiple conditions. A different look at PostgreSQL and MySQL as spatial databases was offered. Given their results, as each database... MySQL ................................................................................................14 B. BENCHMARKING DATA RETRIEVED FROM TABLE
Application distribution model and related security attacks in VANET
NASA Astrophysics Data System (ADS)
Nikaein, Navid; Kanti Datta, Soumya; Marecar, Irshad; Bonnet, Christian
2013-03-01
In this paper, we present a model for application distribution and related security attacks in dense vehicular ad hoc networks (VANET) and sparse VANET which forms a delay tolerant network (DTN). We study the vulnerabilities of VANET to evaluate the attack scenarios and introduce a new attacker`s model as an extension to the work done in [6]. Then a VANET model has been proposed that supports the application distribution through proxy app stores on top of mobile platforms installed in vehicles. The steps of application distribution have been studied in detail. We have identified key attacks (e.g. malware, spamming and phishing, software attack and threat to location privacy) for dense VANET and two attack scenarios for sparse VANET. It has been shown that attacks can be launched by distributing malicious applications and injecting malicious codes to On Board Unit (OBU) by exploiting OBU software security holes. Consequences of such security attacks have been described. Finally, countermeasures including the concepts of sandbox have also been presented in depth.
The Icatibant Outcome Survey: treatment of laryngeal angioedema attacks
Aberer, Werner; Bouillet, Laurence; Caballero, Teresa; Maurer, Marcus; Fabien, Vincent; Zanichelli, Andrea
2016-01-01
Objective To characterize the management and outcomes of life-threatening laryngeal attacks of hereditary angioedema (HAE) treated with icatibant in the observational Icatibant Outcome Survey (NCT01034969) registry. Methods This retrospective analysis was based on data from patients with HAE type I/II who received healthcare professional-administered or self-administered icatibant to treat laryngeal attacks between September 2008 and May 2013. Results Twenty centers in seven countries contributed data. Overall, 42 patients with HAE experienced 67 icatibant-treated laryngeal attacks. Icatibant was self-administered for 62.3% of attacks (healthcare professional-administered, 37.7%). One icatibant injection was used for 87.9% of attacks, with rescue or concomitant medication used for 9.0%. The median time to treatment was 2.0 h (n=31 attacks) and the median time to resolution was 6.0 h (n=35 attacks). Conclusions This analysis describes successful use of icatibant for the treatment of laryngeal HAE attacks in a real-world setting. PMID:27116379
Sánchez-de-Madariaga, Ricardo; Muñoz, Adolfo; Castro, Antonio L; Moreno, Oscar; Pascual, Mario
2018-01-01
This research shows a protocol to assess the computational complexity of querying relational and non-relational (NoSQL (not only Structured Query Language)) standardized electronic health record (EHR) medical information database systems (DBMS). It uses a set of three doubling-sized databases, i.e. databases storing 5000, 10,000 and 20,000 realistic standardized EHR extracts, in three different database management systems (DBMS): relational MySQL object-relational mapping (ORM), document-based NoSQL MongoDB, and native extensible markup language (XML) NoSQL eXist. The average response times to six complexity-increasing queries were computed, and the results showed a linear behavior in the NoSQL cases. In the NoSQL field, MongoDB presents a much flatter linear slope than eXist. NoSQL systems may also be more appropriate to maintain standardized medical information systems due to the special nature of the updating policies of medical information, which should not affect the consistency and efficiency of the data stored in NoSQL databases. One limitation of this protocol is the lack of direct results of improved relational systems such as archetype relational mapping (ARM) with the same data. However, the interpolation of doubling-size database results to those presented in the literature and other published results suggests that NoSQL systems might be more appropriate in many specific scenarios and problems to be solved. For example, NoSQL may be appropriate for document-based tasks such as EHR extracts used in clinical practice, or edition and visualization, or situations where the aim is not only to query medical information, but also to restore the EHR in exactly its original form. PMID:29608174
Sánchez-de-Madariaga, Ricardo; Muñoz, Adolfo; Castro, Antonio L; Moreno, Oscar; Pascual, Mario
2018-03-19
This research shows a protocol to assess the computational complexity of querying relational and non-relational (NoSQL (not only Structured Query Language)) standardized electronic health record (EHR) medical information database systems (DBMS). It uses a set of three doubling-sized databases, i.e. databases storing 5000, 10,000 and 20,000 realistic standardized EHR extracts, in three different database management systems (DBMS): relational MySQL object-relational mapping (ORM), document-based NoSQL MongoDB, and native extensible markup language (XML) NoSQL eXist. The average response times to six complexity-increasing queries were computed, and the results showed a linear behavior in the NoSQL cases. In the NoSQL field, MongoDB presents a much flatter linear slope than eXist. NoSQL systems may also be more appropriate to maintain standardized medical information systems due to the special nature of the updating policies of medical information, which should not affect the consistency and efficiency of the data stored in NoSQL databases. One limitation of this protocol is the lack of direct results of improved relational systems such as archetype relational mapping (ARM) with the same data. However, the interpolation of doubling-size database results to those presented in the literature and other published results suggests that NoSQL systems might be more appropriate in many specific scenarios and problems to be solved. For example, NoSQL may be appropriate for document-based tasks such as EHR extracts used in clinical practice, or edition and visualization, or situations where the aim is not only to query medical information, but also to restore the EHR in exactly its original form.
NASA Astrophysics Data System (ADS)
JiWei, Tian; BuHong, Wang; FuTe, Shang; Shuaiqi, Liu
2017-05-01
Exact state estimation is vital important to maintain common operations of smart grids. Existing researches demonstrate that state estimation output could be compromised by malicious attacks. However, to construct the attack vectors, a usual presumption in most works is that the attacker has perfect information regarding the topology and so on even such information is difficult to acquire in practice. Recent research shows that Independent Component Analysis (ICA) can be used for inferring topology information which can be used to originate undetectable attacks and even to alter the price of electricity for the profits of attackers. However, we found that the above ICA-based blind attack tactics is merely feasible in the environment with Gaussian noises. If there are outliers (device malfunction and communication errors), the Bad Data Detector will easily detect the attack. Hence, we propose a robust ICA based blind attack strategy that one can use matrix recovery to circumvent the outlier problem and construct stealthy attack vectors. The proposed attack strategies are tested with IEEE representative 14-bus system. Simulations verify the feasibility of the proposed method.
2009-01-01
Oracle 9i, 10g MySQL MS SQL Server MS SQL Server Operating System Supported Windows 2003 Server Windows 2000 Server (32 bit...WebStar (Mac OS X) SunOne Internet Information Services (IIS) Database Server Supported MS SQL Server MS SQL Server Oracle 9i, 10g...challenges of Web-based surveys are: 1) identifying the best Commercial Off the Shelf (COTS) Web-based survey packages to serve the particular
An Optimization of the Basic School Military Occupational Skill Assignment Process
2003-06-01
Corps Intranet (NMCI)23 supports it. We evaluated the use of Microsoft’s SQL Server, but dismissed this after learning that TBS did not possess a SQL ...Server license or a qualified SQL Server administrator.24 SQL Server would have provided for additional security measures not available in MS...administrator. Although not has powerful as SQL Server, MS Access can handle the multi-user environment necessary for this system.25 The training
Fall 2014 Data-Intensive Systems
2014-10-29
Oct 2014 © 2014 Carnegie Mellon University Big Data Systems NoSQL and horizontal scaling are changing architecture principles by creating...University Status LEAP4BD • Ready to pilot QuABase • Prototype is complete – covers 8 NoSQL /NewSQL implementations • Completing validation testing Big...machine learning to automate population of knowledge base • Initial focus on NoSQL /NewSQL technology domain • Extend to create knowledge bases in other
Photo-z-SQL: Photometric redshift estimation framework
NASA Astrophysics Data System (ADS)
Beck, Róbert; Dobos, László; Budavári, Tamás; Szalay, Alexander S.; Csabai, István
2017-04-01
Photo-z-SQL is a flexible template-based photometric redshift estimation framework that can be seamlessly integrated into a SQL database (or DB) server and executed on demand in SQL. The DB integration eliminates the need to move large photometric datasets outside a database for redshift estimation, and uses the computational capabilities of DB hardware. Photo-z-SQL performs both maximum likelihood and Bayesian estimation and handles inputs of variable photometric filter sets and corresponding broad-band magnitudes.
Quantifying Uncertainty in Expert Judgment: Initial Results
2013-03-01
lines of source code were added in . ---------- C++ = 32%; JavaScript = 29%; XML = 15%; C = 7%; CSS = 7%; Java = 5%; Oth- er = 5% LOC = 927,266...much total effort in person years has been spent on this project? CMU/SEI-2013-TR-001 | 33 5 MySQL , the most popular Open Source SQL...as MySQL , Oracle, PostgreSQL, MS SQL Server, ODBC, or Interbase. Features include email reminders, iCal/vCal import/export, re- mote subscriptions
Sánchez-de-Madariaga, Ricardo; Muñoz, Adolfo; Lozano-Rubí, Raimundo; Serrano-Balazote, Pablo; Castro, Antonio L; Moreno, Oscar; Pascual, Mario
2017-08-18
The objective of this research is to compare the relational and non-relational (NoSQL) database systems approaches in order to store, recover, query and persist standardized medical information in the form of ISO/EN 13606 normalized Electronic Health Record XML extracts, both in isolation and concurrently. NoSQL database systems have recently attracted much attention, but few studies in the literature address their direct comparison with relational databases when applied to build the persistence layer of a standardized medical information system. One relational and two NoSQL databases (one document-based and one native XML database) of three different sizes have been created in order to evaluate and compare the response times (algorithmic complexity) of six different complexity growing queries, which have been performed on them. Similar appropriate results available in the literature have also been considered. Relational and non-relational NoSQL database systems show almost linear algorithmic complexity query execution. However, they show very different linear slopes, the former being much steeper than the two latter. Document-based NoSQL databases perform better in concurrency than in isolation, and also better than relational databases in concurrency. Non-relational NoSQL databases seem to be more appropriate than standard relational SQL databases when database size is extremely high (secondary use, research applications). Document-based NoSQL databases perform in general better than native XML NoSQL databases. EHR extracts visualization and edition are also document-based tasks more appropriate to NoSQL database systems. However, the appropriate database solution much depends on each particular situation and specific problem.
Comprehensive Routing Security Development and Deployment for the Internet
2015-02-01
feature enhancement and bug fixes. • MySQL : MySQL is a widely used and popular open source database package. It was chosen for database support in the...RPSTIR depends on several other open source packages. • MySQL : MySQL is used for the the local RPKI database cache. • OpenSSL: OpenSSL is used for...cryptographic libraries for X.509 certificates. • ODBC mySql Connector: ODBC (Open Database Connectivity) is a standard programming interface (API) for
TabSQL: a MySQL tool to facilitate mapping user data to public databases.
Xia, Xiao-Qin; McClelland, Michael; Wang, Yipeng
2010-06-23
With advances in high-throughput genomics and proteomics, it is challenging for biologists to deal with large data files and to map their data to annotations in public databases. We developed TabSQL, a MySQL-based application tool, for viewing, filtering and querying data files with large numbers of rows. TabSQL provides functions for downloading and installing table files from public databases including the Gene Ontology database (GO), the Ensembl databases, and genome databases from the UCSC genome bioinformatics site. Any other database that provides tab-delimited flat files can also be imported. The downloaded gene annotation tables can be queried together with users' data in TabSQL using either a graphic interface or command line. TabSQL allows queries across the user's data and public databases without programming. It is a convenient tool for biologists to annotate and enrich their data.
TabSQL: a MySQL tool to facilitate mapping user data to public databases
2010-01-01
Background With advances in high-throughput genomics and proteomics, it is challenging for biologists to deal with large data files and to map their data to annotations in public databases. Results We developed TabSQL, a MySQL-based application tool, for viewing, filtering and querying data files with large numbers of rows. TabSQL provides functions for downloading and installing table files from public databases including the Gene Ontology database (GO), the Ensembl databases, and genome databases from the UCSC genome bioinformatics site. Any other database that provides tab-delimited flat files can also be imported. The downloaded gene annotation tables can be queried together with users' data in TabSQL using either a graphic interface or command line. Conclusions TabSQL allows queries across the user's data and public databases without programming. It is a convenient tool for biologists to annotate and enrich their data. PMID:20573251
Bilateral Deep Peroneal Nerve Paralysis Following Kerosene Self-Injection into External Hemorrhoids
Rostami, Khalil; Farzaneh, Esmaeil; Abolhassani, Hassan
2010-01-01
Along with conventional therapies, some abrogated traditional treatment had been used for hemorrhoids like local Kerosene injection especially for extremely irritated external hemorrhoids. We report a rare case of Kerosene self-injection into the hemorrhoid. Despite antibiotics therapy, extent debridement, and colostomy, the patient died after 24 hours because of heart attack. Moreover, we discuss here the case with contact or injection of hydrocarbon materials and early care action to decrease the extensions of injury and side effects. PMID:20936130
Hepatomegaly due to self-induced hyperinsulinism.
Asherov, J; Mimouni, M; Varsano, I; Lubin, E; Laron, Z
1979-01-01
Repeated hypoglycaemic attacks, associated with transient hepatomegaly, in a 12-year-old insulin-dependent diabetic girl continued despite reduction in dose and, later, complete discontinuance of insulin. The attacks ceased while she was in hospital, necessitating reinstitution of insulin. The hepatomegaly resolved when surreptitious additional insulin injections were discovered and stopped. Hepatomegaly in diabetics should arouse suspicion of overdosage with insulin. Images Figure PMID:444328
Michael I. Haverty; Patrick J. Shea; John M. Wenz
1996-01-01
The effectiveness of registered application rates of the insecticide metasystox-R applied with Mauget tree injectors (INJECT-A-CIDE) was assessed in two strategies: (1) treatment of trees before western pine beetle attack (preventive treatment), and (2) treatment of trees after attack by western pine beetle (remedial treatment) for protection of individual, high-value...
Migration from relational to NoSQL database
NASA Astrophysics Data System (ADS)
Ghotiya, Sunita; Mandal, Juhi; Kandasamy, Saravanakumar
2017-11-01
Data generated by various real time applications, social networking sites and sensor devices is of very huge amount and unstructured, which makes it difficult for Relational database management systems to handle the data. Data is very precious component of any application and needs to be analysed after arranging it in some structure. Relational databases are only able to deal with structured data, so there is need of NoSQL Database management System which can deal with semi -structured data also. Relational database provides the easiest way to manage the data but as the use of NoSQL is increasing it is becoming necessary to migrate the data from Relational to NoSQL databases. Various frameworks has been proposed previously which provides mechanisms for migration of data stored at warehouses in SQL, middle layer solutions which can provide facility of data to be stored in NoSQL databases to handle data which is not structured. This paper provides a literature review of some of the recent approaches proposed by various researchers to migrate data from relational to NoSQL databases. Some researchers proposed mechanisms for the co-existence of NoSQL and Relational databases together. This paper provides a summary of mechanisms which can be used for mapping data stored in Relational databases to NoSQL databases. Various techniques for data transformation and middle layer solutions are summarised in the paper.
2014-09-01
NoSQL Data Store Technologies John Klein, Software Engineering Institute Patrick Donohoe, Software Engineering Institute Neil Ernst...REPORT TYPE N/A 3. DATES COVERED 4. TITLE AND SUBTITLE NoSQL Data Store Technologies 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT...distribute data 4. Data Replication – determines how a NoSQL database facilitates reliable, high performance data replication to build
SUNCT syndrome. Two cases in Argentina.
Raimondi, E; Gardella, L
1998-05-01
Two patients suffering from SUNCT syndrome are presented. Some features are remarkable. The first patient was a 69-year-old man whose first crisis was located in the right supraorbital region. After a 4-month spontaneous remission, the pain returned to the upper part of the cheek, radiating to the supraciliary region on the same side, with lacrimation and conjunctival injection. Rhinorrhea was absent. The painful attacks were triggered by head movements. Clinical improvement occurred with carbamazepine treatment. The second patient was a 48-year-old woman whose painful attacks lasted from 30 to 45 seconds followed by a burning sensation lasting 2 hours. Autonomic signs such as conjunctival injection, lacrimation, and edema and ipsilateral ptosis of the upper lid were rather marked. There was never any rhinorrhea. Her attacks were triggered by head and eye movements. She responded to the administration of corticosteroids and carbamazepine. According to these features, the two patients had SUNCT syndrome, and the positive carbamazepine response suggests a relationship with trigeminal neuralgia.
Thaker, Maria; Vanak, Abi T; Lima, Steven L; Hews, Diana K
2010-01-01
Elevated plasma corticosterone during stressful events is linked to rapid changes in behavior in vertebrates and can mediate learning and memory consolidation. We tested the importance of acute corticosterone elevation in aversive learning of a novel stressor by wild male eastern fence lizards (Sceloporus undulatus). We found that inhibiting corticosterone elevation (using metyrapone, a corticosterone synthesis blocker) during an encounter with a novel attacker impaired immediate escape responses and limited learning and recall during future encounters. In the wild and in outdoor enclosures, lizards whose acute corticosterone response was blocked by an earlier metyrapone injection did not alter their escape behavior during repeated encounters with the attacker. Control-injected (unblocked) lizards, however, progressively increased flight initiation distance and decreased hiding duration during subsequent encounters. Aversive responses were also initially higher for control lizards exposed to a higher intensity first attack. Further, we demonstrate a role of corticosterone elevation in recollection, since unblocked lizards had heightened antipredator responses 24-28 h later. Exogenously restoring corticosterone levels in metyrapone-injected lizards maintained aversive behaviors and learning at control (unblocked) levels. We suggest that the corticosterone mediation of antipredator behaviors and aversive learning is a critical and general mechanism for the behavioral flexibility of vertebrate prey.
Christopher J. Fettig; Donald M. Grosman; A. Steven. Munson
2013-01-01
Bark beetles (Coleoptera: Curculionidae, Scolytinae) are important tree mortality agents in western coniferous forests. Protection of individual trees from bark beetle attack has historically involved applications of liquid formulations of contact insecticides to the tree bole using hydraulic sprayers. More recently, researchers have examined the effectiveness of...
NASA Technical Reports Server (NTRS)
Alfaro, Victor O.; Casey, Nancy J.
2005-01-01
SQL-RAMS (where "SQL" signifies Structured Query Language and "RAMS" signifies Rocketdyne Automated Management System) is a successor to the legacy version of RAMS -- a computer program used to manage all work, nonconformance, corrective action, and configuration management on rocket engines and ground support equipment at Stennis Space Center. The legacy version resided in the File-Maker Pro software system and was constructed in modules that could act as standalone programs. There was little or no integration among modules. Because of limitations on file-management capabilities in FileMaker Pro, and because of difficulty of integration of FileMaker Pro with other software systems for exchange of data using such industry standards as SQL, the legacy version of RAMS proved to be limited, and working to circumvent its limitations too time-consuming. In contrast, SQL-RAMS is an integrated SQL-server-based program that supports all data-exchange software industry standards. Whereas in the legacy version, it was necessary to access individual modules to gain insight into a particular workstatus document, SQL-RAMS provides access through a single-screen presentation of core modules. In addition, SQL-RAMS enables rapid and efficient filtering of displayed statuses by predefined categories and test numbers. SQL-RAMS is rich in functionality and encompasses significant improvements over the legacy system. It provides users the ability to perform many tasks, which in the past required administrator intervention. Additionally, many of the design limitations have been corrected, allowing for a robust application that is user centric.
NASA Technical Reports Server (NTRS)
Alfaro, Victor O.; Casey, Nancy J.
2005-01-01
SQL-RAMS (where "SQL" signifies Structured Query Language and "RAMS" signifies Rocketdyne Automated Management System) is a successor to the legacy version of RAMS a computer program used to manage all work, nonconformance, corrective action, and configuration management on rocket engines and ground support equipment at Stennis Space Center. The legacy version resided in the FileMaker Pro software system and was constructed in modules that could act as stand-alone programs. There was little or no integration among modules. Because of limitations on file-management capabilities in FileMaker Pro, and because of difficulty of integration of FileMaker Pro with other software systems for exchange of data using such industry standards as SQL, the legacy version of RAMS proved to be limited, and working to circumvent its limitations too time-consuming. In contrast, SQL-RAMS is an integrated SQL-server-based program that supports all data-exchange software industry standards. Whereas in the legacy version, it was necessary to access individual modules to gain insight to a particular work-status documents, SQL-RAMS provides access through a single-screen presentation of core modules. In addition, SQL-RAMS enable rapid and efficient filtering of displayed statuses by predefined categories and test numbers. SQL-RAMS is rich in functionality and encompasses significant improvements over the legacy system. It provides users the ability to perform many tasks which in the past required administrator intervention. Additionally many of the design limitations have been corrected allowing for a robust application that is user centric.
2004-03-01
with MySQL . This choice was made because MySQL is open source. Any significant database engine such as Oracle or MS- SQL or even MS Access can be used...10 Figure 6. The DoD vs . Commercial Life Cycle...necessarily be interested in SCADA network security 13. MySQL (Database server) – This station represents a typical data server for a web page
Analysis and Development of a Web-Enabled Planning and Scheduling Database Application
2013-09-01
establishes an entity—relationship diagram for the desired process, constructs an operable database using MySQL , and provides a web- enabled interface for...development, develop, design, process, re- engineering, reengineering, MySQL , structured query language, SQL, myPHPadmin. 15. NUMBER OF PAGES 107 16...relationship diagram for the desired process, constructs an operable database using MySQL , and provides a web-enabled interface for the population of
Petaminer: Using ROOT for efficient data storage in MySQL database
NASA Astrophysics Data System (ADS)
Cranshaw, J.; Malon, D.; Vaniachine, A.; Fine, V.; Lauret, J.; Hamill, P.
2010-04-01
High Energy and Nuclear Physics (HENP) experiments store Petabytes of event data and Terabytes of calibration data in ROOT files. The Petaminer project is developing a custom MySQL storage engine to enable the MySQL query processor to directly access experimental data stored in ROOT files. Our project is addressing the problem of efficient navigation to PetaBytes of HENP experimental data described with event-level TAG metadata, which is required by data intensive physics communities such as the LHC and RHIC experiments. Physicists need to be able to compose a metadata query and rapidly retrieve the set of matching events, where improved efficiency will facilitate the discovery process by permitting rapid iterations of data evaluation and retrieval. Our custom MySQL storage engine enables the MySQL query processor to directly access TAG data stored in ROOT TTrees. As ROOT TTrees are column-oriented, reading them directly provides improved performance over traditional row-oriented TAG databases. Leveraging the flexible and powerful SQL query language to access data stored in ROOT TTrees, the Petaminer approach enables rich MySQL index-building capabilities for further performance optimization.
Evaluation of relational and NoSQL database architectures to manage genomic annotations.
Schulz, Wade L; Nelson, Brent G; Felker, Donn K; Durant, Thomas J S; Torres, Richard
2016-12-01
While the adoption of next generation sequencing has rapidly expanded, the informatics infrastructure used to manage the data generated by this technology has not kept pace. Historically, relational databases have provided much of the framework for data storage and retrieval. Newer technologies based on NoSQL architectures may provide significant advantages in storage and query efficiency, thereby reducing the cost of data management. But their relative advantage when applied to biomedical data sets, such as genetic data, has not been characterized. To this end, we compared the storage, indexing, and query efficiency of a common relational database (MySQL), a document-oriented NoSQL database (MongoDB), and a relational database with NoSQL support (PostgreSQL). When used to store genomic annotations from the dbSNP database, we found the NoSQL architectures to outperform traditional, relational models for speed of data storage, indexing, and query retrieval in nearly every operation. These findings strongly support the use of novel database technologies to improve the efficiency of data management within the biological sciences. Copyright © 2016 Elsevier Inc. All rights reserved.
Knowledge Data Base for Amorphous Metals
2007-07-26
not programmatic, updates. Over 100 custom SQL statements that maintain the domain specific data are attached to the workflow entries in a generic...for the form by populating the SQL and run generation tables. Application data may be prepared in different ways for two steps that invoke the same form...run generation mode). There is a single table of SQL commands. Each record has a user-definable ID, the SQL code, and a comment. The run generation
NASA Astrophysics Data System (ADS)
Dziedzic, Adam; Mulawka, Jan
2014-11-01
NoSQL is a new approach to data storage and manipulation. The aim of this paper is to gain more insight into NoSQL databases, as we are still in the early stages of understanding when to use them and how to use them in an appropriate way. In this submission descriptions of selected NoSQL databases are presented. Each of the databases is analysed with primary focus on its data model, data access, architecture and practical usage in real applications. Furthemore, the NoSQL databases are compared in fields of data references. The relational databases offer foreign keys, whereas NoSQL databases provide us with limited references. An intermediate model between graph theory and relational algebra which can address the problem should be created. Finally, the proposal of a new approach to the problem of inconsistent references in Big Data storage systems is introduced.
Aberer, Werner; Maurer, Marcus; Bouillet, Laurence; Zanichelli, Andrea; Caballero, Teresa; Longhurst, Hilary J; Perrin, Amandine; Andresen, Irmgard
2017-01-01
Patients with hereditary angioedema (HAE) due to C1-inhibitor deficiency (C1-INH-HAE) experience recurrent attacks of cutaneous or submucosal edema that may be frequent and severe; prophylactic treatments can be prescribed to prevent attacks. However, despite the use of long-term prophylaxis (LTP), breakthrough attacks are known to occur. We used data from the Icatibant Outcome Survey (IOS) to evaluate the characteristics of breakthrough attacks and the effectiveness of icatibant as a treatment option. Data on LTP use, attacks, and treatments were recorded. Attack characteristics, treatment characteristics, and outcomes (time to treatment, time to resolution, and duration of attack) were compared for attacks that occurred with versus without LTP. Data on 3228 icatibant-treated attacks from 448 patients with C1-INH-HAE were analyzed; 30.1% of attacks occurred while patients were using LTP. Attack rate, attack severity, and the distribution of attack sites were similar across all types of LTP used, and were comparable to the results found in patients who did not receive LTP. Attacks were successfully treated with icatibant; 82.5% of all breakthrough attacks were treated with a single icatibant injection without C1-INH rescue medication. Treatment outcomes were comparable for breakthrough attacks across all LTP types, and for attacks without LTP. Patients who use LTP should be aware that breakthrough attacks can occur, and such attacks can be severe. Thus, patients with C1-INH-HAE using LTP should have emergency treatment readily available. Data from IOS show that icatibant is effective for the treatment of breakthrough attacks. Trial Registration NCT01034969.
Risk Assessment of the Naval Postgraduate School Gigabit Network
2004-09-01
Management Server (1) • Ras Server (1) • Remedy Server (1) • Samba Server(2) • SQL Servers (3) • Web Servers (3) • WINS Server (1) • Library...Server Bob Sharp INCA Windows 2000 Advanced Server NPGS Landesk SQL 2000 Alan Pires eagle Microsoft Windows 2000 Advanced Server EWS NPGS Landesk...Advanced Server Special Projects NPGS SQL Alan Pires MC01BDB Microsoft Windows 2000 Advanced Server Special Projects NPGS SQL 2000 Alan Pires
Blind Seer: A Scalable Private DBMS
2014-05-01
searchable index terms per DB row, in time comparable to (insecure) MySQL (many practical queries can be privately executed with work 1.2-3 times slower...than MySQL , although some queries are costlier). We support a rich query set, including searching on arbitrary boolean formulas on keywords and ranges...index terms per DB row, in time comparable to (insecure) MySQL (many practical queries can be privately executed with work 1.2-3 times slower than MySQL
Performance Evaluation of NoSQL Databases: A Case Study
2015-02-01
a centralized relational database. The customer decided to consider NoSQL technologies for two specific uses, namely: the primary data store for...17 custom specific 6. FU NoSQL availab data mo arking of data g a specific wo sin benchmark f hmark for tran le workload de o publish meas their...The choice of a particular NoSQL database imposes a specific distributed software architecture and data model, and is a major determinant of the
DOMe: A deduplication optimization method for the NewSQL database backups
Wang, Longxiang; Zhu, Zhengdong; Zhang, Xingjun; Wang, Yinfeng
2017-01-01
Reducing duplicated data of database backups is an important application scenario for data deduplication technology. NewSQL is an emerging database system and is now being used more and more widely. NewSQL systems need to improve data reliability by periodically backing up in-memory data, resulting in a lot of duplicated data. The traditional deduplication method is not optimized for the NewSQL server system and cannot take full advantage of hardware resources to optimize deduplication performance. A recent research pointed out that the future NewSQL server will have thousands of CPU cores, large DRAM and huge NVRAM. Therefore, how to utilize these hardware resources to optimize the performance of data deduplication is an important issue. To solve this problem, we propose a deduplication optimization method (DOMe) for NewSQL system backup. To take advantage of the large number of CPU cores in the NewSQL server to optimize deduplication performance, DOMe parallelizes the deduplication method based on the fork-join framework. The fingerprint index, which is the key data structure in the deduplication process, is implemented as pure in-memory hash table, which makes full use of the large DRAM in NewSQL system, eliminating the performance bottleneck problem of fingerprint index existing in traditional deduplication method. The H-store is used as a typical NewSQL database system to implement DOMe method. DOMe is experimentally analyzed by two representative backup data. The experimental results show that: 1) DOMe can reduce the duplicated NewSQL backup data. 2) DOMe significantly improves deduplication performance by parallelizing CDC algorithms. In the case of the theoretical speedup ratio of the server is 20.8, the speedup ratio of DOMe can achieve up to 18; 3) DOMe improved the deduplication throughput by 1.5 times through the pure in-memory index optimization method. PMID:29049307
2012-09-01
relative performance of several conventional SQL and NoSQL databases with a set of one billion file block hashes. Digital Forensics, Sector Hashing, Full... NoSQL databases with a set of one billion file block hashes. v THIS PAGE INTENTIONALLY LEFT BLANK vi Table of Contents List of Acronyms and...Operating System NOOP No Operation assembly instruction NoSQL “Not only SQL” model for non-relational database management NSRL National Software
Global ISR: Toward a Comprehensive Defense Against Unauthorized Code Execution
2010-10-01
implementation using two of the most popular open- source servers: the Apache web server, and the MySQL database server. For Apache, we measure the effect that...utility ab. T o ta l T im e ( s e c ) 0 500 1000 1500 2000 2500 3000 Native Null ISR ISR−MP Fig. 3. The MySQL test-insert bench- mark measures...various SQL operations. The figure draws total execution time as reported by the benchmark utility. Finally, we benchmarked a MySQL database server using
SQL/NF Translator for the Triton Nested Relational Database System
1990-12-01
18as., Ohio .. 9~~ ~~ 1 4- AFIT/GCE/ENG/90D-05 SQL/Nk1 TRANSLATOR FOR THE TRITON NESTED RELATIONAL DATABASE SYSTEM THESIS Craig William Schnepf Captain...FOR THE TRITON NESTED RELATIONAL DATABASE SYSTEM THESIS Presented to the Faculty of the School of Engineering of the Air Force Institute of Technnlogy... systems . The SQL/NF query language used for the nested relationil model is an extension of the popular relational model query language SQL. The query
Flexible Decision Support in Device-Saturated Environments
2003-10-01
also output tuples to a remote MySQL or Postgres database. 3.3 GUI The GUI allows the user to pose queries using SQL and to display query...DatabaseConnection.java – handles connections to an external database (such as MySQL or Postgres ). • Debug.java – contains the code for printing out Debug messages...also provided. It is possible to output the results of queries to a MySQL or Postgres database for archival and the GUI can query those results
... Antibiotics such as clindamycin will not kill the viruses that cause colds, flu, and other viral infections. ... may be spread as part of a bioterror attack) and toxoplasmosis (an infection that may cause serious ...
Evaluating a NoSQL Alternative for Chilean Virtual Observatory Services
NASA Astrophysics Data System (ADS)
Antognini, J.; Araya, M.; Solar, M.; Valenzuela, C.; Lira, F.
2015-09-01
Currently, the standards and protocols for data access in the Virtual Observatory architecture (DAL) are generally implemented with relational databases based on SQL. In particular, the Astronomical Data Query Language (ADQL), language used by IVOA to represent queries to VO services, was created to satisfy the different data access protocols, such as Simple Cone Search. ADQL is based in SQL92, and has extra functionality implemented using PgSphere. An emergent alternative to SQL are the so called NoSQL databases, which can be classified in several categories such as Column, Document, Key-Value, Graph, Object, etc.; each one recommended for different scenarios. Within their notable characteristics we can find: schema-free, easy replication support, simple API, Big Data, etc. The Chilean Virtual Observatory (ChiVO) is developing a functional prototype based on the IVOA architecture, with the following relevant factors: Performance, Scalability, Flexibility, Complexity, and Functionality. Currently, it's very difficult to compare these factors, due to a lack of alternatives. The objective of this paper is to compare NoSQL alternatives with SQL through the implementation of a Web API REST that satisfies ChiVO's needs: a SESAME-style name resolver for the data from ALMA. Therefore, we propose a test scenario by configuring a NoSQL database with data from different sources and evaluating the feasibility of creating a Simple Cone Search service and its performance. This comparison will allow to pave the way for the application of Big Data databases in the Virtual Observatory.
Differential Fault Analysis on CLEFIA with 128, 192, and 256-Bit Keys
NASA Astrophysics Data System (ADS)
Takahashi, Junko; Fukunaga, Toshinori
This paper describes a differential fault analysis (DFA) attack against CLEFIA. The proposed attack can be applied to CLEFIA with all supported keys: 128, 192, and 256-bit keys. DFA is a type of side-channel attack. This attack enables the recovery of secret keys by injecting faults into a secure device during its computation of the cryptographic algorithm and comparing the correct ciphertext with the faulty one. CLEFIA is a 128-bit blockcipher with 128, 192, and 256-bit keys developed by the Sony Corporation in 2007. CLEFIA employs a generalized Feistel structure with four data lines. We developed a new attack method that uses this characteristic structure of the CLEFIA algorithm. On the basis of the proposed attack, only 2 pairs of correct and faulty ciphertexts are needed to retrieve the 128-bit key, and 10.78 pairs on average are needed to retrieve the 192 and 256-bit keys. The proposed attack is more efficient than any previously reported. In order to verify the proposed attack and estimate the calculation time to recover the secret key, we conducted an attack simulation using a PC. The simulation results show that we can obtain each secret key within three minutes on average. This result shows that we can obtain the entire key within a feasible computational time.
Urgent Virtual Machine Eviction with Enlightened Post-Copy
2015-12-01
memory is in use, almost all of which is by Memcached. MySQL : The VMs run MySQL 5.6, and the clients execute OLTPBenchmark [3] using the Twitter...workload with scale factor of 960. The VMs are each allocated 16 cores and 30 GB of memory, and MySQL is configured with a 16 GB buffer pool in memory. The...operation mix for 5 minutes as a warm-up. At the time of migration, MySQL uses approximately 17 GB of memory, and almost all of the 30 GB memory is
BIRS - Bioterrorism Information Retrieval System.
Tewari, Ashish Kumar; Rashi; Wadhwa, Gulshan; Sharma, Sanjeev Kumar; Jain, Chakresh Kumar
2013-01-01
Bioterrorism is the intended use of pathogenic strains of microbes to widen terror in a population. There is a definite need to promote research for development of vaccines, therapeutics and diagnostic methods as a part of preparedness to any bioterror attack in the future. BIRS is an open-access database of collective information on the organisms related to bioterrorism. The architecture of database utilizes the current open-source technology viz PHP ver 5.3.19, MySQL and IIS server under windows platform for database designing. Database stores information on literature, generic- information and unique pathways of about 10 microorganisms involved in bioterrorism. This may serve as a collective repository to accelerate the drug discovery and vaccines designing process against such bioterrorist agents (microbes). The available data has been validated from various online resources and literature mining in order to provide the user with a comprehensive information system. The database is freely available at http://www.bioterrorism.biowaves.org.
... of the transplanted organ by the transplant recipient's immune system) in people who have received kidney, liver, or ... It works by decreasing the activity of the immune system to prevent it from attacking the transplanted organ.
... Rasuvo, Xatmep, others) to treat the symptoms of rheumatoid arthritis (RA; a condition in which the body attacks ... and CLL by killing cancer cells. It treats rheumatoid arthritis, granulomatosis with polyangiitis, and microscopic polyangiitis by blocking ...
... with daily activities, and joint damage caused by rheumatoid arthritis (a condition in which the body attacks its ... that fight infection). People who have had severe rheumatoid arthritis for a long time may have a greater ...
... and sometimes other medications to treat severe active rheumatoid arthritis (RA; a condition in which the body attacks ... to stop scales from forming. Methotrexate may treat rheumatoid arthritis by decreasing the activity of the immune system.
Ranger, Christopher M; Reding, Michael E; Oliver, Jason B; Schultz, Peter B; Moyseenko, James J; Youssef, Nadeer
2011-10-01
Ambrosia beetles (Coleoptera: Curculionidae: Scolytinae) pose a significant challenge to producers of ornamental nursery stock. Conventional insecticides are commonly used for management purposes, but plant-derived essential oils also may discourage ambrosia beetles from initiating attacks. To identify promising commercially available products, field-based efficacy trials were conducted in Ohio in 2009 and 2010 with the following products: Armorex (Soil Technologies), Cinnacure (Proguard, Inc.), EcoTrol (EcoSMART Technologies, Inc.), and Veggie Pharm (Pharm Solutions, Inc.). Potted Magnolia virginiana L. were first injected with 75 ml of 5% ethanol to ensure ambrosia beetle pressure on experimental trees. Mixtures of each product (10% in water) and a water control were applied until runoff and attacks occurring under field conditions were quantified at 1, 4, 7, and 14 d after treatment (DAT). Ambrosia beetle attacks generally increased over time but at differing rates depending on the particular treatment. In 2009, Armorex and Veggie Pharm were associated with the lowest cumulative attacks 14 DAT. In 2010, Armorex and Cinnacure were associated with the fewest attacks 14 DAT. Solid phase microextraction-gas chromatography-mass spectrometry was used to characterize the volatile compounds associated with each product. Allyl isothiocyanate, a compound with known repellent and insecticidal properties, was unique and predominant in Armorex. These experiments identified commercially available botanicals containing plant essential oils with activity against ambrosia beetles, along with demonstrating the usefulness of ethanol-injection to ensure ambrosia beetle pressure under field conditions. Characterizing the constituents of efficacious botanically based products could also lead to the development of improved botanical insecticides.
NoSQL: collection document and cloud by using a dynamic web query form
NASA Astrophysics Data System (ADS)
Abdalla, Hemn B.; Lin, Jinzhao; Li, Guoquan
2015-07-01
Mongo-DB (from "humongous") is an open-source document database and the leading NoSQL database. A NoSQL (Not Only SQL, next generation databases, being non-relational, deal, open-source and horizontally scalable) presenting a mechanism for storage and retrieval of documents. Previously, we stored and retrieved the data using the SQL queries. Here, we use the MonogoDB that means we are not utilizing the MySQL and SQL queries. Directly importing the documents into our Drives, retrieving the documents on that drive by not applying the SQL queries, using the IO BufferReader and Writer, BufferReader for importing our type of document files to my folder (Drive). For retrieving the document files, the usage is BufferWriter from the particular folder (or) Drive. In this sense, providing the security for those storing files for what purpose means if we store the documents in our local folder means all or views that file and modified that file. So preventing that file, we are furnishing the security. The original document files will be changed to another format like in this paper; Binary format is used. Our documents will be converting to the binary format after that direct storing in one of our folder, that time the storage space will provide the private key for accessing that file. Wherever any user tries to discover the Document files means that file data are in the binary format, the document's file owner simply views that original format using that personal key from receive the secret key from the cloud.
Recommender System for Learning SQL Using Hints
ERIC Educational Resources Information Center
Lavbic, Dejan; Matek, Tadej; Zrnec, Aljaž
2017-01-01
Today's software industry requires individuals who are proficient in as many programming languages as possible. Structured query language (SQL), as an adopted standard, is no exception, as it is the most widely used query language to retrieve and manipulate data. However, the process of learning SQL turns out to be challenging. The need for a…
Life in extra dimensions of database world or penetration of NoSQL in HEP community
NASA Astrophysics Data System (ADS)
Kuznetsov, V.; Evans, D.; Metson, S.
2012-12-01
The recent buzzword in IT world is NoSQL. Major players, such as Facebook, Yahoo, Google, etc. are widely adopted different “NoSQL” solutions for their needs. Horizontal scalability, flexible data model and management of big data volumes are only a few advantages of NoSQL. In CMS experiment we use several of them in production environment. Here, we present CMS projects based on NoSQL solutions, their strengths and weaknesses as well as our experience with those tools and their coexistence with standard RDBMS solutions in our applications.
A Database Design for the Brazilian Air Force Military Personnel Control System.
1987-06-01
GIVEN A RECNum GET MOVING HISTORICAL". 77 SEL4 PlC X(70) VALUE ". 4. GIVEN A RECNUM GET NOMINATION HISTORICAL". 77 SEL5 PIC X(70) VALUE it 5. GIVEN A...WHERE - "°RECNUM = :RECNUM". 77 SQL-SEL3-LENGTH PIC S9999 VALUE 150 COMP. 77 SQL- SEL4 PIC X(150) VALUE "SELECT ABBREV,DTNOM,DTEXO,SITN FROM...NOMINATION WHERE RECNUM 77 SQL- SEL4 -LENGTH PIC S9999 VALUE 150 COMP. 77 SQL-SEL5 PIC X(150) VALUE "SELECT ABBREVDTDES,DTWAIVER,SITD FROM DESIG WHERE RECNUM It
Cluster headache: present and future therapy.
Leone, Massimo; Giustiniani, Alessandro; Cecchini, Alberto Proietti
2017-05-01
Cluster headache is characterized by severe, unilateral headache attacks of orbital, supraorbital or temporal pain lasting 15-180 min accompanied by ipsilateral lacrimation, rhinorrhea and other cranial autonomic manifestations. Cluster headache attacks need fast-acting abortive agents because the pain peaks very quickly; sumatriptan injection is the gold standard acute treatment. First-line preventative drugs include verapamil and carbolithium. Other drugs demonstrated effective in open trials include topiramate, valproic acid, gabapentin and others. Steroids are very effective; local injection in the occipital area is also effective but its prolonged use needs caution. Monoclonal antibodies against calcitonin gene-related peptide are under investigation as prophylactic agents in both episodic and chronic cluster headache. A number of neurostimulation procedures including occipital nerve stimulation, vagus nerve stimulation, sphenopalatine ganglion stimulation and the more invasive hypothalamic stimulation are employed in chronic intractable cluster headache.
Serotonin₂A/C receptors mediate the aggressive phenotype of TLX gene knockout mice.
Juárez, Pablo; Valdovinos, Maria G; May, Michael E; Lloyd, Blair P; Couppis, Maria H; Kennedy, Craig H
2013-11-01
Deleting the tailless (TLX) gene in mice produces a highly aggressive phenotype yet to be characterized in terms of heterozygous animals or neurotransmitter mechanisms. We sought to establish pharmacological control over aggression and study the role of serotonin (5-HT)(2A/C) receptors in mediating changes in aggression. We analyzed aggression in mice heterozygous (+/-) or homozygous (-/-) for the TLX gene and wild-types (+/+) using a resident-intruder paradigm. No +/+ mice were aggressive, 36% of +/- TLX and 100% of -/- TLX mice showed aggression. Dose-effect functions were established for clozapine (0.1-1.5mg/kg, ip), ketanserin (0.3-1.25 mg/kg, ip), and (±)-1-(2,5-dimethoxy-4-iodophenyl)-2-aminopropane [(±)DOI] (0.5-2.0 mg/kg, ip). Injecting clozapine decreased the frequency and duration of attacks for +/- TLX and -/- TLX mice. Clozapine did not decrease grooming in either +/- TLX or -/- TLX mice but may have increased locomotion for -/- TLX mice. Injecting ketanserin, a 5-HT(2A/C) receptor antagonist, produced differential decreases in frequency and latency to aggression between genotypes and corresponding increases in locomotor behavior. Injecting (±)DOI, a 5-HT(2A/C) receptor agonist, increased the frequency and duration of attacks, decreased the latency to attacks, and decreased locomotion in +/- and -/- TLX mice. Results of the current study suggest aggression displayed by TLX null and heterozygous mice involves 5-HT(2A/C) receptors. Copyright © 2013 Elsevier B.V. All rights reserved.
Subclinical endophthalmitis following a rooster attack.
Lekse Kovach, Jaclyn; Maguluri, Srilakshmi; Recchia, Franco M
2006-12-01
Ocular injury resulting from rooster attacks is rarely reported in the literature. Sadly, the target of these attacks is most often children younger than 3 years old, whose naiveté of the aggressive, territorial behavior of birds can place them at risk. Acute sequelae of these attacks can result in a lifetime of visual impairment. The possibility of a subacute or occult infection is an unusual occurrence that must always be considered. In an effort to prevent future attacks and ocular casualties, we present a case of a 12-month-old boy who suffered an open globe following a rooster attack. The open globe was emergently repaired. One week later, a white cataract was noticed on examination in the absence of systemic or ocular signs of inflammation. Traumatic endophthalmitis and lenticular abscess were suspected during examination under anesthesia. Vitrectomy, lensectomy, and injection of intravitreal antibiotics were performed. Culture of lenticular and vitreous aspirates grew alpha-streptococcus. Alpha-streptococcal endophthalmitis can result from ocular injuries caused by rooster pecking. The infection may present insidiously and without typical ocular or systemic symptoms or signs. Management is challenging and may require surgery.
Database Migration for Command and Control
2002-11-01
Sql - proprietary JDP Private Area Air defense data Defended asset list Oracle 7.3.2 - Automated process (OLTP...TADIL warnings Oracle 7.3.2 Flat File - Discrete transaction with data upds - NRT response required Pull mission data Std SQL ...level execution data Oracle 7.3 User update External interfaces Auto/manual backup Messaging Proprietary replication (internally) SQL Web server
Spike-Nosed Bodies and Forward Injected Jets in Supersonic Flow
NASA Technical Reports Server (NTRS)
Gilinsky, M.; Washington, C.; Blankson, I. M.; Shvets, A. I.
2002-01-01
The paper contains new numerical simulation and experimental test results of blunt body drag reduction using thin spikes mounted in front of a body and one- or two-phase jets injected against a supersonic flow. Numerical simulations utilizing the NASA CFL3D code were conducted at the Hampton University Fluid Mechanics and Acoustics Laboratory (FM&AL) and experimental tests were conducted using the facilities of the IM/MSU Aeromechanics and Gas Dynamics Laboratory. Previous results were presented at the 37th AIAA/ASME/SAE/ASEE Joint Propulsion Conference. Those results were based on some experimental and numerical simulation tests for supersonic flow around spike-nosed or shell-nosed bodies, and numerical simulations were conducted only for a single spike-nosed or shell-nosed body at zero attack angle, alpha=0. In this paper, experimental test results of gas, liquid and solid particle jet injection against a supersonic flow are presented. In addition, numerical simulation results for supersonic flow around a multiple spike-nosed body with non-zero attack angles and with a gas and solid particle forward jet injection are included. Aerodynamic coefficients: drag, C(sub D), lift, C(sub L), and longitudinal momentum, M(sub z), obtained by numerical simulation and experimental tests are compared and show good agreement.
Spike-Nosed Bodies and Forward Injected Jets in Supersonic Flow
NASA Technical Reports Server (NTRS)
Gilinsky, M.; Washington, C.; Blankson, I. M.; Shvets, A. I.
2002-01-01
The paper contains new numerical simulation and experimental test results of blunt body drag reduction using thin spikes mounted in front of a body and one- or two-phase jets injected against a supersonic flow. Numerical simulations utilizing the NASA CFL3D code were conducted at the Hampton University Fluid Mechanics and Acoustics Laboratory (FM&AL) and experimental tests were conducted using the facilities of the IM/MSU Aeromechanics and Gas Dynamics Laboratory. Previous results were presented at the 37th AIAA/ASME/SAE/ASEE Joint Propulsion Conference. Those results were based on some experimental and numerical simulation tests for supersonic flow around spike-nosed or shell-nosed bodies, and numerical simulations were conducted only for a single spike-nosed or shell-nosed body at zero attack angle, alpha = 0 degrees. In this paper, experimental test results of gas, liquid and solid particle jet injection against a supersonic flow are presented. In addition, numerical simulation results for supersonic flow around a multiple spike-nosed body with non-zero attack angles and with a gas and solid particle forward jet injection are included. Aerodynamic coefficients: drag, C (sub D), lift, C(sub L), and longitudinal momentum, M(sub z), obtained by numerical simulation and experimental tests are compared and show good agreement.
Network Configuration of Oracle and Database Programming Using SQL
NASA Technical Reports Server (NTRS)
Davis, Melton; Abdurrashid, Jibril; Diaz, Philip; Harris, W. C.
2000-01-01
A database can be defined as a collection of information organized in such a way that it can be retrieved and used. A database management system (DBMS) can further be defined as the tool that enables us to manage and interact with the database. The Oracle 8 Server is a state-of-the-art information management environment. It is a repository for very large amounts of data, and gives users rapid access to that data. The Oracle 8 Server allows for sharing of data between applications; the information is stored in one place and used by many systems. My research will focus primarily on SQL (Structured Query Language) programming. SQL is the way you define and manipulate data in Oracle's relational database. SQL is the industry standard adopted by all database vendors. When programming with SQL, you work on sets of data (i.e., information is not processed one record at a time).
Acupoint injection of onabotulinumtoxin A for migraines.
Hou, Min; Xie, Jun-Fan; Kong, Xiang-Pan; Zhang, Yi; Shao, Yu-Feng; Wang, Can; Ren, Wen-Ting; Cui, Guang-Fu; Xin, Le; Hou, Yi-Ping
2015-10-30
Onabotulinumtoxin A (BoNTA) has been reported to be effective in the therapy for migraines. Acupuncture has been used worldwide for the treatment of migraine attacks. Injection of a small amount of drug at acupuncture points is an innovation as compared to traditional acupuncture. The purpose of this study was to evaluate and compare the effectiveness of fixed (muscle)-site and acupoint-site injections of BoNTA for migraine therapy in a randomized, double-blinded, placebo-controlled clinical trial extending over four months. Subjects with both episodic and chronic migraines respectively received a placebo (n = 19) or BoNTA (2.5 U each site, 25 U per subject) injection at fixed-sites (n = 41) including occipitofrontalis, corrugator supercilii, temporalis and trapeziue, or at acupoint-sites (n = 42) including Yintang (EX-HN3), Taiyang (EX-HN5), Baihui (GV20), Shuaigu (GB8), Fengchi (GB20) and Tianzhu (BL10). The variations between baseline and BoNTA post-injection for four months were calculated monthly as outcome measures. BoNTA injections at fixed-sites and acupoint-sites significantly reduced the migraine attack frequency, intensity, duration and associated symptoms for four months compared with placebo (p < 0.01). The efficacy of BoNTA for migraines in the acupoint-site group (93% improvement) was more significant than that in the fixed-site group (85% improvement) (p < 0.01). BoNTA administration for migraines is effective, and at acupoint-sites shows more efficacy than at fixed-sites. Further blinded studies are necessary to establish the efficacy of a low dose toxin (25 U) introduced with this methodology in chronic and episodic migraines.
Acupoint Injection of Onabotulinumtoxin A for Migraines
Hou, Min; Xie, Jun-Fan; Kong, Xiang-Pan; Zhang, Yi; Shao, Yu-Feng; Wang, Can; Ren, Wen-Ting; Cui, Guang-Fu; Xin, Le; Hou, Yi-Ping
2015-01-01
Onabotulinumtoxin A (BoNTA) has been reported to be effective in the therapy for migraines. Acupuncture has been used worldwide for the treatment of migraine attacks. Injection of a small amount of drug at acupuncture points is an innovation as compared to traditional acupuncture. The purpose of this study was to evaluate and compare the effectiveness of fixed (muscle)-site and acupoint-site injections of BoNTA for migraine therapy in a randomized, double-blinded, placebo-controlled clinical trial extending over four months. Subjects with both episodic and chronic migraines respectively received a placebo (n = 19) or BoNTA (2.5 U each site, 25 U per subject) injection at fixed-sites (n = 41) including occipitofrontalis, corrugator supercilii, temporalis and trapeziue, or at acupoint-sites (n = 42) including Yintang (EX-HN3), Taiyang (EX-HN5), Baihui (GV20), Shuaigu (GB8), Fengchi (GB20) and Tianzhu (BL10). The variations between baseline and BoNTA post-injection for four months were calculated monthly as outcome measures. BoNTA injections at fixed-sites and acupoint-sites significantly reduced the migraine attack frequency, intensity, duration and associated symptoms for four months compared with placebo (p < 0.01). The efficacy of BoNTA for migraines in the acupoint-site group (93% improvement) was more significant than that in the fixed-site group (85% improvement) (p < 0.01). BoNTA administration for migraines is effective, and at acupoint-sites shows more efficacy than at fixed-sites. Further blinded studies are necessary to establish the efficacy of a low dose toxin (25 U) introduced with this methodology in chronic and episodic migraines. PMID:26529014
Teaching Case: Introduction to NoSQL in a Traditional Database Course
ERIC Educational Resources Information Center
Fowler, Brad; Godin, Joy; Geddy, Margaret
2016-01-01
Many organizations are dealing with the increasing demands of big data, so they are turning to NoSQL databases as their preferred system for handling the unique problems of capturing and storing massive amounts of data. Therefore, it is likely that employees in all sizes of organizations will encounter NoSQL databases. Thus, to be more job-ready,…
Zero tolerance for incorrect data: Best practices in SQL transaction programming
NASA Astrophysics Data System (ADS)
Laiho, M.; Skourlas, C.; Dervos, D. A.
2015-02-01
DBMS products differ in the way they support even the basic SQL transaction services. In this paper, a framework of best practices in SQL transaction programming is given and discussed. The SQL developers are advised to experiment with and verify the services supported by the DBMS product used. The framework has been developed by DBTechNet, a European network of teachers, trainers and ICT professionals. A course module on SQL transactions, offered by the LLP "DBTech VET Teachers" programme, is also presented and discussed. Aims and objectives of the programme include the introduction of the topics and content of SQL transactions and concurrency control to HE/VET curricula and addressing the need for initial and continuous training on these topics to in-company trainers, VET teachers, and Higher Education students. An overview of the course module, its learning outcomes, the education and training (E&T) content, virtual database labs with hands-on self-practicing exercises, plus instructions for the teacher/trainer on the pedagogy and the usage of the course modules' content are briefly described. The main principle adopted is to "Learn by verifying in practice" and the transactions course motto is: "Zero Tolerance for Incorrect Data".
Krymchantowski, Abouch Valenty; Carneiro, Henrique; Barbosa, Jackeline; Jevoux, Carla
2008-06-01
Nonsteroidal anti-inflammatory drugs (NSAID) are effective to treat migraine attacks. Lysine clonixinate (LC) and dipyrone (metamizol) have been proven effective to treat acute migraine. The aim of this study was to evaluate the efficacy and tolerability of the intravenous formulations of LC and dipyrone in the treatment of severe migraine attacks. Thirty patients (28 women, 2 men), aged 18 to 48 years with migraine according the International Headache Society (IHS) (2004) were studied. The patients were randomized into 2 groups when presenting to an emergency department with a severe migraine attack. The study was single-blind. Headache intensity, nausea, photophobia and side effects were evaluated at 0, 30, 60 and 90 minutes after the drug administration. Rectal indomethacin as rescue medication (RM) was available after 2 hours and its use compared between groups. All patients completed the study. At 30 minutes, 0% of the dipyrone group 13% of the LC group were pain free (p=0.46). At 60 and 90 minutes, 2 (13%) and 5 (33%) patients from the dipyrone group and 11 (73%) and 13 (86.7%) patients from the LC group were pain free (p<0.001). At 60 minutes, significantly more patients from the LC group were nausea-free (p<0.001). Regarding photophobia, there were no differences between groups at 60 minutes (p=0.11). The use of RM at 2 hours did not differ among groups (p=0.50). Pain in the site of the injection was reported by more patients of the LC group compared to the dipyrone group (p<0.0001). LC is significantly superior to dipyrone in treating severe migraine attacks. LC promotes significantly more burning at the site of the injection.
Muscarine- and carbachol-induced aggressions: fear and irritable kinds of aggressions.
Beleslin, D B; Samardzić, R
1977-12-28
In unaneasthetized and unrestrained cats, muscarine and carbachol were injected into the cerebral ventricles. The kind of aggressive behaviour depended on the cholinomimetic drug and was classified as fear and an irritable kind of aggression. Muscarine induced the fear kind of aggression. The aggressive behaviour was usually preceded by attempts to escape and the attack was relevant to the situation. For the attack the presence of some threatening agent was needed. The aggression was accompanied by intense motor but less autonomic activation. On the other hand, carbachol induced an irritable kind of aggression and had the following characteristics: for the attack the presence of some threatening agent was not needed; the attack was not relevant to the situation; the aggression was not preceded by attempts to escape; and the aggressive behaviour was accompanied by intense motor and autonomic activation. It is concluded that cholinoceptive mechanisms are involved in the control of aggressive behaviour.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Beaver, Justin M; Borges, Raymond Charles; Buckner, Mark A
Critical infrastructure Supervisory Control and Data Acquisition (SCADA) systems were designed to operate on closed, proprietary networks where a malicious insider posed the greatest threat potential. The centralization of control and the movement towards open systems and standards has improved the efficiency of industrial control, but has also exposed legacy SCADA systems to security threats that they were not designed to mitigate. This work explores the viability of machine learning methods in detecting the new threat scenarios of command and data injection. Similar to network intrusion detection systems in the cyber security domain, the command and control communications in amore » critical infrastructure setting are monitored, and vetted against examples of benign and malicious command traffic, in order to identify potential attack events. Multiple learning methods are evaluated using a dataset of Remote Terminal Unit communications, which included both normal operations and instances of command and data injection attack scenarios.« less
SUNCT and SUNA: Recognition and Treatment.
Pareja, Juan A; Alvarez, Mónica; Montojo, Teresa
2013-02-01
The problem of short-lasting unilateral neuralgiform headache attacks with conjunctival injection and tearing (SUNCT) and short-lasting unilateral neuralgiform headache attacks with cranial autonomic symptoms (SUNA) management remains unsolved. Despite a myriad of therapeutic trials, no convincingly effective remedy for SUNCT and SUNA is available at present. Based on open-label communications, some patients seemed to benefit from some pharmacologic, interventional, or invasive procedures. Possible effective preventive drugs are carbamazepine, lamotrigine, gabapentin, and topiramate. At present, the drug of choice for SUNCT seems to be lamotrigine whereas SUNA may better respond to gabapentin. There is no available abortive treatment for the individual attacks. During the worst periods, intravenous lidocaine may decrease the flow of SUNCT/SUNA attacks. In SUNCT, bilateral blockade of the greater occipital nerve, and superior cervical ganglion opioid blockade have been reported as temporary/partially effective in one patient each. Botulinum toxin injected around the symptomatic orbit provided sustained relief to one patient. Owing to the scarcity of reports the results of these interventions should be taken as preliminary. Invasive therapy with interventions directed to the first division of the trigeminal nerve or Gasserian ganglion, with local anesthetics or alcohol, radiofrequency thermocoagulation, microvascular decompression, and gamma-knife neurosurgery, have been tried in the treatment of refractory SUNCT. Some patients seemed to benefit from such interventions, but one should still have a critical attitude to these claims since no convincing results have been obtained as yet. The few SUNCT patients who underwent deep brain hypothalamic stimulation obtained a substantial and persistent relief.
Yasuda, Makiko; Gan, Lin; Chen, Brenden; Kadirvel, Senkottuvelan; Yu, Chunli; Phillips, John D; New, Maria I; Liebow, Abigail; Fitzgerald, Kevin; Querbes, William; Desnick, Robert J
2014-05-27
The acute hepatic porphyrias are inherited disorders of heme biosynthesis characterized by life-threatening acute neurovisceral attacks. Factors that induce the expression of hepatic 5-aminolevulinic acid synthase 1 (ALAS1) result in the accumulation of the neurotoxic porphyrin precursors 5-aminolevulinic acid (ALA) and porphobilinogen (PBG), which recent studies indicate are primarily responsible for the acute attacks. Current treatment of these attacks involves i.v. administration of hemin, but a faster-acting, more effective, and safer therapy is needed. Here, we describe preclinical studies of liver-directed small interfering RNAs (siRNAs) targeting Alas1 (Alas1-siRNAs) in a mouse model of acute intermittent porphyria, the most common acute hepatic porphyria. A single i.v. dose of Alas1-siRNA prevented the phenobarbital-induced biochemical acute attacks for approximately 2 wk. Injection of Alas1-siRNA during an induced acute attack significantly decreased plasma ALA and PBG levels within 8 h, more rapidly and effectively than a single hemin infusion. Alas1-siRNA was well tolerated and a therapeutic dose did not cause hepatic heme deficiency. These studies provide proof-of-concept for the clinical development of RNA interference therapy for the prevention and treatment of the acute attacks of the acute hepatic porphyrias.
DESPIC: Detecting Early Signatures of Persuasion in Information Cascades
2015-08-27
over NoSQL Databases, Proceedings of the 14th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid 2014). 26-MAY-14, . : , P...over NoSQL Databases. Proceedings of the 14th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid 2014). Chicago, IL, USA...distributed NoSQL databases including HBase and Riak, we finalized the requirements of the optimal computational architecture to support our framework
Plotkin, Marian; Vaibavi, Srirangam Ramanujam; Rufaihah, Abdul Jalil; Nithya, Venkateswaran; Wang, Jing; Shachaf, Yonatan; Kofidis, Theo; Seliktar, Dror
2014-02-01
This study compares the effect of four injectable hydrogels with different mechanical properties on the post-myocardial infarction left ventricle (LV) remodeling process. The bioactive hydrogels were synthesized from Tetronic-fibrinogen (TF) and PEG-fibrinogen (PF) conjugates; each hydrogel was supplemented with two levels of additional cross-linker to increase the matrix stiffness as measured by the shear storage modulus (G'). Infarcts created by ligating the left anterior descending coronary artery in a rodent model were treated with the hydrogels, and all four treatment groups showed an increase in wall thickness, arterial density, and viable cardiac tissue in the peri-infarct areas of the LV. Echocardiography and hemodynamics data of the PF/TF treated groups showed significant improvement of heart function associated with the attenuated effects of the remodeling process. Multi-factorial regression analysis indicated that the group with the highest modulus exhibited the best rescue of heart function and highest neovascularization. The results of this study demonstrate that multiple properties of an injectable bioactive biomaterial, and notably the matrix stiffness, provide the multifaceted stimulation necessary to preserve cardiac function and prevent adverse remodeling following a heart attack. Copyright © 2013 Elsevier Ltd. All rights reserved.
Joint Battlespace Infosphere: Information Management Within a C2 Enterprise
2005-06-01
using. In version 1.2, we support both MySQL and Oracle as underlying implementations where the XML metadata schema is mapped into relational tables in...Identity Servers, Role-Based Access Control, and Policy Representation – Databases: Oracle , MySQL , TigerLogic, Berkeley XML DB 15 Instrumentation Services...converted to SQL for execution. Invocations are then forwarded to the appropriate underlying IOR core components that have the responsibility of issuing
Analyzing Enron Data: Bitmap Indexing Outperforms MySQL Queries bySeveral Orders of Magnitude
DOE Office of Scientific and Technical Information (OSTI.GOV)
Stockinger, Kurt; Rotem, Doron; Shoshani, Arie
2006-01-28
FastBit is an efficient, compressed bitmap indexing technology that was developed in our group. In this report we evaluate the performance of MySQL and FastBit for analyzing the email traffic of the Enron dataset. The first finding shows that materializing the join results of several tables significantly improves the query performance. The second finding shows that FastBit outperforms MySQL by several orders of magnitude.
Reactive Aggregate Model Protecting Against Real-Time Threats
2014-09-01
on the underlying functionality of three core components. • MS SQL server 2008 backend database. • Microsoft IIS running on Windows server 2008...services. The capstone tested a Linux-based Apache web server with the following software implementations: • MySQL as a Linux-based backend server for...malicious compromise. 1. Assumptions • GINA could connect to a backend MS SQL database through proper configuration of DotNetNuke. • GINA had access
Information Security Considerations for Applications Using Apache Accumulo
2014-09-01
Distributed File System INSCOM United States Army Intelligence and Security Command JPA Java Persistence API JSON JavaScript Object Notation MAC Mandatory... MySQL [13]. BigTable can process 20 petabytes per day [14]. High degree of scalability on commodity hardware. NoSQL databases do not rely on highly...manipulation in relational databases. NoSQL databases each have a unique programming interface that uses a lower level procedural language (e.g., Java
Database Entity Persistence with Hibernate for the Network Connectivity Analysis Model
2014-04-01
time savings in the Java coding development process. Appendices A and B describe address setup procedures for installing the MySQL database...development environment is required: • The open source MySQL Database Management System (DBMS) from Oracle, which is a Java Database Connectivity (JDBC...compliant DBMS • MySQL JDBC Driver library that comes as a plug-in with the Netbeans distribution • The latest Java Development Kit with the latest
Learning Asset Technology Integration Support Tool Design Document
2010-05-11
language known as Hypertext Preprocessor ( PHP ) and by MySQL – a relational database management system that can also be used for content management. It...Requirements The LATIST tool will be implemented utilizing a WordPress platform with MySQL as the database. Also the LATIST system must effectively work... MySQL . When designing the LATIST system there are several considerations which must be accounted for in the working prototype. These include: • DAU
Standard Port-Visit Cost Forecasting Model for U.S. Navy Husbanding Contracts
2009-12-01
Protocol (HTTP) server.35 2. MySQL . An open-source database.36 3. PHP . A common scripting language used for Web development.37 E. IMPLEMENTATION OF...Inc. (2009). MySQL Community Server (Version 5.1) [Software]. Available from http://dev.mysql.com/downloads/ 37 The PHP Group (2009). PHP (Version...Logistics Services MySQL My Structured Query Language NAVSUP Navy Supply Systems Command NC Non-Contract Items NPS Naval Postgraduate
Cloud-Based Distributed Control of Unmanned Systems
2015-04-01
during mission execution. At best, the data is saved onto hard-drives and is accessible only by the local team. Data history in a form available and...following open source technologies: GeoServer, OpenLayers, PostgreSQL , and PostGIS are chosen to implement the back-end database and server. A brief...geospatial map data. 3. PostgreSQL : An SQL-compliant object-relational database that easily scales to accommodate large amounts of data - upwards to
SigmaCLIPSE = presentation management + NASA CLI PS + SQL
NASA Technical Reports Server (NTRS)
Weiss, Bernard P., Jr.
1990-01-01
SigmaCLIPSE provides an expert systems and 'intelligent' data base development program for diverse systems integration environments that require support for automated reasoning and expert systems technology, presentation management, and access to 'intelligent' SQL data bases. The SigmaCLIPSE technology and and its integrated ability to access 4th generation application development and decision support tools through a portable SQL interface, comprises a sophisticated software development environment for solving knowledge engineering and expert systems development problems in information intensive commercial environments -- financial services, health care, and distributed process control -- where the expert system must be extendable -- a major architectural advantage of NASA CLIPS. SigmaCLIPSE is a research effort intended to test the viability of merging SQL data bases with expert systems technology.
Metrics for Assessment of Smart Grid Data Integrity Attacks
DOE Office of Scientific and Technical Information (OSTI.GOV)
Annarita Giani; Miles McQueen; Russell Bent
2012-07-01
There is an emerging consensus that the nation’s electricity grid is vulnerable to cyber attacks. This vulnerability arises from the increasing reliance on using remote measurements, transmitting them over legacy data networks to system operators who make critical decisions based on available data. Data integrity attacks are a class of cyber attacks that involve a compromise of information that is processed by the grid operator. This information can include meter readings of injected power at remote generators, power flows on transmission lines, and relay states. These data integrity attacks have consequences only when the system operator responds to compromised datamore » by redispatching generation under normal or contingency protocols. These consequences include (a) financial losses from sub-optimal economic dispatch to service loads, (b) robustness/resiliency losses from placing the grid at operating points that are at greater risk from contingencies, and (c) systemic losses resulting from cascading failures induced by poor operational choices. This paper is focused on understanding the connections between grid operational procedures and cyber attacks. We first offer two examples to illustrate how data integrity attacks can cause economic and physical damage by misleading operators into taking inappropriate decisions. We then focus on unobservable data integrity attacks involving power meter data. These are coordinated attacks where the compromised data are consistent with the physics of power flow, and are therefore passed by any bad data detection algorithm. We develop metrics to assess the economic impact of these attacks under re-dispatch decisions using optimal power flow methods. These metrics can be use to prioritize the adoption of appropriate countermeasures including PMU placement, encryption, hardware upgrades, and advance attack detection algorithms.« less
Dopaminergic regulation of sleep and cataplexy in a murine model of narcolepsy.
Burgess, Christian R; Tse, Gavin; Gillis, Lauren; Peever, John H
2010-10-01
To determine if the dopaminergic system modulates cataplexy, sleep attacks and sleep-wake behavior in narcoleptic mice. Hypocretin/orexin knockout (i.e., narcoleptic) and wild-type mice were administered amphetamine and specific dopamine receptor modulators to determine their effects on sleep, cataplexy and sleep attacks. Hypocretin knockout (n = 17) and wild-type mice (n = 21). Cataplexy, sleep attacks and sleep-wake behavior were identified using electroencephalogram, electromyogram and videography. These behaviors were monitored for 4 hours after an i.p. injection of saline, amphetamine and specific dopamine receptor modulators (D1- and D2-like receptor modulators). Amphetamine (2 mg/kg), which increases brain dopamine levels, decreased sleep attacks and cataplexy by 61% and 67%, suggesting that dopamine transmission modulates such behaviors. Dopamine receptor modulation also had powerful effects on sleep attacks and cataplexy. Activation (SKF 38393; 20 mg/kg) and blockade (SCH 23390; 1 mg/kg) of D1-like receptors decreased and increased sleep attacks by 77% and 88%, without affecting cataplexy. Pharmacological activation of D2-like receptors (quinpirole; 0.5 mg/kg) increased cataplectic attacks by 172% and blockade of these receptors (eticlopride; 1 mg/kg) potently suppressed them by 97%. Manipulation of D2-like receptors did not affect sleep attacks. We show that the dopaminergic system plays a role in regulating both cataplexy and sleep attacks in narcoleptic mice. We found that cataplexy is modulated by a D2-like receptor mechanism, whereas dopamine modulates sleep attacks by a D1-like receptor mechanism. These results support a role for the dopamine system in regulating sleep attacks and cataplexy in a murine model of narcolepsy.
Using PHP/MySQL to Manage Potential Mass Impacts
NASA Technical Reports Server (NTRS)
Hager, Benjamin I.
2010-01-01
This paper presents a new application using commercially available software to manage mass properties for spaceflight vehicles. PHP/MySQL(PHP: Hypertext Preprocessor and My Structured Query Language) are a web scripting language and a database language commonly used in concert with each other. They open up new opportunities to develop cutting edge mass properties tools, and in particular, tools for the management of potential mass impacts (threats and opportunities). The paper begins by providing an overview of the functions and capabilities of PHP/MySQL. The focus of this paper is on how PHP/MySQL are being used to develop an advanced "web accessible" database system for identifying and managing mass impacts on NASA's Ares I Upper Stage program, managed by the Marshall Space Flight Center. To fully describe this application, examples of the data, search functions, and views are provided to promote, not only the function, but the security, ease of use, simplicity, and eye-appeal of this new application. This paper concludes with an overview of the other potential mass properties applications and tools that could be developed using PHP/MySQL. The premise behind this paper is that PHP/MySQL are software tools that are easy to use and readily available for the development of cutting edge mass properties applications. These tools are capable of providing "real-time" searching and status of an active database, automated report generation, and other capabilities to streamline and enhance mass properties management application. By using PHP/MySQL, proven existing methods for managing mass properties can be adapted to present-day information technology to accelerate mass properties data gathering, analysis, and reporting, allowing mass property management to keep pace with today's fast-pace design and development processes.
2002-06-01
Student memo for personnel MCLLS . . . . . . . . . . . . . . 75 i. Migrate data to SQL Server...The Web Server is on the same server as the SWORD database in the current version. 4: results set 5: dynamic HTML page 6: dynamic HTML page 3: SQL ...still be supported by Access. SQL Server would be a more viable tool for a fully developed application based on the number of potential users and
Multi-Resolution Playback of Network Trace Files
2015-06-01
a com- plete MySQL database, C++ developer tools and the libraries utilized in the development of the system (Boost and Libcrafter), and Wireshark...XE suite has a limit to the allowed size of each database. In order to be scalable, the project had to switch to the MySQL database suite. The...programs that access the database use the MySQL C++ connector, provided by Oracle, and the supplied methods and libraries. 4.4 Flow Generator Chapter 3
2013-01-01
commercial NoSQL database system. The results show that In-dexedHBase provides a data loading speed that is 6 times faster than Riak, and is...compare it with Riak, a widely adopted commercial NoSQL database system. The results show that In- dexedHBase provides a data loading speed that is 6...events. This chapter describes our research towards building an efficient and scalable storage platform for Truthy. Many existing NoSQL databases
Quality Attribute-Guided Evaluation of NoSQL Databases: A Case Study
2015-01-16
evaluations of NoSQL databases specifically, and big data systems in general, that have become apparent during our study. Keywords—NoSQL, distributed...technology, namely that of big data , software systems [1]. At the heart of big data systems are a collection of database technologies that are more...born organizations such as Google and Amazon [3][4], along with those of numerous other big data innovators, have created a variety of open source and
Sevgi, Eser Başak; Erdener, Sefik Evren; Demirci, Mehmet; Topcuoglu, Mehmet Akif; Dalkara, Turgay
2012-01-01
Background Although controversial, paradoxical embolism via patent foramen ovale (PFO) may account for some of the migraine attacks in a subset of migraine with aura (MA) patients. Induction of MA attacks with air bubble injection during transcranial Doppler ultrasound in MA patients with PFO supports this view. It is likely that cerebral embolism in patients with right-to-left shunt induces bioelectrical abnormalities to initiate MA under some conditions. Methods and Results We investigated changes in cerebral bioelectrical activity after intravenous microbubble injection in 10 MA patients with large PFO and right-to-left cardiac shunt. Eight PFO patients without migraine but with large right-to-left shunt and 12 MA patients without PFO served as controls. Four MA patients with PFO were reexamined with sham injections of saline without microbubbles. Bioelectrical activity was evaluated using spectral electroencephalography and, passage of microbubbles through cerebral arteries was monitored with transcranial Doppler ultrasound. Microbubble embolism caused significant electroencephalographic power increase in MA+PFO patients but not in control groups including the sham-injected MA+PFO patients. Headache developed in 2 MA with PFO patients after microbubble injection. Conclusions These findings demonstrate that air microembolism through large PFOs may cause cerebral bioelectrical disturbances and, occasionally, headache in MA patients, which may reflect an increased reactivity of their brain to transient subclinical hypoxia–ischemia, and suggest that paradoxical embolism is not a common cause of migraine but may induce headache in the presence of a large PFO and facilitating conditions. PMID:23316313
Novel Method of Storing and Reconstructing Events at Fermilab E-906/SeaQuest Using a MySQL Database
NASA Astrophysics Data System (ADS)
Hague, Tyler
2010-11-01
Fermilab E-906/SeaQuest is a fixed target experiment at Fermi National Accelerator Laboratory. We are investigating the antiquark asymmetry in the nucleon sea. By examining the ratio of the Drell- Yan cross sections of proton-proton and proton-deuterium collisions we can determine the asymmetry ratio. An essential feature in the development of the analysis software is to update the event reconstruction to modern software tools. We are doing this in a unique way by doing a majority of the calculations within an SQL database. Using a MySQL database allows us to take advantage of off-the-shelf software without sacrificing ROOT compatibility and avoid network bottlenecks with server-side data selection. Using our raw data we create stubs, or partial tracks, at each station which are pieced together to create full tracks. Our reconstruction process uses dynamically created SQL statements to analyze the data. These SQL statements create tables that contain the final reconstructed tracks as well as intermediate values. This poster will explain the reconstruction process and how it is being implemented.
BIRS – Bioterrorism Information Retrieval System
Tewari, Ashish Kumar; Rashi; Wadhwa, Gulshan; Sharma, Sanjeev Kumar; Jain, Chakresh Kumar
2013-01-01
Bioterrorism is the intended use of pathogenic strains of microbes to widen terror in a population. There is a definite need to promote research for development of vaccines, therapeutics and diagnostic methods as a part of preparedness to any bioterror attack in the future. BIRS is an open-access database of collective information on the organisms related to bioterrorism. The architecture of database utilizes the current open-source technology viz PHP ver 5.3.19, MySQL and IIS server under windows platform for database designing. Database stores information on literature, generic- information and unique pathways of about 10 microorganisms involved in bioterrorism. This may serve as a collective repository to accelerate the drug discovery and vaccines designing process against such bioterrorist agents (microbes). The available data has been validated from various online resources and literature mining in order to provide the user with a comprehensive information system. Availability The database is freely available at http://www.bioterrorism.biowaves.org PMID:23390356
Comparison of the Frontier Distributed Database Caching System to NoSQL Databases
DOE Office of Scientific and Technical Information (OSTI.GOV)
Dykstra, Dave
One of the main attractions of non-relational NoSQL databases is their ability to scale to large numbers of readers, including readers spread over a wide area. The Frontier distributed database caching system, used in production by the Large Hadron Collider CMS and ATLAS detector projects for Conditions data, is based on traditional SQL databases but also adds high scalability and the ability to be distributed over a wide-area for an important subset of applications. This paper compares the major characteristics of the two different approaches and identifies the criteria for choosing which approach to prefer over the other. It alsomore » compares in some detail the NoSQL databases used by CMS and ATLAS: MongoDB, CouchDB, HBase, and Cassandra.« less
Caballero, Teresa; Zanichelli, Andrea; Aberer, Werner; Maurer, Marcus; Longhurst, Hilary J; Bouillet, Laurence; Andresen, Irmgard
2018-01-01
Icatibant is a bradykinin B2-receptor antagonist used for the treatment of hereditary angioedema attacks resulting from C1-inhibitor deficiency. Treatment is not adjusted by body weight however the impact of body mass index (BMI) on the effectiveness of icatibant is not documented in the literature. We examined disease characteristics and icatibant treatment effectiveness in patients stratified by BMI in the Icatibant Outcome Survey, an ongoing, international, observational study monitoring the real-world safety and effectiveness of icatibant. Attack and treatment characteristics as well as outcomes following treatment with icatibant were compared among patients with underweight, normal, overweight, and obese BMI. Data from 2697 icatibant-treated attacks in 342 patients (3.5, 44.7, 34.8, and 17.0% patients of underweight, normal, overweight, and obese BMI, respectively) were analyzed. There was no significant difference in the frequency and severity of attacks across BMI groups, although obese patients tended to have more attacks of high severity. There was no impact of BMI on the frequency of laryngeal attacks, but patients with normal BMI had fewer cutaneous attacks and more abdominal attacks. Most attacks (71.9-83.8%) were treated with a single icatibant injection without the need for rescue with plasma-derived C1-inhibitor (pdC1-INH), regardless of BMI. Patients with obese BMI used pdC1-INH as rescue treatment more often (P < 0.0001; P = 0.0232 excluding 2 outliers) and treated attacks earlier than patients with normal BMI (P = 0.007). Furthermore, time to resolution and duration of attack were shorter for patients with high BMI (P < 0.001 for overweight and P < 0.05 for obese versus normal). Overall, icatibant was comparatively effective in treating attacks in patients across all BMI groups. Trial registration NCT01034969.
Assembling proteomics data as a prerequisite for the analysis of large scale experiments
Schmidt, Frank; Schmid, Monika; Thiede, Bernd; Pleißner, Klaus-Peter; Böhme, Martina; Jungblut, Peter R
2009-01-01
Background Despite the complete determination of the genome sequence of a huge number of bacteria, their proteomes remain relatively poorly defined. Beside new methods to increase the number of identified proteins new database applications are necessary to store and present results of large- scale proteomics experiments. Results In the present study, a database concept has been developed to address these issues and to offer complete information via a web interface. In our concept, the Oracle based data repository system SQL-LIMS plays the central role in the proteomics workflow and was applied to the proteomes of Mycobacterium tuberculosis, Helicobacter pylori, Salmonella typhimurium and protein complexes such as 20S proteasome. Technical operations of our proteomics labs were used as the standard for SQL-LIMS template creation. By means of a Java based data parser, post-processed data of different approaches, such as LC/ESI-MS, MALDI-MS and 2-D gel electrophoresis (2-DE), were stored in SQL-LIMS. A minimum set of the proteomics data were transferred in our public 2D-PAGE database using a Java based interface (Data Transfer Tool) with the requirements of the PEDRo standardization. Furthermore, the stored proteomics data were extractable out of SQL-LIMS via XML. Conclusion The Oracle based data repository system SQL-LIMS played the central role in the proteomics workflow concept. Technical operations of our proteomics labs were used as standards for SQL-LIMS templates. Using a Java based parser, post-processed data of different approaches such as LC/ESI-MS, MALDI-MS and 1-DE and 2-DE were stored in SQL-LIMS. Thus, unique data formats of different instruments were unified and stored in SQL-LIMS tables. Moreover, a unique submission identifier allowed fast access to all experimental data. This was the main advantage compared to multi software solutions, especially if personnel fluctuations are high. Moreover, large scale and high-throughput experiments must be managed in a comprehensive repository system such as SQL-LIMS, to query results in a systematic manner. On the other hand, these database systems are expensive and require at least one full time administrator and specialized lab manager. Moreover, the high technical dynamics in proteomics may cause problems to adjust new data formats. To summarize, SQL-LIMS met the requirements of proteomics data handling especially in skilled processes such as gel-electrophoresis or mass spectrometry and fulfilled the PSI standardization criteria. The data transfer into a public domain via DTT facilitated validation of proteomics data. Additionally, evaluation of mass spectra by post-processing using MS-Screener improved the reliability of mass analysis and prevented storage of data junk. PMID:19166578
Modeling inter-signal arrival times for accurate detection of CAN bus signal injection attacks
DOE Office of Scientific and Technical Information (OSTI.GOV)
Moore, Michael Roy; Bridges, Robert A; Combs, Frank L
Modern vehicles rely on hundreds of on-board electronic control units (ECUs) communicating over in-vehicle networks. As external interfaces to the car control networks (such as the on-board diagnostic (OBD) port, auxiliary media ports, etc.) become common, and vehicle-to-vehicle / vehicle-to-infrastructure technology is in the near future, the attack surface for vehicles grows, exposing control networks to potentially life-critical attacks. This paper addresses the need for securing the CAN bus by detecting anomalous traffic patterns via unusual refresh rates of certain commands. While previous works have identified signal frequency as an important feature for CAN bus intrusion detection, this paper providesmore » the first such algorithm with experiments on five attack scenarios. Our data-driven anomaly detection algorithm requires only five seconds of training time (on normal data) and achieves true positive / false discovery rates of 0.9998/0.00298, respectively (micro-averaged across the five experimental tests).« less
2001-09-01
replication) -- all from Visual Basic and VBA . In fact, we found that the SQL Server engine actually had a plethora of options, most formidable of...2002, the new SQL Server 2000 database engine, and Microsoft Visual Basic.NET. This thesis describes our use of the Spiral Development Model to...versions of Microsoft products? Specifically, the pending release of Microsoft Office 2002, the new SQL Server 2000 database engine, and Microsoft
An XML-Based Knowledge Management System of Port Information for U.S. Coast Guard Cutters
2003-03-01
using DTDs was not chosen. XML Schema performs many of the same functions as SQL type schemas, but differ by the unique structure of XML documents...to access data from content files within the developed system. XPath is not equivalent to SQL . While XPath is very powerful at reaching into an XML...document and finding nodes or node sets, it is not a complete query language. For operations like joins, unions, intersections, etc., SQL is far
Defense Information Systems Agency Technical Integration Support (DISA- TIS). MUMPS Study.
1993-01-01
usable in DoD, MUMPS must continue to improve in its support of DoD and OSE standards such as SQL , X-Windows, POSIX, PHIGS, etc. MUMPS and large AlSs...Language ( SQL ), X-Windows, and Graphical Kernel Services (GKS)) 2.2.2.3 FIPS Adoption by NIST The National Institute of Standards and Technology (NIST...many of the performance tuning mechanisms that must be performed explicitly with other systems. The VA looks forward to the SQL binding (1993 ANS) that
User Manual for Personnel Inventory Aging and Promotion Model
2009-06-01
increased by 12. Now, an SQL 9 statement deletes records where [target] = NULL, and the model calculates the number of E8s that need to be promoted to...the run, the [Likelihood] and [Expected] tables are created. The first step in this process is to dy- namically build an SQL statement, based on the...This table has individual-level, longitudinal records. Next, a dy- namically built SQL statement based on the Number of Years, cre- ates a new data
Reliability Information Analysis Center 1st Quarter 2007, Technical Area Task (TAT) Report
2007-02-05
34* Created new SQL server database for "PC Configuration" web application. Added roles for security closed 4235 and posted application to production. "e Wrote...and ran SQL Server scripts to migrate production databases to new server . "e Created backup jobs for new SQL Server databases. "* Continued...second phase of the TENA demo. Extensive tasking was established and assigned. A TENA interface to EW Server was reaffirmed after some uncertainty about
Spectrum Savings from High Performance Recording and Playback Onboard the Test Article
2013-02-20
execute within a Windows 7 environment, and data is recorded on SSDs. The underlying database is implemented using MySQL . Figure 1 illustrates the... MySQL database. This is effectively the time at which the recorded data are available for retransmission. CPU and Memory utilization were collected...17.7% MySQL avg. 3.9% EQDR Total avg. 21.6% Table 1 CPU Utilization with260 Mbits/sec Load The difference between the total System CPU (27.8
2013-01-01
website). Data mining tools are in-house code developed in Python, C++ and Java . • NGA The National Geospatial-Intelligence Agency (NGA) performs data...as PostgreSQL (with PostGIS), MySQL , Microsoft SQL Server, SQLite, etc. using the appropriate JDBC driver. 14 The documentation and ease to learn are...written in Java that is able to perform various types of regressions, classi- fications, and other data mining tasks. There is also a commercial version
A Brief Assessment of LC2IEDM, MIST and Web Services for use in Naval Tactical Data Management
2004-07-01
server software, messaging between the client and server, and a database. The MIST database is implemented in an open source DBMS named PostGreSQL ... PostGreSQL had its beginnings at the University of California, Berkley, in 1986 [11]. The development of PostGreSQL has since evolved into a...contact history from the database. DRDC Atlantic TM 2004-148 9 Request Software Request Software Server Side Response from service
Degradation of phagocytosed lysosomes by Kupffer cell lysosomes.
Henell, F; Ericsson, J L; Glaumann, H
1983-05-01
Lysosomal membranes are apparently resistant to hydrolytic attack from their own enzymes. Alternatively, degradation occurs but is compensated for by continuous insertion of new membrane components. It may be hypothesized that a mechanism operating exclusively on the luminal side of the lysosomal membrane serves to protect the membrane from being degraded. To evaluate this notion the cytoplasmic side of the lysosomal membrane has been exposed to lysosomal enzymes in vivo. Lysosomes were isolated and subsequently injected into the portal vein of a series of rats. The uptake of the injected organelles by Kupffer cells and their subsequent degradation in lysosomes were monitored by means of electron microscopy. Four minutes after injection lysosomes were seen attached to the surface of the Kupffer cells. After 30 minutes the injected material was present in Kupffer cell phagolysosomes, and signs of degradation of the phagocytosed lysosomes were seen. By 2 hours only a few distinct membranes were left, and by 12 hours the injected lysosomes were no longer recognizable. Instead, the phagolysosomes of Kupffer cells were laden with lipid-like droplets and irregular membranous structures. Acid phosphatase histochemistry and labeling of preexisting Kupffer cell lysosomes with marker particles indicated that the phagosomes engulfing the injected lysosomes acquired hydrolytic enzymes within 30 minutes after their formation. The degradation rate of injected lysosomes was estimated by measuring the decay of radioactivity from a rat liver mitochondrial lysosomal fraction after administration of lysosomes isotopically prelabeled with 14C-leucine and 14C-glycerol. The half-life of the lysosomal membrane proteins varied between 1.5 and 2.0 hours, whereas that of the lipid component was in the range of 2.0 to 3.5 hours. These findings demonstrate that lysosomal membranes are degraded if their outer surface is exposed to lysosomal enzymes. Both the ultrastructural analysis and the isotopic studies indicate that proteins are degraded faster than lipids. Apparently, the cytoplasmic surface of the lysosomes is susceptible to lysosomal hydrolytic attack.
Ischemia may be the primary cause of the neurologic deficits in classic migraine
DOE Office of Scientific and Technical Information (OSTI.GOV)
Skyhoj Olsen, T.; Friberg, L.; Lassen, N.A.
1987-02-01
This study investigates whether the cerebral blood flow reduction occurring in attacks of classic migraine is sufficient to cause neurologic deficits. Regional cerebral blood flow measured with the xenon 133 intracarotid injection technique was analyzed in 11 patients in whom a low-flow area developed during attacks of classic migraine. When measured with this technique, regional cerebral blood flow in focal low-flow areas will be overestimated because of the effect of scattered radiation (Compton scatter) on the recordings. In this study, this effect was particularly taken into account when evaluating the degree of blood flow reduction. During attacks of classic migraine,more » cerebral blood flow reductions averaging 52% were observed focally in the 11 patients. Cerebral blood flow levels known to be insufficient for normal cortical function (less than 16 to 23 mL/100 g/min) were measured in seven patients during the attacks. This was probably also the case in the remaining four patients, but the effect of scattered radiation made a reliable evaluation of blood flow impossible. It is concluded that the blood flow reduction that occurs during attacks of classic migraine is sufficient to cause ischemia and neurologic deficits. Hence, this study suggests a vascular origin of the prodromal neurologic deficits that may accompany attacks of classic migraine.« less
Lee, Ken Ka-Yin; Tang, Wai-Choi; Choi, Kup-Sze
2013-04-01
Clinical data are dynamic in nature, often arranged hierarchically and stored as free text and numbers. Effective management of clinical data and the transformation of the data into structured format for data analysis are therefore challenging issues in electronic health records development. Despite the popularity of relational databases, the scalability of the NoSQL database model and the document-centric data structure of XML databases appear to be promising features for effective clinical data management. In this paper, three database approaches--NoSQL, XML-enabled and native XML--are investigated to evaluate their suitability for structured clinical data. The database query performance is reported, together with our experience in the databases development. The results show that NoSQL database is the best choice for query speed, whereas XML databases are advantageous in terms of scalability, flexibility and extensibility, which are essential to cope with the characteristics of clinical data. While NoSQL and XML technologies are relatively new compared to the conventional relational database, both of them demonstrate potential to become a key database technology for clinical data management as the technology further advances. Copyright © 2012 Elsevier Ireland Ltd. All rights reserved.
Three Dimensional Solution of Pneumatic Active Control of Forebody Vortex Asymmetry
NASA Technical Reports Server (NTRS)
Kandil, Osama A.; SharafEl-Din, Hazem H.; Liu, C. H.
1995-01-01
Pneumatic active control of asymmetric vortical flows around a slender pointed forebody is investigated using the three dimensional solution for the compressible thin-layer Navier-Stokes equation. The computational applications cover the normal and tangential injection control of asymmetric flows around a 5 degree semi-apex angle cone at a 40 degree angle of attack, 1.4 freestream Mach number and 6 x 10(exp 6) freestream Reynolds number (based on the cone length). The effective tangential angle range of 67.5 approaches minus 67.5 degrees is used for both normal and tangential ports of injection. The effective axial length of injection is varied from 0.03 to 0.05. The computational solver uses the implicit, upwind, flux difference splitting finite volume scheme, and the grid consists of 161 x 55 x 65 points in the wrap around, normal and axial directions, respectively. The results show that tangential injection is more effective than normal injection.
Assessment & Commitment Tracking System (ACTS)
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bryant, Robert A.; Childs, Teresa A.; Miller, Michael A.
2004-12-20
The ACTS computer code provides a centralized tool for planning and scheduling assessments, tracking and managing actions associated with assessments or that result from an event or condition, and "mining" data for reporting and analyzing information for improving performance. The ACTS application is designed to work with the MS SQL database management system. All database interfaces are written in SQL. The following software is used to develop and support the ACTS application: Cold Fusion HTML JavaScript Quest TOAD Microsoft Visual Source Safe (VSS) HTML Mailer for sending email Microsoft SQL Microsoft Internet Information Server
NASA Technical Reports Server (NTRS)
McGlynn, T.; Santisteban, M.
2007-01-01
This chapter provides a very brief introduction to the Structured Query Language (SQL) for getting information from relational databases. We make no pretense that this is a complete or comprehensive discussion of SQL. There are many aspects of the language the will be completely ignored in the presentation. The goal here is to provide enough background so that users understand the basic concepts involved in building and using relational databases. We also go through the steps involved in building a particular astronomical database used in some of the other presentations in this volume.
Integrated Array/Metadata Analytics
NASA Astrophysics Data System (ADS)
Misev, Dimitar; Baumann, Peter
2015-04-01
Data comes in various forms and types, and integration usually presents a problem that is often simply ignored and solved with ad-hoc solutions. Multidimensional arrays are an ubiquitous data type, that we find at the core of virtually all science and engineering domains, as sensor, model, image, statistics data. Naturally, arrays are richly described by and intertwined with additional metadata (alphanumeric relational data, XML, JSON, etc). Database systems, however, a fundamental building block of what we call "Big Data", lack adequate support for modelling and expressing these array data/metadata relationships. Array analytics is hence quite primitive or non-existent at all in modern relational DBMS. Recognizing this, we extended SQL with a new SQL/MDA part seamlessly integrating multidimensional array analytics into the standard database query language. We demonstrate the benefits of SQL/MDA with real-world examples executed in ASQLDB, an open-source mediator system based on HSQLDB and rasdaman, that already implements SQL/MDA.
Processing of the WLCG monitoring data using NoSQL
NASA Astrophysics Data System (ADS)
Andreeva, J.; Beche, A.; Belov, S.; Dzhunov, I.; Kadochnikov, I.; Karavakis, E.; Saiz, P.; Schovancova, J.; Tuckett, D.
2014-06-01
The Worldwide LHC Computing Grid (WLCG) today includes more than 150 computing centres where more than 2 million jobs are being executed daily and petabytes of data are transferred between sites. Monitoring the computing activities of the LHC experiments, over such a huge heterogeneous infrastructure, is extremely demanding in terms of computation, performance and reliability. Furthermore, the generated monitoring flow is constantly increasing, which represents another challenge for the monitoring systems. While existing solutions are traditionally based on Oracle for data storage and processing, recent developments evaluate NoSQL for processing large-scale monitoring datasets. NoSQL databases are getting increasingly popular for processing datasets at the terabyte and petabyte scale using commodity hardware. In this contribution, the integration of NoSQL data processing in the Experiment Dashboard framework is described along with first experiences of using this technology for monitoring the LHC computing activities.
Integrating Scientific Array Processing into Standard SQL
NASA Astrophysics Data System (ADS)
Misev, Dimitar; Bachhuber, Johannes; Baumann, Peter
2014-05-01
We live in a time that is dominated by data. Data storage is cheap and more applications than ever accrue vast amounts of data. Storing the emerging multidimensional data sets efficiently, however, and allowing them to be queried by their inherent structure, is a challenge many databases have to face today. Despite the fact that multidimensional array data is almost always linked to additional, non-array information, array databases have mostly developed separately from relational systems, resulting in a disparity between the two database categories. The current SQL standard and SQL DBMS supports arrays - and in an extension also multidimensional arrays - but does so in a very rudimentary and inefficient way. This poster demonstrates the practicality of an SQL extension for array processing, implemented in a proof-of-concept multi-faceted system that manages a federation of array and relational database systems, providing transparent, efficient and scalable access to the heterogeneous data in them.
Interactive DataBase of Cosmic Ray Anisotropy (DB A10)
NASA Astrophysics Data System (ADS)
Asipenka, A.S.; Belov, A.V.; Eroshenko, E.F.; Klepach, E.G.; Oleneva, V.A.; Yake, V.G.
Data on the hourly means of cosmic ray density and anisotropy derived by the GSM method over the 1957-2006 are introduced in to MySQL database. This format allowed an access to data both in local and in the Internet. Using the realized combination of script-language Php and My SQL database the Internet project was created on the access for users data on the CR anisotropy in different formats (http://cr20.izmiran.ru/AnisotropyCR/main.htm/). Usage the sheaf Php and MySQL provides fast receiving data even in the Internet since a request and following process of data are accomplished on the project server. Usage of MySQL basis for the storing data on cosmic ray variations give a possibility to construct requests of different structures, extends the variety of data reflection, makes it possible the conformity data to other systems and usage them in other projects.
Nitrocobinamide, a New Cyanide Antidote That Can Be Administered by Intramuscular Injection
Chan, Adriano; Jiang, Jingjing; Fridman, Alla; Guo, Ling T.; Shelton, G. Diane; Liu, Ming-Tao; Green, Carol; Haushalter, Kristofer J.; Patel, Hemal H.; Lee, Jangwoen; Yoon, David; Burney, Tanya; Mukai, David; Mahon, Sari B.; Brenner, Matthew; Pilz, Renate B.; Boss, Gerry R.
2015-01-01
Currently available cyanide antidotes must be given by intravenous injection over 5–10 min, making them illsuited for treating many people in the field, as could occur in a major fire, an industrial accident, or a terrorist attack. These scenarios call for a drug that can be given quickly, e.g., by intramuscular injection. We have shown that aquohydroxocobinamide is a potent cyanide antidote in animal models of cyanide poisoning, but it is unstable in solution and poorly absorbed after intramuscular injection. Here we show that adding sodium nitrite to cobinamide yields a stable derivative (referred to as nitrocobinamide) that rescues cyanide-poisoned mice and rabbits when given by intramuscular injection. We also show that the efficacy of nitrocobinamide is markedly enhanced by coadministering sodium thiosulfate (reducing the total injected volume), and we calculate that ∼1.4 mL each of nitrocobinamide and sodium thiosulfate should rescue a human from a lethal cyanide exposure. PMID:25650735
On-demand anakinra treatment is effective in mevalonate kinase deficiency.
Bodar, E J; Kuijk, L M; Drenth, J P H; van der Meer, J W M; Simon, A; Frenkel, J
2011-12-01
Mevalonate kinase deficiency (MKD) is a hereditary autoinflammatory syndrome marked by recurrent attacks of fever and inflammation. Severe enzyme deficiency results in mevalonic aciduria (MA) and milder deficiency in hyperimmunoglobulin D syndrome (HIDS). Treatment remains a challenge. To observe the effect of the recombinant interleukin-1 receptor antagonist anakinra in patients with MKD. A prospective observational study was undertaken. Two patients with MA started continuous treatment with anakinra (1-2 mg/kg/day) and nine patients with HIDS chose between continuous treatment and on-demand treatment (starting at first symptoms of attack, 100 mg/day or 1 mg/kg/day for 5-7 days). Anakinra induced partial remission in one patient with MA but there was no response in the other patient with MA. In one patient with HIDS continuous treatment induced complete remission for 7 months but was stopped because of side effects. Eight patients with HIDS preferred on-demand treatment from the start. This induced a clinical response (≥50% reduction in duration) in 8 of 12 treated attacks without a change in attack frequency. Anakinra prevented fever attacks due to vaccination without inhibiting antibody induction. No major side effects were seen. On-demand treatment with anakinra in HIDS decreases the duration and severity of fever attacks. Because of the burden of daily injections and relatively long asymptomatic intervals of HIDS, all patients with HIDS preferred on-demand treatment.
Müller, Cláudia Janaina Torres; Quintino-Dos-Santos, Jeyce Willig; Schimitel, Fagna Giacomin; Tufik, Sérgio; Beijamini, Vanessa; Canteras, Newton Sabino; Schenberg, Luiz Carlos
2017-04-21
Intravenous injections of potassium cyanide (KCN) both elicit escape by its own and facilitate escape to electrical stimulation of the periaqueductal gray matter (PAG). Moreover, whereas the KCN-evoked escape is potentiated by CO 2 , it is suppressed by both lesions of PAG and clinically effective treatments with panicolytics. These and other data suggest that the PAG harbors a hypoxia-sensitive alarm system the activation of which could both precipitate panic and render the subject hypersensitive to CO 2 . Although prior c-Fos immunohistochemistry studies reported widespread activations of PAG following KCN injections, the employment of repeated injections of high doses of KCN (>60µg) in anesthetized rats compromised both the localization of KCN-responsive areas and their correlation with escape behavior. Accordingly, here we compared the brainstem activations of saline-injected controls (air/saline) with those produced by a single intravenous injection of 40-µg KCN (air/KCN), a 2-min exposure to 13% CO 2 (CO 2 /saline), or a combined stimulus (CO 2 /KCN). Behavioral effects of KCN microinjections into the PAG were assessed as well. Data showed that whereas the KCN microinjections were ineffective, KCN intravenous injections elicited escape in all tested rats. Moreover, whereas the CO 2 alone was ineffective, it potentiated the KCN-evoked escape. Compared to controls, the nucleus tractus solitarius was significantly activated in both CO 2 /saline and CO 2 /KCN groups. Additionally, whereas the laterodorsal tegmental nucleus was activated by all treatments, the rostrolateral and caudoventrolateral PAG were activated by air/KCN only. Data suggest that the latter structures are key components of a hypoxia-sensitive suffocation alarm which activation may trigger a panic attack. Copyright © 2017 IBRO. Published by Elsevier Ltd. All rights reserved.
SQL Triggers Reacting on Time Events: An Extension Proposal
NASA Astrophysics Data System (ADS)
Behrend, Andreas; Dorau, Christian; Manthey, Rainer
Being able to activate triggers at timepoints reached or after time intervals elapsed has been acknowledged by many authors as a valuable functionality of a DBMS. Recently, the interest in time-based triggers has been renewed in the context of data stream monitoring. However, up till now SQL triggers react to data changes only, even though research proposals and prototypes have been supporting several other event types, in particular time-based ones, since long. We therefore propose a seamless extension of the SQL trigger concept by time-based triggers, focussing on semantic issues arising from such an extension.
Epstein, Richard H; Dexter, Franklin
2017-07-01
Comorbidity adjustment is often performed during outcomes and health care resource utilization research. Our goal was to develop an efficient algorithm in structured query language (SQL) to determine the Elixhauser comorbidity index. We wrote an SQL algorithm to calculate the Elixhauser comorbidities from Diagnosis Related Group and International Classification of Diseases (ICD) codes. Validation was by comparison to expected comorbidities from combinations of these codes and to the 2013 Nationwide Readmissions Database (NRD). The SQL algorithm matched perfectly with expected comorbidities for all combinations of ICD-9 or ICD-10, and Diagnosis Related Groups. Of 13 585 859 evaluable NRD records, the algorithm matched 100% of the listed comorbidities. Processing time was ∼0.05 ms/record. The SQL Elixhauser code was efficient and computationally identical to the SAS algorithm used for the NRD. This algorithm may be useful where preprocessing of large datasets in a relational database environment and comorbidity determination is desired before statistical analysis. A validated SQL procedure to calculate Elixhauser comorbidities and the van Walraven index from ICD-9 or ICD-10 discharge diagnosis codes has been published. © The Author 2017. Published by Oxford University Press on behalf of the American Medical Informatics Association. All rights reserved. For Permissions, please email: journals.permissions@oup.com
Deep Learning-Based Data Forgery Detection in Automatic Generation Control
DOE Office of Scientific and Technical Information (OSTI.GOV)
Zhang, Fengli; Li, Qinghua
Automatic Generation Control (AGC) is a key control system in the power grid. It is used to calculate the Area Control Error (ACE) based on frequency and tie-line power flow between balancing areas, and then adjust power generation to maintain the power system frequency in an acceptable range. However, attackers might inject malicious frequency or tie-line power flow measurements to mislead AGC to do false generation correction which will harm the power grid operation. Such attacks are hard to be detected since they do not violate physical power system models. In this work, we propose algorithms based on Neural Networkmore » and Fourier Transform to detect data forgery attacks in AGC. Different from the few previous work that rely on accurate load prediction to detect data forgery, our solution only uses the ACE data already available in existing AGC systems. In particular, our solution learns the normal patterns of ACE time series and detects abnormal patterns caused by artificial attacks. Evaluations on the real ACE dataset show that our methods have high detection accuracy.« less
Advancing Future Network Science through Content Understanding
2014-05-01
BitTorrent, PostgreSQL, MySQL , and GRSecurity) and emerging technologies (HadoopDFS, Tokutera, Sector/Sphere, HBase, and other BigTable-like...result. • Multi-Source Network Pulse Analyzer and Correlator provides course of action planning by enhancing the understanding of the complex dynamics
Streamlining the Process of Acquiring Secure Open Architecture Software Systems
2013-10-08
Microsoft.NET, Enterprise Java Beans, GNU Lesser General Public License (LGPL) libraries, and data communication protocols like the Hypertext Transfer...NetBeans development environments), customer relationship management (SugarCRM), database management systems (PostgreSQL, MySQL ), operating
Neurotensin inversely modulates maternal aggression
Gammie, Stephen C.; D’Anna, Kimberly L.; Gerstein, Hilary; Stevenson, Sharon A.
2008-01-01
Neurotensin (NT) is a versatile neuropeptide involved in analgesia, hypothermia, and schizophrenia. Although NT is released from and acts upon brain regions involved in social behaviors, it has not been linked to a social behavior. We previously selected mice for high maternal aggression (maternal defense), an important social behavior that protects offspring, and found significantly lower NT expression in the CNS of highly protective females. Our current study directly tested NT’s role in maternal defense. Intracerebroventricular (icv) injections of NT significantly impaired defense in terms of time aggressive and number of attacks at all doses tested (0.05, 0.1, 1.0, and 3.0 μg). Other maternal behaviors, including pup retrieval, were unaltered following NT injections (0.05 μg) relative to vehicle, suggesting specificity of NT action on defense. Further, icv injections of the NT receptor 1 (NT1) antagonist, SR 48692 (30 μg), significantly elevated maternal aggression in terms of time aggressive and attack number. To understand where NT may regulate aggression, we examined Fos following injection of either 0.1 μg NT or vehicle. 13 of 26 brain regions examined exhibited significant Fos increases with NT, including regions expressing NT1 and previously implicated in maternal aggression, such as lateral septum, bed nucleus of stria terminalis, paraventricular nucleus, and central amygdala. Together, our results indicate that NT inversely regulates maternal aggression and provide the first direct evidence that lowering of NT signaling can be a mechanism for maternal aggression. To our knowledge, this is the first study to directly link NT to a social behavior. PMID:19118604
Towards a Cyber Defense Framework for SCADA Systems Based on Power Consumption Monitoring
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hernandez Jimenez, Jarilyn M; Chen, Qian; Nichols, Jeff A.
Supervisory control and data acquisition (SCADA) is an industrial automation system that remotely monitor, and control critical infrastructures. SCADA systems are major targets for espionage and sabotage attackers. According to the 2015 Dell security annual threat report, the number of cyber-attacks against SCADA systems has doubled in the past year. Cyber-attacks (i.e., buffer overflow, rootkits and code injection) could cause serious financial losses and physical infrastructure damages. Moreover, some specific cyber-attacks against SCADA systems could become a threat to human life. Current commercial off-the-shelf security solutions are insufficient in protecting SCADA systems against sophisticated cyber-attacks. In 2014 a report bymore » Mandiant stated that only 69% of organizations learned about their breaches from third entities, meaning that these companies lack of their own detection system. Furthermore, these breaches are not detected in real-time or fast enough to prevent further damages. The average time between compromise and detection (for those intrusions that were detected) was 205 days. To address this challenge, we propose an Intrusion Detection System (IDS) that detects SCADA-specific cyber-attacks by analyzing the power consumption of a SCADA device. Specifically, to validate the proposed approach, we chose to monitor in real-time the power usage of a a Programmable Logic Controller (PLC). To this end, we configured the hardware of the tetsbed by installing the required sensors to monitor and collect its power consumption. After that two SCADA-specific cyber-attacks were simulated and TracerDAQ Pro was used to collect the power consumption of the PLC under normal and anomalous scenarios. Results showed that is possible to distinguish between the regular power usage of the PLC and when the PLC was under specific cyber-attacks.« less
Trends and New Directions in Software Architecture
2014-10-10
frameworks Open source Cloud strategies NoSQL Machine Learning MDD Incremental approaches Dashboards Distributed development...complexity grows NoSQL Models are not created equal 2014 Our Current Research Lightweight Evaluation and Architecture Prototyping for Big Data
Benchmarking database performance for genomic data.
Khushi, Matloob
2015-06-01
Genomic regions represent features such as gene annotations, transcription factor binding sites and epigenetic modifications. Performing various genomic operations such as identifying overlapping/non-overlapping regions or nearest gene annotations are common research needs. The data can be saved in a database system for easy management, however, there is no comprehensive database built-in algorithm at present to identify overlapping regions. Therefore I have developed a novel region-mapping (RegMap) SQL-based algorithm to perform genomic operations and have benchmarked the performance of different databases. Benchmarking identified that PostgreSQL extracts overlapping regions much faster than MySQL. Insertion and data uploads in PostgreSQL were also better, although general searching capability of both databases was almost equivalent. In addition, using the algorithm pair-wise, overlaps of >1000 datasets of transcription factor binding sites and histone marks, collected from previous publications, were reported and it was found that HNF4G significantly co-locates with cohesin subunit STAG1 (SA1).Inc. © 2015 Wiley Periodicals, Inc.
NASA Astrophysics Data System (ADS)
Vatansever, Fatma; Kawakubo, Masayoshi; Chung, Hoon; Hamblin, Michael R.
2013-02-01
We have previously shown that photodynamic therapy mediated by a vascular regimen of benzoporphyrin derivative and 690nm light is capable of inducing a robust immune response in the mouse CT26.CL25 tumor model that contains a tumor-rejection antigen, beta-galactosidase (β-gal). For the first time we show that PDT can stimulate the production of serum IgG antibodies against the β-gal antigen. It is known that a common cause of death from cancer, particularly lung cancer, is brain metastases; especially the inoperable ones that do not respond to traditional cytotoxic therapies either. We asked whether PDT of a primary tumor could stimulate immune response that could attack the distant brain metastases. We have developed a mouse model of generating brain metastases by injecting CT26.CL25 tumor cells into the brain as well as injecting the same cancer cells under the skin at the same time. When the subcutaneous tumor was treated with PDT, we observed a survival advantage compared to mice that had untreated brain metastases alone.
NASA Astrophysics Data System (ADS)
Krishna, B.; Gustafson, W. I., Jr.; Vogelmann, A. M.; Toto, T.; Devarakonda, R.; Palanisamy, G.
2016-12-01
This paper presents a new way of providing ARM data discovery through data analysis and visualization services. ARM stands for Atmospheric Radiation Measurement. This Program was created to study cloud formation processes and their influence on radiative transfer and also include additional measurements of aerosol and precipitation at various highly instrumented ground and mobile stations. The total volume of ARM data is roughly 900TB. The current search for ARM data is performed by using its metadata, such as the site name, instrument name, date, etc. NoSQL technologies were explored to improve the capabilities of data searching, not only by their metadata, but also by using the measurement values. Two technologies that are currently being implemented for testing are Apache Cassandra (noSQL database) and Apache Spark (noSQL based analytics framework). Both of these technologies were developed to work in a distributed environment and hence can handle large data for storing and analytics. D3.js is a JavaScript library that can generate interactive data visualizations in web browsers by making use of commonly used SVG, HTML5, and CSS standards. To test the performance of NoSQL for ARM data, we will be using ARM's popular measurements to locate the data based on its value. Recently noSQL technology has been applied to a pilot project called LASSO, which stands for LES ARM Symbiotic Simulation and Observation Workflow. LASSO will be packaging LES output and observations in "data bundles" and analyses will require the ability for users to analyze both observations and LES model output either individually or together across multiple time periods. The LASSO implementation strategy suggests that enormous data storage is required to store the above mentioned quantities. Thus noSQL was used to provide a powerful means to store portions of the data that provided users with search capabilities on each simulation's traits through a web application. Based on the user selection, plots are created dynamically along with ancillary information that enables the user to locate and download data that fulfilled their required traits.
Liu, Bo; Leng, Yangming; Zhou, Renhong; Liu, Jingjing; Liu, Dongdong; Zhang, Su-Lin; Kong, Wei-Jia
2016-01-01
Abstract Drop attack (DA) associated with Ménière's disease (MD) and delayed endolymphatic hydrops (DEH) is not common and may cause life-threatening clinical problems. The intratympanic dexamethasone (ITD) is one of primary treatments for MD or DEH. Our study investigated the effect of ITD on the DA associated with endolymphatic hydrops (EH). We retrospectively reviewed 10 patients with MD- and DEH-associated DA between January 2009 and December 2013 in Outpatient Department of Otolaryngology, Union Hospital, Wuhan, China. Among them, 7 patients (5 cases with MD, 2 cases of DEH) received ITD (4 times, on weekly basis). Further repeated ITD courses or intratympanic gentamicin (ITG) were given if the vertigo was not satisfactorily controlled. The number of DA and status of vertigo control after intratympanic injection were evaluated. After a follow-up study lasting from 19 to 35 months, DA in 5 cases (71.4%) disappeared after initial ITD course. In 2 cases, DA was altogether controlled after an additional intratympanic injection (repeated ITD or/and ITG). This study showed that ITD promises to be a first-line conservative treatment for MD- or DEH-related DA since the steroid possesses no inner-ear toxicity. Furthermore, for MD- or DEH-related DA refractory to ITD, ITG can be an effective alternative. PMID:28033296
Hewitt, Robin; Gobbi, Alberto; Lee, Man-Ling
2005-01-01
Relational databases are the current standard for storing and retrieving data in the pharmaceutical and biotech industries. However, retrieving data from a relational database requires specialized knowledge of the database schema and of the SQL query language. At Anadys, we have developed an easy-to-use system for searching and reporting data in a relational database to support our drug discovery project teams. This system is fast and flexible and allows users to access all data without having to write SQL queries. This paper presents the hierarchical, graph-based metadata representation and SQL-construction methods that, together, are the basis of this system's capabilities.
A Web-based Examination System Based on PHP+MySQL.
Wen, Ji; Zhang, Yang; Yan, Yong; Xia, Shunren
2005-01-01
The design and implementation of web-based examination system constructed by PHP and MySQL is presented in this paper. Three primary parts, including students',teachers' and administrators', are introduced and analyzed in detail. Initial application has demonstrated the system's feasibility and reasonability.*
An effective model for store and retrieve big health data in cloud computing.
Goli-Malekabadi, Zohreh; Sargolzaei-Javan, Morteza; Akbari, Mohammad Kazem
2016-08-01
The volume of healthcare data including different and variable text types, sounds, and images is increasing day to day. Therefore, the storage and processing of these data is a necessary and challenging issue. Generally, relational databases are used for storing health data which are not able to handle the massive and diverse nature of them. This study aimed at presenting the model based on NoSQL databases for the storage of healthcare data. Despite different types of NoSQL databases, document-based DBs were selected by a survey on the nature of health data. The presented model was implemented in the Cloud environment for accessing to the distribution properties. Then, the data were distributed on the database by applying the Shard property. The efficiency of the model was evaluated in comparison with the previous data model, Relational Database, considering query time, data preparation, flexibility, and extensibility parameters. The results showed that the presented model approximately performed the same as SQL Server for "read" query while it acted more efficiently than SQL Server for "write" query. Also, the performance of the presented model was better than SQL Server in the case of flexibility, data preparation and extensibility. Based on these observations, the proposed model was more effective than Relational Databases for handling health data. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.
Evaluation of NoSQL databases for DIRAC monitoring and beyond
NASA Astrophysics Data System (ADS)
Mathe, Z.; Casajus Ramo, A.; Stagni, F.; Tomassetti, L.
2015-12-01
Nowadays, many database systems are available but they may not be optimized for storing time series data. Monitoring DIRAC jobs would be better done using a database optimised for storing time series data. So far it was done using a MySQL database, which is not well suited for such an application. Therefore alternatives have been investigated. Choosing an appropriate database for storing huge amounts of time series data is not trivial as one must take into account different aspects such as manageability, scalability and extensibility. We compared the performance of Elasticsearch, OpenTSDB (based on HBase) and InfluxDB NoSQL databases, using the same set of machines and the same data. We also evaluated the effort required for maintaining them. Using the LHCb Workload Management System (WMS), based on DIRAC as a use case we set up a new monitoring system, in parallel with the current MySQL system, and we stored the same data into the databases under test. We evaluated Grafana (for OpenTSDB) and Kibana (for ElasticSearch) metrics and graph editors for creating dashboards, in order to have a clear picture on the usability of each candidate. In this paper we present the results of this study and the performance of the selected technology. We also give an outlook of other potential applications of NoSQL databases within the DIRAC project.
DOE Office of Scientific and Technical Information (OSTI.GOV)
David Nix, Lisa Simirenko
2006-10-25
The Biolmaging Database (BID) is a relational database developed to store the data and meta-data for the 3D gene expression in early Drosophila embryo development on a cellular level. The schema was written to be used with the MySQL DBMS but with minor modifications can be used on any SQL compliant relational DBMS.
The SQL Server Database for Non Computer Professional Teaching Reform
ERIC Educational Resources Information Center
Liu, Xiangwei
2012-01-01
A summary of the teaching methods of the non-computer professional SQL Server database, analyzes the current situation of the teaching course. According to non computer professional curriculum teaching characteristic, put forward some teaching reform methods, and put it into practice, improve the students' analysis ability, practice ability and…
Implementing CBM: SQL-Tutor after Fifteen Years
ERIC Educational Resources Information Center
Mitrovic, Antonija; Ohlsson, Stellan
2016-01-01
SQL-Tutor is the first constraint-based tutor. The initial conference papers about the system were published in 1998 (Mitrovic 1998a, 1998b, 1998c), with an "IJAIED" paper published in 1999 (Mitrovic and Ohlsson, "International Journal Artificial Intelligence in Education," 10(3-4), 238-256, 1999). We published another…
CheD: chemical database compilation tool, Internet server, and client for SQL servers.
Trepalin, S V; Yarkov, A V
2001-01-01
An efficient program, which runs on a personal computer, for the storage, retrieval, and processing of chemical information, is presented, The program can work both as a stand-alone application or in conjunction with a specifically written Web server application or with some standard SQL servers, e.g., Oracle, Interbase, and MS SQL. New types of data fields are introduced, e.g., arrays for spectral information storage, HTML and database links, and user-defined functions. CheD has an open architecture; thus, custom data types, controls, and services may be added. A WWW server application for chemical data retrieval features an easy and user-friendly installation on Windows NT or 95 platforms.
Agentless Cloud-Wide Monitoring of Virtual Disk State
2015-10-01
packages include Apache, MySQL , PHP, Ruby on Rails, Java Application Servers, and many others. Figure 2.12 shows the results of a run of the Software...Linux, Apache, MySQL , PHP (LAMP) set of applications. Thus, many file-level update logs will contain the same versions of files repeated across many
Comparing IndexedHBase and Riak for Serving Truthy: Performance of Data Loading and Query Evaluation
2013-08-01
Research Triangle Park, NC 27709-2211 15. SUBJECT TERMS performance evaluation, distributed database, noSQL , HBase, indexing Xiaoming Gao, Judy Qiu...common hashtags created during a given time window. With the purpose of finding a solution for these challenges, we evaluate NoSQL databases such as
2012-11-27
with powerful analysis tools and an informatics approach leveraging best-of-breed NoSQL databases, in order to store, search and retrieve relevant...dictionaries, and JavaScript also has good support. The MongoDB project[15] was chosen as a scalable NoSQL data store for the cheminfor- matics components
An Experimental Investigation of Complexity in Database Query Formulation Tasks
ERIC Educational Resources Information Center
Casterella, Gretchen Irwin; Vijayasarathy, Leo
2013-01-01
Information Technology professionals and other knowledge workers rely on their ability to extract data from organizational databases to respond to business questions and support decision making. Structured query language (SQL) is the standard programming language for querying data in relational databases, and SQL skills are in high demand and are…
Knowledge Query Language (KQL)
2016-02-12
Lexington Massachusetts This page intentionally left blank. iii EXECUTIVE SUMMARY Currently, queries for data ...retrieval from non-Structured Query Language (NoSQL) data stores are tightly coupled to the specific implementation of the data store implementation...independent of the storage content and format for querying NoSQL or relational data stores. This approach uses address expressions (or A-Expressions
Research of GIS-services applicability for solution of spatial analysis tasks.
NASA Astrophysics Data System (ADS)
Terekhin, D. A.; Botygin, I. A.; Sherstneva, A. I.; Sherstnev, V. S.
2017-01-01
Experiments for working out the areas of applying various gis-services in the tasks of spatial analysis are discussed in this paper. Google Maps, Yandex Maps, Microsoft SQL Server are used as services of spatial analysis. All services have shown a comparable speed of analyzing the spatial data when carrying out elemental spatial requests (building up the buffer zone of a point object) as well as the preferences of Microsoft SQL Server in operating with more complicated spatial requests. When building up elemental spatial requests, internet-services show higher efficiency due to cliental data handling with JavaScript-subprograms. A weak point of public internet-services is an impossibility to handle data on a server side and a barren variety of spatial analysis functions. Microsoft SQL Server offers a large variety of functions needed for spatial analysis on the server side. The authors conclude that when solving practical problems, the capabilities of internet-services used in building up routes and completing other functions with spatial analysis with Microsoft SQL Server should be involved.
2MASS Catalog Server Kit Version 2.1
NASA Astrophysics Data System (ADS)
Yamauchi, C.
2013-10-01
The 2MASS Catalog Server Kit is open source software for use in easily constructing a high performance search server for important astronomical catalogs. This software utilizes the open source RDBMS PostgreSQL, therefore, any users can setup the database on their local computers by following step-by-step installation guide. The kit provides highly optimized stored functions for positional searchs similar to SDSS SkyServer. Together with these, the powerful SQL environment of PostgreSQL will meet various user's demands. We released 2MASS Catalog Server Kit version 2.1 in 2012 May, which supports the latest WISE All-Sky catalog (563,921,584 rows) and 9 major all-sky catalogs. Local databases are often indispensable for observatories with unstable or narrow-band networks or severe use, such as retrieving large numbers of records within a small period of time. This software is the best for such purposes, and increasing supported catalogs and improvements of version 2.1 can cover a wider range of applications including advanced calibration system, scientific studies using complicated SQL queries, etc. Official page: http://www.ir.isas.jaxa.jp/~cyamauch/2masskit/
Use of Graph Database for the Integration of Heterogeneous Biological Data.
Yoon, Byoung-Ha; Kim, Seon-Kyu; Kim, Seon-Young
2017-03-01
Understanding complex relationships among heterogeneous biological data is one of the fundamental goals in biology. In most cases, diverse biological data are stored in relational databases, such as MySQL and Oracle, which store data in multiple tables and then infer relationships by multiple-join statements. Recently, a new type of database, called the graph-based database, was developed to natively represent various kinds of complex relationships, and it is widely used among computer science communities and IT industries. Here, we demonstrate the feasibility of using a graph-based database for complex biological relationships by comparing the performance between MySQL and Neo4j, one of the most widely used graph databases. We collected various biological data (protein-protein interaction, drug-target, gene-disease, etc.) from several existing sources, removed duplicate and redundant data, and finally constructed a graph database containing 114,550 nodes and 82,674,321 relationships. When we tested the query execution performance of MySQL versus Neo4j, we found that Neo4j outperformed MySQL in all cases. While Neo4j exhibited a very fast response for various queries, MySQL exhibited latent or unfinished responses for complex queries with multiple-join statements. These results show that using graph-based databases, such as Neo4j, is an efficient way to store complex biological relationships. Moreover, querying a graph database in diverse ways has the potential to reveal novel relationships among heterogeneous biological data.
Use of Graph Database for the Integration of Heterogeneous Biological Data
Yoon, Byoung-Ha; Kim, Seon-Kyu
2017-01-01
Understanding complex relationships among heterogeneous biological data is one of the fundamental goals in biology. In most cases, diverse biological data are stored in relational databases, such as MySQL and Oracle, which store data in multiple tables and then infer relationships by multiple-join statements. Recently, a new type of database, called the graph-based database, was developed to natively represent various kinds of complex relationships, and it is widely used among computer science communities and IT industries. Here, we demonstrate the feasibility of using a graph-based database for complex biological relationships by comparing the performance between MySQL and Neo4j, one of the most widely used graph databases. We collected various biological data (protein-protein interaction, drug-target, gene-disease, etc.) from several existing sources, removed duplicate and redundant data, and finally constructed a graph database containing 114,550 nodes and 82,674,321 relationships. When we tested the query execution performance of MySQL versus Neo4j, we found that Neo4j outperformed MySQL in all cases. While Neo4j exhibited a very fast response for various queries, MySQL exhibited latent or unfinished responses for complex queries with multiple-join statements. These results show that using graph-based databases, such as Neo4j, is an efficient way to store complex biological relationships. Moreover, querying a graph database in diverse ways has the potential to reveal novel relationships among heterogeneous biological data. PMID:28416946
Focal hyperemia followed by spreading oligemia and impaired activation of rCBF in classic migraine
DOE Office of Scientific and Technical Information (OSTI.GOV)
Olesen, J.; Larsen, B.; Lauritzen, M.
1981-04-01
Regional cerebral blood flow (rCBF) was measured in 254 areas of a hemisphere with the xenon 133 intraarterial injection method. Six cases of classic migraine were followed from the normal state into the prodromal phase, and in 3 cases further into the headache phase. One patient with common migraine was similarly followed during his only classic attack. The attacks were initiated by focal hyperemia in 3 patients. During prodromes all patients displayed occipitoparietal rCBF reduction (oligemia), but in only 1 case did the reduction approach critical values. Oligemia gradually spread anteriorly in the course of 15 to 45 minutes. Inmore » 4 patients a global oligemia was observed. In 4 patients severe headache was present concomitantly with oligemia and with no sign of hyperemia or nonhomogeneous brain perfusion. The normal rCBF increase during cortical activity (hand movement, speech, and similar activities) was impaired in 6 patients. The results indicate that the vasospastic model of the migraine attack is too simplistic.« less
Medical aspects of the Iraqi missile attacks on Israel.
Karsenty, E; Shemer, J; Alshech, I; Cojocaru, B; Moscovitz, M; Shapiro, Y; Danon, Y L
1991-01-01
During the period 18 January-28 February 1991, a total of 39 Iraqi modified Scud missiles landed in Israel, most of them in the densely populated Tel Aviv area. There were 23 missile attack alerts. These attacks caused 1,059 cases of injury; there were two deaths and 232 patients were admitted to emergency rooms for injuries directly related to the explosions, only one of which was severe. A survey among 91 of the injured showed that 46.6% of the wounds were caused by glass splinters, 31.1% were blunt contusions, and 22.2% were acute psychological reactions. No case of blast injury was reported. Inappropriate injection of atropine was reported in 230 cases. Acute anxiety was the reason for admission of 544 patients to emergency rooms. Another 40 patients sustained various traumas while rushing to the sealed room. The relatively low number of injured people is striking in view of the density of population in the areas hit. Various explanations are discussed.
Detecting Heap-Spraying Code Injection Attacks in Malicious Web Pages Using Runtime Execution
NASA Astrophysics Data System (ADS)
Choi, Younghan; Kim, Hyoungchun; Lee, Donghoon
The growing use of web services is increasing web browser attacks exponentially. Most attacks use a technique called heap spraying because of its high success rate. Heap spraying executes a malicious code without indicating the exact address of the code by copying it into many heap objects. For this reason, the attack has a high potential to succeed if only the vulnerability is exploited. Thus, attackers have recently begun using this technique because it is easy to use JavaScript to allocate the heap memory area. This paper proposes a novel technique that detects heap spraying attacks by executing a heap object in a real environment, irrespective of the version and patch status of the web browser. This runtime execution is used to detect various forms of heap spraying attacks, such as encoding and polymorphism. Heap objects are executed after being filtered on the basis of patterns of heap spraying attacks in order to reduce the overhead of the runtime execution. Patterns of heap spraying attacks are based on analysis of how an web browser accesses benign web sites. The heap objects are executed forcibly by changing the instruction register into the address of them after being loaded into memory. Thus, we can execute the malicious code without having to consider the version and patch status of the browser. An object is considered to contain a malicious code if the execution reaches a call instruction and then the instruction accesses the API of system libraries, such as kernel32.dll and ws_32.dll. To change registers and monitor execution flow, we used a debugger engine. A prototype, named HERAD(HEap spRAying Detector), is implemented and evaluated. In experiments, HERAD detects various forms of exploit code that an emulation cannot detect, and some heap spraying attacks that NOZZLE cannot detect. Although it has an execution overhead, HERAD produces a low number of false alarms. The processing time of several minutes is negligible because our research focuses on detecting heap spraying. This research can be applied to existing systems that collect malicious codes, such as Honeypot.
Model for Semantically Rich Point Cloud Data
NASA Astrophysics Data System (ADS)
Poux, F.; Neuville, R.; Hallot, P.; Billen, R.
2017-10-01
This paper proposes an interoperable model for managing high dimensional point clouds while integrating semantics. Point clouds from sensors are a direct source of information physically describing a 3D state of the recorded environment. As such, they are an exhaustive representation of the real world at every scale: 3D reality-based spatial data. Their generation is increasingly fast but processing routines and data models lack of knowledge to reason from information extraction rather than interpretation. The enhanced smart point cloud developed model allows to bring intelligence to point clouds via 3 connected meta-models while linking available knowledge and classification procedures that permits semantic injection. Interoperability drives the model adaptation to potentially many applications through specialized domain ontologies. A first prototype is implemented in Python and PostgreSQL database and allows to combine semantic and spatial concepts for basic hybrid queries on different point clouds.
Distributed Episodic Exploratory Planning (DEEP)
2008-12-01
API). For DEEP, Hibernate offered the following advantages: • Abstracts SQL by utilizing HQL so any database with a Java Database Connectivity... Hibernate SQL ICCRTS International Command and Control Research and Technology Symposium JDB Java Distributed Blackboard JDBC Java Database Connectivity...selected because of its opportunistic reasoning capabilities and implemented in Java for platform independence. Java was chosen for ease of
Investigating the Limitations of Advanced Design Methods through Real World Application
2016-03-31
36 War Room Laptop Display ( MySQL , JMP 9 Pro, 64-bit Windows) Georgia Tech Secure Collaborative Visualization Environment ( MySQL , JMP 9 Pro...investigate expanding the EA for VC3ATS • Would like to consider both an expansion of the use of current Java -based BPM approach and other potential EA
ERIC Educational Resources Information Center
Piyayodilokchai, Hongsiri; Panjaburee, Patcharin; Laosinchai, Parames; Ketpichainarong, Watcharee; Ruenwongsa, Pintip
2013-01-01
With the benefit of multimedia and the learning cycle approach in promoting effective active learning, this paper proposed a learning cycle approach-based, multimedia-supplemented instructional unit for Structured Query Language (SQL) for second-year undergraduate students with the aim of enhancing their basic knowledge of SQL and ability to apply…
Large Declarative Memories in ACT-R
2009-12-01
containing the persistent DM of interest PDM-user Username required by the PostgreSQL DBMS for DB access PDM- passwd Password required by the PostgreSQL...34model-v5-DM" :pdm-user "Scott" :pdm- passwd “Open_Seseme" :pdm-resets-clear-db T :pdm-add-dm-serializes T :pdm-active T ... Figure 1: Activating and
Software Application for Supporting the Education of Database Systems
ERIC Educational Resources Information Center
Vágner, Anikó
2015-01-01
The article introduces an application which supports the education of database systems, particularly the teaching of SQL and PL/SQL in Oracle Database Management System environment. The application has two parts, one is the database schema and its content, and the other is a C# application. The schema is to administrate and store the tasks and the…
2008-03-01
Fortunately, built into Excel is the capability to use ActiveX Data Objects (ADO), a software feature which uses VBA to interface with external...part of Excel’s ActiveX Direct Objects (ADO) functionality, Excel can execute SQL queries in Access with VBA. An SQL query statement can be written
ERIC Educational Resources Information Center
Mills, Robert J.; Dupin-Bryant, Pamela A.; Johnson, John D.; Beaulieu, Tanya Y.
2015-01-01
The demand for Information Systems (IS) graduates with expertise in Structured Query Language (SQL) and database management is vast and projected to increase as "big data" becomes ubiquitous. To prepare students to solve complex problems in a data-driven world, educators must explore instructional strategies to help link prior knowledge…
Knowledge Query Language (KQL)
2016-02-01
unlimited. This page intentionally left blank. iii EXECUTIVE SUMMARY Currently, queries for data ...retrieval from non-Structured Query Language (NoSQL) data stores are tightly coupled to the specific implementation of the data store implementation, making...of the storage content and format for querying NoSQL or relational data stores. This approach uses address expressions (or A-Expressions) embedded in
Evolution of the LBT Telemetry System
NASA Astrophysics Data System (ADS)
Summers, K.; Biddick, C.; De La Peña, M. D.; Summers, D.
2014-05-01
The Large Binocular Telescope (LBT) Telescope Control System (TCS) records about 10GB of telemetry data per night. Additionally, the vibration monitoring system records about 9GB of telemetry data per night. Through 2013, we have amassed over 6TB of Hierarchical Data Format (HDF5) files and almost 9TB in a MySQL database of TCS and vibration data. The LBT telemetry system, in its third major revision since 2004, provides the mechanism to capture and store this data. The telemetry system has evolved from a simple HDF file system with MySQL stream definitions within the TCS, to a separate system using a MySQL database system for the definitions and data, and finally to no database use at all, using HDF5 files.
Antonaci, Fabio; Fredriksen, Torbjørn; Pareja, Juan A.; Sjaastad, Ottar
2018-01-01
A solitary patient with symptoms similar to those of shortlasting unilateral neuralgiform conjunctival injection and tearing (SUNCT) was first mentioned in 1978. The term SUNCT was first used in 1991. SUNCT is an acronym; the “S” signifies “Shortlasting”; the “U” symbolizes “Unilateral”; “N” stands for “Neuralgiform”; the “C” for “Conjunctival injection”; and “T” for “Tearing.” The term short-lasting unilateral neuralgiform headache attacks with cranial autonomic symptoms were marketed in 2004. The terminology and new view points are discussed and nosography proposal for SUNCT is presented. PMID:29740387
Sevim, Serhan; Kaleağası, Hakan; Fidancı, Halit
2015-09-01
Sleep bruxism refers to a nocturnal parafunctional activity including the clenching, grinding or gnashing of teeth. While most of the nocturnal bruxism cases seen in the general population are apparently idiopathic, it has been reported to be associated with a range of neurological diseases such as Huntington's disease, cranio-cervical dystonia and post-anoxic brain damage, but not multiple sclerosis (MS). We describe three cases of MS patients who have had moderate to severe complaints of bruxism in the two weeks following their relevant MS attacks. None of the three patients had a diagnosis of bruxism prior to her attack. The diagnosis was confirmed in one out of three by a polysomnography. One patient did not have any complaints related to bruxism previous to her attack, whereas two had mild and infrequent complaints. The symptoms of the relevant attacks were left hemihypesthesia in all and hemiparesis in two. None of the patients had spasticity that could result in severe teeth clenching. All three patients presented with morning headaches and jaw pain or tightness and were treated successfully with botulinum toxin (Btx) injections applied to their masseter and temporalis muscles. The cause of bruxism is controversial but lesions of the cortico-basalganglia-thalamo-cotrical loops are thought to be most likely. However, acute or chronic lesions in those pathways were not demonstrated in the 3 patients. It is feasible that they had normal appearing white matter interruptions in their cortico-basalganglia-thalamocortical loops along with their relevant attack. Copyright © 2015 Elsevier B.V. All rights reserved.
Flow visualization study of close-coupled canard wing and strake wing configuration
NASA Technical Reports Server (NTRS)
Miner, D. D.; Gloss, B. B.
1975-01-01
The Langley 1/8-scale V/STOL model tunnel was used to qualitatively determine the flow fields associated with semi-span close coupled canard wing and strake wing models. Small helium filled bubbles were injected upstream of the models to make the flow visible. Photographs were taken over the angle-of-attack ranges of -10 deg to 40 deg.
Anticonvulsant and neuroprotective effects of Pimpinella anisum in rat brain
2012-01-01
Background Essential oil of Pimpinella anisum L. Apiaceae (anise oil) has been widely used in traditional Persian medicine to treat a variety of diseases, including some neurological disorders. This study was aimed to test the possible anti-seizure and anti-hypoxia effects of anise oil. Methods The effects of different concentrations of anise oil were tested on seizure attacks induced by pentylenetetrazol (PTZ) injection and neuronal hypoxia induced by oxygen withdrawal as well as on production of dark neurons and induction of long-term potentiation (LTP) in in vivo and in vitro experimental models of rat brain. Results Anise oil significantly prolonged the latency of seizure attacks and reduced the amplitude and duration of epileptiform burst discharges induced by injection of intraperitoneal PTZ. In addition, anise oil significantly inhibited production of dark neurons in different regions of the brain in epileptic rats. Anise oil also significantly enhanced the duration of the appearance of anoxic terminal negativity induced by oxygen withdrawal and inhibited induction of LTP in hippocampal slices. Conclusions Our data indicate the anticonvulsant and neuroprotective effects of anise oil, likely via inhibition of synaptic plasticity. Further evaluation of anise oil to use in the treatment of neurological disorders is suggested. PMID:22709243
A Case of Occupational Asthma in a Plastic Injection Process Worker
2013-01-01
Objectives We report a case of death due to asthma attack in a plastic injection process worker with a history of asthma. Methods To assess task relevance, personal history including occupational history and medical records were reviewed. Samples of the substances utilized in the injection process were collected by visiting the patient’s workplace. The work environment with the actual process was reproduced in the laboratory, and the released substances were evaluated. Results The medical records confirmed that the patient’s conventional asthma was in remission. The analysis of the resins discharged from the injection process simulation revealed styrene, which causes occupational asthma, and benzenepropanoic acid, 3,5-bis(1,1-dimethylethyl)-4-hydroxy-, and octadecyl ester. Even though it was not the case in the present study, various harmful substances capable of inducing asthma such as formaldehyde, acrolein, and acetic acid are released during resin processing. Conclusion A worker was likely to occur occupational asthma as a result of the exposure to the harmful substances generated during the plastic injection process. PMID:24472161
Quantum displacement receiver for M-ary phase-shift-keyed coherent states
DOE Office of Scientific and Technical Information (OSTI.GOV)
Izumi, Shuro; Takeoka, Masahiro; Fujiwara, Mikio
2014-12-04
We propose quantum receivers for 3- and 4-ary phase-shift-keyed (PSK) coherent state signals to overcome the standard quantum limit (SQL). Our receiver, consisting of a displacement operation and on-off detectors with or without feedforward, provides an error probability performance beyond the SQL. We show feedforward operations can tolerate the requirement for the detector specifications.
Tomcat, Oracle & XML Web Archive
DOE Office of Scientific and Technical Information (OSTI.GOV)
Cothren, D. C.
2008-01-01
The TOX (Tomcat Oracle & XML) web archive is a foundation for development of HTTP-based applications using Tomcat (or some other servlet container) and an Oracle RDBMS. Use of TOX requires coding primarily in PL/SQL, JavaScript, and XSLT, but also in HTML, CSS and potentially Java. Coded in Java and PL/SQL itself, TOX provides the foundation for more complex applications to be built.
Architecture Knowledge for Evaluating Scalable Databases
2015-01-16
problems, arising from the proliferation of new data models and distributed technologies for building scalable, available data stores . Architects must...longer are relational databases the de facto standard for building data repositories. Highly distributed, scalable “ NoSQL ” databases [11] have emerged...This is especially challenging at the data storage layer. The multitude of competing NoSQL database technologies creates a complex and rapidly
DOE Office of Scientific and Technical Information (OSTI.GOV)
This software is a plug-in that interfaces between the Phoenix Integration's Model Center and the Base SAS 9.2 applications. The end use of the plug-in is to link input and output data that resides in SAS tables or MS SQL to and from "legacy" software programs without recoding. The potential end users are users who need to run legacy code and want data stored in a SQL database.
NASA Astrophysics Data System (ADS)
Ivankovic, D.; Dadic, V.
2009-04-01
Some of oceanographic parameters have to be manually inserted into database; some (for example data from CTD probe) are inserted from various files. All this parameters requires visualization, validation and manipulation from research vessel or scientific institution, and also public presentation. For these purposes is developed web based system, containing dynamic sql procedures and java applets. Technology background is Oracle 10g relational database, and Oracle application server. Web interfaces are developed using PL/SQL stored database procedures (mod PL/SQL). Additional parts for data visualization include use of Java applets and JavaScript. Mapping tool is Google maps API (javascript) and as alternative java applet. Graph is realized as dynamically generated web page containing java applet. Mapping tool and graph are georeferenced. That means that click on some part of graph, automatically initiate zoom or marker onto location where parameter was measured. This feature is very useful for data validation. Code for data manipulation and visualization are partially realized with dynamic SQL and that allow as to separate data definition and code for data manipulation. Adding new parameter in system requires only data definition and description without programming interface for this kind of data.
Comparison of the Frontier Distributed Database Caching System to NoSQL Databases
NASA Astrophysics Data System (ADS)
Dykstra, Dave
2012-12-01
One of the main attractions of non-relational “NoSQL” databases is their ability to scale to large numbers of readers, including readers spread over a wide area. The Frontier distributed database caching system, used in production by the Large Hadron Collider CMS and ATLAS detector projects for Conditions data, is based on traditional SQL databases but also adds high scalability and the ability to be distributed over a wide-area for an important subset of applications. This paper compares the major characteristics of the two different approaches and identifies the criteria for choosing which approach to prefer over the other. It also compares in some detail the NoSQL databases used by CMS and ATLAS: MongoDB, CouchDB, HBase, and Cassandra.
A database for coconut crop improvement.
Rajagopal, Velamoor; Manimekalai, Ramaswamy; Devakumar, Krishnamurthy; Rajesh; Karun, Anitha; Niral, Vittal; Gopal, Murali; Aziz, Shamina; Gunasekaran, Marimuthu; Kumar, Mundappurathe Ramesh; Chandrasekar, Arumugam
2005-12-08
Coconut crop improvement requires a number of biotechnology and bioinformatics tools. A database containing information on CG (coconut germplasm), CCI (coconut cultivar identification), CD (coconut disease), MIFSPC (microbial information systems in plantation crops) and VO (vegetable oils) is described. The database was developed using MySQL and PostgreSQL running in Linux operating system. The database interface is developed in PHP, HTML and JAVA. http://www.bioinfcpcri.org.
Kortüm, Karsten U; Müller, Michael; Kern, Christoph; Babenko, Alexander; Mayer, Wolfgang J; Kampik, Anselm; Kreutzer, Thomas C; Priglinger, Siegfried; Hirneiss, Christoph
2017-06-01
To develop a near-real-time data warehouse (DW) in an academic ophthalmologic center to gain scientific use of increasing digital data from electronic medical records (EMR) and diagnostic devices. Database development. Specific macular clinic user interfaces within the institutional hospital information system were created. Orders for imaging modalities were sent by an EMR-linked picture-archiving and communications system to the respective devices. All data of 325 767 patients since 2002 were gathered in a DW running on an SQL database. A data discovery tool was developed. An exemplary search for patients with age-related macular degeneration, performed cataract surgery, and at least 10 intravitreal (excluding bevacizumab) injections was conducted. Data related to those patients (3 142 204 diagnoses [including diagnoses from other fields of medicine], 720 721 procedures [eg, surgery], and 45 416 intravitreal injections) were stored, including 81 274 optical coherence tomography measurements. A web-based browsing tool was successfully developed for data visualization and filtering data by several linked criteria, for example, minimum number of intravitreal injections of a specific drug and visual acuity interval. The exemplary search identified 450 patients with 516 eyes meeting all criteria. A DW was successfully implemented in an ophthalmologic academic environment to support and facilitate research by using increasing EMR and measurement data. The identification of eligible patients for studies was simplified. In future, software for decision support can be developed based on the DW and its structured data. The improved classification of diseases and semiautomatic validation of data via machine learning are warranted. Copyright © 2017 Elsevier Inc. All rights reserved.
A Scalable Data Integration and Analysis Architecture for Sensor Data of Pediatric Asthma.
Stripelis, Dimitris; Ambite, José Luis; Chiang, Yao-Yi; Eckel, Sandrah P; Habre, Rima
2017-04-01
According to the Centers for Disease Control, in the United States there are 6.8 million children living with asthma. Despite the importance of the disease, the available prognostic tools are not sufficient for biomedical researchers to thoroughly investigate the potential risks of the disease at scale. To overcome these challenges we present a big data integration and analysis infrastructure developed by our Data and Software Coordination and Integration Center (DSCIC) of the NIBIB-funded Pediatric Research using Integrated Sensor Monitoring Systems (PRISMS) program. Our goal is to help biomedical researchers to efficiently predict and prevent asthma attacks. The PRISMS-DSCIC is responsible for collecting, integrating, storing, and analyzing real-time environmental, physiological and behavioral data obtained from heterogeneous sensor and traditional data sources. Our architecture is based on the Apache Kafka, Spark and Hadoop frameworks and PostgreSQL DBMS. A main contribution of this work is extending the Spark framework with a mediation layer, based on logical schema mappings and query rewriting, to facilitate data analysis over a consistent harmonized schema. The system provides both batch and stream analytic capabilities over the massive data generated by wearable and fixed sensors.
Casani, Augusto Pietro; Piaggi, Paolo; Cerchiai, Niccolò; Seccia, Veronica; Franceschini, Stefano Sellari; Dallan, Iacopo
2012-03-01
To determine the efficacy and safety of low-dose intratympanic gentamicin (ITG) compared with intratympanic dexamethasone (ITD) in patients with intractable unilateral Ménière disease (MD). Open prospective randomized controlled study. Tertiary referral center. Sixty patients affected by definite unilateral MD were enrolled between January 1, 2007, and June 30, 2008. Thirty-two patients were treated with a buffered gentamicin solution injected in the middle ear (maximum of 2 injections); 28 patients were treated with ITD (4 mg/mL, 3 injections at intervals of 1 every 3 days). Mean outcome measurements consisted of control of vertigo attacks, pure tone average (PTA), speech discrimination score, functional disability score, and statistical analysis using repeated measures analysis of variance. In the ITG group at 2-year follow-up, complete control of vertigo (class A) was achieved in 26 patients (81%) and substantial control of vertigo (class B) in 4 patients (12.5%). In the ITD group, class A was achieved in 12 (43%), and class B in 5 (18%) patients. In the gentamicin group, 4 patients showed a reduction in PTA of ≥10 dB. In the ITD group, PTA was unchanged or slightly improved in 16 patients (belonging to class A-B) and worse in 12. Low-dose ITG achieved better outcome than ITD in the control of vertigo attacks in patients suffering from unilateral MD, with a very low incidence of hearing deterioration. ITD offers poorer vertigo control rate, and hearing preservation is achieved only in cases with no vertigo recurrences.
ExplorEnz: a MySQL database of the IUBMB enzyme nomenclature
McDonald, Andrew G; Boyce, Sinéad; Moss, Gerard P; Dixon, Henry BF; Tipton, Keith F
2007-01-01
Background We describe the database ExplorEnz, which is the primary repository for EC numbers and enzyme data that are being curated on behalf of the IUBMB. The enzyme nomenclature is incorporated into many other resources, including the ExPASy-ENZYME, BRENDA and KEGG bioinformatics databases. Description The data, which are stored in a MySQL database, preserve the formatting of chemical and enzyme names. A simple, easy to use, web-based query interface is provided, along with an advanced search engine for more complex queries. The database is publicly available at . The data are available for download as SQL and XML files via FTP. Conclusion ExplorEnz has powerful and flexible search capabilities and provides the scientific community with the most up-to-date version of the IUBMB Enzyme List. PMID:17662133
ExplorEnz: a MySQL database of the IUBMB enzyme nomenclature.
McDonald, Andrew G; Boyce, Sinéad; Moss, Gerard P; Dixon, Henry B F; Tipton, Keith F
2007-07-27
We describe the database ExplorEnz, which is the primary repository for EC numbers and enzyme data that are being curated on behalf of the IUBMB. The enzyme nomenclature is incorporated into many other resources, including the ExPASy-ENZYME, BRENDA and KEGG bioinformatics databases. The data, which are stored in a MySQL database, preserve the formatting of chemical and enzyme names. A simple, easy to use, web-based query interface is provided, along with an advanced search engine for more complex queries. The database is publicly available at http://www.enzyme-database.org. The data are available for download as SQL and XML files via FTP. ExplorEnz has powerful and flexible search capabilities and provides the scientific community with the most up-to-date version of the IUBMB Enzyme List.
Evaluating the Cassandra NoSQL Database Approach for Genomic Data Persistency.
Aniceto, Rodrigo; Xavier, Rene; Guimarães, Valeria; Hondo, Fernanda; Holanda, Maristela; Walter, Maria Emilia; Lifschitz, Sérgio
2015-01-01
Rapid advances in high-throughput sequencing techniques have created interesting computational challenges in bioinformatics. One of them refers to management of massive amounts of data generated by automatic sequencers. We need to deal with the persistency of genomic data, particularly storing and analyzing these large-scale processed data. To find an alternative to the frequently considered relational database model becomes a compelling task. Other data models may be more effective when dealing with a very large amount of nonconventional data, especially for writing and retrieving operations. In this paper, we discuss the Cassandra NoSQL database approach for storing genomic data. We perform an analysis of persistency and I/O operations with real data, using the Cassandra database system. We also compare the results obtained with a classical relational database system and another NoSQL database approach, MongoDB.
Yuan, Jun; Liu, Yufei; Yang, Zhicong; Cai, Yanshan; Deng, Zhiai; Qin, Pengzhe; Li, Tiegang; Dong, Zhiqiang; Yan, Ziqiang; Zhou, Duanhua; Luo, Huiming; Ma, Huilai; Pang, Xinglin; Fontaine, Robert E
2009-09-01
We investigated an outbreak of gluteal abscesses following intramuscular (IM) injections given at a clinic in rural China to identify the causative agent, source, and method of exposure. We defined a case as an abscess that appeared at the site of an injection given since June 1, 2006. We compared case rates by injection route, medication, and diluents. We reviewed injection practices, and cultured abscesses and environmental sites for mycobacteria. From October through December 2006, 5.8% (n=35) of 604 persons who had received injections at the clinic developed a case. All 35 cases occurred in 184 patients (attack rate=19.0%) who had received IM injections with various drugs that had been mixed with normal saline (NS); risk ratio=infinity; p<0.0001. No cases occurred in the absence of NS exposure. We identified Mycobacterium abscessus from eight abscesses and from the clinic water supply, and observed the inappropriate reuse of a 16-gauge needle left in the rubber septum of 100 ml multiple-dose bottles of NS in the clinic. Fourteen percent (n=527) of the 3887 registered residents of this village had been treated with IM drugs over a three-month period, often for minor illnesses. This outbreak of M. abscessus occurred from exposure to extrinsically contaminated NS through improper injection practices. Frequent treatment of minor illnesses with IM injections of antibiotics was likely an important contributing factor to the size of this outbreak.
Oshima, S; Ogawa, H; Yasue, H; Okumura, K; Matsuyama, K; Miyagi, H
1989-07-01
Plasma fibrinopeptide A levels, beta-thromboglobulin levels and platelet factor 4 levels were estimated by enzyme-linked immunosorbent assay before and after hyperventilation in 12 patients with coronary vasospastic angina and in 12 control subjects matched for age and gender. In all 12 study patients, anginal attacks accompanied by electrocardiographic (ECG) changes (ST elevation in 11 patients and ST depression in 1 patient) were induced by hyperventilation. Coronary angiography was performed on 11 of the 12 patients, and coronary artery spasm with the same ECG changes was induced by intracoronary injection of acetylcholine in all 11. The plasma fibrinopeptide A levels increased significantly from 2.0 +/- 0.4 to 10.0 +/- 2.4 ng/ml during the attack (p less than 0.001) in the study patients, but remained unchanged before and after hyperventilation in the control subjects. The plasma levels of beta-thromboglobulin and platelet factor 4 remained unchanged after hyperventilation in both groups. Our data indicate that coronary artery spasm may induce thrombin generation and trigger thrombus formation in the coronary artery.
Network Security Visualization
1999-09-27
performing SQL generation and result-set binding, inserting acquired security events into the database and gathering the requested data for Console scene...objects is also auto-generated by a VBA script. Built into the auto-generated table access objects are the preferred join paths between tables. This...much of the Server itself) never have to deal with SQL directly. This is one aspect of laying the groundwork for supporting RDBMSs from multiple vendors
A Data Warehouse to Support Condition Based Maintenance (CBM)
2005-05-01
Application ( VBA ) code sequence to import the original MAST-generated CSV and then create a single output table in DBASE IV format. The DBASE IV format...database architecture (Oracle, Sybase, MS- SQL , etc). This design includes table definitions, comments, specification of table attributes, primary and foreign...built queries and applications. Needs the application developers to construct data views. No SQL programming experience. b. Power Database User - knows
2016-03-01
science IT information technology JBOD just a bunch of disks JDBC java database connectivity xviii JPME Joint Professional Military Education JSO...Joint Service Officer JVM java virtual machine MPP massively parallel processing MPTE Manpower, Personnel, Training, and Education NAVMAC Navy...27 external database, whether it is MySQL , Oracle, DB2, or SQL Server (Teller, 2015). Connectors optimize the data transfer by obtaining metadata
A database for coconut crop improvement
Rajagopal, Velamoor; Manimekalai, Ramaswamy; Devakumar, Krishnamurthy; Rajesh; Karun, Anitha; Niral, Vittal; Gopal, Murali; Aziz, Shamina; Gunasekaran, Marimuthu; Kumar, Mundappurathe Ramesh; Chandrasekar, Arumugam
2005-01-01
Coconut crop improvement requires a number of biotechnology and bioinformatics tools. A database containing information on CG (coconut germplasm), CCI (coconut cultivar identification), CD (coconut disease), MIFSPC (microbial information systems in plantation crops) and VO (vegetable oils) is described. The database was developed using MySQL and PostgreSQL running in Linux operating system. The database interface is developed in PHP, HTML and JAVA. Availability http://www.bioinfcpcri.org PMID:17597858
Quality Attribute-Guided Evaluation of NoSQL Databases: An Experience Report
2014-10-18
detailed technical evaluations of NoSQL databases specifically, and big data systems in general, that have become apparent during our study... big data , software systems [Agarwal 2011]. Internet-born organizations such as Google and Amazon are at the cutting edge of this revolution...Chang 2008], along with those of numerous other big data innovators, have made a variety of open source and commercial data management technologies
Alignment of high-throughput sequencing data inside in-memory databases.
Firnkorn, Daniel; Knaup-Gregori, Petra; Lorenzo Bermejo, Justo; Ganzinger, Matthias
2014-01-01
In times of high-throughput DNA sequencing techniques, performance-capable analysis of DNA sequences is of high importance. Computer supported DNA analysis is still an intensive time-consuming task. In this paper we explore the potential of a new In-Memory database technology by using SAP's High Performance Analytic Appliance (HANA). We focus on read alignment as one of the first steps in DNA sequence analysis. In particular, we examined the widely used Burrows-Wheeler Aligner (BWA) and implemented stored procedures in both, HANA and the free database system MySQL, to compare execution time and memory management. To ensure that the results are comparable, MySQL has been running in memory as well, utilizing its integrated memory engine for database table creation. We implemented stored procedures, containing exact and inexact searching of DNA reads within the reference genome GRCh37. Due to technical restrictions in SAP HANA concerning recursion, the inexact matching problem could not be implemented on this platform. Hence, performance analysis between HANA and MySQL was made by comparing the execution time of the exact search procedures. Here, HANA was approximately 27 times faster than MySQL which means, that there is a high potential within the new In-Memory concepts, leading to further developments of DNA analysis procedures in the future.
Charles E. Flower; Jennifer E. Dalton; Kathleen S. Knight; Marie Brikha; Miquel A. Gonzalez-Meler
2015-01-01
Emerald ash borer (EAB), a non-native invasive tree-boring beetle, is the primary agent behind thewidespread mortality of ash trees (Fraxinus spp.) in both natural forests and urban areas of North Amer-ica. While a variety of insecticide options have been adopted for protection against EAB attacks, little hasbeen reported on the success of...
LAVA: Large scale Automated Vulnerability Addition
2016-05-23
memory copy, e.g., are reasonable attack points. If the goal is to inject divide- by-zero, then arithmetic operations involving division will be...ways. First, it introduces deterministic record and replay , which can be used for iterated and expensive analyses that cannot be performed online... memory . Since our approach records the correspondence between source lines and program basic block execution, it would be just as easy to figure out
Factors Leading to Effectiveness and Satisfaction in Civil Engineer Information Systems
2008-03-01
recently acquired MySQL in 2008 shortly after Oracle failed to acquire MySQL in 2007. For more information on policy implications concerning the use...individual level serves as the pertinent outcome variable and is used to evaluate and compare information systems in this study. Researchers have found...interim work information management system used by the Civil Engineer Operations Flight. The functions served by this system date back to the late
2004-06-01
remote databases, has seen little vendor acceptance. Each database ( Oracle , DB2, MySQL , etc.) has its own client- server protocol. Therefore each...existing standards – SQL , X.500/LDAP, FTP, etc. • View information dissemination as selective replication – State-oriented vs . message-oriented...allowing the 8 application to start. The resource management system would serve as a broker to the resources, making sure that resources are not
Information Flow Integrity for Systems of Independently-Developed Components
2015-06-22
We also examined three programs (Apache, MySQL , and PHP) in detail to evaluate the efficacy of using the provided package test suites to generate...method are just as effective as hooks that were manually placed over the course of years while greatly reducing the burden on programmers. ”Leveraging...to validate optimizations of real-world, mature applications: the Apache software suite, the Mozilla Suite, and the MySQL database. ”Validating Library
2003-03-01
PXSLServlet Paul A. Open Source Relational x X 23 Tchistopolskii sql2dtd David Mertz Public domain Relational x -- sql2xml Scott Hathaway Public...March 2003. [Hunter 2001] Hunter, David ; Cagle, Kurt; Dix, Chris; Kovack, Roger; Pinnock, Jonathan, Rafter, Jeff; Beginning XML (2nd Edition...Postgraduate School Monterey, California 4. Curt Blais Naval Postgraduate School Monterey, California 5 Erik Chaum NAVSEA Undersea
Large-scale Graph Computation on Just a PC
2014-05-01
edges for several vertices simultaneously). We compared the performance of GraphChi-DB to Neo4j using their Java API (we discuss MySQL comparison in the...75 4.7.6 Comparison to RDBMS ( MySQL ) . . . . . . . . . . . . . . . . . . . . . 75 4.7.7 Summary of the...Windows method, GraphChi. The C++ implementation has circa 8,000 lines of code. We have also de- veloped a Java -version of GraphChi, but it does not
Delayed Instantiation Bulk Operations for Management of Distributed, Object-Based Storage Systems
2009-08-01
source and destination object sets, while they have attribute pages to indicate that history . Fourth, we allow for operations to occur on any objects...client dialogue to the PostgreSQL database where server-side functions implement the service logic for the requests. The translation is done...to satisfy client requests, and performs delayed instantiation bulk operations. It is built around a PostgreSQL database with tables for storing
Wong, Wing Chung; Kim, Dewey; Carter, Hannah; Diekhans, Mark; Ryan, Michael C; Karchin, Rachel
2011-08-01
Thousands of cancer exomes are currently being sequenced, yielding millions of non-synonymous single nucleotide variants (SNVs) of possible relevance to disease etiology. Here, we provide a software toolkit to prioritize SNVs based on their predicted contribution to tumorigenesis. It includes a database of precomputed, predictive features covering all positions in the annotated human exome and can be used either stand-alone or as part of a larger variant discovery pipeline. MySQL database, source code and binaries freely available for academic/government use at http://wiki.chasmsoftware.org, Source in Python and C++. Requires 32 or 64-bit Linux system (tested on Fedora Core 8,10,11 and Ubuntu 10), 2.5*≤ Python <3.0*, MySQL server >5.0, 60 GB available hard disk space (50 MB for software and data files, 40 GB for MySQL database dump when uncompressed), 2 GB of RAM.
Motivational and metacognitive feedback in SQL-Tutor*
NASA Astrophysics Data System (ADS)
Hull, Alison; du Boulay, Benedict
2015-04-01
Motivation and metacognition are strongly intertwined, with learners high in self-efficacy more likely to use a variety of self-regulatory learning strategies, as well as to persist longer on challenging tasks. The aim of the research was to improve the learner's focus on the process and experience of problem-solving while using an Intelligent Tutoring System (ITS) and including motivational and metacognitive feedback based on the learner's past states and experiences. An existing ITS, SQL-Tutor, was used with first-year undergraduates studying a database module. The study used two versions of SQL-Tutor: the Control group used a base version providing domain feedback and the Study group used an extended version that also provided motivational and metacognitive feedback. This paper summarises the pre- and post-process results. Comparisons between groups showed some differing trends both in learning outcomes and behaviour in favour of the Study group.
0.75 atoms improve the clock signal of 10,000 atoms
NASA Astrophysics Data System (ADS)
Kruse, I.; Lange, K.; Peise, J.; Lücke, B.; Pezzè, L.; Arlt, J.; Ertmer, W.; Lisdat, C.; Santos, L.; Smerzi, A.; Klempt, C.
2017-02-01
Since the pioneering work of Ramsey, atom interferometers are employed for precision metrology, in particular to measure time and to realize the second. In a classical interferometer, an ensemble of atoms is prepared in one of the two input states, whereas the second one is left empty. In this case, the vacuum noise restricts the precision of the interferometer to the standard quantum limit (SQL). Here, we propose and experimentally demonstrate a novel clock configuration that surpasses the SQL by squeezing the vacuum in the empty input state. We create a squeezed vacuum state containing an average of 0.75 atoms to improve the clock sensitivity of 10,000 atoms by 2.05 dB. The SQL poses a significant limitation for today's microwave fountain clocks, which serve as the main time reference. We evaluate the major technical limitations and challenges for devising a next generation of fountain clocks based on atomic squeezed vacuum.
Improvement of an Atomic Clock using Squeezed Vacuum
NASA Astrophysics Data System (ADS)
Kruse, I.; Lange, K.; Peise, J.; Lücke, B.; Pezzè, L.; Arlt, J.; Ertmer, W.; Lisdat, C.; Santos, L.; Smerzi, A.; Klempt, C.
2016-09-01
Since the pioneering work of Ramsey, atom interferometers are employed for precision metrology, in particular to measure time and to realize the second. In a classical interferometer, an ensemble of atoms is prepared in one of the two input states, whereas the second one is left empty. In this case, the vacuum noise restricts the precision of the interferometer to the standard quantum limit (SQL). Here, we propose and experimentally demonstrate a novel clock configuration that surpasses the SQL by squeezing the vacuum in the empty input state. We create a squeezed vacuum state containing an average of 0.75 atoms to improve the clock sensitivity of 10000 atoms by 2.05-0.37 +0 .34 dB . The SQL poses a significant limitation for today's microwave fountain clocks, which serve as the main time reference. We evaluate the major technical limitations and challenges for devising a next generation of fountain clocks based on atomic squeezed vacuum.
Evaluating the Cassandra NoSQL Database Approach for Genomic Data Persistency
Aniceto, Rodrigo; Xavier, Rene; Guimarães, Valeria; Hondo, Fernanda; Holanda, Maristela; Walter, Maria Emilia; Lifschitz, Sérgio
2015-01-01
Rapid advances in high-throughput sequencing techniques have created interesting computational challenges in bioinformatics. One of them refers to management of massive amounts of data generated by automatic sequencers. We need to deal with the persistency of genomic data, particularly storing and analyzing these large-scale processed data. To find an alternative to the frequently considered relational database model becomes a compelling task. Other data models may be more effective when dealing with a very large amount of nonconventional data, especially for writing and retrieving operations. In this paper, we discuss the Cassandra NoSQL database approach for storing genomic data. We perform an analysis of persistency and I/O operations with real data, using the Cassandra database system. We also compare the results obtained with a classical relational database system and another NoSQL database approach, MongoDB. PMID:26558254
Yalcin, Arzu Didem
2015-01-01
Omalizumab depletes free IgE in the blood and interstitial space and inhibits IgE binding to FcεRI on basophils, mast cells, and dendritic cells. We stopped omalizumab treatment after four years. Recurrences of urticaria symptoms were found to be higher in patients with chronic urticaria than recurrences of asthmatic symptoms in severe persistent asthma patients. For the very first time, we used omalizumab in symptomatic therapy of recurrent laryngeal oedema and urticaria attacks in a patient with postoperative pulmonary carcinoid tumor for eight months. During the four years of follow-up, no recurrence was noted in pulmonary carcinoid tumor. Control PET CT results revealed normal findings. After omalizumab treatment, laryngeal oedema and urticaria symptoms were decreased. The most common adverse reaction from omalizumab is injection site induration, injection site itching, injection site pain, and bruising but the package insert contains warnings regarding parasitic infections. While there are no reports of fatal anaphylaxis as a result of omalizumab, some cases have been serious and potentially life-threatening. Therefore, the FDA requires that people receiving omalizumab be monitored in the physician's office for a period of time after their injections. PMID:26075226
Khan, Mohammad Iqbal; Tariq, Mohammad; Rashid, Danyal
2008-01-01
Carotid endarterectomy is the most commonly performed vascular surgical procedure. One of the complications of carotid endarterectomy is Pseudoaneurysm of the carotid artery frequently managed by endo-vascular technique. Pseudoaneurysm caused by other aetiological factors is rare entity. Penetrating trauma and neck surgery are known but very rare causes of pseudo aneurysm of the carotid artery. We have successfully managed a case of carotid artery pseudoaneurysm caused by incision and drainage of parapharyngeal abscess. This surgery also leads to the palsy of right vagus nerve causing complete hoarseness of voice. The patient presented with Transit Ischaemic Attacks (TIA) and amurosis fugos. Resection of aneurysm and reconstruction of right carotid artery lead to complete recovery. Vocal cord palsy was managed by Vox implant injection leading to full recovery.
Managing Complex Interoperability Solutions using Model-Driven Architecture
2011-06-01
such as Oracle or MySQL . Each data model for a specific RDBMS is a distinct PSM. Or the system may want to exchange information with other C2...reduced number of transformations, e.g., from an RDBMS physical schema to the corresponding SQL script needed to instantiate the tables in a relational...tance of models. In engineering, a model serves several purposes: 1. It presents an abstract view of a complex system or of a complex information
Information Collection using Handheld Devices in Unreliable Networking Environments
2014-06-01
different types of mobile devices that connect wirelessly to a database 8 server. The actual backend database is not important to the mobile clients...Google’s infrastructure and local servers with MySQL and PostgreSQL on the backend (ODK 2014b). (2) Google Fusion Tables are used to do basic link...how we conduct business. Our requirements to share information do not change simply because there is little or no existing infrastructure in our
2016-03-01
Representational state transfer Java messaging service Java application programming interface (API) Internet relay chat (IRC)/extensible messaging and...JBoss application server or an Apache Tomcat servlet container instance. The relational database management system can be either PostgreSQL or MySQL ... Java library called direct web remoting. This library has been part of the core CACE architecture for quite some time; however, there have not been
MicroRNA Gene Regulatory Networks in Peripheral Nerve Sheath Tumors
2013-09-01
3.0 hierarchical clustering of both the X and the Y-axis using Centroid linkage. The resulting clustered matrixes were visualized using Java Treeview...To score potential ceRNA interactions, the 54979 human interactions were loaded into a mySQL database and when the user selects a given mRNA all...on the fly using PHP interactions with mySQL in a similar fashion as previously described in our publicly available databases such as sarcoma
Understanding and Capturing People’s Mobile App Privacy Preferences
2013-10-28
The entire apps’ metadata takes up about 500MB of storage space when stored in a MySQL database and all the binary files take approximately 300GB of...functionality that can de- compile Dalvik bytecodes to Java source code faster than other de-compilers. Given the scale of the app analysis we planned on... java libraries, such as parser, sql connectors, etc Targeted Ads 137 admob, adwhirl, greystripe… Provided by mobile behavioral ads company to
Shark: SQL and Analytics with Cost-Based Query Optimization on Coarse-Grained Distributed Memory
2014-01-13
RDBMS and contains a database (often MySQL or Derby) with a namespace for tables, table metadata and partition information. Table data is stored in an...serialization/deserialization) Java interface implementations with corresponding object inspectors. The Hive driver controls the processing of queries, coordinat...native API, RDD operations are invoked through a functional interface similar to DryadLINQ [32] in Scala, Java or Python. For example, the Scala code for
Implementing an Intrusion Detection System in the Mysea Architecture
2008-06-01
password for each user passwd <username> then follow the prompts 2. PostgreSQL 7.4.18 Installation Perform the following steps as root: 1. Copy...password changed Repeat for user snort. exit After making the groups and users the group and passwd file needs to be updated. Set security and...untrusted/bin/xtsmkgroup > /etc/group chmod 644 /etc/group /xts/untrusted/bin/xtsmkpasswd > /etc/ passwd chmod 644 /etc/ passwd 3. PostgreSQL 7.4.18
Astronomical Archive at Tartu Observatory
NASA Astrophysics Data System (ADS)
Annuk, K.
2007-10-01
Archiving astronomical data is important task not only at large observatories but also at small observatories. Here we describe the astronomical archive at Tartu Observatory. The archive consists of old photographic plate images, photographic spectrograms, CCD direct--images and CCD spectroscopic data. The photographic plate digitizing project was started in 2005. An on-line database (based on MySQL) was created. The database includes CCD data as well photographic data. A PHP-MySQL interface was written for access to all data.
Shark: SQL and Rich Analytics at Scale
2012-11-26
learning programs up to 100 faster than Hadoop. Unlike previous systems, Shark shows that it is possible to achieve these speedups while retaining a...Shark to run SQL queries up to 100× faster than Apache Hive, and machine learning programs up to 100× faster than Hadoop. Unlike previous systems, Shark...so using a runtime that is optimized for such workloads and a programming model that is designed to express machine learn - ing algorithms. 4.1
Nosql for Storage and Retrieval of Large LIDAR Data Collections
NASA Astrophysics Data System (ADS)
Boehm, J.; Liu, K.
2015-08-01
Developments in LiDAR technology over the past decades have made LiDAR to become a mature and widely accepted source of geospatial information. This in turn has led to an enormous growth in data volume. The central idea for a file-centric storage of LiDAR point clouds is the observation that large collections of LiDAR data are typically delivered as large collections of files, rather than single files of terabyte size. This split of the dataset, commonly referred to as tiling, was usually done to accommodate a specific processing pipeline. It makes therefore sense to preserve this split. A document oriented NoSQL database can easily emulate this data partitioning, by representing each tile (file) in a separate document. The document stores the metadata of the tile. The actual files are stored in a distributed file system emulated by the NoSQL database. We demonstrate the use of MongoDB a highly scalable document oriented NoSQL database for storing large LiDAR files. MongoDB like any NoSQL database allows for queries on the attributes of the document. As a specialty MongoDB also allows spatial queries. Hence we can perform spatial queries on the bounding boxes of the LiDAR tiles. Inserting and retrieving files on a cloud-based database is compared to native file system and cloud storage transfer speed.
The HARPS-N archive through a Cassandra, NoSQL database suite?
NASA Astrophysics Data System (ADS)
Molinari, Emilio; Guerra, Jose; Harutyunyan, Avet; Lodi, Marcello; Martin, Adrian
2016-07-01
The TNG-INAF is developing the science archive for the WEAVE instrument. The underlying architecture of the archive is based on a non relational database, more precisely, on Apache Cassandra cluster, which uses a NoSQL technology. In order to test and validate the use of this architecture, we created a local archive which we populated with all the HARPSN spectra collected at the TNG since the instrument's start of operations in mid-2012, as well as developed tools for the analysis of this data set. The HARPS-N data set is two orders of magnitude smaller than WEAVE, but we want to demonstrate the ability to walk through a complete data set and produce scientific output, as valuable as that produced by an ordinary pipeline, though without accessing directly the FITS files. The analytics is done by Apache Solr and Spark and on a relational PostgreSQL database. As an example, we produce observables like metallicity indexes for the targets in the archive and compare the results with the ones coming from the HARPS-N regular data reduction software. The aim of this experiment is to explore the viability of a high availability cluster and distributed NoSQL database as a platform for complex scientific analytics on a large data set, which will then be ported to the WEAVE Archive System (WAS) which we are developing for the WEAVE multi object, fiber spectrograph.
Expert Planning Processes in Writing
1990-12-17
For example, here are some target ideas from the immunity text: " protozoa attack red blood cells " agglutin clumps pathogens together * vaccination ...majors may have already understood (e.g., vaccination is an injection of a virus), we conducted a second analysis scoring only for the "hard" concepts...page texts, a clear and an unclear version on each of two topics, autism and statistics. The clear autism and the unclear statistics texts were
Vaccinations and multiple sclerosis.
Gout, O
2001-04-01
Two problems must be considered in regard to the relationship between vaccinations and MS: Do vaccinations favour the first attack of MS? Do they increase the short- or long-term risk in patients with known disease? Answers to these questions are difficult due to the paucity of reported cases, our ignorance of the precise frequency of neurological adverse events in vaccines based on prospective studies, and finally by the lack of a well established pathophysiology. In most instances, the role of the vaccine is based on a temporal link between the injection and the onset of neurological disease, and more rarely to a positive reintroduction. Acute disseminated encephalomyelitis (ADEM), a monophasic and multifocal illness of the white and grey matter, has been observed following various viral or bacterial infections as well as vaccine injections for diseases such as pertussis, tetanus and yellow fever. The similarities between ADEM and experimental allergic encephalitis (EAE) are suggestive of an immunological process. In addition to the dramatic presentation of ADEM, more limited white matter involvement, such as optic neuritis or myelitis, has been reported following vaccine injections, and has occasionally been counted as the first attack of MS. In France, 25 million inhabitants, almost half of the population, were vaccinated against hepatitis B (HB) between 1991 and 1999. Several hundred cases of an acute central demyelinating event following HB vaccination were reported to the pharmacovigilance unit, leading to a modification of vaccination policy in the schools and the initiation of several studies designed to examine the possible relationship between the vaccine and the central demyelinating events. The results of these studies failed to establish the causality of the HB vaccine. Nevertheless, molecular mimicry between HB antigen(s) and one or more myelin proteins, or a non-specific activation of autoreactive lymphocytes, could constitute possible pathogenetic mechanisms for these adverse neurological events.
ElMahdy, Mahmoud Farouk; Kassem, Hussien Heshmat; Ewis, Essam Baligh; Mahdy, Soliman Gharieb
2014-03-01
Management of postcatheterization femoral artery pseudoaneurysm (FAP) is problematic. Ultrasound-guided compression (UGC) is painful and cumbersome. Thrombin injection is costly and may cause thromboembolism. Ultrasound-guided para-aneurysmal saline injection (PASI) has been described but was never compared against other treatment methods of FAP. We aimed at comparing the success rate and complications of PASI versus UGC. We randomly assigned 80 patients with postcatheterization FAPs to either UGC (40 patients) or PASI (40 patients). We compared the 2 procedures regarding successful obliteration of the FAP, incidence of vasovagal attacks, procedure time, discontinuation of antiplatelet and/or anticoagulants, and the Doppler waveform in the ipsilateral pedal arteries at the end of the procedure. There was no significant difference between patients in both groups regarding clinical and vascular duplex data. The mean durations of UGC and PASI procedures were 58.14 ± 28.45 and 30.33 ± 8.56 minutes, respectively (p = 0.045). Vasovagal attacks were reported in 10 (25%) and 2 patients (5%) treated with UGC and PASI, respectively (p = 0.05). All patients in both groups had triphasic Doppler waveform in the infrapopliteal arteries before and after the procedure. The primary and final success rates were 75%, 92.5%, 87.5%, and 95% for UGC and PASI, respectively (p = 0.43). In successfully treated patients, there was no reperfusion of the FAP in the follow-up studies (days 1 and 7) in both groups. In conclusion, ultrasound-guided PASI is an effective method for the treatment of FAP. Compared with UGC, PASI is faster, less likely to cause vasovagal reactions, and can be more convenient to patients and physicians. Copyright © 2014 Elsevier Inc. All rights reserved.
Freire, Sergio Miranda; Teodoro, Douglas; Wei-Kleiner, Fang; Sundvall, Erik; Karlsson, Daniel; Lambrix, Patrick
2016-01-01
This study provides an experimental performance evaluation on population-based queries of NoSQL databases storing archetype-based Electronic Health Record (EHR) data. There are few published studies regarding the performance of persistence mechanisms for systems that use multilevel modelling approaches, especially when the focus is on population-based queries. A healthcare dataset with 4.2 million records stored in a relational database (MySQL) was used to generate XML and JSON documents based on the openEHR reference model. Six datasets with different sizes were created from these documents and imported into three single machine XML databases (BaseX, eXistdb and Berkeley DB XML) and into a distributed NoSQL database system based on the MapReduce approach, Couchbase, deployed in different cluster configurations of 1, 2, 4, 8 and 12 machines. Population-based queries were submitted to those databases and to the original relational database. Database size and query response times are presented. The XML databases were considerably slower and required much more space than Couchbase. Overall, Couchbase had better response times than MySQL, especially for larger datasets. However, Couchbase requires indexing for each differently formulated query and the indexing time increases with the size of the datasets. The performances of the clusters with 2, 4, 8 and 12 nodes were not better than the single node cluster in relation to the query response time, but the indexing time was reduced proportionally to the number of nodes. The tested XML databases had acceptable performance for openEHR-based data in some querying use cases and small datasets, but were generally much slower than Couchbase. Couchbase also outperformed the response times of the relational database, but required more disk space and had a much longer indexing time. Systems like Couchbase are thus interesting research targets for scalable storage and querying of archetype-based EHR data when population-based use cases are of interest. PMID:26958859
Freire, Sergio Miranda; Teodoro, Douglas; Wei-Kleiner, Fang; Sundvall, Erik; Karlsson, Daniel; Lambrix, Patrick
2016-01-01
This study provides an experimental performance evaluation on population-based queries of NoSQL databases storing archetype-based Electronic Health Record (EHR) data. There are few published studies regarding the performance of persistence mechanisms for systems that use multilevel modelling approaches, especially when the focus is on population-based queries. A healthcare dataset with 4.2 million records stored in a relational database (MySQL) was used to generate XML and JSON documents based on the openEHR reference model. Six datasets with different sizes were created from these documents and imported into three single machine XML databases (BaseX, eXistdb and Berkeley DB XML) and into a distributed NoSQL database system based on the MapReduce approach, Couchbase, deployed in different cluster configurations of 1, 2, 4, 8 and 12 machines. Population-based queries were submitted to those databases and to the original relational database. Database size and query response times are presented. The XML databases were considerably slower and required much more space than Couchbase. Overall, Couchbase had better response times than MySQL, especially for larger datasets. However, Couchbase requires indexing for each differently formulated query and the indexing time increases with the size of the datasets. The performances of the clusters with 2, 4, 8 and 12 nodes were not better than the single node cluster in relation to the query response time, but the indexing time was reduced proportionally to the number of nodes. The tested XML databases had acceptable performance for openEHR-based data in some querying use cases and small datasets, but were generally much slower than Couchbase. Couchbase also outperformed the response times of the relational database, but required more disk space and had a much longer indexing time. Systems like Couchbase are thus interesting research targets for scalable storage and querying of archetype-based EHR data when population-based use cases are of interest.
CGDM: collaborative genomic data model for molecular profiling data using NoSQL.
Wang, Shicai; Mares, Mihaela A; Guo, Yi-Ke
2016-12-01
High-throughput molecular profiling has greatly improved patient stratification and mechanistic understanding of diseases. With the increasing amount of data used in translational medicine studies in recent years, there is a need to improve the performance of data warehouses in terms of data retrieval and statistical processing. Both relational and Key Value models have been used for managing molecular profiling data. Key Value models such as SeqWare have been shown to be particularly advantageous in terms of query processing speed for large datasets. However, more improvement can be achieved, particularly through better indexing techniques of the Key Value models, taking advantage of the types of queries which are specific for the high-throughput molecular profiling data. In this article, we introduce a Collaborative Genomic Data Model (CGDM), aimed at significantly increasing the query processing speed for the main classes of queries on genomic databases. CGDM creates three Collaborative Global Clustering Index Tables (CGCITs) to solve the velocity and variety issues at the cost of limited extra volume. Several benchmarking experiments were carried out, comparing CGDM implemented on HBase to the traditional SQL data model (TDM) implemented on both HBase and MySQL Cluster, using large publicly available molecular profiling datasets taken from NCBI and HapMap. In the microarray case, CGDM on HBase performed up to 246 times faster than TDM on HBase and 7 times faster than TDM on MySQL Cluster. In single nucleotide polymorphism case, CGDM on HBase outperformed TDM on HBase by up to 351 times and TDM on MySQL Cluster by up to 9 times. The CGDM source code is available at https://github.com/evanswang/CGDM. y.guo@imperial.ac.uk. © The Author 2016. Published by Oxford University Press. All rights reserved. For Permissions, please e-mail: journals.permissions@oup.com.
High dimensional biological data retrieval optimization with NoSQL technology.
Wang, Shicai; Pandis, Ioannis; Wu, Chao; He, Sijin; Johnson, David; Emam, Ibrahim; Guitton, Florian; Guo, Yike
2014-01-01
High-throughput transcriptomic data generated by microarray experiments is the most abundant and frequently stored kind of data currently used in translational medicine studies. Although microarray data is supported in data warehouses such as tranSMART, when querying relational databases for hundreds of different patient gene expression records queries are slow due to poor performance. Non-relational data models, such as the key-value model implemented in NoSQL databases, hold promise to be more performant solutions. Our motivation is to improve the performance of the tranSMART data warehouse with a view to supporting Next Generation Sequencing data. In this paper we introduce a new data model better suited for high-dimensional data storage and querying, optimized for database scalability and performance. We have designed a key-value pair data model to support faster queries over large-scale microarray data and implemented the model using HBase, an implementation of Google's BigTable storage system. An experimental performance comparison was carried out against the traditional relational data model implemented in both MySQL Cluster and MongoDB, using a large publicly available transcriptomic data set taken from NCBI GEO concerning Multiple Myeloma. Our new key-value data model implemented on HBase exhibits an average 5.24-fold increase in high-dimensional biological data query performance compared to the relational model implemented on MySQL Cluster, and an average 6.47-fold increase on query performance on MongoDB. The performance evaluation found that the new key-value data model, in particular its implementation in HBase, outperforms the relational model currently implemented in tranSMART. We propose that NoSQL technology holds great promise for large-scale data management, in particular for high-dimensional biological data such as that demonstrated in the performance evaluation described in this paper. We aim to use this new data model as a basis for migrating tranSMART's implementation to a more scalable solution for Big Data.
High dimensional biological data retrieval optimization with NoSQL technology
2014-01-01
Background High-throughput transcriptomic data generated by microarray experiments is the most abundant and frequently stored kind of data currently used in translational medicine studies. Although microarray data is supported in data warehouses such as tranSMART, when querying relational databases for hundreds of different patient gene expression records queries are slow due to poor performance. Non-relational data models, such as the key-value model implemented in NoSQL databases, hold promise to be more performant solutions. Our motivation is to improve the performance of the tranSMART data warehouse with a view to supporting Next Generation Sequencing data. Results In this paper we introduce a new data model better suited for high-dimensional data storage and querying, optimized for database scalability and performance. We have designed a key-value pair data model to support faster queries over large-scale microarray data and implemented the model using HBase, an implementation of Google's BigTable storage system. An experimental performance comparison was carried out against the traditional relational data model implemented in both MySQL Cluster and MongoDB, using a large publicly available transcriptomic data set taken from NCBI GEO concerning Multiple Myeloma. Our new key-value data model implemented on HBase exhibits an average 5.24-fold increase in high-dimensional biological data query performance compared to the relational model implemented on MySQL Cluster, and an average 6.47-fold increase on query performance on MongoDB. Conclusions The performance evaluation found that the new key-value data model, in particular its implementation in HBase, outperforms the relational model currently implemented in tranSMART. We propose that NoSQL technology holds great promise for large-scale data management, in particular for high-dimensional biological data such as that demonstrated in the performance evaluation described in this paper. We aim to use this new data model as a basis for migrating tranSMART's implementation to a more scalable solution for Big Data. PMID:25435347
NASA Astrophysics Data System (ADS)
Knosp, B.; Gangl, M.; Hristova-Veleva, S. M.; Kim, R. M.; Li, P.; Turk, J.; Vu, Q. A.
2015-12-01
The JPL Tropical Cyclone Information System (TCIS) brings together satellite, aircraft, and model forecast data from several NASA, NOAA, and other data centers to assist researchers in comparing and analyzing data and model forecast related to tropical cyclones. The TCIS has been running a near-real time (NRT) data portal during North Atlantic hurricane season that typically runs from June through October each year, since 2010. Data collected by the TCIS varies by type, format, contents, and frequency and is served to the user in two ways: (1) as image overlays on a virtual globe and (2) as derived output from a suite of analysis tools. In order to support these two functions, the data must be collected and then made searchable by criteria such as date, mission, product, pressure level, and geospatial region. Creating a database architecture that is flexible enough to manage, intelligently interrogate, and ultimately present this disparate data to the user in a meaningful way has been the primary challenge. The database solution for the TCIS has been to use a hybrid MySQL + Solr implementation. After testing other relational database and NoSQL solutions, such as PostgreSQL and MongoDB respectively, this solution has given the TCIS the best offerings in terms of query speed and result reliability. This database solution also supports the challenging (and memory overwhelming) geospatial queries that are necessary to support analysis tools requested by users. Though hardly new technologies on their own, our implementation of MySQL + Solr had to be customized and tuned to be able to accurately store, index, and search the TCIS data holdings. In this presentation, we will discuss how we arrived on our MySQL + Solr database architecture, why it offers us the most consistent fast and reliable results, and how it supports our front end so that we can offer users a look into our "big data" holdings.
NASA Astrophysics Data System (ADS)
Velazquez, Enrique Israel
Improvements in medical and genomic technologies have dramatically increased the production of electronic data over the last decade. As a result, data management is rapidly becoming a major determinant, and urgent challenge, for the development of Precision Medicine. Although successful data management is achievable using Relational Database Management Systems (RDBMS), exponential data growth is a significant contributor to failure scenarios. Growing amounts of data can also be observed in other sectors, such as economics and business, which, together with the previous facts, suggests that alternate database approaches (NoSQL) may soon be required for efficient storage and management of big databases. However, this hypothesis has been difficult to test in the Precision Medicine field since alternate database architectures are complex to assess and means to integrate heterogeneous electronic health records (EHR) with dynamic genomic data are not easily available. In this dissertation, we present a novel set of experiments for identifying NoSQL database approaches that enable effective data storage and management in Precision Medicine using patients' clinical and genomic information from the cancer genome atlas (TCGA). The first experiment draws on performance and scalability from biologically meaningful queries with differing complexity and database sizes. The second experiment measures performance and scalability in database updates without schema changes. The third experiment assesses performance and scalability in database updates with schema modifications due dynamic data. We have identified two NoSQL approach, based on Cassandra and Redis, which seems to be the ideal database management systems for our precision medicine queries in terms of performance and scalability. We present NoSQL approaches and show how they can be used to manage clinical and genomic big data. Our research is relevant to the public health since we are focusing on one of the main challenges to the development of Precision Medicine and, consequently, investigating a potential solution to the progressively increasing demands on health care.
An Analysis Platform for Mobile Ad Hoc Network (MANET) Scenario Execution Log Data
2016-01-01
these technologies. 4.1 Backend Technologies • Java 1.8 • my-sql-connector- java -5.0.8.jar • Tomcat • VirtualBox • Kali MANET Virtual Machine 4.2...Frontend Technologies • LAMPP 4.3 Database • MySQL Server 5. Database The SEDAP database settings and structure are described in this section...contains all the backend java functionality including the web services, should be placed in the webapps directory inside the Tomcat installation
Design and Implementation of 3D Model Data Management System Based on SQL
NASA Astrophysics Data System (ADS)
Li, Shitao; Zhang, Shixin; Zhang, Zhanling; Li, Shiming; Jia, Kun; Hu, Zhongxu; Ping, Liang; Hu, Youming; Li, Yanlei
CAD/CAM technology plays an increasingly important role in the machinery manufacturing industry. As an important means of production, the accumulated three-dimensional models in many years of design work are valuable. Thus the management of these three-dimensional models is of great significance. This paper gives detailed explanation for a method to design three-dimensional model databases based on SQL and to implement the functions such as insertion, modification, inquiry, preview and so on.
McKenzie, Donald J.
1976-01-01
In 1966, a furfural plant at Belle Glade, Florida, began injecting hot, acidic liquid waste into the saline, water-filled lower part of the Floridan aquifer, between the depths of 1 ,495-1,939 feet. The beds above and below the injection zone were subjected to attack by the acid waste. By 1969, effects of the waste were detected in the water of the well monitoring the upper part of the Floridan aquifer at 1,400 feet. The disposal well was deepened late in 1971 to 2,242 feet in an attempt to stop the upward migration of waste. The results of research investigations by the U.S. Geological Survey during 1966-73 indicated that the waste continued to move upward and laterally. This investigated, continued by the U.S. Geological Survey in 1973-1975, shows that the remedial actions of repairing the disposal well liner and injecting periodically into the deep monitor well at 2,060 feet failed to contain the wastes within the lower part of the Floridan aquifer. The data collected by the Survey are supported by the owner 's chemical-oxygen-demand and pH determinations. A hydraulic connection between the injection zone and the overlying monitoring zone is implied. Plans call for injecting into deepter strata. (Woodard-USGS)
Mansha, Sana; Imran, Muhammad; Shah, Amir Miraj Ul Hussain; Jamal, Muhsin; Ahmed, Fayyaz; Atif, Muhammad; Saleem, Muhammmad; Safi, Sher Zaman; Fatima, Zareen; Bilal Waqar, Ahmed
2017-06-01
Hepatitis B virus (HBV) and hepatitis C virus (HCV) are the major cause of the global burden of hepatitis. One of the main routes of transmission for both viruses is through exposure to infected blood, which includes sharing blood-contaminated syringes and needles. Human immunodeficiency virus (HIV) attacks the immune system and results in acquired immune deficiency syndrome and opportunistic infections. The objective of this study was to assess the epidemiology of HBV and HCV infections among HIV-infected people who inject drugs (PWID). The study enrolled 100 PWID from different addiction centers of the city of Lahore in Pakistan. All subjects were HIV-infected males and were above 16 years of age. Screening of HBV and HCV infections was performed through immunochromatography tests and enzyme-linked immunosorbent assays. The prevalence of HCV and HBV infections among the 100 HIV-infected PWID was 55% and 6%, respectively. HIV monoinfection was found in 37% of the subjects, while triple infection was detected in 2% of the subjects. Majority of the HIV-infected PWID were using heroin and Avil injections (65%). Half of the subjects had used injection drugs for 1-5 years, while 32% had used injection drugs for 6-10 years. HCV infection was more common than HBV infection among the enrolled subjects. Most of the PWID were practicing heroin and Avil injections.
Sasajima, Hirofumi; Yagi, Syunsuke; Osada, Hiromu; Zako, Masahiro
2017-05-04
Injections of lipopolysaccharide in animal models generate acute anterior uveitis (also known as endotoxin-induced uveitis), but the effects of lipopolysaccharide injection are unknown in humans. We describe an unusual case in which acute anterior uveitis was dramatically activated subsequent to botulinum toxin injection in a patient with Behçet's disease but the acute anterior uveitis was satisfactorily attenuated by infliximab. A 53-year-old Japanese man had normal ocular findings at his regularly scheduled appointment. He had been diagnosed as having incomplete-type Behçet's disease 11 years before. Three years after the diagnosis he was given systemic infusions of 5 mg/kg infliximab every 8 weeks and he had not experienced a uveitis attack for 8 years with no treatment other than infliximab. Two days after the eye examination, he received intracutaneous botulinum toxin injections to treat axillary hyperhidrosis on both sides. Three hours after the injections, he noted rapidly increasing floaters in his right eye. Four days after the injections, his right eye showed severe acute anterior uveitis with deteriorated aqueous flare and anterior vitreous opacity. He received his scheduled infliximab injection, and the right acute anterior uveitis immediately attenuated. Botulinum toxin may have clinical effects similar to those of lipopolysaccharide in endotoxin-induced uveitis models. To the best of our knowledge, this is the first report to suggest that botulinum toxin may trigger acute anterior uveitis, although the precise mechanism is still unclear.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Skyhoj Olsen, T.; Lassen, N.A.
1989-01-01
The present study reports cerebral blood flow (CBF) measurements in 11 patients during attacks of classic migraine (CM)--migraine with aura. In 6 and 7 patients, respectively, cerebral vascular reactivity to increased blood pressure and to hypocapnia was also investigated during the CM attacks. The Xenon-133 intraarterial injection technique was used to measure CBF. In this study, based in part on previously published data, methodological limitations, in particular caused by scattered radiation (Compton scatter), are critically analysed. Based on this analysis and the results of the CBF studies it is concluded: During CM attacks CBF appears to decrease focally in themore » posterior part of the brain to a level around 20 ml/100 g/min which is consistent with a mild degree of ischemia. Changes of CBF in focal low flow areas are difficult to evaluate accurately with the Xe-133 technique. In most cases true CBF may change 50% or more in the low flow areas without giving rise to significantly measurable changes of CBF. This analysis suggests that the autoregulation response cannot be evaluated in the low flow areas with the technique used while the observations are compatible with the concept that a vasoconstrictive state, unresponsive to hypocapnia, prevails in the low flow areas during CM attacks. The gradual increase in size of the low flow area seen in several cases may be interpreted in two different ways. A spreading process may actually exist. However, due to Compton scatter, a gradual decrease of CBF in a territory that does not increase in size will also appear as a gradually spreading low flow area when studied with the Xe-133 intracarotid technique.« less
CHASM and SNVBox: toolkit for detecting biologically important single nucleotide mutations in cancer
Carter, Hannah; Diekhans, Mark; Ryan, Michael C.; Karchin, Rachel
2011-01-01
Summary: Thousands of cancer exomes are currently being sequenced, yielding millions of non-synonymous single nucleotide variants (SNVs) of possible relevance to disease etiology. Here, we provide a software toolkit to prioritize SNVs based on their predicted contribution to tumorigenesis. It includes a database of precomputed, predictive features covering all positions in the annotated human exome and can be used either stand-alone or as part of a larger variant discovery pipeline. Availability and Implementation: MySQL database, source code and binaries freely available for academic/government use at http://wiki.chasmsoftware.org, Source in Python and C++. Requires 32 or 64-bit Linux system (tested on Fedora Core 8,10,11 and Ubuntu 10), 2.5*≤ Python <3.0*, MySQL server >5.0, 60 GB available hard disk space (50 MB for software and data files, 40 GB for MySQL database dump when uncompressed), 2 GB of RAM. Contact: karchin@jhu.edu Supplementary Information: Supplementary data are available at Bioinformatics online. PMID:21685053
Datacube Services in Action, Using Open Source and Open Standards
NASA Astrophysics Data System (ADS)
Baumann, P.; Misev, D.
2016-12-01
Array Databases comprise novel, promising technology for massive spatio-temporal datacubes, extending the SQL paradigm of "any query, anytime" to n-D arrays. On server side, such queries can be optimized, parallelized, and distributed based on partitioned array storage. The rasdaman ("raster data manager") system, which has pioneered Array Databases, is available in open source on www.rasdaman.org. Its declarative query language extends SQL with array operators which are optimized and parallelized on server side. The rasdaman engine, which is part of OSGeo Live, is mature and in operational use databases individually holding dozens of Terabytes. Further, the rasdaman concepts have strongly impacted international Big Data standards in the field, including the forthcoming MDA ("Multi-Dimensional Array") extension to ISO SQL, the OGC Web Coverage Service (WCS) and Web Coverage Processing Service (WCPS) standards, and the forthcoming INSPIRE WCS/WCPS; in both OGC and INSPIRE, OGC is WCS Core Reference Implementation. In our talk we present concepts, architecture, operational services, and standardization impact of open-source rasdaman, as well as experiences made.
Providing R-Tree Support for Mongodb
NASA Astrophysics Data System (ADS)
Xiang, Longgang; Shao, Xiaotian; Wang, Dehao
2016-06-01
Supporting large amounts of spatial data is a significant characteristic of modern databases. However, unlike some mature relational databases, such as Oracle and PostgreSQL, most of current burgeoning NoSQL databases are not well designed for storing geospatial data, which is becoming increasingly important in various fields. In this paper, we propose a novel method to provide R-tree index, as well as corresponding spatial range query and nearest neighbour query functions, for MongoDB, one of the most prevalent NoSQL databases. First, after in-depth analysis of MongoDB's features, we devise an efficient tabular document structure which flattens R-tree index into MongoDB collections. Further, relevant mechanisms of R-tree operations are issued, and then we discuss in detail how to integrate R-tree into MongoDB. Finally, we present the experimental results which show that our proposed method out-performs the built-in spatial index of MongoDB. Our research will greatly facilitate big data management issues with MongoDB in a variety of geospatial information applications.
A New Therapeutic Paradigm for Breast Cancer Exploiting Low Dose Estrogen-Induced Apoptosis
2014-08-01
incidences of stroke, pulmonary embolism , colorectal cancer, hip fractures , and death from other causes. After a mean follow-up of 6.8 years, no signifi- cant... embolism , DVT, transient ischemic attack, osteoporotic fracture , cataracts, death, and quality of life. The data was reported at a median follow-up time...injected into the axillary mammary fat pads of ovariectomized athymic mice. The mice were then divided into 4 groups and treated as follows: placebo
Secure and Practical Defense Against Code-Injection Attacks using Software Dynamic Translation
2006-06-16
Cache inst1 inst2 … instx inst3 inst4 cmpl %eax,%ecx trampoline Code Fragment1 inst7 inst8 … trampoline Code Fragment2 Context Switch Fetch Decode...inst4 cmpl %eax,%ecx bne L4 inst5 inst6 … jmp L8 L4: inst7 inst8 … Application Text CFn CFn+1 CFn+2 CFn+3 CFn+4 CFn+5 CFn+x inst5 inst6 … trampoline
Longley, Susan L; Watson, David; Noyes, Russell; Yoder, Kevin
2006-01-01
A dimensional and psychometrically informed taxonomy of anxiety is emerging, but the specific and nonspecific dimensions of panic and phobic anxiety require greater clarification. In this study, confirmatory factor analyses of data from a sample of 438 college students were used to validate a model of panic and phobic anxiety with six content factors; multiple scales from self-report measures were indicators of each model component. The model included a nonspecific component of (1) neuroticism and two specific components of panic attack, (2) physiological hyperarousal, and (3) anxiety sensitivity. The model also included three phobia components of (4) classically defined agoraphobia, (5) social phobia, and (6) blood-injection phobia. In these data, agoraphobia correlated more strongly with both the social phobia and blood phobia components than with either the physiological hyperarousal or the anxiety sensitivity components. These findings suggest that the association between panic attacks and agoraphobia warrants greater attention.
Research on Protective Effect and Mechanism of Idazoxan on lps Attacked Acute Hepatic Injury
NASA Astrophysics Data System (ADS)
Zhu, Junyu; Ying, Shangqi; Kang, Wenyuan; Huang, Wenjuan; Liang, Huaping
2018-01-01
Objective: To observe the protection effect of Idazoxan (IDA) on LPS induced acute hepatic injury, and to explore its action mechanism. Methods: 60 adult C57BL/6 mice were divided into a control group (20 mice, intraperitoneal injection of phosphate buffer), a model group (20 mice, intraperitoneal injection of LPS 10 mg/kg) and a agmatine group (20 mice, intraperitoneal injection of LPS 10 mg/kg and agmatine 200 mg/kg) according to random number table method. Blood and liver tissue were collected for preparation of tissue homogenate. Enzyme-linked immunosorbent assay (ELISA) was adopted for detecting tumor necrosis factor-α (TNF-α) and interleukin (IL- 1β and IL - 6) contents in the serum and liver tissue at 24h after molding. Automatic biochemical analyzer is used for determining alanine transaminase (ALT), aspartate aminotransferase (AST) and lactate dehydrogenase (LDH) level at 24h after molding; The liver tissue pathology changes were observed at 24h after molding. Macrophage RAW264.7 cells were stimulated by 10 μg/mL LPS and with or without IDA (100 μmol/L). 2’, 7’-dichlorofluoresce in diacetate (DCFH-DA) was used as a fluorescent probe for detection of intracellular reactive oxygen species (ROS) level; qRT - PCR method was used for detecting antioxidant enzymes HO-1 and NQO-1 mRNA expression level at 2h, 4h and 8 h. Results: mice in the model group suffered from depression, curling and food water forbidding at 6h after molding. Mice in the Idazoxan group have obviously better spirit and activity than that of model group. The serum ALT, AST and LDH level of LPS attacked acute hepatic injury mice can be effectively alleviated after Idazoxan treatment. The expression of proinflammatory factor TNF-α and IL-6 in the liver can be reduced. The liver showed obvious pathological changes at 24 h after injection, such as liver cell swelling, necrosis, congestion, inflammatory cell infiltration, etc.; The liver cell injury was prominently alleviated in IDA treatment group. Compared with the control group, LPS significantly increased ROS level in RAW264.7 cells. The ROS level was decreased with concentration dependence after IDA intervention. IDA increased HO-1 mRNA expression of RAW264.7 cells. It had no influence on NQO-1mRNA. Conclusion: IDA significantly reduces the serum liver injury indexes and contents of TNF-α, IL-6 and other inflammatory mediators in liver tissues. It can alleviate the liver pathology change, thereby it can generate protection function on LPS attacked acute hepatic injury. Its action mechanism may be related to IDA-enhanced liver macrophage antioxidant function.
Photo-z-SQL: Integrated, flexible photometric redshift computation in a database
NASA Astrophysics Data System (ADS)
Beck, R.; Dobos, L.; Budavári, T.; Szalay, A. S.; Csabai, I.
2017-04-01
We present a flexible template-based photometric redshift estimation framework, implemented in C#, that can be seamlessly integrated into a SQL database (or DB) server and executed on-demand in SQL. The DB integration eliminates the need to move large photometric datasets outside a database for redshift estimation, and utilizes the computational capabilities of DB hardware. The code is able to perform both maximum likelihood and Bayesian estimation, and can handle inputs of variable photometric filter sets and corresponding broad-band magnitudes. It is possible to take into account the full covariance matrix between filters, and filter zero points can be empirically calibrated using measurements with given redshifts. The list of spectral templates and the prior can be specified flexibly, and the expensive synthetic magnitude computations are done via lazy evaluation, coupled with a caching of results. Parallel execution is fully supported. For large upcoming photometric surveys such as the LSST, the ability to perform in-place photo-z calculation would be a significant advantage. Also, the efficient handling of variable filter sets is a necessity for heterogeneous databases, for example the Hubble Source Catalog, and for cross-match services such as SkyQuery. We illustrate the performance of our code on two reference photo-z estimation testing datasets, and provide an analysis of execution time and scalability with respect to different configurations. The code is available for download at https://github.com/beckrob/Photo-z-SQL.
NoSQL technologies for the CMS Conditions Database
NASA Astrophysics Data System (ADS)
Sipos, Roland
2015-12-01
With the restart of the LHC in 2015, the growth of the CMS Conditions dataset will continue, therefore the need of consistent and highly available access to the Conditions makes a great cause to revisit different aspects of the current data storage solutions. We present a study of alternative data storage backends for the Conditions Databases, by evaluating some of the most popular NoSQL databases to support a key-value representation of the CMS Conditions. The definition of the database infrastructure is based on the need of storing the conditions as BLOBs. Because of this, each condition can reach the size that may require special treatment (splitting) in these NoSQL databases. As big binary objects may be problematic in several database systems, and also to give an accurate baseline, a testing framework extension was implemented to measure the characteristics of the handling of arbitrary binary data in these databases. Based on the evaluation, prototypes of a document store, using a column-oriented and plain key-value store, are deployed. An adaption layer to access the backends in the CMS Offline software was developed to provide transparent support for these NoSQL databases in the CMS context. Additional data modelling approaches and considerations in the software layer, deployment and automatization of the databases are also covered in the research. In this paper we present the results of the evaluation as well as a performance comparison of the prototypes studied.
Techniques for Efficiently Managing Large Geosciences Data Sets
NASA Astrophysics Data System (ADS)
Kruger, A.; Krajewski, W. F.; Bradley, A. A.; Smith, J. A.; Baeck, M. L.; Steiner, M.; Lawrence, R. E.; Ramamurthy, M. K.; Weber, J.; Delgreco, S. A.; Domaszczynski, P.; Seo, B.; Gunyon, C. A.
2007-12-01
We have developed techniques and software tools for efficiently managing large geosciences data sets. While the techniques were developed as part of an NSF-Funded ITR project that focuses on making NEXRAD weather data and rainfall products available to hydrologists and other scientists, they are relevant to other geosciences disciplines that deal with large data sets. Metadata, relational databases, data compression, and networking are central to our methodology. Data and derived products are stored on file servers in a compressed format. URLs to, and metadata about the data and derived products are managed in a PostgreSQL database. Virtually all access to the data and products is through this database. Geosciences data normally require a number of processing steps to transform the raw data into useful products: data quality assurance, coordinate transformations and georeferencing, applying calibration information, and many more. We have developed the concept of crawlers that manage this scientific workflow. Crawlers are unattended processes that run indefinitely, and at set intervals query the database for their next assignment. A database table functions as a roster for the crawlers. Crawlers perform well-defined tasks that are, except for perhaps sequencing, largely independent from other crawlers. Once a crawler is done with its current assignment, it updates the database roster table, and gets its next assignment by querying the database. We have developed a library that enables one to quickly add crawlers. The library provides hooks to external (i.e., C-language) compiled codes, so that developers can work and contribute independently. Processes called ingesters inject data into the system. The bulk of the data are from a real-time feed using UCAR/Unidata's IDD/LDM software. An exciting recent development is the establishment of a Unidata HYDRO feed that feeds value-added metadata over the IDD/LDM. Ingesters grab the metadata and populate the PostgreSQL tables. These and other concepts we have developed have enabled us to efficiently manage a 70 Tb (and growing) data weather radar data set.
Prevention of Hereditary Angioedema Attacks with a Subcutaneous C1 Inhibitor.
Longhurst, Hilary; Cicardi, Marco; Craig, Timothy; Bork, Konrad; Grattan, Clive; Baker, James; Li, Huamin H; Reshef, Avner; Bonner, James; Bernstein, Jonathan A; Anderson, John; Lumry, William R; Farkas, Henriette; Katelaris, Constance H; Sussman, Gordon L; Jacobs, Joshua; Riedl, Marc; Manning, Michael E; Hebert, Jacques; Keith, Paul K; Kivity, Shmuel; Neri, Sergio; Levy, Donald S; Baeza, Maria L; Nathan, Robert; Schwartz, Lawrence B; Caballero, Teresa; Yang, William; Crisan, Ioana; Hernandez, María D; Hussain, Iftikhar; Tarzi, Michael; Ritchie, Bruce; Králíčková, Pavlina; Guilarte, Mar; Rehman, Syed M; Banerji, Aleena; Gower, Richard G; Bensen-Kennedy, Debra; Edelman, Jonathan; Feuersenger, Henrike; Lawo, John-Philip; Machnig, Thomas; Pawaskar, Dipti; Pragst, Ingo; Zuraw, Bruce L
2017-03-23
Hereditary angioedema is a disabling, potentially fatal condition caused by deficiency (type I) or dysfunction (type II) of the C1 inhibitor protein. In a phase 2 trial, the use of CSL830, a nanofiltered C1 inhibitor preparation that is suitable for subcutaneous injection, resulted in functional levels of C1 inhibitor activity that would be expected to provide effective prophylaxis of attacks. We conducted an international, prospective, multicenter, randomized, double-blind, placebo-controlled, dose-ranging, phase 3 trial to evaluate the efficacy and safety of self-administered subcutaneous CSL830 in patients with type I or type II hereditary angioedema who had had four or more attacks in a consecutive 2-month period within 3 months before screening. We randomly assigned the patients to one of four treatment sequences in a crossover design, each involving two 16-week treatment periods: either 40 IU or 60 IU of CSL830 per kilogram of body weight twice weekly followed by placebo, or vice versa. The primary efficacy end point was the number of attacks of angioedema. Secondary efficacy end points were the proportion of patients who had a response (≥50% reduction in the number of attacks with CSL830 as compared with placebo) and the number of times that rescue medication was used. Of the 90 patients who underwent randomization, 79 completed the trial. Both doses of CSL830, as compared with placebo, reduced the rate of attacks of hereditary angioedema (mean difference with 40 IU, -2.42 attacks per month; 95% confidence interval [CI], -3.38 to -1.46; and mean difference with 60 IU, -3.51 attacks per month; 95% CI, -4.21 to -2.81; P<0.001 for both comparisons). Response rates were 76% (95% CI, 62 to 87) in the 40-IU group and 90% (95% CI, 77 to 96) in the 60-IU group. The need for rescue medication was reduced from 5.55 uses per month in the placebo group to 1.13 uses per month in the 40-IU group and from 3.89 uses in the placebo group to 0.32 uses per month in the 60-IU group. Adverse events (most commonly mild and transient local site reactions) occurred in similar proportions of patients who received CSL830 and those who received placebo. In patients with hereditary angioedema, the prophylactic use of a subcutaneous C1 inhibitor twice weekly significantly reduced the frequency of acute attacks. (Funded by CSL Behring; COMPACT EudraCT number, 2013-000916-10 , and ClinicalTrials.gov number, NCT01912456 .).
Re-Engineering the United States Marine Corps’ Enlisted Assignment Model (EAM)
1998-06-01
and Execution button opens the switchboard in Figure 12. This form accesses all of the VBA code that is associated with this form and the code that...the prototype to prompt the user and to inform him of what he is about to do. Each of the buttons that are on these forms is connected to an SQL ...into the field for building a rule are the values 2;3;4;5;6;7. The user can enter an SQL statement that would determine the values or the user could
Virtual file system on NoSQL for processing high volumes of HL7 messages.
Kimura, Eizen; Ishihara, Ken
2015-01-01
The Standardized Structured Medical Information Exchange (SS-MIX) is intended to be the standard repository for HL7 messages that depend on a local file system. However, its scalability is limited. We implemented a virtual file system using NoSQL to incorporate modern computing technology into SS-MIX and allow the system to integrate local patient IDs from different healthcare systems into a universal system. We discuss its implementation using the database MongoDB and describe its performance in a case study.
Software Security Knowledge: CWE. Knowing What Could Make Software Vulnerable to Attack
2011-05-01
shall be subject to a penalty for failing to comply with a collection of information if it does not display a currently valid OMB control number. 1...Buffer • CWE-642: External Control of Critical State Data • CWE-73: External Control of File Name or Path • CWE-426: Untrusted Search Path • CWE...94: Failure to Control Generation of Code (aka ’Code Injection’) • CWE-494: Download of Code Without Integrity Check • CWE-404: Improper Resource
Process of afterburning combustible constituents of exhaust gases from rotary kilns
DOE Office of Scientific and Technical Information (OSTI.GOV)
Schnabel, W.; Scheu, E.; Serbent, H.
1984-03-13
In order to avoid incrustation and an excessively strong thermal attack on the afterburning chamber, the exhaust gases which contain gaseous and solid constituents which are combustible are afterburned in a plurality of stages, which are connected in series. The rate at which oxygen is supplied to each stage is so controlled that part of the combustible constituents is afterburned in each stage. The gas which is about to enter each succeeding stage is cooled by injected water.
Lee, Kyungmin; Chung, Heeyoung; Park, Youngsuk
2014-01-01
Purpose To determine if short term effects of intravitreal anti-vascular endothelial growth factor or steroid injection are correlated with fluid turbidity, as detected by spectral domain optical coherence tomography (SD-OCT) in diabetic macular edema (DME) patients. Methods A total of 583 medical records were reviewed and 104 cases were enrolled. Sixty eyes received a single intravitreal bevacizumab injection (IVB) on the first attack of DME and 44 eyes received triamcinolone acetonide treatment (IVTA). Intraretinal fluid turbidity in DME patients was estimated with initialintravitreal SD-OCT and analyzed with color histograms from a Photoshop program. Central macular thickness and visual acuity using a logarithm from the minimum angle of resolution chart, were assessed at the initial period and 2 months after injections. Results Visual acuity and central macular thickness improved after injections in both groups. In the IVB group, visual acuity and central macular thickness changed less as the intraretinal fluid became more turbid. In the IVTA group, visual acuity underwent less change while central macular thickness had a greater reduction (r = -0.675, p = 0.001) as the intraretinal fluid was more turbid. Conclusions IVB and IVTA injections were effective in reducing central macular thickness and improving visual acuity in DME patients. Further, fluid turbidity, which was detected by SD-OCT may be one of the indexes that highlight the influence of the steroid-dependent pathogenetic mechanism. PMID:25120338
Lee, Kyungmin; Chung, Heeyoung; Park, Youngsuk; Sohn, Joonhong
2014-08-01
To determine if short term effects of intravitreal anti-vascular endothelial growth factor or steroid injection are correlated with fluid turbidity, as detected by spectral domain optical coherence tomography (SD-OCT) in diabetic macular edema (DME) patients. A total of 583 medical records were reviewed and 104 cases were enrolled. Sixty eyes received a single intravitreal bevacizumab injection (IVB) on the first attack of DME and 44 eyes received triamcinolone acetonide treatment (IVTA). Intraretinal fluid turbidity in DME patients was estimated with initial intravitreal SD-OCT and analyzed with color histograms from a Photoshop program. Central macular thickness and visual acuity using a logarithm from the minimum angle of resolution chart, were assessed at the initial period and 2 months after injections. Visual acuity and central macular thickness improved after injections in both groups. In the IVB group, visual acuity and central macular thickness changed less as the intraretinal fluid became more turbid. In the IVTA group, visual acuity underwent less change while central macular thickness had a greater reduction (r = -0.675, p = 0.001) as the intraretinal fluid was more turbid. IVB and IVTA injections were effective in reducing central macular thickness and improving visual acuity in DME patients. Further, fluid turbidity, which was detected by SD-OCT may be one of the indexes that highlight the influence of the steroid-dependent pathogenetic mechanism.
Monitoring of IaaS and scientific applications on the Cloud using the Elasticsearch ecosystem
NASA Astrophysics Data System (ADS)
Bagnasco, S.; Berzano, D.; Guarise, A.; Lusso, S.; Masera, M.; Vallero, S.
2015-05-01
The private Cloud at the Torino INFN computing centre offers IaaS services to different scientific computing applications. The infrastructure is managed with the OpenNebula cloud controller. The main stakeholders of the facility are a grid Tier-2 site for the ALICE collaboration at LHC, an interactive analysis facility for the same experiment and a grid Tier-2 site for the BES-III collaboration, plus an increasing number of other small tenants. Besides keeping track of the usage, the automation of dynamic allocation of resources to tenants requires detailed monitoring and accounting of the resource usage. As a first investigation towards this, we set up a monitoring system to inspect the site activities both in terms of IaaS and applications running on the hosted virtual instances. For this purpose we used the Elasticsearch, Logstash and Kibana stack. In the current implementation, the heterogeneous accounting information is fed to different MySQL databases and sent to Elasticsearch via a custom Logstash plugin. For the IaaS metering, we developed sensors for the OpenNebula API. The IaaS level information gathered through the API is sent to the MySQL database through an ad-hoc developed RESTful web service, which is also used for other accounting purposes. Concerning the application level, we used the Root plugin TProofMonSenderSQL to collect accounting data from the interactive analysis facility. The BES-III virtual instances used to be monitored with Zabbix, as a proof of concept we also retrieve the information contained in the Zabbix database. Each of these three cases is indexed separately in Elasticsearch. We are now starting to consider dismissing the intermediate level provided by the SQL database and evaluating a NoSQL option as a unique central database for all the monitoring information. We setup a set of Kibana dashboards with pre-defined queries in order to monitor the relevant information in each case. In this way we have achieved a uniform monitoring interface for both the IaaS and the scientific applications, mostly leveraging off-the-shelf tools.
"Science SQL" as a Building Block for Flexible, Standards-based Data Infrastructures
NASA Astrophysics Data System (ADS)
Baumann, Peter
2016-04-01
We have learnt to live with the pain of separating data and metadata into non-interoperable silos. For metadata, we enjoy the flexibility of databases, be they relational, graph, or some other NoSQL. Contrasting this, users still "drown in files" as an unstructured, low-level archiving paradigm. It is time to bridge this chasm which once was technologically induced, but today can be overcome. One building block towards a common re-integrated information space is to support massive multi-dimensional spatio-temporal arrays. These "datacubes" appear as sensor, image, simulation, and statistics data in all science and engineering domains, and beyond. For example, 2-D satellilte imagery, 2-D x/y/t image timeseries and x/y/z geophysical voxel data, and 4-D x/y/z/t climate data contribute to today's data deluge in the Earth sciences. Virtual observatories in the Space sciences routinely generate Petabytes of such data. Life sciences deal with microarray data, confocal microscopy, human brain data, which all fall into the same category. The ISO SQL/MDA (Multi-Dimensional Arrays) candidate standard is extending SQL with modelling and query support for n-D arrays ("datacubes") in a flexible, domain-neutral way. This heralds a new generation of services with new quality parameters, such as flexibility, ease of access, embedding into well-known user tools, and scalability mechanisms that remain completely transparent to users. Technology like the EU rasdaman ("raster data manager") Array Database system can support all of the above examples simultaneously, with one technology. This is practically proven: As of today, rasdaman is in operational use on hundreds of Terabytes of satellite image timeseries datacubes, with transparent query distribution across more than 1,000 nodes. Therefore, Array Databases offering SQL/MDA constitute a natural common building block for next-generation data infrastructures. Being initiator and editor of the standard we present principles, implementation facets, and application examples as a basis for further discussion. Further, we highlight recent implementation progress in parallelization, data distribution, and query optimization showing their effects on real-life use cases.
Gharibi Loron, Ali; Sardari, Soroush; Narenjkar, Jamshid; Sayyah, Mohammad
2017-01-01
Resistance to antiepileptic drugs and the intolerability in 20-30% of the patients raises demand for developing new drugs with improved efficacy and safety. Acceptable anticonvulsant activity, good tolerability, and inexpensiveness of docosahexaenoic acid (DHA) make it as a good candidate for designing and development of the new anticonvulsant medications. Ten DHA-based molecules were screened based on in silico screening of DHA-like molecules by root-mean-square deviation of atomic positions, the biological activity score of Professional Association for SQL Server, and structural requirements suggested by pharmacophore design. Anticonvulsant activity was tested against clonic seizures induced by pentylenetetrazole (PTZ, 60 mg/kg, i.p.) and tonic seizures induced by maximal electroshock (MES, 50 mA, 50 Hz, 1 ms duration) by intracerebroventricular (i.c.v.) injection of the screened compounds to mice. Among screened compounds, 4-Phenylbutyric acid, 4-Biphenylacetic acid, phenylacetic acid, and 2-Phenylbutyric acid showed significant protective activity in pentylenetetrazole test with ED50 values of 4, 5, 78, and 70 mM, respectively. In MES test, shikimic acid and 4-tert-Butylcyclo-hexanecarboxylic acid showed significant activity with ED50 values 29 and 637 mM, respectively. Effective compounds had no mortality in mice up to the maximum i.c.v. injectable dose of 1 mM. Common electrochemical features and three-dimensional spatial structures of the effective compounds suggest the involvement of the anticonvulsant mechanisms similar to the parent compound DHA.
Loron, Ali Gharibi; Sardari, Soroush; Narenjkar, Jamshid; Sayyah, Mohammad
2017-01-01
Background: Resistance to antiepileptic drugs and the intolerability in 20-30% of the patients raises demand for developing new drugs with improved efficacy and safety. Acceptable anticonvulsant activity, good tolerability, and inexpensiveness of docosahexaenoic acid (DHA) make it as a good candidate for designing and development of the new anticonvulsant medications. Methods: Ten DHA-based molecules were screened based on in silico screening of DHA-like molecules by root-mean-square deviation of atomic positions, the biological activity score of Professional Association for SQL Server, and structural requirements suggested by pharmacophore design. Anticonvulsant activity was tested against clonic seizures induced by pentylenetetrazole (PTZ, 60 mg/kg, i.p.) and tonic seizures induced by maximal electroshock (MES, 50 mA, 50 Hz, 1 ms duration) by intracerebroventricular (i.c.v.) injection of the screened compounds to mice. Results: Among screened compounds, 4-Phenylbutyric acid, 4-Biphenylacetic acid, phenylacetic acid, and 2-Phenylbutyric acid showed significant protective activity in pentylenetetrazole test with ED50 values of 4, 5, 78, and 70 mM, respectively. In MES test, shikimic acid and 4-tert-Butylcyclo-hexanecarboxylic acid showed significant activity with ED50 values 29 and 637 mM, respectively. Effective compounds had no mortality in mice up to the maximum i.c.v. injectable dose of 1 mM. Conclusion: Common electrochemical features and three-dimensional spatial structures of the effective compounds suggest the involvement of the anticonvulsant mechanisms similar to the parent compound DHA. PMID:27592363
Agile Datacube Analytics (not just) for the Earth Sciences
NASA Astrophysics Data System (ADS)
Misev, Dimitar; Merticariu, Vlad; Baumann, Peter
2017-04-01
Metadata are considered small, smart, and queryable; data, on the other hand, are known as big, clumsy, hard to analyze. Consequently, gridded data - such as images, image timeseries, and climate datacubes - are managed separately from the metadata, and with different, restricted retrieval capabilities. One reason for this silo approach is that databases, while good at tables, XML hierarchies, RDF graphs, etc., traditionally do not support multi-dimensional arrays well. This gap is being closed by Array Databases which extend the SQL paradigm of "any query, anytime" to NoSQL arrays. They introduce semantically rich modelling combined with declarative, high-level query languages on n-D arrays. On Server side, such queries can be optimized, parallelized, and distributed based on partitioned array storage. This way, they offer new vistas in flexibility, scalability, performance, and data integration. In this respect, the forthcoming ISO SQL extension MDA ("Multi-dimensional Arrays") will be a game changer in Big Data Analytics. We introduce concepts and opportunities through the example of rasdaman ("raster data manager") which in fact has pioneered the field of Array Databases and forms the blueprint for ISO SQL/MDA and further Big Data standards, such as OGC WCPS for querying spatio-temporal Earth datacubes. With operational installations exceeding 140 TB queries have been split across more than one thousand cloud nodes, using CPUs as well as GPUs. Installations can easily be mashed up securely, enabling large-scale location-transparent query processing in federations. Federation queries have been demonstrated live at EGU 2016 spanning Europe and Australia in the context of the intercontinental EarthServer initiative, visualized through NASA WorldWind.
Agile Datacube Analytics (not just) for the Earth Sciences
NASA Astrophysics Data System (ADS)
Baumann, P.
2016-12-01
Metadata are considered small, smart, and queryable; data, on the other hand, are known as big, clumsy, hard to analyze. Consequently, gridded data - such as images, image timeseries, and climate datacubes - are managed separately from the metadata, and with different, restricted retrieval capabilities. One reason for this silo approach is that databases, while good at tables, XML hierarchies, RDF graphs, etc., traditionally do not support multi-dimensional arrays well.This gap is being closed by Array Databases which extend the SQL paradigm of "any query, anytime" to NoSQL arrays. They introduce semantically rich modelling combined with declarative, high-level query languages on n-D arrays. On Server side, such queries can be optimized, parallelized, and distributed based on partitioned array storage. This way, they offer new vistas in flexibility, scalability, performance, and data integration. In this respect, the forthcoming ISO SQL extension MDA ("Multi-dimensional Arrays") will be a game changer in Big Data Analytics.We introduce concepts and opportunities through the example of rasdaman ("raster data manager") which in fact has pioneered the field of Array Databases and forms the blueprint for ISO SQL/MDA and further Big Data standards, such as OGC WCPS for querying spatio-temporal Earth datacubes. With operational installations exceeding 140 TB queries have been split across more than one thousand cloud nodes, using CPUs as well as GPUs. Installations can easily be mashed up securely, enabling large-scale location-transparent query processing in federations. Federation queries have been demonstrated live at EGU 2016 spanning Europe and Australia in the context of the intercontinental EarthServer initiative, visualized through NASA WorldWind.
Improving Broadband Displacement Detection with Quantum Correlations
NASA Astrophysics Data System (ADS)
Kampel, N. S.; Peterson, R. W.; Fischer, R.; Yu, P.-L.; Cicak, K.; Simmonds, R. W.; Lehnert, K. W.; Regal, C. A.
2017-04-01
Interferometers enable ultrasensitive measurement in a wide array of applications from gravitational wave searches to force microscopes. The role of quantum mechanics in the metrological limits of interferometers has a rich history, and a large number of techniques to surpass conventional limits have been proposed. In a typical measurement configuration, the trade-off between the probe's shot noise (imprecision) and its quantum backaction results in what is known as the standard quantum limit (SQL). In this work, we investigate how quantum correlations accessed by modifying the readout of the interferometer can access physics beyond the SQL and improve displacement sensitivity. Specifically, we use an optical cavity to probe the motion of a silicon nitride membrane off mechanical resonance, as one would do in a broadband displacement or force measurement, and observe sensitivity better than the SQL dictates for our quantum efficiency. Our measurement illustrates the core idea behind a technique known as variational readout, in which the optical readout quadrature is changed as a function of frequency to improve broadband displacement detection. And, more generally, our result is a salient example of how correlations can aid sensing in the presence of backaction.
Experience with ATLAS MySQL PanDA database service
NASA Astrophysics Data System (ADS)
Smirnov, Y.; Wlodek, T.; De, K.; Hover, J.; Ozturk, N.; Smith, J.; Wenaus, T.; Yu, D.
2010-04-01
The PanDA distributed production and analysis system has been in production use for ATLAS data processing and analysis since late 2005 in the US, and globally throughout ATLAS since early 2008. Its core architecture is based on a set of stateless web services served by Apache and backed by a suite of MySQL databases that are the repository for all PanDA information: active and archival job queues, dataset and file catalogs, site configuration information, monitoring information, system control parameters, and so on. This database system is one of the most critical components of PanDA, and has successfully delivered the functional and scaling performance required by PanDA, currently operating at a scale of half a million jobs per week, with much growth still to come. In this paper we describe the design and implementation of the PanDA database system, its architecture of MySQL servers deployed at BNL and CERN, backup strategy and monitoring tools. The system has been developed, thoroughly tested, and brought to production to provide highly reliable, scalable, flexible and available database services for ATLAS Monte Carlo production, reconstruction and physics analysis.
Survey data and metadata modelling using document-oriented NoSQL
NASA Astrophysics Data System (ADS)
Rahmatuti Maghfiroh, Lutfi; Gusti Bagus Baskara Nugraha, I.
2018-03-01
Survey data that are collected from year to year have metadata change. However it need to be stored integratedly to get statistical data faster and easier. Data warehouse (DW) can be used to solve this limitation. However there is a change of variables in every period that can not be accommodated by DW. Traditional DW can not handle variable change via Slowly Changing Dimension (SCD). Previous research handle the change of variables in DW to manage metadata by using multiversion DW (MVDW). MVDW is designed using relational model. Some researches also found that developing nonrelational model in NoSQL database has reading time faster than the relational model. Therefore, we propose changes to metadata management by using NoSQL. This study proposes a model DW to manage change and algorithms to retrieve data with metadata changes. Evaluation of the proposed models and algorithms result in that database with the proposed design can retrieve data with metadata changes properly. This paper has contribution in comprehensive data analysis with metadata changes (especially data survey) in integrated storage.
Efficient data management tools for the heterogeneous big data warehouse
NASA Astrophysics Data System (ADS)
Alekseev, A. A.; Osipova, V. V.; Ivanov, M. A.; Klimentov, A.; Grigorieva, N. V.; Nalamwar, H. S.
2016-09-01
The traditional RDBMS has been consistent for the normalized data structures. RDBMS served well for decades, but the technology is not optimal for data processing and analysis in data intensive fields like social networks, oil-gas industry, experiments at the Large Hadron Collider, etc. Several challenges have been raised recently on the scalability of data warehouse like workload against the transactional schema, in particular for the analysis of archived data or the aggregation of data for summary and accounting purposes. The paper evaluates new database technologies like HBase, Cassandra, and MongoDB commonly referred as NoSQL databases for handling messy, varied and large amount of data. The evaluation depends upon the performance, throughput and scalability of the above technologies for several scientific and industrial use-cases. This paper outlines the technologies and architectures needed for processing Big Data, as well as the description of the back-end application that implements data migration from RDBMS to NoSQL data warehouse, NoSQL database organization and how it could be useful for further data analytics.
Supraventricular tachycardia after fenoterol inhalation: report of two cases.
Hung, Yu-Fa; Yang, Winnie; Chang, Mei-Ling
2003-01-01
Supraventricular tachycardia (SVT) following fenoterol inhalation in metered-dose inhaler (MDI) has never been reported. We report two cases of SVT after fenoterol inhalation in MDI. Case one was a 4-year-old boy who had asthma since early childhood. Paroxysmal supraventricular tachycardia (PSVT) was found after fenoterol inhalation (MDI), which returned to normal sinus rhythm following adenosine injection. The other one was a 9-year-old male who also had asthma since early childhood. He suffered from attacks of PSVT four times after fenoterol inhalation within one year. After verapamil injection and vagal maneuvers, PSVT was converted to normal sinus rhythm. There were no other episodes of SVT after discontinuing usage of fenoterol inhalation for 2 years in the follow-up. We report these two cases to remind pediatricians that cardiac arrhythmias should be evaluated following fenoterol inhalation (MDI).
Phase-Space Detection of Cyber Events
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hernandez Jimenez, Jarilyn M; Ferber, Aaron E; Prowell, Stacy J
Energy Delivery Systems (EDS) are a network of processes that produce, transfer and distribute energy. EDS are increasingly dependent on networked computing assets, as are many Industrial Control Systems. Consequently, cyber-attacks pose a real and pertinent threat, as evidenced by Stuxnet, Shamoon and Dragonfly. Hence, there is a critical need for novel methods to detect, prevent, and mitigate effects of such attacks. To detect cyber-attacks in EDS, we developed a framework for gathering and analyzing timing data that involves establishing a baseline execution profile and then capturing the effect of perturbations in the state from injecting various malware. The datamore » analysis was based on nonlinear dynamics and graph theory to improve detection of anomalous events in cyber applications. The goal was the extraction of changing dynamics or anomalous activity in the underlying computer system. Takens' theorem in nonlinear dynamics allows reconstruction of topologically invariant, time-delay-embedding states from the computer data in a sufficiently high-dimensional space. The resultant dynamical states were nodes, and the state-to-state transitions were links in a mathematical graph. Alternatively, sequential tabulation of executing instructions provides the nodes with corresponding instruction-to-instruction links. Graph theorems guarantee graph-invariant measures to quantify the dynamical changes in the running applications. Results showed a successful detection of cyber events.« less
A System for Web-based Access to the HSOS Database
NASA Astrophysics Data System (ADS)
Lin, G.
Huairou Solar Observing Station's (HSOS) magnetogram and dopplergram are world-class instruments. Access to their data has opened to the world. Web-based access to the data will provide a powerful, convenient tool for data searching and solar physics. It is necessary that our data be provided to users via the Web when it is opened to the world. In this presentation, the author describes general design and programming construction of the system. The system will be generated by PHP and MySQL. The author also introduces basic feature of PHP and MySQL.
Optical levitation of a mirror for reaching the standard quantum limit.
Michimura, Yuta; Kuwahara, Yuya; Ushiba, Takafumi; Matsumoto, Nobuyuki; Ando, Masaki
2017-06-12
We propose a new method to optically levitate a macroscopic mirror with two vertical Fabry-Pérot cavities linearly aligned. This configuration gives the simplest possible optical levitation in which the number of laser beams used is the minimum of two. We demonstrate that reaching the standard quantum limit (SQL) of a displacement measurement with our system is feasible with current technology. The cavity geometry and the levitated mirror parameters are designed to ensure that the Brownian vibration of the mirror surface is smaller than the SQL. Our scheme provides a promising tool for testing macroscopic quantum mechanics.
Optical levitation of a mirror for reaching the standard quantum limit
NASA Astrophysics Data System (ADS)
Michimura, Yuta; Kuwahara, Yuya; Ushiba, Takafumi; Matsumoto, Nobuyuki; Ando, Masaki
2017-06-01
We propose a new method to optically levitate a macroscopic mirror with two vertical Fabry-P{\\'e}rot cavities linearly aligned. This configuration gives the simplest possible optical levitation in which the number of laser beams used is the minimum of two. We demonstrate that reaching the standard quantum limit (SQL) of a displacement measurement with our system is feasible with current technology. The cavity geometry and the levitated mirror parameters are designed to ensure that the Brownian vibration of the mirror surface is smaller than the SQL. Our scheme provides a promising tool for testing macroscopic quantum mechanics.
Rodrigo, Sander F; van Ramshorst, Jan; Hoogslag, Georgette E; Boden, Helèn; Velders, Matthijs A; Cannegieter, Suzanne C; Roelofs, Helene; Al Younis, Imad; Dibbets-Schneider, Petra; Fibbe, Willem E; Zwaginga, Jaap Jan; Bax, Jeroen J; Schalij, Martin J; Beeres, Saskia L; Atsma, Douwe E
2013-10-01
In experimental studies, mesenchymal stem cell (MSC) transplantation in acute myocardial infarction (AMI) models has been associated with enhanced neovascularization and myogenesis. Clinical data however, are scarce. Therefore, the present study evaluates the safety and feasibility of intramyocardial MSC injection in nine patients, shortly after AMI during short-term and 5-year follow-up. Periprocedural safety analysis demonstrated one transient ischemic attack. No other adverse events related to MSC treatment were observed during 5-year follow-up. Clinical events were compared to a nonrandomized control group comprising 45 matched controls. A 5-year event-free survival after MSC-treatment was comparable to controls (89 vs. 91 %, P = 0.87). Echocardiographic imaging for evaluation of left ventricular function demonstrated improvements up to 5 years after MSC treatment. These findings were not significantly different when compared to controls. The present safety and feasibility study suggest that intramyocardial injection of MSC in patients shortly after AMI is feasible and safe up to 5-year follow-up.
Orthos, an alarm system for the ALICE DAQ operations
NASA Astrophysics Data System (ADS)
Chapeland, Sylvain; Carena, Franco; Carena, Wisla; Chibante Barroso, Vasco; Costa, Filippo; Denes, Ervin; Divia, Roberto; Fuchs, Ulrich; Grigore, Alexandru; Simonetti, Giuseppe; Soos, Csaba; Telesca, Adriana; Vande Vyvre, Pierre; von Haller, Barthelemy
2012-12-01
ALICE (A Large Ion Collider Experiment) is the heavy-ion detector studying the physics of strongly interacting matter and the quark-gluon plasma at the CERN LHC (Large Hadron Collider). The DAQ (Data Acquisition System) facilities handle the data flow from the detectors electronics up to the mass storage. The DAQ system is based on a large farm of commodity hardware consisting of more than 600 devices (Linux PCs, storage, network switches), and controls hundreds of distributed hardware and software components interacting together. This paper presents Orthos, the alarm system used to detect, log, report, and follow-up abnormal situations on the DAQ machines at the experimental area. The main objective of this package is to integrate alarm detection and notification mechanisms with a full-featured issues tracker, in order to prioritize, assign, and fix system failures optimally. This tool relies on a database repository with a logic engine, SQL interfaces to inject or query metrics, and dynamic web pages for user interaction. We describe the system architecture, the technologies used for the implementation, and the integration with existing monitoring tools.
NASA Astrophysics Data System (ADS)
Timoshevskiy, M. V.; Zapryagaev, I. I.; Pervunin, K. S.; Markovich, D. M.
2016-10-01
In the paper, the possibility of active control of a cavitating flow over a 2D hydrofoil that replicates a scaled-down model of high-pressure hydroturbine guide vane (GV) was tested. The flow manipulation was implemented by a continuous tangential liquid injection at different flow rates through a spanwise slot in the foil surface. In experiments, the hydrofoil was placed in the test channel at the attack angle of 9°. Different cavitation conditions were reached by varying the cavitation number and injection velocity. In order to study time dynamics and spatial patterns of partial cavities, high-speed imaging was employed. A PIV method was used to measure the mean and fluctuating velocity fields over the hydrofoil. Hydroacoustic measurements were carried out by means of a pressure transducer to identify spectral characteristics of the cavitating flow. It was found that the present control technique is able to modify the partial cavity pattern (or even totally suppress cavitation) in case of stable sheet cavitation and change the amplitude of pressure pulsations at unsteady regimes. The injection technique makes it also possible to significantly influence the spatial distributions of the mean velocity and its turbulent fluctuations over the GV section for non-cavitating flow and sheet cavitation.
Cooley, Mary E; Nayak, Manan M; Abrahm, Janet L; Braun, Ilana M; Rabin, Michael S; Brzozowski, Jane; Lathan, Christopher; Berry, Donna L
2017-08-01
Adequate symptom and quality-of-life (SQL) management is a priority during cancer treatment. eHealth is a timely way to enhance patient-engagement, facilitate communication, and improve health outcomes. The objectives of this study were to describe patient and caregivers' perspectives for providing, processing, and managing SQL data to enhance communication and identify desired components for decision support. Data were collected from 64 participants through questionnaires and focus groups. Analysis was conducted using NVivo. Open and axial coding was completed, grouping commonalities and large constructs into nodes to identify and synthesize themes. Face-to-face meetings with clinicians were the prime time to communicate, and patients strove to understand treatment options and the effect on SQL by bringing caregivers to their visits, taking notes, tracking symptoms, and creating portable health records. Patients/caregivers struggled to self-manage their symptoms and were uncertain when to contact clinicians when experiencing uncontrolled symptoms. Most participants identified eHealth solutions for decision support. However, 38% of participants (n = 24) rarely used computers and identified non-eHealth options for decision support. Core components for both eHealth and non-eHealth systems were access to (1) cancer information, (2) medical records, (3) peer support, and (4) improved support and understanding on when to contact clinicians. Patients were faced with an overwhelming amount of information and relied on their caregivers to help navigate the complexities of cancer care and self-manage SQL. Health technologies can provide informational support; however, decision support needs to span multiple venues to avoid increasing disparities caused by a digital divide. Copyright © 2017 John Wiley & Sons, Ltd.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Roberts, D
Purpose: A unified database system was developed to allow accumulation, review and analysis of quality assurance (QA) data for measurement, treatment, imaging and simulation equipment in our department. Recording these data in a database allows a unified and structured approach to review and analysis of data gathered using commercial database tools. Methods: A clinical database was developed to track records of quality assurance operations on linear accelerators, a computed tomography (CT) scanner, high dose rate (HDR) afterloader and imaging systems such as on-board imaging (OBI) and Calypso in our department. The database was developed using Microsoft Access database and visualmore » basic for applications (VBA) programming interface. Separate modules were written for accumulation, review and analysis of daily, monthly and annual QA data. All modules were designed to use structured query language (SQL) as the basis of data accumulation and review. The SQL strings are dynamically re-written at run time. The database also features embedded documentation, storage of documents produced during QA activities and the ability to annotate all data within the database. Tests are defined in a set of tables that define test type, specific value, and schedule. Results: Daily, Monthly and Annual QA data has been taken in parallel with established procedures to test MQA. The database has been used to aggregate data across machines to examine the consistency of machine parameters and operations within the clinic for several months. Conclusion: The MQA application has been developed as an interface to a commercially available SQL engine (JET 5.0) and a standard database back-end. The MQA system has been used for several months for routine data collection.. The system is robust, relatively simple to extend and can be migrated to a commercial SQL server.« less
An SQL query generator for CLIPS
NASA Technical Reports Server (NTRS)
Snyder, James; Chirica, Laurian
1990-01-01
As expert systems become more widely used, their access to large amounts of external information becomes increasingly important. This information exists in several forms such as statistical, tabular data, knowledge gained by experts and large databases of information maintained by companies. Because many expert systems, including CLIPS, do not provide access to this external information, much of the usefulness of expert systems is left untapped. The scope of this paper is to describe a database extension for the CLIPS expert system shell. The current industry standard database language is SQL. Due to SQL standardization, large amounts of information stored on various computers, potentially at different locations, will be more easily accessible. Expert systems should be able to directly access these existing databases rather than requiring information to be re-entered into the expert system environment. The ORACLE relational database management system (RDBMS) was used to provide a database connection within the CLIPS environment. To facilitate relational database access a query generation system was developed as a CLIPS user function. The queries are entered in a CLlPS-like syntax and are passed to the query generator, which constructs and submits for execution, an SQL query to the ORACLE RDBMS. The query results are asserted as CLIPS facts. The query generator was developed primarily for use within the ICADS project (Intelligent Computer Aided Design System) currently being developed by the CAD Research Unit in the California Polytechnic State University (Cal Poly). In ICADS, there are several parallel or distributed expert systems accessing a common knowledge base of facts. Expert system has a narrow domain of interest and therefore needs only certain portions of the information. The query generator provides a common method of accessing this information and allows the expert system to specify what data is needed without specifying how to retrieve it.
Talmadge, J E; Talmadge, C B; Zbar, B; McEwen, R; Meeker, A K; Tribble, H
1987-06-01
The mechanism by which tumor allografts escape host immunologic attack was investigated. B16-BL6 cells (the bladder 6 subline of the B16 melanoma) (H-2b) were transfected with a gene (Dd) encoding an allogeneic class I major histocompatibility complex antigen. Clones that expressed Dd antigen were injected into the footpads of nonimmune syngeneic mice, syngeneic immune mice, and nude mice. Under conditions of immunologic selection a clone that contained multiple copies of the transfected gene formed variants that lacked the transfected gene. Primary tumors and pulmonary metastases of immunized mice and pulmonary metastases of nonimmunized mice had lost the Dd gene and, in most cases, all of the associated plasmid. In contrast, in immunodeficient nude mice, primary tumors and pulmonary metastases retained the Dd gene and the associated plasmid. Deletion of genes encoding cell surface antigens may be one of the mechanisms by which allogeneic tumors escape immunologic attack.
Laparoendoscopic transgastric histoacryl injection of gastric varices: a new surgical approach.
Kassem, Mohamed I; El-Haddad, Hani M; El-Bahrawi, Hassan A
2013-02-01
Gastric varices (GVs) are a common finding in Egyptian patients with portal hypertension due to cirrhosis or schistosomal hepatic fibrosis. These patients present with an acute attack or history of hematemesis. Endoscopic histoacryl injection is the standard treatment in Egypt; however, because of technical difficulties it is possible to inject only a little amount of this material, as it may endanger the channels of the flexible endoscope. We thought of a new surgical laparoendoscopic technique to obviate the need for repeated endoscopies and complete obliteration of GVs. This study was conducted on 20 patients with portal hypertension and GVs. After the patient was placed under general anesthesia, a small gastrostomy was done in the anterior gastric wall through which a 10-mm trocar was inserted for the laparoscopic camera. Injection of GVs was done via a spinal needle or a central venous line needle inserted directly. Injection of an adequate amount of histoacryl was done under direct vision. This study was conducted from July 2009 to August 2011 on 20 patients with GVs. The age range was from 22 to 56 years, with a mean age of 39.8±7.85 years. There were 14 men (70%) and 6 women (30%). Fourteen patients (70%) showed complete obliteration of GVs after one session of treatment, whereas 6 patients (30%) had unsatisfactory results and were subjected to another session. GVs were completely obliterated after the second session in 4 patients. Two cases of recurrence of GVs were operated on. This new technique enabled us to inject GVs with a suitable amount of glue material under direct vision without harming the endoscope. Use of this procedure is recommended in patients fit for surgery and those who had failed endoscopic injection sclerotherapy.
Laboratory Investigation of a Leaking Type 316 Socket Weld in a Boron Injection Tank Sampling Line
NASA Astrophysics Data System (ADS)
Xu, Hongqing; Fyfitch, Steve; Hosier, Ryan; Hyres, James
A leak was discovered in a Type 316 stainless steel socket weld in the sampling line for the boron injection tank. A section of the pipeline containing the leaking weld was removed for laboratory investigation that included visual and Stereovisual inspections, liquid penetrant (PT) testing, metallography, scanning electron microscopy (SEM), energy dispersive spectroscopy (EDS), and ferrite content determinations. The leak path was a through-wall transgranular crack in the socket weld. Cracking initiated along the weld-metal-to-base-metal interface at the tip of the crevice between the socket and pipe. The crevice was exposed to oxygenated boron solution at <180°F. Shallow intergranular attack (IGA) was found in the exposed base metal inside the crevice. Based on the investigation results, it was concluded that transgranular stress corrosion cracking (TGSCC) is the primary cracking mechanism.
Mechanism of demyelination after HSV type I intraocular injection in rabbits.
Narang, H K
1980-02-01
Intraocular injection of herpes simplex virus (HSV) type I into the vitreous body of 18-day-old rabbits induced, on the 7th day post-inoculation, neurological signs with marked head jerking and atazia. Examination of semi-serial 1-micrometers thick sections of the whole lengths of right and left optic nerves and chiasma of 4--64 days post-inoculated rabbits revealed a small lesion, restricted to the medial side, which had extended 2--3 mm, during the first 4 days, along the optic nerve. Ahead of the developing lesion marked chromatin changes of neuroglial cells were noticed followed by cuffing of blood vessels, infiltration by macrophages, demyelination and remyelination. The present study indicated that demyelination occurred following the infection of the myelinating cells. It appeared that virus did not become latent and many cells survived the viral attack. Repeated episodies of viral activity caused further damage while repair did not keep pace.
Gaseous film cooling investigation in a multi-element splash platelet injector
NASA Astrophysics Data System (ADS)
Yin, Liang; Liu, Weiqiang
2018-03-01
Film cooling is an effective technique that protects chamber walls in rocket combustion against chemical attacks and heat fluxes. This study discusses cooling effect in a multi-element GO2/CH4 splash platelet injector. Influence parameters, such as slot height, slot number, percentage of coolant, and injection position on cooling effect, were investigated. GCH4 with 298.15 K was applied as film coolant. In the first step, slot heights of 0.2 and 0.4 mm were compared by applying a constant film mass flow rate. Temperature, CH4 mole fraction distribution, and flow field structure were obtained. The effects of slot number, percentage of coolant, and injection position on wall temperature distribution were then determined. Finally, the reasons for the low cooling efficiency were analyzed. Improvement in the method is proposed to achieve improved cooling effect for splash platelet injectors.
Nadkarni, P M
1997-08-01
Concept Locator (CL) is a client-server application that accesses a Sybase relational database server containing a subset of the UMLS Metathesaurus for the purpose of retrieval of concepts corresponding to one or more query expressions supplied to it. CL's query grammar permits complex Boolean expressions, wildcard patterns, and parenthesized (nested) subexpressions. CL translates the query expressions supplied to it into one or more SQL statements that actually perform the retrieval. The generated SQL is optimized by the client to take advantage of the strengths of the server's query optimizer, and sidesteps its weaknesses, so that execution is reasonably efficient.
Astronomical Data Processing Using SciQL, an SQL Based Query Language for Array Data
NASA Astrophysics Data System (ADS)
Zhang, Y.; Scheers, B.; Kersten, M.; Ivanova, M.; Nes, N.
2012-09-01
SciQL (pronounced as ‘cycle’) is a novel SQL-based array query language for scientific applications with both tables and arrays as first class citizens. SciQL lowers the entrance fee of adopting relational DBMS (RDBMS) in scientific domains, because it includes functionality often only found in mathematics software packages. In this paper, we demonstrate the usefulness of SciQL for astronomical data processing using examples from the Transient Key Project of the LOFAR radio telescope. In particular, how the LOFAR light-curve database of all detected sources can be constructed, by correlating sources across the spatial, frequency, time and polarisation domains.
GEOMAGIA50: An archeointensity database with PHP and MySQL
NASA Astrophysics Data System (ADS)
Korhonen, K.; Donadini, F.; Riisager, P.; Pesonen, L. J.
2008-04-01
The GEOMAGIA50 database stores 3798 archeomagnetic and paleomagnetic intensity determinations dated to the past 50,000 years. It also stores details of the measurement setup for each determination, which are used for ranking the data according to prescribed reliability criteria. The ranking system aims to alleviate the data reliability problem inherent in this kind of data. GEOMAGIA50 is based on two popular open source technologies. The MySQL database management system is used for storing the data, whereas the functionality and user interface are provided by server-side PHP scripts. This technical brief gives a detailed description of GEOMAGIA50 from a technical viewpoint.
The MAO NASU Plate Archive Database. Current Status and Perspectives
NASA Astrophysics Data System (ADS)
Pakuliak, L. K.; Sergeeva, T. P.
2006-04-01
The preliminary online version of the database of the MAO NASU plate archive is constructed on the basis of the relational database management system MySQL and permits an easy supplement of database with new collections of astronegatives, provides a high flexibility in constructing SQL-queries for data search optimization, PHP Basic Authorization protected access to administrative interface and wide range of search parameters. The current status of the database will be reported and the brief description of the search engine and means of the database integrity support will be given. Methods and means of the data verification and tasks for the further development will be discussed.
Supporting temporal queries on clinical relational databases: the S-WATCH-QL language.
Combi, C.; Missora, L.; Pinciroli, F.
1996-01-01
Due to the ubiquitous and special nature of time, specially in clinical datábases there's the need of particular temporal data and operators. In this paper we describe S-WATCH-QL (Structured Watch Query Language), a temporal extension of SQL, the widespread query language based on the relational model. S-WATCH-QL extends the well-known SQL by the addition of: a) temporal data types that allow the storage of information with different levels of granularity; b) historical relations that can store together both instantaneous valid times and intervals; c) some temporal clauses, functions and predicates allowing to define complex temporal queries. PMID:8947722
Using career ladders to motivate and retain employees: an implementation success story.
Garletts, Joseph A
2002-01-01
In October 2000, Phoenix-based Sonora Quest Laboratories, LLC (SQL), commissioned The Gelfond Group to survey SQL employees. Responding to negative survey scores, SQL developed and implemented an entry-level career ladder for line staff of the specimen management/referral testing department. The program was piloted in February 2001, and was implemented fully shortly thereafter. The ladder was designed to provide job enrichment opportunities through company-conducted training and advancement provisions. It contained requirements for productivity and quality of work performed in addition to increasingly rigorous training and competency documentation. Employees were accountable for their own advancement and for ensuring that all documentation was complete. Advancement was automatic once requirements were completed. Pay increases accompanied each advancement on a predetermined scale. At the end of 12 months, employee turnover dropped from 39% to less than 20% annually. Both productivity and morale improved, and results on a second employee survey indicated dramatic improvement in five key areas. The career ladder concept has been replicated successfully in several other departments, including phlebotomy, and a six-tiered ladder is under development for the clinical laboratory. It will encompass CLA, MLT, and MT positions from entry level to technical coordinator.
Mining the SDSS SkyServer SQL queries log
NASA Astrophysics Data System (ADS)
Hirota, Vitor M.; Santos, Rafael; Raddick, Jordan; Thakar, Ani
2016-05-01
SkyServer, the Internet portal for the Sloan Digital Sky Survey (SDSS) astronomic catalog, provides a set of tools that allows data access for astronomers and scientific education. One of SkyServer data access interfaces allows users to enter ad-hoc SQL statements to query the catalog. SkyServer also presents some template queries that can be used as basis for more complex queries. This interface has logged over 330 million queries submitted since 2001. It is expected that analysis of this data can be used to investigate usage patterns, identify potential new classes of queries, find similar queries, etc. and to shed some light on how users interact with the Sloan Digital Sky Survey data and how scientists have adopted the new paradigm of e-Science, which could in turn lead to enhancements on the user interfaces and experience in general. In this paper we review some approaches to SQL query mining, apply the traditional techniques used in the literature and present lessons learned, namely, that the general text mining approach for feature extraction and clustering does not seem to be adequate for this type of data, and, most importantly, we find that this type of analysis can result in very different queries being clustered together.
NVST Data Archiving System Based On FastBit NoSQL Database
NASA Astrophysics Data System (ADS)
Liu, Ying-bo; Wang, Feng; Ji, Kai-fan; Deng, Hui; Dai, Wei; Liang, Bo
2014-06-01
The New Vacuum Solar Telescope (NVST) is a 1-meter vacuum solar telescope that aims to observe the fine structures of active regions on the Sun. The main tasks of the NVST are high resolution imaging and spectral observations, including the measurements of the solar magnetic field. The NVST has been collecting more than 20 million FITS files since it began routine observations in 2012 and produces a maximum observational records of 120 thousand files in a day. Given the large amount of files, the effective archiving and retrieval of files becomes a critical and urgent problem. In this study, we implement a new data archiving system for the NVST based on the Fastbit Not Only Structured Query Language (NoSQL) database. Comparing to the relational database (i.e., MySQL; My Structured Query Language), the Fastbit database manifests distinctive advantages on indexing and querying performance. In a large scale database of 40 million records, the multi-field combined query response time of Fastbit database is about 15 times faster and fully meets the requirements of the NVST. Our study brings a new idea for massive astronomical data archiving and would contribute to the design of data management systems for other astronomical telescopes.
Integration in PACS of DICOM with TCP/IP, SQL, and X Windows
NASA Astrophysics Data System (ADS)
Reijns, Gerard L.
1994-05-01
The DICOM standard (Digital Imaging and Communications in Medicine) has been developed in order to obtain compatibility at the higher OSI levels. This paper describes the implementation of DICOM into our developed low cost PACS, which uses as much as possible standard software and standard protocols such as SQL, X Windows and TCP/IP. We adopted the requirement that all messages on the communication network have to be DICOM compatible. The translation between DICOM messages and SQL commands, which drive the relational data base, has been accommodated in our PACS supervisor. The translation takes only between 10 and 20 milliseconds. Images, that will be used the current day are stored in a distributed, parallel operating image base for reasons of performance. Extensive use has been made of X Windows to visualize images. A maximum of 12 images can simultaneously be displayed, of which one selected image can be manipulated (e.g., magnified, rotated, etc.), without affecting the other displayed images. The emphasis of the future work will be on performance measurements and modeling of our PACS and bringing the results of both methods in agreement with each other.
Technical Aspects of Interfacing MUMPS to an External SQL Relational Database Management System
Kuzmak, Peter M.; Walters, Richard F.; Penrod, Gail
1988-01-01
This paper describes an interface connecting InterSystems MUMPS (M/VX) to an external relational DBMS, the SYBASE Database Management System. The interface enables MUMPS to operate in a relational environment and gives the MUMPS language full access to a complete set of SQL commands. MUMPS generates SQL statements as ASCII text and sends them to the RDBMS. The RDBMS executes the statements and returns ASCII results to MUMPS. The interface suggests that the language features of MUMPS make it an attractive tool for use in the relational database environment. The approach described in this paper separates MUMPS from the relational database. Positioning the relational database outside of MUMPS promotes data sharing and permits a number of different options to be used for working with the data. Other languages like C, FORTRAN, and COBOL can access the RDBMS database. Advanced tools provided by the relational database vendor can also be used. SYBASE is an advanced high-performance transaction-oriented relational database management system for the VAX/VMS and UNIX operating systems. SYBASE is designed using a distributed open-systems architecture, and is relatively easy to interface with MUMPS.
Optimization of post-run corrections for water stable isotope measurements by laser spectroscopy
NASA Astrophysics Data System (ADS)
van Geldern, Robert; Barth, Johannes A. C.
2013-04-01
Light stable isotope analyses of hydrogen and oxygen of water are used in numerous aquatic studies from various scientific fields. The advantage of using stable isotope ratios is that water molecules serve as ubiquitous and already present natural tracers. Traditionally, the samples were analyzed in the laboratory by isotope ratio mass spectrometry (IRMS). Within recent years these analyses have been revolutionized by the development of new isotope ratio laser spectroscopy (IRIS) systems that are said to be cheaper, more robust and mobile compared to IRMS. Although easier to operate, laser systems also need thorough calibration with international reference materials and raw data need correction for analytical effects. A major issue in systems that use liquid injection via a vaporizer module is the memory effect, i.e. the carry-over from the previous analyzed sample in a sequence. This study presents an optimized and simple post-run correction procedure for liquid water injection developed for a Picarro water analyzer. The Excel(TM) template will rely exclusively on standard features implemented in MS Office without the need to run macros, additional code written in Visual Basic for Applications (VBA) or to use a database-related software such as MS Access or SQL Server. These protocols will maximize precision, accuracy and sample throughput via an efficient memory correction. The number of injections per unknown sample can be reduced to 4 or less. This procedure meets the demands of faster throughput with reduced costs per analysis. Procedures were verified by an international proficiency test and traditional IRMS techniques. The template is available free for scientific use from the corresponding author or the journals web site (van Geldern and Barth, 2012). References van Geldern, R. and Barth, J.A.C. (2012) Limnol. Oceanogr. Methods 10:1024-1036 [doi: 10.4319/lom.2012.10.1024
Hanna, C P; Tyson, J F; McIntosh, S
1993-08-01
A method has been developed for the determination of inorganic arsenic [As(III) and As(V)] and its organic metabolites (monomethylarsenic and dimethylarsenic) in urine by flow-injection hydride generation atomic absorption spectrometry. The nontoxic seafood-derived arsenobetaine and arsenocholine species were first separated by a solid-phase extraction procedure. The remaining sample was digested with a mixture of nitric and sulfuric acids and potassium dichromate, followed by attack with hydrogen peroxide. The resulting As(V) was reduced to As(III) with potassium iodide in hydrochloric acid before injection into the flow-injection manifold. The percentage analytical recoveries (mean +/- 95% confidence interval) of various arsenic species added to a urine specimen at 250 micrograms/L were 108 +/- 2, 112 +/- 11, 104 +/- 7, and 95 +/- 5 for As(III), As(V), monomethylarsenic, and dimethylarsenic, respectively. For the determination of arsenic in Standard Reference Material 2670 (toxic metals in human urine), results agreed with the certified value (480 +/- 100 micrograms/L). Analyses of samples for the Centre de Toxicologie du Quebec, containing seafood-derived species, demonstrated the viability of the separation procedure. Detection limits were between 0.1 and 0.2 microgram/L in the solution injected into the manifold, and precision at 10 micrograms/L was between 2% and 3% (CV). These preliminary results show that the method might be applicable to determinations of arsenic in a range of clinical urine specimens.
Campos, Regis Albuquerque; Valle, Solange Oliveira Rodrigues; França, Alfeu Tavares; Cordeiro, Elisabete; Serpa, Faradiba Sarquis; Mello, Yara Ferreira; Malheiros, Teresinha; Toledo, Eliana; Mansour, Elie; Fusaro, Gustavo; Grumach, Anete Sevciovic
2014-01-01
Hereditary angioedema (HAE) with C1 inhibitor deficiency manifests as recurrent episodes of edema involving the skin, upper respiratory tract and gastrointestinal tract. It can be lethal due to asphyxia. The aim here was to evaluate the response to therapy for these attacks using icatibant, an inhibitor of the bradykinin receptor, which was recently introduced into Brazil. Prospective experimental single-cohort study on the efficacy and safety of icatibant for HAE patients. Patients with a confirmed HAE diagnosis were enrolled according to symptoms and regardless of the time since onset of the attack. Icatibant was administered in accordance with the protocol that has been approved in Brazil. Symptom severity was assessed continuously and adverse events were monitored. 24 attacks in 20 HAE patients were treated (female/male 19:1; 19-55 years; median 29 years of age). The symptoms were: subcutaneous edema (22/24); abdominal pain (15/24) and upper airway obstruction (10/24). The time taken until onset of relief was: 5-10 minutes (5/24; 20.8%); 10-20 (5/24; 20.8%); 20-30 (8/24; 33.4%); 30-60 (5/24; 20.8%); and 2 hours (1/24; 4.3%). The time taken for complete resolution of symptoms ranged from 4.3 to 33.4 hours. Adverse effects were only reported at injection sites. Mild to moderate erythema and/or feelings of burning were reported by 15/24 patients, itching by 3 and no adverse effects in 6. HAE type I patients who received icatibant responded promptly; most achieved improved symptom severity within 30 minutes. Local adverse events occurred in 75% of the patients.
Efficacy of parecoxib, sumatriptan, and rizatriptan in the treatment of acute migraine attacks.
Müller, Thomas; Lohse, Lutz
2011-01-01
Triptans and analgetic nonsteroidal inflammatory drugs reduce acute pain syndromes in migraine. A further treatment option for an acute headache attack in patients with migraine may be the application of cyclooxygenase-2-specific inhibitors, as they have anti-inflammatory and analgesic properties. The objective of this pilot study was to investigate the effects of an oral fast-dissolving tablet of 10 mg of rizatriptan, an intravenous infusion of 40 mg of parecoxib, and a subcutaneous pen injection of sumatriptan (6 mg/0.5 mL) on pain relief in 3 cohorts of patients with episodic migraine. They were treated owing to the acute onset of a pain attack as a case of emergency. They were randomized to treatment with sumatriptan, rizatriptan, or parecoxib. The participants completed a visual analog scale for pain intensity at baseline before the drug administration and then after intervals of 20, 30, 60, and 120 minutes. Rizatriptan, parecoxib, and sumatriptan reduced pain symptoms. Twenty and 30 minutes after drug intake, rizatriptan was more efficacious than parecoxib and sumatriptan, and parecoxib was more effective than sumatriptan. Only a significant difference between rizatriptan and sumatriptan was found after 60 and 120 minutes. This trial demonstrates the effectiveness of a parecoxib infusion in the treatment of acute migraine and that the circumvention of the first pass effect of the liver by rizatriptan may be beneficial for fast pain relief.
The usual treatment of trigeminal autonomic cephalalgias.
Pareja, Juan A; Álvarez, Mónica
2013-10-01
Trigeminal autonomic cephalalgias include cluster headache, paroxysmal hemicrania, and short-lasting unilateral neuralgiform headache attacks with conjunctival injection, tearing, and rhinorrhea (SUNCT). Conventional pharmacological therapy can be successful in the majority of trigeminal autonomic cephalalgias patients. Most cluster headache attacks respond to 100% oxygen inhalation, or 6 mg subcutaneous sumatriptan. Nasal spray of sumatriptan (20 mg) or zolmitriptan (5 mg) are recommended as second choice. The bouts can be brought under control by a short course of corticosteroids (oral prednisone: 60-100 mg/day, or intravenous methylprednisolone: 250-500 mg/day, for 5 days, followed by tapering off the dosage), or by long-term prophylaxis with verapamil (at least 240 mg/day). Alternative long-term preventive medications include lithium carbonate (800-1600 mg/day), methylergonovine (0.4-1.2 mg/day), and topiramate (100-200 mg/day). As a rule, paroxysmal hemicrania responds to preventive treatment with indomethacin (75-150 mg/day). A short course of intravenous lidocaine (1-4 mg/kg/hour) can reduce the flow of attacks during exacerbations of SUNCT. Lamotrigine (100-300 mg/day) is the preventive drug of choice for SUNCT. Gabapentin (800-2700 mg/day), topiramate (50-300 mg/day), and carbamazepine (200-1600 mg/day) may be of help. © 2013 American Headache Society.
Corrosion due to use of carbon dioxide for enhanced oil recovery. Final report. SumX No. 78-003
DOE Office of Scientific and Technical Information (OSTI.GOV)
DeBerry, D.W.; Clark, W.S.
1979-09-01
This study documents the specific effects of CO/sub 2/ on corrosion and identifies promising methods for controlling corrosion in fields using CO/sub 2/ injection. Information has been assembled on: CO/sub 2/ corrosion problems in general, surface and downhole corrosion problems specifically associated with CO/sub 2/ enhanced oil recovery, and methods to reduce corrosion problems in CO/sub 2/ environments. Corrosion mechanisms, kinetic behavior, and the effects of various parameters on corrosion by CO/sub 2/ are presented in this study. Engineering metals are not attacked by CO/sub 2/ under oil field environments unless liquid water is also present. Plain and low alloymore » steels are attacked by mixtures of CO/sub 2/ and liquid water. Attack on these bare metals may become serious at a CO/sub 2/ partial pressure as low as 4 psi and it increases with CO/sub 2/ partial pressure although not in direct proportion. Fluid flow rate is an important factor in CO/sub 2//water corrosion. Practically all stainless steels and similar resistant alloys are not particularly subject to corrosion by CO/sub 2//water mixtures alone, even at high CO/sub 2/ pressures. Elevated levels of CO/sub 2/ can aggravate the corrosive effects of other species such as hydrogen sulfide, oxygen, and chloride. Mixtures of CO/sub 2/, carbon monoxide (CO), and water can cause stress corrosion cracking of plain steels. Corrosion problems in CO/sub 2/ systems should be circumvented when possible by avoiding combination of the corrosive components. Although water cannot be excluded throughout the CO/sub 2/ injection-oil production-CO/sub 2/ and water reinjection chain, air in-leakage can be minimized and oxygen scavengers used to remove any residual. Exclusion of oxygen is important to the successful use of other corrosion control measures. A discussion is given of the main control methods including metal selection, protective coatings and nonmetallic materials, and chemical inhibition. (DLC)« less
NASA Technical Reports Server (NTRS)
Kniskern, Marc W.
1990-01-01
The thermal effects of simulant gas injection and aerodynamic heating at the model's surface on the measurements of a non-watercooled, flow through balance were investigated. A stainless steel model of a hypersonic air breathing propulsion cruise missile concept (HAPCM-50) was used to evaluate this balance. The tests were conducted in the 20-inch Mach 6 wind tunnel at NASA-Langley. The balance thermal effects were evaluated at freestream Reynolds numbers ranging from .5 to 7 x 10(exp 6) ft and angles of attack between -3.5 to 5 deg at Mach 6. The injection gases considered included cold air, hot air, and a mixture of 50 percent Argon and 50 percent Freon-12. The stagnation temperatures of the cold air, hot air, and Ar-Fr(12) reached 111, 214, and 283 F, respectively within the balance. A bakelite sleeve was inserted into the inner tube of the balance to minimize the thermal effects of these injection gases. Throughout the tests, the normal force, side force, yaw moment, roll moment, and pitching moment balance measurements were unaffected by the balance thermal effects of the injection gases and the wind tunnel flow. However, the axial force (AF) measurement was significantly affected by balance heating. The average zero shifts in the AF measurements were 1.9, 3.8, and 5.9 percent for cold air, hot air, and Ar-Fr(12) injection, respectively. The AF measurements decreased throughout these tests which lasted from 70 to 110 seconds. During the cold air injection tests, the AF measurements were accurate up to at least ten seconds after the model was injected into the wind tunnel test section. For the hot air and Ar-Fr(12) tests, the AF measurements were accurate up to at least five seconds after model injection.
Film cooling effectiveness on a large angle blunt cone flying at hypersonic speed
NASA Astrophysics Data System (ADS)
Sahoo, Niranjan; Kulkarni, Vinayak; Saravanan, S.; Jagadeesh, G.; Reddy, K. P. J.
2005-03-01
Effectiveness of film cooling technique to reduce convective heating rates for a large angle blunt cone flying at hypersonic Mach number and its effect on the aerodynamic characteristics is investigated experimentally by measuring surface heat-transfer rates and aerodynamic drag coefficient simultaneously. The test model is a 60° apex-angle blunt cone with an internally mounted accelerometer balance system for measuring aerodynamic drag and an array of surface mounted platinum thin film gauges for measuring heat-transfer rates. The coolant gas (air, carbon dioxide, and/or helium) is injected into the hypersonic flow at the nose of the test model. The experiments are performed at a flow free stream Mach number of 5.75 and 0° angle of attack for stagnation enthalpies of 1.16MJ/kg and 1.6MJ/kg with and without gas injection. About 30%-45% overall reduction in heat-transfer rates is observed with helium as coolant gas except at stagnation regions. With all other coolants, the reduction in surface heat-transfer rate is between 10%-25%. The aerodynamic drag coefficient is found to increase by 12% with helium injection whereas with other gases this increase is about 27%.
Evaluation of Sub Query Performance in SQL Server
NASA Astrophysics Data System (ADS)
Oktavia, Tanty; Sujarwo, Surya
2014-03-01
The paper explores several sub query methods used in a query and their impact on the query performance. The study uses experimental approach to evaluate the performance of each sub query methods combined with indexing strategy. The sub query methods consist of in, exists, relational operator and relational operator combined with top operator. The experimental shows that using relational operator combined with indexing strategy in sub query has greater performance compared with using same method without indexing strategy and also other methods. In summary, for application that emphasized on the performance of retrieving data from database, it better to use relational operator combined with indexing strategy. This study is done on Microsoft SQL Server 2012.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Femec, D.A.
This report describes two code-generating tools used to speed design and implementation of relational databases and user interfaces: CREATE-SCHEMA and BUILD-SCREEN. CREATE-SCHEMA produces the SQL commands that actually create and define the database. BUILD-SCREEN takes templates for data entry screens and generates the screen management system routine calls to display the desired screen. Both tools also generate the related FORTRAN declaration statements and precompiled SQL calls. Included with this report is the source code for a number of FORTRAN routines and functions used by the user interface. This code is broadly applicable to a number of different databases.
Changes in calcium and iron levels in the brains of rats during kainate induced epilepsy
NASA Astrophysics Data System (ADS)
Ren, Min-Qin; Ong, Wei-Yi; Makjanic, Jagoda; Watt, Frank
1999-10-01
Epilepsy is a recurrent disorder of cerebral function characterised by sudden brief attacks of altered consciousness, motor activity or sensory phenomena, and affects approximately 1% of the population. Kainic acid injection induces neuronal degeneration in rats, is associated with glial hypertrophy and proliferation in the CA3-CA4 fields of hippocampal complex, and is a model for temporal lobe epilepsy. In this study we have applied Nuclear Microscopy to the investigation of the elemental changes within the hippocampus and the cortex areas of the rat brain following kainate injection. Analyses of unstained freeze dried tissue sections taken at 1 day and 1, 2, 3 and 4 weeks following injection were carried out using the Nuclear Microscopy facility at the Research Centre for Nuclear Microscopy, National University of Singapore. Quantitative analysis and elemental mapping indicates that there are significant changes in the calcium levels and distributions in the hippocampus as early as 1 day following injection. Preliminary results indicate a rapid increase in cellular calcium. High levels of calcium can activate calcium dependent proteins and phospholipases. Activation of phospholipase A 2 can be harmful to surrounding neurons through free radical damage. In addition to observed increases in calcium, there was evidence of increases in iron levels. This is consistent with measurements in other degenerative brain disorders, and may signal a late surge in free radical production.
NASA Astrophysics Data System (ADS)
Kumar, Ashok; Nunley, Hayden; Marino, Alberto
2016-05-01
Quantum noise reduction (QNR) below the standard quantum limit (SQL) has been a subject of interest for the past two to three decades due to its wide range of applications in quantum metrology and quantum information processing. To date, most of the attention has focused on the study of QNR in the temporal domain. However, many areas in quantum optics, specifically in quantum imaging, could benefit from QNR not only in the temporal domain but also in the spatial domain. With the use of a high quantum efficiency electron multiplier charge coupled device (EMCCD) camera, we have observed spatial QNR below the SQL in bright narrowband twin light beams generated through a four-wave mixing (FWM) process in hot rubidium atoms. Owing to momentum conservation in this process, the twin beams are momentum correlated. This leads to spatial quantum correlations and spatial QNR. Our preliminary results show a spatial QNR of over 2 dB with respect to the SQL. Unlike previous results on spatial QNR with faint and broadband photon pairs from parametric down conversion (PDC), we demonstrate spatial QNR with spectrally and spatially narrowband bright light beams. The results obtained will be useful for atom light interaction based quantum protocols and quantum imaging. Work supported by the W.M. Keck Foundation.
Find the fish: using PROC SQL to build a relational database
Fabrizio, Mary C.; Nelson, Scott N.
1995-01-01
Reliable estimates of abundance and survival, gained through mark-recapture studies, are necessary to better understand how to manage and restore lake trout populations in the Great Lakes. Working with a 24-year data set from a mark-recapture study conducted in Lake Superior, we attempted to disclose information on tag shedding by examining recaptures of double-tagged fish. The data set consisted of 64,288 observations on fish which had been marked with one or more tags; a subset of these fish had been marked with two tags at initial capture. Although DATA and PROC statements could be used to obtain some of the information we sought, these statements could not be used to extract a complete set of results from the double-tagging experiments. We therefore used SQL processing to create three tables representing the same information but in a fully normalized relational structure. In addition, we created indices to efficiently examine complex relationships among the individual capture records. This approach allowed us to obtain all the information necessary to estimate tag retention through subsequent modeling. We believe that our success with SQL was due in large part to its ability to simultaneosly scan the same table more than once and to permit consideration of other tables in sub-queries.
Database constraints applied to metabolic pathway reconstruction tools.
Vilaplana, Jordi; Solsona, Francesc; Teixido, Ivan; Usié, Anabel; Karathia, Hiren; Alves, Rui; Mateo, Jordi
2014-01-01
Our group developed two biological applications, Biblio-MetReS and Homol-MetReS, accessing the same database of organisms with annotated genes. Biblio-MetReS is a data-mining application that facilitates the reconstruction of molecular networks based on automated text-mining analysis of published scientific literature. Homol-MetReS allows functional (re)annotation of proteomes, to properly identify both the individual proteins involved in the process(es) of interest and their function. It also enables the sets of proteins involved in the process(es) in different organisms to be compared directly. The efficiency of these biological applications is directly related to the design of the shared database. We classified and analyzed the different kinds of access to the database. Based on this study, we tried to adjust and tune the configurable parameters of the database server to reach the best performance of the communication data link to/from the database system. Different database technologies were analyzed. We started the study with a public relational SQL database, MySQL. Then, the same database was implemented by a MapReduce-based database named HBase. The results indicated that the standard configuration of MySQL gives an acceptable performance for low or medium size databases. Nevertheless, tuning database parameters can greatly improve the performance and lead to very competitive runtimes.
Integrating Radar Image Data with Google Maps
NASA Technical Reports Server (NTRS)
Chapman, Bruce D.; Gibas, Sarah
2010-01-01
A public Web site has been developed as a method for displaying the multitude of radar imagery collected by NASA s Airborne Synthetic Aperture Radar (AIRSAR) instrument during its 16-year mission. Utilizing NASA s internal AIRSAR site, the new Web site features more sophisticated visualization tools that enable the general public to have access to these images. The site was originally maintained at NASA on six computers: one that held the Oracle database, two that took care of the software for the interactive map, and three that were for the Web site itself. Several tasks were involved in moving this complicated setup to just one computer. First, the AIRSAR database was migrated from Oracle to MySQL. Then the back-end of the AIRSAR Web site was updated in order to access the MySQL database. To do this, a few of the scripts needed to be modified; specifically three Perl scripts that query that database. The database connections were then updated from Oracle to MySQL, numerous syntax errors were corrected, and a query was implemented that replaced one of the stored Oracle procedures. Lastly, the interactive map was designed, implemented, and tested so that users could easily browse and access the radar imagery through the Google Maps interface.
Extending SQL to Support Privacy Policies
NASA Astrophysics Data System (ADS)
Ghazinour, Kambiz; Pun, Sampson; Majedi, Maryam; Chinaci, Amir H.; Barker, Ken
Increasing concerns over Internet applications that violate user privacy by exploiting (back-end) database vulnerabilities must be addressed to protect both customer privacy and to ensure corporate strategic assets remain trustworthy. This chapter describes an extension onto database catalogues and Structured Query Language (SQL) for supporting privacy in Internet applications, such as in social networks, e-health, e-governmcnt, etc. The idea is to introduce new predicates to SQL commands to capture common privacy requirements, such as purpose, visibility, generalization, and retention for both mandatory and discretionary access control policies. The contribution is that corporations, when creating the underlying databases, will be able to define what their mandatory privacy policies arc with which all application users have to comply. Furthermore, each application user, when providing their own data, will be able to define their own privacy policies with which other users have to comply. The extension is supported with underlying catalogues and algorithms. The experiments demonstrate a very reasonable overhead for the extension. The result is a low-cost mechanism to create new systems that arc privacy aware and also to transform legacy databases to their privacy-preserving equivalents. Although the examples arc from social networks, one can apply the results to data security and user privacy of other enterprises as well.
Janus Kinase Inhibitors for the Treatment of Rheumatoid Arthritis.
Turan, Senir; Walker, Scot
2017-11-01
Rheumatoid arthritis (RA) is a disease where the immune system attacks the linings of the joints, resulting in joint pain, stiffness, swelling, and destruction. Although many products are available for the treatment of RA, limitations such as adverse reactions and tolerance greatly affect adherence. Many of the current biologic disease-modifying antirheumatic drugs on the market are injectables, leaving a void to be filled for a product that can be taken orally. The most advanced of these approaches, the Janus kinase (JAK) inhibitors, are oral drugs that have not only made a breakthrough in RA, but also other skin conditions.
An Array Library for Microsoft SQL Server with Astrophysical Applications
NASA Astrophysics Data System (ADS)
Dobos, L.; Szalay, A. S.; Blakeley, J.; Falck, B.; Budavári, T.; Csabai, I.
2012-09-01
Today's scientific simulations produce output on the 10-100 TB scale. This unprecedented amount of data requires data handling techniques that are beyond what is used for ordinary files. Relational database systems have been successfully used to store and process scientific data, but the new requirements constantly generate new challenges. Moving terabytes of data among servers on a timely basis is a tough problem, even with the newest high-throughput networks. Thus, moving the computations as close to the data as possible and minimizing the client-server overhead are absolutely necessary. At least data subsetting and preprocessing have to be done inside the server process. Out of the box commercial database systems perform very well in scientific applications from the prospective of data storage optimization, data retrieval, and memory management but lack basic functionality like handling scientific data structures or enabling advanced math inside the database server. The most important gap in Microsoft SQL Server is the lack of a native array data type. Fortunately, the technology exists to extend the database server with custom-written code that enables us to address these problems. We present the prototype of a custom-built extension to Microsoft SQL Server that adds array handling functionality to the database system. With our Array Library, fix-sized arrays of all basic numeric data types can be created and manipulated efficiently. Also, the library is designed to be able to be seamlessly integrated with the most common math libraries, such as BLAS, LAPACK, FFTW, etc. With the help of these libraries, complex operations, such as matrix inversions or Fourier transformations, can be done on-the-fly, from SQL code, inside the database server process. We are currently testing the prototype with two different scientific data sets: The Indra cosmological simulation will use it to store particle and density data from N-body simulations, and the Milky Way Laboratory project will use it to store galaxy simulation data.
A Customizable Dashboarding System for Watershed Model Interpretation
NASA Astrophysics Data System (ADS)
Easton, Z. M.; Collick, A.; Wagena, M. B.; Sommerlot, A.; Fuka, D.
2017-12-01
Stakeholders, including policymakers, agricultural water managers, and small farm managers, can benefit from the outputs of commonly run watershed models. However, the information that each stakeholder needs is be different. While policy makers are often interested in the broader effects that small farm management may have on a watershed during extreme events or over long periods, farmers are often interested in field specific effects at daily or seasonal period. To provide stakeholders with the ability to analyze and interpret data from large scale watershed models, we have developed a framework that can support custom exploration of the large datasets produced. For the volume of data produced by these models, SQL-based data queries are not efficient; thus, we employ a "Not Only SQL" (NO-SQL) query language, which allows data to scale in both quantity and query volumes. We demonstrate a stakeholder customizable Dashboarding system that allows stakeholders to create custom `dashboards' to summarize model output specific to their needs. Dashboarding is a dynamic and purpose-based visual interface needed to display one-to-many database linkages so that the information can be presented for a single time period or dynamically monitored over time and allows a user to quickly define focus areas of interest for their analysis. We utilize a single watershed model that is run four times daily with a combined set of climate projections, which are then indexed, and added to an ElasticSearch datastore. ElasticSearch is a NO-SQL search engine built on top of Apache Lucene, a free and open-source information retrieval software library. Aligned with the ElasticSearch project is the open source visualization and analysis system, Kibana, which we utilize for custom stakeholder dashboarding. The dashboards create a visualization of the stakeholder selected analysis and can be extended to recommend robust strategies to support decision-making.
How to maintain blood supply during computer network breakdown: a manual backup system.
Zeiler, T; Slonka, J; Bürgi, H R; Kretschmer, V
2000-12-01
Electronic data management systems using computer network systems and client/server architecture are increasingly used in laboratories and transfusion services. Severe problems arise if there is no network access to the database server and critical functions are not available. We describe a manual backup system (MBS) developed to maintain the delivery of blood products to patients in a hospital transfusion service in case of a computer network breakdown. All data are kept on a central SQL database connected to peripheral workstations in a local area network (LAN). Request entry from wards is performed via machine-readable request forms containing self-adhesive specimen labels with barcodes for test tubes. Data entry occurs on-line by bidirectional automated systems or off-line manually. One of the workstations in the laboratory contains a second SQL database which is frequently and incrementally updated. This workstation is run as a stand-alone, read-only database if the central SQL database is not available. In case of a network breakdown, the time-graded MBS is launched. Patient data, requesting ward and ordered tests/requests, are photocopied through a template from the request forms on special MBS worksheets serving as laboratory journal for manual processing and result report (a copy is left in the laboratory). As soon as the network is running again the data from the off-line period are entered into the primary SQL server. The MBS was successfully used at several occasions. The documentation of a 90-min breakdown period is presented in detail. Additional work resulted from the copy work and the belated manual data entry after restoration of the system. There was no delay in issue of blood products or result reporting. The backup system described has been proven to be simple, quick and safe to maintain urgent blood supply and distribution of laboratory results in case of unexpected network breakdown.
Footprint Representation of Planetary Remote Sensing Data
NASA Astrophysics Data System (ADS)
Walter, S. H. G.; Gasselt, S. V.; Michael, G.; Neukum, G.
The geometric outline of remote sensing image data, the so called footprint, can be represented as a number of coordinate tuples. These polygons are associated with according attribute information such as orbit name, ground- and image resolution, solar longitude and illumination conditions to generate a powerful base for classification of planetary experiment data. Speed, handling and extended capabilites are the reasons for using geodatabases to store and access these data types. Techniques for such a spatial database of footprint data are demonstrated using the Relational Database Management System (RDBMS) PostgreSQL, spatially enabled by the PostGIS extension. Exemplary, footprints of the HRSC and OMEGA instruments, both onboard ESA's Mars Express Orbiter, are generated and connected to attribute information. The aim is to provide high-resolution footprints of the OMEGA instrument to the science community for the first time and make them available for web-based mapping applications like the "Planetary Interactive GIS-on-the-Web Analyzable Database" (PIG- WAD), produced by the USGS. Map overlays with HRSC or other instruments like MOC and THEMIS (footprint maps are already available for these instruments and can be integrated into the database) allow on-the-fly intersection and comparison as well as extended statistics of the data. Footprint polygons are generated one by one using standard software provided by the instrument teams. Attribute data is calculated and stored together with the geometric information. In the case of HRSC, the coordinates of the footprints are already available in the VICAR label of each image file. Using the VICAR RTL and PostgreSQL's libpq C library they are loaded into the database using the Well-Known Text (WKT) notation by the Open Geospatial Consortium, Inc. (OGC). For the OMEGA instrument, image data is read using IDL routines developed and distributed by the OMEGA team. Image outlines are exported together with relevant attribute data to the industry standard Shapefile format. These files are translated to a Structured Query Language (SQL) command sequence suitable for insertion into the PostGIS/PostgrSQL database using the shp2pgsql data loader provided by the PostGIS software. PostgreSQL's advanced features such as geometry types, rules, operators and functions allow complex spatial queries and on-the-fly processing of data on DBMS level e.g. generalisation of the outlines. Processing done by the DBMS, visualisation via GIS systems and utilisation for web-based applications like mapservers will be demonstrated.
Issa, Hussain; Al-Saif, Osama; Al-Momen, Sami; Bseiso, Bahaa; Al-Salem, Ahmed
2010-01-01
Roux-en-Y gastric bypass is a common surgical procedure used to treat patients with morbid obesity. One of the rare, but potentially fatal complications of gastric bypass is upper gastrointestinal bleeding, which can pose diagnostic and therapeutic dilemmas. This report describes a 39-year-old male with morbid obesity who underwent a Roux-en-Y gastric bypass. Three months postoperatively, he sustained repeated and severe upper attacks of upper gastrointestinal bleeding. He received multiple blood transfusions, and had repeated upper and lower endoscopies with no diagnostic yield. Finally, he underwent laparoscopic endoscopy which revealed a bleeding duodenal ulcer. About 5 ml of saline with adrenaline was injected, followed by electrocoagulation to seal the overlying cleft and blood vessel. He was also treated with a course of a proton pump inhibitor and given treatment for H pylori eradication with no further attacks of bleeding. Taking in consideration the difficulties in accessing the bypassed stomach endoscopically, laparoscopic endoscopy is a feasible and valuable diagnostic and therapeutic procedure in patients who had gastric bypass.
Hardware assisted hypervisor introspection.
Shi, Jiangyong; Yang, Yuexiang; Tang, Chuan
2016-01-01
In this paper, we introduce hypervisor introspection, an out-of-box way to monitor the execution of hypervisors. Similar to virtual machine introspection which has been proposed to protect virtual machines in an out-of-box way over the past decade, hypervisor introspection can be used to protect hypervisors which are the basis of cloud security. Virtual machine introspection tools are usually deployed either in hypervisor or in privileged virtual machines, which might also be compromised. By utilizing hardware support including nested virtualization, EPT protection and #BP, we are able to monitor all hypercalls belongs to the virtual machines of one hypervisor, include that of privileged virtual machine and even when the hypervisor is compromised. What's more, hypercall injection method is used to simulate hypercall-based attacks and evaluate the performance of our method. Experiment results show that our method can effectively detect hypercall-based attacks with some performance cost. Lastly, we discuss our furture approaches of reducing the performance cost and preventing the compromised hypervisor from detecting the existence of our introspector, in addition with some new scenarios to apply our hypervisor introspection system.
The design and implementation of GML data management information system based on PostgreSQL
NASA Astrophysics Data System (ADS)
Zhang, Aiguo; Wu, Qunyong; Xu, Qifeng
2008-10-01
GML expresses geographic information in text, and it provides an extensible and standard way of spatial information encoding. At the present time, the management of GML data is in terms of document. By this way, the inquiry and update of GML data is inefficient, and it demands high memory when the document is comparatively large. In this respect, the paper put forward a data management of GML based on PostgreSQL. It designs four kinds of inquiries, which are inquiry of metadata, inquiry of geometry based on property, inquiry of property based on spatial information, and inquiry of spatial data based on location. At the same time, it designs and implements the visualization of the inquired WKT data.
A Medical Image Backup Architecture Based on a NoSQL Database and Cloud Computing Services.
Santos Simões de Almeida, Luan Henrique; Costa Oliveira, Marcelo
2015-01-01
The use of digital systems for storing medical images generates a huge volume of data. Digital images are commonly stored and managed on a Picture Archiving and Communication System (PACS), under the DICOM standard. However, PACS is limited because it is strongly dependent on the server's physical space. Alternatively, Cloud Computing arises as an extensive, low cost, and reconfigurable resource. However, medical images contain patient information that can not be made available in a public cloud. Therefore, a mechanism to anonymize these images is needed. This poster presents a solution for this issue by taking digital images from PACS, converting the information contained in each image file to a NoSQL database, and using cloud computing to store digital images.
Monitoring SLAC High Performance UNIX Computing Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lettsome, Annette K.; /Bethune-Cookman Coll. /SLAC
2005-12-15
Knowledge of the effectiveness and efficiency of computers is important when working with high performance systems. The monitoring of such systems is advantageous in order to foresee possible misfortunes or system failures. Ganglia is a software system designed for high performance computing systems to retrieve specific monitoring information. An alternative storage facility for Ganglia's collected data is needed since its default storage system, the round-robin database (RRD), struggles with data integrity. The creation of a script-driven MySQL database solves this dilemma. This paper describes the process took in the creation and implementation of the MySQL database for use by Ganglia.more » Comparisons between data storage by both databases are made using gnuplot and Ganglia's real-time graphical user interface.« less
Operationalizing Semantic Medline for meeting the information needs at point of care.
Rastegar-Mojarad, Majid; Li, Dingcheng; Liu, Hongfang
2015-01-01
Scientific literature is one of the popular resources for providing decision support at point of care. It is highly desirable to bring the most relevant literature to support the evidence-based clinical decision making process. Motivated by the recent advance in semantically enhanced information retrieval, we have developed a system, which aims to bring semantically enriched literature, Semantic Medline, to meet the information needs at point of care. This study reports our work towards operationalizing the system for real time use. We demonstrate that the migration of a relational database implementation to a NoSQL (Not only SQL) implementation significantly improves the performance and makes the use of Semantic Medline at point of care decision support possible.
MaGnET: Malaria Genome Exploration Tool.
Sharman, Joanna L; Gerloff, Dietlind L
2013-09-15
The Malaria Genome Exploration Tool (MaGnET) is a software tool enabling intuitive 'exploration-style' visualization of functional genomics data relating to the malaria parasite, Plasmodium falciparum. MaGnET provides innovative integrated graphic displays for different datasets, including genomic location of genes, mRNA expression data, protein-protein interactions and more. Any selection of genes to explore made by the user is easily carried over between the different viewers for different datasets, and can be changed interactively at any point (without returning to a search). Free online use (Java Web Start) or download (Java application archive and MySQL database; requires local MySQL installation) at http://malariagenomeexplorer.org joanna.sharman@ed.ac.uk or dgerloff@ffame.org Supplementary data are available at Bioinformatics online.
Operationalizing Semantic Medline for meeting the information needs at point of care
Rastegar-Mojarad, Majid; Li, Dingcheng; Liu, Hongfang
2015-01-01
Scientific literature is one of the popular resources for providing decision support at point of care. It is highly desirable to bring the most relevant literature to support the evidence-based clinical decision making process. Motivated by the recent advance in semantically enhanced information retrieval, we have developed a system, which aims to bring semantically enriched literature, Semantic Medline, to meet the information needs at point of care. This study reports our work towards operationalizing the system for real time use. We demonstrate that the migration of a relational database implementation to a NoSQL (Not only SQL) implementation significantly improves the performance and makes the use of Semantic Medline at point of care decision support possible. PMID:26306259
MySQL/PHP web database applications for IPAC proposal submission
NASA Astrophysics Data System (ADS)
Crane, Megan K.; Storrie-Lombardi, Lisa J.; Silbermann, Nancy A.; Rebull, Luisa M.
2008-07-01
The Infrared Processing and Analysis Center (IPAC) is NASA's multi-mission center of expertise for long-wavelength astrophysics. Proposals for various IPAC missions and programs are ingested via MySQL/PHP web database applications. Proposers use web forms to enter coversheet information and upload PDF files related to the proposal. Upon proposal submission, a unique directory is created on the webserver into which all of the uploaded files are placed. The coversheet information is converted into a PDF file using a PHP extension called FPDF. The files are concatenated into one PDF file using the command-line tool pdftk and then forwarded to the review committee. This work was performed at the California Institute of Technology under contract to the National Aeronautics and Space Administration.
Massive attack of honeybee on macaws (Ara ararauna and Ara chloropterus) in Brazil - A case report.
Milbradt, Elisane Lenita; Silva, Tarcísio Macedo; Hataka, Alessandre; Teixeira, Carlos Roberto; Okamoto, Adriano Sakai; Andreatti Filho, Raphael Lucio
2017-09-15
Three adult birds of the species Ara chloropterus and five of the species Ara ararauna from a conservation breeding facility suffered a massive attack by honeybees. The A. chloropterus birds presented swollen puncture lesions with stingers (mainly in the facial regions without feathers), swelling of the eyelids and subcutaneous tissue, and respiratory distress, and they were treated with intramuscular injections of 1.67 mg/kg of promethazine and 10 mg/kg of hydrocortisone followed by removal of the stingers. Complete remission of the clinical signs occurred 48 hours after start of treatment. The five A. ararauna birds died before they arrived at the veterinary hospital, and the necropsies found stingers in the areas of the face without feathers and the subcutaneous tissue, which were associated with erythema, bruising, and swelling. Food content from the crop was found in the oral cavity and the tracheal lumen, and marked congestion was observed in the heart, liver, spleen, lungs, kidneys, brain, and cerebellum. Among the histopathological findings, significant swelling of the myocytes in the endocardium and vascular dilation with erythroid repletion were observed, and there were multifocal areas of centrilobular necrosis associated with severe congestion and hemorrhaging in the hepatic tissue. Severe acute tubular necrosis and hydropic-vacuolar degeneration were observed in the kidneys. The clinical signs and pathological findings suggest envenomation due to a massive bee attack, the first such report for Psittacidae. Copyright © 2017 Elsevier Ltd. All rights reserved.
Imaging enhancement of malignancy by cyclophosphamide: surprising chemotherapy opposite effects
NASA Astrophysics Data System (ADS)
Yamauchi, Kensuke; Yang, Meng; Hayashi, Katsuhiro; Jiang, Ping; Xu, Mingxu; Yamamoto, Norio; Tsuchiya, Hiroyuki; Tomita, Katsuro; Moossa, A. R.; Bouvet, Michael; Hoffman, Robert M.
2008-02-01
Although side effects of cancer chemotherapy are well known, "opposite effects" of chemotherapy which enhance the malignancy of the treated cancer are not well understood. We have observed a number of steps of malignancy that are enhanced by chemotherapy pre-treatment of mice before transplantation of human tumor cells. The induction of intravascular proliferation, extravasation, and colony formation by cancer cells, critical steps of metastasis was enhanced by pretreatment of host mice with the commonly-used chemotherapy drug cyclophosphamide. Cyclophosphamide appears to interfere with a host process that inhibits intravascular proliferation, extravasation, and extravascular colony formation by at least some tumor cells. Cyclophosphamide does not directly affect the cancer cells since cyclophosphamide has been cleared by the time the cancer cells were injected. Without cyclophosphamide pretreatment, human colon cancer cells died quickly after injection in the portal vein of nude mice. Extensive clasmocytosis (destruction of the cytoplasm) of the cancer cells occurred within 6 hours. The number of apoptotic cells rapidly increased within the portal vein within 12 hours of injection. However, when the host mice were pretreated with cyclophosphamide, the cancer cells survived and formed colonies in the liver after portal vein injection. These results suggest that a cyclophosphamide-sensitive host cellular system attacked the cancer cells. This review describes an important unexpected "opposite effects" of chemotherapy that enhances critical steps in malignancy rather than inhibiting them, suggesting that certain current approaches to cancer chemotherapy should be modified.
Database Constraints Applied to Metabolic Pathway Reconstruction Tools
Vilaplana, Jordi; Solsona, Francesc; Teixido, Ivan; Usié, Anabel; Karathia, Hiren; Alves, Rui; Mateo, Jordi
2014-01-01
Our group developed two biological applications, Biblio-MetReS and Homol-MetReS, accessing the same database of organisms with annotated genes. Biblio-MetReS is a data-mining application that facilitates the reconstruction of molecular networks based on automated text-mining analysis of published scientific literature. Homol-MetReS allows functional (re)annotation of proteomes, to properly identify both the individual proteins involved in the process(es) of interest and their function. It also enables the sets of proteins involved in the process(es) in different organisms to be compared directly. The efficiency of these biological applications is directly related to the design of the shared database. We classified and analyzed the different kinds of access to the database. Based on this study, we tried to adjust and tune the configurable parameters of the database server to reach the best performance of the communication data link to/from the database system. Different database technologies were analyzed. We started the study with a public relational SQL database, MySQL. Then, the same database was implemented by a MapReduce-based database named HBase. The results indicated that the standard configuration of MySQL gives an acceptable performance for low or medium size databases. Nevertheless, tuning database parameters can greatly improve the performance and lead to very competitive runtimes. PMID:25202745
Database Reports Over the Internet
NASA Technical Reports Server (NTRS)
Smith, Dean Lance
2002-01-01
Most of the summer was spent developing software that would permit existing test report forms to be printed over the web on a printer that is supported by Adobe Acrobat Reader. The data is stored in a DBMS (Data Base Management System). The client asks for the information from the database using an HTML (Hyper Text Markup Language) form in a web browser. JavaScript is used with the forms to assist the user and verify the integrity of the entered data. Queries to a database are made in SQL (Sequential Query Language), a widely supported standard for making queries to databases. Java servlets, programs written in the Java programming language running under the control of network server software, interrogate the database and complete a PDF form template kept in a file. The completed report is sent to the browser requesting the report. Some errors are sent to the browser in an HTML web page, others are reported to the server. Access to the databases was restricted since the data are being transported to new DBMS software that will run on new hardware. However, the SQL queries were made to Microsoft Access, a DBMS that is available on most PCs (Personal Computers). Access does support the SQL commands that were used, and a database was created with Access that contained typical data for the report forms. Some of the problems and features are discussed below.
TIA Caused by Contrast Echocardiography in Patient with Platypnea-Orthodeoxia.
Loncar, Goran; Payot, Laurent; Dubois, Mathieu
2015-10-01
Platypnea-orthodeoxia syndrome (POS) is a rare clinical disorder characterized by dyspnea caused by the upright position and relieved at recumbent position. Few cases of POS and stroke were reported in literature, and the association between stroke and POS with evidence of patent foramen ovale (PFO) is rare. Stroke may occur in patients with cardiac shunt who undergo contrast echocardiography. We present a patient with POS who experienced transitory ischemic attack (TIA) most likely caused by injection of agitated saline microbubbles during screen for PFO. No case report of TIA/stroke during contrast echocardiography in patients with POS has previously been published. © 2015, Wiley Periodicals, Inc.
Cohen, Anna S; Kaube, Holger
2004-06-01
This review describes rare headaches that can occur at night or during sleep, with a focus on cluster headaches, paroxysmal hemicrania, short-lasting unilateral neuralgiform headache attacks with conjunctival injection and tearing, hypnic headache and exploding head syndrome. It is known that cluster headaches and hypnic headache are associated with rapid eye movement sleep, as illustrated by recent polysomnographic studies. Functional imaging studies have documented hypothalamic activation that is likely to be of relevance to circadian rhythms. These headache syndromes have been shown to respond to melatonin and lithium therapy, both of which have an indirect impact on the sleep-wake cycle. There is growing evidence that cluster headache and hypnic headache are chronobiological disorders.
Secure TRNG with random phase stimulation
NASA Astrophysics Data System (ADS)
Wieczorek, Piotr Z.
2017-08-01
In this paper a novel TRNG concept is proposed which is a vital part of cryptographic systems. The proposed TRNG involves phase variability of a pair of ring oscillators (ROs) to force the multiple metastable events in a flip-flop (FF). In the solution, the ROs are periodically activated to ensure the violation of the FF timing and resultant state randomness, while the TRNG circuit adapts the structure of ROs to obtain the maximum entropy and circuit security. The TRNG can be implemented in inexpensive re-programmable devices (CPLDs or FPGAs) without the use of Digital Clock Managers (DCMs). Preliminary test results proved the circuit's immunity to the intentional frequency injection attacks.
New Directions in the NOAO Observing Proposal System
NASA Astrophysics Data System (ADS)
Gasson, David; Bell, Dave
For the past eight years NOAO has been refining its on-line observing proposal system. Virtually all related processes are now handled electronically. Members of the astronomical community can submit proposals through email, web form, or via the Gemini Phase I Tool. NOAO staff can use the system to do administrative tasks, scheduling, and compilation of various statistics. In addition, all information relevant to the TAC process is made available on-line, including the proposals themselves (in HTML, PDF and PostScript) and technical comments. Grades and TAC comments are entered and edited through web forms, and can be sorted and filtered according to specified criteria. Current developments include a move away from proprietary solutions, toward open standards such as SQL (in the form of the MySQL relational database system), Perl, PHP and XML.
PiCO QL: A software library for runtime interactive queries on program data
NASA Astrophysics Data System (ADS)
Fragkoulis, Marios; Spinellis, Diomidis; Louridas, Panos
PiCO QL is an open source C/C++ software whose scientific scope is real-time interactive analysis of in-memory data through SQL queries. It exposes a relational view of a system's or application's data structures, which is queryable through SQL. While the application or system is executing, users can input queries through a web-based interface or issue web service requests. Queries execute on the live data structures through the respective relational views. PiCO QL makes a good candidate for ad-hoc data analysis in applications and for diagnostics in systems settings. Applications of PiCO QL include the Linux kernel, the Valgrind instrumentation framework, a GIS application, a virtual real-time observatory of stellar objects, and a source code analyser.
The unified database for the fixed target experiment BM@N
NASA Astrophysics Data System (ADS)
Gertsenberger, K. V.
2016-09-01
The article describes the developed database designed as comprehensive data storage of the fixed target experiment BM@N [1] at Joint Institute for Nuclear Research (JINR) in Dubna. The structure and purposes of the BM@N facility will be briefly presented. The scheme of the unified database and its parameters will be described in detail. The use of the BM@N database implemented on the PostgreSQL database management system (DBMS) allows one to provide user access to the actual information of the experiment. Also the interfaces developed for the access to the database will be presented. One was implemented as the set of C++ classes to access the data without SQL statements, the other-Web-interface being available on the Web page of the BM@N experiment.
ExplorEnz: the primary source of the IUBMB enzyme list
McDonald, Andrew G.; Boyce, Sinéad; Tipton, Keith F.
2009-01-01
ExplorEnz is the MySQL database that is used for the curation and dissemination of the International Union of Biochemistry and Molecular Biology (IUBMB) Enzyme Nomenclature. A simple web-based query interface is provided, along with an advanced search engine for more complex Boolean queries. The WWW front-end is accessible at http://www.enzyme-database.org, from where downloads of the database as SQL and XML are also available. An associated form-based curatorial application has been developed to facilitate the curation of enzyme data as well as the internal and public review processes that occur before an enzyme entry is made official. Suggestions for new enzyme entries, or modifications to existing ones, can be made using the forms provided at http://www.enzyme-database.org/forms.php. PMID:18776214
NASA Astrophysics Data System (ADS)
Gaspar Aparicio, R.; Gomez, D.; Coterillo Coz, I.; Wojcik, D.
2012-12-01
At CERN a number of key database applications are running on user-managed MySQL database services. The database on demand project was born out of an idea to provide the CERN user community with an environment to develop and run database services outside of the actual centralised Oracle based database services. The Database on Demand (DBoD) empowers the user to perform certain actions that had been traditionally done by database administrators, DBA's, providing an enterprise platform for database applications. It also allows the CERN user community to run different database engines, e.g. presently open community version of MySQL and single instance Oracle database server. This article describes a technology approach to face this challenge, a service level agreement, the SLA that the project provides, and an evolution of possible scenarios.
A framework for analyzing the impact of data integrity/quality on electricity market operations
NASA Astrophysics Data System (ADS)
Choi, Dae Hyun
This dissertation examines the impact of data integrity/quality in the supervisory control and data acquisition (SCADA) system on real-time locational marginal price (LMP) in electricity market operations. Measurement noise and/or manipulated sensor errors in a SCADA system may mislead system operators about real-time conditions in a power system, which, in turn, may impact the price signals in real-time power markets. This dissertation serves as a first attempt to analytically investigate the impact of bad/malicious data on electric power market operations. In future power system operations, which will probably involve many more sensors, the impact of sensor data integrity/quality on grid operations will become increasingly important. The first part of this dissertation studies from a market participant's perspective a new class of malicious data attacks on state estimation, which subsequently influences the result of the newly emerging look-ahead dispatch models in the real-time power market. In comparison with prior work of cyber-attack on static dispatch where no inter-temporal ramping constraint is considered, we propose a novel attack strategy, named ramp-induced data (RID) attack, with which the attacker can manipulate the limits of ramp constraints of generators in look-ahead dispatch. It is demonstrated that the proposed attack can lead to financial profits via malicious capacity withholding of selected generators, while being undetected by the existing bad data detection algorithm embedded in today's state estimation software. In the second part, we investigate from a system operator's perspective the sensitivity of locational marginal price (LMP) with respect to data corruption-induced state estimation error in real-time power market. Two data corruption scenarios are considered, in which corrupted continuous data (e.g., the power injection/flow and voltage magnitude) falsify power flow estimate whereas corrupted discrete data (e.g., the on/off status of a circuit breaker) do network topology estimate, thus leading to the distortion of LMP. We present an analytical framework to quantify real-time LMP sensitivity subject to continuous and discrete data corruption via state estimation. The proposed framework offers system operators an analytical tool to identify economically sensitive buses and transmission lines to data corruption as well as find sensors that impact LMP changes significantly. This dissertation serves as a first step towards rigorous understanding of the fundamental coupling among cyber, physical and economical layers of operations in future smart grid.
[Blood coagulation and fibrinolysis in ischemic heart disease].
Sakamoto, T; Ogawa, H; Miyao, Y; Yasue, H
1994-01-01
Intracoronary thrombus formation has been thought to play an important role in the genesis of acute myocardial infarction an unstable angina. To examine whether the coagulation and fibrinolytic systems are altered in such ischemic heart diseases, the plasma levels of fibrinopeptide A (FPA) and plasminogen activator (PAI) were measured. The plasma level of FPA was increased in patients with variant angina as compared with those with stable exertional angina and there was a significant circadian variation in the plasma level of FPA in parallel with that of the frequency of the attacks with the peak level occurring from midnight to early morning in patients with variant angina. The plasma FPA level increased in patients with coronary spastic angina after the ischemic attack induced by hyperventilation. Furthermore, FPA was released into the coronary circulation after the anginal attack induced by intracoronary injection of acetylcholine. These findings suggest that the coronary artery spasm may induce thrombin generation and trigger thrombus formation in the coronary artery. On the other hand, the plasma level of PAI activity was higher in patients with unstable angina and coronary spastic angina than in those with stable exertional angina. Moreover, the PAI activity in patients with unstable angina decreased to the level in patients with stable exertional angina after the stabilization of their symptoms by drugs. Our findings suggest that the increased plasma PAI activity may reduce fibrinolytic activity and attenuate removal of the thrombus and may ultimately lead to acute myocardial infarction in some patients with unstable angina and coronary spastic angina.(ABSTRACT TRUNCATED AT 250 WORDS)
NASA Astrophysics Data System (ADS)
Choubey, Gautam; Pandey, K. M.
2017-04-01
Numerical analysis of the supersonic combustion and flow structure through a scramjet engine at Mach 7 with alternating wedge fuel injection and with three angle of attack (α=-3°, α=0°, α=3°) have been studied in the present research article. The configuration used here is slight modification of the Rabadan et al. scramjet model. Steady two dimensional (2D) Reynolds-averaged Navier-Stokes (RANS) simulation and Shear stress transport (SST) based on k-ω turbulent model is used to predict the shock structure and combustion phenomenon inside the scramjet combustor. All the simulations are done by using Ansys 14-Fluent code. The combustion model used here is the combination of eddy dissipation and finite rate chemistry models since this model avoids Arrhenius calculations in which reaction rates are controlled by turbulence. Present results show that the geometry with negative angle of attack (α=-3°) have lowest ignition delay and it improves the performance of scramjet combustor as compared to geometry with α=0°, α=3°. The combustion phenomena and efficiency is also found to be stronger and highest in case of α=-3°.
Central cholinergic challenging of migraine by testing second-generation anticholinesterase drugs.
Nicolodi, M; Galeotti, N; Ghelardini, C; Bartolini, A; Sicuteri, F
2002-01-01
The antinociceptive activity of donepezil, a novel cholinesterase inhibitor, was investigated in the mouse hot plate test. Donepezil (5 to 10 mg kg(-1) i.p.) induced a dose-dependent antinociception that reached its maximum effect 15 minutes after injection. Donepezil antinociception was prevented by the antimuscarinic drug scopolamine. At analgesic doses, donepezil did not alter gross animal behavior. These results indicate that donepezil is endowed by muscarinic antinociceptive properties, suggesting this compound as a potential therapeutic approach for the treatment of painful pathologies. Therefore, we investigated donepezil's effect in migraine. Donepezil (5 mg per os, evening assumption) was effective as a prophylatic agent in patients suffering from migraine with or without aura by reducing the number of hours with pain, the number of attacks, and the severity of the pain attack. The efficacy of donepezil was compared with that of the beta-blocker propranolol (40 mg bid per os), showing higher activity. Response rates of a large-sized open study devoid of entry criteria regarding migraine subtypes suggest the drug as an excellent prophylactic compound for migraine in general practice. Clinical results also indicate that the activation of the cholinergic system can represent a novel prophylactic approach to migraine.
Headache classification: criticism and suggestions.
Manzoni, G C; Torelli, P
2004-10-01
The International Classification of Headache Disorders 2nd Edition (ICHD-II), published in 2004, marks an unquestionable progress from the preceding 1988 edition, but the in-depth analysis it offers is not immune from drawbacks and shortcomings. First of all, it is still basically a classification of attacks and not of syndromes. For the migraine group, while the revised classification more accurately characterises migraine with aura, it fails to provide a sufficiently structured description of those forms of migraine without aura that over the years evolve to so-called daily chronic forms. These forms are not adequately recognised as chronic migraine, which ICHD-II includes among the complications of migraine. The inclusion of short-lasting unilateral neuralgiform headache attacks with conjunctival injection and tearing (SUNCT) in the cluster headache group is bound to generate some perplexity, while the recognition of new daily persistent headache (NDPH) included in the group of other primary headaches as a separate clinical entity appears somewhat premature. Doubts are also raised by the actual existence of triptan-overuse headache, which ICHD-II includes in Group 8 among medication-overuse headaches. Finally, the addition of headache attributed to psychiatric disorder, which is certainly a good option in perspective, is not yet supported by an adequate systematisation.
The first interdisciplinary experiments at the IMP high energy microbeam
NASA Astrophysics Data System (ADS)
Du, Guanghua; Guo, Jinlong; Wu, Ruqun; Guo, Na; Liu, Wenjing; Ye, Fei; Sheng, Lina; Li, Qiang; Li, Huiyun
2015-04-01
The high energy beam of tens to hundred MeV/u ions possesses mm-to-cm penetration depth in materials and can be easily extracted into air without significant energy loss and beam scattering. Combination of high energy ions and microbeam technology facilitates the microprobe application to many practical studies in large scale samples. The IMP heavy ion microbeam facility has recently been integrated with microscopic positioning and targeting irradiation system. This paper introduced the first interdisciplinary experiments performed at the IMP microbeam facility using the beam of 80.5 MeV/u carbon ions. Bystander effect induction via medium transferring was not found in the micro-irradiation study using HeLa cells. The mouse irradiation experiment demonstrated that carbon irradiation of 10 Gy dose to its tuberomammillary nucleus did not impair the sleep nerve system. The fault injection attack on RSA (Rivest-Shamir-Adleman) decryption proved that the commercial field-programmable gate array chip is vulnerable in single event effect to low linear-energy-transfer carbon irradiation, and the attack can cause the leakage of RSA private key. This work demonstrates the potential of high energy microbeam in its application to biology, biomedical, radiation hardness, and information security studies.
PACSY, a relational database management system for protein structure and chemical shift analysis.
Lee, Woonghee; Yu, Wookyung; Kim, Suhkmann; Chang, Iksoo; Lee, Weontae; Markley, John L
2012-10-01
PACSY (Protein structure And Chemical Shift NMR spectroscopY) is a relational database management system that integrates information from the Protein Data Bank, the Biological Magnetic Resonance Data Bank, and the Structural Classification of Proteins database. PACSY provides three-dimensional coordinates and chemical shifts of atoms along with derived information such as torsion angles, solvent accessible surface areas, and hydrophobicity scales. PACSY consists of six relational table types linked to one another for coherence by key identification numbers. Database queries are enabled by advanced search functions supported by an RDBMS server such as MySQL or PostgreSQL. PACSY enables users to search for combinations of information from different database sources in support of their research. Two software packages, PACSY Maker for database creation and PACSY Analyzer for database analysis, are available from http://pacsy.nmrfam.wisc.edu.
Wiley, Laura K.; Sivley, R. Michael; Bush, William S.
2013-01-01
Efficient storage and retrieval of genomic annotations based on range intervals is necessary, given the amount of data produced by next-generation sequencing studies. The indexing strategies of relational database systems (such as MySQL) greatly inhibit their use in genomic annotation tasks. This has led to the development of stand-alone applications that are dependent on flat-file libraries. In this work, we introduce MyNCList, an implementation of the NCList data structure within a MySQL database. MyNCList enables the storage, update and rapid retrieval of genomic annotations from the convenience of a relational database system. Range-based annotations of 1 million variants are retrieved in under a minute, making this approach feasible for whole-genome annotation tasks. Database URL: https://github.com/bushlab/mynclist PMID:23894185
Wiley, Laura K; Sivley, R Michael; Bush, William S
2013-01-01
Efficient storage and retrieval of genomic annotations based on range intervals is necessary, given the amount of data produced by next-generation sequencing studies. The indexing strategies of relational database systems (such as MySQL) greatly inhibit their use in genomic annotation tasks. This has led to the development of stand-alone applications that are dependent on flat-file libraries. In this work, we introduce MyNCList, an implementation of the NCList data structure within a MySQL database. MyNCList enables the storage, update and rapid retrieval of genomic annotations from the convenience of a relational database system. Range-based annotations of 1 million variants are retrieved in under a minute, making this approach feasible for whole-genome annotation tasks. Database URL: https://github.com/bushlab/mynclist.
MaGnET: Malaria Genome Exploration Tool
Sharman, Joanna L.; Gerloff, Dietlind L.
2013-01-01
Summary: The Malaria Genome Exploration Tool (MaGnET) is a software tool enabling intuitive ‘exploration-style’ visualization of functional genomics data relating to the malaria parasite, Plasmodium falciparum. MaGnET provides innovative integrated graphic displays for different datasets, including genomic location of genes, mRNA expression data, protein–protein interactions and more. Any selection of genes to explore made by the user is easily carried over between the different viewers for different datasets, and can be changed interactively at any point (without returning to a search). Availability and Implementation: Free online use (Java Web Start) or download (Java application archive and MySQL database; requires local MySQL installation) at http://malariagenomeexplorer.org Contact: joanna.sharman@ed.ac.uk or dgerloff@ffame.org Supplementary information: Supplementary data are available at Bioinformatics online. PMID:23894142
A SQL-Database Based Meta-CASE System and its Query Subsystem
NASA Astrophysics Data System (ADS)
Eessaar, Erki; Sgirka, Rünno
Meta-CASE systems simplify the creation of CASE (Computer Aided System Engineering) systems. In this paper, we present a meta-CASE system that provides a web-based user interface and uses an object-relational database system (ORDBMS) as its basis. The use of ORDBMSs allows us to integrate different parts of the system and simplify the creation of meta-CASE and CASE systems. ORDBMSs provide powerful query mechanism. The proposed system allows developers to use queries to evaluate and gradually improve artifacts and calculate values of software measures. We illustrate the use of the systems by using SimpleM modeling language and discuss the use of SQL in the context of queries about artifacts. We have created a prototype of the meta-CASE system by using PostgreSQL™ ORDBMS and PHP scripting language.
Database on Demand: insight how to build your own DBaaS
NASA Astrophysics Data System (ADS)
Gaspar Aparicio, Ruben; Coterillo Coz, Ignacio
2015-12-01
At CERN, a number of key database applications are running on user-managed MySQL, PostgreSQL and Oracle database services. The Database on Demand (DBoD) project was born out of an idea to provide CERN user community with an environment to develop and run database services as a complement to the central Oracle based database service. The Database on Demand empowers the user to perform certain actions that had been traditionally done by database administrators, providing an enterprise platform for database applications. It also allows the CERN user community to run different database engines, e.g. presently three major RDBMS (relational database management system) vendors are offered. In this article we show the actual status of the service after almost three years of operations, some insight of our new redesign software engineering and near future evolution.
Lu, Ying-Hao; Kuo, Chen-Chun; Huang, Yaw-Bin
2011-08-01
We selected HTML, PHP and JavaScript as the programming languages to build "WebBio", a web-based system for patient data of biological products and used MySQL as database. WebBio is based on the PHP-MySQL suite and is run by Apache server on Linux machine. WebBio provides the functions of data management, searching function and data analysis for 20 kinds of biological products (plasma expanders, human immunoglobulin and hematological products). There are two particular features in WebBio: (1) pharmacists can rapidly find out whose patients used contaminated products for medication safety, and (2) the statistics charts for a specific product can be automatically generated to reduce pharmacist's work loading. WebBio has successfully turned traditional paper work into web-based data management.
A Comparison of Different Database Technologies for the CMS AsyncStageOut Transfer Database
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ciangottini, D.; Balcas, J.; Mascheroni, M.
AsyncStageOut (ASO) is the component of the CMS distributed data analysis system (CRAB) that manages users transfers in a centrally controlled way using the File Transfer System (FTS3) at CERN. It addresses a major weakness of the previous, decentralized model, namely that the transfer of the user’s output data to a single remote site was part of the job execution, resulting in inefficient use of job slots and an unacceptable failure rate. Currently ASO manages up to 600k files of various sizes per day from more than 500 users per month, spread over more than 100 sites. ASO uses amore » NoSQL database (CouchDB) as internal bookkeeping and as way to communicate with other CRAB components. Since ASO/CRAB were put in production in 2014, the number of transfers constantly increased up to a point where the pressure to the central CouchDB instance became critical, creating new challenges for the system scalability, performance, and monitoring. This forced a re-engineering of the ASO application to increase its scalability and lowering its operational effort. In this contribution we present a comparison of the performance of the current NoSQL implementation and a new SQL implementation, and how their different strengths and features influenced the design choices and operational experience. We also discuss other architectural changes introduced in the system to handle the increasing load and latency in delivering output to the user.« less
A comparison of different database technologies for the CMS AsyncStageOut transfer database
NASA Astrophysics Data System (ADS)
Ciangottini, D.; Balcas, J.; Mascheroni, M.; Rupeika, E. A.; Vaandering, E.; Riahi, H.; Silva, J. M. D.; Hernandez, J. M.; Belforte, S.; Ivanov, T. T.
2017-10-01
AsyncStageOut (ASO) is the component of the CMS distributed data analysis system (CRAB) that manages users transfers in a centrally controlled way using the File Transfer System (FTS3) at CERN. It addresses a major weakness of the previous, decentralized model, namely that the transfer of the user’s output data to a single remote site was part of the job execution, resulting in inefficient use of job slots and an unacceptable failure rate. Currently ASO manages up to 600k files of various sizes per day from more than 500 users per month, spread over more than 100 sites. ASO uses a NoSQL database (CouchDB) as internal bookkeeping and as way to communicate with other CRAB components. Since ASO/CRAB were put in production in 2014, the number of transfers constantly increased up to a point where the pressure to the central CouchDB instance became critical, creating new challenges for the system scalability, performance, and monitoring. This forced a re-engineering of the ASO application to increase its scalability and lowering its operational effort. In this contribution we present a comparison of the performance of the current NoSQL implementation and a new SQL implementation, and how their different strengths and features influenced the design choices and operational experience. We also discuss other architectural changes introduced in the system to handle the increasing load and latency in delivering output to the user.
Temsch, W; Luger, A; Riedl, M
2008-01-01
This article presents a mathematical model to calculate HbA1c values based on self-measured blood glucose and past HbA1c levels, thereby enabling patients to monitor diabetes therapy between scheduled checkups. This method could help physicians to make treatment decisions if implemented in a system where glucose data are transferred to a remote server. The method, however, cannot replace HbA1c measurements; past HbA1c values are needed to gauge the method. The mathematical model of HbA1c formation was developed based on biochemical principles. Unlike an existing HbA1c formula, the new model respects the decreasing contribution of older glucose levels to current HbA1c values. About 12 standard SQL statements embedded in a php program were used to perform Fourier transform. Regression analysis was used to gauge results with previous HbA1c values. The method can be readily implemented in any SQL database. The predicted HbA1c values thus obtained were in accordance with measured values. They also matched the results of the HbA1c formula in the elevated range. By contrast, the formula was too "optimistic" in the range of better glycemic control. Individual analysis of two subjects improved the accuracy of values and reflected the bias introduced by different glucometers and individual measurement habits.
Improved oilfield GHG accounting using a global oilfield database
NASA Astrophysics Data System (ADS)
Roberts, S.; Brandt, A. R.; Masnadi, M.
2016-12-01
The definition of oil is shifting in considerable ways. Conventional oil resources are declining as oil sands, heavy oils, and others emerge. Technological advances mean that these unconventional hydrocarbons are now viable resources. Meanwhile, scientific evidence is mounting that climate change is occurring. The oil sector is responsible for 35% of global greenhouse gas (GHG) emissions, but the climate impacts of these new unconventional oils are not well understood. As such, the Oil Climate Index (OCI) project has been an international effort to evaluate the total life-cycle environmental GHG emissions of different oil fields globally. Over the course of the first and second phases of the project, 30 and 75 global oil fields have been investigated, respectively. The 75 fields account for about 25% of global oil production. For the third phase of the project, it is aimed to expand the OCI to contain closing to 100% of global oil production; leading to the analysis of 8000 fields. To accomplish this, a robust database system is required to handle and manipulate the data. Therefore, the integration of the data into the computer science language SQL (Structured Query Language) was performed. The implementation of SQL allows users to process the data more efficiently than would be possible by using the previously established program (Microsoft Excel). Next, a graphic user interface (gui) was implemented, in the computer science language of C#, in order to make the data interactive; enabling people to update the database without prior knowledge of SQL being necessary.
CRAB3: Establishing a new generation of services for distributed analysis at CMS
NASA Astrophysics Data System (ADS)
Cinquilli, M.; Spiga, D.; Grandi, C.; Hernàndez, J. M.; Konstantinov, P.; Mascheroni, M.; Riahi, H.; Vaandering, E.
2012-12-01
In CMS Computing the highest priorities for analysis tools are the improvement of the end users’ ability to produce and publish reliable samples and analysis results as well as a transition to a sustainable development and operations model. To achieve these goals CMS decided to incorporate analysis processing into the same framework as data and simulation processing. This strategy foresees that all workload tools (TierO, Tier1, production, analysis) share a common core with long term maintainability as well as the standardization of the operator interfaces. The re-engineered analysis workload manager, called CRAB3, makes use of newer technologies, such as RESTFul based web services and NoSQL Databases, aiming to increase the scalability and reliability of the system. As opposed to CRAB2, in CRAB3 all work is centrally injected and managed in a global queue. A pool of agents, which can be geographically distributed, consumes work from the central services serving the user tasks. The new architecture of CRAB substantially changes the deployment model and operations activities. In this paper we present the implementation of CRAB3, emphasizing how the new architecture improves the workflow automation and simplifies maintainability. In particular, we will highlight the impact of the new design on daily operations.
Astronomical databases of Nikolaev Observatory
NASA Astrophysics Data System (ADS)
Protsyuk, Y.; Mazhaev, A.
2008-07-01
Several astronomical databases were created at Nikolaev Observatory during the last years. The databases are built by using MySQL search engine and PHP scripts. They are available on NAO web-site http://www.mao.nikolaev.ua.
Physics of phagocytosis of foreign versus self-tolerance
NASA Astrophysics Data System (ADS)
Tsai, Richard; Rodriguez, Pia; Discher, Dennis
2009-03-01
The first cells to `attack' an implanted or injected foreign material or microbe are phagocytic cells of the innate immune system. These cells actively and rapidly phagocytose foreign cells, surfaces, or particles, but the process that is inefficient when faced with ``self'' cells. We have examined the biochemistry and some of the physics of this decision to eat or not eat. One particular protein on all animal cell membranes, called CD47, seems to engage phagocytic cell couter-receptors, and deactivate the force-generating myosin machinery that otherwise makes phagocytosis efficient. We will map the phagocytic synapse between phagocytes and particles or cells and describe the physicochemical dynamics that mediate this key decision in compatability.
NASA Technical Reports Server (NTRS)
Sharpe, L., Jr.
1987-01-01
A 12.5 degree half cone with tangential slot injection at Mach 6.95 was studied to determine the heating rates to the surface of the body near and far downstream of the slot. The cone had a zero degree angle of attack. The heating rates were obtained using a computer program that was developed at NASA-Langley Research Center. The concentration of nitrogen from the slot into the boundary layer was also determined. The ratio of slot to freestream was varied to determine its effect on heating. The numerical heating rates were compared to other correlations obtained from experimental studies as well as theoretical laminar and turbulent results.
Multiorgan failure following mass wasp stings.
Lin, Cheng-Jui; Wu, Chih-Jen; Chen, Han-Hsiang; Lin, Hsin-Chang
2011-05-01
Wasp bites usually bring temporary discomfort and pain, but on occasion, they can cause serious infections and fatal allergic reactions. We report on a patient who experienced massive wasp stings and developed multiple organ failure, including acute kidney, hepatic failure, and circulatory collapse 4 days later. He was treated with aggressive fluid resuscitation, inotropic agent, intravenous injection of steroids, broad-spectrum antibiotics, and hemodialysis. After intensive treatment, his liver function recovered one month later. Recovery of renal function was delayed, and the patient needed temporary regular hemodialysis. The pathology of kidney biopsy showed acute tubulointerstitial nephritis. This case shows that toxic reactions following massive wasp attacks may happen several days after the fact and result in severe, multiorgan system dysfunction.
Roncon, Camila Marroni; Yamashita, Paula Shimene de Melo; Frias, Alana Tercino; Audi, Elisabeth Aparecida; Graeff, Frederico Guilherme; Coimbra, Norberto Cysne; Zangrossi, Helio
2017-06-01
The dorsomedial hypothalamus (DMH) and the dorsal periaqueductal gray (DPAG) have been implicated in the genesis and regulation of panic-related defensive behaviors, such as escape. Previous results point to an interaction between serotonergic and opioidergic systems within the DPAG to inhibit escape, involving µ-opioid and 5-HT1A receptors (5-HT1AR). In the present study we explore this interaction in the DMH, using escape elicited by electrical stimulation of this area as a panic attack index. The obtained results show that intra-DMH administration of the non-selective opioid receptor antagonist naloxone (0.5 nmol) prevented the panicolytic-like effect of a local injection of serotonin (20 nmol). Pretreatment with the selective μ-opioid receptor (MOR) antagonist CTOP (1 nmol) blocked the panicolytic-like effect of the 5-HT1AR agonist 8-OHDPAT (8 nmol). Intra-DMH injection of the selective MOR agonist DAMGO (0.3 nmol) also inhibited escape behavior, and a previous injection of the 5-HT1AR antagonist WAY-100635 (0.37 nmol) counteracted this panicolytic-like effect. These results offer the first evidence that serotonergic and opioidergic systems work together within the DMH to inhibit panic-like behavior through an interaction between µ-opioid and 5-HT1A receptors, as previously described in the DPAG.
Ebersole, Jeffery L.; de Villiers, Willem J. S.
2014-01-01
Objectives and design Microbial products can act via stress-induced signaling cascades to link dysregulated endogenous microbiota to immune activation (e.g., macrophages) and pregnancy loss. Our previous studies demonstrated that mice deficient in the macrophage pattern recognition scavenger receptors, SR-A and CD36, are more susceptible to inflammatory complications including gut leakiness and experimental colitis. We hypothesized that bacterial penetration of the maternal mucosal surfaces and replication in embryonic fluids compromise the fetal status and can result in miscarriage. Materials and methods Eighty pregnant ICR and SR-A/CD36-deficient mice were injected via tail vein or intraperitoneally with commensal bacteria (Streptococcus cricetus and/or Actinobacillus sp.) or sham controls. Dams were monitored daily for physical distress, pain and abortion. Results Dams injected with single dose bacterial inoculum did not develop clinical symptoms. Day old pups injected with bacteria developed internal focal abscesses, lost weight but recovered after 1 week. Dams receiving a second bacterial inoculum delivered dead fetuses. However, SR-A/CD36-deficnet dams demonstrated 100% fetal death via aborted fetuses, and significant up-regulation of the proinflammatory markers (IL-6, serum Amyloid A) 24–74 h after single inoculum. Conclusions These data indicate that macrophage scavenger receptors are required for the fetal protection against microbial attack and support that maternal transfer of innate immunity contributes to this protection. PMID:20711846
VACCINATION AGAINST YELLOW FEVER WITH IMMUNE SERUM AND VIRUS FIXED FOR MICE
Sawyer, W. A.; Kitchen, S. F.; Lloyd, Wray
1932-01-01
1. After preliminary experiments in monkeys, 15 persons were actively immunized by a single injection of a dried mixture of living yellow fever virus, fixed for mice, and human immune serum, with separate injections of enough additional serum to make up the amount required for protection. 2. One person was similarly immunized by injecting immune serum and dried virus separately. 3. By titration of the sera of vaccinated persons in mice, it was shown that the immunity rose in a few weeks to a height comparable to that reached after an attack of yellow fever, and remained there throughout an observation period of 6 months. 4. Yellow fever virus could not be recovered from the blood of vaccinated persons or monkeys, except when the latter had received less than the minimal effective amount of immune serum. 5. Neutralization of yellow fever virus by immune serum took place very slowly in vitro at room temperature in our experiments, and could not have been an appreciable factor in vaccination with the serum virus mixtures. 6. A mixture of fixed virus and immune serum retained its immunizing power for 8 months when dried in the frozen state and sealed in glass. 7. It appears that the immunizing reaction after yellow fever vaccination was a part of a true infectious process, as was also the observed leucopenia. PMID:19870044
WEB-GIS Decision Support System for CO2 storage
NASA Astrophysics Data System (ADS)
Gaitanaru, Dragos; Leonard, Anghel; Radu Gogu, Constantin; Le Guen, Yvi; Scradeanu, Daniel; Pagnejer, Mihaela
2013-04-01
Environmental decision support systems (DSS) paradigm evolves and changes as more knowledge and technology become available to the environmental community. Geographic Information Systems (GIS) can be used to extract, assess and disseminate some types of information, which are otherwise difficult to access by traditional methods. In the same time, with the help of the Internet and accompanying tools, creating and publishing online interactive maps has become easier and rich with options. The Decision Support System (MDSS) developed for the MUSTANG (A MUltiple Space and Time scale Approach for the quaNtification of deep saline formations for CO2 storaGe) project is a user friendly web based application that uses the GIS capabilities. MDSS can be exploited by the experts for CO2 injection and storage in deep saline aquifers. The main objective of the MDSS is to help the experts to take decisions based large structured types of data and information. In order to achieve this objective the MDSS has a geospatial objected-orientated database structure for a wide variety of data and information. The entire application is based on several principles leading to a series of capabilities and specific characteristics: (i) Open-Source - the entire platform (MDSS) is based on open-source technologies - (1) database engine, (2) application server, (3) geospatial server, (4) user interfaces, (5) add-ons, etc. (ii) Multiple database connections - MDSS is capable to connect to different databases that are located on different server machines. (iii)Desktop user experience - MDSS architecture and design follows the structure of a desktop software. (iv)Communication - the server side and the desktop are bound together by series functions that allows the user to upload, use, modify and download data within the application. The architecture of the system involves one database and a modular application composed by: (1) a visualization module, (2) an analysis module, (3) a guidelines module, and (4) a risk assessment module. The Database component is build by using the PostgreSQL and PostGIS open source technology. The visualization module allows the user to view data of CO2 injection sites in different ways: (1) geospatial visualization, (2) table view, (3) 3D visualization. The analysis module will allow the user to perform certain analysis like Injectivity, Containment and Capacity analysis. The Risk Assessment module focus on the site risk matrix approach. The Guidelines module contains the methodologies of CO2 injection and storage into deep saline aquifers guidelines.
Toxicity ForeCaster (ToxCast™) Data
Data is organized into different data sets and includes descriptions of ToxCast chemicals and assays and files summarizing the screening results, a MySQL database, chemicals screened through Tox21, and available data generated from animal toxicity studies.
NASA Astrophysics Data System (ADS)
Barouchou, Alexandra; Dendrinos, Markos
2015-02-01
An interesting issue in the domain of history of science and ideas is the concept of similarity of historical personalities. Similar objects of research of philosophers and scientists indicate prospective influences, caused either from one another's reading or meetings, communication or even cooperation. Key methodological role in the surfacing of the sought similarities play the keywords extracted from their works as well as their placement in a philosophical and scientific term taxonomy. The case study examined in the framework of this paper concerns scientists and philosophers, who lived in ancient Greece or Renaissance periods and dealt, in at least one work, with the subject God. All the available data (scientists, studies, recorded relations between scientists, keywords, and thematic hierarchy) have been organized in an RDBMS environment, aiming at the emergence of similarities and influences between scientists through properly created SQL queries based on date and thematic hierarchy criteria.
STINGRAY: system for integrated genomic resources and analysis.
Wagner, Glauber; Jardim, Rodrigo; Tschoeke, Diogo A; Loureiro, Daniel R; Ocaña, Kary A C S; Ribeiro, Antonio C B; Emmel, Vanessa E; Probst, Christian M; Pitaluga, André N; Grisard, Edmundo C; Cavalcanti, Maria C; Campos, Maria L M; Mattoso, Marta; Dávila, Alberto M R
2014-03-07
The STINGRAY system has been conceived to ease the tasks of integrating, analyzing, annotating and presenting genomic and expression data from Sanger and Next Generation Sequencing (NGS) platforms. STINGRAY includes: (a) a complete and integrated workflow (more than 20 bioinformatics tools) ranging from functional annotation to phylogeny; (b) a MySQL database schema, suitable for data integration and user access control; and (c) a user-friendly graphical web-based interface that makes the system intuitive, facilitating the tasks of data analysis and annotation. STINGRAY showed to be an easy to use and complete system for analyzing sequencing data. While both Sanger and NGS platforms are supported, the system could be faster using Sanger data, since the large NGS datasets could potentially slow down the MySQL database usage. STINGRAY is available at http://stingray.biowebdb.org and the open source code at http://sourceforge.net/projects/stingray-biowebdb/.
Kilintzis, Vassilis; Beredimas, Nikolaos; Chouvarda, Ioanna
2014-01-01
An integral part of a system that manages medical data is the persistent storage engine. For almost twenty five years Relational Database Management Systems(RDBMS) were considered the obvious decision, yet today new technologies have emerged that require our attention as possible alternatives. Triplestores store information in terms of RDF triples without necessarily binding to a specific predefined structural model. In this paper we present an attempt to compare the performance of Apache JENA-Fuseki and the Virtuoso Universal Server 6 triplestores with that of MySQL 5.6 RDBMS for storing and retrieving medical information that it is communicated as RDF/XML ontology instances over a RESTful web service. The results show that the performance, calculated as average time of storing and retrieving instances, is significantly better using Virtuoso Server while MySQL performed better than Fuseki.
Data Processing on Database Management Systems with Fuzzy Query
NASA Astrophysics Data System (ADS)
Şimşek, Irfan; Topuz, Vedat
In this study, a fuzzy query tool (SQLf) for non-fuzzy database management systems was developed. In addition, samples of fuzzy queries were made by using real data with the tool developed in this study. Performance of SQLf was tested with the data about the Marmara University students' food grant. The food grant data were collected in MySQL database by using a form which had been filled on the web. The students filled a form on the web to describe their social and economical conditions for the food grant request. This form consists of questions which have fuzzy and crisp answers. The main purpose of this fuzzy query is to determine the students who deserve the grant. The SQLf easily found the eligible students for the grant through predefined fuzzy values. The fuzzy query tool (SQLf) could be used easily with other database system like ORACLE and SQL server.
2017-01-01
Reusing the data from healthcare information systems can effectively facilitate clinical trials (CTs). How to select candidate patients eligible for CT recruitment criteria is a central task. Related work either depends on DBA (database administrator) to convert the recruitment criteria to native SQL queries or involves the data mapping between a standard ontology/information model and individual data source schema. This paper proposes an alternative computer-aided CT recruitment paradigm, based on syntax translation between different DSLs (domain-specific languages). In this paradigm, the CT recruitment criteria are first formally represented as production rules. The referenced rule variables are all from the underlying database schema. Then the production rule is translated to an intermediate query-oriented DSL (e.g., LINQ). Finally, the intermediate DSL is directly mapped to native database queries (e.g., SQL) automated by ORM (object-relational mapping). PMID:29065644
PACSY, a relational database management system for protein structure and chemical shift analysis
Lee, Woonghee; Yu, Wookyung; Kim, Suhkmann; Chang, Iksoo
2012-01-01
PACSY (Protein structure And Chemical Shift NMR spectroscopY) is a relational database management system that integrates information from the Protein Data Bank, the Biological Magnetic Resonance Data Bank, and the Structural Classification of Proteins database. PACSY provides three-dimensional coordinates and chemical shifts of atoms along with derived information such as torsion angles, solvent accessible surface areas, and hydrophobicity scales. PACSY consists of six relational table types linked to one another for coherence by key identification numbers. Database queries are enabled by advanced search functions supported by an RDBMS server such as MySQL or PostgreSQL. PACSY enables users to search for combinations of information from different database sources in support of their research. Two software packages, PACSY Maker for database creation and PACSY Analyzer for database analysis, are available from http://pacsy.nmrfam.wisc.edu. PMID:22903636
A UML Profile for Developing Databases that Conform to the Third Manifesto
NASA Astrophysics Data System (ADS)
Eessaar, Erki
The Third Manifesto (TTM) presents the principles of a relational database language that is free of deficiencies and ambiguities of SQL. There are database management systems that are created according to TTM. Developers need tools that support the development of databases by using these database management systems. UML is a widely used visual modeling language. It provides built-in extension mechanism that makes it possible to extend UML by creating profiles. In this paper, we introduce a UML profile for designing databases that correspond to the rules of TTM. We created the first version of the profile by translating existing profiles of SQL database design. After that, we extended and improved the profile. We implemented the profile by using UML CASE system StarUML™. We present an example of using the new profile. In addition, we describe problems that occurred during the profile development.
Development of noSQL data storage for the ATLAS PanDA Monitoring System
NASA Astrophysics Data System (ADS)
Potekhin, M.; ATLAS Collaboration
2012-06-01
For several years the PanDA Workload Management System has been the basis for distributed production and analysis for the ATLAS experiment at the LHC. Since the start of data taking PanDA usage has ramped up steadily, typically exceeding 500k completed jobs/day by June 2011. The associated monitoring data volume has been rising as well, to levels that present a new set of challenges in the areas of database scalability and monitoring system performance and efficiency. These challenges are being met with a R&D effort aimed at implementing a scalable and efficient monitoring data storage based on a noSQL solution (Cassandra). We present our motivations for using this technology, as well as data design and the techniques used for efficient indexing of the data. We also discuss the hardware requirements as they were determined by testing with actual data and realistic loads.
NASA Astrophysics Data System (ADS)
Dervos, D. A.; Skourlas, C.; Laiho, M.
2015-02-01
"DBTech VET Teachers" project is Leonardo da Vinci Multilateral Transfer of Innovation Project co-financed by the European Commission's Lifelong Learning Programme. The aim of the project is to renew the teaching of database technologies in VET (Vocational Education and Training) institutes, on the basis of the current and real needs of ICT industry in Europe. Training of the VET teachers is done with the systems used in working life and they are taught to guide students to learning by verifying. In this framework, a course module on SQL transactions is prepared and offered. In this paper we present and briefly discuss some qualitative/quantitative data collected from its first pilot offering to an international audience in Greece during May-June 2013. The questionnaire/evaluation results, and the types of participants who have attended the course offering, are presented. Conclusions are also presented.
GEOmetadb: powerful alternative search engine for the Gene Expression Omnibus
Zhu, Yuelin; Davis, Sean; Stephens, Robert; Meltzer, Paul S.; Chen, Yidong
2008-01-01
The NCBI Gene Expression Omnibus (GEO) represents the largest public repository of microarray data. However, finding data in GEO can be challenging. We have developed GEOmetadb in an attempt to make querying the GEO metadata both easier and more powerful. All GEO metadata records as well as the relationships between them are parsed and stored in a local MySQL database. A powerful, flexible web search interface with several convenient utilities provides query capabilities not available via NCBI tools. In addition, a Bioconductor package, GEOmetadb that utilizes a SQLite export of the entire GEOmetadb database is also available, rendering the entire GEO database accessible with full power of SQL-based queries from within R. Availability: The web interface and SQLite databases available at http://gbnci.abcc.ncifcrf.gov/geo/. The Bioconductor package is available via the Bioconductor project. The corresponding MATLAB implementation is also available at the same website. Contact: yidong@mail.nih.gov PMID:18842599
STINGRAY: system for integrated genomic resources and analysis
2014-01-01
Background The STINGRAY system has been conceived to ease the tasks of integrating, analyzing, annotating and presenting genomic and expression data from Sanger and Next Generation Sequencing (NGS) platforms. Findings STINGRAY includes: (a) a complete and integrated workflow (more than 20 bioinformatics tools) ranging from functional annotation to phylogeny; (b) a MySQL database schema, suitable for data integration and user access control; and (c) a user-friendly graphical web-based interface that makes the system intuitive, facilitating the tasks of data analysis and annotation. Conclusion STINGRAY showed to be an easy to use and complete system for analyzing sequencing data. While both Sanger and NGS platforms are supported, the system could be faster using Sanger data, since the large NGS datasets could potentially slow down the MySQL database usage. STINGRAY is available at http://stingray.biowebdb.org and the open source code at http://sourceforge.net/projects/stingray-biowebdb/. PMID:24606808
Levy, C.; Beauchamp, C.
1996-01-01
This poster describes the methods used and working prototype that was developed from an abstraction of the relational model from the VA's hierarchical DHCP database. Overlaying the relational model on DHCP permits multiple user views of the physical data structure, enhances access to the database by providing a link to commercial (SQL based) software, and supports a conceptual managed care data model based on primary and longitudinal patient care. The goal of this work was to create a relational abstraction of the existing hierarchical database; to construct, using SQL data definition language, user views of the database which reflect the clinical conceptual view of DHCP, and to allow the user to work directly with the logical view of the data using GUI based commercial software of their choosing. The workstation is intended to serve as a platform from which a managed care information model could be implemented and evaluated.
Hosting and pulishing astronomical data in SQL databases
NASA Astrophysics Data System (ADS)
Galkin, Anastasia; Klar, Jochen; Riebe, Kristin; Matokevic, Gal; Enke, Harry
2017-04-01
In astronomy, terabytes and petabytes of data are produced by ground instruments, satellite missions and simulations. At Leibniz-Institute for Astrophysics Potsdam (AIP) we host and publish terabytes of cosmological simulation and observational data. The public archive at AIP has now reached a size of 60TB and growing and helps to produce numerous scientific papers. The web framework Daiquiri offers a dedicated web interface for each of the hosted scientific databases. Scientists all around the world run SQL queries which include specific astrophysical functions and get their desired data in reasonable time. Daiquiri supports the scientific projects by offering a number of administration tools such as database and user management, contact messages to the staff and support for organization of meetings and workshops. The webpages can be customized and the Wordpress integration supports the participating scientists in maintaining the documentation and the projects' news sections.
Zhang, Yinsheng; Zhang, Guoming; Shang, Qian
2017-01-01
Reusing the data from healthcare information systems can effectively facilitate clinical trials (CTs). How to select candidate patients eligible for CT recruitment criteria is a central task. Related work either depends on DBA (database administrator) to convert the recruitment criteria to native SQL queries or involves the data mapping between a standard ontology/information model and individual data source schema. This paper proposes an alternative computer-aided CT recruitment paradigm, based on syntax translation between different DSLs (domain-specific languages). In this paradigm, the CT recruitment criteria are first formally represented as production rules. The referenced rule variables are all from the underlying database schema. Then the production rule is translated to an intermediate query-oriented DSL (e.g., LINQ). Finally, the intermediate DSL is directly mapped to native database queries (e.g., SQL) automated by ORM (object-relational mapping).
DOE Office of Scientific and Technical Information (OSTI.GOV)
Khalili, Farid; Danilishin, Stefan; Mueller-Ebhardt, Helge
We consider enhancing the sensitivity of future gravitational-wave detectors by using double optical spring. When the power, detuning and bandwidth of the two carriers are chosen appropriately, the effect of the double optical spring can be described as a 'negative inertia', which cancels the positive inertia of the test masses and thus increases their response to gravitational waves. This allows us to surpass the free-mass standard quantum limit (SQL) over a broad frequency band, through signal amplification, rather than noise cancellation, which has been the case for all broadband SQL-beating schemes so far considered for gravitational-wave detectors. The merit ofmore » such signal amplification schemes lies in the fact that they are less susceptible to optical losses than noise-cancellation schemes. We show that it is feasible to demonstrate such an effect with the Gingin High Optical Power Test Facility, and it can eventually be implemented in future advanced GW detectors.« less
Guo, Jiu-Qing; Deng, Hui-Hui; Bo, Xiao
2017-01-01
ABSTRACT Migraine is a highly prevalent headache disorder, especially in women. Brain-derived neurotrophic factor (BDNF) and its receptor tropomyosin receptor kinases (TrkB), as well as extracellular signal-regulated kinase (ERK) and its downstream target c-AMP-responsive element binding protein (CREB) are strongly associated with the transmission of nociceptive information. However, the involvement of these substances in migraine has rarely been examined. In the present study, intraperitoneal injection of nitroglycerin (NTC) successfully induced rat migraine attack, as evidenced by behavioral testing. The location and abundance of these substances in the migraine model were determined by immunohistochemistry, real-time polymerase chain reaction (RT-PCR), western blot and enzyme-linked immunosorbant assays (ELISA). Results showed that BDNF, TrkB, phosphor(p)-ERK and p-CREB were up-regulated in the brain neurons of both male and female rats with NTG-induced migraine compared to non-migraine control, whereas their expression levels were decreased in headache-free intervals of the migraine compared to migraine attacks. Estrogen is an important contributor to migraine. Female ovariectomized rats showed significant reduction in the expression of BDNF, TrkB, p-CREB and p-ERK in both attacks and intervals of NTG-induced migraine, relative to rats that have their ovaries. But, intraperitoneal administration of exogenous estrogen recovered their expression in ovariectomized rats. Collectively, this study unveiled a positive correlation of BDNF/TrkB and ERK/CREB axes in NTG-induced migraine and promoting effects of estrogen on their signals in the migraine. These findings contribute to further understanding the pathogenesis of migraine in the molecular basis. PMID:27875242
Visualization of Vgi Data Through the New NASA Web World Wind Virtual Globe
NASA Astrophysics Data System (ADS)
Brovelli, M. A.; Kilsedar, C. E.; Zamboni, G.
2016-06-01
GeoWeb 2.0, laying the foundations of Volunteered Geographic Information (VGI) systems, has led to platforms where users can contribute to the geographic knowledge that is open to access. Moreover, as a result of the advancements in 3D visualization, virtual globes able to visualize geographic data even on browsers emerged. However the integration of VGI systems and virtual globes has not been fully realized. The study presented aims to visualize volunteered data in 3D, considering also the ease of use aspects for general public, using Free and Open Source Software (FOSS). The new Application Programming Interface (API) of NASA, Web World Wind, written in JavaScript and based on Web Graphics Library (WebGL) is cross-platform and cross-browser, so that the virtual globe created using this API can be accessible through any WebGL supported browser on different operating systems and devices, as a result not requiring any installation or configuration on the client-side, making the collected data more usable to users, which is not the case with the World Wind for Java as installation and configuration of the Java Virtual Machine (JVM) is required. Furthermore, the data collected through various VGI platforms might be in different formats, stored in a traditional relational database or in a NoSQL database. The project developed aims to visualize and query data collected through Open Data Kit (ODK) platform and a cross-platform application, where data is stored in a relational PostgreSQL and NoSQL CouchDB databases respectively.
Social media based NPL system to find and retrieve ARM data: Concept paper
DOE Office of Scientific and Technical Information (OSTI.GOV)
Devarakonda, Ranjeet; Giansiracusa, Michael T.; Kumar, Jitendra
Information connectivity and retrieval has a role in our daily lives. The most pervasive source of online information is databases. The amount of data is growing at rapid rate and database technology is improving and having a profound effect. Almost all online applications are storing and retrieving information from databases. One challenge in supplying the public with wider access to informational databases is the need for knowledge of database languages like Structured Query Language (SQL). Although the SQL language has been published in many forms, not everybody is able to write SQL queries. Another challenge is that it may notmore » be practical to make the public aware of the structure of the database. There is a need for novice users to query relational databases using their natural language. To solve this problem, many natural language interfaces to structured databases have been developed. The goal is to provide more intuitive method for generating database queries and delivering responses. Social media makes it possible to interact with a wide section of the population. Through this medium, and with the help of Natural Language Processing (NLP) we can make the data of the Atmospheric Radiation Measurement Data Center (ADC) more accessible to the public. We propose an architecture for using Apache Lucene/Solr [1], OpenML [2,3], and Kafka [4] to generate an automated query/response system with inputs from Twitter5, our Cassandra DB, and our log database. Using the Twitter API and NLP we can give the public the ability to ask questions of our database and get automated responses.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Devarakonda, Ranjeet; Giansiracusa, Michael T.; Kumar, Jitendra
Information connectivity and retrieval has a role in our daily lives. The most pervasive source of online information is databases. The amount of data is growing at rapid rate and database technology is improving and having a profound effect. Almost all online applications are storing and retrieving information from databases. One challenge in supplying the public with wider access to informational databases is the need for knowledge of database languages like Structured Query Language (SQL). Although the SQL language has been published in many forms, not everybody is able to write SQL queries. Another challenge is that it may notmore » be practical to make the public aware of the structure of the database. There is a need for novice users to query relational databases using their natural language. To solve this problem, many natural language interfaces to structured databases have been developed. The goal is to provide more intuitive method for generating database queries and delivering responses. Social media makes it possible to interact with a wide section of the population. Through this medium, and with the help of Natural Language Processing (NLP) we can make the data of the Atmospheric Radiation Measurement Data Center (ADC) more accessible to the public. We propose an architecture for using Apache Lucene/Solr [1], OpenML [2,3], and Kafka [4] to generate an automated query/response system with inputs from Twitter5, our Cassandra DB, and our log database. Using the Twitter API and NLP we can give the public the ability to ask questions of our database and get automated responses.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Liu, Yong-Liang; Department of Chemistry and Chemical Engineering, Shaanxi Key Laboratory of Comprehensive Utilization of Tailings Resources, Shang Luo University, Shang Luo 726000; Wu, Ya-Pan
2015-03-15
Two new interpenetrating Cu{sup II}/Ni{sup II} coordination polymers, based on a unsymmetrical bifunctional N/O-tectonic 3-(pyrid-4′-yl)-5-(4″-carbonylphenyl)-1,2,4-triazolyl (H{sub 2}pycz), ([Cu-(Hpycz){sub 2}]·2H{sub 2}O){sub n} (1) and ([Ni(Hpycz){sub 2}]·H{sub 2}O){sub n} (2), have been solvothermally synthesized and structure characterization. Single crystal X-ray analysis indicates that compound 1 shows 2-fold parallel interpenetrated 4{sup 4}-sql layers with the same handedness. The overall structure of 1 is achiral—in each layer of doubly interpenetrating nets, the two individual nets have the opposite handedness to the corresponding nets in the adjoining layers—while 2 features a rare 8-fold interpenetrating 6{sup 6}-dia network that belongs to class IIIa interpenetration. In addition,more » compounds 1 and 2 both show similar paramagnetic characteristic properties. - Graphical abstract: Two new Cu(II)/Ni(II) coordination polymers present 2D parallel 2-fold interpenetrated 4{sup 4}-sql layers and a rare 3D 8-fold interpenetrating 6{sup 6}-dia network. In addition, magnetic susceptibility measurements show similar paramagnetic characteristic for two complexes. - Highlights: • A new unsymmetrical bifunctional N/O-tectonic as 4-connected spacer. • A 2-fold parallel interpenetrated sql layer with the same handedness. • A rare 8-fold interpenetrating dia network (class IIIa)« less
Dynamic interactions between hypersonic vehicle aerodynamics and propulsion system performance
NASA Technical Reports Server (NTRS)
Flandro, G. A.; Roach, R. L.; Buschek, H.
1992-01-01
Described here is the development of a flexible simulation model for scramjet hypersonic propulsion systems. The primary goal is determination of sensitivity of the thrust vector and other system parameters to angle of attack changes of the vehicle. Such information is crucial in design and analysis of control system performance for hypersonic vehicles. The code is also intended to be a key element in carrying out dynamic interaction studies involving the influence of vehicle vibrations on propulsion system/control system coupling and flight stability. Simple models are employed to represent the various processes comprising the propulsion system. A method of characteristics (MOC) approach is used to solve the forebody and external nozzle flow fields. This results in a very fast computational algorithm capable of carrying out the vast number of simulation computations needed in guidance, stability, and control studies. The three-dimensional fore- and aft body (nozzle) geometry is characterized by the centerline profiles as represented by a series of coordinate points and body cross-section curvature. The engine module geometry is represented by an adjustable vertical grid to accommodate variations of the field parameters throughout the inlet and combustor. The scramjet inlet is modeled as a two-dimensional supersonic flow containing adjustable sidewall wedges and multiple fuel injection struts. The inlet geometry including the sidewall wedge angles, the number of injection struts, their sweepback relative to the vehicle reference line, and strut cross-section are user selectable. Combustion is currently represented by a Rayleigh line calculation including corrections for variable gas properties; improved models are being developed for this important element of the propulsion flow field. The program generates (1) variation of thrust magnitude and direction with angle of attack, (2) pitching moment and line of action of the thrust vector, (3) pressure and temperature distributions throughout the system, and (4) performance parameters such as thrust coefficient, specific impulse, mass flow rates, and equivalence ratio. Preliminary results are in good agreement with available performance data for systems resembling the NASP vehicle configuration.
NASA Astrophysics Data System (ADS)
Zhang, Xiaowei; Xing, Peiqi; Geng, Xiujuan; Sun, Daofeng; Xiao, Zhenyu; Wang, Lei
2015-09-01
Eight new coordination polymers (CPs), namely, [Zn(1,2-mbix)(tbtpa)]n (1), [Co(1,2-mbix)(tbtpa)]n (2), [CdCl(1,2-mbix)(tbtpa)0.5]n (3), {[Cd(1,2-bix)(tbtpa)]·H2O}n (4), {[Cd0.5(1,2-bix)(tbtpa)0.5]·H2O}n (5), {[Co0.5(1,2-bix)(tbtpa)0.5]·2H2O}n (6), {[Co(1,2-bix)(tbtpa)]·H2O}n (7) and {[Co(1,2-bix)(tbtpa)]·Diox·2H2O}n (8), were synthesized under solvothermal conditions based on mix-ligand strategy (H2tbtpa=tetrabromoterephthalic acid and 1,2-mbix=1,2-bis((2-methyl-1H-imidazol-1-yl)methyl)benzene, 1,2-bix=1,2-bis(imidazol-1-ylmethyl)benzene). All of the CPs have been structurally characterized by single-crystal X-ray diffraction analyses and further characterized by elemental analyses, IR spectroscopy, powder X-ray diffraction (PXRD), and thermogravimetric analyses (TGA). X-ray diffraction analyses show that 1 and 2 are isotypics which have 2D highly undulated networks with (4,4)-sql topology with the existence of C-H ⋯Br interactions; for 3, it has a 2D planar network with (4,4)-sql topology with the occurrence of C-H ⋯Cl interactions other than C-H ⋯Br interactions; 4 shows a 3D 2-fold interpenetrated nets with rare 65·8-mok topology which has a self-catention property. As the same case as 1 and 2, 5 and 6 are also isostructural with planar layers with 44-sql topology which further assembled into 3D supramolecular structure through the interdigitated stacking fashion and the C-Br ⋯Cph interactions. As for 7, it has a 2D slightly undulated networks with (4,4)-sql topology which has one dimension channel. While 8 has a 2-fold interpenetrated networks with (3,4)-connect jeb topology with point symbol {63}{65·8}. And their structures can be tuned by conformations of bis(imidazol) ligands and solvent mixture. Besides, the TGA properties for all compounds and the luminescent properties for 1, 3, 4, 5 are discussed in detail.
Lumry, William R; Craig, Timothy; Zuraw, Bruce; Longhurst, Hilary; Baker, James; Li, H Henry; Bernstein, Jonathan A; Anderson, John; Riedl, Marc A; Manning, Michael E; Keith, Paul K; Levy, Donald S; Caballero, Teresa; Banerji, Aleena; Gower, Richard G; Farkas, Henriette; Lawo, John-Philip; Pragst, Ingo; Machnig, Thomas; Watson, Douglas J
2018-01-31
Hereditary angioedema with C1-inhibitor deficiency (C1-INH-HAE) impairs health-related quality of life (HRQoL). The objective of this study was to assess HRQoL outcomes in patients self-administering subcutaneous C1-INH (C1-INH[SC]; HAEGARDA) for routine prevention of HAE attacks. Post hoc analysis of data from the placebo-controlled, crossover phase III COMPACT study (Clinical Studies for Optimal Management of Preventing Angioedema with Low-Volume Subcutaneous C1-Inhibitor Replacement Therapy). Ninety patients with C1-INH-HAE were randomized to 1 of 4 treatment sequences: C1-INH(SC) 40 or 60 IU/kg twice weekly for 16 weeks, preceded or followed by 16 weeks of twice weekly placebo injections. All HAE attacks were treated with open-label on-demand treatment as necessary. HRQoL assessments at week 14 (last visit) included the European Quality of Life-5 Dimensions Questionnaire (EQ-5D-3L), the Hospital Anxiety and Depression Scale (HADS), the Work Productivity and Activity Impairment Questionnaire (WPAI), and the Treatment Satisfaction Questionnaire for Medication (TSQM). Compared with placebo (on-demand treatment alone), treatment with twice weekly C1-INH(SC) (both doses combined) was associated with better EQ-5D visual analog scale general health, less HADS anxiety, less WPAI presenteeism, work productivity loss, and activity impairment, and greater TSQM effectiveness and overall treatment satisfaction. More patients self-reported a "good/excellent" response during routine prevention with C1-INH(SC) compared with on-demand only (placebo prophylaxis) management. For each HRQoL measure, a greater proportion of patients had a clinically meaningful improvement during C1-INH(SC) treatment compared with placebo. In patients with frequent HAE attacks, a treatment strategy of routine prevention with self-administered twice weekly C1-INH(SC) had a greater impact on improving multiple HAE-related HRQoL impairments, most notably anxiety and work productivity, compared with on-demand treatment alone (placebo prophylaxis). Copyright © 2018 The Authors. Published by Elsevier Inc. All rights reserved.
Complexing Agents and pH Influence on Chemical Durability of Type I Molded Glass Containers.
Biavati, Alberto; Poncini, Michele; Ferrarini, Arianna; Favaro, Nicola; Scarpa, Martina; Vallotto, Marta
2017-01-01
Among the factors that affect the glass surface chemical durability, pH and complexing agents present in aqueous solution have the main role. Glass surface attack can be also related to the delamination issue causing glass particles' appearance in the pharmaceutical preparation. A few methods to check for glass containers delamination propensity and some control guidelines have been proposed. The present study emphasizes the possible synergy between a few complexing agents with pH on borosilicate glass chemical durability.Hydrolytic attack was performed in small-volume 23 mL type I glass containers autoclaved according to the European Pharmacopoeia or United States Pharmacopeia for 1 h at 121 °C, in order to enhance the chemical attack due to time, temperature, and the unfavorable surface/volume ratio. Solutions of 0.048 M or 0.024 M (M/L) of the acids citric, glutaric, acetic, EDTA (ethylenediaminetetraacetic acid), together with sodium phosphate with water for comparison, were used for the trials. The pH was adjusted ±0.05 units at fixed values 5.5, 6.6, 7, 7.4, 8, and 9 by LiOH diluted solution.Because silicon is the main glass network former, silicon release into the attack solutions was chosen as the main index of the glass surface attack and analysed by inductively coupled plasma atomic emission spectrophotometry. The work was completed by the analysis of the silicon release in the worst attack conditions of molded glass, soda lime type II glass, and tubing borosilicate glass vials to compare different glass compositions and forming technologies. Surface analysis by scanning electron microscopy was finally performed to check for the surface status after the worst chemical attack condition by citric acid. LAY ABSTRACT: Glass, like every packaging material, can have some usage limits, mainly in basic pH solutions. The issue of glass surface degradation particles that appear in vials (delamination) has forced a number of drug product recalls in recent years. To prevent such situations, pharmaceutical and biopharmaceutical manufacturers need to understand the reasons for accelerate surface glass corrosion mainly in the case of injectables.Some drugs can contain active components with known ability to corrode glass silica networks. Sometimes these ingredients are dissolved in an alkaline medium that dramatically increases the glass corrosion and potentially causes the issue. As this action is strongly affected by time and temperature, flaking may become visible only after a long storage time. The purpose of this investigation is to verify the borosilicate glass chemical durability during controlled conditions of time and temperature when in contact with testing solutions containing different complexing agents by varying the pH. Si concentration in the extract solution is taken as an index of glass dissolution during constant autoclaving conditions for 1 h at 121 °C, which simulates approximately five years of contact at room temperature.Acetate, citrate, ethylenediaminetetraacetic acid (EDTA), phosphate, and glutarate 0.048 M or 0.024 M solutions were used at increasing pH from 5.5 to 9.0. The chemical durability of two borosilicate tubing glass vials of different glass compositions were compared with the molded one in the worst attack conditions by citric acid. Even if no delamination issue has been experienced by this study in type I molded and tubing containers, the conclusions developed can provide pharmaceutical manufacturers with useful information to prevent glass delamination risk in their processes. © PDA, Inc. 2017.
Multi-color fluorescence imaging of sub-cellular dynamics of cancer cells in live mice
NASA Astrophysics Data System (ADS)
Hoffman, Robert M.
2006-02-01
We have genetically engineered dual-color fluorescent cells with one color in the nucleus and the other in the cytoplasm that enables real-time nuclear-cytoplasmic dynamics to be visualized in living cells in the cytoplasm in vivo as well as in vitro. To obtain the dual-color cells, red fluorescent protein (RFP) was expressed of the cancer cells, and green fluorescent protein (GFP) linked to histone H2B was expressed in the nucleus. Mitotic cells were visualized by whole-body imaging after injection in the mouse ear. Common carotid artery or heart injection of dual-color cells and a reversible skin flap enabled the external visualization of the dual-color cells in microvessels in the mouse where extreme elongation of the cell body as well as the nucleus occurred. The migration velocities of the dual-color cancer cells in the capillaries were measured by capturing individual images of the dual-color fluorescent cells over time. Human HCT-116-GFP-RFP colon cancer and mouse mammary tumor (MMT)-GFP-RFP cells were injected in the portal vein of nude mice. Extensive clasmocytosis (destruction of the cytoplasm) of the HCT-116-GFP-RFP cells occurred within 6 hours. The data suggest rapid death of HCT-116-GFP-RFP cells in the portal vein. In contrast, MMT-GFP-RFP cells injected into the portal vein mostly survived and formed colonies in the liver. However, when the host mice were pretreated with cyclophosphamide, the HCT-116-GFP-RFP cells also survived and formed colonies in the liver after portal vein injection. These results suggest that a cyclophosphamide-sensitive host cellular system attacked the HCT-116-GFP-RFP cells but could not effectively kill the MMT-GFP-RFP cells. With the ability to continuously image cancer cells at the subcellular level in the live animal, our understanding of the complex steps of metastasis will significantly increase. In addition, new drugs can be developed to target these newly visible steps of metastasis.
Sparks, A N; Gadal, L; Ni, X
2015-08-01
The primary Lepidoptera pests of sweet corn (Zea mays L. convar. saccharata) in Georgia are the corn earworm, Helicoverpa zea (Boddie), and the fall armyworm, Spodoptera frugiperda (J. E. Smith). Management of these pests typically requires multiple insecticide applications from first silking until harvest, with commercial growers frequently spraying daily. This level of insecticide use presents problems for small growers, particularly for "pick-your-own" operations. Injection of oil into the corn ear silk channel 5-8 days after silking initiation has been used to suppress damage by these insects. Initial work with this technique in Georgia provided poor results. Subsequently, a series of experiments was conducted to evaluate the efficacy of silk channel injections as an application methodology for insecticides. A single application of synthetic insecticide, at greatly reduced per acre rates compared with common foliar applications, provided excellent control of Lepidoptera insects attacking the ear tip and suppressed damage by sap beetles (Nitidulidae). While this methodology is labor-intensive, it requires a single application of insecticide at reduced rates applied ∼2 wk prior to harvest, compared with potential daily applications at full rates up to the day of harvest with foliar insecticide applications. This methodology is not likely to eliminate the need for foliar applications because of other insect pests which do not enter through the silk channel or are not affected by the specific selective insecticide used in the silk channel injection, but would greatly reduce the number of applications required. This methodology may prove particularly useful for small acreage growers. © The Authors 2015. Published by Oxford University Press on behalf of Entomological Society of America. All rights reserved. For Permissions, please email: journals.permissions@oup.com.
Antensteiner, G
1999-01-01
Sea-biological basic knowledge for divers is offered only in special lessons for advanced scuba divers. According to statistics, however, five per cent of the deadly diving accidents are caused by underwater organisms. This number could be reduced to a fraction, by correct behaviour during the dive and after an accident. The most frequent accidents with sea animals during water sports are not by unprovoked shark attacks, which cause six deaths world-wide per year on the average, but turn out with usually well camouflaged sea inhabitants, that do not attack humans, rather by their inadvertence coincidentally get in contact with it. The various defense instruments of the often small, inconspicuous organisms reach from teeth over poison stings, pricks, spines, scalpelles, nettle injections and chemical weapons up to poison arrows. Due to that variety of the maritime life, the most important representatives of its type are explained including severity level of the caused injury or contamination. Both, diagnostic position and therapy possibility are described as follows: 1. Porifera (sponge), 2. Hydrozoa (white weed, yellow flower head), Actinaria (sea anemones), 3. Conidae (cone shells), Tridocna (giant clam), octopoda (octopus), 4. Acanthaster planci (crown of thorns), Echinodea (sea urchins), Holothurioidea (sea cucumber), 5. Selachoidei (shark), Batoidei (Ray), Muraenidae (moray), Plotosidae (barbel eels), Synanciidae (stonefish), Scorpaenidae (scorpionfish), Pterois (lion fish), Sphyraena Spec. (barracuda), Balistidae (triggerfish), Ostracionidae (puffer).
Daneshi, Ahmad; Jahandideh, Hesam; Pousti, Seyed Behzad; Mohammadi, Shabahang
2014-01-01
Ménière's disease has been remained as a difficult therapeutic challenge. The present study aimed to determine the effects of one-shot low-dosage intratympanic gentamicin on vertigo control, auditory outcomes and findings of computerized dynamic posturography and vestibular evoked myogenic potentials in patients with unilateral Ménière's disease. In a prospective clinical study, 30 patients with unilateral Ménière's disease were treated with one-shot intratympanic injection of 20 milligrams gentamicin. Main outcome measures included clinical, audiometric, postural and vestibular outcomes evaluated 1 and 9 months after the treatment. Mean vertigo attacks frequency, pure tone average threshold and functional level scale significantly decreased after the treatment (P < 0.05). Effective vertigo control (class A and B) obtained in 95.8% of the patients. In total, 75% of patients reported decrease in both aural fullness and tinnitus. Vestibular evoked myogenic potentials became absent in all the patients but four of them. Posturographic scores were improved after the treatment. One-shot low-dosage gentamicin was effective in controlling vertigo attacks in Ménière's disease and has useful effects on aural fullness and tinnitus of patients as well. Postural and vestibular tests only have adjunctive role for monitoring therapeutic responses in intratympanic gentamicin-therapy.
Synthesis of compounds related to the anti-migraine drug eletriptan hydrobromide.
Madasu, Suri Babu; Vekariya, Nagaji Ambabhai; Kiran, M N V D Hari; Gupta, Badarinadh; Islam, Aminul; Douglas, Paul S; Babu, Korupolu Raghu
2012-01-01
Eletriptan hydrobromide (1) is a selective serotonin (5-HT(1)) agonist, used for the acute treatment of the headache phase of migraine attacks. During the manufacture of eletriptan hydrobromide the formation of various impurities were observed and identified by LC-MS. To control the formation of these impurities during the preparation of active pharmaceutical ingredients, the structure of the impurities must be known. Major impurities of the eletriptan hydrobromide synthesis were prepared and characterized by using various spectroscopic techniques, i.e., mass spectroscopy, FTIR , (1)H NMR, (13)C NMR/DEPT, and further confirmed by co-injection in HPLC. The present study will be of great help in the synthesis of highly pure eletriptan hydrobromide related compounds.
Synthesis of compounds related to the anti-migraine drug eletriptan hydrobromide
Madasu, Suri Babu; Kiran, M N V D Hari; Gupta, Badarinadh; Islam, Aminul; Douglas, Paul S; Babu, Korupolu Raghu
2012-01-01
Summary Eletriptan hydrobromide (1) is a selective serotonin (5-HT1) agonist, used for the acute treatment of the headache phase of migraine attacks. During the manufacture of eletriptan hydrobromide the formation of various impurities were observed and identified by LC–MS. To control the formation of these impurities during the preparation of active pharmaceutical ingredients, the structure of the impurities must be known. Major impurities of the eletriptan hydrobromide synthesis were prepared and characterized by using various spectroscopic techniques, i.e., mass spectroscopy, FTIR , 1H NMR, 13C NMR/DEPT, and further confirmed by co-injection in HPLC. The present study will be of great help in the synthesis of highly pure eletriptan hydrobromide related compounds. PMID:23019477
A Flight Control System Architecture for the NASA AirSTAR Flight Test Infrastructure
NASA Technical Reports Server (NTRS)
Murch, Austin M.
2008-01-01
A flight control system architecture for the NASA AirSTAR infrastructure has been designed to address the challenges associated with safe and efficient flight testing of research control laws in adverse flight conditions. The AirSTAR flight control system provides a flexible framework that enables NASA Aviation Safety Program research objectives, and includes the ability to rapidly integrate and test research control laws, emulate component or sensor failures, inject automated control surface perturbations, and provide a baseline control law for comparison to research control laws and to increase operational efficiency. The current baseline control law uses an angle of attack command augmentation system for the pitch axis and simple stability augmentation for the roll and yaw axes.
Code of Federal Regulations, 2011 CFR
2011-10-01
... Microsoft Open Database Connectivity (ODBC) standard. ODBC is a Windows technology that allows a database software package to import data from a database created using a different software package. We currently...-compatible format. All databases must be supported with adequate documentation on data attributes, SQL...
SAMSON Technology Demonstrator
2014-06-01
requested. The SAMSON TD was testing with two different policy engines: 1. A custom XACML-based element matching engine using a MySQL database for...performed during the course of the event. Full information protection across the sphere of access management, information protection and auditing was in...
Business Demands for Web-Related Skills as Compared to Other Computer Skills.
ERIC Educational Resources Information Center
Groneman, Nancy
2000-01-01
Analysis of 23,704 want ads for computer-related jobs revealed that the most frequently mentioned skills were UNIX, SQL programming, and computer security. Curriculum implications were derived from the most desired and less frequently mentioned skills. (SK)
Scale-Independent Relational Query Processing
2013-10-04
source options are also available, including Postgresql, MySQL , and SQLite. These mod- ern relational databases are generally very complex software systems...and Their Application to Data Stream Management. IGI Global, 2010. [68] George Reese. Database Programming with JDBC and Java , Second Edition. Ed. by
Methods, Knowledge Support, and Experimental Tools for Modeling
2006-10-01
open source software entities: the PostgreSQL relational database management system (http://www.postgres.org), the Apache web server (http...past. The revision control system allows the program to capture disagreements, and allows users to explore the history of such disagreements by
Shekhar, Anantha; Johnson, Philip L; Fitz, Stephanie D; Nakazato, Atsuro; Chaki, Shigeyuki; Steckler, Thomas; Schmidt, Mark
2011-04-01
Corticotropin releasing factor (CRF) is implicated in a variety of stress-related disorders such as depression and anxiety, and blocking CRF receptors is a putative strategy for treating such disorders. Using a well-studied animal model of panic, we tested the efficacy of JNJ19567470/CRA5626, a selective, non-peptidergic CRF type 1 receptor (CRF1) antagonist (3, 10 and 40 mg/kg intraperitoneal injection), in preventing the sodium lactate (NaLac)-induced panic-like behavioural and cardiovascular responses. Adult male rats with chronic reduction of GABA levels (by inhibition of GABA synthesis with l-allyglycine, a glutamic acid decarboxylase inhibitor) in the dorsomedial/perifornical hypothalamus are highly anxious and exhibit physiological and behavioural responses to intravenous NaLac infusions similar to patients with panic disorder. These 'panic-prone' rats pre-treated with vehicle injections displayed NaLac-induced increases in autonomic responses (i.e. tachycardia and hypertensive responses), anxiety-like behaviour in the social interaction test, and flight-like increases in locomotor activity. However, systemically injecting such panic-prone rats with the highest dose of CRF1 receptor antagonist prior to NaLac infusions blocked all NaLac-induced behaviour and cardiovascular responses. These data suggest that selective CRF1 receptor antagonists could be a novel target for developing anti-panic drugs that are as effective as benzodiazepines in acute treatment of a panic attack without the deleterious side-effects (e.g. sedation and cognitive impairment) associated with benzodiazepines.
Chen, Chiao-Chi V; Zechariah, Anil; Hsu, Yi-Hua; Chen, Hsiao-Wen; Yang, Li-Chuan; Chang, Chen
2008-04-01
Atrophy of the corpus callosum (CC) is a well-documented observation in clinically definite multiple sclerosis (MS) patients. One recent hypothesis for the neurodegeneration that occurs in MS is that ion dyshomeostasis leads to neuroaxonal damage. To examine whether ion dyshomeostasis occurs in the CC during MS onset, experimental autoimmune encephalomyelitis (EAE) was utilized as an animal MS model to induce autoimmunity-mediated responses. To date, in vivo investigations of neuronal ion homeostasis has not been feasible using traditional neuroscience techniques. Therefore, the current study employed an emerging MRI method, called Mn2+-enhanced MRI (MEMRI). Mn2+ dynamics is closely associated with important neuronal activity events, and is also considered to be a Ca2+ surrogate. Furthermore, when injected intracranially, Mn2+ can be used as a multisynaptic tracer. These features enable MEMRI to detect neuronal ion homeostasis within a multisynaptic circuit that is connected to the injection site. Mn2+ was injected into the visual cortex to trace the CC, and T1-weighted imaging was utilized to observe temporal changes in Mn2+-induced signals in the traced pathways. The results showed that neuroaxonal functional changes associated with ion dyshomeostasis occurred in the CC during an acute EAE attack. In addition, the pathway appeared normal, although EAE-induced immune-cell infiltration was visible around the CC. The findings suggest that ion dyshomeostasis is a major neuronal aberration underlying the deterioration of normal-appearing brain tissues in MS, supporting its involvement in neuroaxonal functioning in MS.
Airport Remote Tower Sensor Systems
NASA Technical Reports Server (NTRS)
Maluf, David A.; Gawdiak, Yuri; Leidichj, Christopher; Papasin, Richard; Tran, Peter B.; Bass, Kevin
2006-01-01
Networks of video cameras, meteorological sensors, and ancillary electronic equipment are under development in collaboration among NASA Ames Research Center, the Federal Aviation Administration (FAA), and the National Oceanic Atmospheric Administration (NOAA). These networks are to be established at and near airports to provide real-time information on local weather conditions that affect aircraft approaches and landings. The prototype network is an airport-approach-zone camera system (AAZCS), which has been deployed at San Francisco International Airport (SFO) and San Carlos Airport (SQL). The AAZCS includes remotely controlled color video cameras located on top of SFO and SQL air-traffic control towers. The cameras are controlled by the NOAA Center Weather Service Unit located at the Oakland Air Route Traffic Control Center and are accessible via a secure Web site. The AAZCS cameras can be zoomed and can be panned and tilted to cover a field of view 220 wide. The NOAA observer can see the sky condition as it is changing, thereby making possible a real-time evaluation of the conditions along the approach zones of SFO and SQL. The next-generation network, denoted a remote tower sensor system (RTSS), will soon be deployed at the Half Moon Bay Airport and a version of it will eventually be deployed at Los Angeles International Airport. In addition to remote control of video cameras via secure Web links, the RTSS offers realtime weather observations, remote sensing, portability, and a capability for deployment at remote and uninhabited sites. The RTSS can be used at airports that lack control towers, as well as at major airport hubs, to provide synthetic augmentation of vision for both local and remote operations under what would otherwise be conditions of low or even zero visibility.
ClimateSpark: An In-memory Distributed Computing Framework for Big Climate Data Analytics
NASA Astrophysics Data System (ADS)
Hu, F.; Yang, C. P.; Duffy, D.; Schnase, J. L.; Li, Z.
2016-12-01
Massive array-based climate data is being generated from global surveillance systems and model simulations. They are widely used to analyze the environment problems, such as climate changes, natural hazards, and public health. However, knowing the underlying information from these big climate datasets is challenging due to both data- and computing- intensive issues in data processing and analyzing. To tackle the challenges, this paper proposes ClimateSpark, an in-memory distributed computing framework to support big climate data processing. In ClimateSpark, the spatiotemporal index is developed to enable Apache Spark to treat the array-based climate data (e.g. netCDF4, HDF4) as native formats, which are stored in Hadoop Distributed File System (HDFS) without any preprocessing. Based on the index, the spatiotemporal query services are provided to retrieve dataset according to a defined geospatial and temporal bounding box. The data subsets will be read out, and a data partition strategy will be applied to equally split the queried data to each computing node, and store them in memory as climateRDDs for processing. By leveraging Spark SQL and User Defined Function (UDFs), the climate data analysis operations can be conducted by the intuitive SQL language. ClimateSpark is evaluated by two use cases using the NASA Modern-Era Retrospective Analysis for Research and Applications (MERRA) climate reanalysis dataset. One use case is to conduct the spatiotemporal query and visualize the subset results in animation; the other one is to compare different climate model outputs using Taylor-diagram service. Experimental results show that ClimateSpark can significantly accelerate data query and processing, and enable the complex analysis services served in the SQL-style fashion.
Motamed, Cyrus; Bourgain, Jean Louis
2016-06-01
Anaesthesia Information Management Systems (AIMS) generate large amounts of data, which might be useful for quality assurance programs. This study was designed to highlight the multiple contributions of our AIMS system in extracting quality indicators over a period of 10years. The study was conducted from 2002 to 2011. Two methods were used to extract anaesthesia indicators: the manual extraction of individual files for monitoring neuromuscular relaxation and structured query language (SQL) extraction for other indicators which were postoperative nausea and vomiting (PONV), pain, sedation scores, pain-related medications, scores and postoperative hypothermia. For each indicator, a program of information/meetings and adaptation/suggestions for operating room and PACU personnel was initiated to improve quality assurance, while data were extracted each year. The study included 77,573 patients. The mean overall completeness of data for the initial years ranged from 55 to 85% and was indicator-dependent, which then improved to 95% completeness for the last 5years. The incidence of neuromuscular monitoring was initially 67% and then increased to 95% (P<0.05). The rate of pharmacological reversal remained around 53% throughout the study. Regarding SQL data, an improvement of severe postoperative pain and PONV scores was observed throughout the study, while mild postoperative hypothermia remained a challenge, despite efforts for improvement. The AIMS system permitted the follow-up of certain indicators through manual sampling and many more via SQL extraction in a sustained and non-time-consuming way across years. However, it requires competent and especially dedicated resources to handle the database. Copyright © 2016 Société française d'anesthésie et de réanimation (Sfar). Published by Elsevier Masson SAS. All rights reserved.
WebDB Component Builder - Lessons Learned
DOE Office of Scientific and Technical Information (OSTI.GOV)
Macedo, C.
2000-02-15
Oracle WebDB is the easiest way to produce web enabled lightweight and enterprise-centric applications. This concept from Oracle has tantalized our taste for simplistic web development by using a purely web based tool that lives nowhere else but in the database. The use of online wizards, templates, and query builders, which produces PL/SQL behind the curtains, can be used straight ''out of the box'' by both novice and seasoned developers. The topic of this presentation will introduce lessons learned by developing and deploying applications built using the WebDB Component Builder in conjunction with custom PL/SQL code to empower a hybridmore » application. There are two kinds of WebDB components: those that display data to end users via reporting, and those that let end users update data in the database via entry forms. The presentation will also discuss various methods within the Component Builder to enhance the applications pushed to the desktop. The demonstrated example is an application entitled HOME (Helping Other's More Effectively) that was built to manage a yearly United Way Campaign effort. Our task was to build an end to end application which could manage approximately 900 non-profit agencies, an average of 4,100 individual contributions, and $1.2 million dollars. Using WebDB, the shell of the application was put together in a matter of a few weeks. However, we did encounter some hurdles that WebDB, in it's stage of infancy (v2.0), could not solve for us directly. Together with custom PL/SQL, WebDB's Component Builder became a powerful tool that enabled us to produce a very flexible hybrid application.« less
Shen, Boxuan; Linko, Veikko; Dietz, Hendrik; Toppari, J Jussi
2015-01-01
DNA origami is a widely used method for fabrication of custom-shaped nanostructures. However, to utilize such structures, one needs to controllably position them on nanoscale. Here we demonstrate how different types of 3D scaffolded multilayer origamis can be accurately anchored to lithographically fabricated nanoelectrodes on a silicon dioxide substrate by DEP. Straight brick-like origami structures, constructed both in square (SQL) and honeycomb lattices, as well as curved "C"-shaped and angular "L"-shaped origamis were trapped with nanoscale precision and single-structure accuracy. We show that the positioning and immobilization of all these structures can be realized with or without thiol-linkers. In general, structural deformations of the origami during the DEP trapping are highly dependent on the shape and the construction of the structure. The SQL brick turned out to be the most robust structure under the high DEP forces, and accordingly, its single-structure trapping yield was also highest. In addition, the electrical conductivity of single immobilized plain brick-like structures was characterized. The electrical measurements revealed that the conductivity is negligible (insulating behavior). However, we observed that the trapping process of the SQL brick equipped with thiol-linkers tended to induce an etched "nanocanyon" in the silicon dioxide substrate. The nanocanyon was formed exactly between the electrodes, that is, at the location of the DEP-trapped origami. The results show that the demonstrated DEP-trapping technique can be readily exploited in assembling and arranging complex multilayered origami geometries. In addition, DNA origamis could be utilized in DEP-assisted deformation of the substrates onto which they are attached. © 2014 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.
An improved resource management model based on MDS
NASA Astrophysics Data System (ADS)
Yuan, Man; Sun, Changying; Li, Pengfei; Sun, Yongdong; He, Rui
2005-11-01
GRID technology provides a kind of convenient method for managing GRID resources. This service is so-called monitoring, discovering service. This method is proposed by Globus Alliance, in this GRID environment, all kinds of resources, such as computational resources, storage resources and other resources can be organized by MDS specifications. However, this MDS is a theory framework, particularly, in a small world intranet, in the case of limit of resources, the MDS has its own limitation. Based on MDS, an improved light method for managing corporation computational resources and storage resources is proposed in intranet(IMDS). Firstly, in MDS, all kinds of resource description information is stored in LDAP, it is well known although LDAP is a light directory access protocol, in practice, programmers rarely master how to access and store resource information into LDAP store, in such way, it limits MDS to be used. So, in intranet, these resources' description information can be stored in RDBMS, programmers and users can access this information by standard SQL. Secondly, in MDS, how to monitor all kinds of resources in GRID is not transparent for programmers and users. In such way, it limits its application scope, in general, resource monitoring method base on SNMP is widely employed in intranet, therefore, a kind of resource monitoring method based on SNMP is integrated into MDS. Finally, all kinds of resources in the intranet can be described by XML, and all kinds of resources' description information is stored in RDBMS, such as MySql, and retrieved by standard SQL, dynamic information for all kinds of resources can be sent to resource storage by SNMP, A prototype resource description, monitoring is designed and implemented in intranet.
NASA Astrophysics Data System (ADS)
Vacca, G.; Pili, D.; Fiorino, D. R.; Pintus, V.
2017-05-01
The presented work is part of the research project, titled "Tecniche murarie tradizionali: conoscenza per la conservazione ed il miglioramento prestazionale" (Traditional building techniques: from knowledge to conservation and performance improvement), with the purpose of studying the building techniques of the 13th-18th centuries in the Sardinia Region (Italy) for their knowledge, conservation, and promotion. The end purpose of the entire study is to improve the performance of the examined structures. In particular, the task of the authors within the research project was to build a WebGIS to manage the data collected during the examination and study phases. This infrastructure was entirely built using Open Source software. The work consisted of designing a database built in PostgreSQL and its spatial extension PostGIS, which allows to store and manage feature geometries and spatial data. The data input is performed via a form built in HTML and PHP. The HTML part is based on Bootstrap, an open tools library for websites and web applications. The implementation of this template used both PHP and Javascript code. The PHP code manages the reading and writing of data to the database, using embedded SQL queries. As of today, we surveyed and archived more than 300 buildings, belonging to three main macro categories: fortification architectures, religious architectures, residential architectures. The masonry samples investigated in relation to the construction techniques are more than 150. The database is published on the Internet as a WebGIS built using the Leaflet Javascript open libraries, which allows creating map sites with background maps and navigation, input and query tools. This too uses an interaction of HTML, Javascript, PHP and SQL code.
Changes in Exercise Data Management
NASA Technical Reports Server (NTRS)
Buxton, R. E.; Kalogera, K. L.; Hanson, A. M.
2018-01-01
The suite of exercise hardware aboard the International Space Station (ISS) generates an immense amount of data. The data collected from the treadmill, cycle ergometer, and resistance strength training hardware are basic exercise parameters (time, heart rate, speed, load, etc.). The raw data are post processed in the laboratory and more detailed parameters are calculated from each exercise data file. Updates have recently been made to how this valuable data are stored, adding an additional level of data security, increasing data accessibility, and resulting in overall increased efficiency of medical report delivery. Questions regarding exercise performance or how exercise may influence other variables of crew health frequently arise within the crew health care community. Inquiries over the health of the exercise hardware often need quick analysis and response to ensure the exercise system is operable on a continuous basis. Consolidating all of the exercise system data in a single repository enables a quick response to both the medical and engineering communities. A SQL server database is currently in use, and provides a secure location for all of the exercise data starting at ISS Expedition 1 - current day. The database has been structured to update derived metrics automatically, making analysis and reporting available within minutes of dropping the inflight data it into the database. Commercial tools were evaluated to help aggregate and visualize data from the SQL database. The Tableau software provides manageable interface, which has improved the laboratory's output time of crew reports by 67%. Expansion of the SQL database to be inclusive of additional medical requirement metrics, addition of 'app-like' tools for mobile visualization, and collaborative use (e.g. operational support teams, research groups, and International Partners) of the data system is currently being explored.
Robustness of non-interdependent and interdependent networks against dependent and adaptive attacks
NASA Astrophysics Data System (ADS)
Tyra, Adam; Li, Jingtao; Shang, Yilun; Jiang, Shuo; Zhao, Yanjun; Xu, Shouhuai
2017-09-01
Robustness of complex networks has been extensively studied via the notion of site percolation, which typically models independent and non-adaptive attacks (or disruptions). However, real-life attacks are often dependent and/or adaptive. This motivates us to characterize the robustness of complex networks, including non-interdependent and interdependent ones, against dependent and adaptive attacks. For this purpose, dependent attacks are accommodated by L-hop percolation where the nodes within some L-hop (L ≥ 0) distance of a chosen node are all deleted during one attack (with L = 0 degenerating to site percolation). Whereas, adaptive attacks are launched by attackers who can make node-selection decisions based on the network state in the beginning of each attack. The resulting characterization enriches the body of knowledge with new insights, such as: (i) the Achilles' Heel phenomenon is only valid for independent attacks, but not for dependent attacks; (ii) powerful attack strategies (e.g., targeted attacks and dependent attacks, dependent attacks and adaptive attacks) are not compatible and cannot help the attacker when used collectively. Our results shed some light on the design of robust complex networks.
Water Tunnel Flow Visualization Study Through Poststall of 12 Novel Planform Shapes
NASA Technical Reports Server (NTRS)
Gatlin, Gregory M.; Neuhart, Dan H.
1996-01-01
To determine the flow field characteristics of 12 planform geometries, a flow visualization investigation was conducted in the Langley 16- by 24-Inch Water Tunnel. Concepts studied included flat plate representations of diamond wings, twin bodies, double wings, cutout wing configurations, and serrated forebodies. The off-surface flow patterns were identified by injecting colored dyes from the model surface into the free-stream flow. These dyes generally were injected so that the localized vortical flow patterns were visualized. Photographs were obtained for angles of attack ranging from 10' to 50', and all investigations were conducted at a test section speed of 0.25 ft per sec. Results from the investigation indicate that the formation of strong vortices on highly swept forebodies can improve poststall lift characteristics; however, the asymmetric bursting of these vortices could produce substantial control problems. A wing cutout was found to significantly alter the position of the forebody vortex on the wing by shifting the vortex inboard. Serrated forebodies were found to effectively generate multiple vortices over the configuration. Vortices from 65' swept forebody serrations tended to roll together, while vortices from 40' swept serrations were more effective in generating additional lift caused by their more independent nature.
Changes in endolymphatic hydrops visualized by magnetic resonance imaging after sac surgery.
Zhang, Yuan; Cui, Yong-Hua; Hu, Ying; Mao, Zhong-Yao; Wang, Qiu-Xia; Pan, Chu; Liu, Ai-Guo
2016-10-01
The purpose of the study was to observe changes in endolymphatic hydrops by using intratympanic injection of gadolinium and magnetic resonance imaging (MRI) before and after endolymphatic sac surgery in patients with unilateral Meniere's disease. Thirteen patients with unilateral Meniere's disease undergoing endolymphatic sac surgery were retrospectively and prospectively analyzed. Three-dimensional fluid-attenuated inversion recovery or three-dimensional real inversion recovery MRI was performed 24 h after an intratympanic injection of gadolinium to grade the presence of endolymphatic hydrops. Among the 13 patients with hydrops confirmed by preoperative MRI, vestibular hydrops had no significant change in all patients; cochlear hydrops became negative in 2 patients, and remained unchanged in the other 11 patients after surgery. Definite vertigo attacks were substantially controlled in one patient and completely controlled in 12 patients during a follow-up period of 8-34 months after surgery. The hearing levels were improved in 3 patients, remained unchanged in 7 patients, and decreased in 3 patients. In conclusion, endolymphatic sac surgery does not always alleviate endolymphatic hydrops in patients with Meniere's disease. Relief from vertigo cannot always be attributed to the remission of hydrops. A change in hearing levels cannot be explained by hydrops status alone.
Dcs Data Viewer, an Application that Accesses ATLAS DCS Historical Data
NASA Astrophysics Data System (ADS)
Tsarouchas, C.; Schlenker, S.; Dimitrov, G.; Jahn, G.
2014-06-01
The ATLAS experiment at CERN is one of the four Large Hadron Collider experiments. The Detector Control System (DCS) of ATLAS is responsible for the supervision of the detector equipment, the reading of operational parameters, the propagation of the alarms and the archiving of important operational data in a relational database (DB). DCS Data Viewer (DDV) is an application that provides access to the ATLAS DCS historical data through a web interface. Its design is structured using a client-server architecture. The pythonic server connects to the DB and fetches the data by using optimized SQL requests. It communicates with the outside world, by accepting HTTP requests and it can be used stand alone. The client is an AJAX (Asynchronous JavaScript and XML) interactive web application developed under the Google Web Toolkit (GWT) framework. Its web interface is user friendly, platform and browser independent. The selection of metadata is done via a column-tree view or with a powerful search engine. The final visualization of the data is done using java applets or java script applications as plugins. The default output is a value-over-time chart, but other types of outputs like tables, ascii or ROOT files are supported too. Excessive access or malicious use of the database is prevented by a dedicated protection mechanism, allowing the exposure of the tool to hundreds of inexperienced users. The current configuration of the client and of the outputs can be saved in an XML file. Protection against web security attacks is foreseen and authentication constrains have been taken into account, allowing the exposure of the tool to hundreds of users world wide. Due to its flexible interface and its generic and modular approach, DDV could be easily used for other experiment control systems.
Relational Algebra and SQL: Better Together
ERIC Educational Resources Information Center
McMaster, Kirby; Sambasivam, Samuel; Hadfield, Steven; Wolthuis, Stuart
2013-01-01
In this paper, we describe how database instructors can teach Relational Algebra and Structured Query Language together through programming. Students write query programs consisting of sequences of Relational Algebra operations vs. Structured Query Language SELECT statements. The query programs can then be run interactively, allowing students to…
Ontological Approach to Military Knowledge Modeling and Management
2004-03-01
federated search mechanism has to reformulate user queries (expressed using the ontology) in the query languages of the different sources (e.g. SQL...ontologies as a common terminology – Unified query to perform federated search • Query processing – Ontology mapping to sources reformulate queries
tcpl: The ToxCast Pipeline for High-Throughput Screening Data
Motivation: The large and diverse high-throughput chemical screening efforts carried out by the US EPAToxCast program requires an efficient, transparent, and reproducible data pipeline.Summary: The tcpl R package and its associated MySQL database provide a generalized platform fo...
Celesti, Antonio; Fazio, Maria; Romano, Agata; Bramanti, Alessia; Bramanti, Placido; Villari, Massimo
2018-05-01
The Open Archive Information System (OAIS) is a reference model for organizing people and resources in a system, and it is already adopted in care centers and medical systems to efficiently manage clinical data, medical personnel, and patients. Archival storage systems are typically implemented using traditional relational database systems, but the relation-oriented technology strongly limits the efficiency in the management of huge amount of patients' clinical data, especially in emerging cloud-based, that are distributed. In this paper, we present an OAIS healthcare architecture useful to manage a huge amount of HL7 clinical documents in a scalable way. Specifically, it is based on a NoSQL column-oriented Data Base Management System deployed in the cloud, thus to benefit from a big tables and wide rows available over a virtual distributed infrastructure. We developed a prototype of the proposed architecture at the IRCCS, and we evaluated its efficiency in a real case of study.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Christopher Slominski
2009-10-01
Archiving a large fraction of the EPICS signals within the Jefferson Lab (JLAB) Accelerator control system is vital for postmortem and real-time analysis of the accelerator performance. This analysis is performed on a daily basis by scientists, operators, engineers, technicians, and software developers. Archiving poses unique challenges due to the magnitude of the control system. A MySQL Archiving system (Mya) was developed to scale to the needs of the control system; currently archiving 58,000 EPICS variables, updating at a rate of 11,000 events per second. In addition to the large collection rate, retrieval of the archived data must also bemore » fast and robust. Archived data retrieval clients obtain data at a rate over 100,000 data points per second. Managing the data in a relational database provides a number of benefits. This paper describes an archiving solution that uses an open source database and standard off the shelf hardware to reach high performance archiving needs. Mya has been in production at Jefferson Lab since February of 2007.« less
Computerized database management system for breast cancer patients.
Sim, Kok Swee; Chong, Sze Siang; Tso, Chih Ping; Nia, Mohsen Esmaeili; Chong, Aun Kee; Abbas, Siti Fathimah
2014-01-01
Data analysis based on breast cancer risk factors such as age, race, breastfeeding, hormone replacement therapy, family history, and obesity was conducted on breast cancer patients using a new enhanced computerized database management system. My Structural Query Language (MySQL) is selected as the application for database management system to store the patient data collected from hospitals in Malaysia. An automatic calculation tool is embedded in this system to assist the data analysis. The results are plotted automatically and a user-friendly graphical user interface is developed that can control the MySQL database. Case studies show breast cancer incidence rate is highest among Malay women, followed by Chinese and Indian. The peak age for breast cancer incidence is from 50 to 59 years old. Results suggest that the chance of developing breast cancer is increased in older women, and reduced with breastfeeding practice. The weight status might affect the breast cancer risk differently. Additional studies are needed to confirm these findings.
Techniques of Photometry and Astrometry with APASS, Gaia, and Pan-STARRs Results (Abstract)
NASA Astrophysics Data System (ADS)
Green, W.
2017-12-01
(Abstract only) The databases with the APASS DR9, Gaia DR1, and the Pan-STARRs 3pi DR1 data releases are publicly available for use. There is a bit of data-mining involved to download and manage these reference stars. This paper discusses the use of these databases to acquire accurate photometric references as well as techniques for improving results. Images are prepared in the usual way: zero, dark, flat-fields, and WCS solutions with Astrometry.net. Images are then processed with Sextractor to produce an ASCII table of identifying photometric features. The database manages photometics catalogs and images converted to ASCII tables. Scripts convert the files into SQL and assimilate them into database tables. Using SQL techniques, each image star is merged with reference data to produce publishable results. The VYSOS has over 13,000 images of the ONC5 field to process with roughly 100 total fields in the campaign. This paper provides the overview for this daunting task.
Fill factor in organic solar cells can exceed the Shockley-Queisser limit
NASA Astrophysics Data System (ADS)
Trukhanov, Vasily A.; Bruevich, Vladimir V.; Paraschuk, Dmitry Yu.
2015-06-01
The ultimate efficiency of organic solar cells (OSC) is under active debate. The solar cell efficiency is calculated from the current-voltage characteristic as a product of the open-circuit voltage (VOC), short-circuit current (JSC), and the fill factor (FF). While the factors limiting VOC and JSC for OSC were extensively studied, the ultimate FF for OSC is scarcely explored. Using numerical drift-diffusion modeling, we have found that the FF in OSC can exceed the Shockley-Queisser limit (SQL) established for inorganic p-n junction solar cells. Comparing charge generation and recombination in organic donor-acceptor bilayer heterojunction and inorganic p-n junction, we show that such distinctive properties of OSC as interface charge generation and heterojunction facilitate high FF, but the necessary condition for FF exceeding the SQL in OSC is field-dependence of charge recombination at the donor-acceptor interface. These findings can serve as a guideline for further improvement of OSC.
A JEE RESTful service to access Conditions Data in ATLAS
NASA Astrophysics Data System (ADS)
Formica, Andrea; Gallas, E. J.
2015-12-01
Usage of condition data in ATLAS is extensive for offline reconstruction and analysis (e.g. alignment, calibration, data quality). The system is based on the LCG Conditions Database infrastructure, with read and write access via an ad hoc C++ API (COOL), a system which was developed before Run 1 data taking began. The infrastructure dictates that the data is organized into separate schemas (assigned to subsystems/groups storing distinct and independent sets of conditions), making it difficult to access information from several schemas at the same time. We have thus created PL/SQL functions containing queries to provide content extraction at multi-schema level. The PL/SQL API has been exposed to external clients by means of a Java application providing DB access via REST services, deployed inside an application server (JBoss WildFly). The services allow navigation over multiple schemas via simple URLs. The data can be retrieved either in XML or JSON formats, via simple clients (like curl or Web browsers).
Constructing a Graph Database for Semantic Literature-Based Discovery.
Hristovski, Dimitar; Kastrin, Andrej; Dinevski, Dejan; Rindflesch, Thomas C
2015-01-01
Literature-based discovery (LBD) generates discoveries, or hypotheses, by combining what is already known in the literature. Potential discoveries have the form of relations between biomedical concepts; for example, a drug may be determined to treat a disease other than the one for which it was intended. LBD views the knowledge in a domain as a network; a set of concepts along with the relations between them. As a starting point, we used SemMedDB, a database of semantic relations between biomedical concepts extracted with SemRep from Medline. SemMedDB is distributed as a MySQL relational database, which has some problems when dealing with network data. We transformed and uploaded SemMedDB into the Neo4j graph database, and implemented the basic LBD discovery algorithms with the Cypher query language. We conclude that storing the data needed for semantic LBD is more natural in a graph database. Also, implementing LBD discovery algorithms is conceptually simpler with a graph query language when compared with standard SQL.
NoSQL Based 3D City Model Management System
NASA Astrophysics Data System (ADS)
Mao, B.; Harrie, L.; Cao, J.; Wu, Z.; Shen, J.
2014-04-01
To manage increasingly complicated 3D city models, a framework based on NoSQL database is proposed in this paper. The framework supports import and export of 3D city model according to international standards such as CityGML, KML/COLLADA and X3D. We also suggest and implement 3D model analysis and visualization in the framework. For city model analysis, 3D geometry data and semantic information (such as name, height, area, price and so on) are stored and processed separately. We use a Map-Reduce method to deal with the 3D geometry data since it is more complex, while the semantic analysis is mainly based on database query operation. For visualization, a multiple 3D city representation structure CityTree is implemented within the framework to support dynamic LODs based on user viewpoint. Also, the proposed framework is easily extensible and supports geoindexes to speed up the querying. Our experimental results show that the proposed 3D city management system can efficiently fulfil the analysis and visualization requirements.
Incremental Query Rewriting with Resolution
NASA Astrophysics Data System (ADS)
Riazanov, Alexandre; Aragão, Marcelo A. T.
We address the problem of semantic querying of relational databases (RDB) modulo knowledge bases using very expressive knowledge representation formalisms, such as full first-order logic or its various fragments. We propose to use a resolution-based first-order logic (FOL) reasoner for computing schematic answers to deductive queries, with the subsequent translation of these schematic answers to SQL queries which are evaluated using a conventional relational DBMS. We call our method incremental query rewriting, because an original semantic query is rewritten into a (potentially infinite) series of SQL queries. In this chapter, we outline the main idea of our technique - using abstractions of databases and constrained clauses for deriving schematic answers, and provide completeness and soundness proofs to justify the applicability of this technique to the case of resolution for FOL without equality. The proposed method can be directly used with regular RDBs, including legacy databases. Moreover, we propose it as a potential basis for an efficient Web-scale semantic search technology.
NASA Astrophysics Data System (ADS)
Barnsley, R. M.; Steele, Iain A.; Smith, R. J.; Mawson, Neil R.
2014-07-01
The Small Telescopes Installed at the Liverpool Telescope (STILT) project has been in operation since March 2009, collecting data with three wide field unfiltered cameras: SkycamA, SkycamT and SkycamZ. To process the data, a pipeline was developed to automate source extraction, catalogue cross-matching, photometric calibration and database storage. In this paper, modifications and further developments to this pipeline will be discussed, including a complete refactor of the pipeline's codebase into Python, migration of the back-end database technology from MySQL to PostgreSQL, and changing the catalogue used for source cross-matching from USNO-B1 to APASS. In addition to this, details will be given relating to the development of a preliminary front-end to the source extracted database which will allow a user to perform common queries such as cone searches and light curve comparisons of catalogue and non-catalogue matched objects. Some next steps and future ideas for the project will also be presented.
StreptomycesInforSys: A web-enabled information repository
Jain, Chakresh Kumar; Gupta, Vidhi; Gupta, Ashvarya; Gupta, Sanjay; Wadhwa, Gulshan; Sharma, Sanjeev Kumar; Sarethy, Indira P
2012-01-01
Members of Streptomyces produce 70% of natural bioactive products. There is considerable amount of information available based on polyphasic approach for classification of Streptomyces. However, this information based on phenotypic, genotypic and bioactive component production profiles is crucial for pharmacological screening programmes. This is scattered across various journals, books and other resources, many of which are not freely accessible. The designed database incorporates polyphasic typing information using combinations of search options to aid in efficient screening of new isolates. This will help in the preliminary categorization of appropriate groups. It is a free relational database compatible with existing operating systems. A cross platform technology with XAMPP Web server has been used to develop, manage, and facilitate the user query effectively with database support. Employment of PHP, a platform-independent scripting language, embedded in HTML and the database management software MySQL will facilitate dynamic information storage and retrieval. The user-friendly, open and flexible freeware (PHP, MySQL and Apache) is foreseen to reduce running and maintenance cost. Availability www.sis.biowaves.org PMID:23275736
A Web-based Tool for SDSS and 2MASS Database Searches
NASA Astrophysics Data System (ADS)
Hendrickson, M. A.; Uomoto, A.; Golimowski, D. A.
We have developed a web site using HTML, Php, Python, and MySQL that extracts, processes, and displays data from the Sloan Digital Sky Survey (SDSS) and the Two-Micron All-Sky Survey (2MASS). The goal is to locate brown dwarf candidates in the SDSS database by looking at color cuts; however, this site could also be useful for targeted searches of other databases as well. MySQL databases are created from broad searches of SDSS and 2MASS data. Broad queries on the SDSS and 2MASS database servers are run weekly so that observers have the most up-to-date information from which to select candidates for observation. Observers can look at detailed information about specific objects including finding charts, images, and available spectra. In addition, updates from previous observations can be added by any collaborators; this format makes observational collaboration simple. Observers can also restrict the database search, just before or during an observing run, to select objects of special interest.
Image query and indexing for digital x rays
NASA Astrophysics Data System (ADS)
Long, L. Rodney; Thoma, George R.
1998-12-01
The web-based medical information retrieval system (WebMIRS) allows interned access to databases containing 17,000 digitized x-ray spine images and associated text data from National Health and Nutrition Examination Surveys (NHANES). WebMIRS allows SQL query of the text, and viewing of the returned text records and images using a standard browser. We are now working (1) to determine utility of data directly derived from the images in our databases, and (2) to investigate the feasibility of computer-assisted or automated indexing of the images to support image retrieval of images of interest to biomedical researchers in the field of osteoarthritis. To build an initial database based on image data, we are manually segmenting a subset of the vertebrae, using techniques from vertebral morphometry. From this, we will derive and add to the database vertebral features. This image-derived data will enhance the user's data access capability by enabling the creation of combined SQL/image-content queries.
StreptomycesInforSys: A web-enabled information repository.
Jain, Chakresh Kumar; Gupta, Vidhi; Gupta, Ashvarya; Gupta, Sanjay; Wadhwa, Gulshan; Sharma, Sanjeev Kumar; Sarethy, Indira P
2012-01-01
Members of Streptomyces produce 70% of natural bioactive products. There is considerable amount of information available based on polyphasic approach for classification of Streptomyces. However, this information based on phenotypic, genotypic and bioactive component production profiles is crucial for pharmacological screening programmes. This is scattered across various journals, books and other resources, many of which are not freely accessible. The designed database incorporates polyphasic typing information using combinations of search options to aid in efficient screening of new isolates. This will help in the preliminary categorization of appropriate groups. It is a free relational database compatible with existing operating systems. A cross platform technology with XAMPP Web server has been used to develop, manage, and facilitate the user query effectively with database support. Employment of PHP, a platform-independent scripting language, embedded in HTML and the database management software MySQL will facilitate dynamic information storage and retrieval. The user-friendly, open and flexible freeware (PHP, MySQL and Apache) is foreseen to reduce running and maintenance cost. www.sis.biowaves.org.
An integrated data-analysis and database system for AMS 14C
NASA Astrophysics Data System (ADS)
Kjeldsen, Henrik; Olsen, Jesper; Heinemeier, Jan
2010-04-01
AMSdata is the name of a combined database and data-analysis system for AMS 14C and stable-isotope work that has been developed at Aarhus University. The system (1) contains routines for data analysis of AMS and MS data, (2) allows a flexible and accurate description of sample extraction and pretreatment, also when samples are split into several fractions, and (3) keeps track of all measured, calculated and attributed data. The structure of the database is flexible and allows an unlimited number of measurement and pretreatment procedures. The AMS 14C data analysis routine is fairly advanced and flexible, and it can be easily optimized for different kinds of measuring processes. Technically, the system is based on a Microsoft SQL server and includes stored SQL procedures for the data analysis. Microsoft Office Access is used for the (graphical) user interface, and in addition Excel, Word and Origin are exploited for input and output of data, e.g. for plotting data during data analysis.
The contribution of collective attack tactics in differentiating handball score efficiency.
Rogulj, Nenad; Srhoj, Vatromir; Srhoj, Ljerka
2004-12-01
The prevalence of 19 elements of collective tactics in score efficient and score inefficient teams was analyzed in 90 First Croatian Handball League--Men games during the 1998-1999 season. Prediction variables were used to describe duration, continuity, system, organization and spatial direction of attacks. Analysis of the basic descriptive and distribution statistical parameters revealed normal distribution of all variables and possibility to use multivariate methods. Canonic discrimination analysis and analysis of variance showed the use of collective tactics elements on attacks to differ statistically significantly between the winning and losing teams. Counter-attacks and uninterrupted attacks predominate in winning teams. Other types of attacks such as long position attack, multiply interrupted attack, attack with one circle runner attack player/pivot, attack based on basic principles, attack based on group cooperation, attack based on independent action, attack based on group maneuvering, rightward directed attack and leftward directed attack predominate in losing teams. Winning teams were found to be clearly characterized by quick attacks against unorganized defense, whereas prolonged, interrupted position attacks against organized defense along with frequent and diverse tactical actions were characteristic of losing teams. The choice and frequency of using a particular tactical activity in position attack do not warrant score efficiency but usually are consequential to the limited anthropologic potential and low level of individual technical-tactical skills of the players in low-quality teams.
Predicting Factors of Zone 4 Attack in Volleyball.
Costa, Gustavo C; Castro, Henrique O; Evangelista, Breno F; Malheiros, Laura M; Greco, Pablo J; Ugrinowitsch, Herbert
2017-06-01
This study examined 142 volleyball games of the Men's Super League 2014/2015 seasons in Brazil from which we analyzed 24-26 games of each participating team, identifying 5,267 Zone 4 attacks for further analysis. Within these Zone 4 attacks, we analyzed the association between the effect of the attack carried out and the separate effects of serve reception, tempo and type of attack. We found that the reception, tempo of attack, second tempo of attack, and power of diagonal attack were predictors of the attack effect in Zone 4. Moreover, placed attacks showed a tendency to not yield a score. In conclusion, winning points in high-level men's volleyball requires excellent receptions, a fast attack tempo and powerfully executed of attacks.
A graph-based network-vulnerability analysis system
DOE Office of Scientific and Technical Information (OSTI.GOV)
Swiler, L.P.; Phillips, C.; Gaylor, T.
1998-05-03
This paper presents a graph based approach to network vulnerability analysis. The method is flexible, allowing analysis of attacks from both outside and inside the network. It can analyze risks to a specific network asset, or examine the universe of possible consequences following a successful attack. The analysis system requires as input a database of common attacks, broken into atomic steps, specific network configuration and topology information, and an attacker profile. The attack information is matched with the network configuration information and an attacker profile to create a superset attack graph. Nodes identify a stage of attack, for example themore » class of machines the attacker has accessed and the user privilege level he or she has compromised. The arcs in the attack graph represent attacks or stages of attacks. By assigning probabilities of success on the arcs or costs representing level of effort for the attacker, various graph algorithms such as shortest path algorithms can identify the attack paths with the highest probability of success.« less
A graph-based network-vulnerability analysis system
DOE Office of Scientific and Technical Information (OSTI.GOV)
Swiler, L.P.; Phillips, C.; Gaylor, T.
1998-01-01
This report presents a graph-based approach to network vulnerability analysis. The method is flexible, allowing analysis of attacks from both outside and inside the network. It can analyze risks to a specific network asset, or examine the universe of possible consequences following a successful attack. The analysis system requires as input a database of common attacks, broken into atomic steps, specific network configuration and topology information, and an attacker profile. The attack information is matched with the network configuration information and an attacker profile to create a superset attack graph. Nodes identify a stage of attack, for example the classmore » of machines the attacker has accessed and the user privilege level he or she has compromised. The arcs in the attack graph represent attacks or stages of attacks. By assigning probabilities of success on the arcs or costs representing level-of-effort for the attacker, various graph algorithms such as shortest-path algorithms can identify the attack paths with the highest probability of success.« less
ERIC Educational Resources Information Center
Bosc, P.; Lietard, L.; Pivert, O.
2003-01-01
Considers flexible querying of relational databases. Highlights include SQL languages and basic aggregate operators; Sugeno's fuzzy integral; evaluation examples; and how and under what conditions other aggregate functions could be applied to fuzzy sets in a flexible query. (Author/LRW)
Unobtrusive Social Network Data From Email
2008-12-01
PERSON Standard Form 298 (Rev. 8-98) Prescribed by ANSI Std Z39-18 outlook archived files and stores that data into an SQL - database. Communication...Applications ( VBA ) program was installed on the personal computers (PC) of all participants, in the session window of their Microsoft Outlook. Details of
Dr. John H. Hopps Jr. Research Scholars Program
2014-10-20
Program staff, alumni and existing participants. Over the course of the last five months, SageFox has successfully obtained IRB approval for all...and awards. Progress made in development of the HoppsNet system included design and implementation of a relational database in MySQL , development of
Acoustic Metadata Management and Transparent Access to Networked Oceanographic Data Sets
2013-09-30
connectivity (ODBC) compliant data source for which drivers are available (e.g. MySQL , Oracle database, Postgres) can now be imported. Implementation...the possibility of speeding data transmission through compression (implemented) or the potential to use alternative data formats such as Java script
Social Impacts Module (SIM) Transition
2012-09-28
User String The authorized user’s name to access the PAVE database. Applies only to Microsoft SQL Server; leave blank, otherwise. passwd String The...otherwise. passwd String The password if an authorized user’s name is required; otherwise, leave blank driver String The class name for the driver to
Microsoft Repository Version 2 and the Open Information Model.
ERIC Educational Resources Information Center
Bernstein, Philip A.; Bergstraesser, Thomas; Carlson, Jason; Pal, Shankar; Sanders, Paul; Shutt, David
1999-01-01
Describes the programming interface and implementation of the repository engine and the Open Information Model for Microsoft Repository, an object-oriented meta-data management facility that ships in Microsoft Visual Studio and Microsoft SQL Server. Discusses Microsoft's component object model, object manipulation, queries, and information…
Method and tool for network vulnerability analysis
Swiler, Laura Painton [Albuquerque, NM; Phillips, Cynthia A [Albuquerque, NM
2006-03-14
A computer system analysis tool and method that will allow for qualitative and quantitative assessment of security attributes and vulnerabilities in systems including computer networks. The invention is based on generation of attack graphs wherein each node represents a possible attack state and each edge represents a change in state caused by a single action taken by an attacker or unwitting assistant. Edges are weighted using metrics such as attacker effort, likelihood of attack success, or time to succeed. Generation of an attack graph is accomplished by matching information about attack requirements (specified in "attack templates") to information about computer system configuration (contained in a configuration file that can be updated to reflect system changes occurring during the course of an attack) and assumed attacker capabilities (reflected in "attacker profiles"). High risk attack paths, which correspond to those considered suited to application of attack countermeasures given limited resources for applying countermeasures, are identified by finding "epsilon optimal paths."
... Artery Disease Venous Thromboembolism Aortic Aneurysm More About Heart Attacks Updated:Jan 11,2018 A heart attack is ... coronary artery damage leads to a heart attack . Heart Attack Questions and Answers What is a heart attack? ...
NASA Technical Reports Server (NTRS)
Venkatapathy, Ethiraj; Nystrom, G. A.; Bardina, J.; Lombard, C. K.
1987-01-01
This paper describes the application of the conservative supra characteristic method (CSCM) to predict the flow around two-dimensional slot injection cooled cavities in hypersonic flow. Seven different numerical solutions are presented that model three different experimental designs. The calculations manifest outer flow conditions including the effects of nozzle/lip geometry, angle of attack, nozzle inlet conditions, boundary and shear layer growth and turbulance on the surrounding flow. The calculations were performed for analysis prior to wind tunnel testing for sensitivity studies early in the design process. Qualitative and quantitative understanding of the flows for each of the cavity designs and design recommendations are provided. The present paper demonstrates the ability of numerical schemes, such as the CSCM method, to play a significant role in the design process.
NASA Astrophysics Data System (ADS)
Ishimoto, Jun; Abe, Haruto; Ochiai, Naoya
The fundamental characteristics of the cryogenic single-component micro-nano solid nitrogen (SN2) particle production using super adiabatic Laval nozzle and its application to the physical photo resist removal-cleaning technology are investigated by a new type of integrated measurement coupled computational technique. As a result of present computation, it is found that high-speed ultra-fine SN2 particles are continuously generated due to the freezing of liquid nitrogen (LN2) droplets induced by rapid adiabatic expansion of transonic subcooled two-phase nitrogen flow passing through the Laval nozzle. Furthermore, the effect of SN2 particle diameter, injection velocity, and attack angle to the wafer substrate on resist removal-cleaning performance is investigated in detail by integrated measurement coupled computational technique.
A graph-based system for network-vulnerability analysis
DOE Office of Scientific and Technical Information (OSTI.GOV)
Swiler, L.P.; Phillips, C.
1998-06-01
This paper presents a graph-based approach to network vulnerability analysis. The method is flexible, allowing analysis of attacks from both outside and inside the network. It can analyze risks to a specific network asset, or examine the universe of possible consequences following a successful attack. The graph-based tool can identify the set of attack paths that have a high probability of success (or a low effort cost) for the attacker. The system could be used to test the effectiveness of making configuration changes, implementing an intrusion detection system, etc. The analysis system requires as input a database of common attacks,more » broken into atomic steps, specific network configuration and topology information, and an attacker profile. The attack information is matched with the network configuration information and an attacker profile to create a superset attack graph. Nodes identify a stage of attack, for example the class of machines the attacker has accessed and the user privilege level he or she has compromised. The arcs in the attack graph represent attacks or stages of attacks. By assigning probabilities of success on the arcs or costs representing level-of-effort for the attacker, various graph algorithms such as shortest-path algorithms can identify the attack paths with the highest probability of success.« less
Application of Cellular Automata to Detection of Malicious Network Packets
ERIC Educational Resources Information Center
Brown, Robert L.
2014-01-01
A problem in computer security is identification of attack signatures in network packets. An attack signature is a pattern of bits that characterizes a particular attack. Because there are many kinds of attacks, there are potentially many attack signatures. Furthermore, attackers may seek to avoid detection by altering the attack mechanism so that…
Cooperating attackers in neural cryptography.
Shacham, Lanir N; Klein, Einat; Mislovaty, Rachel; Kanter, Ido; Kinzel, Wolfgang
2004-06-01
A successful attack strategy in neural cryptography is presented. The neural cryptosystem, based on synchronization of neural networks by mutual learning, has been recently shown to be secure under different attack strategies. The success of the advanced attacker presented here, called the "majority-flipping attacker," does not decay with the parameters of the model. This attacker's outstanding success is due to its using a group of attackers which cooperate throughout the synchronization process, unlike any other attack strategy known. An analytical description of this attack is also presented, and fits the results of simulations.
Terrorist Attacks Escalate in Frequency and Fatalities Preceding Highly Lethal Attacks
Martens, Andy; Sainudiin, Raazesh; Sibley, Chris G.; Schimel, Jeff; Webber, David
2014-01-01
Highly lethal terrorist attacks, which we define as those killing 21 or more people, account for 50% of the total number of people killed in all terrorist attacks combined, yet comprise only 3.5% of terrorist attacks. Given the disproportionate influence of these incidents, uncovering systematic patterns in attacks that precede and anticipate these highly lethal attacks may be of value for understanding attacks that exact a heavy toll on life. Here we examined whether the activity of terrorist groups escalates–both in the number of people killed per attack and in the frequency of attacks–leading up to highly lethal attacks. Analyses of terrorist attacks drawn from a state-of-the-art international terrorism database (The Global Terrorism Database) showed evidence for both types of escalation leading up to highly lethal attacks, though complexities to the patterns emerged as well. These patterns of escalation do not emerge among terrorist groups that never commit a highly lethal attack. PMID:24755753
ERIC Educational Resources Information Center
Lundquist, Carol; Frieder, Ophir; Holmes, David O.; Grossman, David
1999-01-01
Describes a scalable, parallel, relational database-drive information retrieval engine. To support portability across a wide range of execution environments, all algorithms adhere to the SQL-92 standard. By incorporating relevance feedback algorithms, accuracy is enhanced over prior database-driven information retrieval efforts. Presents…
Learning SQL Programming with Interactive Tools: From Integration to Personalization
ERIC Educational Resources Information Center
Brusilovsky, Pete; Sosnovsky, Sergey; Yudelson, Michael V.; Lee, Danielle H.; Zadorozhny, Vladimir; Zhou, Xin
2010-01-01
Rich, interactive eLearning tools receive a lot of attention nowadays from both practitioners and researchers. However, broader dissemination of these tools is hindered by the technical difficulties of their integration into existing platforms. This article explores the technical and conceptual problems of using several interactive educational…
Cellular Consequences of Telomere Shortening in Histologically Normal Breast Tissues
2013-09-01
using the open source, JAVA -based image analysis software package ImageJ (http://rsb.info.nih.gov/ij/) and a custom designed plugin (“Telometer...Tabulated data were stored in a MySQL (http://www.mysql.com) database and viewed through Microsoft Access (Microsoft Corp.). Statistical Analysis For
Teaching Structured Design of Network Algorithms in Enhanced Versions of SQL
ERIC Educational Resources Information Center
de Brock, Bert
2004-01-01
From time to time developers of (database) applications will encounter, explicitly or implicitly, structures such as trees, graphs, and networks. Such applications can, for instance, relate to bills of material, organization charts, networks of (rail)roads, networks of conduit pipes (e.g., plumbing, electricity), telecom networks, and data…
Status Report on Image Information Systems and Image Data Base Technology
1989-12-01
PowerHouse, StarGate , StarNet. Significant Recent Developments: Acceptance major teaching Universities (Australia), U.S.A.F. Major Corporations. Future...scenario, all computers must be VAX). STARBASE StarBase StarNet, (Network server), StarBase StarGate , (SQL gateway). SYBASE Sybase is an inherently
Aviation Environmental Design Tool (AEDT) : Version 2c service Pack 1 : installation guide.
DOT National Transportation Integrated Search
2016-12-01
This document provides detailed instructions on how to install and run AEDT 2c Service Pack 1 (SP1). It is important to follow the installation instructions in the order listed below, as Microsoft SQL Server 2008 R2 is a prerequisite for AEDT. Instal...
ADVICE--Educational System for Teaching Database Courses
ERIC Educational Resources Information Center
Cvetanovic, M.; Radivojevic, Z.; Blagojevic, V.; Bojovic, M.
2011-01-01
This paper presents a Web-based educational system, ADVICE, that helps students to bridge the gap between database management system (DBMS) theory and practice. The usage of ADVICE is presented through a set of laboratory exercises developed to teach students conceptual and logical modeling, SQL, formal query languages, and normalization. While…
NASA Technical Reports Server (NTRS)
Baldwin, John; Zendejas, Silvino; Gutheinz, Sandy; Borden, Chester; Wang, Yeou-Fang
2009-01-01
Mission and Assets Database (MADB) Version 1.0 is an SQL database system with a Web user interface to centralize information. The database stores flight project support resource requirements, view periods, antenna information, schedule, and forecast results for use in mid-range and long-term planning of Deep Space Network (DSN) assets.
Liang, Xiping; Wang, Sha; Qin, Guangcheng; Xie, Jingmei; Tan, Ge; Zhou, Jiying; McBride, Devin W.
2017-01-01
Tyrosine phosphorylation of NR2B (NR2B-pTyr), a subunit of the N-methyl-D-aspartate (NMDA) receptor, has been reported to develop central sensitization and persistent pain in the spine, but its effect in chronic migraines has not been examined. We hypothesized that tyrosine phosphorylation of NR2B contributes to chronic migraines (CM) through calcitonin gene-related peptide (CGRP) in rats. Ninety-four male Sprague-Dawley rats were subjected to seven inflammatory soup (IS) injections. In a subset of animals, the time course and location of NR2B tyrosine phosphorylation were detected by western blot and immunofluorescence double staining. Another set of animals were given either genistein, vehicle, or genistein and recombinant CGRP. The mechanical threshold was measured, the expressions of NR2B-pTyr, NR2B, and CGRP were quantified using western blot, and nitric oxide (NO) was measured with the nitric acid reductase method. NR2B-pTyr expression, in neurons, peaked at 24 hours after CM. Genistein improved the mechanical threshold and reduced migraine attacks 24 and 72 hours after CM. Tyrosine phosphorylation of NR2B decreased the mechanical threshold and increased migraine attacks via upregulated CGRP expression in the rat model of CM. Thus, tyrosine phosphorylation of NR2B may be a potential therapeutic target for treatment of CM. PMID:28393079
Liang, Xiping; Wang, Sha; Qin, Guangcheng; Xie, Jingmei; Tan, Ge; Zhou, Jiying; McBride, Devin W; Chen, Lixue
2017-01-01
Tyrosine phosphorylation of NR2B (NR2B-pTyr), a subunit of the N-methyl-D-aspartate (NMDA) receptor, has been reported to develop central sensitization and persistent pain in the spine, but its effect in chronic migraines has not been examined. We hypothesized that tyrosine phosphorylation of NR2B contributes to chronic migraines (CM) through calcitonin gene-related peptide (CGRP) in rats. Ninety-four male Sprague-Dawley rats were subjected to seven inflammatory soup (IS) injections. In a subset of animals, the time course and location of NR2B tyrosine phosphorylation were detected by western blot and immunofluorescence double staining. Another set of animals were given either genistein, vehicle, or genistein and recombinant CGRP. The mechanical threshold was measured, the expressions of NR2B-pTyr, NR2B, and CGRP were quantified using western blot, and nitric oxide (NO) was measured with the nitric acid reductase method. NR2B-pTyr expression, in neurons, peaked at 24 hours after CM. Genistein improved the mechanical threshold and reduced migraine attacks 24 and 72 hours after CM. Tyrosine phosphorylation of NR2B decreased the mechanical threshold and increased migraine attacks via upregulated CGRP expression in the rat model of CM. Thus, tyrosine phosphorylation of NR2B may be a potential therapeutic target for treatment of CM.
Induction of tolerance towards TNP entails down-regulation of an autoimmune attack.
Zöller, M; Andrighetto, G
1988-01-01
In order to follow the process of induction and maintainance of tolerance, BALB/c mice were tolerized by free hapten, and effector and regulatory cell interactions were analysed by limiting-dilution (LD) cultures. Injection of trinitrobenzenesulphonic acid (TNBS) resulted, predominantly, in the activation and expansion of self-reactive cytotoxic T cells (CTL), which were observed transiently at frequencies comparable to allo-specific CTL. In addition, self-reactive helper T cells (Th) were activated and expanded in tolerized mice. TNP-specific reactivity was difficult to evaluate, since cytotoxic activity against haptenized self followed the pattern of self-reactivity throughout the test period. But in LD cultures determining proliferation, two populations of Th responding to TNP-self were observed, while only one Th population could be detected in response to self. Expansion/activation of Th and CTL precursors (CTLp) was followed by activation of suppressor T cells (Ts). The suppressor population could be divided into two subpopulations, one interfering with Th, the second interacting directly with CTL (veto cells). The results indicate that during the induction of tolerance, animals pass through an autoimmune attack, with expansion and activation of self-reactive clones (CTL, Th). The final status of non-responsiveness towards TNP is not due to the deletion of effector or regulatory cells, but results from the establishment of a steady state of dominance of self-reactive and TNP-self-reactive suppression. PMID:2965095
Human symbionts inject and neutralize antibacterial toxins to persist in the gut.
Wexler, Aaron G; Bao, Yiqiao; Whitney, John C; Bobay, Louis-Marie; Xavier, Joao B; Schofield, Whitman B; Barry, Natasha A; Russell, Alistair B; Tran, Bao Q; Goo, Young Ah; Goodlett, David R; Ochman, Howard; Mougous, Joseph D; Goodman, Andrew L
2016-03-29
The human gut microbiome is a dynamic and densely populated microbial community that can provide important benefits to its host. Cooperation and competition for nutrients among its constituents only partially explain community composition and interpersonal variation. Notably, certain human-associated Bacteroidetes--one of two major phyla in the gut--also encode machinery for contact-dependent interbacterial antagonism, but its impact within gut microbial communities remains unknown. Here we report that prominent human gut symbionts persist in the gut through continuous attack on their immediate neighbors. Our analysis of just one of the hundreds of species in these communities reveals 12 candidate antibacterial effector loci that can exist in 32 combinations. Through the use of secretome studies, in vitro bacterial interaction assays and multiple mouse models, we uncover strain-specific effector/immunity repertoires that can predict interbacterial interactions in vitro and in vivo, and find that some of these strains avoid contact-dependent killing by accumulating immunity genes to effectors that they do not encode. Effector transmission rates in live animals can exceed 1 billion events per minute per gram of colonic contents, and multiphylum communities of human gut commensals can partially protect sensitive strains from these attacks. Together, these results suggest that gut microbes can determine their interactions through direct contact. An understanding of the strategies human gut symbionts have evolved to target other members of this community may provide new approaches for microbiome manipulation.
Friedrichs, Björn; Heuser, Claudia; Guhlke, Stefan; Abken, Hinrich; Hombach, Andreas A.
2012-01-01
Successful immunotherapy of Hodgkin's disease is so far hampered by the striking unresponsiveness of lymphoma infiltrating immune cells. To mobilize both adoptive and innate immune cells for an anti-tumor attack we fused the pro-inflammatory cytokines IL2 and IL12 to an anti-CD30 scFv antibody in a dual cytokine fusion protein to accumulate both cytokines at the malignant CD30+ Hodgkin/Reed-Sternberg cells in the lymphoma lesion. The tumor-targeted IL12-IL2 fusion protein was superior in activating resting T cells to amplify and secrete pro-inflammatory cytokines compared to targeted IL2 or IL12 alone. NK cells were also activated by the dual cytokine protein to secrete IFN-γ and to lyse target cells. The tumor-targeted IL12-IL2, when applied by i.v. injection to immune-competent mice with established antigen-positive tumors, accumulated at the tumor site and induced tumor regression. Data demonstrate that simultaneous targeting of two cytokines in a spatial and temporal simultaneous fashion to pre-defined tissues is feasible by a dual-cytokine antibody fusion protein. In the case of IL12 and IL2, this produced superior anti-tumor efficacy implying the strategy to muster a broader immune cell response in the combat against cancer. PMID:23028547
Causal Attribution, Perceived Benefits, and Morbidity After a Heart Attack: An 8-Year Study.
ERIC Educational Resources Information Center
Affleck, Glenn; And Others
1987-01-01
Interviewed heart attack victims (N=287) seven weeks and eight years after their attack. Explored interrelations among causal attributions for the attack, survivor morbidity, and heart attack recurrence. Found that patients who cited benefits from their misfortune seven weeks after the first attack were less likely to have another attack and had…