WorldWideScience

Sample records for angle of attack

  1. Effect of Angle of Attack on Slope Climbing Performance

    Science.gov (United States)

    Creager, Colin M.; Jones, Lucas; Smith, Lauren M.

    2017-01-01

    Ascending steep slopes is often a very difficult challenge for off-road vehicles, whether on Earth or on extraterrestrial bodies. This challenge is even greater if the surface consists of loose granular soil that does not provide much shear strength. This study investigated how the path at which a vehicle traverses a slope, specifically the angle that it is commanded to drive relative to the base of the hill (the angle of attack), can affect its performance. A vehicle was driven in loose sand at slope angles up to 15 degrees and angles of attack ranging from 10 to 90 degrees. A novel photogrammetry technique was implemented to both track vehicle motion and create a three-dimensional profile of the terrain. This allowed for true wheel sinkage measurements. The study showed that though low angles of attack result in lower wheel slip and sinkage, the efficiency of the vehicles uphill motion increased at higher angles of attack. For slopes up to 15 degrees, a 90 degree angle of attack provided the greatest likelihood of successful ascent.

  2. Angle-of-attack estimation for analysis of CAT encounters

    Science.gov (United States)

    Bach, R. E., Jr.; Parks, E. K.

    1985-01-01

    Recent studies of clear-air turbulence (CAT) encounters involving wide-body airliners have been based upon flight-path wind estimates made by analyzing digital flight-data-recorder (DFDR) records and radar records. Such estimates require a time history of the aircraft angle of attack, a record that is not usually included in the DFDR measurement set. This paper describes a method for reconstructing angle of attack that utilizes available flight record and aircraft-specific information associated with an aerodynamic model of the lift coefficient. Results from two wide-body incidents in which vane measurements of angle of attack were recorded show good agreement between measured and calculated time histories. This research has been performed in cooperation with the National Transportation Safety Board to provide a better understanding of the CAT phenomenon.

  3. Non-linear Flight Dynamics at High Angles of Attack

    DEFF Research Database (Denmark)

    Granasy, P.; Sørensen, C.B.; Mosekilde, Erik

    1998-01-01

    The methods of nonlinear dynamics are applied to the longitudinal motion of a vectored thrust aircraft, in particular the behavior at high angles of attack. Our model contains analytic nonlinear aerodynamical coefficients based on NASA windtunnel experiments on the F-18 high-alpha research vehicl...

  4. High angle of attack aerodynamics subsonic, transonic, and supersonic flows

    CERN Document Server

    Rom, Josef

    1992-01-01

    The aerodynamics of aircraft at high angles of attack is a subject which is being pursued diligently, because the modern agile fighter aircraft and many of the current generation of missiles must perform well at very high incidence, near and beyond stall. However, a comprehensive presentation of the methods and results applicable to the studies of the complex aerodynamics at high angle of attack has not been covered in monographs or textbooks. This book is not the usual textbook in that it goes beyond just presenting the basic theoretical and experimental know-how, since it contains reference material to practical calculation methods and technical and experimental results which can be useful to the practicing aerospace engineers and scientists. It can certainly be used as a text and reference book for graduate courses on subjects related to high angles of attack aerodynamics and for topics related to three-dimensional separation in viscous flow courses. In addition, the book is addressed to the aerodynamicist...

  5. Comparison of Angle of Attack Measurements for Wind Tunnel Testing

    Science.gov (United States)

    Jones, Thomas, W.; Hoppe, John C.

    2001-01-01

    Two optical systems capable of measuring model attitude and deformation were compared to inertial devices employed to acquire wind tunnel model angle of attack measurements during the sting mounted full span 30% geometric scale flexible configuration of the Northrop Grumman Unmanned Combat Air Vehicle (UCAV) installed in the NASA Langley Transonic Dynamics Tunnel (TDT). The overall purpose of the test at TDT was to evaluate smart materials and structures adaptive wing technology. The optical techniques that were compared to inertial devices employed to measure angle of attack for this test were: (1) an Optotrak (registered) system, an optical system consisting of two sensors, each containing a pair of orthogonally oriented linear arrays to compute spatial positions of a set of active markers; and (2) Video Model Deformation (VMD) system, providing a single view of passive targets using a constrained photogrammetric solution whose primary function was to measure wing and control surface deformations. The Optotrak system was installed for this test for the first time at TDT in order to assess the usefulness of the system for future static and dynamic deformation measurements.

  6. Determination of the angle of attack on rotor blades

    DEFF Research Database (Denmark)

    Shen, Wen Zhong; Hansen, Martin Otto Laver; Sørensen, Jens Nørkær

    2009-01-01

    Two simple methods for determining the angle of attack (AOA) on a section of a rotor blade are proposed. Both techniques consist of employing the Biot-Savart integral to determine the influence of the bound vorticity on the velocity field. In the first technique, the force distribution along...... the blade and the velocity at a monitor point in the vicinity of the blade are assumed to be known from experiments or CFD computations. The AOA is determined by subtracting the velocity induced by the bound circulation, determined from the loading, from the velocity at the monitor point. In the second...... to be located closer to the blade, and thus to determine the AOA with higher accuracy. Data from CFD computations for flows past the Tellus 95 kW wind turbine at different wind speeds are used to test both techniques. Comparisons show that the proposed methods are in good agreement with existing techniques...

  7. Numerical simulation of the effects of variation of angle of attack and sweep angle on vortex breakdown over delta wings

    Science.gov (United States)

    Ekaterinaris, J. A.; Schiff, Lewis B.

    1990-01-01

    In the present investigation of the vortical flowfield structure over delta wings at high angles of attack, three-dimensional Navier-Stokes numerical simulations were conducted to predict the complex leeward flowfield characteristics; these encompass leading-edge separation, secondary separation, and vortex breakdown. Attention is given to the effect on solution accuracy of circumferential grid-resolution variations in the vicinity of the wing leading edge, and well as to the effect of turbulence modeling on the solutions. When a critical angle-of-attack was reached, bubble-type vortex breakdown was found. With further angle-of-attack increase, a change from bubble-type to spiral-type vortex breakdown was predicted by the numerical solution.

  8. Characterization and Control of Vortex Breakdown over a Delta Wing at High Angles of Attack

    National Research Council Canada - National Science Library

    Mitchell, Anthony

    2000-01-01

    .... The goal of this research is the control of leading-edge vortex breakdown by open-loop, along-the-core blowing near the apex of a delta wing to improve lift and maneuverability at high angles of attack...

  9. Development of an engineering level prediction method for high angle of attack aerodynamics

    Science.gov (United States)

    Reisenthel, Patrick H.; Rodman, Laura C.; Nixon, David

    1993-01-01

    The present work is concerned with predicting the unsteady flow considered to be the cause of the structural failure of twin vertical tail aircraft. An engineering tool has been produced for high angle of attack aerodynamics using the simplest physical models. The main innovation behind this work is its emphasis on the modeling of two key aspects of the dominant physics associated with high angle-of-attack airflows, namely unsteady separation and vortex breakdown.

  10. EFFECT OF SWEEP ANGLE ON THE VORTICAL FLOW OVER DELTA WINGS AT AN ANGLE OF ATTACK OF 10°

    Directory of Open Access Journals (Sweden)

    JAMES BRETT

    2014-12-01

    Full Text Available CFD simulations have been used to analyse the vortical flows over sharp edged delta wings with differing sweep angles under subsonic conditions at an angle of attack of 10°. RANS simulations were validated against experimental data for a 65° sweep wing, with a flat cross-section, and the steadiness of the flow field was assessed by comparing the results against unsteady URANS and DES simulations. To assess the effect of sweep angle on the flow field, a range of sweep angles from 65° to 43° were simulated. For moderate sweep wings the primary vortex was observed to detach from the leading edge, undergoing vortex breakdown, and a weaker, replacement, "shadow" vortex was formed. The shadow vortex was observed for sweep angles of 50° and less, and resulted in reduced lift production near the wing tips loss of the stronger primary vortex.

  11. In-blade angle of attack measurement and comparison with models

    Science.gov (United States)

    Gallant, T. E.; Johnson, D. A.

    2016-09-01

    The torque generated by a wind turbine blade is dependent on several parameters, one of which is the angle of attack. Several models for predicting the angle of attack in yawed conditions have been proposed in the literature, but there is a lack of experimental data to use for direct validation. To address this problem, experiments were conducted at the University of Waterloo Wind Generation Research Facility using a 3.4 m diameter test turbine. A five-hole pressure probe was installed in a modular 3D printed blade and was used to measure the angle of attack, a, as a function of several parameters. Measurements were conducted at radial positions of r/R = 0.55 and 0.72 at tip speed ratios of λ = 5.0, 3.6, and 3.1. The yaw offset of the turbine was varied from -15° to +15°. Experimental results were compared directly to angle of attack values calculated using a model proposed by Morote in 2015. Modeled values were found to be in close agreement with the experimental results. The angle of attack was shown to vary cyclically in the yawed case while remaining mostly constant when aligned with the flow, as expected. The quality of results indicates the potential of the developed instrument for wind turbine measurements.

  12. Effects of Angle of Attack and Velocity on Trailing Edge Noise

    Science.gov (United States)

    Hutcheson, Florence V.; Brooks, Thomas F.

    2006-01-01

    Trailing edge (TE) noise measurements for a NACA 63-215 airfoil model are presented, providing benchmark experimental data for a cambered airfoil. The effects of flow Mach number and angle of attack of the airfoil model with different TE bluntnesses are shown. Far-field noise spectra and directivity are obtained using a directional microphone array. Standard and diagonal removal beamforming techniques are evaluated employing tailored weighting functions for quantitatively accounting for the distributed line character of TE noise. Diagonal removal processing is used for the primary database as it successfully removes noise contaminates. Some TE noise predictions are reported to help interpret the data, with respect to flow speed, angle of attack, and TE bluntness on spectral shape and peak levels. Important findings include the validation of a TE noise directivity function for different airfoil angles of attack and the demonstration of the importance of the directivity function s convective amplification terms.

  13. Wake instabilities of flow over a spinning circular disk at angle of attack

    Science.gov (United States)

    Lee, Marcus; Colonius, Tim; McKeon, Beverley

    2017-11-01

    A circular disk spinning about its axis of rotational symmetry is inherently robust to external disturbances due to gyroscopic moments and is therefore a promising configuration for a robust micro air vehicle. However, literature on the wake structures and flow behavior associated with spinning disk aerodynamics remains limited, particularly at angles of attack relevant to flight. We thus use a three-dimensional immersed boundary method for incompressible viscous flows to study the effects of angle of attack, Reynolds number, and tip-speed ratio on spinning disk aerodynamics. We observe a Hopf bifurcation corresponding to a bluff-body wake instability at a critical Reynolds number and/or angle of attack, above which periodic vortex shedding occurs. We then examine how increasing the tip-speed ratio affects the stability and structure of the flow. Supported by Boeing.

  14. An evaluation of several methods of determining the local angle of attack on wind turbine blades

    DEFF Research Database (Denmark)

    Guntur, Srinivas; Sørensen, Niels N.

    2014-01-01

    Several methods of determining the angles of attack (AOAs) on wind turbine blades are discussed in this paper. A brief survey of the methods that have been used in the past are presented, and the advantages of each method are discussed relative to their application in the BEM theory. Data from...

  15. Magnus effects at high angles of attack and critical Reynolds numbers

    Science.gov (United States)

    Seginer, A.; Ringel, M.

    1983-01-01

    The Magnus force and moment experienced by a yawed, spinning cylinder were studied experimentally in low speed and subsonic flows at high angles of attack and critical Reynolds numbers. Flow-field visualization aided in describing a flow model that divides the Magnus phenomenon into a subcritical region, where reverse Magnus loads are experienced, and a supercritical region where these loads are not encountered. The roles of the spin rate, angle of attack, and crossflow Reynolds number in determining the boundaries of the subcritical region and the variations of the Magnus loads were studied.

  16. Visualization techniques for studying high angle of attack separated vortical flows

    Science.gov (United States)

    Nelson, Robert C.

    1988-01-01

    Flow visualization techniques can provide information on high angle of attack separated flows around slender aircraft configurations that may be unobtainable otherwise. At large angles of attack the flow field is dominated by vortical structures originating on the forebody wing extension, wing and forward control surfaces. Several techniques that are suitable for tracking vortices in subsonic wind tunnels are introduced. A discussion of visualization photographs and quantitative data obtained from visualization studies on vortex trajectory and breakdown position on both static and dynamic wind tunnel models is presented.

  17. Surface pressure model for simple delta wings at high angles of attack

    Indian Academy of Sciences (India)

    A new aerodynamic modelling approach is proposed for the longitudinal static characteristics of a simple delta wing. It captures the static variation of normal force and pitching moment characteristics throughout the angle of attack range. The pressure model is based on parametrizing the surface pressure distribution on a ...

  18. Stability Analysis of Hypersonic Boundary Layer over a Cone at Small Angle of Attack

    Directory of Open Access Journals (Sweden)

    Feng Ji

    2014-04-01

    Full Text Available An investigation on the stability of hypersonic boundary layer over a cone at small angle of attack has been performed. After obtaining the steady base flow, linear stability theory (LST analysis has been made with local parallel assumption. The growth rates of the first mode and second mode waves at different streamwise locations and different azimuthal angles are obtained. The results show that the boundary layer stability was greatly influenced by small angles of attack. The maximum growth rate of the most unstable wave on the leeward is larger than that on the windward. Moreover, dominating second mode wave starts earlier on the leeward than that on the windward. The LST result also shows that there is a “valley” region around 120°~150° meridian in the maximum growth rates curve.

  19. Wind Tunnel Corrections for High Angle of Attack Models,

    Science.gov (United States)

    1981-02-01

    presentees en 1972 par VAYSSAIRE C9"l ’. Un bon accord ötait obtmu entre les r£sultats corrigäs d’une maquette d1avion de transport ä fleche de...et pour deux incidences de 1.0 et 32 degr£s, la derniere en presence d’un dfccollement prononcd, les courbes presentees sort is si es des signatures...a check on the validity of the commonly used linearized corrections due to Glauert. This was motivated also by the results of earlier calculations

  20. Viscous flow over spinning cones at angle of attack.

    Science.gov (United States)

    Lin, T. C.; Rubin, S. G.

    1973-01-01

    A numerical finite-difference method is developed for evaluating the Magnus coefficients on spinning cones in laminar flow. The merged layer, the strong interaction region, and the downstream boundary layer are all considered. The numerical method is a predictor-corrector scheme developed for three-dimensional flows with or without crossflow diffusion. This method is particularly useful in problems in which a symmetry plane does not exist. Several contributions to the Magnus force and moments are considered. These include asymmetries in displacement thickness, centrifugal force and crossflow shear, and the effects of crossflow separation and vortex formation. Comparisons are made with experimental data and other analyses.

  1. High Speed and High Angle of Attack Aerodynamic Characteristics of Winged Space Vehicle

    OpenAIRE

    INATANI, Yoshifumi

    1987-01-01

    Static aerodynamic characteristics of winged space vehicle is investigated through a series of wind tunnel testing. This report includes a summary of the test results and associated considerations. The tests were conducted and supported by Working Group for Winged Space Vehicle of Institute of Space and Astronautical Science (ISAS). Attention has been concentrated on both longitudinal and lateral/directional, high angle of attack flight capability at high speed flight condition of the vehicle...

  2. Prediction of forces and moments on finned bodies at high angle of attack in transonic flow

    Energy Technology Data Exchange (ETDEWEB)

    Oberkampf, W. L.

    1981-04-01

    This report describes a theoretical method for the prediction of fin forces and moments on bodies at high angle of attack in subsonic and transonic flow. The body is assumed to be a circular cylinder with cruciform fins (or wings) of arbitrary planform. The body can have an arbitrary roll (or bank) angle, and each fin can have individual control deflection. The method combines a body vortex flow model and lifting surface theory to predict the normal force distribution over each fin surface. Extensive comparisons are made between theory and experiment for various planform fins. A description of the use of the computer program that implements the method is given.

  3. Simulation of flow around a slender body at high angles of attack

    Directory of Open Access Journals (Sweden)

    Obeid Osama

    2017-01-01

    Full Text Available LES of the flow around an ogive-cylinder body at high angles of attack were carried out to investigate the possibility of the development of asymmetric wake-vortex without the introduction of artificial perturbations. The study investigated the effect of grid resolution and scheme bias on the solution. The numerical solution was found to be sensitive to the bias in the numerical scheme. The simulation was carried for angles of attack α = 30°, 40°, 50°, 55°, and 60°. The simulation at α = 30° − 40° produced symmetric wake-vortex. At α = 50°, the wake-vortex is also symmetric but with vortex separation. At α = 60°, the wake-vortex becomes asymmetric. At 60°, the wake-vortex is highly asymmetric with vortex separation and breakdown. It was concluded that asymmetric flow around slender bodies at high angles of attack can be simulated in the absence geometrical or flow perturbations.

  4. Robust, nonlinear, high angle-of-attack control design for a supermaneuverable vehicle

    Science.gov (United States)

    Adams, Richard J.

    1993-01-01

    High angle-of-attack flight control laws are developed for a supermaneuverable fighter aircraft. The methods of dynamic inversion and structured singular value synthesis are combined into an approach which addresses both the nonlinearity and robustness problems of flight at extreme operating conditions. The primary purpose of the dynamic inversion control elements is to linearize the vehicle response across the flight envelope. Structured singular value synthesis is used to design a dynamic controller which provides robust tracking to pilot commands. The resulting control system achieves desired flying qualities and guarantees a large margin of robustness to uncertainties for high angle-of-attack flight conditions. The results of linear simulation and structured singular value stability analysis are presented to demonstrate satisfaction of the design criteria. High fidelity nonlinear simulation results show that the combined dynamics inversion/structured singular value synthesis control law achieves a high level of performance in a realistic environment.

  5. Study on Fluid-Induced Vibration Power Harvesting of Square Columns under Different Attack Angles

    Directory of Open Access Journals (Sweden)

    Meng Zhang

    2017-01-01

    Full Text Available A model of the flow-vibration-electrical circuit multiphysical coupling system for solving square column vortex-induced vibration piezoelectric energy harvesting (VIVPEH is proposed in this paper. The quasi steady state theory is adopted to describe the fluid solid coupling process of vortex-induced vibration based on the finite volume method coupled Gauss equation. The vibrational response and the quasi steady state form of the output voltage are solved by means of the matrix coefficient method and interactive computing. The results show that attack angles play an important role in the performance of square column VIVPEH, of which α=45° is a relatively ideal attack angle of square column VIVPEH.

  6. Non-Normal Impact and Penetration. Analysis for Hard Targets and Small Angles of Attack

    Science.gov (United States)

    1978-09-01

    acceleration of the projectile CG for different initial values of the attack angle. Beyond the point of nose embedment (0.2 ms), there is a marked difference...DeBoesser, Jr. Technical Library Director, Defense Intelligence Agency ATN : DI-TE Comander , Frankford Arsenal DT-2, Weapons & Systems ATTN: L. Baldini...Monitored Battlefield A’TN: STSI (Archives) Sensor System 2 cy STTL (Technical Library) ATTN: Chuck Higgins 15 cy SPSS DDST Comanding Officer, Picatinny

  7. MATHEMATICAL MODEL OF THE MOTION OF A LIGHT ATTACK AIRCRAFT WITH EXTERNAL LOAD SLINGS IN THE EXTREME AREA OF FLIGHT MODES ACCORDING TO THE ANGLE OF ATTACK

    Directory of Open Access Journals (Sweden)

    A. Popov Sergey

    2017-01-01

    Full Text Available For the time being, a combat-capable trainer aircraft has already been used as a light attack aircraft. The quality of mission effectiveness evaluation depends on the degree of relevance of mathematical models used. It is known that the mis- sion efficiency is largely determined by maneuvering capabilities of the aircraft which are realized most fully in extreme angle of attack flight modes. The article presents the study of the effect of Reynolds number, angle of attack and position on the external sling on the parameters characterizing the state of separated-vortex flow, which was conducted using soft- ware complexes such as Solid Works and Ansys Fluent. There given the dependences of the observed parameters for sta- tionary and nonstationary cases of light attack aircraft movement. The article considers the influence of time constants, which characterize the response rate and delaying of separated flow development and attached flow recovery on the state of separated-vortex flow. The author mentions how the speed of angle of attack change influences lift coefficient of a light attack aircraft with external slings due to response rate and delaying of separated flow development and attached flow recovery. The article describes the mathematical model invented by the authors. This is the model of the movements of light attack aircraft with external slings within a vertical flight maneuver, considering the peculiarities of separated-vortex flow. Using this model, there has been obtained the parameters of light attack aircraft output path from the pitch using large an- gles of attack. It is demonstrated that not considering the peculiarities of the separated-vortex flow model of light attack aircraft movements leads to certain increase of height loss at the pullout of the maneuver, which accordingly makes it pos- sible to decrease the height of the beginning of the pullout.

  8. A CFD Database for Airfoils and Wings at Post-Stall Angles of Attack

    Science.gov (United States)

    Petrilli, Justin; Paul, Ryan; Gopalarathnam, Ashok; Frink, Neal T.

    2013-01-01

    This paper presents selected results from an ongoing effort to develop an aerodynamic database from Reynolds-Averaged Navier-Stokes (RANS) computational analysis of airfoils and wings at stall and post-stall angles of attack. The data obtained from this effort will be used for validation and refinement of a low-order post-stall prediction method developed at NCSU, and to fill existing gaps in high angle of attack data in the literature. Such data could have potential applications in post-stall flight dynamics, helicopter aerodynamics and wind turbine aerodynamics. An overview of the NASA TetrUSS CFD package used for the RANS computational approach is presented. Detailed results for three airfoils are presented to compare their stall and post-stall behavior. The results for finite wings at stall and post-stall conditions focus on the effects of taper-ratio and sweep angle, with particular attention to whether the sectional flows can be approximated using two-dimensional flow over a stalled airfoil. While this approximation seems reasonable for unswept wings even at post-stall conditions, significant spanwise flow on stalled swept wings preclude the use of two-dimensional data to model sectional flows on swept wings. Thus, further effort is needed in low-order aerodynamic modeling of swept wings at stalled conditions.

  9. The effects of angle-of-attack indication on aircraft control in the event of an airspeed indicator malfunction

    Science.gov (United States)

    Boesser, Claas Tido

    Analysis of accident data by the Federal Aviation Administration, the National Transportation Safety Board, and other sources show that loss of control is the leading cause of aircraft accidents. Further evaluation of the data indicates that the majority of loss of control accidents are caused by the aircraft stalling. In response to these data, the Federal Aviation Administration and the General Aviation Joint Steering Committee emphasize the importance of stall and angle-of-attack awareness during flight. The high-profile crash of Air France Flight 447, in which pilots failed to recover from a self-induced stall, reinforced concerns over the need for improved stall and angle-of-attack awareness and reinvigorated interest in the debate over the effectiveness of angle-of-attack information displays. Further support for aerodynamic information in the form of an angle-of-attack indicator comes from core cognitive engineering principles. These principles argue for the provision of information about system functioning and dynamics as a means to ensure a human is always in position to recover a system when technology is unable. The purpose of this research was to empirically evaluate the importance of providing pilots with feedback about fundamental aircraft aerodynamics, especially during non-standard situations and unexpected disturbances. An experiment was conducted using a flight simulator to test the effects of in-cockpit angle-of-attack indication on aircraft control following an airspeed indicator malfunction on final approach. Participants flew a final approach with a target airspeed range of 60 to 65 knots. Once participants slowed the aircraft for final approach, the airspeed indicator needle would be stuck at an indication of 70 knots. One group of participants flew the final approach with an angle-of-attack indicator while the other group lacked such an instrument. Examination of aircraft performance data along the final approach showed that, when confronted

  10. Hypersonic Laminar Viscous Flow Past Spinning Cones at Angle of Attack

    Science.gov (United States)

    Agarwal, Ramesh; Rakich, John V.

    1982-01-01

    Computational results are presented for hypersonic viscous flow past spinning sharp and blunt cones of angle of attack, obtained with a parabolic Navier-Stokes marching code. The code takes into account the asymmetries in the flowfield resulting from spinning motion and computes the asymmetric shock shape, cross-flow and streamwise shear, heat transfer, cross-flow separation, and vortex structure. The Magnus force and moments are also computed. Comparisons are made with other theoretical analyses based on boundary-layer and boundary-region equations, and an anomaly is discovered in the displacement thickness contribution to the Magnus force when compared with boundary-layer results.

  11. An Experimental Investigation of Flow past a Wing at high Angles of Attack

    Science.gov (United States)

    Dalela, Vipul; Mukherjee, Rinku

    2017-11-01

    The aerodynamic characteristics for post-stall angles of attack past a single and/or multiple 3D wing(s) have been studied using a novel `decambering technique' assuming the flow to be steady. It is expected that the location of separation as well as the strength of the separated flow is unsteady. The objective of this work therefore is to investigate flow at high angles of attack considering unsteady behavior. The numerical technique used for this purpose that accounts for loss in camber due to flow separation is termed as `decambering'. Two linear functions are used to define the `decambering' for the steady case, located at the leading edge and anywhere between 50%-80% chord. Wind tunnel experiments are to be conducted to study the unsteady nature of separated flow using flow visualization techniques. An estimation of the unsteady wake will be of paramount importance. It is expected to get an experimental corroboration for the numerical decambering. A NACA 4415 wing section is being tested for a range of Reynolds numbers. It is observed from the preliminary results that the drag becomes more dominant after increasing the Reynolds number from Re = 0.093 ×106 to Re = 0.128 ×106 resulting a gentle decrease in the lift coefficient, Cl.

  12. Unsteady aerodynamic modeling at high angles of attack using support vector machines

    Directory of Open Access Journals (Sweden)

    Wang Qing

    2015-06-01

    Full Text Available Accurate aerodynamic models are the basis of flight simulation and control law design. Mathematically modeling unsteady aerodynamics at high angles of attack bears great difficulties in model structure determination and parameter estimation due to little understanding of the flow mechanism. Support vector machines (SVMs based on statistical learning theory provide a novel tool for nonlinear system modeling. The work presented here examines the feasibility of applying SVMs to high angle-of-attack unsteady aerodynamic modeling field. Mainly, after a review of SVMs, several issues associated with unsteady aerodynamic modeling by use of SVMs are discussed in detail, such as selection of input variables, selection of output variables and determination of SVM parameters. The least squares SVM (LS-SVM models are set up from certain dynamic wind tunnel test data of a delta wing and an aircraft configuration, and then used to predict the aerodynamic responses in other tests. The predictions are in good agreement with the test data, which indicates the satisfying learning and generalization performance of LS-SVMs.

  13. Investigation of Load Prediction on the Mexico Rotor Using the Technique of Determination of the Angle of Attack

    DEFF Research Database (Denmark)

    Yang, Hua; Shen, Wen Zhong; Sørensen, Jens Nørkær

    2012-01-01

    ). The extracted airfoil data are put into a BEM code, and the calculated axial and tangential forces are compared to both computations using BEM with Glauert's and SHEN's tip loss correction models and experimental data. The comparisons show that the present method of determination of angle of attack is correct......Blade element moment (BEM) is a widely used technique for prediction of wind turbine aerodynamics performance, the reliability of airfoil data is an important factor to improve the prediction accuracy of aerodynamic loads and power using a BEM code. The method of determination of angle of attack...

  14. Effect of Varying the Angle of Attack of the Scales on a Biomimetic Shark Skin Model on Embedded Vortex Formation

    Science.gov (United States)

    Wheelus, Jennifer; Lang, Amy; Bradshaw, Michael; Jones, Emily; Afroz, Farhana; Motta, Philip; Habegger, Maria

    2012-11-01

    The skin of fast-swimming sharks is proposed to have mechanisms to reduce drag and delay flow separation. The skin of fast-swimming and agile sharks is covered with small teeth-like denticles on the order of 0.2 mm. The shortfin mako is one of the fastest and most agile ocean predators creating the need to minimize its pressure drag by controlling flow separation. Biological studies of the shortfin mako skin have shown the passive bristling angle of their denticles to exceed 50 degrees in areas on the flank corresponding to the locations likely to experience separation first. It has been shown that for an angle of attack of 90 degrees, vortices form within these cavities and impose a partial slip condition at the surface of the cavity. This experiment focuses on smaller angles of attack for denticle bristling, closer to the range thought to be achieved on real shark skin. A 3-D bristled shark skin model with varying angle of attack, embedded below a boundary layer, was used to study the formation of cavity vortices through fluorescent dye visualization and Digital Particle Image Velocimetry (DPIV). The effect of varying angle of attack on vortex formation will be discussed.

  15. Supersonic Laminar Viscous Flow Past a Cone at Angle of Attack in Spinning and Coning Motion

    Science.gov (United States)

    Agarwal, Ramesh; Rakich, John V.

    1982-01-01

    Computational results obtained with a parabolic Navier-Stokes marching code are presented for supersonic viscous flow past a pointed cone at angle of attack undergoing a combined spinning and coning motion. The code takes into account the asymmetries in the flowfield resulting from the motion and computes the asymmetric shock shape, crossflow and streamwise shear, heat transfer, crossflow separation and vortex structure. The side force and moment are also computed. Reasonably good agreement is obtained with the side force measurements of Schiff and Tobak. Comparison is also made with the only available numerical inviscid analysis. It is found that the asymmetric pressure loads due lo coning motion are much larger than all other viscous forces due lo spin and coning, making viscous forces negligible in the combined motion.

  16. Component build-up method for engineering analysis of missiles at low-to-high angles of attack

    Science.gov (United States)

    Hemsch, Michael J.

    1992-01-01

    Methods are presented for estimating the component build-up terms, with the exception of zero-lift drag, for missile airframes in steady flow and at arbitrary angles of attack and bank. The underlying and unifying bases of all these efforts are slender-body theory and its nonlinear extensions through the equivalent angle-of-attack concept. Emphasis is placed on the forces and moments which act on each of the fins, so that control cross-coupling effects as well as longitudinal and lateral-directional effects can be determined.

  17. An experimental study of an airfoil with a bio-inspired leading edge device at high angles of attack

    Science.gov (United States)

    Mandadzhiev, Boris A.; Lynch, Michael K.; Chamorro, Leonardo P.; Wissa, Aimy A.

    2017-09-01

    Robust and predictable aerodynamic performance of unmanned aerial vehicles at the limits of their design envelope is critical for safety and mission adaptability. Deployable aerodynamic surfaces from the wing leading or trailing edges are often used to extend the aerodynamic envelope (e.g. slats and flaps). Birds have also evolved feathers at the leading edge (LE) of their wings, known as the alula, which enables them to perform high angles of attack maneuvers. In this study, a series of wind tunnel experiments are performed to quantify the effect of various deployment parameters of an alula-like LE device on the aerodynamic performance of a cambered airfoil (S1223) at stall and post stall conditions. The alula relative angle of attack, measured from the mean chord of the airfoil, is varied to modulate tip-vortex strength, while the alula deflection angle is varied to modulate the distance between the tip vortex and the wing surface. Integrated lift force measurements were collected at various alula-inspired device configurations. The effect of the alula-inspired device on the boundary layer velocity profile and turbulence intensity were investigated through hot-wire anemometer measurements. Results show that as alula deflection angle increases, the lift coefficient also increase especially at lower alula relative angles of attack. Moreover, at post stall wing angles of attack, the wake velocity deficit is reduced in the presence of alula device, confirming the mitigation of the wing adverse pressure gradient. The results are in strong agreement with measurements taken on bird wings showing delayed flow reversal and extended range of operational angles of attack. An engineered alula-inspired device has the potential to improve mission adaptability in small unmanned air vehicles during low Reynolds number flight.

  18. Numerical analysis on the effect of angle of attack on evaluating radio-frequency blackout in atmospheric reentry

    Science.gov (United States)

    Jung, Minseok; Kihara, Hisashi; Abe, Ken-ichi; Takahashi, Yusuke

    2016-06-01

    A three-dimensional numerical simulation model that considers the effect of the angle of attack was developed to evaluate plasma flows around reentry vehicles. In this simulation model, thermochemical nonequilibrium of flowfields is considered by using a four-temperature model for high-accuracy simulations. Numerical simulations were performed for the orbital reentry experiment of the Japan Aerospace Exploration Agency, and the results were compared with experimental data to validate the simulation model. A comparison of measured and predicted results showed good agreement. Moreover, to evaluate the effect of the angle of attack, we performed numerical simulations around the Atmospheric Reentry Demonstrator of the European Space Agency by using an axisymmetric model and a three-dimensional model. Although there were no differences in the flowfields in the shock layer between the results of the axisymmetric and the three-dimensional models, the formation of the electron number density, which is an important parameter in evaluating radio-frequency blackout, was greatly changed in the wake region when a non-zero angle of attack was considered. Additionally, the number of altitudes at which radio-frequency blackout was predicted in the numerical simulations declined when using the three-dimensional model for considering the angle of attack.

  19. Flow Control of the Stingray UAV at Low Angles of Attack

    Science.gov (United States)

    Farnsworth, John; Vaccaro, John; Amitay, Michael

    2007-11-01

    The effectiveness of active flow control, via synthetic jets and steady blowing jets, on the aerodynamic performance of the Stingray UAV was investigated experimentally in a wind tunnel. Global flow measurements were conducted using a six component sting balance, static pressure, and Particle Image Velocimetry (PIV) measurements. Using active control for trimming the Stingray UAV in pitch and roll at low angles of attack has similar effects to those with conventional control effectors. The synthetic jets were able to alter the local streamlines through the formation of a quasi-steady interaction region on the suction surface of the vehicle's wing. Phase locked data were acquired to provide insight into the growth, propagation, and decay of the synthetic jet impulse and its interaction with the cross-flow. The changes induced on the moments and forces can be proportionally controlled by either changing the momentum coefficient or by driving the synthetic jets with a pulse modulation waveform. This can lead the way for future development of closed-loop control models.

  20. Investigation on asymmetric flow over a blunt-nose slender body at high angle of attack

    Science.gov (United States)

    Zhongyang, Qi; Yankui, Wang; Lei, Wang; Qian, Li

    2017-12-01

    The asymmetric vortices over a blunt-nose slender body are investigated experimentally and numerically at a high angle of attack (AoA, α = 50°) and a Reynolds number of Re D = 1.54 × 105 on the basis of an incoming free-stream velocity and diameter (D) of the model. A micro-perturbation in the form of a hemispherical protrusion with a radius of r = 0.012D is introduced and attached on the nose of the slender body to control the behavior of the asymmetric vortices. Given the predominant role of micro perturbation in the asymmetric vortex pattern, a square wave, which is singly periodic, is observed for side-force variation by setting the circumferential angle (θ) of the micro perturbation from 0° to 360°. The asymmetric vortex pattern and the corresponding side force are manageable and highly dependent on the location of perturbation. The flow structure over the blunt-nose slender body is clarified by building a physical model of asymmetric vortex flow structure in a regular state at a high AoA (α = 50°). This model is divided into several regions by flow structure development along the model body-axis, i.e., inception region at x/D ≤ 3.0, triple-vortex region at 3.0 ≤ x/D ≤ 6.0, four-vortex region at 6.0 ≤ x/D ≤ 8.5, and five-vortex region at 8.5 ≤ x/D ≤ 12. The model reveals a complicated multi-vortex system. The associated pressure distributions and flow characteristics are discussed in detail.

  1. A hybrid system approach to airspeed, angle of attack and sideslip estimation in Unmanned Aerial Vehicles

    KAUST Repository

    Shaqura, Mohammad

    2015-06-01

    Fixed wing Unmanned Aerial Vehicles (UAVs) are an increasingly common sensing platform, owing to their key advantages: speed, endurance and ability to explore remote areas. While these platforms are highly efficient, they cannot easily be equipped with air data sensors commonly found on their larger scale manned counterparts. Indeed, such sensors are bulky, expensive and severely reduce the payload capability of the UAVs. In consequence, UAV controllers (humans or autopilots) have little information on the actual mode of operation of the wing (normal, stalled, spin) which can cause catastrophic losses of control when flying in turbulent weather conditions. In this article, we propose a real-time air parameter estimation scheme that can run on commercial, low power autopilots in real-time. The computational method is based on a hybrid decomposition of the modes of operation of the UAV. A Bayesian approach is considered for estimation, in which the estimated airspeed, angle of attack and sideslip are described statistically. An implementation on a UAV is presented, and the performance and computational efficiency of this method are validated using hardware in the loop (HIL) simulation and experimental flight data and compared with classical Extended Kalman Filter estimation. Our benchmark tests shows that this method is faster than EKF by up to two orders of magnitude. © 2015 IEEE.

  2. Apparatus for Changing the Attack Angle of a Cavitator on a Supercavatating Underwater Research Model

    National Research Council Canada - National Science Library

    Nedderman, William H

    2005-01-01

    ... tilt the cavitator tilt plate to a desired angle. Power components are remotely located and accessible to an operator so as to enable an operator to vary the angle of the cavitator tilt plate while the supercavitating underwater research model...

  3. Evaluation of different methods for determining the angle of attack on wind turbine blades with CFD results under axial inflow conditions

    DEFF Research Database (Denmark)

    Rahimi, Vajiheh; Schepers, J.G.; Shen, Wen Zhong

    2018-01-01

    This work presents an investigation on different methods for the calculation of the angle of attack and the underlying induced velocity on wind turbine blades using data obtained from three-dimensional Computational Fluid Dynamics (CFD). Several methods are examined and their advantages, as well...... and drag coefficients as a function of the angle of attack....

  4. Investigation of Strouhal numbers of iced cable models of cable-supported bridges with respect to angle of wind attack

    Czech Academy of Sciences Publication Activity Database

    Górski, P.; Tatara, M.; Pospíšil, Stanislav; Kuznetsov, Sergeii; Marušić, A.

    2015-01-01

    Roč. 112, 2-B (2015), s. 417-432 ISSN 1897-628X R&D Projects: GA MŠk(CZ) LO1219; GA MPO(CZ) FR-TI3/654 Keywords : bridge cable * ice accretion * Strouhal number * angle of attack * vortex shedding frequency Subject RIV: JN - Civil Engineering http://suw.biblos.pk.edu.pl/resources/i5/i6/i6/i8/i4/r56684/GorskiP_InvestigationsStrouhal.pdf

  5. Estimation of parameters involved in high angle-of-attack aerodynamic theory using spin flight test data

    Science.gov (United States)

    Taylor, L. W., Jr.; Pamadi, B. N.

    1983-01-01

    The difficulty in applying parameter estimation techniques to spinning airplanes is due in part to the unwieldy number of possible combinations of terms in the equations of motion, when the model structure is unknown. The combination of high angle of attack and high rotation rate results in aerodynamic functions which are quite complex. For wing dominated configurations it is advantageous to use aerodynamic theory to generate the model structure. In this way, the number of unknown parameters is reduced and the model accuracy may be increased. Under conditions for which the theory is inadequate, however, model accuracy may be reduced. Strip theory, for example, is incapable of predicting autorotative rolling moments indicated by wind tunnel tests at angles of attack exceeding 40 degrees. An improved aerodynamic theory would be necessary to successfully apply the technique advanced for such regions.

  6. A Preliminary Method for Calculating the Aerodynamic Characteristics of Cruciform Missiles to High Angles of Attack Including Effects of Roll Angle and Control Deflections

    Science.gov (United States)

    1977-11-01

    20 ... 60xNNOS 2 Program Variable RNOSE(i) RNOSE(2) ... RNOSE(N+ SE Item 6 (1) FORMAT (8F10.5), 8 values of ALFAC per card Column Number 1Q 20...OxNALFI4 Program Variable \\LFAC (1) ALFAC (2) ... LFAC (NALIA) Item 7 (optional) (1) FORMAT (8F10.5) , 8 values of PHI per card Column Number 10 1 20...dimensional. Item 6 ALFAC (K) a c(K) Body angle of attack in degrees; 1 < K < NALFA. Item 7 (optional Optional input to be read in if NFIN > 2. PHI(L

  7. Survey of needs and capabilities for wind tunnel testing of dynamic stability of aircraft at high angles of attack

    Science.gov (United States)

    Orlik-Ruckemann, K. J.

    1973-01-01

    A survey was conducted relative to future requirements for dynamic stability information for such aerospace vehicles as the space shuttle and advanced high performance military aircraft. High-angle-of-attack and high-Reynolds number conditions were emphasized. A review was made of the wind-tunnel capabilities in North America for measuring dynamic stability derivatives, revealing an almost total lack of capabilities that could satisfy these requirements. Recommendations are made regarding equipment that should be constructed to remedy this situation. A description is given of some of the more advanced existing capabilities, which can be used to at least partly satisfy immediate demands.

  8. Aerodynamic characteristics of wind turbine blade airfoils at high angles-of-attack

    NARCIS (Netherlands)

    Timmer, W.A.

    2010-01-01

    Airfoil characteristics at deep stall angles were investigated. It appeared that the maximum drag coefficient as a function of the airfoil upwind y/c ordinate at x/c=0.0125 can be approximated by a straight line. The lift-drag ratios in deep stall of a number of airfoils with moderate lower surface

  9. Extraction of the wake induction and angle of attack on rotating wind turbine blades from PIV and CFD results

    Directory of Open Access Journals (Sweden)

    I. Herráez

    2018-01-01

    Full Text Available The analysis of wind turbine aerodynamics requires accurate information about the axial and tangential wake induction as well as the local angle of attack along the blades. In this work we present a new method for obtaining them conveniently from the velocity field. We apply the method to the New Mexico particle image velocimetry (PIV data set and to computational fluid dynamics (CFD simulations of the same turbine. This allows the comparison of experimental and numerical results of the mentioned quantities on a rotating wind turbine. The presented results open up new possibilities for the validation of numerical rotor models.

  10. Study on variable pitch strategy in H-type wind turbine considering effect of small angle of attack

    DEFF Research Database (Denmark)

    Zhao, Zhenzhou; Qian, Siyuan; Shen, Wenzhong

    2017-01-01

    , unlike the traditional VP-technology, focuses mainly on the aerodynamics improvement of the azimuth position with small AoA. The purpose of this novel approach is to widen the band of azimuth positions with high performance and eventually enhance the power efficiency of the overall VAWT. The performance......Variable-pitch (VP) technology is an effective approach to upgrade the aerodynamics of the blade of an H-type vertical-axis wind turbine (VAWT). At present, most of the research efforts are focused on the performance improvement of the azimuth angle owing to the large angle of attack (Ao...... distribution in the swept area of turbine changes from an arched shape of the FP-VAWT into a rectangular shape of the VP-VAWT. At last, an 18.9% growth in power efficiency is achieved. All of the above results confirm that the new VP-technology can effectively improve VAWT performance and also widens...

  11. Model Deformation and Optical Angle of Attack Measurement System in the NASA Ames Unitary Plan Wind Tunnel

    Science.gov (United States)

    Kushner, Laura K.; Drain, Bethany A.; Schairer, Edward T.; Heineck, James T.; Bell, James H.

    2017-01-01

    Both AoA and MDM measurements can be made using an optical system that relies on photogrammetry. Optical measurements are being requested by customers in wind tunnels with increasing frequency due to their non-intrusive nature and recent hardware and software advances that allow measurements to become near real time. The NASA Ames Research Center Unitary Plan Wind Tunnel is currently developing a system based on photogrammetry to measure model deformation and model angle of attack. This paper describes the new system, its development, its use on recent tests and plans to further develop the system.

  12. Nose micro-blowing for asymmetric vortices control on blunt-nose slender body at high angle of attack

    Directory of Open Access Journals (Sweden)

    Lei Wang

    2017-11-01

    Full Text Available The asymmetric vortices over blunt-nose slender body at high angles of attack result in random side force. In this paper, a nose micro-blowing technology is used to control the asymmetric flow. Pressure measurement and particle image velocimetry (PIV experiments are conducted in a low-speed wind tunnel to research effects of jet flow rate on asymmetric vortices over blunt-nose slender body. The angle of attack of the model is fixed at 50° and the Reynolds number for the experiments is 1.6×10 5 based on diameter of aftbody. A blow hole (5 mm in diameter on the nose is processed at circumferential angle θb= 90° and meridian angle γb= 20° with jet momentum ratio Cμ ranging from 5.30×10-7 to 1.19×10−4. Tests are made under two kinds of perturbations. One is called single perturbation with only blow hole and the other is called combined perturbation consists of blow hole and additional granules set on nose. The results show that whether the model has the single perturbation or the combined one, the sectional side force of x/D = 3 varies in the same direction with the increasement of Cμ and remains stable when Cμ is greater than 3.29×10−6. But the stable force values are different according to various perturbations. The fact proves that the size and direction of the side force of blunt-nose slender body can be controlled by the nose micro-blowing.

  13. Vortex-induced vibrations of a DU96-W-180 airfoil at 90° angle of attack

    DEFF Research Database (Denmark)

    Skrzypinski, Witold Robert; Gaunaa, Mac; Sørensen, Niels N.

    2014-01-01

    This work presents an analysis of vortex-induced vibrations of a DU96-W-180 airfoil in deep stall at a 90 degrees angle of attack, based on 2D and 3D Reynolds Averaged Navier Stokes and 3D Detached Eddy Simulation unsteady Computational Fluid Dynamics computations with non-moving, prescribed motion...... and elastically mounted airfoil suspensions. Stationary vortex-shedding frequencies computed in 2D and 3D Computational Fluid Dynamics differed. In the prescribed motion computations, the airfoil oscillated in the direction of the chord line. Negative aerodynamic damping, found in both 2D and 3D Computational...... Fluid Dynamics computations with moving airfoil, showed in the vicinity of the stationary vortex-shedding frequency computed by 2D Computational Fluid Dynamics. A shorter time series was sufficient to verify the sign of the aerodynamic damping in the case of the elastic computations than the prescribed...

  14. Experimental investigation of the effect of a passive porous coating on a hypersonic boundary layer stability on a sharp cone at an angle of attack

    Science.gov (United States)

    Lukashevich, S. V.; Morozov, S. O.; Shiplyuk, A. N.

    2018-03-01

    Experimental investigations are performed to determine the effect of the passive porous coating on the stability of the hypersonic boundary layer on the cone at small angles of attack. Measurements of the pressure disturbances on the cone surface showed that, the increase of the angle of attack leads to decrease of the second-mode amplitude, when the smooth cone side is the windward side. On the leeward side the amplitude of the disturbances increase with the angle of attack until the boundary layer is laminar. It was found that the ultrasonically absorptive coating leads to the energy decrease of the second-mode disturbances on both leeward and windward side of the sharp cone.

  15. Calculation of the flow field including boundary layer effects for supersonic mixed compression inlets at angles of attack

    Science.gov (United States)

    Vadyak, J.; Hoffman, J. D.

    1982-01-01

    The flow field in supersonic mixed compression aircraft inlets at angle of attack is calculated. A zonal modeling technique is employed to obtain the solution which divides the flow field into different computational regions. The computational regions consist of a supersonic core flow, boundary layer flows adjacent to both the forebody/centerbody and cowl contours, and flow in the shock wave boundary layer interaction regions. The zonal modeling analysis is described and some computational results are presented. The governing equations for the supersonic core flow form a hyperbolic system of partial differential equations. The equations for the characteristic surfaces and the compatibility equations applicable along these surfaces are derived. The characteristic surfaces are the stream surfaces, which are surfaces composed of streamlines, and the wave surfaces, which are surfaces tangent to a Mach conoid. The compatibility equations are expressed as directional derivatives along streamlines and bicharacteristics, which are the lines of tangency between a wave surface and a Mach conoid.

  16. Vortex flow structures and interactions for the optimum thrust efficiency of a heaving airfoil at different mean angles of attack

    Energy Technology Data Exchange (ETDEWEB)

    Martín-Alcántara, A.; Fernandez-Feria, R. [Universidad de Málaga, Andalucía Tech, E. T. S. Ingeniería Industrial, Dr Ortiz Ramos s/n, 29071 Málaga (Spain); Sanmiguel-Rojas, E. [Área de Mecánica de Fluidos, Universidad de Jaén, Campus de las Lagunillas, 23071 Jaén (Spain)

    2015-07-15

    The thrust efficiency of a two-dimensional heaving airfoil is studied computationally for a low Reynolds number using a vortex force decomposition. The auxiliary potentials that separate the total vortex force into lift and drag (or thrust) are obtained analytically by using an elliptic airfoil. With these auxiliary potentials, the added-mass components of the lift and drag (or thrust) coefficients are also obtained analytically for any heaving motion of the airfoil and for any value of the mean angle of attack α. The contributions of the leading- and trailing-edge vortices to the thrust during their down- and up-stroke evolutions are computed quantitatively with this formulation for different dimensionless frequencies and heave amplitudes (St{sub c} and St{sub a}) and for several values of α. Very different types of flows, periodic, quasi-periodic, and chaotic described as St{sub c}, St{sub a}, and α, are varied. The optimum values of these parameters for maximum thrust efficiency are obtained and explained in terms of the interactions between the vortices and the forces exerted by them on the airfoil. As in previous numerical and experimental studies on flapping flight at low Reynolds numbers, the optimum thrust efficiency is reached for intermediate frequencies (St{sub c} slightly smaller than one) and a heave amplitude corresponding to an advance ratio close to unity. The optimal mean angle of attack found is zero. The corresponding flow is periodic, but it becomes chaotic and with smaller average thrust efficiency as |α| becomes slightly different from zero.

  17. Computation of supersonic laminar viscous flow past a pointed cone at angle of attack in spinning and coning motion

    Science.gov (United States)

    Agarwal, R.; Rakich, J. V.

    1978-01-01

    Computational results obtained with a parabolic Navier-Stokes marching code are presented for supersonic viscous flow past a pointed cone at angle of attack undergoing a combined spinning and coning motion. The code takes into account the asymmetries in the flow field resulting from the motion and computes the asymmetric shock shape, crossflow and streamwise shear, heat transfer, crossflow separation and vortex structure. The side force and moment are also computed. Reasonably good agreement is obtained with the side force measurements of Schiff and Tobak. Comparison is also made with the only available numerical inviscid analysis. It is found that the asymmetric pressure loads due to coning motion are much larger than all other viscous forces due to spin and coning, making viscous forces negligible in the combined motion.

  18. Computation of hypersonic laminar viscous flow past spinning sharp and blunt cones at high angle of attack

    Science.gov (United States)

    Agarwal, R.; Rakich, J. V.

    1978-01-01

    Computational results, obtained with a parabolic Navier-Stokes marching code, are presented for hypersonic viscous flow past spinning sharp and blunt cones at angle of attack. The code takes into account the asymmetries in the flow field resulting from spinning motion and computes the asymmetric shock shape, crossflow and streamwise shear, heat transfer, crossflow separation, and vortex structure. The Magnus force and moments are also computed. Comparisons are made with other theoretical analyses based on boundary-layer and boundary-region equations, and an anomaly is discovered in the displacement thickness contribution to the Magnus force when compared with boundary-layer results. In addition, a new criterion for defining crossflow separation behind spinning bodies is introduced which generalizes the Moore-Rott-Sears criterion for two-dimensional unsteady separation. A condition which characterizes the onset of separation in the flow field is defined.

  19. AERODYNAMIC CHARACTERISTICS OF “FAN-IN-FIN” SYSTEM IN CONDITION OF FLOWING UNDER ZERO ATTACK ANGLE

    Directory of Open Access Journals (Sweden)

    2016-01-01

    Full Text Available Fan-in-fin system can be used as single-rotor helicopter fenestrons propulsion system of low-speed airplanes and dirigibles as well as vehicles with remote control.The article suggests way to continue the author’s research in the field of fan-in-fin system aerodynamics.It also offers a method of aerodynamic characteristics of “fan-in-fin” (fenestron system with cylindrical diffuser of limited length in flow regime under zero angle of attack calculation. The article gives some formula to calculate the flow velocity through the disk area which decrease with the increase of the defusser and air speed.Correlation between fan thrust power and ring thrust on these regimes and momentum drag are found. Momentum drag is high enough, this fact leads to back deviation of total aerodynamic force system. This angle increases with increase of the diffuser length and at medium speed it can reach 30°.Certainty of suggested algorithms is proved by comparison with experiments for helicopter fenestron and un- manned air vehicle by tests in wind tunnel of MAI.

  20. A New Acute Attack of Angle Closure Glaucoma Animal Model with Healon 5

    Directory of Open Access Journals (Sweden)

    Silvania Y. F. Lau

    2011-05-01

    Full Text Available Acute angle closure glaucoma (AACG is an ocular emergency and sight -threatening disease in which the intraocular ocular pressure (IOP rises suddenly due to blockage of aqueous humor outflow. It can cause permanent loss in visual acuity and visual field. In animal study, the well-established model to study AACG is by fluid infusion and by adjusting the bottle level, a high IOP can be induced in a few seconds. However, there is no blockage of aqueous outflow and the pressure rise is unrealistically fast. To mimic human AACG, we suggest to use Healon 5, an ophthalmic viscosurgical device, which is injected intracamerally to block the aqueous outflow. The IOP is allowed to build up naturally. We found that, with this technique, the IOP elevated at a rate of 0.57 mmHg/min before it hit 40 mmHg, which is considered as AACG in human. The maximum IOP registered was above 70 mmHg. Thinning of retinal nerve fiber layer (RNFL and neural cells lost were seen. Visual function evaluated by ERG showed reduction in a-wave, b-wave, photopic negative response (PhNR and oscillatory potentials (OPs activities. In conclusion, Healon 5 is effective in inducing acute transient rise in IOP which mimics human AACG.

  1. Wind-Tunnel Investigation of the Low-Speed Static Stability and Control Characteristics of a Model of the Bell MX-776 (RASCAL) in Combined Angle of Attack and Sideslip

    Science.gov (United States)

    Letko, William

    1949-01-01

    An investigation has been made in the Langley stability tunnel to determine the low-speed static stability and control characteristics of a model of the Bell MX-776. The results show the model to be longitudinally unstable in the angle-of-attack range around zero angle of attack and to become stable at moderate angles of attack. The results of the present investigation agree reasonably well with results obtained in other facilities at low speed. The present pitching-moment results at low Mach numbers also agree reasonably well with unpublished results of tests of the model at supersonic Mach numbers (up to Mach number 1.86). Unpublished results at moderate and high subsonic speeds, however, indicate considerably greater instability at low angles of attack than is indicated by low-speed results. The results of the present tests also showed that the pitching-moment coefficients for angles of attack up to 12deg remained fairly constant with sideslip angle up to 12deg. The elevators tested produced relatively large pitching moments at zero angle of attack but, as the angle of attack was increased, the elevator effectiveness decreased. The rate of decrease of elevator effectiveness with angle of attack was less for 8deg than for 20deg elevator deflection. Therefore although 8deg deflection caused an appreciable change in longitudinal trim angle and trim lift coefficient a deflection of 20deg caused only a small additional increase in trim angle and trim lift coefficient.

  2. 1.5 μm lidar anemometer for true air speed, angle of sideslip, and angle of attack measurements on-board Piaggio P180 aircraft

    International Nuclear Information System (INIS)

    Augere, B; Besson, B; Fleury, D; Goular, D; Planchat, C; Valla, M

    2016-01-01

    Lidar (light detection and ranging) is a well-established measurement method for the prediction of atmospheric motions through velocity measurements. Recent advances in 1.5 μm Lidars show that the technology is mature, offers great ease of use, and is reliable and compact. A 1.5 μm airborne Lidar appears to be a good candidate for airborne in-flight measurement systems. It allows measurements remotely, outside aircraft aerodynamic disturbance, and absolute air speed (no need for calibration) with great precision in all aircraft flight domains. In the framework of the EU AIM2 project, the ONERA task has consisted of developing and testing a 1.5 μm anemometer sensor for in-flight airspeed measurements. The objective of this work is to demonstrate that the 1.5 μm Lidar sensor can increase the quality of the data acquisition procedure for aircraft flight test certification. This article presents the 1.5 μm anemometer sensor dedicated to in-flight airspeed measurements and describes the flight tests performed successfully on-board the Piaggio P180 aircraft. Lidar air data have been graphically compared to the air data provided by the aircraft flight test instrumentation (FTI) in the reference frame of the Lidar sensor head. Very good agreement of true air speed (TAS) by a fraction of ms −1 , angle of sideslip (AOS), and angle of attack (AOA) by a fraction of degree were observed. (special issue article)

  3. Development of a method of analysis and computer program for calculating the inviscid flow about the windward surfaces of space shuttle configurations at large angles of attack

    Science.gov (United States)

    Maslen, S. H.

    1974-01-01

    A general method developed for the analysis of inviscid hypersonic shock layers is discussed for application to the case of the shuttle vehicle at high (65 deg) angle of attack. The associated extensive subsonic flow region caused convergence difficulties whose resolution is discussed. It is required that the solution be smoother than anticipated.

  4. Numerical Simulation of Heat Transfer and Chemistry in the Wake behind a Hypersonic Slender Body at Angle of Attack

    Directory of Open Access Journals (Sweden)

    Matthew J. Satchell

    2018-03-01

    Full Text Available The effect of thermal and chemical boundary conditions on the structure and chemical composition of the wake behind a 3D Mach 7 sphere-cone at an angle of attack of 5 degrees and an altitude of roughly 30,000 m is explored. A special emphasis is placed on determining the number density of chemical species which might lead to detection via the electromagnetic spectrum. The use of non-ablating cold-wall, adiabatic, and radiative equilibrium wall boundary conditions are used to simulate extremes in potential thermal protection system designs. Non-ablating, as well as an ablating boundary condition using the “steady-state ablation” assumption to compute a surface energy balance on the wall are used in order to determine the impacts of ablation on wake composition. On-body thermal boundary conditions downstream of an ablating nose are found to significantly affect wake temperature and composition, while the role of catalysis is found to change the composition only marginally except at very high temperatures on the cone’s surface for the flow regime considered. Ablation is found to drive the extensive production of detectable species otherwise unrelated to ablation, whereas if ablation is not present at all, air-species which would otherwise produce detectable spectra are minimal. Studies of afterbody cooling techniques, as well as shape, are recommended for further analysis.

  5. PIV-based estimation of unsteady loads on a flat plate at high angle of attack using momentum equation approaches

    Science.gov (United States)

    Guissart, A.; Bernal, L. P.; Dimitriadis, G.; Terrapon, V. E.

    2017-05-01

    This work presents, compares and discusses results obtained with two indirect methods for the calculation of aerodynamic forces and pitching moment from 2D Particle Image Velocimetry (PIV) measurements. Both methodologies are based on the formulations of the momentum balance: the integral Navier-Stokes equations and the "flux equation" proposed by Noca et al. (J Fluids Struct 13(5):551-578, 1999), which has been extended to the computation of moments. The indirect methods are applied to spatio-temporal data for different separated flows around a plate with a 16:1 chord-to-thickness ratio. Experimental data are obtained in a water channel for both a plate undergoing a large amplitude imposed pitching motion and a static plate at high angle of attack. In addition to PIV data, direct measurements of aerodynamic loads are carried out to assess the quality of the indirect calculations. It is found that indirect methods are able to compute the mean and the temporal evolution of the loads for two-dimensional flows with a reasonable accuracy. Nonetheless, both methodologies are noise sensitive, and the parameters impacting the computation should thus be chosen carefully. It is also shown that results can be improved through the use of dynamic mode decomposition (DMD) as a pre-processing step.

  6. Aerodynamic coefficients of plain and helically filleted twin circular cylinders for varying wind angles of attack

    DEFF Research Database (Denmark)

    Acampora, Antonio; Georgakis, Christos T.

    2013-01-01

    vary from those estimated through use of aerodynamic coefficients of single circular cylinders, as reported in literature. To address this issue, wind tunnel tests were performed on a 1:2.3 scale section model of the Øresund Bridge cables, with and without the presence of helical fillets. In this paper...

  7. Validation of aerodynamic parameters at high angles of attack for RAE high incidence research models

    Science.gov (United States)

    Ross, A. Jean; Edwards, Geraldine F.; Klein, Vladislav; Batterson, James G.

    1987-01-01

    Two series of free-flight tests have been conducted for combat aircraft configuration research models in order to investigate flight behavior near departure conditions as well as to obtain response data from which aerodynamic characteristics can be derived. The structure of the mathematical model and values for the mathematical derivatives have been obtained through an analysis of the first series, using stepwise regression. The results thus obtained are the bases of the design of active control laws. Flight test results for a novel configuration are compared with predicted responses.

  8. Measurements of Crossflow Instability Modes for HIFiRE 5 at Angle of Attack

    Science.gov (United States)

    2017-11-15

    As Re increases, more streaks transition farther forward, and the maximum heat flux levels also increase. This is an expected trend as the boundary...that the traveling crossflow instability evolves in a similar fashion over much of the streamwise extent of the elliptic cone. Having the sensors...amplitudes have grown larger than the noise floor. Several important features and trends are observed. The value of Rex for which significant amplitude

  9. Computational Fluid Dynamics Investigation of Vortex Breakdown for a Delta Wing at High Angle of Attack

    Science.gov (United States)

    2003-03-01

    features dual 2.3 GHz Pentium processors, 2,048 MB of RAM and over 120 GB of disk space. They are connected to a 16-node Beowulf processing cluster (also...Computing was also performed on a 64- 2-6 node Beowulf cluster (known as the Aspen cluster), where each node has two 1.0 GHz processors and 1,024

  10. Experimental Flight Characterization of Spin Stabilized Projectiles at High Angle of Attack

    Science.gov (United States)

    2017-08-07

    0°) to very high (~40°) using repeatable yaw induction techniques.21 Parameter estimation algorithms were applied that resulted in residuals on...about 2 m from the spark range entrance. The propelling charge used 1.18 kg of M1 propellant with about 30 gr of black powder for the primer. These...photography (fixed and flight follower using a rotating mirror), radar, yaw cards, and gun pressure gauges to establish the charge , verify structural

  11. Parametric approximation of airfoil aerodynamic coefficients at high angles of attack

    DEFF Research Database (Denmark)

    Skrzypinski, Witold Robert; Zahle, Frederik; Bak, Christian

    2014-01-01

    , and the third method, also utilizing trigonometric functions, was developed with the scope on stall-regulated turbines. The method of the even sine and cosine functions was further developed in the present work by using two independent harmonic approximations in the positive and negative α regions...

  12. Computation of supersonic viscous flows over ogive-cylinders at angle of attack

    Science.gov (United States)

    Rakich, J. V.; Vigneron, Y. C.; Agarwal, R.

    1979-01-01

    The parabolic Navier-Stokes (PNS) marching finite-difference method is applied to 3-D viscous flow over pointed ogive-cylinders, and to turbulent flow over a cone. Ogive computations were performed using the new technique recently reported by Vigneron, Rakich, and Tannehill. Comparison is made with experiment and inviscid computations. The present results show that this method, which neglects part of the pressure gradient in the x-momentum equation, is nevertheless valid for flows with a strong favorable pressure gradient. In addition, turbulent separated flow over a cone has been computed using the older PNS code due to Lubard and Helliwell. It is found that one must freeze the turbulent eddy-viscosity model upstream of 3-D separation to get agreement with experiment.

  13. Analysis of Windward Side Hypersonic Boundary Layer Transition on Blunted Cones at Angle of Attack

    Science.gov (United States)

    2017-01-09

    in preparation for an upcoming experimental series . The stability analyses are able to capture the experimental trends seen in previous experiments...Given the relatively short planned run times , the wall temperature has been assumed to be roughly ambient (Tw = 300K) and isothermal as the model is...original Stetson2 experimental series . At the time of writing, the experiment is planned for late November 2016. Bluntness Nose Radius Total Length % (mm

  14. Uncertainty towards the use of the angle-of-attack corrections for eddy-covariance data processing in French ecosystems

    Science.gov (United States)

    Moreaux, Virginie; Delpierre, Nicolas; Dufrêne, Eric; Joffre, Richard; Klumpp, Katja; Loustau, Denis; Berveiller, Daniel; Darsonville, Olivier; Limousin, Jean-Marc; Ourcival, Jean-Marc; Piquemal, Karim; Longdoz, Bernard

    2017-04-01

    The production/absorption of the long lived greenhouse gas (GHG) and the albedo and evapotranspiration fluctuations in forests, grasslands and croplands are responsible of atmospheric radiative forcing but the quantification of these forcings remains uncertain. The CESEC program aims to quantify the impact of climatic drifts or anthropogenic and meteorological events on the ecosystem-atmosphere exchanges of French sites by analysing the long series (at least 9 years between 2003 and 2015) of eddy covariance (EC) fluxes. One part of the CESEC project is to repost-processed homogeneously the raw EC data across the sites and the years to try to reduce the influence of the methodology and experimental design on the temporal and spatial variability. These new processed data are put together with the corresponding climatic and edaphic data and with the carbon stock inventory. A number of French experimental sites have initially used a sonic anemometer from the GILL company, such as the GILL-R3 or the GILL R3-50, coupled with a GHG analyzer to perform EC measurements and deduce GHG exchanges from different ecosystems. Within the data processing procedure of eddy flux measurements, a recent type of correction has raised among the scientific community to account for the angle of attack error due to a distorsion of the flow when the wind approaches these GILL frame-type, resulting in an imperfect sine and cosine response. Nakai and co-authors proposed a correction to compensate for this error, which is expected to improve energy balance closure. No consensus has been clearly made on the application of this correction, but it has mostly been recommanded for recent data processing. The universal flux calculation EddyPro software that we are using in our project, incorporate and recommand this correction. Based on the analysis from two forests ecosystems (FR-Fon and FR-Pue) and a grassland (FR-Lq2) in France, we performed a re-analysis of EC measurements using the corrections

  15. Drag prediction for blades at high angle of attack using CFD

    DEFF Research Database (Denmark)

    Sørensen, Niels N.; Michelsen, J.A.

    2004-01-01

    In the present paper it is first demonstrated that state of the art 3D CFD codes are. capable of predicting the correct dependency of the integrated drag of a flat plate placed perpendicular to the flow. This is in strong contrast to previous 2D investigations of infinite plates, where computations...... are known to severely overpredict drag. We then demonstrate that the computed drag distribution along the plate span deviate from the general expectation of 2D behavior at the central part of the plate, an important finding in connection with the theoretical estimation of drag behavior on wind turbine...... blades. The computations additionally indicate that a tip effect is present that produces increased drag near the end of the plate, which is opposite of the assumptions generally used in drag estimation for blades. Following this several wind turbine blades are analyzed, ranging from older blades...

  16. Optimasi Angle of Attack Untuk Peningkatan Koefisien Lift Pada Airfoil Turbin Angin Sumbu Horisontal

    OpenAIRE

    Pangraldi, Christian; Suprianto, Fandi Dwiputra; Sutrisno, Teng

    2013-01-01

    Wind turbine application as the use of renewable energy sources has been widely used recently as an alternative energy in goal replacing non-renewable energy. This thesis focuses on the optimization of other research conducted lift coefficient of horizontal wind turbine blades. During this optimization systems in wind turbines is still not been developed widely so that the level of efficiency still needs to be researched and developed. This optimization, is expected to improve the efficiency ...

  17. Technical Evaluation Report, Part A - Vortex Flow and High Angle of Attack

    National Research Council Canada - National Science Library

    Luckring, James

    2003-01-01

    ...), sponsored this symposium. Forty-eight papers, organized into nine sessions, addressed computational and experimental studies of vortex flows pertinent to both aircraft and maritime applications...

  18. Surface pressure model for simple delta wings at high angles of attack

    Indian Academy of Sciences (India)

    R. Narasimhan (Krishtel eMaging) 1461 1996 Oct 15 13:05:22

    characteristics. Flight mechanics analysis is primarily concerned with the aerodynamic data composed ... static data are the limiting case of unsteady flow pattern as time tends to infinity (or at least a few times the .... as the qualitative changes in the surface pressure model are independently confirmed by Roos. & Kegelman ...

  19. Surface pressure model for simple delta wings at high angles of attack

    Indian Academy of Sciences (India)

    R. Narasimhan (Krishtel eMaging) 1461 1996 Oct 15 13:05:22

    Understanding this aids in the development of simple model structures in agreement with the changes in the flow behaviour. Second, small amplitude unsteady aerodynamic characteristics are directly related to the static characteristics. Flight mechanics analysis is primarily concerned with the aerodynamic data composed ...

  20. Wing-Alone Aerodynamic Characteristics to High Angles of Attack at Subsonic and Transonic Speeds.

    Science.gov (United States)

    1982-11-01

    measured at each data-taking point using the electronic-output manometers. b. The test section Mach number (M) was computed from: * M = VL( Ptsc )-2/7 1- and...706 lb./ft. RMS) for PW and Ptsc lead to uncertainties in Cp. The observed dispersions in M. probably arise in part from the instrument...measurements of Pt( Ptsc ) and PC(PW) are known, and the uncertainty in model surface pres- *.’: sure owing to Mach number random variability at constant total

  1. BiGlobal linear stability analysis on low-Re flow past an airfoil at high angle of attack

    KAUST Repository

    Zhang, Wei

    2016-04-04

    We perform BiGlobal linear stability analysis on flow past a NACA0012 airfoil at 16° angle of attack and Reynolds number ranging from 400 to 1000. The steady-state two-dimensional base flows are computed using a well-tested finite difference code in combination with the selective frequency damping method. The base flow is characterized by two asymmetric recirculation bubbles downstream of the airfoil whose streamwise extent and the maximum reverse flow velocity increase with the Reynolds number. The stability analysis of the flow past the airfoil is carried out under very small spanwise wavenumber β = 10−4 to approximate the two-dimensional perturbation, and medium and large spanwise wavenumbers (β = 1–8) to account for the three-dimensional perturbation. Numerical results reveal that under small spanwise wavenumber, there are at most two oscillatory unstable modes corresponding to the near wake and far wake instabilities; the growth rate and frequency of the perturbation agree well with the two-dimensional direct numerical simulation results under all Reynolds numbers. For a larger spanwise wavenumber β = 1, there is only one oscillatory unstable mode associated with the wake instability at Re = 400 and 600, while at Re = 800 and 1000 there are two oscillatory unstable modes for the near wake and far wake instabilities, and one stationary unstable mode for the monotonically growing perturbation within the recirculation bubble via the centrifugal instability mechanism. All the unstable modes are weakened or even suppressed as the spanwise wavenumber further increases, among which the stationary mode persists until β = 4.

  2. Experimental investigation of effect of flow attack angle on thermohydraulic performance of air flow in a rectangular channel with discrete V-pattern baffle on the heated plate

    Directory of Open Access Journals (Sweden)

    Raj Kumar

    2016-05-01

    Full Text Available In this work, the effect of angle of attack ( α a of the discrete V-pattern baffle on thermohydraulic performance of rectangular channel has been studied experimentally. The baffle wall was constantly heated and the other three walls of the channel were kept insulated. The experimentations were conducted to collect the data on Nusselt number ( N u b and friction factor ( f b by varying the Reynolds number (Re = 3000–21,000 and angle of attack ( α a from 30° to 70°, for the kept values of relative baffle height ( H b / H = 0 . 50 , relative pitch ratio ( P b / H = 1 . 0 , relative discrete width ( g w / H b = 1 . 5 and relative discrete distance ( D d / L v = 0 . 67 . As compared to the smooth wall, the V-pattern baffle roughened channel enhances the Nusselt number ( N u b and friction factor ( f b by 4.2 and 5.9 times, respectively. The present discrete V-pattern baffle shapes with angle of attack ( α a of 60° equivalent to flow Reynolds number of 3000 yields the greatest thermohydraulic performance. Discrete V-pattern baffle has improved thermal performance as compared to other baffle shapes’ rectangular channel.

  3. Investigation of normal force and moment coefficients for an AUV at nonlinear angle of attack and sideslip range

    Digital Repository Service at National Institute of Oceanography (India)

    Barros, E.A. de; Dantas, J.L.D.; Pascoal, A.M.; Desa, E.S.

    to be no- ticed at the sideslip angle of 15 and reaches its maximum when sideslip reaches 25 . However, the corresponding correction angle never exceeds 2.5 . The total lateral force and yaw moment coefficients are cal- culated summing up algebraically body...

  4. Methods for root effects, tip effects and extending the angle of attack range to {+-} 180 deg., with application to aerodynamics for blades on wind turbines and propellers

    Energy Technology Data Exchange (ETDEWEB)

    Montgomerie, Bjoern

    2004-06-01

    For wind turbine and propeller performance calculations aerodynamic data, valid for several radial stations along the blade, are used. For wind turbines the data must be valid for the 360 degree angle of attack range. The reason is that all kinds of abnormal conditions must be analysed especially during the design of the turbine. Frequently aerodynamic data are available from wind tunnel tests where the angle of attack range is from say -5 to +20 degrees. This report describes a method to extend such data to be valid for {+-} 180 degrees. Previously the extension of data has been very approximate following the whim of the moment with the analyst. Furthermore, the Himmelskamp effect at the root and tip effects are treated in the complete method.

  5. Flight and wind-tunnel calibrations of a flush airdata sensor at high angles of attack and sideslip and at supersonic Mach numbers

    Science.gov (United States)

    Moes, Timothy R.; Whitmore, Stephen A.; Jordan, Frank L., Jr.

    1993-01-01

    A nonintrusive airdata-sensing system was calibrated in flight and wind-tunnel experiments to an angle of attack of 70 deg and to angles of sideslip of +/- 15 deg. Flight-calibration data have also been obtained to Mach 1.2. The sensor, known as the flush airdata sensor, was installed on the nosecap of an F-18 aircraft for flight tests and on a full-scale F-18 forebody for wind-tunnel tests. Flight tests occurred at the NASA Dryden Flight Research Facility, Edwards, California, using the F-18 High Alpha Research Vehicle. Wind-tunnel tests were conducted in the 30- by 60-ft wind tunnel at the NASA LaRC, Hampton, Virginia. The sensor consisted of 23 flush-mounted pressure ports arranged in concentric circles and located within 1.75 in. of the tip of the nosecap. An overdetermined mathematical model was used to relate the pressure measurements to the local airdata quantities. The mathematical model was based on potential flow over a sphere and was empirically adjusted based on flight and wind-tunnel data. For quasi-steady maneuvering, the mathematical model worked well throughout the subsonic, transonic, and low supersonic flight regimes. The model also worked well throughout the angle-of-attack and sideslip regions studied.

  6. Heating and flow-field studies on a straight-wing hypersonic reentry vehicle at angles of attack from 20 to 80 deg with simulation of real-gas trends

    Science.gov (United States)

    Hunt, J. L.

    1973-01-01

    Data are presented from a series of phase-change heat transfer and flow visualization tests at Mach 7.4, 8, and 10.3 in air, Mach 19.5 in nitrogen, Mach 20.3 in helium, and Mach 6 in tetrafluoromethane (CF4) on the windward surface of a straight wing hypersonic reentry configuration for angles of attack from 20 deg to 80 deg. The results indicate that: (1) for hypersonic stream Mach numbers, the flow field over the straight-wing configuration is essentially independent of Mach number, (2) transition Reynolds number decreases with increasing angle of attack, (3) at some critical angle of attack, the wing-shock standoff distance is greatly increased and the stagnation line moves downstream from the wing leading edge, (4) value of the critical angle of attack is very sensitive to the flow shock density ratio or effective gamma, and (5) at angles of attack above the critical value for all gases, the nondimensional level of heat transfer to the wing is higher for the higher shock density ratio flows.

  7. A modification to linearized theory for prediction of pressure loadings on lifting surfaces at high supersonic Mach numbers and large angles of attack

    Science.gov (United States)

    Carlson, H. W.

    1979-01-01

    A new linearized-theory pressure-coefficient formulation was studied. The new formulation is intended to provide more accurate estimates of detailed pressure loadings for improved stability analysis and for analysis of critical structural design conditions. The approach is based on the use of oblique-shock and Prandtl-Meyer expansion relationships for accurate representation of the variation of pressures with surface slopes in two-dimensional flow and linearized-theory perturbation velocities for evaluation of local three-dimensional aerodynamic interference effects. The applicability and limitations of the modification to linearized theory are illustrated through comparisons with experimental pressure distributions for delta wings covering a Mach number range from 1.45 to 4.60 and angles of attack from 0 to 25 degrees.

  8. Simulation model of the F/A-18 high angle-of-attack research vehicle utilized for the design of advanced control laws

    Science.gov (United States)

    Strickland, Mark E.; Bundick, W. Thomas; Messina, Michael D.; Hoffler, Keith D.; Carzoo, Susan W.; Yeager, Jessie C.; Beissner, Fred L., Jr.

    1996-01-01

    The 'f18harv' six degree-of-freedom nonlinear batch simulation used to support research in advanced control laws and flight dynamics issues as part of NASA's High Alpha Technology Program is described in this report. This simulation models an F/A-18 airplane modified to incorporate a multi-axis thrust-vectoring system for augmented pitch and yaw control power and actuated forebody strakes for enhanced aerodynamic yaw control power. The modified configuration is known as the High Alpha Research Vehicle (HARV). The 'f18harv' simulation was an outgrowth of the 'f18bas' simulation which modeled the basic F/A-18 with a preliminary version of a thrust-vectoring system designed for the HARV. The preliminary version consisted of two thrust-vectoring vanes per engine nozzle compared with the three vanes per engine actually employed on the F/A-18 HARV. The modeled flight envelope is extensive in that the aerodynamic database covers an angle-of-attack range of -10 degrees to +90 degrees, sideslip range of -20 degrees to +20 degrees, a Mach Number range between 0.0 and 2.0, and an altitude range between 0 and 60,000 feet.

  9. Use of dynamically scaled models for studies of the high-angle-of-attack behavior of airplanes

    Science.gov (United States)

    Chambers, Joseph R.

    1988-01-01

    Dynamically scaled, free-flying models are used by the National Aeronautics and Space Administration (NASA) to study the stalling and spinning characteristics of civil and military airplane configurations. Such tests have been conducted for many different designs, and it has been possible to correlate the results predicted by the model tests with flight test results obtained in the investigations. The present paper describes four of the dynamic model testing techniques used at the NASA Langley Research Center, including the scaling laws used in the construction of models and in the interpretation of results. Predictions of stall/spin behavior based on model results have generally been very accurate, and the model tests are regarded as an invaluable precursor to full-scale flight tests. However, aerodynamic scale effects between some models and full-scale airplanes due to differences in test values of Reynolds number have resulted in erroneous predictions for a few configurations. A discussion of these effects is provided, together with the approach used to modify the model so that its behavior more closely matches that of the airplane. Finally, two typical applications of the techniques to the X-29A research airplane and several general aviation research airplanes are presented to illustrate the type of information provided by the tests.

  10. Aerodynamic Characteristics of NACA 0012 Airfoil Section at Angles of Attack From 0 deg to 180 deg

    National Research Council Canada - National Science Library

    Critzos, Chris

    1955-01-01

    .... Data were obtained at a Reynolds number of 1.8 x 10(exp 6) with the airfoil surfaces smooth and with roughness applied at the leading and trailing edges and at a Reynolds number of 0.5 x 10(exp 6...

  11. High Angle of Attack Aerodynamics

    Science.gov (United States)

    1979-01-01

    a’incu’ve ensuite pour aux nombreux 6metteurs de colorant, qui 6quipent devenir rapidemont parallble au bord d’attaquo. ce modble (fig.13), ainsi qu’aux...do garde, et a’d4coule tranaversale - ment selon one direction d’abord dvolutive qoi tend ensuite 4 devenir parallble au bord d’ attaque. couche Fig

  12. FLOW FIELD IN SUPERSONIC MIXED-COMPRESSION INLETS AT ANGLE OF ATTACK USING THE THREE DIMENSIONAL METHOD OF CHARACTERISTICS WITH DISCRETE SHOCK WAVE FITTING

    Science.gov (United States)

    Bishop, A. R.

    1994-01-01

    This computer program calculates the flow field in the supersonic portion of a mixed-compression aircraft inlet at non-zero angle of attack. This approach is based on the method of characteristics for steady three-dimensional flow. The results of this program agree with those produced by the two-dimensional method of characteristics when axisymmetric flow fields are calculated. Except in regions of high viscous interaction and boundary layer removal, the results agree well with experimental data obtained for threedimensional flow fields. The flow field in a variety of axisymmetric mixed compression inlets can be calculated using this program. The bow shock wave and the internal shock wave system are calculated using a discrete shock wave fitting procedure. The internal flow field can be calculated either with or without the discrete fitting of the internal shock wave system. The influence of molecular transport can be included in the calculation of the external flow about the forebody and in the calculation of the internal flow when internal shock waves are not discretely fitted. The viscous and thermal diffussion effects are included by treating them as correction terms in the method of characteristics procedure. Dynamic viscosity is represented by Sutherland's law and thermal conductivity is represented as a quadratic function of temperature. The thermodynamic model used is that of a thermally and calorically perfect gas. The program assumes that the cowl lip is contained in a constant plane and that the centerbody contour and cowl contour are smooth and have continuous first partial derivatives. This program cannot calculate subsonic flow, the external flow field if the bow shock wave does not exist entirely around the forebody, or the internal flow field if the bow flow field is injected into the annulus. Input to the program consists of parameters to control execution, to define the geometry, and the vehicle orientation. Output consists of a list of parameters

  13. In vivo Confocal Microscopy of Posner-Schlossman Syndrome: Comparison with herpes simplex keratitis, HLA-B27 anterior uveitis and acute attack of primary angle closure.

    Science.gov (United States)

    Hong, Ying; Wang, Miao; Wu, Lingling

    2017-08-29

    To investigate in vivo confocal microscopy (IVCM) findings in patients with Posner-Schlossman Syndrome (PSS), we compared the IVCM findings from the eyes of patients with: PSS (44 eyes); herpes simplex keratitis (HSK) (45 eyes); HLA-B27 anterior uveitis (B27AU) (45 eyes); and with acute attack of primary angle closure (aPAC) (43 eyes). The central Langerhans cells (LCs) grade at the level of corneal basal epithelial cells of the PSS group (2.33 ± 0.55) was similar to that of the HSK group (2.63 ± 0.67) (χ 2  = -1.435, P = 0.174) but was significantly higher than those of the B27AU group (1.80 ± 0.79) (χ 2  = 2.311, P = 0.023) and the aPAC group (1.75 ± 0.46) (χ 2  = 2.701, P = 0.022). The keratocyte activation grade of the PSS group (1.55 ± 0.76) was similar to that of the HSK group (1.65 ± 0.81) (χ 2  = 1.104, P = 0.675) but was significantly higher than those of the B27AU group (1.00 ± 0.71) (χ 2  = 2.364, P = 0.025) and aPAC group (1.75 ± 0.46) (χ 2  = 2.532, P = 0.027). The LCs and keratocyte activation grades observed by IVCM in patients with PSS were higher than those in patients with B27AU and with aPAC, but they were similar to those in patients with HSK. This implies that PSS might be related to viral infection.

  14. Blocking of Brute Force Attack

    OpenAIRE

    M.Venkata Krishna Reddy

    2012-01-01

    A common threat Web developers face is a password-guessing attack known as a brute-force attack. A brute-force attack is an attempt to discover a password by systematically trying every possible combination of letters, numbers, and symbols until you discover the one correct combination that works. If your Web site requires user authentication, you are a good target for a brute-force attack. An attacker can always discover a password through a brute-force attack, but the downside is that it co...

  15. Automated Discovery of Mimicry Attacks

    National Research Council Canada - National Science Library

    Giffin, Jonathon T; Jha, Somesh; Miller, Barton P

    2006-01-01

    .... These systems are useful only if they detect actual attacks. Previous research developed manually-constructed mimicry and evasion attacks that avoided detection by hiding a malicious series of system calls within a valid sequence allowed by the model...

  16. Structural Learning of Attack Vectors for Generating Mutated XSS Attacks

    Directory of Open Access Journals (Sweden)

    Yi-Hsun Wang

    2010-09-01

    Full Text Available Web applications suffer from cross-site scripting (XSS attacks that resulting from incomplete or incorrect input sanitization. Learning the structure of attack vectors could enrich the variety of manifestations in generated XSS attacks. In this study, we focus on generating more threatening XSS attacks for the state-of-the-art detection approaches that can find potential XSS vulnerabilities in Web applications, and propose a mechanism for structural learning of attack vectors with the aim of generating mutated XSS attacks in a fully automatic way. Mutated XSS attack generation depends on the analysis of attack vectors and the structural learning mechanism. For the kernel of the learning mechanism, we use a Hidden Markov model (HMM as the structure of the attack vector model to capture the implicit manner of the attack vector, and this manner is benefited from the syntax meanings that are labeled by the proposed tokenizing mechanism. Bayes theorem is used to determine the number of hidden states in the model for generalizing the structure model. The paper has the contributions as following: (1 automatically learn the structure of attack vectors from practical data analysis to modeling a structure model of attack vectors, (2 mimic the manners and the elements of attack vectors to extend the ability of testing tool for identifying XSS vulnerabilities, (3 be helpful to verify the flaws of blacklist sanitization procedures of Web applications. We evaluated the proposed mechanism by Burp Intruder with a dataset collected from public XSS archives. The results show that mutated XSS attack generation can identify potential vulnerabilities.

  17. The Timing of Terrorist Attacks

    DEFF Research Database (Denmark)

    Jensen, Thomas

    2016-01-01

    I use a simple optimal stopping model to derive policy relevant insights on the timing of one-shot attacks by small autonomous terrorist units or “lone wolf” individuals. A main insight is that an increase in proactive counterterrorism measures can lead to a short term increase in the number...... of attempted terrorist attacks because it makes it more risky for existing terrorist units to pursue further development of capabilities. This is consistent with the events in London in 2005 where a terrorist attack on 7 July was followed by a similar but unsuccessful attack two weeks later....

  18. Global Mapping of Cyber Attacks

    Science.gov (United States)

    2014-01-01

    Identifying factors behind countries weakness to cyber - attacks is an important step towards addressing these weaknesses at the root level. For...the lowest rates of cyber - attacks . This is surprising given the bad cyber reputation of some African countries such as Nigeria. Our research has many policy implications.

  19. Automated Generation of Attack Trees

    DEFF Research Database (Denmark)

    Vigo, Roberto; Nielson, Flemming; Nielson, Hanne Riis

    2014-01-01

    -prone and impracticable for large systems. Nonetheless, the automated generation of attack trees has only been explored in connection to computer networks and levering rich models, whose analysis typically leads to an exponential blow-up of the state space. We propose a static analysis approach where attack trees...

  20. Long-term outcomes after acute primary angle closure of Caucasian chronic angle closure glaucoma patients.

    Science.gov (United States)

    Fea, Antonio Maria; Dallorto, Laura; Lavia, Carlo; Pignata, Giulia; Rolle, Teresa; Aung, Tin

    2017-07-19

    There is a lack of information about long-term results of chronic angle closure glaucoma following an acute primary angle closure attack in Caucasian patients. The aim of the study was to report morphological and functional long-term data of chronic angle closure eyes following a monolateral primary angle closure attack and to provide a comparison with their fellow eyes. Observational retrospective case series. Fifty-seven consecutive patients (114 eyes) underwent long-term follow-up analysis. Patients underwent ophthalmic assessment more than 5 years since the angle closure attack. Intraocular pressure, best-corrected visual acuity, angle assessment, vertical C/D ratio and standard automated perimetry were the main outcome measures. Comparisons were made between angle closure attack eyes and fellow eyes and between phakic and pseudophakic eyes. Mean follow-up time was 5.86 ± 1.19 years. A significant greater damage in the angle closure eyes compared with fellow eyes in both structural (mean C/D 0.61 ± 0.16; P APAC attack to prevent potential glaucoma damage in both APAC and fellow eye. © 2017 The Authors Clinical & Experimental Ophthalmology published by John Wiley & Sons Australia, Ltd on behalf of Royal Australian and New Zealand College of Ophthalmologists.

  1. Local heat transfer around a wall-mounted cube. Case of the attack angle of 45 deg.; Rippotai tokki mawari no kyokusho netsu dentatsu. Katamukikaku 45 degrees no baai

    Energy Technology Data Exchange (ETDEWEB)

    Nakamura, H.; Igarashi, T.; Tsutsui, T. [National Defense Academy, Kanagawa (Japan)

    1999-11-25

    An experimental study was performed to investigate the local heat transfer around a cube mounted on the wall. The cube lied in the turbulent boundary layer. The flow angle of attack to the cube was 15 degree. The Reynolds number ranged from 4.2 x 10{sup 3} to 3.3 x 10{sup 4}. The surface temperature distributions around time cube were measured with thermocouples tinder the condition of a constant heat flux. The local h eat transfer is very high near the front corner on the top face of the cube. This high heat transfer region extends from the front corner to downstream along both edges. This is caused by the formation of lamb horn vortex. The local heat transfer is also high in time region of horseshoe vortex formed a round the cube. On the wall behind the cube, there is a pair of minimum heat transfer region. The average Nusselt number on each face of the cube is given as a function of Reynolds number. The overall Nusselt number of time cube is expressed by Nu{sub m}=0.43Re{sup 0.58}. (author)

  2. Development of High Angle of Attack Control Laws for an Unstable, Non- Minimum Phase Aircraft Using Variations of the Quantitative Feedback Technique

    Science.gov (United States)

    1991-12-01

    John T. and Timothy H. Cox. A Design Procedure for the Handling Qualities Optimization of the X-29A Aircraft. Technical Report, Edwards AFB, CA: NASA...Institute of Technology, Wright-Patterson AFB, OH, December 1988. 26. Raney , David L. and James G. Batterson. Lateral Stability Analysis for the X-29A...4. Bosworth, John T. and Timothy H. Cox. A Design Procedure for the Handling Qualities Optimization of the X-29A Aircraft. Technical Report, Edwards

  3. Nonlinear Analysis of the Rolling Motion of a Wrap-Around Fin Missile at Angles of Attack from 0 to 90 deg in Incompressible Flow

    Science.gov (United States)

    1977-09-01

    U LI-- 0 **I .4. WIL 0 0094 I--S CO~ 00 OS- OO- OS.. 3CS/0 )~ 10 0WB z z c23 0 0 >U -Qo WfJ cc~4. LJ W 0 8 40 0 (4 LA 0 ’U - cci U -Cl V) zz0 LjJ4J...34,°." • • . S a. •o°I• I, , Figr Ai6 bevdRll Anl essFaeNme at la 4 Anl of Atc fo Ru 38i ’b.oo 36-.30oo 60 1 08.90 146.20 3 2. o 0 29040 326.0...i .% ....’.... ;.. ; 00. St : ......~~* .....*’ ’ , .÷. . """". 10 ’ . 0 0.o .L. . 0.. , i: ... .. U. N 33 ) Figure . .o"eve oll Ag Vs , • , Nube

  4. High Angle-of-Attack Aerodynamics

    Science.gov (United States)

    1982-12-01

    poudre d’hostaflon ou Butres traceurs Idgera rdpandus &Is surface libre), dout l’emloi rests gindralesnt liaiti au courant plan 3-32 - peintures et huiles...rapages sans arrft de la soufflerie [28]J (fig. 7ab, fig.16g); -enduits visqueux (fig. 7cde ), peintures plastiques (fig.5b, 9j), psintures the

  5. Analytical Characterization of Internet Security Attacks

    Science.gov (United States)

    Sellke, Sarah H.

    2010-01-01

    Internet security attacks have drawn significant attention due to their enormously adverse impact. These attacks includes Malware (Viruses, Worms, Trojan Horse), Denial of Service, Packet Sniffer, and Password Attacks. There is an increasing need to provide adequate defense mechanisms against these attacks. My thesis proposal deals with analytical…

  6. Recurrent spontaneous attacks of dizziness.

    Science.gov (United States)

    Lempert, Thomas

    2012-10-01

    This article describes the common causes of recurrent vertigo and dizziness that can be diagnosed largely on the basis of history. Ninety percent of spontaneous recurrent vertigo and dizziness can be explained by six disorders: (1) Ménière disease is characterized by vertigo attacks, lasting 20 minutes to several hours, with concomitant hearing loss, tinnitus, and aural fullness. Aural symptoms become permanent during the course of the disease. (2) Attacks of vestibular migraine may last anywhere from minutes to days. Most patients have a previous history of migraine headaches, and many experience migraine symptoms during the attack. (3) Vertebrobasilar TIAs affect older adults with vascular risk factors. Most attacks last less than 1 hour and are accompanied by other symptoms from the posterior circulation territory. (4) Vestibular paroxysmia is caused by vascular compression of the eighth cranial nerve. It manifests itself with brief attacks of vertigo that recur many times per day, sometimes with concomitant cochlear symptoms. (5) Orthostatic hypotension causes brief episodes of dizziness lasting seconds to a few minutes after standing up and is relieved by sitting or lying down. In older adults, it may be accompanied by supine hypertension. (6) Panic attacks usually last minutes, occur in specific situations, and are accompanied by choking, palpitations, tremor, heat, and anxiety. Less common causes of spontaneous recurrent vertigo and dizziness include perilymph fistula, superior canal dehiscence, autoimmune inner ear disease, otosclerosis, cardiac arrhythmia, and medication side effects. Neurologists need to venture into otolaryngology, internal medicine, and psychiatry to master the differential diagnosis of recurrent dizziness.

  7. Detection of complex cyber attacks

    Science.gov (United States)

    Gregorio-de Souza, Ian; Berk, Vincent H.; Giani, Annarita; Bakos, George; Bates, Marion; Cybenko, George; Madory, Doug

    2006-05-01

    One significant drawback to currently available security products is their inabilty to correlate diverse sensor input. For instance, by only using network intrusion detection data, a root kit installed through a weak username-password combination may go unnoticed. Similarly, an administrator may never make the link between deteriorating response times from the database server and an attacker exfiltrating trusted data, if these facts aren't presented together. Current Security Information Management Systems (SIMS) can collect and represent diverse data but lack sufficient correlation algorithms. By using a Process Query System, we were able to quickly bring together data flowing from many sources, including NIDS, HIDS, server logs, CPU load and memory usage, etc. We constructed PQS models that describe dynamic behavior of complicated attacks and failures, allowing us to detect and differentiate simultaneous sophisticated attacks on a target network. In this paper, we discuss the benefits of implementing such a multistage cyber attack detection system using PQS. We focus on how data from multiple sources can be combined and used to detect and track comprehensive network security events that go unnoticed using conventional tools.

  8. Stochastic Model of TCP SYN Attacks

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2011-08-01

    Full Text Available A great proportion of essential services are moving into internet space making the threat of DoS attacks even more actual. To estimate the real risk of some kind of denial of service (DoS attack in real world is difficult, but mathematical and software models make this task easier. In this paper we overview the ways of implementing DoS attack models and offer a stochastic model of SYN flooding attack. It allows evaluating the potential threat of SYN flooding attacks, taking into account both the legitimate system flow as well as the possible attack power. At the same time we can assess the effect of such parameters as buffer capacity, open connection storage in the buffer or filte­ring efficiency on the success of different SYN flooding attacks. This model can be used for other type of memory depletion denial of service attacks.Article in Lithuanian

  9. Peacetime Use of Computer Network Attack

    National Research Council Canada - National Science Library

    Busby, Daniel

    2000-01-01

    .... PDD-63 alerts the nation to prepare for impending cyber attacks. This paper examines the nature, scale, and likelihood of cyber attacks posited in PDD-63 and finds that the country does not face an imminent "electronic Pearl Harbor...

  10. The Value of Attack-Defence Diagrams

    NARCIS (Netherlands)

    Hermanns, H.; Krämer, Julia; Krčál, Jan; Stoelinga, Mariëlle Ida Antoinette; Piessens, Frank; Viganò, Luca

    Success or failure of attacks on high-security systems, such as hacker attacks on sensitive data, depend on various situational conditions, including the timing and success chances of single attack steps, and concurrent countermeasures of the defender. With the existing state-of-the-art modelling

  11. Automated classification of computer network attacks

    CSIR Research Space (South Africa)

    Van Heerden, R

    2013-11-01

    Full Text Available In this paper we demonstrate how an automated reasoner, HermiT, is used to classify instances of computer network based attacks in conjunction with a network attack ontology. The ontology describes different types of network attacks through classes...

  12. Stochastic Model of TCP SYN Attacks

    OpenAIRE

    Simona Ramanauskaitė; Antanas Čenys

    2011-01-01

    A great proportion of essential services are moving into internet space making the threat of DoS attacks even more actual. To estimate the real risk of some kind of denial of service (DoS) attack in real world is difficult, but mathematical and software models make this task easier. In this paper we overview the ways of implementing DoS attack models and offer a stochastic model of SYN flooding attack. It allows evaluating the potential threat of SYN flooding attacks, taking into account both...

  13. Cavitating flow control through continuous tangential mass injection on a 2D hydrofoil at a small attack angle

    Directory of Open Access Journals (Sweden)

    Timoshevskiy Mikhail V.

    2016-01-01

    Full Text Available We studied cavitating flow over the suction side of a symmetric 2D foil – a scaled-down model of high-pressure hydroturbine guide vanes (GV – in different cavitation regimes at the attack angle of 3°. High-speed imaging was used to analyze spatial patterns and time dynamics of the gas-vapour cavities. A hydroacoustic pressure transducer was employed to register time-spectra of pressure fluctuations nearby the hydrofoil. A PIV technique was applied to measure the velocity fields and its fluctuations. The active flow control was implemented by means of a continuous liquid supply with different flow rates through a slot channel located in the GV surface. It was found that the active mass injection does not influence the primary flow upstream of the slot channel position. For the cavitation-free and cavitation inception cases, the injection was shown to make the turbulent wake past the GV section more intense. However, at the developed cavitation regimes the active flow management made it possible to reduce substantially the amplitude or even totally suppress the periodic cavity length oscillations and pressure pulsations associated with them.

  14. Validation Method of a Telecommunications Blackout Attack

    National Research Council Canada - National Science Library

    Amado, Joao; Nunes, Paulo

    2005-01-01

    This paper presents an evaluation method of telecommunications infrastructure vulnerabilities, allowing the identification of components that can be attacked in order to achieve a communications blackout...

  15. Relationship between the angle of repose and angle of internal ...

    African Journals Online (AJOL)

    Abstract. Click on the link to view the abstract. Keywords: Angle of repose, angle of internal friction, granular materials, triaxial compression machine, moisture content. Tanzania J. Agric. Sc. (1998) Vol.1 No.2, 187-194 ...

  16. Evaluation of Crosstalk Attacks in Access Networks

    DEFF Research Database (Denmark)

    Wagner, Christoph; Eiselt, Michael; Grobe, Klaus

    2016-01-01

    WDM-PON systems regained interest as low-cost solution for metro and access networks. We present a comparative analysis of resilience of wavelength-selective and wavelength-routed architectures against crosstalk attackers. We compare the vulnerability of these architectures against attacks...

  17. Acute primary angle closure attack does not cause an increased cup-to-disc ratio.

    Science.gov (United States)

    Chew, Shenton S L; Vasudevan, Sushil; Patel, Hussain Y; Gurria, Lulu U; Kerr, Nathan M; Gamble, Greg; Crowston, Jonathan G; Danesh-Meyer, Helen V

    2011-02-01

    To determine if an increased cup-to-disc ratio (CDR) and retinal nerve fiber layer (RNFL) loss occur after acute primary angle closure (APAC). Prospective, observational case series. Twenty participants with unilateral APAC provided 20 affected eyes and 20 fellow eyes (controls) for analysis. After initial presentation, participants attended 3 further assessments over a 12-month period (visit 2, within 2 weeks; visit 3, 2-3 months; and visit 4, 6-12 months), in which they underwent the following investigations: Heidelberg Retinal Tomography (Heidelberg Engineering, Dossenheim, Germany), optical coherence tomography of the RNFL and macula, and automated perimetry. Cup-to-disc ratio, optic cup area, neuroretinal rim area, RNFL thickness, macular thickness, and volume. There was no change from visits 2 to 4 in CDR (0.46 ± 0.17 vs. 0.47 ± 0.20; P = 0.94), neuroretinal rim area (1.64 ± 0.55 vs. 1.64 ± 0.57; P = 0.96), or other optic nerve head parameters analyzed in eyes with APAC. The mean overall RNFL thickness decreased from 106.6 ± 17.9 μm to 92.9 ± 18.3 μm between visits 2 and 3 (PAPAC that is treated promptly, although RNFL loss does occur. Copyright © 2011 American Academy of Ophthalmology. Published by Elsevier Inc. All rights reserved.

  18. Use of Attack Graphs in Security Systems

    Directory of Open Access Journals (Sweden)

    Vivek Shandilya

    2014-01-01

    Full Text Available Attack graphs have been used to model the vulnerabilities of the systems and their potential exploits. The successful exploits leading to the partial/total failure of the systems are subject of keen security interest. Considerable effort has been expended in exhaustive modeling, analyses, detection, and mitigation of attacks. One prominent methodology involves constructing attack graphs of the pertinent system for analysis and response strategies. This not only gives the simplified representation of the system, but also allows prioritizing the security properties whose violations are of greater concern, for both detection and repair. We present a survey and critical study of state-of-the-art technologies in attack graph generation and use in security system. Based on our research, we identify the potential, challenges, and direction of the current research in using attack graphs.

  19. Automatic Classification of Attacks on IP Telephony

    Directory of Open Access Journals (Sweden)

    Jakub Safarik

    2013-01-01

    Full Text Available This article proposes an algorithm for automatic analysis of attack data in IP telephony network with a neural network. Data for the analysis is gathered from variable monitoring application running in the network. These monitoring systems are a typical part of nowadays network. Information from them is usually used after attack. It is possible to use an automatic classification of IP telephony attacks for nearly real-time classification and counter attack or mitigation of potential attacks. The classification use proposed neural network, and the article covers design of a neural network and its practical implementation. It contains also methods for neural network learning and data gathering functions from honeypot application.

  20. Scaling of misorientation angle distributions

    DEFF Research Database (Denmark)

    Hughes, D.A.; Chrzan, D.C.; Liu, Q.

    1998-01-01

    The measurement of misorientation angle distributions following different amounts of deformation in cold-rolled aluminum and nickel and compressed stainless steel is reported. The sealing of the dislocation cell boundary misorientation angle distributions is studied. Surprisingly, the distributio...

  1. Spontaneous, late, in-the-bag intraocular lens subluxation in a patient with a previous acute angle-closure glaucoma attack.

    Science.gov (United States)

    Su, Wei-Wen; Chang, Shirley H L

    2004-08-01

    Cataract surgery was performed in a 49-year-old woman 16 months after an acute angle-closure glaucoma attack. Zonular dialysis was observed during surgery, but the intraocular lens (IOL) was implanted in the capsular bag uneventfully. At 4 1/2 months, 1 IOL loop wrapped in the bag herniated into the anterior chamber. The patient had no history of trauma. The IOL loop remained in the anterior chamber for 9 months, until the subluxated IOL spontaneously returned to its original position. Six months later, the IOL again dislocated into the anterior chamber.

  2. Attack Trees for Practical Security Assessment: Ranking of Attack Scenarios with ADTool 2.0

    NARCIS (Netherlands)

    Gadyatskaya, Olga; Jhawar, Ravi; Kordy, P.T.; Lounis, Karim; Mauw, Sjouke; Trujillo-Rasua, Rolando

    2016-01-01

    In this tool demonstration paper we present the ADTool2.0: an open-source software tool for design, manipulation and analysis of attack trees. The tool supports ranking of attack scenarios based on quantitative attributes entered by the user; it is scriptable; and it incorporates attack trees with

  3. Situational awareness of a coordinated cyber attack

    Science.gov (United States)

    Sudit, Moises; Stotz, Adam; Holender, Michael

    2005-03-01

    As technology continues to advance, services and capabilities become computerized, and an ever increasing amount of business is conducted electronically the threat of cyber attacks gets compounded by the complexity of such attacks and the criticality of the information which must be secured. A new age of virtual warfare has dawned in which seconds can differentiate between the protection of vital information and/or services and a malicious attacker attaining their goal. In this paper we present a novel approach in the real-time detection of multistage coordinated cyber attacks and the promising initial testing results we have obtained. We introduce INFERD (INformation Fusion Engine for Real-time Decision-making), an adaptable information fusion engine which performs fusion at levels zero, one, and two to provide real-time situational assessment and its application to the cyber domain in the ECCARS (Event Correlation for Cyber Attack Recognition System) system. The advantages to our approach are fourfold: (1) The complexity of the attacks which we consider, (2) the level of abstraction in which the analyst interacts with the attack scenarios, (3) the speed at which the information fusion is presented and performed, and (4) our disregard for ad-hoc rules or a priori parameters.

  4. The role of sleep in migraine attacks

    Directory of Open Access Journals (Sweden)

    Elaine Inamorato

    1993-11-01

    Full Text Available Migraine attacks may be precipitated by sleep deprivation or excessive sleep and sleep is also associated with relief of migraine attacks. In view of this variable relationship we studied the records of 159 consecutive outpatients of our Headache Unit. In 121 records there was reference to sleep involvement, in 55% by a single form and in 45% by more than one form. When only one form was related, relief was most common (70%. 30% of that group of patients had the migraine attack precipitated by sleep, 24% by deprivation and 6% by sleep excess. When the effects of sleep were multiple, these effects were as expected logically in 65%: «in accordance» group (e.g attack precipitated by sleep deprivation and relieved by sleep onset. In a second group, («conflicting» where the involvement was not logical, there were three different combinations of sleep involvement, possibly due to more than one pathophysiological mechanism.

  5. Detecting Pulsing Denial-of-Service Attacks with Nondeterministic Attack Intervals

    Directory of Open Access Journals (Sweden)

    Xiapu Luo

    2009-01-01

    Full Text Available This paper addresses the important problem of detecting pulsing denial of service (PDoS attacks which send a sequence of attack pulses to reduce TCP throughput. Unlike previous works which focused on a restricted form of attacks, we consider a very broad class of attacks. In particular, our attack model admits any attack interval between two adjacent pulses, whether deterministic or not. It also includes the traditional flooding-based attacks as a limiting case (i.e., zero attack interval. Our main contribution is Vanguard, a new anomaly-based detection scheme for this class of PDoS attacks. The Vanguard detection is based on three traffic anomalies induced by the attacks, and it detects them using a CUSUM algorithm. We have prototyped Vanguard and evaluated it on a testbed. The experiment results show that Vanguard is more effective than the previous methods that are based on other traffic anomalies (after a transformation using wavelet transform, Fourier transform, and autocorrelation and detection algorithms (e.g., dynamic time warping.

  6. Detecting Pulsing Denial-of-Service Attacks with Nondeterministic Attack Intervals

    Science.gov (United States)

    Luo, Xiapu; Chan, Edmond W. W.; Chang, Rocky K. C.

    2009-12-01

    This paper addresses the important problem of detecting pulsing denial of service (PDoS) attacks which send a sequence of attack pulses to reduce TCP throughput. Unlike previous works which focused on a restricted form of attacks, we consider a very broad class of attacks. In particular, our attack model admits any attack interval between two adjacent pulses, whether deterministic or not. It also includes the traditional flooding-based attacks as a limiting case (i.e., zero attack interval). Our main contribution is Vanguard, a new anomaly-based detection scheme for this class of PDoS attacks. The Vanguard detection is based on three traffic anomalies induced by the attacks, and it detects them using a CUSUM algorithm. We have prototyped Vanguard and evaluated it on a testbed. The experiment results show that Vanguard is more effective than the previous methods that are based on other traffic anomalies (after a transformation using wavelet transform, Fourier transform, and autocorrelation) and detection algorithms (e.g., dynamic time warping).

  7. Generalization of the Euler Angles

    Science.gov (United States)

    Bauer, Frank H. (Technical Monitor); Shuster, Malcolm D.; Markley, F. Landis

    2002-01-01

    It is shown that the Euler angles can be generalized to axes other than members of an orthonormal triad. As first shown by Davenport, the three generalized Euler axes, hereafter: Davenport axes, must still satisfy the constraint that the first two and the last two axes be mutually perpendicular if these axes are to define a universal set of attitude parameters. Expressions are given which relate the generalized Euler angles, hereafter: Davenport angles, to the 3-1-3 Euler angles of an associated direction-cosine matrix. The computation of the Davenport angles from the attitude matrix and their kinematic equation are presented. The present work offers a more direct development of the Davenport angles than Davenport's original publication and offers additional results.

  8. On the anatomy of social engineering attacks: A literature-based dissection of successful attacks

    OpenAIRE

    Bullée, Jan Willem Hendrik; Montoya, Lorena; Pieters, W.; Junger, M.; Hartel, P.H.

    2018-01-01

    The aim of this study was to explore the extent to which persuasion principles are used in successful social engineering attacks. Seventy-four scenarios were extracted from 4 books on social engineering (written by social engineers) and analysed. Each scenario was split into attack steps, containing single interactions between offender and target. For each attack step, persuasion principles were identified. The main findings are that (a) persuasion principles are often used in social engineer...

  9. Relationship between the Angle of Repose and Angle of Internal ...

    African Journals Online (AJOL)

    ghum and rice. The angles have a big influence on the design offlow and storage structures of ... the angles of internal friction for the same grains and same moisture contents. The data ob- tained were fed into SAS statistical software for step-wise regression analysis. A model of the ..... tion, Application and Validation of En-.

  10. Predicting Factors of Zone 4 Attack in Volleyball.

    Science.gov (United States)

    Costa, Gustavo C; Castro, Henrique O; Evangelista, Breno F; Malheiros, Laura M; Greco, Pablo J; Ugrinowitsch, Herbert

    2017-06-01

    This study examined 142 volleyball games of the Men's Super League 2014/2015 seasons in Brazil from which we analyzed 24-26 games of each participating team, identifying 5,267 Zone 4 attacks for further analysis. Within these Zone 4 attacks, we analyzed the association between the effect of the attack carried out and the separate effects of serve reception, tempo and type of attack. We found that the reception, tempo of attack, second tempo of attack, and power of diagonal attack were predictors of the attack effect in Zone 4. Moreover, placed attacks showed a tendency to not yield a score. In conclusion, winning points in high-level men's volleyball requires excellent receptions, a fast attack tempo and powerfully executed of attacks.

  11. Pathologic features of fatal shark attacks.

    Science.gov (United States)

    Byard, R W; Gilbert, J D; Brown, K

    2000-09-01

    To examine the pattern of injuries in cases of fatal shark attack in South Australian waters, the authors examined the files of their institution for all cases of shark attack in which full autopsies had been performed over the past 25 years, from 1974 to 1998. Of the seven deaths attributed to shark attack during this period, full autopsies were performed in only two cases. In the remaining five cases, bodies either had not been found or were incomplete. Case 1 was a 27-year-old male surfer who had been attacked by a shark. At autopsy, the main areas of injury involved the right thigh, which displayed characteristic teeth marks, extensive soft tissue damage, and incision of the femoral artery. There were also incised wounds of the right wrist. Bony injury was minimal, and no shark teeth were recovered. Case 2 was a 26-year-old male diver who had been attacked by a shark. At autopsy, the main areas of injury involved the left thigh and lower leg, which displayed characteristic teeth marks, extensive soft tissue damage, and incised wounds of the femoral artery and vein. There was also soft tissue trauma to the left wrist, with transection of the radial artery and vein. Bony injury was minimal, and no shark teeth were recovered. In both cases, death resulted from exsanguination following a similar pattern of soft tissue and vascular damage to a leg and arm. This type of injury is in keeping with predator attack from underneath or behind, with the most severe injuries involving one leg. Less severe injuries to the arms may have occurred during the ensuing struggle. Reconstruction of the damaged limb in case 2 by sewing together skin, soft tissue, and muscle bundles not only revealed that no soft tissue was missing but also gave a clearer picture of the pattern of teeth marks, direction of the attack, and species of predator.

  12. Measurement of the angle gamma

    International Nuclear Information System (INIS)

    Aleksan, R.; Sphicas, P.; Massachusetts Inst. of Tech., Cambridge, MA

    1993-12-01

    The angle γ as defined in the Wolfenstein approximation is not completely out of reach of current or proposed dedicated B experiments. This work represents but a first step in the direction of extracting the third angle of the unitarity triangle by study the feasibility of using new decay modes in a hadronic machine. (A.B.). 11 refs., 1 fig., 7 tabs

  13. Exploiting Hardware Vulnerabilities to Attack Embedded System Devices: a Survey of Potent Microarchitectural Attacks

    Directory of Open Access Journals (Sweden)

    Apostolos P. Fournaris

    2017-07-01

    Full Text Available Cyber-Physical system devices nowadays constitute a mixture of Information Technology (IT and Operational Technology (OT systems that are meant to operate harmonically under a security critical framework. As security IT countermeasures are gradually been installed in many embedded system nodes, thus securing them from many well-know cyber attacks there is a lurking danger that is still overlooked. Apart from the software vulnerabilities that typical malicious programs use, there are some very interesting hardware vulnerabilities that can be exploited in order to mount devastating software or hardware attacks (typically undetected by software countermeasures capable of fully compromising any embedded system device. Real-time microarchitecture attacks such as the cache side-channel attacks are such case but also the newly discovered Rowhammer fault injection attack that can be mounted even remotely to gain full access to a device DRAM (Dynamic Random Access Memory. Under the light of the above dangers that are focused on the device hardware structure, in this paper, an overview of this attack field is provided including attacks, threat directives and countermeasures. The goal of this paper is not to exhaustively overview attacks and countermeasures but rather to survey the various, possible, existing attack directions and highlight the security risks that they can pose to security critical embedded systems as well as indicate their strength on compromising the Quality of Service (QoS such systems are designed to provide.

  14. Nucleation of small angle boundaries

    CSIR Research Space (South Africa)

    Nabarro, FRN

    1996-12-01

    Full Text Available The internal stresses induced by the strain gradients in an array of lattice cells delineated by low-angle dislocation boundaries are partially relieved by the creation of new low-angle boundaries. This is shown to be a first-order transition...

  15. Overview of DOS attacks on wireless sensor networks and experimental results for simulation of interference attacks

    Directory of Open Access Journals (Sweden)

    Željko Gavrić

    2018-01-01

    Full Text Available Wireless sensor networks are now used in various fields. The information transmitted in the wireless sensor networks is very sensitive, so the security issue is very important. DOS (denial of service attacks are a fundamental threat to the functioning of wireless sensor networks. This paper describes some of the most common DOS attacks and potential methods of protection against them. The case study shows one of the most frequent attacks on wireless sensor networks – the interference attack. In the introduction of this paper authors assume that the attack interference can cause significant obstruction of wireless sensor networks. This assumption has been proved in the case study through simulation scenario and simulation results.

  16. On the anatomy of social engineering attacks : A literature-based dissection of successful attacks

    NARCIS (Netherlands)

    Bullée, Jan Willem Hendrik; Montoya, Lorena; Pieters, W.; Junger, M.; Hartel, P.H.

    2018-01-01

    The aim of this study was to explore the extent to which persuasion principles are used in successful social engineering attacks. Seventy-four scenarios were extracted from 4 books on social engineering (written by social engineers) and analysed. Each scenario was split into attack steps,

  17. On the anatomy of social engineering attacks : A literature-based dissection of successful attacks

    NARCIS (Netherlands)

    Bullee, Jan-Willem; Montoya, L.; Pieters, Wolter; Junger, Marianne; Hartel, Pieter H.

    The aim of this studywas to explore the extent towhich persuasion principles are used in successful social engineering attacks. Seventy-four scenarioswere extracted from 4 books on social engineering (written by social engineers) and analysed. Each scenariowas split into attack steps, containing

  18. Know the Warning Signs of a Heart Attack

    Science.gov (United States)

    ... No. 22 Know the Warning Signs of a Heart Attack What is a heart attack? Aheart attack happens when the blood vessels that ... hurting your heart muscle. Another name for a heart attack is myocardial infarction, or MI. If you have ...

  19. Forensics Investigation of Web Application Security Attacks

    OpenAIRE

    Amor Lazzez; Thabet Slimani

    2015-01-01

    Nowadays, web applications are popular targets for security attackers. Using specific security mechanisms, we can prevent or detect a security attack on a web application, but we cannot find out the criminal who has carried out the security attack. Being unable to trace back an attack, encourages hackers to launch new attacks on the same system. Web application forensics aims to trace back and attribute a web application security attack to its originator. This may significantly reduce the sec...

  20. Shark attack: review of 86 consecutive cases.

    Science.gov (United States)

    Woolgar, J D; Cliff, G; Nair, R; Hafez, H; Robbs, J V

    2001-05-01

    On average there are approximately 50 confirmed shark attacks worldwide annually. Despite their rarity, such incidents often generate much public and media attention. The injuries of 86 consecutive victims of shark attack were reviewed from 1980 to 1999. Clinical data retrieved from the South African Shark Attack Files, maintained by the Natal Sharks Board, were retrospectively analyzed to determine the nature, treatment, and outcome of injuries. The majority of victims (n = 68 [81%]) had relatively minor injuries that required simple primary suture. Those patients (n = 16 [19%]) with more extensive limb lacerations longer than 20 cm or with soft-tissue loss of more than one myofascial compartment were associated with higher morbidity and limb loss. In 8 of the 10 fatalities, death occurred as a result of exsanguinating hemorrhage from a limb vascular injury. Victims of shark attack usually sustain only minor injuries. In more serious cases, particularly if associated with a major vascular injury, hemorrhage control and early resuscitation are of utmost importance during the initial management if these patients are to survive.

  1. Modeling of Aggregate Attacks on Complex Networks

    Directory of Open Access Journals (Sweden)

    F. Galindo

    2010-09-01

    Full Text Available An order factor in combinations of random and targeted attacks on modern scale free network model has been explored. Protection concepts based on timely restructuring of topologies have been discussed. Vulnerability parameter defined by investment value has been introduced, and protection financing strategies depending on node connectivity has been analyzed.

  2. Recovery of human remains after shark attack.

    Science.gov (United States)

    Byard, Roger W; James, Ross A; Heath, Karen J

    2006-09-01

    Two cases of fatal shark attack are reported where the only tissues recovered were fragments of lung. Case 1: An 18-year-old male who was in the sea behind a boat was observed by friends to be taken by a great white shark (Carcharodon carcharias). The shark dragged him under the water and then, with a second shark, dismembered the body. Witnesses noted a large amount of blood and unrecognizable body parts coming to the surface. The only tissues recovered despite an intensive beach and sea search were 2 fragments of lung. Case 2: A 19-year-old male was attacked by a great white shark while diving. A witness saw the shark swim away with the victim's body in its mouth. Again, despite intensive beach and sea searches, the only tissue recovered was a single piece of lung, along with pieces of wetsuit and diving equipment. These cases indicate that the only tissue to escape being consumed or lost in fatal shark attacks, where there is a significant attack with dismemberment and disruption of the integrity of the body, may be lung. The buoyancy of aerated pulmonary tissue ensures that it rises quickly to the surface, where it may be recovered by searchers soon after the attack. Aeration of the lung would be in keeping with death from trauma rather than from drowning and may be a useful marker in unwitnessed deaths to separate ante- from postmortem injury, using only relatively small amounts of tissues. Early organ recovery enhances the identification of human tissues as the extent of morphologic alterations by putrefactive processes and sea scavengers will have been minimized. DNA testing is also possible on such recovered fragments, enabling confirmation of the identity of the victim.

  3. Error and attack vulnerability of temporal networks

    Science.gov (United States)

    Trajanovski, S.; Scellato, S.; Leontiadis, I.

    2012-06-01

    The study of real-world communication systems via complex network models has greatly expanded our understanding on how information flows, even in completely decentralized architectures such as mobile wireless networks. Nonetheless, static network models cannot capture the time-varying aspects and, therefore, various temporal metrics have been introduced. In this paper, we investigate the robustness of time-varying networks under various failures and intelligent attacks. We adopt a methodology to evaluate the impact of such events on the network connectivity by employing temporal metrics in order to select and remove nodes based on how critical they are considered for the network. We also define the temporal robustness range, a new metric that quantifies the disruption caused by an attack strategy to a given temporal network. Our results show that in real-world networks, where some nodes are more dominant than others, temporal connectivity is significantly more affected by intelligent attacks than by random failures. Moreover, different intelligent attack strategies have a similar effect on the robustness: even small subsets of highly connected nodes act as a bottleneck in the temporal information flow, becoming critical weak points of the entire system. Additionally, the same nodes are the most important across a range of different importance metrics, expressing the correlation between highly connected nodes and those that trigger most of the changes in the optimal information spreading. Contrarily, we show that in randomly generated networks, where all the nodes have similar properties, random errors and intelligent attacks exhibit similar behavior. These conclusions may help us in design of more robust systems and fault-tolerant network architectures.

  4. Quantitative Verification and Synthesis of Attack-Defence Scenarios

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming; Parker, David

    2016-01-01

    Attack-defence trees are a powerful technique for formally evaluating attack-defence scenarios. They represent in an intuitive, graphical way the interaction between an attacker and a defender who compete in order to achieve conflicting objectives. We propose a novel framework for the formal...... analysis of quantitative properties of complex attack-defence scenarios, using an extension of attack-defence trees which models temporal ordering of actions and allows explicit dependencies in the strategies adopted by attackers and defenders. We adopt a game-theoretic approach, translating attack......-defence trees to two-player stochastic games, and then employ probabilistic model checking techniques to formally analyse these models. This provides a means to both verify formally specified security properties of the attack-defence scenarios and, dually, to synthesise strategies for attackers or defenders...

  5. Optimal counterterrorism and the recruitment effect of large terrorist attacks

    DEFF Research Database (Denmark)

    Jensen, Thomas

    2011-01-01

    makes it more likely that terrorist cells plan small rather than large attacks and therefore may increase the probability of a successful attack. Analyzing optimal counterterrorism we see that the recruitment effect makes authorities increase the level of counterterrorism after large attacks. Therefore......, in periods following large attacks a new attack is more likely to be small compared to other periods. Finally, we analyze the long-run consequences of the recruitment effect. We show that it leads to more counterterrorism, more small attacks, and a higher sum of terrorism damage and counterterrorism costs...

  6. A Study of Gaps in Attack Analysis

    Science.gov (United States)

    2016-10-12

    necessarily reflect the views of the Department of Defense. © 2016 MASSACHUSETTS INSTITUTE OF TECHNOLOGY Delivered to the U.S. Government with...and identify cyber attacks reflects the “arms race” na- ture of the cyber domain. While defenders develop new and improved techniques to detect known...Trost. Digging into ShellShock Exploitation attempts using ShockPot Data. https://www.threatstream.com/ blog /shockpot-exploitation-analysis, September

  7. Denial of Service Attack Techniques: Analysis, Implementation and Comparison

    Directory of Open Access Journals (Sweden)

    Khaled Elleithy

    2005-02-01

    Full Text Available A denial of service attack (DOS is any type of attack on a networking structure to disable a server from servicing its clients. Attacks range from sending millions of requests to a server in an attempt to slow it down, flooding a server with large packets of invalid data, to sending requests with an invalid or spoofed IP address. In this paper we show the implementation and analysis of three main types of attack: Ping of Death, TCP SYN Flood, and Distributed DOS. The Ping of Death attack will be simulated against a Microsoft Windows 95 computer. The TCP SYN Flood attack will be simulated against a Microsoft Windows 2000 IIS FTP Server. Distributed DOS will be demonstrated by simulating a distribution zombie program that will carry the Ping of Death attack. This paper will demonstrate the potential damage from DOS attacks and analyze the ramifications of the damage.

  8. Temperature dependence of Brewster's angle.

    Science.gov (United States)

    Guo, Wei

    2018-01-01

    In this work, a dielectric at a finite temperature is modeled as an ensemble of identical atoms moving randomly around where they are trapped. Light reflection from the dielectric is then discussed in terms of atomic radiation. Specific calculation demonstrates that because of the atoms' thermal motion, Brewster's angle is, in principle, temperature-dependent, and the dependence is weak in the low-temperature limit. What is also found is that the Brewster's angle is nothing but a result of destructive superposition of electromagnetic radiation from the atoms.

  9. Understand Your Risk of Heart Attack

    Science.gov (United States)

    ... Heart-Health Basics Reducing your risk starts with smart choices. If you smoke, stop. The American Heart ... a Second Heart Attack | Spanish Cardiac Rehab Referral Card | Spanish Heart Attack Warning Signs: Patient sheet | Infographic | ...

  10. Survey of Sybil Attacks in Social Networks

    OpenAIRE

    Gunturu, Rupesh

    2015-01-01

    This paper reviews the Sybil attack in social networks, which has the potential to compromise the whole distributed network. In the Sybil attack, the malicious user claims multiple identities to compromise the network. Sybil attacks can be used to change the overall ranking in voting applications, bad-mouth an opinion, access resources or to break the trust mechanism behind a P2P network. In this paper, different defense mechanisms used to mitigate Sybil attacks are also reviewed.

  11. Effects of slant angle and illumination angle on MTF estimations

    CSIR Research Space (South Africa)

    Vhengani, LM

    2012-07-01

    Full Text Available angle d(?) was not constant. It was also noted that the iris of the imaging system was in most cases adjusted during initial setups of each measurements. After each measurement, the knife-edge target was replaced with the ISO 12233 MTF target (shown....085 0.09 0.095 K:\\Working Folder\\Project_On_orbit MTF\\edgetargets\\MTF_Lab_Measurements _20120302_Edge Slant Angle (degrees) Ny qu ist MT F (c yc le/p ixe l) Data Regression -18 -16 -14 -12 -10 -8 -6 -4 -2 0.05 0.055 0.06 0...

  12. Modeling and Analysis of Information Attack in Computer Networks

    National Research Council Canada - National Science Library

    Pepyne, David

    2003-01-01

    ... (as opposed to physical and other forms of attack) . Information based attacks are attacks that can be carried out from anywhere in the world, while sipping cappuccino at an Internet cafe' or while enjoying the comfort of a living room armchair...

  13. Denial of Service Attack Techniques: Analysis, Implementation and Comparison

    OpenAIRE

    Khaled Elleithy; Drazen Blagovic; Wang Cheng; Paul Sideleau

    2005-01-01

    A denial of service attack (DOS) is any type of attack on a networking structure to disable a server from servicing its clients. Attacks range from sending millions of requests to a server in an attempt to slow it down, flooding a server with large packets of invalid data, to sending requests with an invalid or spoofed IP address. In this paper we show the implementation and analysis of three main types of attack: Ping of Death, TCP SYN Flood, and Distributed DOS. The Ping of Death attack wil...

  14. Unified communications forensics anatomy of common UC attacks

    CERN Document Server

    Grant, Nicholas Mr

    2013-01-01

    Unified Communications Forensics: Anatomy of Common UC Attacks is the first book to explain the issues and vulnerabilities and demonstrate the attacks, forensic artifacts, and countermeasures required to establish a secure (UC) environment. This book is written by leading UC experts Nicholas Grant and Joseph W. Shaw II and provides material never before found on the market, including: analysis of forensic artifacts in common UC attacks an in-depth look at established UC technologies and attack exploits hands-on understanding of UC attack vectors and associated countermeasures

  15. Neuroradiological study of transient ischemic attack

    International Nuclear Information System (INIS)

    Takusagawa, Yoshihiko; Fujiwara, Yasuhiro; Ichiki, Ken; Suga, Takeshi; Nishigaki, Shinichi

    1986-01-01

    Fifty-two patients with carotid TIAs and thirteen patients with vertebrobasilar TIAs were investigated by angiography and computed tomography. TIA was diagnosed by clinical symptoms in accordance with the criteria for TIA of the Joint Committee for Stroke Facilities in the U.S.A. (1974). The 65 patients with TIAs included 49 males and 16 females with average age of 63.5 years old at the initial episode of TIA. As for the diseases associated with TIA, hypertension (51 %), diabetes mellitus (15 %) and ischemic heart diseases (11 %) were the major disorders. Atrial fibrillation was observed in 2 cases. Intervals from last TIA attack to angiography were less than 7 days in 22 cases, 8 ∼ 30 days in 19 cases, 1 ∼ 4 monthes in 14 cases and more than 4 monthes in 10 cases, respectively. The cases in which angiography was done earlier after attacks displayed more abnormal findings. In 52 patients with caroted TIAs the artherosclerotic change of extracranial portion of the internal carotid artery was found in 14 cases (27 %), that of intracranial portion of the artery in 11 cases (21 %) and both lesions in 2 cases (4 %). On the other hand, in 13 patients with vertebrobasilar TIAs, this change was observed in 4 cases at the extracranival potion and in 1 case at the intracranial potion (siphon) of the internal carotid artery. Abnormal CT findings were found in 29 of 65 patients, namely 9 had ventricular dilatation and brain atrophy, 6 had cerebral infarction which was not associated with associated with symptoms of TIA. In carotid TIAs, Cerebral infarction was associated with symptoms of TIAs in 15 cases, namely 10 had a small low density area in the basal ganglia near the internal capsule and 5 had a low density area in the cortical or subcortical region. All of these 5 cases had cerebral embolism, which recanalized after attacks. (J.P.N.)

  16. Measurement of the angle gamma

    International Nuclear Information System (INIS)

    Aleksan, R.; Kayser, B.; Sphicas, P.

    1993-01-01

    The angle γ at least as defined in the Wolfenstein approximation is not completely out of reach of current or proposed dedicated B experiments. This conclusion certainly depends crucially on the assumed trigger and tagging efficiencies and also on the expected backgrounds. The work summarized here represents but a first step in the direction of extracting the third angle of the unitarity triangle. The theoretical developments during the workshop have resulted in a clearer understanding of the quantities studied. On the experimental side, new decay modes (i.e. in addition to the traditional ρK s decay) have resulted in expections for observing CP violation in B s decays which are not unreasonable. It is conceivable that a dedicated B experiment can probe a fundamental aspect of the Standard Model, the CKM matrix, in multiple ways. In the process, new physics can appear anywhere along the line

  17. [Diagnosis, pathogenesis and treatment of panic attacks].

    Science.gov (United States)

    Turczyński, J

    Panic accompanies several diseases both psychological and somatic. It may be secondary, i.e. produced by other symptoms and morbid processes. It may also be primary--"neurotic". In such cases there are two forms of panic: generalized and paroxysmal. Attacks of panic are seen in 1.6-2.9% of women and in 0.4-1.7% of men. Main pathogenetic role is played by the psychologic factors (psychical trauma precedes the onset of diseases). The role of biological factors is also important. It is believed that disorders of the noradrenergic, serotonin-ergic, and GABA-ergic transmission may produce the attacks of panic. Psychotherapy is a treatment of choice. Pharmacotherapy plays only an adjuvant role. Antidepressants (tricyclic of II generation) are most frequently used for this purpose and--exceptionally due to possible addiction--benzodiazepines. The highest impact on the development of disease has first contact physician attitude. Patient and thoughtful listening to the patient, explanation of the complaints and their source often produce and improvement, and even complete recovery.

  18. STABILITY OF UNDERWATER STRUCTURE UNDER WAVE ATTACK

    Directory of Open Access Journals (Sweden)

    C. Paotonan

    2012-02-01

    Full Text Available Geotube is, among others, a type of coastal structure that is increasingly accepted for coastal protection especially underwater breakwater. Besides its relatively low cost, it has other advantages such as flexibility, ease of construction and the fact that it can be filled with local sand material. Similar to all other coastal structures, it should also be stable under wave attack. A simple theoretical approach based on linear wave was adopted to estimate the stability of such structure. The theoretical solution was then compared with an experimental study. The experimental study was conducted at the Hydraulics and Hydrology Laboratory of Universitas Gadjah Mada. However, instead of a real geotube, PVC pipe was used where the weight of the PVC was varied by adjusting the volume of sand in the pipe. The result indicated that the agreement between the theoretical solution and the experiment was encouraging. The analytical solution may be utilized to predict underwater pipe stability under wave attack with certain degree of accuracy.

  19. Command Disaggregation Attack and Mitigation in Industrial Internet of Things.

    Science.gov (United States)

    Xun, Peng; Zhu, Pei-Dong; Hu, Yi-Fan; Cui, Peng-Shuai; Zhang, Yan

    2017-10-21

    A cyber-physical attack in the industrial Internet of Things can cause severe damage to physical system. In this paper, we focus on the command disaggregation attack, wherein attackers modify disaggregated commands by intruding command aggregators like programmable logic controllers, and then maliciously manipulate the physical process. It is necessary to investigate these attacks, analyze their impact on the physical process, and seek effective detection mechanisms. We depict two different types of command disaggregation attack modes: (1) the command sequence is disordered and (2) disaggregated sub-commands are allocated to wrong actuators. We describe three attack models to implement these modes with going undetected by existing detection methods. A novel and effective framework is provided to detect command disaggregation attacks. The framework utilizes the correlations among two-tier command sequences, including commands from the output of central controller and sub-commands from the input of actuators, to detect attacks before disruptions occur. We have designed components of the framework and explain how to mine and use these correlations to detect attacks. We present two case studies to validate different levels of impact from various attack models and the effectiveness of the detection framework. Finally, we discuss how to enhance the detection framework.

  20. Command Disaggregation Attack and Mitigation in Industrial Internet of Things

    Directory of Open Access Journals (Sweden)

    Peng Xun

    2017-10-01

    Full Text Available A cyber-physical attack in the industrial Internet of Things can cause severe damage to physical system. In this paper, we focus on the command disaggregation attack, wherein attackers modify disaggregated commands by intruding command aggregators like programmable logic controllers, and then maliciously manipulate the physical process. It is necessary to investigate these attacks, analyze their impact on the physical process, and seek effective detection mechanisms. We depict two different types of command disaggregation attack modes: (1 the command sequence is disordered and (2 disaggregated sub-commands are allocated to wrong actuators. We describe three attack models to implement these modes with going undetected by existing detection methods. A novel and effective framework is provided to detect command disaggregation attacks. The framework utilizes the correlations among two-tier command sequences, including commands from the output of central controller and sub-commands from the input of actuators, to detect attacks before disruptions occur. We have designed components of the framework and explain how to mine and use these correlations to detect attacks. We present two case studies to validate different levels of impact from various attack models and the effectiveness of the detection framework. Finally, we discuss how to enhance the detection framework.

  1. Simulation of Attacks for Security in Wireless Sensor Network.

    Science.gov (United States)

    Diaz, Alvaro; Sanchez, Pablo

    2016-11-18

    The increasing complexity and low-power constraints of current Wireless Sensor Networks (WSN) require efficient methodologies for network simulation and embedded software performance analysis of nodes. In addition, security is also a very important feature that has to be addressed in most WSNs, since they may work with sensitive data and operate in hostile unattended environments. In this paper, a methodology for security analysis of Wireless Sensor Networks is presented. The methodology allows designing attack-aware embedded software/firmware or attack countermeasures to provide security in WSNs. The proposed methodology includes attacker modeling and attack simulation with performance analysis (node's software execution time and power consumption estimation). After an analysis of different WSN attack types, an attacker model is proposed. This model defines three different types of attackers that can emulate most WSN attacks. In addition, this paper presents a virtual platform that is able to model the node hardware, embedded software and basic wireless channel features. This virtual simulation analyzes the embedded software behavior and node power consumption while it takes into account the network deployment and topology. Additionally, this simulator integrates the previously mentioned attacker model. Thus, the impact of attacks on power consumption and software behavior/execution-time can be analyzed. This provides developers with essential information about the effects that one or multiple attacks could have on the network, helping them to develop more secure WSN systems. This WSN attack simulator is an essential element of the attack-aware embedded software development methodology that is also introduced in this work.

  2. Heart Attack

    Science.gov (United States)

    Each year almost 800,000 Americans have a heart attack. A heart attack happens when blood flow to the heart suddenly ... it's important to know the symptoms of a heart attack and call 9-1-1 if you or ...

  3. Speeding up detection of SHA-1 collision attacks using unavoidable attack conditions

    NARCIS (Netherlands)

    M.M.J. Stevens (Marc); D. Shumow

    2017-01-01

    textabstractCounter-cryptanalysis, the concept of using cryptanalytic techniques to detect cryptanalytic attacks, was introduced by Stevens at CRYPTO 2013 [22] with a hash collision detection algorithm. That is, an algorithm that detects whether a given single message is part of a colliding message

  4. Spreading of localized attacks in spatial multiplex networks

    Science.gov (United States)

    Vaknin, Dana; Danziger, Michael M.; Havlin, Shlomo

    2017-07-01

    Many real-world multilayer systems such as critical infrastructure are interdependent and embedded in space with links of a characteristic length. They are also vulnerable to localized attacks or failures, such as terrorist attacks or natural catastrophes, which affect all nodes within a given radius. Here we study the effects of localized attacks on spatial multiplex networks of two layers. We find a metastable region where a localized attack larger than a critical size induces a nucleation transition as a cascade of failures spreads throughout the system, leading to its collapse. We develop a theory to predict the critical attack size and find that it exhibits novel scaling behavior. We further find that localized attacks in these multiplex systems can induce a previously unobserved combination of random and spatial cascades. Our results demonstrate important vulnerabilities in real-world interdependent networks and show new theoretical features of spatial networks.

  5. Analysis of Network Vulnerability Under Joint Node and Link Attacks

    Science.gov (United States)

    Li, Yongcheng; Liu, Shumei; Yu, Yao; Cao, Ting

    2018-03-01

    The security problem of computer network system is becoming more and more serious. The fundamental reason is that there are security vulnerabilities in the network system. Therefore, it’s very important to identify and reduce or eliminate these vulnerabilities before they are attacked. In this paper, we are interested in joint node and link attacks and propose a vulnerability evaluation method based on the overall connectivity of the network to defense this attack. Especially, we analyze the attack cost problem from the attackers’ perspective. The purpose is to find the set of least costs for joint links and nodes, and their deletion will lead to serious network connection damage. The simulation results show that the vulnerable elements obtained from the proposed method are more suitable for the attacking idea of the malicious persons in joint node and link attack. It is easy to find that the proposed method has more realistic protection significance.

  6. Attribution Of Cyber Attacks On Process Control Systems

    Science.gov (United States)

    Hunker, Jeffrey; Hutchinson, Robert; Margulies, Jonathan

    The attribution of cyber attacks is an important problem. Attribution gives critical infrastructure asset owners and operators legal recourse in the event of attacks and deters potential attacks. This paper discusses attribution techniques along with the associated legal and technical challenges. It presents a proposal for a voluntary network of attributable activity, an important first step towards a more complete attribution methodology for the control systems community.

  7. Different Types of Attacks on Integrated MANET-Internet Communication

    OpenAIRE

    Abhay Kumar Rai, Rajiv Ranjan Tewari & Saurabh Kant Upadhyay

    2010-01-01

    Security is an important issue in the integrated MANET-Internet environment because inthis environment we have to consider the attacks on Internet connectivity and also onthe ad hoc routing protocols. The focus of this work is on different types of attacks onintegrated MANET-Internet communication. We consider most common types of attackson mobile ad hoc networks and on access point through which MANET is connected tothe Internet. Specifically, we study how different attacks affect the perfor...

  8. Neural network classifier of attacks in IP telephony

    Science.gov (United States)

    Safarik, Jakub; Voznak, Miroslav; Mehic, Miralem; Partila, Pavol; Mikulec, Martin

    2014-05-01

    Various types of monitoring mechanism allow us to detect and monitor behavior of attackers in VoIP networks. Analysis of detected malicious traffic is crucial for further investigation and hardening the network. This analysis is typically based on statistical methods and the article brings a solution based on neural network. The proposed algorithm is used as a classifier of attacks in a distributed monitoring network of independent honeypot probes. Information about attacks on these honeypots is collected on a centralized server and then classified. This classification is based on different mechanisms. One of them is based on the multilayer perceptron neural network. The article describes inner structure of used neural network and also information about implementation of this network. The learning set for this neural network is based on real attack data collected from IP telephony honeypot called Dionaea. We prepare the learning set from real attack data after collecting, cleaning and aggregation of this information. After proper learning is the neural network capable to classify 6 types of most commonly used VoIP attacks. Using neural network classifier brings more accurate attack classification in a distributed system of honeypots. With this approach is possible to detect malicious behavior in a different part of networks, which are logically or geographically divided and use the information from one network to harden security in other networks. Centralized server for distributed set of nodes serves not only as a collector and classifier of attack data, but also as a mechanism for generating a precaution steps against attacks.

  9. The timing of terrorist attacks: An optimal stopping approach

    Directory of Open Access Journals (Sweden)

    Thomas Jensen

    2016-02-01

    Full Text Available I use a simple optimal stopping model to derive policy relevant insights on the timing of one-shot attacks by small autonomous terrorist units or “lone wolf” individuals. A main insight is that an increase in proactive counterterrorism measures can lead to a short term increase in the number of attempted terrorist attacks because it makes it more risky for existing terrorist units to pursue further development of capabilities. This is consistent with the events in London in 2005 where a terrorist attack on 7 July was followed by a similar but unsuccessful attack two weeks later.

  10. Managing burn victims of suicide bombing attacks: outcomes, lessons learnt, and changes made from three attacks in Indonesia.

    Science.gov (United States)

    Chim, Harvey; Yew, Woon Si; Song, Colin

    2007-01-01

    Terror attacks in Southeast Asia were almost nonexistent until the 2002 Bali bomb blast, considered the deadliest attack in Indonesian history. Further attacks in 2003 (Jakarta), 2004 (Jakarta), and 2005 (Bali) have turned terrorist attacks into an ever-present reality. The authors reviewed medical charts of victims evacuated to the Singapore General Hospital (SGH) Burns Centre during three suicide attacks involving Bali (2002 and 2005) and the Jakarta Marriott hotel (2003). Problems faced, lessons learnt, and costs incurred are discussed. A burns disaster plan drawing on lessons learnt from these attacks is presented. Thirty-one patients were treated at the SGH Burns Centre in three attacks (2002 Bali attack [n = 15], 2003 Jakarta attack [n = 14], and 2005 Bali attack [n = 2]). For the 2002 Bali attack, median age was 29 years (range 20 to 50 years), median percentage of total burn surface area (TBSA) was 29% (range 5% to 55%), and median abbreviated burn severity index (ABSI) was 6 (range 3 to 10). Eight of 15 patients were admitted to the intensive care unit. For the 2003 Jakarta attack, median age was 35 years (range 24 to 56 years), median percentage of TBSA was 10% (range 2% to 46%), and median ABSI was 4 (range 3 to 9). A large number of patients had other injuries. Problems faced included manpower issues, lack of bed space, shortage of blood products, and lack of cadaver skin. The changing nature of terror attacks mandates continued vigilance and disaster preparedness. The multidimensional burns patient, complicated by other injuries, is likely to become increasingly common. A burns disaster plan with emphasis on effective command, control, and communication as well as organisation of health care personnel following a 'team concept' will do much to ensure that the sudden onset of a crisis situation at an unexpected time does not overwhelm hospital manpower and resources.

  11. A Review Of Recent Cyber-Attacks In Fiji

    Directory of Open Access Journals (Sweden)

    Neeraj A. Sharma

    2015-08-01

    Full Text Available Computing technology has evolved in such dramatic ways that a child can use such technology and their features. Internet is one such technology which allows peripheral devices to be connected to each other creating a network to share information. In the same way information can be attacked. In this paper we will be discussing the different types of cyber-attack that recently took place in Fiji. Common attacks discussed in this review paper are phishing email scams website defacement and skimming. Apart from common preventative methods some novel recommendations have been made. We believe the Fiji experiences and recommendations will assist technology users prepare better against such attacks.

  12. Variability of clinical features in attacks of migraine with aura

    DEFF Research Database (Denmark)

    Hansen, Jakob M; Goadsby, Peter J; Charles, Andrew C

    2016-01-01

    BACKGROUND: There is significant variability in the clinical presentation of migraine, both among patients, and between attacks in an individual patient. We examined clinical features of migraine with aura in a large group of patients enrolled in a clinical trial, and compared retrospective...... a detailed retrospective description of the clinical features of their attacks of migraine. During the trial, clinical symptoms in migraine attacks starting with aura were recorded prospectively in 861 attacks. RESULTS: Retrospectively reported visual aura symptoms were variable and often overlapping...... in recalling or speaking words. A significant percentage of patients also reported a change in olfaction. There were several inconsistencies between the features of prospectively recorded and retrospectively reported attacks. Headache, nausea, photophobia, and phonophobia were all less common in prospectively...

  13. Pattern association--a key to recognition of shark attacks.

    Science.gov (United States)

    Cirillo, G; James, H

    2004-12-01

    Investigation of a number of shark attacks in South Australian waters has lead to recognition of pattern similarities on equipment recovered from the scene of such attacks. Six cases are presented in which a common pattern of striations has been noted.

  14. Robustness against attacks of dual polarization encryption using the Stokes–Mueller formalism

    International Nuclear Information System (INIS)

    Dubreuil, Matthieu; Alfalou, Ayman; Brosseau, Christian

    2012-01-01

    The security of our recently proposed dual polarization encryption scheme of images is evaluated by numerical simulations. This consists of testing the resistance of the scheme against brute force, known-plaintext, chosen-plaintext and video sequence attacks. While some attacks are ineffective (brute force, video sequence) others are effective (known-plaintext, chosen-plaintext), but only under certain assumptions. An optimization of the setup, which is based on a regular rotation of polarization optics angles (polarizers, wave plates), is proposed associating the use of a high dynamic range for the key image, or the use of a phase-only spatial light modulator in the target and in the key image channel. The possibility of the attacker decrypting an unknown image is thus strongly reduced. The precision required for optical specifications is also evaluated, in order to ensure a good decryption for an authorized user. (paper)

  15. Robustness against attacks of dual polarization encryption using the Stokes-Mueller formalism

    Science.gov (United States)

    Dubreuil, Matthieu; Alfalou, Ayman; Brosseau, Christian

    2012-09-01

    The security of our recently proposed dual polarization encryption scheme of images is evaluated by numerical simulations. This consists of testing the resistance of the scheme against brute force, known-plaintext, chosen-plaintext and video sequence attacks. While some attacks are ineffective (brute force, video sequence) others are effective (known-plaintext, chosen-plaintext), but only under certain assumptions. An optimization of the setup, which is based on a regular rotation of polarization optics angles (polarizers, wave plates), is proposed associating the use of a high dynamic range for the key image, or the use of a phase-only spatial light modulator in the target and in the key image channel. The possibility of the attacker decrypting an unknown image is thus strongly reduced. The precision required for optical specifications is also evaluated, in order to ensure a good decryption for an authorized user.

  16. Are Risk Assessments of a Terrorist Attack Coherent?

    Science.gov (United States)

    Mandel, David R.

    2005-01-01

    Four experiments examined 3 types of violations of coherence criteria in risk assessments of a terrorist attack. First, the requirement that extensionally equivalent descriptions be assigned the same probability (i.e., additivity) was violated. Unpacking descriptions of an attack into subtypes led to an increase in assessed risk. Second,…

  17. Understanding How Components of Organisations Contribute to Attacks

    DEFF Research Database (Denmark)

    Gu, Min; Aslanyan, Zaruhi; Probst, Christian W.

    2016-01-01

    components quickly results in a large quantity of interrelations, which are hard to grasp. In this work we present several approaches for visualising attributes of attacks such as likelihood of success, impact, and required time or skill level. The resulting visualisations provide a link between attacks...

  18. A Survey of Man in the Middle Attacks

    DEFF Research Database (Denmark)

    Conti, Mauro; Dragoni, Nicola; Lesyk, Viktor

    2016-01-01

    The Man-In-The-Middle (MITM) attack is one of the most well known attacks in computer security, representing one of the biggest concerns for security professionals. MITM targets the actual data that flows between endpoints, and the confidentiality and integrity of the data itself. In this paper, ...

  19. Effectiveness of the Call in Beach Volleyball Attacking Play

    Directory of Open Access Journals (Sweden)

    Künzell Stefan

    2014-12-01

    Full Text Available In beach volleyball the setter has the opportunity to give her or his hitter a “call”. The call intends that the setter suggests to her or his partner where to place the attack in the opponent’s court. The effectiveness of a call is still unknown. We investigated the women’s and men’s Swiss National Beach Volleyball Championships in 2011 and analyzed 2185 attacks. We found large differences between female and male players. While men called in only 38.4% of attacks, women used calls in 85.5% of attacks. If the male players followed a given call, 63% of the attacks were successful. The success rate of attacks without any call was 55.8% and 47.6% when the call was ignored. These differences were not significant (χ2(2 = 4.55, p = 0.103. In women’s beach volleyball, the rate of successful attacks was 61.5% when a call was followed, 35% for attacks without a call, and 42.6% when a call was ignored. The differences were highly significant (χ2(2 = 23.42, p < 0.0005. Taking into account the findings of the present study, we suggested that the call was effective in women’s beach volleyball, while its effect in men’s game was unclear. Considering the quality of calls we indicate that there is a significant potential to increase the effectiveness of a call.

  20. Understanding Bifurcation of Slow Versus Fast Cyber-Attackers

    NARCIS (Netherlands)

    van Wieren, Maarten; Doerr, Christian; Jacobs, Vivian; Pieters, Wolter; Livraga, Giovanni; Torra, Vicenç; Aldini, Alessandro; Martinelli, Fabio; Suri, Neeraj

    2016-01-01

    Anecdotally, the distinction between fast “Smash-and-Grab‿ cyber-attacks on the one hand and slow attacks or “Advanced Persistent Threats‿ on the other hand is well known. In this article, we provide an explanation for this phenomenon as the outcome of an optimization from the perspective of the

  1. Attacking process characterization of elite water polo female teams

    Directory of Open Access Journals (Sweden)

    Sofia Canossa

    2009-06-01

    Full Text Available The purpose of the present study was to analyze the attacking tasks and tactical organization of elite Women’s Water Polo. The sample consisted of 442 attack sequences of 8 games played by the top teams in a European Championship. Seventeen variables were analyzed according to the position and player’s participation, tactical organization and playing styles, as well as the efficacy of actions performed. The results from this study indicate that positional attack was the predominant performance factor in the attacking process. To this occurrence, the mixed floating defense was identified as the most frequent opposition. The counter-attack proved to be the most efficient strategy. The attacking process frequently started by ball recovering, in anticipation, and by the defense of the goal-keeper in the 2m zone. In central path, a first long-range pass to the right wing predominated. Teams preferred spontaneous shot on goal supported by assisted displacements, and extra player man offence situations. In general, the attacking sequences, do not take longer than 35s to be developed. Teams efficiency emerged related to the tactical means adopted, namely the spontaneous shot at goal on the front line and numerical superiority of players in attacking game situations.

  2. Attacking process characterization of elite water polo female teams

    Directory of Open Access Journals (Sweden)

    S. Canossa

    2009-01-01

    Full Text Available The purpose of the present study was to analyze the attacking tasks and tactical organization of elite Women’s Water Polo. The sample consisted of 442 attack sequences of 8 games played by the top teams in a European Championship. Seventeen variables were analyzed according to the position and player’s participation, tactical organization and playing styles, as well as the efficacy of actions performed. The results from this study indicate that positional attack was the predominant performance factor in the attacking process. To this occurrence, the mixed floating defense was identified as the most frequent opposition. The counter-attack proved to be the most efficient strategy. The attacking process frequently started by ball recovering, in anticipation, and by the defense of the goal-keeper in the 2m zone. In central path, a first long-range pass to the right wing predominated. Teams preferred spontaneous shot on goal supported by assisted displacements, and extra player man offence situations. In general, the attacking sequences, do not take longer than 35s to be developed. Teams efficiency emerged related to the tactical means adopted, namely the spontaneous shot at goal on the front line and numerical superiority of players in attacking game situations.

  3. Matrix metalloproteinases during and outside of migraine attacks without aura

    DEFF Research Database (Denmark)

    Ashina, M.; Tvedskov, J.F.; Thiesen, Kerstin Lipka

    2010-01-01

    Ashina M, Tvedskov JF, Lipka K, Bilello J, Penkowa M & Olesen J. Matrix metalloproteinases during and outside of migraine attacks without aura. Cephalalgia 2009. London. ISSN 0333-1024To test the hypothesis that permeability of the blood-brain barrier (BBB) is altered during migraine attack due...... to enhanced activation of matrix metalloproteinases (MMPs), we investigated MMP-3, MMP-9 and tissue inhibitor of metalloproteases (TIMP)-1 in the external jugular vein during and outside of migraine attacks in 21 patients with migraine without aura. In addition, we measured plasma levels of several other...... of MMP-3 in the external jugular (P = 0.002) and cubital (P = 0.008) vein during attacks compared with outside of attacks. We found no correlation of ictal or interictal MMP-3, MMP-9 and TIMP-1 to migraine duration and frequency analysed in 21 patients (P > 0.05). There was no difference between ictal...

  4. The Icatibant Outcome Survey: treatment of laryngeal angioedema attacks

    Science.gov (United States)

    Aberer, Werner; Bouillet, Laurence; Caballero, Teresa; Maurer, Marcus; Fabien, Vincent; Zanichelli, Andrea

    2016-01-01

    Objective To characterize the management and outcomes of life-threatening laryngeal attacks of hereditary angioedema (HAE) treated with icatibant in the observational Icatibant Outcome Survey (NCT01034969) registry. Methods This retrospective analysis was based on data from patients with HAE type I/II who received healthcare professional-administered or self-administered icatibant to treat laryngeal attacks between September 2008 and May 2013. Results Twenty centers in seven countries contributed data. Overall, 42 patients with HAE experienced 67 icatibant-treated laryngeal attacks. Icatibant was self-administered for 62.3% of attacks (healthcare professional-administered, 37.7%). One icatibant injection was used for 87.9% of attacks, with rescue or concomitant medication used for 9.0%. The median time to treatment was 2.0 h (n=31 attacks) and the median time to resolution was 6.0 h (n=35 attacks). Conclusions This analysis describes successful use of icatibant for the treatment of laryngeal HAE attacks in a real-world setting. PMID:27116379

  5. Randomized, controlled trial of telcagepant over four migraine attacks

    DEFF Research Database (Denmark)

    Ho, Andrew P; Dahlöf, Carl Gh; Silberstein, Stephen D

    2010-01-01

    This study evaluated the calcitonin gene-related peptide (CGRP) receptor antagonist telcagepant (tablet formulation) for treatment of a migraine attack and across four attacks. Adults with migraine were randomized, double-blind, to telcagepant 140 mg, telcagepant 280 mg, or control treatment sequ...

  6. Impacts Of Xenophobia Attacks On Tourism | Adeleke | IFE ...

    African Journals Online (AJOL)

    economic and social roles is Xenophobia. Safety has always been an important prerequisite for the altraction of international tourists. Xenophobic attacks puts tourism is a difficult trading environment as it scares tourist away. As tourism aids in building nation\\'s image, this is damaged easily by xenophobic attacks, and also ...

  7. Pareto Efficient Solutions of Attack-Defence Trees

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming

    2015-01-01

    Attack-defence trees are a promising approach for representing threat scenarios and possible countermeasures in a concise and intuitive manner. An attack-defence tree describes the interaction between an attacker and a defender, and is evaluated by assigning parameters to the nodes......, such as probability or cost of attacks and defences. In case of multiple parameters most analytical methods optimise one parameter at a time, e.g., minimise cost or maximise probability of an attack. Such methods may lead to sub-optimal solutions when optimising conflicting parameters, e.g., minimising cost while...... maximising probability. In order to tackle this challenge, we devise automated techniques that optimise all parameters at once. Moreover, in the case of conflicting parameters our techniques compute the set of all optimal solutions, defined in terms of Pareto efficiency. The developments are carried out...

  8. Metrics for Assessment of Smart Grid Data Integrity Attacks

    Energy Technology Data Exchange (ETDEWEB)

    Annarita Giani; Miles McQueen; Russell Bent; Kameshwar Poolla; Mark Hinrichs

    2012-07-01

    There is an emerging consensus that the nation’s electricity grid is vulnerable to cyber attacks. This vulnerability arises from the increasing reliance on using remote measurements, transmitting them over legacy data networks to system operators who make critical decisions based on available data. Data integrity attacks are a class of cyber attacks that involve a compromise of information that is processed by the grid operator. This information can include meter readings of injected power at remote generators, power flows on transmission lines, and relay states. These data integrity attacks have consequences only when the system operator responds to compromised data by redispatching generation under normal or contingency protocols. These consequences include (a) financial losses from sub-optimal economic dispatch to service loads, (b) robustness/resiliency losses from placing the grid at operating points that are at greater risk from contingencies, and (c) systemic losses resulting from cascading failures induced by poor operational choices. This paper is focused on understanding the connections between grid operational procedures and cyber attacks. We first offer two examples to illustrate how data integrity attacks can cause economic and physical damage by misleading operators into taking inappropriate decisions. We then focus on unobservable data integrity attacks involving power meter data. These are coordinated attacks where the compromised data are consistent with the physics of power flow, and are therefore passed by any bad data detection algorithm. We develop metrics to assess the economic impact of these attacks under re-dispatch decisions using optimal power flow methods. These metrics can be use to prioritize the adoption of appropriate countermeasures including PMU placement, encryption, hardware upgrades, and advance attack detection algorithms.

  9. Construction of a Cyber Attack Model for Nuclear Power Plants

    Energy Technology Data Exchange (ETDEWEB)

    Varuttamaseni, Athi; Bari, Robert A.; Youngblood, Robert

    2017-05-01

    The consideration of how one compromised digital equipment can impact neighboring equipment is critical to understanding the progression of cyber attacks. The degree of influence that one component may have on another depends on a variety of factors, including the sharing of resources such as network bandwidth or processing power, the level of trust between components, and the inclusion of segmentation devices such as firewalls. The interactions among components via mechanisms that are unique to the digital world are not usually considered in traditional PRA. This means potential sequences of events that may occur during an attack may be missed if one were to only look at conventional accident sequences. This paper presents a method where, starting from the initial attack vector, the progression of a cyber attack can be modeled. The propagation of the attack is modeled by considering certain attributes of the digital components in the system. These attributes determine the potential vulnerability of a component to a class of attack and the capability gained by the attackers once they are in control of the equipment. The use of attributes allows similar components (components with the same set of attributes) to be modeled in the same way, thereby reducing the computing resources required for analysis of large systems.

  10. Effects of Permanent Bounded Cyber-Attacks on Networked Control Systems

    OpenAIRE

    Gerard, Benjamin; Voos, Holger; Li, Yumei; Darouach, Mohamed

    2015-01-01

    In this paper, the problem of permanent bounded cyber-attacks on networked control systems is treated. After a characterisation of malicious cyber attacks, the danger of permanent bounded cyber-attacks of two types is proved, the step attacks on system with invariant zero with zero real part and the free attacks. Simulation examples demonstrate the obtained results.

  11. Attack resilience of the evolving scientific collaboration network.

    Directory of Open Access Journals (Sweden)

    Xiao Fan Liu

    Full Text Available Stationary complex networks have been extensively studied in the last ten years. However, many natural systems are known to be continuously evolving at the local ("microscopic" level. Understanding the response to targeted attacks of an evolving network may shed light on both how to design robust systems and finding effective attack strategies. In this paper we study empirically the response to targeted attacks of the scientific collaboration networks. First we show that scientific collaboration network is a complex system which evolves intensively at the local level--fewer than 20% of scientific collaborations last more than one year. Then, we investigate the impact of the sudden death of eminent scientists on the evolution of the collaboration networks of their former collaborators. We observe in particular that the sudden death, which is equivalent to the removal of the center of the egocentric network of the eminent scientist, does not affect the topological evolution of the residual network. Nonetheless, removal of the eminent hub node is exactly the strategy one would adopt for an effective targeted attack on a stationary network. Hence, we use this evolving collaboration network as an experimental model for attack on an evolving complex network. We find that such attacks are ineffectual, and infer that the scientific collaboration network is the trace of knowledge propagation on a larger underlying social network. The redundancy of the underlying structure in fact acts as a protection mechanism against such network attacks.

  12. Personality characteristics of victims of illegal attacks on the Internet

    Directory of Open Access Journals (Sweden)

    Safuanov F.S.

    2016-01-01

    Full Text Available The article examines the personality characteristics of victims of illegal attacks on the Internet. We used methods as follow: 16 factors Cattell personality questionnaire, subjective control level, life-style index, Buss-Perry questionnaire, Spielberger State-Trait Anxiety Inventory, a COPE inventory. 78 internet users were divided into two groups of 38 persons: the main group included people falling victim to illegal attacks on the Internet, the control group participants were not attacked on the internet. We identified specific aggregated symptoms of individual psychological characteristics of internet attack victims and show that victims of "non-forced" and "forced" offenses have different levels of situational and personal anxiety, aggression and locus of control.

  13. Fatal injection: a survey of modern code injection attack countermeasures

    Directory of Open Access Journals (Sweden)

    Dimitris Mitropoulos

    2017-11-01

    Full Text Available With a code injection attack (CIA an attacker can introduce malicious code into a computer program or system that fails to properly encode data that comes from an untrusted source. A CIA can have different forms depending on the execution context of the application and the location of the programming flaw that leads to the attack. Currently, CIAs are considered one of the most damaging classes of application attacks since they can severely affect an organisation’s infrastructure and cause financial and reputational damage to it. In this paper we examine and categorize the countermeasures developed to detect the various attack forms. In particular, we identify two distinct categories. The first incorporates static program analysis tools used to eliminate flaws that can lead to such attacks during the development of the system. The second involves the use of dynamic detection safeguards that prevent code injection attacks while the system is in production mode. Our analysis is based on nonfunctional characteristics that are considered critical when creating security mechanisms. Such characteristics involve usability, overhead, implementation dependencies, false positives and false negatives. Our categorization and analysis can help both researchers and practitioners either to develop novel approaches, or use the appropriate mechanisms according to their needs.

  14. Towards A Taxonomy Of Attacks Against Energy Control Systems

    Science.gov (United States)

    Fleury, Terry; Khurana, Himanshu; Welch, Von

    Control systems in the energy sector (e.g., supervisory control and data acquisition (SCADA) systems) involve a hierarchy of sensing, monitoring and control devices connected to centralized control stations or centers. The incorporation of commercial off-the-shelf technologies in energy control systems makes them vulnerable to cyber attacks. A taxonomy of cyber attacks against control systems can assist the energy sector in managing the cyber threat. This paper takes the first step towards a taxonomy by presenting a comprehensive model of attacks, vulnerabilities and damage related to control systems. The model is populated based on a survey of the technical literature from industry, academia and national laboratories.

  15. The LOCAL attack: Cryptanalysis of the authenticated encryption scheme ALE

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Rechberger, Christian

    2014-01-01

    We show how to produce a forged (ciphertext, tag) pair for the scheme ALE with data and time complexity of 2102 ALE encryptions of short messages and the same number of authentication attempts. We use a differential attack based on a local collision, which exploits the availability of extracted...... state bytes to the adversary. Our approach allows for a time-data complexity tradeoff, with an extreme case of a forgery produced after 2119 attempts and based on a single authenticated message. Our attack is further turned into a state recovery and a universal forgery attack with a time complexity...

  16. The qualitative criterion of transient angle stability

    DEFF Research Database (Denmark)

    Lyu, R.; Xue, Y.; Xue, F.

    2015-01-01

    In almost all the literatures, the qualitative assessment of transient angle stability extracts the angle information of generators based on the swing curve. As the angle (or angle difference) of concern and the threshold value rely strongly on the engineering experience, the validity and robust...... of these criterions are weak. Based on the stability mechanism from the extended equal area criterion (EEAC) theory and combining with abundant simulations of real system, this paper analyzes the criterions in most literatures and finds that the results could be too conservative or too optimistic. It is concluded...

  17. Compounding the Losses of Convoyed Ships Attacked by Tactical Submarines

    Directory of Open Access Journals (Sweden)

    Kåre M. Mjelde

    1982-10-01

    Full Text Available It is demonstrated that a time dependent stochastic model for the losses of convoyed ships attacked by submarines can be applied in the determination of the losses in terms of the results of two submodels:

  18. An unusual case of predation: dog pack or cougar attack?

    Science.gov (United States)

    Fonseca, Gabriel M; Palacios, Rocío

    2013-01-01

    Injuries produced by animals are capable of leaving severe patterns and in some cases may result in the death of the attacked individual. Law enforcement authorities may come to erroneous conclusions about the source of the bites based on their awareness of animals present and similarities of the injuries to the untrained eye, with dreadful consequences. Expertise of a carnivore biologist and an odontologist that indentifies the particularities of bite marks may be useful for identifying the attacking species. We present the investigation of a fatal dog pack attack involving a 43-year-old man in Bell Ville (Argentina) where the evidence provided by a forensic dentist and a biologist was categorical for establishing the animal species involved. Because of the unusual characteristics of the wounds and the initial hypothesis made by local authorities of a cougar attack, habits and specific patterns of both dog pack and cougar predation on humans are discussed. © 2012 American Academy of Forensic Sciences.

  19. Attack surfaces

    DEFF Research Database (Denmark)

    Gruschka, Nils; Jensen, Meiko

    2010-01-01

    The new paradigm of cloud computing poses severe security risks to its adopters. In order to cope with these risks, appropriate taxonomies and classification criteria for attacks on cloud computing are required. In this work-in-progress paper we present one such taxonomy based on the notion...... of attack surfaces of the cloud computing scenario participants....

  20. [Forensic-medical assessment of terroristic chemical attacks].

    Science.gov (United States)

    Babakhanian, R B; Bushuev, E S

    2005-01-01

    By potential damage, chemical terroristic attacks are much more dangerous than terroristic bombing. To fight chemical terrorism it is necessary to create the system of medical-environmental defense of the population. In line with emergency medicine, forensic medical service is a very important element of the antiterroristic defense. The activity of forensic-medical experts in the field of terroristic chemical attack is analysed.

  1. Fusion of Heterogeneous Intrusion Detection Systems for Network Attack Detection

    Directory of Open Access Journals (Sweden)

    Jayakumar Kaliappan

    2015-01-01

    Full Text Available An intrusion detection system (IDS helps to identify different types of attacks in general, and the detection rate will be higher for some specific category of attacks. This paper is designed on the idea that each IDS is efficient in detecting a specific type of attack. In proposed Multiple IDS Unit (MIU, there are five IDS units, and each IDS follows a unique algorithm to detect attacks. The feature selection is done with the help of genetic algorithm. The selected features of the input traffic are passed on to the MIU for processing. The decision from each IDS is termed as local decision. The fusion unit inside the MIU processes all the local decisions with the help of majority voting rule and makes the final decision. The proposed system shows a very good improvement in detection rate and reduces the false alarm rate.

  2. Fusion of Heterogeneous Intrusion Detection Systems for Network Attack Detection.

    Science.gov (United States)

    Kaliappan, Jayakumar; Thiagarajan, Revathi; Sundararajan, Karpagam

    2015-01-01

    An intrusion detection system (IDS) helps to identify different types of attacks in general, and the detection rate will be higher for some specific category of attacks. This paper is designed on the idea that each IDS is efficient in detecting a specific type of attack. In proposed Multiple IDS Unit (MIU), there are five IDS units, and each IDS follows a unique algorithm to detect attacks. The feature selection is done with the help of genetic algorithm. The selected features of the input traffic are passed on to the MIU for processing. The decision from each IDS is termed as local decision. The fusion unit inside the MIU processes all the local decisions with the help of majority voting rule and makes the final decision. The proposed system shows a very good improvement in detection rate and reduces the false alarm rate.

  3. Security solution against denial of service attacks in BESIP system

    Science.gov (United States)

    Rezac, Filip; Voznak, Miroslav; Safarik, Jakub; Partila, Pavol; Tomala, Karel

    2013-05-01

    This article deals about embedded SIP communication server with an easy integration into the computer network based on open source solutions and its effective defense against the most frequent attack in the present - Denial of Service. The article contains brief introduction into the Bright Embedded Solution for IP Telephony - BESIP and describes the most common types of DoS attacks, which are applied on SIP elements of the VoIP infrastructure including the results of defensive mechanism that has been designed.

  4. Pathological findings of a fatal leopard seal attack.

    Science.gov (United States)

    Rutty, Guy N

    2007-03-01

    A unique case of a fatal leopard seal attack against an adult human female is presented. The death occurred in Rothera, Antarctica when the female was snorkeling while undertaking scientific research. The principle injuries occurred, during life, to the facial areas prior to the act of drowning. The method of attack of leopard seals against their natural prey is discussed and related to the findings on the deceased.

  5. AMC Model for Denial of Sleep Attack Detection

    OpenAIRE

    Bhattasali, Tapalina; Chaki, Rituparna

    2012-01-01

    Due to deployment in hostile environment, wireless sensor network is vulnerable to various attacks. Exhausted sensor nodes in sensor network become a challenging issue because it disrupts the normal connectivity of the network. Affected nodes give rise to denial of service that resists to get the objective of sensor network in real life. A mathematical model based on Absorbing Markov Chain (AMC)is proposed for Denial of Sleep attack detection in sensor network. In this mechanism, whether sens...

  6. Stealth, the End of Dedicated Electronic Attack Aircraft

    National Research Council Canada - National Science Library

    Hake, Michael

    1999-01-01

    .... Furthermore, if a target is missed because of defensive reactions to radar-guided weapons, the sortie is lost and the target will have to be attacked again, draining valuable resources from the war...

  7. An Annotated Review of Past Papers on Attack Graphs

    National Research Council Canada - National Science Library

    Lippmann, Richard; Ingols, K. W

    2005-01-01

    This report reviews past research papers that describe how to construct attack graphs, how to use them to improve security of computer networks, and how to use them to analyze alerts from intrusion detection systems...

  8. Computing angle of arrival of radio signals

    Science.gov (United States)

    Borchardt, John J.; Steele, David K.

    2017-11-07

    Various technologies pertaining to computing angle of arrival of radio signals are described. A system that is configured for computing the angle of arrival of a radio signal includes a cylindrical sheath wrapped around a cylindrical object, where the cylindrical sheath acts as a ground plane. The system further includes a plurality of antennas that are positioned about an exterior surface of the cylindrical sheath, and receivers respectively coupled to the antennas. The receivers output measurements pertaining to the radio signal. A processing circuit receives the measurements and computes the angle of arrival of the radio signal based upon the measurements.

  9. Integrated Guidance and Control Based Air-to-Air Autonomous Attack Occupation of UCAV

    OpenAIRE

    Luo, Chang; Wang, Jie; Huang, Hanqiao; Wang, Pengfei

    2016-01-01

    An approach of air-to-air autonomous attack occupation for Unmanned Combat Aerial Vehicles (UCAVs) is proposed to improve attack precision and combat effectiveness. According to the shortage of UCAV in the task of attack occupation, kinematic and dynamic models of UCAV and missile loaded on it are formed. Then, attack zone and no-escape zone are calculated by pattern search algorithm, and the optimum attack position is indicated. To arrive at the optimum attack position accurately with restri...

  10. Treatment of HAE Attacks in the Icatibant Outcome Survey

    DEFF Research Database (Denmark)

    Hernández Fernandez de Rojas, Dolores; Ibañez, Ethel; Longhurst, Hilary

    2015-01-01

    were performed (February 2008 to December 2012). RESULTS: Icatibant was used in 652 attacks in 170 patients with HAE type I/II. Most icatibant injections were self-administered (431/652, 68.5%). The proportion of self-treated attacks increased over time (40.3% in 2009 vs. 89.7% in 2012). The median......-administration of icatibant provides a complementary option to HCP administration, enabling optimization of patient care. © 2015 S. Karger AG, Basel....

  11. Analisis Explotasi Keamanan Web Denial of Service Attack

    Directory of Open Access Journals (Sweden)

    Junita Juwita Siregar

    2013-12-01

    Full Text Available Internet network which is public and global is unsafe, so the security of public Internet-based information system needs to be considered. When a data is sent from one computer to another on the Internet, it will pass through a number of other computers that are meant to give the user an opportunity to take over one or several computers. denial of service attacks is one of the web security systems which can inhibit the activity of the work of a service even turn it off, so the authorized user cannot use the service. There is an attempt of certain parties to prevent a user access to a system or network by flooding the traffic network with so much data from unregistered users. It makes the user unable to log into the network system. The purpose of this paper is to analyze the cause of the denial of service attack on a web system using literature study. The result of thisresearch is a method to overcome denial of service attack as well as the prevention techniques. This study concludes that securing techniques should be implemented extra carefully on DoS attacks (Denial-of-Service Attacks. Therefore, the attacker cannot overwhelm the network IP address and disrupt communication between a server and its client that may reject user’s request access to a system or a network service provided by a host.

  12. Activity Modelling and Comparative Evaluation of WSN MAC Security Attacks

    DEFF Research Database (Denmark)

    Pawar, Pranav M.; Nielsen, Rasmus Hjorth; Prasad, Neeli R.

    2012-01-01

    Applications of wireless sensor networks (WSNs) are growing tremendously in the domains of habitat, tele-health, industry monitoring, vehicular networks, home automation and agriculture. This trend is a strong motivation for malicious users to increase their focus on WSNs and to develop and initi......Applications of wireless sensor networks (WSNs) are growing tremendously in the domains of habitat, tele-health, industry monitoring, vehicular networks, home automation and agriculture. This trend is a strong motivation for malicious users to increase their focus on WSNs and to develop...... and initiate security attacks that disturb the normal functioning of the network in a severe manner. Such attacks affect the performance of the network by increasing the energy consumption, by reducing throughput and by inducing long delays. Of all existing WSN attacks, MAC layer attacks are considered...... the most harmful as they directly affect the available resources and thus the nodes’ energy consumption. The first endeavour of this paper is to model the activities of MAC layer security attacks to understand the flow of activities taking place when mounting the attack and when actually executing it...

  13. Vulnerability of water supply systems to cyber-physical attacks

    Science.gov (United States)

    Galelli, Stefano; Taormina, Riccardo; Tippenhauer, Nils; Salomons, Elad; Ostfeld, Avi

    2016-04-01

    The adoption of smart meters, distributed sensor networks and industrial control systems has largely improved the level of service provided by modern water supply systems. Yet, the progressive computerization exposes these critical infrastructures to cyber-physical attacks, which are generally aimed at stealing critical information (cyber-espionage) or causing service disruption (denial-of-service). Recent statistics show that water and power utilities are undergoing frequent attacks - such as the December power outage in Ukraine - , attracting the interest of operators and security agencies. Taking the security of Water Distribution Networks (WDNs) as domain of study, our work seeks to characterize the vulnerability of WDNs to cyber-physical attacks, so as to conceive adequate defense mechanisms. We extend the functionality of EPANET, which models hydraulic and water quality processes in pressurized pipe networks, to include a cyber layer vulnerable to repeated attacks. Simulation results on a medium-scale network show that several hydraulic actuators (valves and pumps, for example) can be easily attacked, causing both service disruption - i.e., water spillage and loss of pressure - and structural damages - e.g., pipes burst. Our work highlights the need for adequate countermeasures, such as attacks detection and reactive control systems.

  14. Practical evaluation of action-angle variables

    International Nuclear Information System (INIS)

    Boozer, A.H.

    1984-02-01

    A practical method is described for establishing action-angle variables for a Hamiltonian system. That is, a given nearly integrable Hamiltonian is divided into an exactly integrable system plus a perturbation in action-angle form. The transformation of variables, which is carried out using a few short trajectory integrations, permits a rapid determination of trajectory properties throughout a phase space volume

  15. Impact modeling and prediction of attacks on cyber targets

    Science.gov (United States)

    Khalili, Aram; Michalk, Brian; Alford, Lee; Henney, Chris; Gilbert, Logan

    2010-04-01

    In most organizations, IT (information technology) infrastructure exists to support the organization's mission. The threat of cyber attacks poses risks to this mission. Current network security research focuses on the threat of cyber attacks to the organization's IT infrastructure; however, the risks to the overall mission are rarely analyzed or formalized. This connection of IT infrastructure to the organization's mission is often neglected or carried out ad-hoc. Our work bridges this gap and introduces analyses and formalisms to help organizations understand the mission risks they face from cyber attacks. Modeling an organization's mission vulnerability to cyber attacks requires a description of the IT infrastructure (network model), the organization mission (business model), and how the mission relies on IT resources (correlation model). With this information, proper analysis can show which cyber resources are of tactical importance in a cyber attack, i.e., controlling them enables a large range of cyber attacks. Such analysis also reveals which IT resources contribute most to the organization's mission, i.e., lack of control over them gravely affects the mission. These results can then be used to formulate IT security strategies and explore their trade-offs, which leads to better incident response. This paper presents our methodology for encoding IT infrastructure, organization mission and correlations, our analysis framework, as well as initial experimental results and conclusions.

  16. Asessing ethical severity of e-learning systems security attacks

    OpenAIRE

    Levy, Y; Ramim, MM; Hackney, RA

    2013-01-01

    Security and ethical issues with information systems (IS) are important concerns for most organizations. However, limited attention has been given to unethical behaviors and severity of cyber-security attacks, while these instances appear to be critically important. Although managers have been embracing e-learning systems for training and virtual-team collaborations, little is known about motivations for cyber-security attacks on such systems The JCIS editor-in-chief Dr. Alex Koohang and t...

  17. Experimental study of crossing angle collision

    International Nuclear Information System (INIS)

    Chen, T.; Rice, D.; Rubin, D.; Sagan, D.; Tigner, M.

    1993-05-01

    The non-linear coupling due to the beam-beam interaction with crossing angle has been studied. The major effect of a small (∼12mrad) crossing angle is to excite 5Q x ±Q s =integer coupling resonance family on large amplitude particles, which results in bad lifetime. On the CESR, a small crossing angle (∼2.4mr) was created at the IP and a reasonable beam-beam tune-shift was achieved. The decay rate of the beam is measured as a function of horizontal tune with and without crossing angle. The theoretical analysis, simulation and experimental measurements have a good agreement. The resonance strength as a function of crossing angle is also measured

  18. Experimental study of crossing angle collision

    International Nuclear Information System (INIS)

    Chen, T.; Rice, D.; Rubin, D.; Sagan, D.; Tigner, M.

    1993-01-01

    The non-linear coupling due to the beam-beam interaction with crossing angle has been studied. The major effect of a small (∼12mrad) crossing angle is to excite 5Q x ±Q s =integer coupling resonance family on large amplitude particles, which results in bad lifetime. On the CESR, a small crossing angle (∼2.4mr) was created at the IP and a reasonable beam-beam tune-shift was achieved. The decay rate of the beam is measured as a function of horizontal tune with and without crossing angle. The theoretical analysis, simulation and experimental measurements have a good agreement. The resonance strength as a function of crossing angle is also measured

  19. Investigation of impingement attack mechanism of copper alloy condenser tubes

    International Nuclear Information System (INIS)

    Fukumura, Takuya; Nakajima, Nobuo; Arioka, Koji; Totsuka, Nobuo; Nakagawa, Tomokazu

    2001-01-01

    In order to investigate generation and growth mechanisms of impingement attacks of sea water against copper alloy condenser tubes used in condensers of nuclear power plants, we took out condenser tubes from actual condensers, cut them into several pieces and carried out several material tests mainly for impinged spots. In addition water flow inside of a pit was analyzed. From the results of the investigation, it was found that all of impingement attacks were found in the marks left by sessile organisms and none were found in downstream of the marks as frequently proposed so far. At the pits generated inside the marks, iron coating was striped and zinc content was deficient in some cases. Combining these data and the result of flow analysis, we considered the following mechanism of the impingement attacks: sessile organisms clinging to the surface of the condenser tube and growth, occlusion of the tube, extinction and decomposition of sessile organisms, pollution corrosion under the organisms and cavity formation, occlusion removal by the cleaning, generation of impingement attacks by flow collision inside the cavity, growth of the impingement attacks. (author)

  20. A Strategic Analysis of Information Sharing Among Cyber Attackers

    Directory of Open Access Journals (Sweden)

    Kjell Hausken

    2015-10-01

    Full Text Available We build a game theory model where the market design is such that one firm invests in security to defend against cyber attacks by two hackers. The firm has an asset, which is allocated between the three market participants dependent on their contest success. Each hacker chooses an optimal attack, and they share information with each other about the firm’s vulnerabilities. Each hacker prefers to receive information, but delivering information gives competitive advantage to the other hacker. We find that each hacker’s attack and information sharing are strategic complements while one hacker’s attack and the other hacker’s information sharing are strategic substitutes. As the firm’s unit defense cost increases, the attack is inverse U-shaped and reaches zero, while the firm’s defense and profit decrease, and the hackers’ information sharing and profit increase. The firm’s profit increases in the hackers’ unit cost of attack, while the hackers’ information sharing and profit decrease. Our analysis also reveals the interesting result that the cumulative attack level of the hackers is not affected by the effectiveness of information sharing between them and moreover, is also unaffected by the intensity of joint information sharing. We also find that as the effectiveness of information sharing between hackers increases relative to the investment in attack, the firm’s investment in cyber security defense and profit are constant, the hackers’ investments in attacks decrease, and information sharing levels and hacker profits increase. In contrast, as the intensity of joint information sharing increases, while the firm’s investment in cyber security defense and profit remain constant, the hackers’ investments in attacks increase, and the hackers’ information sharing levels and profits decrease. Increasing the firm’s asset causes all the variables to increase linearly, except information sharing which is constant. We extend

  1. Solid angles III. The role of conformers in solid angle calculations

    CSIR Research Space (South Africa)

    White, D

    1995-06-14

    Full Text Available The values of the solid angles Omega for a range of commonly encountered ligands in organometallic chemistry (phosphines, phosphites, amines, arsines and cyclopentadienyl rings) have been determined. The solid angles were derived from a single...

  2. Attacks, applications, and evaluation of known watermarking algorithms with Checkmark

    Science.gov (United States)

    Meerwald, Peter; Pereira, Shelby

    2002-04-01

    The Checkmark benchmarking tool was introduced to provide a framework for application-oriented evaluation of watermarking schemes. In this article we introduce new attacks and applications into the existing Checkmark framework. In addition to describing new attacks and applications, we also compare the performance of some well-known watermarking algorithms (proposed by Bruyndonckx,Cox, Fridrich, Dugad, Kim, Wang, Xia, Xie, Zhu and Pereira) with respect to the Checkmark benchmark. In particular, we consider the non-geometric application which contains tests that do not change the geometry of image. This attack constraint is artificial, but yet important for research purposes since a number of algorithms may be interesting, but would score poorly with respect to specific applications simply because geometric compensation has not been incorporated. We note, however, that with the help of image registration, even research algorithms that do not have counter-measures against geometric distortion -- such as a template or reference watermark -- can be evaluated. In the first version of the Checkmark benchmarking program, application-oriented evaluation was introduced, along with many new attacks not already considered in the literature. A second goal of this paper is to introduce new attacks and new applications into the Checkmark framework. In particular, we introduce the following new applications: video frame watermarking, medical imaging and watermarking of logos. Video frame watermarking includes low compression attacks and distortions which warp the edges of the video as well as general projective transformations which may result from someone filming the screen at a cinema. With respect to medical imaging, only small distortions are considered and furthermore it is essential that no distortions are present at embedding. Finally for logos, we consider images of small sizes and particularly compression, scaling, aspect ratio and other small distortions. The challenge

  3. Interval forecasting of cyber-attacks on industrial control systems

    Science.gov (United States)

    Ivanyo, Y. M.; Krakovsky, Y. M.; Luzgin, A. N.

    2018-03-01

    At present, cyber-security issues of industrial control systems occupy one of the key niches in a state system of planning and management Functional disruption of these systems via cyber-attacks may lead to emergencies related to loss of life, environmental disasters, major financial and economic damage, or disrupted activities of cities and settlements. There is then an urgent need to develop protection methods against cyber-attacks. This paper studied the results of cyber-attack interval forecasting with a pre-set intensity level of cyber-attacks. Interval forecasting is the forecasting of one interval from two predetermined ones in which a future value of the indicator will be obtained. For this, probability estimates of these events were used. For interval forecasting, a probabilistic neural network with a dynamic updating value of the smoothing parameter was used. A dividing bound of these intervals was determined by a calculation method based on statistical characteristics of the indicator. The number of cyber-attacks per hour that were received through a honeypot from March to September 2013 for the group ‘zeppo-norcal’ was selected as the indicator.

  4. Automatic analysis of attack data from distributed honeypot network

    Science.gov (United States)

    Safarik, Jakub; Voznak, MIroslav; Rezac, Filip; Partila, Pavol; Tomala, Karel

    2013-05-01

    There are many ways of getting real data about malicious activity in a network. One of them relies on masquerading monitoring servers as a production one. These servers are called honeypots and data about attacks on them brings us valuable information about actual attacks and techniques used by hackers. The article describes distributed topology of honeypots, which was developed with a strong orientation on monitoring of IP telephony traffic. IP telephony servers can be easily exposed to various types of attacks, and without protection, this situation can lead to loss of money and other unpleasant consequences. Using a distributed topology with honeypots placed in different geological locations and networks provides more valuable and independent results. With automatic system of gathering information from all honeypots, it is possible to work with all information on one centralized point. Communication between honeypots and centralized data store use secure SSH tunnels and server communicates only with authorized honeypots. The centralized server also automatically analyses data from each honeypot. Results of this analysis and also other statistical data about malicious activity are simply accessible through a built-in web server. All statistical and analysis reports serve as information basis for an algorithm which classifies different types of used VoIP attacks. The web interface then brings a tool for quick comparison and evaluation of actual attacks in all monitored networks. The article describes both, the honeypots nodes in distributed architecture, which monitor suspicious activity, and also methods and algorithms used on the server side for analysis of gathered data.

  5. The accountability problem of flooding attacks in service-oriented architectures

    DEFF Research Database (Denmark)

    Jensen, Meiko; Schwenk, Jörg

    2009-01-01

    The threat of Denial of Service attacks poses a serious problem to the security of network-based services in general. For flooding attacks against service-oriented applications, this threat is dramatically amplified with potentially much higher impact and very little effort on the attacker's side...... flooding attack model, we illustrate the problem's parameters, and we finally discuss some general solution approaches....

  6. On the potential of IPv6 open resolvers for DDoS attacks

    NARCIS (Netherlands)

    Hendriks, Luuk; de Oliveira Schmidt, Ricardo; van Rijswijk-Deij, Roland; Pras, Aiko; Kaafar, Mohamed Ali; Uhlig, Steve; Amann, Johanna

    2017-01-01

    Distributed Denial of Service (DDoS) attacks have become a daily problem in today’s Internet. These attacks aim at overwhelm- ing online services or network infrastrucure. Some DDoS attacks explore open services to perform reflected and amplified attacks; and the DNS is one of the most (mis)used

  7. A video-polygraphic analysis of the cataplectic attack

    DEFF Research Database (Denmark)

    Rubboli, G; d'Orsi, G; Zaniboni, A

    2000-01-01

    OBJECTIVES AND METHODS: To perform a video-polygraphic analysis of 11 cataplectic attacks in a 39-year-old narcoleptic patient, correlating clinical manifestations with polygraphic findings. Polygraphic recordings monitored EEG, EMG activity from several cranial, trunk, upper and lower limbs...... muscles, eye movements, EKG, thoracic respiration. RESULTS: Eleven attacks were recorded, all of them lasting less than 1 min and ending with the fall of the patient to the ground. We identified, based on the video-polygraphic analysis of the episodes, 3 phases: initial phase, characterized essentially...... with bradycardia, that was maximal during the atonic phase. CONCLUSIONS: Analysis of the muscular phenomena that characterize cataplectic attacks in a standing patient suggests that the cataplectic fall occurs with a pattern that might result from the interaction between neuronal networks mediating muscular atonia...

  8. Efficacy of nebulized furosemide in children with moderate attack of ...

    African Journals Online (AJOL)

    Efficacy of nebulized furosemide in children with moderate attack of asthma. M Alshehri, T Almegamesi, A Alfrayh. Abstract. No Abstract. West African Journal of Medicine Vol. 24(3) 2005: 246-251. Full Text: EMAIL FREE FULL TEXT EMAIL FREE FULL TEXT · DOWNLOAD FULL TEXT DOWNLOAD FULL TEXT.

  9. [The hospital care of victims of terrorist attacks].

    Science.gov (United States)

    Bouhaddou, Assena; Nion, Nathalie; Riou, Bruno; Blandeau, Fanny; Moreau, Pilar; Guemache, Sofia

    2017-04-01

    The treatment of victims of terrorist attacks in a trauma centre requires the putting in place of plans, training and simulation exercises. Previous experiences have highlighted the areas which require improvement. As exceptional health situations are unpredictable, it is essential to always be vigilant and prepared for an unforeseen event. Copyright © 2017 Elsevier Masson SAS. All rights reserved.

  10. Computing Preferred Extensions for Argumentation Systems with Sets of Attacking

    DEFF Research Database (Denmark)

    Nielsen, Søren Holbech; Parsons, Simon

    2006-01-01

    The hitherto most abstract, and hence general, argumentation system, is the one described by Dung in a paper from 1995. This framework does not allow for joint attacks on arguments, but in a recent paper we adapted it to support such attacks, and proved that this adapted framework enjoyed the same...... formal properties as that of Dung. One problem posed by Dung's original framework, which was neglected for some time, is how to compute preferred extensions of the argumentation systems. However, in 2001, in a paper by Doutre and Mengin, a procedure was given for enumerating preferred extensions...... for these systems. In this paper we propose a method for enumerating preferred extensions of the potentially more complex systems, where joint attacks are allowed. The method is inspired by the one given by Doutre and Mengin....

  11. Possibility of spoof attack against robustness of multibiometric authentication systems

    Science.gov (United States)

    Hariri, Mahdi; Shokouhi, Shahriar Baradaran

    2011-07-01

    Multibiometric systems have been recently developed in order to overcome some weaknesses of single biometric authentication systems, but security of these systems against spoofing has not received enough attention. In this paper, we propose a novel practical method for simulation of possibilities of spoof attacks against a biometric authentication system. Using this method, we model matching scores from standard to completely spoofed genuine samples. Sum, product, and Bayes fusion rules are applied for score level combination. The security of multimodal authentication systems are examined and compared with the single systems against various spoof possibilities. However, vulnerability of fused systems is considerably increased against spoofing, but their robustness is generally higher than single matcher systems. In this paper we show that robustness of a combined system is not always higher than a single system against spoof attack. We propose empirical methods for upgrading the security of multibiometric systems, which contain how to organize and select biometric traits and matchers against various possibilities of spoof attack. These methods provide considerable robustness and present an appropriate reason for using combined systems against spoof attacks.

  12. Impact of Cyber Attacks on High Voltage DC Transmission Damping Control

    Directory of Open Access Journals (Sweden)

    Rui Fan

    2018-04-01

    Full Text Available Hybrid AC/HVDC (AC-HVDC grids have evolved to become huge cyber-physical systems that are vulnerable to cyber attacks because of the wide attack surface and increasing dependence on intelligent electronic devices, computing resources and communication networks. This paper, for the first time, studies the impact of cyber attacks on HVDC transmission oscillation damping control.Three kinds of cyber attack models are considered: timing attack, replay attack and false data injection attack. Followed by a brief introduction of the HVDC model and conventional oscillation damping control method, the design of three attack models is described in the paper. These attacks are tested on a modified IEEE New England 39-Bus AC-HVDC system. Simulation results have shown that all three kinds of attacks are capable of driving the AC-HVDC system into large oscillations or even unstable conditions.

  13. Enumeration and estimation of insect attack fruits of some cultivars ...

    African Journals Online (AJOL)

    In this study, five cultivars of Punica granatum identified (two of which are endemic, while the other three are new) were grown in certain farms at Al-Taif, Saudi Arabia. Enumeration to the insects attack its' fruits illustrated that, there are three insects, namely, Virchola livia, Ectomyelois ceratonia and Pseudococcus maitimus ...

  14. Attacks to Cryptography Protocols of Wireless Industrial Communication Systems

    Directory of Open Access Journals (Sweden)

    Tomas Ondrasina

    2010-01-01

    Full Text Available The paper deals with problems of safety and security principles within wireless industrial communication systems. First safety requirements to wireless industrial communication system, summarisation of attack methods and the available measures for risks elimination are described with orientation to safety critical applications. The mainly part is oriented to identification of risks and summarisation of defensive methods of wireless communication based on cryptographic techniques. Practical part the cryptoanalytic’s attacks to COTS (Commercial Off-The-Shelf wireless communications are mentioned based on the IEEE 802.11 standards.

  15. Comparison of acute phase response during attack and attack-free period in children with Familial Mediterranean Fever

    Directory of Open Access Journals (Sweden)

    Erdal Çakmak

    2013-06-01

    Full Text Available Objective: The aim of this study was to compare acutephase reactant (AFR levels at attack period and attackfreeperiod under colchicine treatment in children with FamilialMediterranean Fever (FMF.Methods: The diagnosis of FMF was done based on clinicalcriteria and patients were prospectively followed upfor average of 1.2 years. Symptom-onset age, age at diagnosis,clinical symptoms and features of FMF attackswere recorded. MEFV gene mutations were detected byreverse hybridization (strip assay method. Peripheralblood leukocyte count, erythrocyte sedimentation rate(ESR, C-reactive protein (CRP and blood fibrinogen levelswere measured by standard methods, both at attackperiod and during attack-free period.Results: Totally 105 (55 girls, 50 boys children with FMFwere included. The mean age was 8.9±3.2 years, meansymptom onset age was 5.9 years and mean age at diagnosiswas 8.1 years. MEFV gene mutations were asfollows: E148Q (29.2%, M694V (24.8%, R761H (15.3%and V726A (13.1%. The mean AFR values were overnormal values in attack period and there was at least onehigh AFR level in 80.0% of patients. In attack-free period,although the mean values of all AFRs were within normallimits, 31.4% of patients had at least one high AFR level.Conclusion: Based on these data, one-third of FMF childrenhad a high AFR level, which may be a marker of subclinicalinflammation. In children with continuous inflammationduring attack-free period, a new anti-inflammatorydrug additional to colchicine can be considered in order toprevent complications of chronic inflammation. J Clin ExpInvest 2013; 4 (2: 213-218Key words: Familial Mediterranean Fever, acute phasereactants, children, attack period, attack-free period

  16. Evaluation of susceptibility of some elite cowpea cultivars to attack ...

    African Journals Online (AJOL)

    Fifteen elite cowpea cultivars were evaluated for their susceptibility to attack and damage by the most destructive storage pest, Callosobruchus maculatus (F.), based on the number of eggs laid, total developmental time, percentage adult emergence, seed weight loss, and growth index. Significantly, more eggs were laid on ...

  17. Solar cell angle of incidence corrections

    Science.gov (United States)

    Burger, Dale R.; Mueller, Robert L.

    1995-01-01

    Literature on solar array angle of incidence corrections was found to be sparse and contained no tabular data for support. This lack along with recent data on 27 GaAs/Ge 4 cm by 4 cm cells initiated the analysis presented in this paper. The literature cites seven possible contributors to angle of incidence effects: cosine, optical front surface, edge, shadowing, UV degradation, particulate soiling, and background color. Only the first three are covered in this paper due to lack of sufficient data. The cosine correction is commonly used but is not sufficient when the incident angle is large. Fresnel reflection calculations require knowledge of the index of refraction of the coverglass front surface. The absolute index of refraction for the coverglass front surface was not known nor was it measured due to lack of funds. However, a value for the index of refraction was obtained by examining how the prediction errors varied with different assumed indices and selecting the best fit to the set of measured values. Corrections using front surface Fresnel reflection along with the cosine correction give very good predictive results when compared to measured data, except there is a definite trend away from predicted values at the larger incident angles. This trend could be related to edge effects and is illustrated by a use of a box plot of the errors and by plotting the deviation of the mean against incidence angle. The trend is for larger deviations at larger incidence angles and there may be a fourth order effect involved in the trend. A chi-squared test was used to determine if the measurement errors were normally distributed. At 10 degrees the chi-squared test failed, probably due to the very small numbers involved or a bias from the measurement procedure. All other angles showed a good fit to the normal distribution with increasing goodness-of-fit as the angles increased which reinforces the very small numbers hypothesis. The contributed data only went to 65 degrees

  18. Performance analysis of DoS LAND attack detection

    Directory of Open Access Journals (Sweden)

    Deepak Kshirsagar

    2016-09-01

    This paper proposes the intrusion detection mechanism for DoS detection such as Local Area Network Denial (LAND, which classified into the Network Traffic Analyzer, Traffic Features Identification and Extraction, IP spoofing based attack detection and Intruder Information. This system efficiently detects DoS LAND based on IP spoofing. This system analyzes the network resources consumed by an attacker. The system is implemented and tested using open source tools. The experimental result shows that, the proposed system produces better performance in comparison with state-of-art existing system and result into a low level of memory and CPU usage.

  19. Impact of Acid Attack on the Shear Behaviour of a Carbonate Rock Joint

    Science.gov (United States)

    Nouailletas, O.; Perlot, C.; Rivard, P.; Ballivy, G.; La Borderie, C.

    2017-06-01

    The mechanical behaviour of structural discontinuities in rock mass is a key element of the stability analysis in civil engineering, petroleum engineering and mining engineering. In this paper, the mechanical analysis is coupled with the acidic attack of a rock joint associated with leakage of CO2 through a geological fault in the context of carbon sequestration. Experiments were conducted at the laboratory scale to assess the shear behaviour of degraded joint: direct shear tests were performed on rock joints that have been previously immersed into water or into an acidic solution (pH 0.2). The shear behaviour of joints is governed by the roughness of its walls: the parameters Z2, Z3, Z4 and RL characterize the rough surfaces. They are calculated from the scans of joint surfaces after and before immersion. Their comparison pointed out a slight impact of the acidic attack. However, the results of the direct shear tests show significant modifications in the shear behaviour for the degraded joints: the tangential stress peak disappears, the tangential stiffness decreases in the stress/displacement curve, and the contraction increases, the dilation angle decreases in the dilation curve. Acid attack has a greater impact on the mechanical properties of the asperities than their geometric characteristics. The results of this study will be used to improve chemo-mechanical modelling to better simulate with higher accuracy the fault stability in different cases of civil engineering, petroleum engineering and mining engineering.

  20. ATTACK ON WATER BY CARBON OF SOLID FUEL

    Directory of Open Access Journals (Sweden)

    N. S. Nazarov

    2008-01-01

    Full Text Available The paper considers a continuous method for attack of high temperature water steam by carbon of solid fuel (coke. Design of water-coal gas generator and experimental stand, methodology for  measurements of parameters of water-coal gasification are described in the paper.

  1. The Increasing Complexity of Hacker Attacks on Personal and ...

    African Journals Online (AJOL)

    Information Technology and associated tools have brought both blessing and curse to humanity. In spite of awe-inspiring attacks of hackers and malware writers, the immense benefits of this technology have prevented many from withdrawing from its use. Just any one is affected by the services of Information Technology ...

  2. First Attack of Acute Urticaria in Pediatric Emergency Department

    Directory of Open Access Journals (Sweden)

    Tzu-Hsuan Liu

    2008-06-01

    Conclusion: Detailed etiologies of first-attack urticaria in children in central Taiwan were analyzed. Most importantly, we found that there was a decrease in the prevalence of various infections as causative factors as the age of the children increased. The etiologies of foods and medications were more prevalent in adolescents than in younger children.

  3. Nursery Pest Management of Phytolyma lata Walker (Scott) Attack ...

    African Journals Online (AJOL)

    The establishment of plantations of Milicia excelsa has been constrained by the gall-forming psyllid Phytolyma lata Walker (Scott) that causes extensive damage to young plants. We present findings of an experiment aimed at preventing Phytolyma attack on Milicia seedlings in the nursery using chemical control and ...

  4. Optimality of Gaussian attacks in continuous-variable quantum cryptography.

    Science.gov (United States)

    Navascués, Miguel; Grosshans, Frédéric; Acín, Antonio

    2006-11-10

    We analyze the asymptotic security of the family of Gaussian modulated quantum key distribution protocols for continuous-variables systems. We prove that the Gaussian unitary attack is optimal for all the considered bounds on the key rate when the first and second momenta of the canonical variables involved are known by the honest parties.

  5. Response of the International Community to Terrorist Attacks in ...

    African Journals Online (AJOL)

    This article provides a synoptic account of the activities of one such group, Boko Haram, in Nigeria, comparing it with the much publicised Paris terror attacks. The common thread linking these terror cases is a strong Islamist influence behind them, and their ultimate aim of sentencing as many targeted victims as possible to ...

  6. Reliably determining data leakage in the presence of strong attackers

    NARCIS (Netherlands)

    Bortolameotti, R.; Peter, A.; Everts, M.H.; Jonker, W.; Hartel, P.

    2016-01-01

    We address the problem of determining what data has been leaked from a system after its recovery from a successful attack. This is a forensic process which is relevant to give a better understanding of the impact of a data breach, but more importantly it is becoming mandatory according to the recent

  7. Annual Frequency of Malaria Attack in Different Haemoglobin ...

    African Journals Online (AJOL)

    GREG F. FOMBO

    hosts through reduction of severe malarial anaemia, density parasitaemia and clinical malarial symptoms while having less effect on frequency of infection perse. ... rocked gently to mix the blood and the anti-coagulant. However, blood ..... attack should be elucidated and also the detrimental effects of. G6PD deficiency gene ...

  8. Novel mechanism of network protection against the new generation of cyber attacks

    Science.gov (United States)

    Milovanov, Alexander; Bukshpun, Leonid; Pradhan, Ranjit

    2012-06-01

    A new intelligent mechanism is presented to protect networks against the new generation of cyber attacks. This mechanism integrates TCP/UDP/IP protocol stack protection and attacker/intruder deception to eliminate existing TCP/UDP/IP protocol stack vulnerabilities. It allows to detect currently undetectable, highly distributed, low-frequency attacks such as distributed denial-of-service (DDoS) attacks, coordinated attacks, botnet, and stealth network reconnaissance. The mechanism also allows insulating attacker/intruder from the network and redirecting the attack to a simulated network acting as a decoy. As a result, network security personnel gain sufficient time to defend the network and collect the attack information. The presented approach can be incorporated into wireless or wired networks that require protection against known and the new generation of cyber attacks.

  9. Vulnerabilities in GSM technology and feasibility of selected attacks

    Science.gov (United States)

    Voznak, M.; Prokes, M.; Sevcik, L.; Frnda, J.; Toral-Cruz, Homer; Jakovlev, Sergej; Fazio, Peppino; Mehic, M.; Mikulec, M.

    2015-05-01

    Global System for Mobile communication (GSM) is the most widespread technology for mobile communications in the world and serving over 7 billion users. Since first publication of system documentation there has been notified a potential safety problem's occurrence. Selected types of attacks, based on the analysis of the technical feasibility and the degree of risk of these weaknesses, were implemented and demonstrated in laboratory of the VSB-Technical University of Ostrava, Czech Republic. These vulnerabilities were analyzed and afterwards possible attacks were described. These attacks were implemented using open-source tools, software programmable radio USRP (Universal Software RadioPeripheral) and DVB-T (Digital Video Broadcasting - Terrestrial) receiver. GSM security architecture is being scrutinized since first public releases of its specification mainly pointing out weaknesses in authentication and ciphering mechanisms. This contribution also summarizes practically proofed and used scenarios that are performed using opensource software tools and variety of scripts mostly written in Python. Main goal of this paper is in analyzing security issues in GSM network and practical demonstration of selected attacks.

  10. Digital Investigation of Security Attacks on Cardiac Implantable Medical Devices

    Directory of Open Access Journals (Sweden)

    Nourhene Ellouze

    2014-10-01

    Full Text Available A Cardiac Implantable Medical device (IMD is a device, which is surgically implanted into a patient's body, and wirelessly configured using an external programmer by prescribing physicians and doctors. A set of lethal attacks targeting these devices can be conducted due to the use of vulnerable wireless communication and security protocols, and the lack of security protection mechanisms deployed on IMDs. In this paper, we propose a system for postmortem analysis of lethal attack scenarios targeting cardiac IMDs. Such a system reconciles in the same framework conclusions derived by technical investigators and deductions generated by pathologists. An inference system integrating a library of medical rules is used to automatically infer potential medical scenarios that could have led to the death of a patient. A Model Checking based formal technique allowing the reconstruction of potential technical attack scenarios on the IMD, starting from the collected evidence, is also proposed. A correlation between the results obtained by the two techniques allows to prove whether a potential attack scenario is the source of the patient's death.

  11. Pitfalls in management of acute gouty attack, a qualitative research ...

    African Journals Online (AJOL)

    Objective: To probe doctors' attitudes and reveal wrong perception in the management of acute gouty attacks. Design: A descriptive study using a designed questionnaire that was completed through face to face interviews in hospitals, health units and polyclinics in the Makah Region. Method: This is a qualitative study of ...

  12. An Investigation of Kernel Data Attacks and Countermeasures

    Science.gov (United States)

    2017-02-14

    demonstrate that attackers can stealthily subvert various kernel security mechanism s and develop a new keylogger , which is more stealthy than existing... keyloggers .. By classifying kernel data into different categories and handling them separately, we propose a defense mechanism and evaluate its...a computer system. 15. SUBJECT TERMS Kernel Data, Rootkit, Keylogger , Countermeasure 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF a. REPORT b

  13. Increasing the Mission Capability of the Attack Submarine Force

    National Research Council Canada - National Science Library

    Labs, Eric

    2002-01-01

    Today's U.S. Navy fleet includes 54 attack submarines (SSNs). In 1999, the Chairman of the Joint Chiefs of Staff released a study concluding that the Navy would need 68 SSNs by 2015 and 76 by 2025 to carry out critical peacetime missions...

  14. Predictability of future attacks by migraineurs: a prospective observational study.

    Science.gov (United States)

    Hu, X Henry; Golden, Wendy; Bolge, Susan C; Katic, Bozena; Chen, Ya-Ting; Wagner, Samuel; Cady, Roger

    2010-09-01

    To determine the predictability of future migraine attacks and to describe the effect of migraine on daily life during and between migraine attacks. Migraine is associated with substantial economic and humanistic burden. There is growing evidence that early intervention with triptans results in better treatment outcomes. However, this is dependent on a patient's preparedness for an attack including having abortive medications readily accessible at headache onset. Physician-diagnosed adult migraine sufferers, who treat with prescription or over-the-counter medications, completed 2 self-reported, Internet-based questionnaires, administered at baseline and following the resolution of the next migraine attack. The baseline questionnaire included the Migraine Disability Assessment questionnaire (MIDAS), questions about experiences on days between attacks, predictions of the date, time of day (5 time windows), and sufferer's location (4 places) at the start of their next migraine. At follow-up, information was collected in the similar fashion about the date, time of day, and sufferer's location at the start of their most recent migraine. A total of 1519 migraine sufferers completed the baseline questionnaire and 877 (57.7%) completed the follow-up. At baseline, 58.7% experienced moderate to severe disability from headache, based on MIDAS. Only 4.0% were able to predict the exact date of their next migraine; 21.24% predicted next migraine within 3 days. Larger proportions (46.6%) were able to accurately predict time of day or location (70.7%) of their next migraine. In the past 3 months, 92.6% reported that they were forced to change daily plans because of migraine. Because of fear of getting a migraine, 20.2% had avoided and 27.0% had changed a work commitment, and 27.3% had avoided and 28.2% had changed social plans. Migraine sufferers are generally unable to predict onset of the next migraine. Lack of predictability heightens the importance of education and

  15. Auricular electroacupuncture reduces frequency and severity of Raynaud attacks.

    Science.gov (United States)

    Schlager, Oliver; Gschwandtner, Michael E; Mlekusch, Irene; Herberg, Karin; Frohner, Tanja; Schillinger, Martin; Koppensteiner, Renate; Mlekusch, Wolfgang

    2011-02-01

    Acupuncture has been shown to influence skin perfusion and the subjective cold perception threshold. Therefore, we hypothesized that auricular electroacupuncture (EA) might reduce symptoms in primary Raynaud's phenomenon (PRP). Twenty-six patients with PRP received 6 cycles of auricular EA. After 3, 6 and 24 weeks attack frequency and severity were reevaluated using standardized questionnaires and a visual analogue scale (VAS). Skin temperature was assessed by infrared thermography and laser Doppler perfusion imaging was used to determine skin perfusion. Compared to baseline we found a significant reduction of attack frequency after 3 (p = 0.001) and 6 weeks (p < 0.001) of auricular EA. This improvement sustained following cessation of EA, after 24 weeks (p < 0.001). Furthermore, attack associated pain was reduced after 3 (p = 0.003), 6 (p = 0.003) and 24 weeks (p = 0.001) of treatment, while skin temperature and skin perfusion did not change significantly throughout the study period. Auricular EA reduces symptoms by means of frequency and severity of attacks in PRP but has no influence on skin perfusion and skin temperature.

  16. Flocking and invariance of velocity angles.

    Science.gov (United States)

    Liu, Le; Huang, Lihong; Wu, Jianhong

    2016-04-01

    Motsch and Tadmor considered an extended Cucker-Smale model to investigate the flocking behavior of self-organized systems of interacting species. In this extended model, a cone of the vision was introduced so that outside the cone the influence of one agent on the other is lost and hence the corresponding influence function takes the value zero. This creates a problem to apply the Motsch-Tadmor and Cucker-Smale method to prove the flocking property of the system. Here, we examine the variation of the velocity angles between two arbitrary agents, and obtain a monotonicity property for the maximum cone of velocity angles. This monotonicity permits us to utilize existing arguments to show the flocking property of the system under consideration, when the initial velocity angles satisfy some minor technical constraints.

  17. Precision measurements of the CKM angle gamma

    CERN Multimedia

    CERN. Geneva

    2016-01-01

    The level of CP-violation permitted within the Standard Model cannot account for the matter dominated universe in which we live. Within the Standard Model the CKM matrix, which describes the quark couplings, is expected to be unitary. By making precise measurements of the CKM matrix parameters new physics models can be constrained, or with sufficient precision the effects of physics beyond the standard model might become apparent. The CKM angle gamma is the least well known angle of the unitarity triangle. It is the only angle easily accessible at tree-level, and furthermore has almost no theoretical uncertainties. Therefore it provides an invaluable Standard Model benchmark against which other new physics sensitive tests of the CP-violation can be made. I will discuss recent measurements of gamma using the the Run 1 LHCb dataset, which improve our knowledge of this key parameter.

  18. Polar bear attacks on humans: Implications of a changing climate

    Science.gov (United States)

    Wilder, James; Vongraven, Dag; Atwood, Todd C.; Hansen, Bob; Jessen, Amalie; Kochnev, Anatoly A.; York, Geoff; Vallender, Rachel; Hedman, Daryll; Gibbons, Melissa

    2017-01-01

    Understanding causes of polar bear (Ursus maritimus) attacks on humans is critical to ensuring both human safety and polar bear conservation. Although considerable attention has been focused on understanding black (U. americanus) and grizzly (U. arctos) bear conflicts with humans, there have been few attempts to systematically collect, analyze, and interpret available information on human-polar bear conflicts across their range. To help fill this knowledge gap, a database was developed (Polar Bear-Human Information Management System [PBHIMS]) to facilitate the range-wide collection and analysis of human-polar bear conflict data. We populated the PBHIMS with data collected throughout the polar bear range, analyzed polar bear attacks on people, and found that reported attacks have been extremely rare. From 1870–2014, we documented 73 attacks by wild polar bears, distributed among the 5 polar bear Range States (Canada, Greenland, Norway, Russia, and United States), which resulted in 20 human fatalities and 63 human injuries. We found that nutritionally stressed adult male polar bears were the most likely to pose threats to human safety. Attacks by adult females were rare, and most were attributed to defense of cubs. We judged that bears acted as a predator in most attacks, and that nearly all attacks involved ≤2 people. Increased concern for both human and bear safety is warranted in light of predictions of increased numbers of nutritionally stressed bears spending longer amounts of time on land near people because of the loss of their sea ice habitat. Improved conflict investigation is needed to collect accurate and relevant data and communicate accurate bear safety messages and mitigation strategies to the public. With better information, people can take proactive measures in polar bear habitat to ensure their safety and prevent conflicts with polar bears. This work represents an important first step towards improving our understanding of factors influencing

  19. Evaluation of corrosion attack of chimney liners

    Directory of Open Access Journals (Sweden)

    Blahetová M.

    2016-06-01

    Full Text Available The case study of chimney liner corrosion addresses three specific cases of damage of chimney systems from of stainless steels. These systems were used for flue of gas arising from the combustion of brown coal in small automatic boilers, which are used for heating. Detailed analyzes implied that the cause of devastating corrosion of the steel AISI 316 and 304 steel (CSN 17349, 17241 was particularly high content of halides (chlorides and fluorides, which caused a severe pitting corrosion, which led up to the perforation of the liner material. Simultaneous reduction of the thickness of the used sheets was due to by the general corrosion, which was caused by the sulfur in the solid fuel. The condensation then led to acid environment and therefore the corrosion below the dew point of the sulfuric acid has occurred. All is documented by metallographic analysis and microanalysis of the corrosion products.

  20. The anatomy of a shark attack: a case report and review of the literature.

    Science.gov (United States)

    Caldicott, D G; Mahajani, R; Kuhn, M

    2001-07-01

    Shark attacks are rare but are associated with a high morbidity and significant mortality. We report the case of a patient's survival from a shark attack and their subsequent emergency medical and surgical management. Using data from the International Shark Attack File, we review the worldwide distribution and incidence of shark attack. A review of the world literature examines the features which make shark attacks unique pathological processes. We offer suggestions for strategies of management of shark attack, and techniques for avoiding adverse outcomes in human encounters with these endangered creatures.

  1. Pitfalls in management of acute gouty attack, a qualitative research ...

    African Journals Online (AJOL)

    Hamid Mustafa

    2014-05-17

    May 17, 2014 ... Abstract Objective: To probe doctors' attitudes and reveal wrong perception in the management of acute gouty attacks. Design: A descriptive study using a designed questionnaire that was completed through face to face interviews in hospitals, health units and polyclinics in the Makah Region. Method: This ...

  2. Detection and isolation of routing attacks through sensor watermarking

    NARCIS (Netherlands)

    Ferrari, R.; Herdeiro Teixeira, A.M.; Sun, J; Jiang, Z-P

    2017-01-01

    In networked control systems, leveraging the peculiarities of the cyber-physical domains and their interactions may lead to novel detection and defense mechanisms against malicious cyber-attacks. In this paper, we propose a multiplicative sensor watermarking scheme, where each sensor's output is

  3. On the Estimation of the k-RSA Attack

    Directory of Open Access Journals (Sweden)

    Anatoliy Sergeyevich Makeyev

    2016-03-01

    Full Text Available In this paper, we discuss the attack on the RSA cryptosystem with  modules (≥2. We also provide estimation of the attacks’s complexity. Finally, we give the experimental results for different modules and open exponents.

  4. A video-polygraphic analysis of the cataplectic attack

    DEFF Research Database (Denmark)

    Rubboli, G; d'Orsi, G; Zaniboni, A

    2000-01-01

    OBJECTIVES AND METHODS: To perform a video-polygraphic analysis of 11 cataplectic attacks in a 39-year-old narcoleptic patient, correlating clinical manifestations with polygraphic findings. Polygraphic recordings monitored EEG, EMG activity from several cranial, trunk, upper and lower limbs musc...

  5. Queen leads tributes to nurses in wake of terrorist attacks.

    Science.gov (United States)

    Allen, Daniel

    2017-06-15

    The Queen and the prime minister led tributes to nurses and other NHS staff caring for people injured in the recent terrorist attacks in Manchester and London. Emergency services worked through the night to assist in the immediate aftermath of the explosion at the Manchester arena, which killed 22 people and left many more injured, who were treated at hospitals across the city.

  6. Prevalence of eating disorders and eating attacks in narcolepsy

    Directory of Open Access Journals (Sweden)

    Norbert Dahmen

    2008-03-01

    Full Text Available Norbert Dahmen, Julia Becht, Alice Engel, Monika Thommes, Peter TonnPsychiatry Department, University of Mainz, GermanyAbstract: Narcoleptic patients suffer frequently from obesity and type II diabetes. Most patients show a deficit in the energy balance regulating orexinergic system. Nevertheless, it is not known, why narcoleptic patients tend to be obese. We examined 116 narcoleptic patients and 80 controls with the structured interview for anorectic and bulimic eating disorders (SIAB to test the hypothesis that typical or atypical eating attacks or eating disorders may be more frequent in narcoleptic patients. No difference in the current prevalence of eating disorders bulimia nervosa, binge eating disorder, or anorexia nervosa was found, nor was the frequency of eating attacks higher in the narcolepsy group. We conclude that present eating disorders and eating attacks as defined in DSM IV are not the reason for the observed differences in body composition. Additional factors, such as basal metabolic rates and lifestyle factors need to be considered.Keywords: narcolepsy, eating disorder, SIAB, bulimia, anorexia, eating attack

  7. On the dip angle of subducting plates

    Science.gov (United States)

    Hsui, Albert T.; Tang, Xiao-Ming; Toksoz, M. Nafi

    1990-01-01

    A new approximate analytic model is developed for the thermal structure of a subducting plate with a finite length. This model provides the capability of easily examining the thermal and mechanical structure of a subducting plate with different lengths and at different angles. Also, the torque balance of a descending plate can be examined, and effects such as the leading edge effect, the adiabatic compression effect, and the phase change effect can be incorporated. A comparison with observed data indicates that short slabs are likely under torque equilibrium at present, while long slabs are probably dominated by their gravitational torques such that their dip angles are transient, moving toward a steeper dip angle similar to that of the Mariana slab.

  8. Radon - an angle of view

    International Nuclear Information System (INIS)

    Palecek, S.

    1996-01-01

    Apart from its radiation effects on living organism, radon induces the formation of atmospheric ions which are beneficial to man: some asthmatics can breathe more easily in an environment with elevated ion levels, the blood pH increases, the fraction of albumins is higher while the serotonin level is lower, sedimentation decreases and the leukocyte counts in peripherals diminish. The blood pressure, particularly in people suffering from hypertension, drops appreciably. The production of pituitary hormones as well as the overall sexual activity is stimulated by ions in air. Exposure to negative ions affects circulation through the skin, reduces skin temperature and improves overall resistance of the organism to infection. Negative ions also have a stimulating effect on mental activity and help against insomnia. Sites where radon is present in not too high concentrations are often famous as climatic spas. So, antiradon provisions, if exercised too thoroughly, may have adverse rather than positive consequences. All pros and cons should always be taken into account when deciding on antiradon steps. (P.A.)

  9. Measurement of critical angle in SSTDs

    International Nuclear Information System (INIS)

    Marques, A.; Serra, D.A.B.

    1984-01-01

    A method of measurement of critical angles of etching is described, relying upon the distortion caused in the shape of the distribution in the number of etched tracks of ions emitted from a 'point-like' source. The method is applied to quartz and mica samples. (author)

  10. Research on RBV Control Strategy of Large Angle Maneuver

    Directory of Open Access Journals (Sweden)

    Jiangtao Xu

    2014-01-01

    Full Text Available Considering the hypersonic aerospace vehicle, with high dynamic, strong varying parameters, strong nonlinear, strong coupling, and the complicated flight environment, conventional flight control methods based on linear system may become invalid. To the high precision and reliable control problem of this vehicle, nonlinear flight control strategy based on neural network robust adaptive dynamic inversion is proposed. Firstly, considering the nonlinear characteristics of aerodynamic coefficients varying with Mach numbers, attack angle, and sideslip angle, the complete nonlinear 6-DOF model of RBV is established. Secondly, based on the time-scale separation, using the nonlinear dynamic inversion control strategy achieves the pseudolinear decoupling of RBV. And then, using the neural network with single hidden layer approximates the dynamic inversion error for system model uncertainty. Next, the external disturbance and network approximating error are suppressed by robust adaptive control. Finally, using Lyapunov’s theory proves that all error signals of closed loop system are uniformly bounded finally under this control strategy. Nonlinear simulation verifies the feasibility and validity of this control strategy to the RBV control system.

  11. Evaluation of protein dihedral angle prediction methods.

    Directory of Open Access Journals (Sweden)

    Harinder Singh

    Full Text Available Tertiary structure prediction of a protein from its amino acid sequence is one of the major challenges in the field of bioinformatics. Hierarchical approach is one of the persuasive techniques used for predicting protein tertiary structure, especially in the absence of homologous protein structures. In hierarchical approach, intermediate states are predicted like secondary structure, dihedral angles, Cα-Cα distance bounds, etc. These intermediate states are used to restraint the protein backbone and assist its correct folding. In the recent years, several methods have been developed for predicting dihedral angles of a protein, but it is difficult to conclude which method is better than others. In this study, we benchmarked the performance of dihedral prediction methods ANGLOR and SPINE X on various datasets, including independent datasets. TANGLE dihedral prediction method was not benchmarked (due to unavailability of its standalone and was compared with SPINE X and ANGLOR on only ANGLOR dataset on which TANGLE has reported its results. It was observed that SPINE X performed better than ANGLOR and TANGLE, especially in case of prediction of dihedral angles of glycine and proline residues. The analysis suggested that angle shifting was the foremost reason of better performance of SPINE X. We further evaluated the performance of the methods on independent ccPDB30 dataset and observed that SPINE X performed better than ANGLOR.

  12. Representing of Information Attacks in the Conditions of a Reference Model OSE/RM

    Directory of Open Access Journals (Sweden)

    Vladimir Sergeevich Kuznetsov

    2013-02-01

    Full Text Available Graphic representation of attacks to open systems within the conceptual OSE/RM model is considered in the paper. Attacks are classified according to level of their action in the 7th level OSI model.

  13. Effectiveness of icatibant for treatment of hereditary angioedema attacks is not affected by body weight

    DEFF Research Database (Denmark)

    Caballero, Teresa; Zanichelli, Andrea; Aberer, Werner

    2018-01-01

    in the literature. We examined disease characteristics and icatibant treatment effectiveness in patients stratified by BMI in the Icatibant Outcome Survey, an ongoing, international, observational study monitoring the real-world safety and effectiveness of icatibant. Methods: Attack and treatment characteristics......) were analyzed. There was no significant difference in the frequency and severity of attacks across BMI groups, although obese patients tended to have more attacks of high severity. There was no impact of BMI on the frequency of laryngeal attacks, but patients with normal BMI had fewer cutaneous attacks......) and treated attacks earlier than patients with normal BMI (P = 0.007). Furthermore, time to resolution and duration of attack were shorter for patients with high BMI (P normal). Conclusion: Overall, icatibant was comparatively effective in treating attacks...

  14. Experimental technique of small angle neutron scattering

    International Nuclear Information System (INIS)

    Xia Qingzhong; Chen Bo

    2006-03-01

    The main parts of Small Angle Neutron Scattering (SANS) spectrometer, and their function and different parameters are introduced from experimental aspect. Detailed information is also introduced for SANS spectrometer 'Membrana-2'. Based on practical experiments, the fundamental requirements and working condition for SANS experiments, including sample preparation, detector calibration, standard sample selection and data preliminary process are described. (authors)

  15. Measurement of the angle alpha at BABAR

    International Nuclear Information System (INIS)

    Perez, A.

    2009-01-01

    The authors present recent measurements of the CKM angle α using data collected by the BABAR detector at the PEP-II asymmetric-energy e + e - collider at the SLAC National Accelerator Laboratory, operating at the Υ(4S) resonance. They present constraints on α from B → ππ, B → ρρ and B → ρπ decays.

  16. A retrospective analysis of practice patterns in the management of acute asthma attack across Turkey.

    Science.gov (United States)

    Türktaş, Haluk; Bavbek, Sevim; Misirligil, Zeynep; Gemicioğlu, Bilun; Mungan, Dilşad

    2010-12-01

    To evaluate patient characteristics and practice patterns in the management of acute asthma attack at tertiary care centers across Turkey. A total of 294 patients (mean age: 50.4 ± 15.1 years; females: 80.3%) diagnosed with persistent asthma were included in this retrospective study upon their admission to the hospital with an acute asthma attack. Patient demographics, asthma control level, asthma attack severity and the management of the attack were evaluated. There was no influence of gender on asthma control and attack severity. In 57.5% of the patients, asthma attack was moderate. Most patients (78.9%) were hospitalized with longer duration evident in the severe attack. Spirometry and chest X-Ray were the most frequent tests (85.4%), while steroids (72.0% parenteral; 29.0% oral) and short-acting beta-agonists (SABA) + anticholinergics (45.5%) were the main drugs of choice in the attack management. Attack severity and pre-attack asthma control level was significantly correlated (p attack asthma was uncontrolled in 42.6% of the patients with severe attack. Most of the patients were on combination of more than one (two in 38.7% and 3-4 in 31.2%) controller drugs before the attack. Providing country specific data on practice patterns in the management of acute asthma attack in a representative cohort in Turkey, prescription of steroids and SABA + anticholinergics as the main drugs of choice was in line with guidelines while the significant relation of pre-attack asthma control to risk/severity of asthma attack and rate/duration of hospitalization seem to be the leading results of the present study. Copyright © 2010 Elsevier Ltd. All rights reserved.

  17. Meningioma of Foramen Magnum Causing Drop Attacks

    Directory of Open Access Journals (Sweden)

    Amit Mahore

    2015-01-01

    Full Text Available A 52-year-old female presented with frequent episodes of falls without loss of consciousness. These episodes lasted for brief period followed by full neurological recovery. Magnetic resonance imaging (MRI of the brain showed foramen magnum meningioma encasing left vertebral artery. The patient had dramatic improvement after excision of the tumor.

  18. Analysis of signature wrapping attacks and countermeasures

    DEFF Research Database (Denmark)

    Gajek, Sebastian; Jensen, Meiko; Liao, Lijun

    2009-01-01

    In recent research it turned out that Boolean verification, of digital signatures in the context of WSSecurity, is likely to fail: If parts of a SOAP message, are signed and the signature verification applied to, the whole document returns true, then nevertheless the, document may have been...

  19. Study of attack in college volleyball

    Directory of Open Access Journals (Sweden)

    Yordan Portela Pozo

    2014-03-01

    This work is done in order to analyze the positive and negative aspects that affected the performance of the auction action in volleyball players performing this action (in this case male in the Provincial University Games in 2012 in Havana , for which I take as a case study to the players of the University of Information Sciences and its opponents in those games, completing a total of 268 shares auctions in 7 games with a total of 15 September analyzed taking account of changes in the sport of Volleyball university in Cuba, data recorded by an observation sheet previously completed by the authors. The main results in this paper show that the greatest amount of shots that were done in these games were diagonal and a good percentage of positive linear auctions however were few and with very poor results. The primary role of the auction for the game's success is fully confirmed in this work because this action is achieved through many points in the game of volleyball and thus leads to a better result.

  20. Evaluation of a Multi-Agent System for Simulation and Analysis of Distributed Denial-of-Service Attacks

    National Research Council Canada - National Science Library

    Huu, Tee

    2003-01-01

    DDoS attack is evolving at a rapid and alarming rate; an effective solution must be formulated using an adaptive approach Most of the simulations are performed at the attack phase of the DDoS attack...

  1. Multilevel Modeling of Distributed Denial of Service Attacks in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Katarzyna Mazur

    2016-01-01

    Full Text Available The growing popularity of wireless sensor networks increases the risk of security attacks. One of the most common and dangerous types of attack that takes place these days in any electronic society is a distributed denial of service attack. Due to the resource constraint nature of mobile sensors, DDoS attacks have become a major threat to its stability. In this paper, we established a model of a structural health monitoring network, being disturbed by one of the most common types of DDoS attacks, the flooding attack. Through a set of simulations, we explore the scope of flood-based DDoS attack problem, assessing the performance and the lifetime of the network under the attack condition. To conduct our research, we utilized the Quality of Protection Modeling Language. With the proposed approach, it was possible to examine numerous network configurations, parameters, attack options, and scenarios. The results of the carefully performed multilevel analysis allowed us to identify a new kind of DDoS attack, the delayed distributed denial of service, by the authors, referred to as DDDoS attack. Multilevel approach to DDoS attack analysis confirmed that, examining endangered environments, it is significant to take into account many characteristics at once, just to not overlook any important aspect.

  2. Applying the Principles of Homicide by Heart Attack.

    Science.gov (United States)

    Hlavaty, Leigh; Sung, LokMan

    2016-06-01

    Homicide by heart attack is a well-established model in forensic pathology that describes death elicited during or immediately after a criminal act where a threat or fear of physical injury is present. After its introduction nearly 4 decades ago, the principle has undergone a handful of modifications but still maintains its core concepts. All cases of this nature during a 20-year period at the Wayne County Medical Examiner's Office were compared and contrasted for demographics, circumstances and scene investigation, and autopsy and toxicology findings. Of the cases fulfilling the previously established criteria for homicide by heart attack, more than 80% displayed significant changes because of hypertension. This finding coincides with the high prevalence of hypertension in our urban population and highlights the significance of this disease. Also present were minor external and internal injuries in select cases, which reinforce the understanding that physical contact between the decedent and assailant does not preclude this diagnosis.

  3. Use of forensic analysis to better understand shark attack behaviour.

    Science.gov (United States)

    Ritter, E; Levine, M

    2004-12-01

    Shark attacks have primarily been analyzed from wound patterns, with little knowledge of a shark's approach, behaviour and intention leading to such wounds. For the first time, during a shark-human interaction project in South Africa, a white shark, Carcharodon carcharias, was filmed biting a vertically positioned person at the water surface, and exhibiting distinct approach patterns leading to the bite. This bite was compared to ten white shark attacks that occurred (i) in the same geographical area of South Africa, and (ii) where the same body parts were bitten. Close similarity of some of these wound patterns to the bite imprint of the videotaped case indicate that the observed behaviour of the white shark may represent a common pattern of approaching and biting humans.

  4. Case studies of attacks on communication networks

    Energy Technology Data Exchange (ETDEWEB)

    Kang, Sin Bok; Han, Eon Suk [Korea Atomic Energy Research Institute, Taejon (Korea, Republic of)

    1996-06-15

    Recently, as the computer hardware and communications are developed, the data exchange through inter-networking has been highlighted and the data is being recognized as a great asset. Most of the organizations, businesses and enterprises are open to the external world-computer communication networks, attention must be focused on the securities of the information infrastructure. A government organization has been developing 'Circuits Analyzers', and 'Hacker-Tracking Program' and is struggling to track down sneakers. In this report, we analyze the contents of the cases where the communication network has been invaded, from the past up until now in Korea. This report also contains the result of a study on E-mail security, for the protection of KAERI Integrated Management Information System under which utilizes the CALS concepts and web services. (Author)

  5. Effect of metakaolin on external sulfate attack

    Energy Technology Data Exchange (ETDEWEB)

    Ramlochan, T.; Thomas, M. [Toronto Univ., Dept. of Civil Engineering, ON (Canada)

    2000-07-01

    The effect of high reactivity metakaolin (HRM) on the sulfate resistance of mortars was studied. Mortar bars with three cements of varying C{sub 3}A content were used for the experiment. After a six month exposure to a 5 per cent solution of sodium sulfate, mortar bars incorporating any level of HRM as a partial replacement for a high-C{sub 3}A was considered 'moderately sulfate resistant'; mortar bars with HRM and a moderate or low C{sub 3}A content as 'high sulfate resistant'. It was also determined that for long term sulfate resistance 15 per cent HRM or more may be required, depending on the C{sub 3}A content. The performance of HRM was found to be significantly influenced by the water-cementitious material ratio, and in turn, by permeability, suggesting that HRM might increase sulfate resistance more by lowering the permeability of the concrete than by any chemical action. 7 refs., 4 tabs., 7 figs.

  6. Open-label, multicenter study of self-administered icatibant for attacks of hereditary angioedema

    DEFF Research Database (Denmark)

    Aberer, W; Maurer, M; Reshef, A

    2014-01-01

    Historically, treatment for hereditary angioedema (HAE) attacks has been administered by healthcare professionals (HCPs). Patient self-administration could reduce delays between symptom onset and treatment, and attack burden. The primary objective was to assess the safety of self-administered ica......Historically, treatment for hereditary angioedema (HAE) attacks has been administered by healthcare professionals (HCPs). Patient self-administration could reduce delays between symptom onset and treatment, and attack burden. The primary objective was to assess the safety of self...

  7. Resilience of LTE networks against smart jamming attacks: Wideband model

    KAUST Repository

    Aziz, Farhan M.

    2015-12-03

    LTE/LTE-A networks have been successfully providing advanced broadband services to millions of users worldwide. Lately, it has been suggested to use LTE networks for mission-critical applications like public safety, smart grid and military communications. We have previously shown that LTE networks are vulnerable to Denial-of-Service (DOS) and loss of service attacks from smart jammers. In this paper, we extend our previous work on resilience of LTE networks to wideband multipath fading channel, SINR estimation in frequency domain and computation of utilities based on observable parameters under the framework of single-shot and repeated games with asymmetric information. In a single-shot game formulation, network utility is severely compromised at its solutions, i.e. at the Nash Equilibria (NE). We propose evolved repeated-game strategy algorithms to combat smart jamming attacks that can be implemented in existing deployments using current technology. © 2015 IEEE.

  8. DEF: As a form of sulfate attack

    Directory of Open Access Journals (Sweden)

    Skalny, J.

    1996-12-01

    Full Text Available Delayed ettringite formation (DEF is the term used to describe expansion of some heat cured portland cement concretes. Although meaningful progress has been made, the exact mechanism of the expansion itself is not entirely understood. The ettringite reformation is enabled, primarily, by thermal decomposition of ettringite formed prior to or during the cement paste setting as a result of excessive/improper heat curing. Observance in mature concrete of crystalline ettringite in air voids, cracks, and gaps around the aggregate is not in itself an evidence for DEF, but is the consequence of natural recrystallization of ettringite into available larger spaces. Occurance of DEF is dependent on materials, curing, and environmental conditions, and can easily be distinguished from ASR and other deterioration mechanisms by optical and electron-optical methods.

    DEF es el término habitualmente usado para describir la expansión que sufren algunos hormigones de cemento Portland que han sido curados con la ayuda de un tratamiento térmico. DEF es la abreviatura de la expresión inglesa "Delayed Ettringite Formation" que en español se podría traducir como "Formación de Etringita Retrasada". Aunque en los últimos tiempos se ha progresado significativamente, aún hoy día no se entiende completamente el mecanismo exacto de la expansión en sí misma. La formación de una etringita tardía es, en principio, consecuencia de la descomposición térmica de la etringita formada con anterioridad o durante el fraguado de la pasta de cemento, por un exceso de calor o inadecuado proceso de curado térmico. La observación, en el hormigón maduro, de etringita cristalina en poros, fisuras y en las interfases pasta-áridos no es en sí una evidencia de la DEF, pero sí es una consecuencia de la natural recristalización de la etringita en espacios disponibles. El fenómeno de la DEF depende de los materiales, del curado y de las condiciones ambientales, y puede

  9. Classification of cyber attacks in South Africa

    CSIR Research Space (South Africa)

    Van Heerden, R

    2016-05-01

    Full Text Available class consists of the following sub- classes: Hacker, Insider, or Criminal. The Hacker sub-class is an combination of Hacker, Cracker and Script kiddie [4], referring to a skilled computer user who is willing to break (hack) security. The Insider sub... motivation refers to motivation that has a political aspect. This political aspect can be national interest by spies, political reasoning or vigilantes type groups [4]. Criminal/Financial refers to hacking for financial gain or other criminal intent. 2...

  10. Error and attack vulnerability of temporal networks

    NARCIS (Netherlands)

    Trajanovski, S.; Scellato, S.; Leontiadis, I.

    2012-01-01

    The study of real-world communication systems via complex network models has greatly expanded our understanding on how information flows, even in completely decentralized architectures such as mobile wireless networks. Nonetheless, static network models cannot capture the time-varying aspects and,

  11. Prevalence of ectoparasites attacking helmet guineafowl ...

    African Journals Online (AJOL)

    Ectoparatises fluctuated seasonally with overall prevalence higher in the hot dry season (p<0.01) and warm wet season (p<0.05) than the cool dry harmattan season. It was striking that classical clinical infestations were seldom seen despite widespread occurrence of heavy burdens. Keywords: ectoparasites, guineafowls ...

  12. Resilience of LTE networks against smart jamming attacks

    KAUST Repository

    Aziz, Farhan M.

    2014-12-08

    Commercial LTE networks are being studied for mission-critical applications, such as public safety and smart grid communications. In this paper, LTE networks are shown vulnerable to Denial-of-Service (DOS) and loss of service attacks from smart jammers, who may employ simple narrowband jamming techniques to attack without any need to hack the network or its users. We modeled the utilities of jamming and anti-jamming actions played by the jammer and the network under the framework of single-shot and repeated Bayesian games. In a single-shot game formulation the only Nash Equilibria (NE) are pure strategy equilibria at which network utility is severely compromised. We propose a repeated-game learning and strategy algorithm for the network that outperforms single-shot games by a significant margin. Furthermore, all of our proposed actions and algorithms can be implemented with current technology.

  13. The pattern of thoracic trauma after suicide terrorist bombing attacks.

    Science.gov (United States)

    Bala, Miklosh; Shussman, Noam; Rivkind, Avraham I; Izhar, Uzi; Almogy, Gidon

    2010-11-01

    The worldwide escalation in the volume of suicide terrorist bombing attacks warrants special attention to the specific pattern of injury associated with such attacks. The goal of this study was to characterize thoracic injuries inflicted by terrorist-related explosions and compare pattern of injury to penetrating and blunt thoracic trauma. Prospectively collected database of patients with chest injury who were admitted to Hadassah Hospital Level I trauma centre, in Jerusalem, Israel, from October 2000 to December 2005. Patients were divided into three groups according to the mechanism of injury: terrorist explosions (n = 55), gunshot wounds (GSW; n = 78), and blunt trauma (n = 747). There were many female victims after suicide bombing attacks (49.1%) compared with GSW (21.8%) and blunt trauma (24.6%; p = 0.009). The number of body regions injured was significantly higher in the terror group compared with the GSW and blunt groups (median, 4, 2, and 3, respectively, p attacks was caused by a unique combination of the effects of the blast wave and penetrating shrapnel. More than half (52.7%) of the terror victims suffered from lung contusion and 25 (45.5%) required tube thoracostomy. Five patients (9.1%) underwent thoracotomy for lung lacerations (n = 3), injury to great vessels (n = 2), cardiac lacerations (n = 1), and esophageal injury (n = 1). Penetrating shrapnel was the mechanism of injury in all these cases. Injury inflicted by terrorist bombings causes a unique pattern of thoracic wounds. Victims are exposed to a combination of lung injury caused by the blast wave and penetrating injury caused by metallic objects.

  14. A Review of Virtual Machine Attack Based on Xen

    Directory of Open Access Journals (Sweden)

    Ren xun-yi

    2016-01-01

    Full Text Available Virtualization technology as the foundation of cloud computing gets more and more attention because the cloud computing has been widely used. Analyzing the threat with the security of virtual machine and summarizing attack about virtual machine based on XEN to predict visible security hidden recently. Base on this paper can provide a reference for the further research on the security of virtual machine.

  15. The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl

    DEFF Research Database (Denmark)

    Mendel, Florian; Rechberger, Christian; Schläffer, Martin

    2009-01-01

    In this work, we propose the rebound attack, a new tool for the cryptanalysis of hash functions. The idea of the rebound attack is to use the available degrees of freedom in a collision attack to efficiently bypass the low probability parts of a differential trail. The rebound attack consists...... of an inbound phase with a match-in-the-middle part to exploit the available degrees of freedom, and a subsequent probabilistic outbound phase. Especially on AES based hash functions, the rebound attack leads to new attacks for a surprisingly high number of rounds. We use the rebound attack to construct...... collisions for 4.5 rounds of the 512-bit hash function Whirlpool with a complexity of 2^120 compression function evaluations and negligible memory requirements. The attack can be extended to a near-collision on 7.5 rounds of the compression function of Whirlpool and 8.5 rounds of the similar hash function...

  16. Civilian casualties of Iraqi ballistic missile attack to

    Directory of Open Access Journals (Sweden)

    Khaji Ali

    2012-06-01

    Full Text Available 【Abstract】Objective: To determine the pattern of causalities of Iraqi ballistic missile attacks on Tehran, the capital of Iran, during Iraq-Iran war. Methods: Data were extracted from the Army Staff Headquarters based on daily reports of Iranian army units during the war. Results: During 52 days, Tehran was stroked by 118 Al-Hussein missiles (a modified version of Scud missile. Eighty-six missiles landed in populated areas. During Iraqi missile attacks, 422 civilians died and 1 579 injured (4.9 deaths and 18.3 injuries per missile. During 52 days, 8.1 of the civilians died and 30.4 injured daily. Of the cases that died, 101 persons (24% were excluded due to the lack of information. Among the remainders, 179 (55.8% were male and 142 (44.2% were female. The mean age of the victims was 25.3 years±19.9 years. Our results show that the high accuracy of modified Scud missiles landed in crowded ar-eas is the major cause of high mortality in Tehran. The pres-ence of suitable warning system and shelters could reduce civilian casualties. Conclusion: The awareness and readiness of civilian defense forces, rescue services and all medical facilities for dealing with mass casualties caused by ballistic missile at-tacks are necessary. Key words: Mortality; War; Mass casualty incidents; Wounds and injuries

  17. Robustness of networks against propagating attacks under vaccination strategies

    International Nuclear Information System (INIS)

    Hasegawa, Takehisa; Masuda, Naoki

    2011-01-01

    We study the effect of vaccination on the robustness of networks against propagating attacks that obey the susceptible–infected–removed model. By extending the generating function formalism developed by Newman (2005 Phys. Rev. Lett. 95 108701), we analytically determine the robustness of networks that depends on the vaccination parameters. We consider the random defense where nodes are vaccinated randomly and the degree-based defense where hubs are preferentially vaccinated. We show that, when vaccines are inefficient, the random graph is more robust against propagating attacks than the scale-free network. When vaccines are relatively efficient, the scale-free network with the degree-based defense is more robust than the random graph with the random defense and the scale-free network with the random defense

  18. Animal attack: an unusual case of multiple trauma in childhood.

    LENUS (Irish Health Repository)

    O'Grady, E

    2014-11-01

    A 2½ year old girl attended our facility following attack by a tapir at a city zoo. She sustained multiple injuries including a forearm laceration and multiple perforating wounds to her abdominal wall. She had several procedures, including bowel resection, performed under the care of the General Paediatric Surgery and Plastic Surgery teams and was treated with a course of IV antibiotics. She recovered well and to date has suffered no long-term adverse outcome.

  19. [Clinical pathway for management of patients with acute asthma attack].

    Science.gov (United States)

    Azuma, Naoto; Katada, Yoshinori; Kobayashi, Masaaki; Kojima, Makiko; Nakajima, Yumi; Shibano, Miyo; Tomita, Hitomi; Yamanaka, Takao; Harada, Yoshinori; Ishii, Taeko; Saeki, Yukihiko

    2008-11-01

    There have been few reports of clinical pathway (CP) for treatment of asthma attack, because patients with asthma always admit emergently and the severity varies. We introduced CP so that standard asthma treatment can be widely used, and investigated its clinical usefulness. We designed a new CP for treating asthma attack according to the guideline (Japanese guideline (JGL) and Global Initiative for Asthma (GINA)). 136 patients who admitted to our hospital due to asthma attack from January 1999 to November 2006, were enrolled our study. Excluding cases complicated with pneumonia, COPD or cardiac failure, we evaluated 46 cases treated with the CP comparing with 19 cases treated without the CP. The clinical evaluations include systemic and inhaled steroid use, FEV1.0%, history of asthma, and the duration of asthma attack. Furthermore, we investigated difference between cases with and without prolonged admission. While the rates of systemic and inhaled steroid use in cases without the CP were 57.9% and 52.6% respectively, those in cases with the CP were approximately 100%. Employing the CP, FEV 1.0% at discharge time was elevated from 71.7% to 76.3% and the duration of hospitalization was shortened from 14.2 days to 11.5 days. Mean age of the cases with prolonged admission was higher than the rest. The asthma CP is an effective way for the standard treatment according to the guideline to be used widely even by doctors who are not familiar with asthma treatment. It improves the efficacy of in-hospital treatment.

  20. Behavioral Modeling of WSN MAC Layer Security Attacks: A Sequential UML Approach

    DEFF Research Database (Denmark)

    Pawar, Pranav M.; Nielsen, Rasmus Hjorth; Prasad, Neeli R.

    2012-01-01

    is the vulnerability to security attacks/threats. The performance and behavior of a WSN are vastly affected by such attacks. In order to be able to better address the vulnerabilities of WSNs in terms of security, it is important to understand the behavior of the attacks. This paper addresses the behavioral modeling...... of medium access control (MAC) security attacks in WSNs. The MAC layer is responsible for energy consumption, delay and channel utilization of the network and attacks on this layer can introduce significant degradation of the individual sensor nodes due to energy drain and in performance due to delays....... The behavioral modeling of attacks will be beneficial for designing efficient and secure MAC layer protocols. The security attacks are modeled using a sequential diagram approach of Unified Modeling Language (UML). Further, a new attack definition, specific to hybrid MAC mechanisms, is proposed....

  1. Recognizing a heart attack: the process of determining illness.

    Science.gov (United States)

    Scherck, K A

    1997-07-01

    To examine the process by which patients with acute myocardial infarction recognize illness and the need for medical treatment. Descriptive, exploratory, qualitative. The coronary care and progressive care units of two midwestern medical centers. Thirty men and women with a diagnosis of acute myocardial infarction. Open-ended interviews were conducted on the fourth or fifth day of hospitalization. All interviews were recorded on audiotape and transcribed. Data were analyzed by using grounded theory methods. Findings of the study indicated that determining illness and the need for medical attention was often a difficult process involving phases. The first phase involved attending to or ignoring bodily sensations as they come and go or additional sensations develop. Some subjects moved precipitously to seeking treatment; others took days to attend to bodily sensations. The second phase involved comparing sensations with those from a previously experienced illness or with the subject's concept of sensations likely to accompany common ailments such as indigestion or flu or more serious illnesses such as ulcer, gallbladder disease, or heart attack. The quality of sensations experienced had an important influence on assigning probable cause and deciding that medical attention is warranted. The disruptive nature of signs and symptoms and how closely signs and symptoms matched the subject's prototype for a heart attack greatly influenced the determination that illness was present and healthcare was needed. These findings have implications for educating the public about the complex and variable manifestations of a heart attack.

  2. Threat Assessment of Potential Terrorist Attacks to the Transport Infrastructure

    Directory of Open Access Journals (Sweden)

    Gabriel Nowacki

    2014-06-01

    Full Text Available The paper presents threat assessment of potential terrorist attacks to the transport infrastructure. The range of transportation infrastructure has spread and includes railway, inland waterways, road, maritime, air, intermodal transport infrastructure and intelligent transport systems (ITS. ITS service is the provision of an ITS application through a well-defined organisational and operational framework with the aim of contributing to the user safety, efficiency, comfort and/or to facilitate or support transport and travel operations. Terrorism means acts of violence committed by groups that view themselves as victimized by some notable historical wrong. Although these groups have no formal connection with governments, they usually have the financial and moral backing of sympathetic governments. Typically, they stage unexpected attacks on civilian targets, including transport infrastructure, with the aim of sowing fear and confusion. Based on the analyses, transportation infrastructure is potentially threatened with terrorism attacks, especially road and rail infrastructure (about 23 %, and to a smaller degree the maritime and air transport infrastructure (about 2 %. There were 90,3% of incidents involve land transport (74,5% – vehicles, 9,5% – buses, 6,3% - rail covered the 41-year period 1967-2007 in the USA. Legal steps to fight terrorism have been taken on the international level, furthermore, some institutions have been established for this purpose.

  3. Integrated Guidance and Control Based Air-to-Air Autonomous Attack Occupation of UCAV

    Directory of Open Access Journals (Sweden)

    Chang Luo

    2016-01-01

    Full Text Available An approach of air-to-air autonomous attack occupation for Unmanned Combat Aerial Vehicles (UCAVs is proposed to improve attack precision and combat effectiveness. According to the shortage of UCAV in the task of attack occupation, kinematic and dynamic models of UCAV and missile loaded on it are formed. Then, attack zone and no-escape zone are calculated by pattern search algorithm, and the optimum attack position is indicated. To arrive at the optimum attack position accurately with restriction of gesture, a novel adaptive sliding mode control method is suggested to design the integrated guidance and control system of UCAV in the process of autonomous attack occupation. Key parameters of the control system are adaptively regulated, which further economize control energy at the same time. The simulation results show that compared with traditional methods our approach can guide the UCAV to the optimum attack position with stable gesture and economize nearly 25% control energy.

  4. Performance Impact of Connectivity Restrictions and Increased Vulnerability Presence on Automated Attack Graph Generation

    National Research Council Canada - National Science Library

    Cullum, James; Irvine, Cynthia; Levin, Tim

    2007-01-01

    .... Although research has shown the effectiveness of automated attack graph generation tools in displaying potential attack paths in a network, research involving the performance of these tools has been limited...

  5. The Balance Attack Against Proof-Of-Work Blockchains: The R3 Testbed as an Example

    OpenAIRE

    Natoli, Christopher; Gramoli, Vincent

    2016-01-01

    In this paper, we identify a new form of attack, called the Balance attack, against proof-of-work blockchain systems. The novelty of this attack consists of delaying network communications between multiple subgroups of nodes with balanced mining power. Our theoretical analysis captures the precise tradeoff between the network delay and the mining power of the attacker needed to double spend in Ethereum with high probability. We quantify our probabilistic analysis with statistics taken from th...

  6. EFFICACY AND TOLERABILITY OF STOPAIN FOR A MIGRAINE ATTACK

    Directory of Open Access Journals (Sweden)

    Andrea eSt. Cyr

    2015-02-01

    Full Text Available ObjectiveTo determine whether topical menthol 6% gel will relieve a migraine attack.Materials and MethodsA single-center, open-label pilot trial of 25 patients with at least one year of diagnosed episodic migraine and < 15 headache days per month. Patients treated one migraine attack with STOPAIN topical menthol 6% gel to skull base within 2 hours of headache onset. Headache pain severity was assessed prior to and after gel application. ResultsThirty-two patients enrolled and 25 completed the study. Prior to treatment, seven patients had mild pain, 13 moderate pain, and five severe pain. Two hours following gel application, 7 patients had no pain, 7 mild pain, 6 moderate pain and 5 severe pain. The majority of patients had similar pain intensity (8; 32 % or improvement (13; 52%. At 24-hour, only 2 non-rescued patients still had mild headache. Of the 25 completers, two patients took rescue medication prior to the 2-hour period, and an additional 10 patients rescued between 2 and 24 hours. ConclusionStudy results showed a significant improvement in headache intensity by 2 hours after gel application. This pilot study shows STOPAIN gel may be effective in treating an acute migraine attack.

  7. Didactical Design Enrichment of Angle in Geometry

    Science.gov (United States)

    Setiadi, D. R.; Suryadi, D.; Mulyana, E.

    2017-09-01

    The underlying problem of this research is the lack of student’s competencies in understanding the concept of angle in geometry as the results of the teaching and learning pattern that only to receive the topic rather than to construct the topic and has not paid attention to the learning trajectory. The purpose of this research is to develop the didactical design of angle in space learning activity. The used research method is a method of qualitative research in the form of a didactical design research through three phases of analysis i.e. didactical situation analysis, metapedadidactical analysis, and retrospective analysis, which conducted in students from 10th grade at one of private schools in Bandung. Based on the results of research and discussion, the didactical design that has been made, is capable to change student’s learning habit and quite capable to develop student’s competencies although not optimal.

  8. A Study and Detection of TCP SYN Flood Attacks with IP spoofing and its Mitigations

    OpenAIRE

    Deepak Singh Rana; Naveen Garg; Sushil Kumar Chamoli

    2012-01-01

    Flooding attacks are major threats on TCP/IP protocol suite these days; Maximum attacks are launched through TCP and exploit the resources and bandwidth of the machine. Flooding attacks are DDOS (Distributed denial of service) attacks and utilize the weakness of the network protocols. SYN flood exploits the 3-way handshaking of the TCP by sending many SYN request with IP spoofing technique to victim host and exhaust the backlog queue resource of the TCP and deny legitimate user to connect. Ca...

  9. Cyber Attack: The Department of Defense’s Inability to Provide Cyber Indications and Warning

    Science.gov (United States)

    2006-02-07

    The Department of Defense (DoD) is currently unable to provide Indications and Warning (I&W) of cyber attacks against the DoD Global Information Grid...reactionary, and will only be initiated once an attack or probe has occurred. To provide adequate warning of potential cyber attacks , capabilities within...traditional intelligence disciplines like Human Intelligence (humint) and Signals Intelligence (sigint), IC will be able to provide I&W of future cyber attacks .

  10. Mapping the anatomy of social engineering attacks to the systems engineering life cycle

    CSIR Research Space (South Africa)

    Van de Merwe, J

    2017-11-01

    Full Text Available of security (Mitnick and Simon, 2002). Mitnick's attack model has four phases: research, developing rapport and trust, exploiting trust and utilising information. The picture below is a representation of Mitnick's attack cycle created by the authors... of Information Security & Assurance (HAISA 2017) 27 The next phase is the Development of the rapport and trust with the target. A target is more likely to divulge requested information to an attacker if he trusts the attacker. According to (Mitnick...

  11. Analysing the Impact of a DDoS Attack Announcement on Victim Stock Prices

    NARCIS (Netherlands)

    Abhishta,; Joosten, Reinoud A.M.G.; Nieuwenhuis, Lambertus Johannes Maria

    2017-01-01

    DDoS attacks are increasingly used by 'hackers' and 'hacktivists' for various purposes. A number of on-line tools are available to launch an attack of significant intensity. These attacks lead to a variety of losses at the victim's end. We analyse the impact of Distributed Denial-of-Service (DDoS)

  12. A taxonomy and discussion of software attack technologies

    Science.gov (United States)

    Banks, Sheila B.; Stytz, Martin R.

    2005-03-01

    Software is a complex thing. It is not an engineering artifact that springs forth from a design by simply following software coding rules; creativity and the human element are at the heart of the process. Software development is part science, part art, and part craft. Design, architecture, and coding are equally important activities and in each of these activities, errors may be introduced that lead to security vulnerabilities. Therefore, inevitably, errors enter into the code. Some of these errors are discovered during testing; however, some are not. The best way to find security errors, whether they are introduced as part of the architecture development effort or coding effort, is to automate the security testing process to the maximum extent possible and add this class of tools to the tools available, which aids in the compilation process, testing, test analysis, and software distribution. Recent technological advances, improvements in computer-generated forces (CGFs), and results in research in information assurance and software protection indicate that we can build a semi-intelligent software security testing tool. However, before we can undertake the security testing automation effort, we must understand the scope of the required testing, the security failures that need to be uncovered during testing, and the characteristics of the failures. Therefore, we undertook the research reported in the paper, which is the development of a taxonomy and a discussion of software attacks generated from the point of view of the security tester with the goal of using the taxonomy to guide the development of the knowledge base for the automated security testing tool. The representation for attacks and threat cases yielded by this research captures the strategies, tactics, and other considerations that come into play during the planning and execution of attacks upon application software. The paper is organized as follows. Section one contains an introduction to our research

  13. 77 FR 56515 - Continuation of the National Emergency With Respect to Certain Terrorist Attacks

    Science.gov (United States)

    2012-09-12

    ... With Respect to Certain Terrorist Attacks Notice of September 11, 2012--Continuation of the National... the National Emergency With Respect to Certain Terrorist Attacks Consistent with section 202(d) of the... declared on September 14, 2001, in Proclamation 7463, with respect to the terrorist attacks of September 11...

  14. Comparing Alternatives to Measure the Impact of DDoS Attack Announcements on Target Stock Prices

    NARCIS (Netherlands)

    Abhishta,; Joosten, Reinoud; Nieuwenhuis, Lambert J.M.

    2017-01-01

    Distributed denial of service (DDoS) attacks are responsible for creating unavailability of online resources. Botnets based on internet of things (IOT) devices are now being used to conduct DDoS attacks. The estimation of direct and indirect economic damages caused by these attacks is a complex

  15. Responding to Cyber Attacks and the Applicability of Existing International Law

    Science.gov (United States)

    2013-03-01

    Responding to Cyber Attacks and the Applicability of Existing International Law by Lieutenant Colonel Joseph L...Responding to Cyber Attacks and the Applicability of Existing International Law 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER... Cyber Attacks and the Applicability of Existing International Law by Lieutenant Colonel Joseph L. Hilfiker United States Army

  16. Reducing the attractiveness of chemical plants to terrorist attacks: dehorning rhinos

    NARCIS (Netherlands)

    Khakzad Rostami, N.

    2017-01-01

    The terrorist attacks to two French chemical facilities in June and July 2015 raised the flag about the attractiveness of chemical plants to terrorist groups and the imminent risk of similar attacks in western countries. Although the 9/11 terrorist attacks in the US put the security of chemical

  17. A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN

    DEFF Research Database (Denmark)

    Bogdanov, Andrey; Rechberger, Christian

    2011-01-01

    In this paper we describe a variant of existing meet-in-the-middle attacks on block ciphers. As an application, we propose meet-in-the-middle attacks that are applicable to the KTANTAN family of block ciphers accepting a key of 80 bits. The attacks are due to sonic weaknesses in its bitwise key...

  18. Quantitative Verification and Synthesis of Attack-Defence Scenarios Conference

    NARCIS (Netherlands)

    Aslanyan, Zaruhi; Nielson, Flemming; Parker, David

    Attack-defence trees are a powerful technique for formally evaluating attack-defence scenarios. They represent in an intuitive, graphical way the interaction between an attacker and a defender who compete in order to achieve conflicting objectives. We propose a novel framework for the formal

  19. Pareto Efficient Solution of Attack-Defence Trees

    NARCIS (Netherlands)

    Aslanyan, Zaruhi; Nielson, Flemming

    Attack-defence trees are a promising approach for representing threat scenarios and possible countermeasures in a concise and intuitive manner. An attack-defence tree describes the interaction between an attacker and a defender, and is evaluated by assigning parameters to the nodes, such as

  20. Intra- and Interobserver Reliability of the Cobb Angle-Vertebral Rotation Angle-Spinous Process Angle for Adolescent Idiopathic Scoliosis.

    Science.gov (United States)

    Chan, Amanda C Y; Morrison, Devlin G; Nguyen, Duc V; Hill, Douglas L; Parent, Eric; Lou, Edmond H M

    2014-05-01

    A reliability analysis of Cobb angle, vertebral rotation (VR), and spinous process angle (SPA) measurements in adolescent idiopathic scoliosis. To determine the intra- and interobserver reliability of semi-automated digital radiograph measurements. Cobb angle measurements on posteroanterior radiographs are commonly used to determine the severity of scoliosis. Vertebral rotation helps assess scoliosis 3-dimensionally and has a role in predicting curve progression. Recent studies have shown that the spinous process angle is a useful parameter in assessing scoliosis when using ultrasound imaging. Because the reliability of SPA measurements on radiographs has yet to be determined, it is important to compare the reliability of these 3 parameters (Cobb angle, VR, and SPA) using a computer assisted semi-automated method. Sixty posteroanterior radiographs of patients with adolescent idiopathic scoliosis were obtained and measured twice by 3 observers who were blinded to their previous measurements, using an in-house developed program. Measurements were obtained using a semi-automated method to minimize variability resulting from observer reliability. The intra- and interobserver reliabilities were analyzed using intra-class correlation coefficients (ICCs) as well as Bland-Altman's bias and limits of agreement. Over 350 (intra) and 90 (inter) sets of curves with an average Cobb angle of 26° ± 9° (range, 10° to 44°) were compared for each parameter. Intra-observer reliabilities for each parameter were excellent (ICC [2,1] , .82; 1.00), with mean absolute differences under 3° between most measurements. Interobserver reliability (ICC [2,1] , .72; .95) was mostly good to excellent, with mean absolute differences ranging from 2.0° to 5.6°. Both the intra- and interobserver assessment of the Cobb, VR, and SPA from the semi-automated measurements had clinically acceptable reliability ranges and may be considered for clinical implementation. Additional studies will be

  1. Heart Attack

    Science.gov (United States)

    ... Pressure, tightness, pain, or a squeezing or aching sensation in your chest or arms that may spread to your neck, jaw or back Nausea, indigestion, heartburn or abdominal pain Shortness of breath Cold sweat Fatigue Lightheadedness or sudden dizziness Heart attack ...

  2. Heart attack

    Science.gov (United States)

    ... part in support groups for people with heart disease . Outlook (Prognosis) After a heart attack, you have a higher ... P, Bonow RO, Braunwald E, eds. Braunwald's Heart Disease: A Textbook of Cardiovascular Medicine . 10th ed. Philadelphia, PA: Elsevier Saunders; 2014: ...

  3. Shark attack.

    Science.gov (United States)

    Guidera, K J; Ogden, J A; Highhouse, K; Pugh, L; Beatty, E

    1991-01-01

    Shark attacks are rare but devastating. This case had major injuries that included an open femoral fracture, massive hemorrhage, sciatic nerve laceration, and significant skin and muscle damage. The patient required 15 operative procedures, extensive physical therapy, and orthotic assistance. A review of the literature pertaining to shark bites is included.

  4. A Stochastic Framework for Quantitative Analysis of Attack-Defense Trees

    NARCIS (Netherlands)

    Jhawar, Ravi; Lounis, Karim; Mauw, Sjouke

    2016-01-01

    Cyber attacks are becoming increasingly complex, practically sophisticated and organized. Losses due to such attacks are important, varying from the loss of money to business reputation spoilage. Therefore, there is a great need for potential victims of cyber attacks to deploy security solutions

  5. 78 FR 56579 - Continuation of the National Emergency With Respect to Certain Terrorist Attacks

    Science.gov (United States)

    2013-09-12

    ... Emergency With Respect to Certain Terrorist Attacks #0; #0; #0; Presidential Documents #0; #0; #0;#0;Federal... to Certain Terrorist Attacks Consistent with section 202(d) of the National Emergencies Act, 50 U.S.C..., in Proclamation 7463, with respect to the terrorist attacks of September 11, 2001, and the continuing...

  6. 76 FR 56631 - Continuation of the National Emergency With Respect to Certain Terrorist Attacks

    Science.gov (United States)

    2011-09-13

    ... With Respect to Certain Terrorist Attacks #0; #0; #0; Presidential Documents #0; #0; #0;#0;Federal... Certain Terrorist Attacks Consistent with section 202(d) of the National Emergencies Act, 50 U.S.C. 1622(d... Proclamation 7463, with respect to the terrorist attacks of September 11, 2001, and the continuing and...

  7. Robustness of coevolution in resolving prisoner's dilemma games on interdependent networks subject to attack

    Science.gov (United States)

    Liu, Penghui; Liu, Jing

    2017-08-01

    Recently, coevolution between strategy and network structure has been established as a rule to resolve social dilemmas and reach optimal situations for cooperation. Many follow-up researches have focused on studying how coevolution helps networks reorganize to deter the defectors and many coevolution methods have been proposed. However, the robustness of the coevolution rules against attacks have not been studied much. Since attacks may directly influence the original evolutionary process of cooperation, the robustness should be an important index while evaluating the quality of a coevolution method. In this paper, we focus on investigating the robustness of an elementary coevolution method in resolving the prisoner's dilemma game upon the interdependent networks. Three different types of time-independent attacks, named as edge attacks, instigation attacks and node attacks have been employed to test its robustness. Through analyzing the simulation results obtained, we find this coevolution method is relatively robust against the edge attack and the node attack as it successfully maintains cooperation in the population over the entire attack range. However, when the instigation probability of the attacked individuals is large or the attack range of instigation attack is wide enough, coevolutionary rule finally fails in maintaining cooperation in the population.

  8. Measured pressure distributions of large-angle cones in hypersonic flows of tetrafluoromethane, air, and helium

    Science.gov (United States)

    Jones, R. A.; Hunt, J. L.

    1973-01-01

    An experimental study of surface pressure distributions on a family of blunt and sharp large angle cones was made in hypersonic flows of helium, air, and tetrafluoromethane. The effective isentropic exponents of these flows were 1.67, 1.40, and 1.12. Thus, the effect of large shock density ratios such as might be encountered during planetary entry because of real-gas effects could be studied by comparing results in tetrafluoromethane with those in air and helium. It was found that shock density ratio had a large effect on both shock shape and pressure distribution. The differences in pressure distribution indicate that for atmospheric flight at high speed where real-gas effects produce large shock density ratios, large-angle cone vehicles can be expected to experience different trim angles of attack, drag coefficient, and lift-drag ratios than those for ground tests in air wind tunnels.

  9. Measurement of the angle alpha at BABAR

    Energy Technology Data Exchange (ETDEWEB)

    Perez, A.; /Orsay, LAL

    2009-06-25

    The authors present recent measurements of the CKM angle {alpha} using data collected by the BABAR detector at the PEP-II asymmetric-energy e{sup +}e{sup -} collider at the SLAC National Accelerator Laboratory, operating at the {Upsilon}(4S) resonance. They present constraints on {alpha} from B {yields} {pi}{pi}, B {yields} {rho}{rho} and B {yields} {rho}{pi} decays.

  10. An Analysis of Media’s Role: Case Study of Army Public School (APS Peshawar Attack

    Directory of Open Access Journals (Sweden)

    Qureshi Rameesha

    2016-12-01

    Full Text Available The study aimed at analyzing the role of media during and after terrorist attacks by examining the media handling of APS Peshawar attack. The sample consisted of males and females selected on convenience basis from universities of Rawalpindi and Islamabad. It was hypothesized that (1 Extensive media coverage of terrorist attacks leads to greater publicity/recognition of terrorist groups (2 Media coverage of APS Peshawar attack increased fear and anxiety in public (3 Positive media handling/coverage of APS Peshawar attack led to public solidarity and peace. The results indicate that i Media coverage of terrorist attacks does help terrorist groups to gain publicity and recognition amongst public ii Media coverage of Aps Peshawar attack did not increase fear/anxiety in fact it directed the Pakistani nation towards public solidarity and peace.

  11. On the security of Y-00 under fast correlation and other attacks on the key

    International Nuclear Information System (INIS)

    Yuen, Horace P.; Nair, Ranjith

    2007-01-01

    The security of the Y-00 direct encryption protocol under correlation attack is addressed. A Y-00 configuration that is more secure than AES under known-plaintext attack is presented. It is shown that under any ciphertext-only attack, full information-theoretic security on the Y-00 seed key is obtained for any encryption box ENC with proper deliberate signal randomization

  12. New efficient utility upper bounds for the fully adaptive model of attack trees

    NARCIS (Netherlands)

    Buldas, Ahto; Lenin, Aleksandr

    2013-01-01

    We present a new fully adaptive computational model for attack trees that allows attackers to repeat atomic attacks if they fail and to play on if they are caught and have to pay penalties. The new model allows safer conclusions about the security of real-life systems and is somewhat

  13. What's the angle: a study of the angle bisected in intraoral radiography.

    Science.gov (United States)

    Manson-Hing, L R

    1980-01-01

    Intraoral radiographs were made via the bisecting-the-angle technique on patients of different ages, sexes, and races. The tooth-film angles for various areas of the mouth were measured and found to be close to 30 degrees for all areas of the mouth except the mandibular posterior regions. The study was conducted to assist in quick positioning of the x-ray beam in difficult cases.

  14. Research on recognition of ramp angle based on transducer

    Directory of Open Access Journals (Sweden)

    Wenhao GU

    2015-12-01

    Full Text Available Focusing on the recognition of ramp angle, the relationship between the signal of vehicle transducer and real ramp angle is studied. The force change of vehicle on the ramp, and the relationship between the body tilt angle and front and rear suspension scale is discussed. According to the suspension and tire deformation, error angle of the ramp angle is deduced. A mathematical model is established with Matlab/Simulink and used for simulation to generate error curve of ramp angle. The results show that the error angle increases with the increasing of the ramp angle, and the limit value can reach 6.5%, while the identification method can effectively eliminate this error, and enhance the accuracy of ramp angle recognition.

  15. The effect of beam angle in abrasive-waterjet machining

    International Nuclear Information System (INIS)

    Hashish, M.

    1989-01-01

    In the machining of materials, abrasive-waterjets are typically applied at a 90-degree angle to the surface of the workpiece. This paper presents results and observations on machining with abrasive-waterjets at angles other than 90 degrees. Previous visualization studies of the cutting process in transparent materials has shown that there are optimal angles for maximum depth of cut and kerf depth uniformity. Here, observations on the effect of angle in machining applications, such as turning, milling. linear cutting, and drilling, are addressed. The effects of variations in both the impact angle and the rake angle are investigated. Results indicate that the volume removal rate is significantly affected by these angles and that surface finish can be improved by angling the jet. However, shallow angle drilling of small holes in laminated or ceramic-coated materials requires further investigation

  16. Risk factors of transient ischemic attack: An overview

    Directory of Open Access Journals (Sweden)

    Supreet Khare

    2016-01-01

    Full Text Available Transient ischemic attack (TIA is a transient episode of neurologic dysfunction caused due to loss of blood flow to the brain or spinal cord without acute infarction. Depending on the area of the brain involved, symptoms of TIA vary widely from patient to patient. Since the blockage period in TIA is very short-lived, there is no permanent damage. Risk factors for TIA include family history of stroke or TIA, age above 55 years or older, higher risk of TIA in males than females, high blood pressure, diabetes mellitus, and tobacco smoking. Genetics, race, and imbalance in lipid profile are other risk factors of TIA. TIA is usually diagnosed after taking a thorough history and a physical examination. Several radiological tests such as computed tomography and magnetic resonance imaging are useful in the evaluation of patients who have had a TIA. Ultrasound of the neck and an echocardiogram of the heart are other tests useful in the diagnosis and evaluation of the attack. The treatment following acute recovery from a TIA depends on the underlying cause. Patients who have more than 70% stenosis of the carotid artery, removal of atherosclerotic plaque is usually done by carotid endarterectomy surgery. One-third of the people with TIA can later have recurrent TIAs and one-third can have a stroke because of permanent nerve cell loss. Having a TIA is a risk factor for eventually having a stroke. Educating the patients and inculcating lifestyle modifications in them are initial steps to minimize the prevalence of transient ischemic attack.

  17. Incidence and impact of dog attacks on guide dogs in the UK.

    Science.gov (United States)

    Brooks, A; Moxon, R; England, G C W

    2010-06-19

    In a retrospective survey, researchers identified 100 incidents of attacks on guide dogs by other dogs. These were reviewed in order to determine the number, severity and impact on the handler and dog, and the characteristics of the aggressors and victims. During the study period there were more than three attacks reported each month, with 61 per cent of the attacks being upon dogs that were in harness and working with an owner or trainer. The majority of the dogs that were attacked were male (62 per cent), and the breeds that were over-represented (relative to their prevalence in the general guide dog population) were the labrador and the golden retriever x flat-coated retriever crossbreed. Most of the attacks occurred in public places between 09.00 and 15.00 and the majority (61 per cent) of the attacking dogs were off the lead at the time of the attack. Thirty-eight per cent of the attacking dogs were of bull breeds, which were over-represented among attackers compared with the proportion of this breed type in the general dog population. Veterinary attention was sought after 41 per cent of the attacks, and in 19 per cent of instances there was injury to the handler or to a member of the public. The attacks were reported to have affected the working performance and behaviour of the victim dog in 45 per cent of the instances, and two dogs had to be subsequently withdrawn from working as guide dogs.

  18. [Measurement of the lumbosacral angle and its clinical significance].

    Science.gov (United States)

    Bene, E

    1981-01-01

    The author reports about the result of a series of investigations and tests concerning the angle of the L-S vertebral column. Different factors influencing the values of L-S angle are analyzed. The clinical importance of the respective angles is small, the statics of the L-S transition is determined by all angles together. The reduced L-S angle cannot be considered as an aetiological factor of the spondylolysthesis. The pathological angle values as well as the positions play a role in the induction of the discopathy

  19. Recurrence of esophageal cancer presents as transient ischemic attack

    Directory of Open Access Journals (Sweden)

    Zhong-Xuan Ye

    2011-04-01

    Full Text Available A 43-year-old man presented with recurrent transient syncope was admitted under impression of transient ischemia attack. Six months earlier, he had been diagnosed with esophageal cancer. He underwent esophagogastrectomy and recovered uneventfully. Echocardiogram showed an ill-defined infiltrative mass over the lateral wall of the left ventricle and multiple intraventricular mural thrombi. Subsequent computed tomography scan of the chest demonstrated hypo-dense myocardium infiltration with local thickening. The appearance of the myocardium was highly characteristic of transmural cardiac metastasis. The patient received palliative therapy and died 1 month after this admission.

  20. Amide synthesis by nucleophilic attack of vinyl azides.

    Science.gov (United States)

    Zhang, Feng-Lian; Wang, Yi-Feng; Lonca, Geoffroy Hervé; Zhu, Xu; Chiba, Shunsuke

    2014-04-22

    A method for the synthesis of amide-containing molecules was developed using vinyl azides as an enamine-type nucleophile towards carbon electrophiles, such as imines, aldehydes, and carbocations that were generated from alcohols in the presence of BF3 ⋅OEt2 . After nucleophilic attack of the vinyl azide, a substituent of the resulting iminodiazonium ion intermediate migrates to form a nitrilium ion, which is hydrolyzed to afford the corresponding amide. © 2014 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  1. Outcomes of different speech and language goal attack strategies.

    Science.gov (United States)

    Tyler, Ann A; Lewis, Kerry E; Haskill, Allison; Tolbert, Leslie C

    2003-10-01

    The purpose of this study was to assess phonological and morphosyntactic change in children with co-occurring speech and language impairments using different goal attack strategies. Participants included 47 preschoolers, ages 3;0 (years;months) to 5;11, with impairments in both speech and language: 40 children in the experimental group and 7 in a no-treatment control group. Children in the experimental group were assigned at random to each of 4 different goal attack strategies: (a) in the phonology first condition, children received a 12-week block of phonological intervention followed by 12 weeks of work on morphosyntax; (b) the morphosyntax first condition was the same as phonology first, with the order of interventions reversed; (c) the alternating condition involved intervention on phonology and morphosyntax goals that alternated domains weekly; and (d) the simultaneous condition addressed phonological and morphosyntactic goals each session. Data were collected pretreatment, after the first intervention block, and posttreatment (after 24 weeks). For the control group, data were collected at the beginning and end of a period equivalent to 1 intervention block. Change in a finite morpheme composite and target generalization phoneme composite was assessed. Results showed that morphosyntactic change was greatest for children receiving the alternating strategy after 24 weeks of intervention. No single goal attack strategy was superior in facilitating gains in phonological performance. These results provide preliminary evidence that alternating phonological and morphosyntactic goals may be preferable when children have co-occurring deficits in these domains; further research regarding cross-domain intervention outcomes is necessary.

  2. A Comprehensive Taxonomy and Analysis of IEEE 802.15.4 Attacks

    Directory of Open Access Journals (Sweden)

    Yasmin M. Amin

    2016-01-01

    Full Text Available The IEEE 802.15.4 standard has been established as the dominant enabling technology for Wireless Sensor Networks (WSNs. With the proliferation of security-sensitive applications involving WSNs, WSN security has become a topic of great significance. In comparison with traditional wired and wireless networks, WSNs possess additional vulnerabilities which present opportunities for attackers to launch novel and more complicated attacks against such networks. For this reason, a thorough investigation of attacks against WSNs is required. This paper provides a single unified survey that dissects all IEEE 802.15.4 PHY and MAC layer attacks known to date. While the majority of existing references investigate the motive and behavior of each attack separately, this survey classifies the attacks according to clear metrics within the paper and addresses the interrelationships and differences between the attacks following their classification. The authors’ opinions and comments regarding the placement of the attacks within the defined classifications are also provided. A comparative analysis between the classified attacks is then performed with respect to a set of defined evaluation criteria. The first half of this paper addresses attacks on the IEEE 802.15.4 PHY layer, whereas the second half of the paper addresses IEEE 802.15.4 MAC layer attacks.

  3. Cultural Memory of Sorrow in Advertising after the Terrorist Attacks

    Directory of Open Access Journals (Sweden)

    Esther Martínez Pastor

    2015-09-01

    Full Text Available The general objective of this research study is to do a comparative research to investigate the perception of sorrow in the advertising in the press after the terrorist attacks: 11/09/2001 (U.S. and 11/04/2004 (Spain. The general hypothesis considers that there are similar perceptions of the sorrow towards the ads although there are cultural differences. On a computer program the subject was shown these images about announcement advertisement published in the press after the 09/11 and 11/04 in a random order and was asked different questions that explored their perception and attitudes with regard to these advertisements

  4. Glycemic control of diabetes patients under continuous rocket attacks.

    Science.gov (United States)

    Soskolne, Varda; Dekel, Rachel; Vinker, Shlomo

    2016-01-01

    Evidence regarding the detrimental effects of exposure to stress on glycemic control among diabetes patients has mainly focused on personal life events or acute trauma. However, the effects of continuous exposure to extreme stress on type 2 diabetes patients have rarely been studied. The aim of the current study was to examine the association of continuous exposure to rocket attacks with glycemic control and with risk factors for diabetes complications among civilian type 2 diabetes patients. We focus on patients residing in the Western Negev in the south of Israel that has been subjected to rocket attacks fired from Gaza since the end of 2001. A two-arm retrospective cohort study of type 2 diabetes patients, aged 35-70 years, residing in a region with chronic exposure to rocket attacks (N = 1697) and in a non-exposed comparison region in Israel (N = 3000). Data were retrieved from the Health Maintenance Organization (HMO)'s database for four time periods representing exposure: chronic-2008; elevated-2009 (post'Cast Lead' operation); return to chronic-2010, 2011. Data included socio-demographic variables, HbA 1c , BMI, LDL cholesterol, blood pressure. General Linear Models (GLM) were used for analysis. For HbA 1c , the model yielded a significant main effect for time, a borderline significance main effect for region, and a significant time by region interaction: no differences in HbA 1c levels between the regions in 2008 and 2009, followed by significant differences between the regions in 2010 and 2011 when HbA 1c continued to increase in the exposed region but decreased in the comparison region. Regarding risk factors, a significant main effect for time for LDL cholesterol only, and significant main effects for region were found in all factors: BMI and LDL cholesterol were higher in the exposed than in the comparison region, but blood pressure values were lower. Continuous exposure to rocket attacks is associated with glycemic control and risk factors in a

  5. Simulating effectiveness of helicopter evasive manoeuvres to RPG attack

    Science.gov (United States)

    Anderson, D.; Thomson, D. G.

    2010-04-01

    The survivability of helicopters under attack by ground troops using rocket propelled grenades has been amply illustrated over the past decade. Given that an RPG is unguided and it is infeasible to cover helicopters in thick armour, existing optical countermeasures are ineffective - the solution is to compute an evasive manoeuvre. In this paper, an RPG/helicopter engagement model is presented. Manoeuvre profiles are defined in the missile approach warning sensor camera image plane using a local maximum acceleration vector. Required control inputs are then computed using inverse simulation techniques. Assessments of platform survivability to several engagement scenarios are presented.

  6. Fostering Students' Development of the Concept of Angles Using Technology

    Science.gov (United States)

    Richardson, Sue Ellen; Koyunkaya, Melike Yigit

    2017-01-01

    We have used "GeoGebra," a dynamic geometry software environment, to explore how Year 4 students understand definitions of angles. Seven students defined angle and then completed several activities adapted for the dynamic environment. Afterward, students again shared their definitions of angles. We found that even a short investigation…

  7. Magnetic resonance colonography in severe attacks of ulcerative colitis

    Energy Technology Data Exchange (ETDEWEB)

    Savoye-Collet, C.; Roset, J.B.; Koning, E.; Dacher, J.N. [Rouen University Hospital Charles Nicolle, Radiology Department - QUANTIF - LITIS EA 4108, Rouen (France); Charpentier, C.; Hommel, S.; Lerebours, E.; Savoye, G. [Rouen University Hospital Charles Nicolle, Gastroenterology Department - ADEN U 1073, Rouen (France)

    2012-09-15

    To evaluate the ability of MR colonography (MRC) to detect lesions in severe attacks of ulcerative colitis (UC) and to assess its concordance with rectosigmoidoscopy. Eighteen patients underwent MRC and rectosigmoidoscopy. MRC consisted of a water-filled colonic procedure followed by T1/T2w images. Image quality was recorded. Inflammatory lesions and the existence of signs of severity were analysed. We calculated MR accuracy in the diagnosis of inflammatory lesions, as well as per segment and per patient concordance depending on the presence or absence of severe lesions. The MR image quality of the 108 segments was satisfactory. Endoscopy was used to study 36 segments (rectum and sigmoid). MRC had a positive predictive value of 100% and a sensitivity of 64% in the diagnosis of inflammatory lesions. Concordance for the diagnosis of severe lesions was excellent for the rectum (k = 0.85) and good for the sigmoid (k = 0.64). MRC diagnosed signs of severity in all patients affected at endoscopy. MRC also disclosed signs of severity located higher in the colon in four patients with nonsevere lesions at rectosigmoidoscopy. MRC can accurately diagnose inflammatory lesions in severe attacks of UC and significantly correlates with rectosigmoidoscopy in the diagnosis of severe lesions. (orig.)

  8. Magnetic resonance colonography in severe attacks of ulcerative colitis

    International Nuclear Information System (INIS)

    Savoye-Collet, C.; Roset, J.B.; Koning, E.; Dacher, J.N.; Charpentier, C.; Hommel, S.; Lerebours, E.; Savoye, G.

    2012-01-01

    To evaluate the ability of MR colonography (MRC) to detect lesions in severe attacks of ulcerative colitis (UC) and to assess its concordance with rectosigmoidoscopy. Eighteen patients underwent MRC and rectosigmoidoscopy. MRC consisted of a water-filled colonic procedure followed by T1/T2w images. Image quality was recorded. Inflammatory lesions and the existence of signs of severity were analysed. We calculated MR accuracy in the diagnosis of inflammatory lesions, as well as per segment and per patient concordance depending on the presence or absence of severe lesions. The MR image quality of the 108 segments was satisfactory. Endoscopy was used to study 36 segments (rectum and sigmoid). MRC had a positive predictive value of 100% and a sensitivity of 64% in the diagnosis of inflammatory lesions. Concordance for the diagnosis of severe lesions was excellent for the rectum (k = 0.85) and good for the sigmoid (k = 0.64). MRC diagnosed signs of severity in all patients affected at endoscopy. MRC also disclosed signs of severity located higher in the colon in four patients with nonsevere lesions at rectosigmoidoscopy. MRC can accurately diagnose inflammatory lesions in severe attacks of UC and significantly correlates with rectosigmoidoscopy in the diagnosis of severe lesions. (orig.)

  9. Joining by plating: optimization of occluded angle

    International Nuclear Information System (INIS)

    Dini, J.W.; Johnson, H.R.; Kan, Y.R.

    1978-11-01

    An empirical method has been developed for predicting the minimum angle required for maximum joint strength for materials joined by plating. This is done through a proposed power law failure function, whose coefficients are taken from ring shear and conical head tensile data for plating/substrate combinations and whose exponent is determined from one set of plated-joint data. Experimental results are presented for Al-Ni-Al (7075-T6) and AM363-Ni-AM363 joints, and the failure function is used to predict joint strengths for Al-Ni-Al (2024-T6), UTi-Ni-UTi, and Be-Ti-Be

  10. Risks of cyber attacks on financial audit activity

    Directory of Open Access Journals (Sweden)

    Gheorghe N. Popescu

    2018-02-01

    Full Text Available Simultaneously with increasing the speed and precision of data processing, multiple connectivity, fast transmission over long distances, and their results, the development and generalization of automatic processing, brought many new vulnerabilities and deficiencies, otherwise inevitable, the basis of new risk categories. The risks of cyber attacks on financial auditing involve the risk management of information systems security. Identifying, mitigating or eliminating the effects are mandatory requirements without which a high-quality financial audit can not be achieved in a highly computerized environment. To substantiate specific risk management actions on information systems security, in this study we analyzed the main types and techniques used in cyber attacks by making their radiography, identifying the strengths and weaknesses of new technologies and systems that are or not favoring security systems. At the same time, we analyzed the security system of an information system, organized it in layers, and revealed the specific areas for the security evaluation of the Mehari method. Finally, some of the results of a survey based on a questionnaire made with the support of master students of the "Information Systems Audit and Control" course were revealed, with three of the most common weaknesses identified for each security domain.

  11. Pericarditis - after heart attack

    Science.gov (United States)

    ... medlineplus.gov/ency/article/000166.htm Pericarditis - after heart attack To use the sharing features on this page, ... occur in the days or weeks following a heart attack . Causes Two types of pericarditis can occur after ...

  12. Social engineering attack framework

    CSIR Research Space (South Africa)

    Mouton, F

    2014-07-01

    Full Text Available link. A social engineering attack targets this weakness by; using various manipulation techniques in order to elicit sensitive; information. The field of social engineering is still in its infancy; stages with regards to formal definitions and attack...

  13. Terrorists and Suicide Attacks

    National Research Council Canada - National Science Library

    Cronin, Audrey K

    2003-01-01

    Suicide attacks by terrorist organizations have become more prevalent globally, and assessing the threat of suicide attacks against the United States and its interests at home and abroad has therefore...

  14. Robustness of Dengue Complex Network under Targeted versus Random Attack

    Directory of Open Access Journals (Sweden)

    Hafiz Abid Mahmood Malik

    2017-01-01

    Full Text Available Dengue virus infection is one of those epidemic diseases that require much consideration in order to save the humankind from its unsafe impacts. According to the World Health Organization (WHO, 3.6 billion individuals are at risk because of the dengue virus sickness. Researchers are striving to comprehend the dengue threat. This study is a little commitment to those endeavors. To observe the robustness of the dengue network, we uprooted the links between nodes randomly and targeted by utilizing different centrality measures. The outcomes demonstrated that 5% targeted attack is equivalent to the result of 65% random assault, which showed the topology of this complex network validated a scale-free network instead of random network. Four centrality measures (Degree, Closeness, Betweenness, and Eigenvector have been ascertained to look for focal hubs. It has been observed through the results in this study that robustness of a node and links depends on topology of the network. The dengue epidemic network presented robust behaviour under random attack, and this network turned out to be more vulnerable when the hubs of higher degree have higher probability to fail. Moreover, representation of this network has been projected, and hub removal impact has been shown on the real map of Gombak (Malaysia.

  15. Microstructural Effects of Sulphate Attack in Sustainable Grouts for Micropiles

    Directory of Open Access Journals (Sweden)

    José Marcos Ortega Álvarez

    2016-11-01

    Full Text Available Nowadays, the use of micropiles has undergone a great development. In general, they are made with cement grout, reinforced with steel tubing. In Spain, these grouts are prepared using OPC, although the standards do not forbid the use of other cements, like sustainable ones. Micropiles are in contact with soils and groundwater, in which the presence of sulphates is common. Their deleterious effects firstly affect to the microstructure. Then, the aim of this research is to study the effects of sulphate attack in the microstructure of micropiles grouts, prepared with OPC, fly ash and slag commercial cements, compared to their behaviour when they are exposed to an optimum hardening condition. The microstructure evolution has been studied with the non-destructive impedance spectroscopy technique, which has never been used for detecting the effects of sulphate attack when slag and fly ash cements are used. Its results have been contrasted with mercury intrusion porosimetry and “Wenner” resistivity ones. The 28-day compressive strength of grouts has been also determined. The results of microstructure characterization techniques are in agreement, although impedance spectroscopy is the most sensitive for following the changes in the porous network of grouts. The results showed that micropiles made using fly ash and slag cements could have a good performance in contact with aggressive sodium sulphate media, even better than OPC ones.

  16. The effect of canard leading edge sweep and dihedral angle on the longitudinal and lateral aerodynamic characteristic of a close-coupled canard-wing configuration

    Science.gov (United States)

    Gloss, B. B.

    1974-01-01

    A generalized wind-tunnel model, with canard and wing planforms typical of highly maneuverable aircraft, was tested in the Langley high-speed 7- by 10-foot tunnel at a Mach number of 0.30. The test was conducted in order to determine the effects of canard sweep and canard dihedral on canard-wing interference at high angles of attack. In general, the effect of canard sweep on lift is small up to an angle of attack of 16 deg. However, for angles of attack greater than 16 deg, an increase in the canard sweep results in an increase in lift developed by the canard when the canard is above or in the wing chord plane. This increased lift results in a lift increase for the total configuration for the canard above the wing chord plane. For the canard in the wing chord plane, the increased canard lift is partially lost by increased interference on the wing.

  17. Cubic Equations and the Ideal Trisection of the Arbitrary Angle

    Science.gov (United States)

    Farnsworth, Marion B.

    2006-01-01

    In the year 1837 mathematical proof was set forth authoritatively stating that it is impossible to trisect an arbitrary angle with a compass and an unmarked straightedge in the classical sense. The famous proof depends on an incompatible cubic equation having the cosine of an angle of 60 and the cube of the cosine of one-third of an angle of 60 as…

  18. Evaluation of the normal calcaneal angles in Egyptian population

    African Journals Online (AJOL)

    Fahmy Anwar Shoukry

    2012-02-01

    Feb 1, 2012 ... ison of the angles according to the side), independent t-test was used to compare the angles according to the sex), distribution of the angles within different age groups was compared with one way analysis of variance (ANOVA) test. The level of sig- nificance was set at p < 0.05, and compared the results of.

  19. The impact of inlet angle and outlet angle of guide vane on pump in reversal based hydraulic turbine performance

    International Nuclear Information System (INIS)

    Shi, F X; Yang, J H; Wang, X H; Zhang, R H; Li, C E

    2012-01-01

    In this paper, in order to research the impact of inlet angle and outlet angle of guide vane on hydraulic turbine performance, a centrifugal pump in reversal is adopted as turbine. A numerical simulation method is adopted for researching outer performance and flow field of turbine. The results show: inlet angle has a crucial role to turbine, to the same flow, there is a noticeable decline for the efficiency and head of turbine with the inlet angle increases. At the best efficiency point(EFP),to a same inlet angle, when the inlet angle greater than inlet angle, velocity circulation in guide vane outlet decreases, which lead the efficiency of turbine to reduce, Contrarily, the efficiency rises. With the increase of inlet angle and outlet angle, the EFP moves to the big flow area and the uniformity of pressure distribution becomes worse. The paper indicates that the inlet angle and outlet angle have great impact on the turbine performance, and the best combination exists for the inlet angle and outlet angle of the guide vane.

  20. Measurement of Angle Kappa Using Ultrasound Biomicroscopy and Corneal Topography.

    Science.gov (United States)

    Yeo, Joon Hyung; Moon, Nam Ju; Lee, Jeong Kyu

    2017-06-01

    To introduce a new convenient and accurate method to measure the angle kappa using ultrasound biomicroscopy (UBM) and corneal topography. Data from 42 eyes (13 males and 29 females) were analyzed in this study. The angle kappa was measured using Orbscan II and calculated with UBM and corneal topography. The angle kappa of the dominant eye was compared with measurements by Orbscan II. The mean patient age was 36.4 ± 13.8 years. The average angle kappa measured by Orbscan II was 3.98° ± 1.12°, while the average angle kappa calculated with UBM and corneal topography was 3.19° ± 1.15°. The difference in angle kappa measured by the two methods was statistically significant (p topography to calculate the angle kappa. This method is convenient to use and allows for measurement of the angle kappa without an expensive device. © 2017 The Korean Ophthalmological Society

  1. Elimination of a Second-Law-Attack, and All Cable-Resistance-Based Attacks, in the Kirchhoff-Law-Johnson-Noise (KLJN Secure Key Exchange System

    Directory of Open Access Journals (Sweden)

    Laszlo B. Kish

    2014-10-01

    Full Text Available We introduce the so far most efficient attack against the Kirchhoff-law-Johnson-noise (KLJN secure key exchange system. This attack utilizes the lack of exact thermal equilibrium in practical applications and is based on cable resistance losses and the fact that the Second Law of Thermodynamics cannot provide full security when such losses are present. The new attack does not challenge the unconditional security of the KLJN scheme, but it puts more stringent demands on the security/privacy enhancing protocol than for any earlier attack. In this paper we present a simple defense protocol to fully eliminate this new attack by increasing the noise-temperature at the side of the smaller resistance value over the noise-temperature at the side with the greater resistance. It is shown that this simple protocol totally removes Eve’s information not only for the new attack but also for the old Bergou-Scheuer-Yariv attack. The presently most efficient attacks against the KLJN scheme are thereby completely nullified.

  2. Root deformation reduces tolerance of lodgepole pine to attack by Warren root collar weevil.

    Science.gov (United States)

    Robert, Jeanne A; Lindgren, B Staffan

    2010-04-01

    Surveys were conducted on regenerating stands of lodgepole pine to determine the relationship between root deformation and susceptibility to attack by the Warren root collar weevil, Hylobius warreni Wood. The total number of trees attacked by H. warreni did not differ between planted and natural trees. A matched case-control logistic regression suggested that root cross-sectional area was more important in predicting weevil attack for naturally regenerated trees than for planted trees, but weevils were associated with a larger reduction in height-to-diameter ratios for trees with planted root characteristics than for trees with natural root form. Neither the stability of attacked versus unattacked trees differed significantly and there was no significant interaction of weevil attack and tree type, but weevil-killed trees had different root characteristics than alive, attacked trees. Lateral distribution and root cross-sectional area were significant predictors of alive attacked trees versus weevil-killed trees, suggesting that trees with poor lateral spread or poor root cross-sectional area are more likely to die from weevil attack. We conclude that root deformation does not necessarily increase susceptibility to attack but may increase the likelihood of mortality. Thus, measures to facilitate good root form are needed when planting pine in areas with high risk of Warren root collar weevil attack.

  3. Measuring the effectiveness of SDN mitigations against cyber attacks

    NARCIS (Netherlands)

    Koning, R.; de Graaff, B.; Meijer, R.; de Laat, C.; Grosso, P.

    2017-01-01

    To address increasing problems caused by cyber attacks, we leverage Software Defined networks and Network Function Virtualisation governed by a SARNET-agent to enable autonomous response and attack mitigation. A Secure Autonomous Response Network (SARNET) uses a control loop to constantly assess the

  4. Practising of radiological emergency caused by a terrorist attack

    International Nuclear Information System (INIS)

    Racana, R.; Terrado, C.

    2006-01-01

    After the events of September 11, 2001 terrorist working has become an important factor in the forecasts to adopt in the face of the possibility of confronting different radiological emergencies. The not wanted events of exposure to ionizing radiations can take place by flaws of systems or accidents, or also by criminal voluntary actions. These malevolent actions can include attacks or sabotages in nuclear plants, detonation of manufactured nuclear devices or acquired under ground, robbery of radioactive sources to manufacture the calls dirty bombs or to cause damage, panic or threats. In the scenarios in that the radiological emergency is voluntarily provoked the moment and place of the attack are chosen by the aggressors, therefore the ionizing radiations will be in not prepared atmospheres neither equipped to the effect. This increases the confusion, the panic and the damage not only caused by the radiation effects but also by the uncertainty and consequent reactions. To diminish the effects of this type of threats it is necessary to make forecasts and to train the personnel that it can be direct or indirectly involved. During 2005, an exercise in which it was outlined the robbery by part of a group command of a source of Co 60 of 5000 Ci that it was transported to make a decanting in a medical center of The Pampa county, Argentina. It was about a cabinet exercise, planned and executed jointly among the Nuclear Regulatory Authority and the Secretary of Interior Safety, in which participated the professionals of the nuclear area that by law are the responsible ones of coordinating the actions in the event of an emergency of this type, and the safety forces that depend of the Secretary of Interior Safety, Federal and Provincial Policemen, Naval Prefecture and National Gendarmerie. The exercise last one day during which 9 main situations were approached that were unchained after having produced the attack and initial robbery. For each situation it was checked the

  5. 47 CFR 25.205 - Minimum angle of antenna elevation.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 2 2010-10-01 2010-10-01 false Minimum angle of antenna elevation. 25.205... SATELLITE COMMUNICATIONS Technical Standards § 25.205 Minimum angle of antenna elevation. (a) Earth station antennas shall not normally be authorized for transmission at angles less than 5° measured from the...

  6. Contact angle measurement of natural materials.

    Science.gov (United States)

    Zhao, Tianyi; Jiang, Lei

    2018-01-01

    Contact angle (CA) is the most important parameter used to quantify the wettability of solid surfaces. In order to evaluate wettability performance, numerous methods have been developed to measure the CA of solid surfaces. Recent years have seen increased focus on the special wettability performance of various biological materials. Biomimetic wettability has become one of the most popular research fields, and novel CA measurements have been invented accordingly. In this protocol, we introduce several CA measurement techniques mainly based on the image capture method, which is commonly to investigate the wettability of natural materials. According to the solid/liquid/gas context, we classify CA measurements into three types: in air, under liquid, and air bubble measurements, and describe methods for each. The precise measurement of CA together with study of surface structure can reveal the mechanisms of special wettability, thus accelerating the investigation of biomaterials. Copyright © 2017. Published by Elsevier B.V.

  7. Preliminary report of a community survey of panic attacks and panic disorder.

    OpenAIRE

    Stirton, R F; Brandon, S

    1988-01-01

    This study looked at the prevalence of panic attacks and panic disorder in a British population. Three thousand people (aged 18-65) registered with a Leicester general practice were sent a postal questionnaire which screened for panic attacks. Where appropriate this was followed by a diagnostic interview. Preliminary results are reported for the first 1500 subjects sampled. Panic attacks are a common experience in the study population (7.5% of responders experienced them around the time of th...

  8. Vascular anomalies of the cerebellopontine angle

    International Nuclear Information System (INIS)

    Papanagiotou, P.; Grunwald, I.Q.; Politi, M.; Struffert, T.; Ahlhelm, F.; Reith, W.

    2006-01-01

    Vascular anomalies of the cerebellopontine angle are rare compared to tumors in this area. Irritation of the trigeminal, facial, or vestibulocochlear nerve may cause trigeminal neuralgia, hemifacial spasm and vertigo, or tinnitus accordingly. Vessel loops in the cerebellopontine cisterns may cause compression at the root entry or exit zone of the cranial nerves V, VII, and VIII, a phenomenon which is called ''vascular loop syndrome.'' Megadolichobasilar artery and aneurysms of the vertebrobasilar system can also lead to dislocation and compression of the cranial nerves and brain stem. Three-dimensional CISS MR imaging and MR angiography are useful in the detection of neurovascular compression. Microvascular decompression is an effective surgical procedure in the management of compression syndromes of the cranial nerves V, VII, and VIII. (orig.) [de

  9. Characteristic features of injuries due to shark attacks: a review of 12 cases.

    Science.gov (United States)

    Ihama, Yoko; Ninomiya, Kenji; Noguchi, Masamichi; Fuke, Chiaki; Miyazaki, Tetsuji

    2009-09-01

    Shark attacks on humans might not occur as often as is believed and the characteristic features of shark injuries on corpses have not been extensively reviewed. We describe the characteristic features of shark injuries on 12 corpses. The analysis of these injuries might reveal the motivation behind the attacks and/or the shark species involved in the attack. Gouge marks on the bones are evidence of a shark attack, even if the corpse is decomposed. Severance of the body part at the joints without a fracture was found to be a characteristic feature of shark injuries.

  10. Angle parameter changes of phacoemulsification and combined phacotrabeculectomy for acute primary angle closure

    Directory of Open Access Journals (Sweden)

    Shi-Wei Li

    2015-08-01

    Full Text Available AIM: To evaluate the difference in angle parameters and clinical outcome following phacoemulsification and combined phacotrabeculectomy in patients with acute primary angle closure (APAC using ultrasound biomicroscopy (UBM.METHODS: Patients (n=23, 31 eyes were randomized to receive phacoemulsification or combined phacotrabeculectomy (n=24, 31 eyes. Best-corrected visual acuity (BCVA, intraocular pressure (IOP, the main complications following surgery, and indentation gonioscopy and angle parameters measured using UBM were documented preoperatively and postoperatively.RESULTS:The improvement in BCVA in the phacoemulsification group was significantly greater than in the combined group (P<0.05. IOP in the phacoemulsification group was slightly higher than in the combined group following 1wk of follow-up (P<0.05, whereas there was no significant difference between the two groups at the latter follow-up (P>0.05. Phacoemulsification alone resulted in a slight increase in the trabecular ciliary processes distance compared with the combined surgery (P<0.05, whereas the other angle parameters showed no significant difference between the groups. Complications in combined group were greater than phacoemulsification only group.CONCLUSION:Both surgeries effectively opened the drainage angle and deepened the anterior chamber, and IOP was well controlled postoperatively. However, phacoemulsification showed better efficacy in improving visual function and showed reduced complications following surgery.

  11. A study on the mechanism of speculative attack and the defence strategy of the central bank.

    Directory of Open Access Journals (Sweden)

    Chang-Hyun Yun

    1999-09-01

    Full Text Available We first analyze the concrete mechanism of speculative attack on the foreign exchange market which became very prevalent phenomena during the foreign exchange crisis. When the central bank of the domestic country tries to defend the attack by increasing the interest rate, some problems can arise in that the speculative attacks through foreign exchange options market and/or index futures markets can be very successful due to that policy. So the central bank should pay much attention to the microstructure of the financial markets when the defence strategy against speculative attack is determined.

  12. Detection and Modeling of Cyber Attacks with Petri Nets

    Directory of Open Access Journals (Sweden)

    Bartosz Jasiul

    2014-12-01

    Full Text Available The aim of this article is to present an approach to develop and verify a method of formal modeling of cyber threats directed at computer systems. Moreover, the goal is to prove that the method enables one to create models resembling the behavior of malware that support the detection process of selected cyber attacks and facilitate the application of countermeasures. The most common cyber threats targeting end users and terminals are caused by malicious software, called malware. The malware detection process can be performed either by matching their digital signatures or analyzing their behavioral models. As the obfuscation techniques make the malware almost undetectable, the classic signature-based anti-virus tools must be supported with behavioral analysis. The proposed approach to modeling of malware behavior is based on colored Petri nets. This article is addressed to cyber defense researchers, security architects and developers solving up-to-date problems regarding the detection and prevention of advanced persistent threats.

  13. DoS attacks targeting SIP server and improvements of robustness

    OpenAIRE

    Vozňák, Miroslav; Šafařík, Jakub

    2012-01-01

    The paper describes the vulnerability of SIP servers to DoS attacks and methods for server protection. For each attack, this paper describes their impact on a SIP server, evaluation of the threat and the way in which they are executed. Attacks are described in detail, and a security precaution is made to prevent each of them. The proposed solution of the protection is based on a specific topology of an intrusion protection systems components consisting of a combination of...

  14. September 11th, an attack at the limits of thought.

    Science.gov (United States)

    Patalano, Roberta

    2017-10-01

    The paper deals with imagination and its failures from a psychoanalytic perspective. We offer a definition of imagination failures and suggest how they can be interpreted as an opportunity to learn from experience. In order to show that the topic has a concrete and not only speculative significance we consider the public report on September 11 as a case study. The report was published by the National Commission on Terrorist Attacks Upon the United States after a long investigation of the facts and circumstances relating to the September 11 attacks. The document has been the object of strong criticisms, as we argue in the paper. Both the document and some of the critiques that it received focus, however, on significant aspects of the debate about imagination, such us the fragility of imaginative thought, its dependence on unconscious desires and its plurality of outcomes: a plethora of imaginaries can in fact be developed at any time, from the same set of information about reality. We comment on these aspects and reinterpret them from a Bionian perspective. The concepts of 'unthinkability', 'imagination failure' and 'depressive position' are used to inform the necessity of dealing with an evolving and conflictual geopolitical scenario. Particular attention is paid to the proposal of 'routinizing, even bureaucratizing, the exercise of imagination' within the institutions that deal with National Defense. This possibility is discussed in depth in order to suggest how it may be concretely implemented. In conclusion, a strong case is made for the usefulness of psychoanalytic reflection in the arena of relationships among countries, with particular emphasis on the new terrorist challenges. Copyright © 2016 Institute of Psychoanalysis.

  15. Attacks of Asthma due to Chlorinized Water: Case Report

    Directory of Open Access Journals (Sweden)

    Murat Eyup Berdan

    2008-02-01

    Full Text Available The presence of a high prevalence of bronchial hyperresponsiveness and asthma-like symptoms in swimmers has been reported. But, attacks of asthma which is related to chlorinized water is rare. Chlorine, a strong oxidizing agent, is an important toxic gas that the swimmer can breath during swimming and a worker can exposed to chlorine while he or she was using water with chlorine at home. We describe a persistent increase in nonspecific bronchial hyperresponsiveness following chronic exposure to strong respiratory irritant with chlorinized water in two subjects with no past history of asthma or atopy. We conclude that airway hyperresponsiveness can develop or increase after chronic inhalation of high concentrations of irritants such as chlorinized water an indoor irritant factor and that these changes may be prolonged. [TAF Prev Med Bull 2008; 7(1.000: 87-90

  16. Composite Dos Attack Model

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2012-04-01

    Full Text Available Preparation for potential threats is one of the most important phases ensuring system security. It allows evaluating possible losses, changes in the attack process, the effectiveness of used countermeasures, optimal system settings, etc. In cyber-attack cases, executing real experiments can be difficult for many reasons. However, mathematical or programming models can be used instead of conducting experiments in a real environment. This work proposes a composite denial of service attack model that combines bandwidth exhaustion, filtering and memory depletion models for a more real representation of similar cyber-attacks. On the basis of the introduced model, different experiments were done. They showed the main dependencies of the influence of attacker and victim’s properties on the success probability of denial of service attack. In the future, this model can be used for the denial of service attack or countermeasure optimization.

  17. Army Attack Aviation Returning to the Close Fight: Impact of the MOUT Environment

    National Research Council Canada - National Science Library

    Tate, Frank

    2001-01-01

    .... attack helicopters and their employment, an analysis of the modern threat environment which indicates a strong likelihood of fighting in urban environments, a review of existing aviation doctrine...

  18. Characteristics of acute pain attacks in patients with irritable bowel syndrome meeting Rome III criteria

    DEFF Research Database (Denmark)

    Hellström, P.M.; Saito, Y.A.; Bytzer, P.

    2011-01-01

    the survey were women with a mean age of 41 years and time since IBS diagnosis of 5 years. The median pain attack frequency was 5.4 attacks per month and was significantly higher in the IBS with diarrhea (IBS-D, 6.4 per month) group vs. the IBS with constipation (4.4 per month) and the IBS with mixed pattern......Objectives: An international multicenter, prospective, non-interventional, 2-month study characterized acute pain attacks in patients with irritable bowel syndrome (IBS). Methods: Adult patients meeting the Rome III IBS diagnostic criteria with a history of 3 pain attacks per month participated...... in a survey that captured daily and episodic information regarding IBS symptoms and pain attacks for 2 months. Acute pain attacks were defined as a sudden onset or increase in the intensity of IBS abdominal pain with a minimum intensity of 4 (0-10 scale). Results: The majority (84%) of the 158 patients taking...

  19. Evaluation of Seizure Attacks in Patients with Cerebrovascular Accident

    Directory of Open Access Journals (Sweden)

    Ebrahim Koochaki

    2013-04-01

    Full Text Available Background: The most common reason for seizure in elderly duration is the stroke. This study was conducted aiming to assess the frequency of seizure attack occurrence in those patients. Materials and Methods: This investigation was carried out through a cross-sectional method for one year on 330 patients admitted to the neurology ward as diagnosed with stroke. The required data was collected through the researcher-made questionnaire from the patients suffering from stoke which was diagnosed based on clinical findings, CT-Scan and MRI as required. Results: Among 330 patient suffering from stroke (162 men and 168 women, 48 cases (14.5% were suffering from seizure. Six percent of the patients had early seizure and another 8.5% had late seizure. Among 162 men suffering from the stroke, 32 ones were without seizures and 30 men were suffering the seizure. A number of 150 women out of total 168 ones suffering from the stroke, had no seizure and 18 others had seizures; frequency of seizure occurrence was more in male samples (p=0.044. In the people under 60 year, there were mostly early types of seizure (45% and in the age range above 60 year, it was mostly late type (89.3%. A 68.5% of the patients suffering from the seizure had experienced ischemic stroke. However, the frequency of seizure occurrence in the patients with hemorrhagic stroke was statistically greater (p=0.003. Conclusion: This examination showed that occurrence of seizure attacks in the people with stroke is 14.5% and it is seen more in the hemorrhagic strokes than ischemic ones. The frontoparietal area is the most common location involved and tonic clonic was the most common seizure in the patients suffering from it who have experienced the stroke

  20. Relation of EEG and computerized tomography in transient ischaemic attacks

    International Nuclear Information System (INIS)

    Ladurner, G.; Enge, S.; Sager, W.D.; Logar, C.; Lechner, H.; Landeskrankenhaus Graz; Graz Univ.

    1981-01-01

    80 patients with transient ischaemic attack (TIA) were examined via computer tomogram (CT) and electronencephalogram (EEG). 53 patients were found to have a normal CT and 32 a normal EEG. In the patients with pathological CT findings (27) a significantly lower number of normal EEG's (22) was seen. Further subdivision of the 27 pathological CT findings revealed 12 patients with hypodense areas (infarctions) and 15 patients with an atrophy only. A normal EEG was significantly rarer in patients with a hypodense lesion (2) and in those with atrophy (3), focal EEG changes being significantly more frequent. Hence EEG findings facilitate the aetiological linking of an atrophy to an ischaemic stroke, especially when EEG follow-up examinations are included in the diagnostic procedure. (orig.) [de

  1. Defense against SYN-Flood Denial of Service Attacks Based on Learning Automata

    OpenAIRE

    Bekravi, Masoud; Jamali, Shahram; Shaker, Gholam

    2012-01-01

    SYN-flooding attack uses the weakness available in TCPs three-way handshake process to keep it from handling legitimate requests. This attack causes the victim host to populate its backlog queue with forged TCP connections. In other words it increases Ploss (probability of loss) and Pa (buffer occupancy percentage of attack requests) and decreases Pr (buffer occupancy percentage of regular requests) in the victim host and results to decreased performance of the host. This paper proposes a sel...

  2. Attacks and intrusion detection in wireless sensor networks of industrial SCADA systems

    Science.gov (United States)

    Kamaev, V. A.; Finogeev, A. G.; Finogeev, A. A.; Parygin, D. S.

    2017-01-01

    The effectiveness of automated process control systems (APCS) and supervisory control and data acquisition systems (SCADA) information security depends on the applied protection technologies of transport environment data transmission components. This article investigates the problems of detecting attacks in wireless sensor networks (WSN) of SCADA systems. As a result of analytical studies, the authors developed the detailed classification of external attacks and intrusion detection in sensor networks and brought a detailed description of attacking impacts on components of SCADA systems in accordance with the selected directions of attacks.

  3. Dilemma of gonial angle measurement: Panoramic radiograph or lateral cephalogram

    Energy Technology Data Exchange (ETDEWEB)

    Radhakrishnan, Pillai Devu; Varma, Nilambur Kovilakam Sapna; Ajith, Vallikat Velath [Dept. of Orthodontics, Amrita School of Dentistry, Kochi (India)

    2017-06-15

    The purpose of this study was to evaluate the accuracy of panoramic imaging in measuring the right and left gonial angles by comparing the measured angles with the angles determined using a lateral cephalogram of adult patients with class I malocclusion. The gonial angles of 50 class I malocclusion patients (25 males and 25 females; mean age: 23 years) were measured using both a lateral cephalogram and a panoramic radiograph. In the lateral cephalograms, the gonial angle was measured at the point of intersection of the ramus plane and the mandibular plane. In the panoramic radiographs, the gonial angle was measured by drawing a line tangent to the lower border of the mandible and another line tangent to the distal border of the ascending ramus and the condyle on both sides. The data obtained from both radiographs were statistically compared. No statistically significant difference was observed between the gonial angle measured using the lateral cephalograms and that determined using the panoramic radiographs. Further, there was no statistically significant difference in the measured gonial angle with respect to gender. The results also showed a statistically insignificant difference in the mean of the right and the left gonial angles measured using the panoramic radiographs. As the gonial angle measurements using panoramic radiographs and lateral cephalograms showed no statistically significant difference, panoramic radiography can be considered in orthodontics for measuring the gonial angle without any interference due to superimposed images.

  4. Investigation of digestion Kinetics in commercial starches using in-situ small-angle neutron scattering

    International Nuclear Information System (INIS)

    Blazek, Jaroslav; Gilbert, Elliot Paul

    2009-01-01

    Full text: The digestion of starch has been the subject of many investigations, mostly involving in vitro measurement of the susceptibility of starches to attack by different enzymes, rather than measuring actual digestibility in vivo. The rate and extent of amylolytic hydrolysis of granular starches is known to vary according to botanical origin. Granule characteristics considered to influence susceptibility to attack by alpha-amylase include crystallinity, granule size and available specific surface, amylose content, porosity, structural inhomogeneities and degree of integrity. Most in-vitro studies of granular starch digestion have been limited to samples for which aliquots have been removed from the reaction mixture at various time intervals and freeze-dried to be subsequently characterized using a range of techniques. It remains unclear whether sample preparation creates artefacts in the samples. In this study, we have studied the kinetics of starch digestion of several commercial granular starches by time-resolved small-angle neutron scattering using an in-situ digestion chamber allowing, for the first time, to follow structural changes of starch in the course of digestion directly in the digestion mixture. Additionally, samples before and after digestion were studied by x-ray diffraction, small-angle x-ray scattering, differential scanning calorimetry and microscopy. Microscopy revealed that studied starches, which varied in their amylose content and digestion kinetics, followed different modes of attack The multidisciplinary approach allowed the nanostructural changes detected by small-angle scattering in the course of enzymic breakdown to be correlated with changes in crystallinity and functional properties.

  5. Regulation of regional cerebral blood flow during and between migraine attacks

    DEFF Research Database (Denmark)

    Lauritzen, M; Olsen, T S; Lassen, N A

    1983-01-01

    Cerebrovascular reactivity to voluntary hyperventilation, moderate hypertension, and physiological activation was studied in nine patients during induced migraine attacks and in four patients between their attacks. Regional cerebral blood flow was measured by the xenon 133 injection technique in ...... abnormalities to the area of the oligemia supports our suggestion that the blood flow changes are caused by a change in local metabolism. Between attacks of migraine, the patients had normal regulation of brain circulation....

  6. Case Studies of Attacks over Adaptive Modulation Based Tactical Software Defined Radios

    Directory of Open Access Journals (Sweden)

    David Fernandes Cruz Moura

    2012-01-01

    Full Text Available This paper presents case studies of attacks aimed at tactical software defined radios based on a classification with the most common sources of vulnerabilities, classes of attacks, and types of intrusions that military radio sets may suffer. Besides that, we also describe how attack mitigation strategies can impact the development of SDR infrastructures. By using such approach, we identify several possible sources of vulnerabilities, attacks, intrusions, and mitigation strategies, illustrating them onto typical tactical radio network deployment scenarios, as an initial and necessary step for the definition of realistic and relevant security requirements for military software defined radio applications.

  7. Residue Age and Attack Pressure Influence Efficacy of Insecticide Treatments Against Ambrosia Beetles (Coleoptera: Curculionidae).

    Science.gov (United States)

    Reding, Michael E; Ranger, Christopher M

    2018-02-09

    Management of ambrosia beetles in ornamental nurseries relies, in part, on insecticide treatments to prevent beetles from boring into trees. However, data on residual efficacy of commonly used pyrethroid insecticides is needed to gauge the duration that trees are protected during spring when peak beetle pressure occurs. Residual efficacy of bifenthrin and permethrin trunk sprays was examined in field trials which used trees injected with 10% ethanol to ensure host attack pressure. Permethrin consistently reduced attacks by Xylosandrus germanus (Blandford; Coleoptera: Curculionidae) and other ambrosia beetles for at least 4 wk, while efficacy of bifenthrin was inconsistent and lasted only about 10 d. Since previous studies demonstrated attacks are positively correlated with host ethanol emissions, we injected trees with 2.5, 5, and 10% ethanol to determine if residual efficacy was affected by attack pressure. Preventive treatments with bifenthrin reduced ambrosia beetle attacks at all concentrations of injected ethanol compared to non-sprayed controls. There was no interaction between attack pressure and insecticide treatment with respect to total attacks or attacks by X. germanus. However, increasing attack pressure did increase the probability of attacks on insecticide treated trees by X. germanus and other Scolytinae. Results from our current study will improve the ability of growers to make decisions on frequency of protective sprays, but residual efficacy of insecticide treatments may decline as attack pressure increases. Cultural practices should therefore maximize host vigor and minimize attack pressure associated with stress-induced ethanol emissions. Published by Oxford University Press on behalf of Entomological Society of America 2017. This work is written by (a) US Government employee(s) and is in the public domain in the US.

  8. Incidence and impact of dog attacks on guide dogs in the UK: an update.

    Science.gov (United States)

    Moxon, R; Whiteside, H; England, G C W

    2016-04-09

    Data on dog attacks on Guide Dogs' stock were reviewed to investigate the characteristics of the attacks. An average of 11.2 attacks occurred each month. Nearly all of the attacks occurred in public areas, 68.4 per cent of victim dogs were qualified guide dogs and 55.5 per cent of victim dogs were working in harness when they were attacked. Guide Dogs' stock were injured in 43.2 per cent of attacks and veterinary costs for attacks were estimated at £34,514.30. Over 40 per cent of qualified guide dogs' working ability was affected and >20 per cent of qualified guide dogs required some time off from working after a dog attack. Twenty dogs were permanently withdrawn from the Guide Dogs' programme as a result of dog attacks, 13 of which were qualified and working with guide dog owners at the time of the withdrawal; this resulted in a financial cost of >£600,000 to the charity. More importantly perhaps, temporary and permanent withdrawals have a significant impact upon the mobility and independence of guide dog owners and in many cases significantly impacted their emotional well-being. British Veterinary Association.

  9. The Department of Defense Must Combat Cyber Terrorism with Cyber Attacks

    Science.gov (United States)

    2008-10-20

    The Department of Defense Must Combat Cyber Terrorism With Cyber Attacks EWS Contemporary Issues Paper Submitted by Captain P. A...The Department of Defense Must Combat Cyber Terrorism With Cyber Attacks 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR...technological assets used by adversaries. The biggest change to policy that allowed for cyber attacks occurred in October 2002 when the Joint Task Force

  10. Air Mobility and the Development of Attack Aviation During the Vietnam War from 1965-1967

    Science.gov (United States)

    2014-06-13

    the Ka-50 Black Shark to maintain helicopter parity with the U.S. The AAFSS project became the Advanced Attack Helicopter that later produced the...AIR MOBILITY AND THE DEVELOPMENT OF ATTACK AVIATION DURING THE VIETNAM WAR FROM 1965-1967 A thesis presented to the Faculty...AUG 2013 – JUNE 2014 4. TITLE AND SUBTITLE Air Mobilty and the Development of Attack Aviation during the Vietnam War from 1965-1967 5a. CONTRACT

  11. [The weather chart pattern inducing asthma attack: the advocacy of "fine mist" as a provocative factor].

    Science.gov (United States)

    Kanaya, K

    2001-05-01

    Outbreaks of asthma attack on 345 patients were studied in relation to the atmospheric phenomena. About 76% of days in which multiple attacks took place were fit with either of the following atmospheric conditions, 1) the trough of atmospheric pressure, 2) the approach of Typhoon, 3) the cold advection, in Japan. The common feature of these different atmospheric conditions are the tendency to turn excess vapor into fine water particles (fine mist). The fine mist could stimulate irritable airway to asthma attacks ("fine mist" hypothesis). To verity this hypothesis each asthmatic attack was further studied. It fitted in 70.7% of the attacks (fitting group) and not in 29.3% of the attacks (non-fitting group). Frequency of asthmatic attacks varied in every month on fitting group, but was nearly constant on non-fitting group. The average of the daily change of vapor density was calculated monthly. And it appeared that its graphic pattern was similar to the graphic pattern of asthmatic attack frequency. Thus it is supposed that there are at least two factors that could induce asthmatic attacks, one would be fine mist, others are unknown.

  12. A comparison of two approaches to managing acute primary angle closure in Asian eyes

    Directory of Open Access Journals (Sweden)

    Ho H

    2013-06-01

    Full Text Available Henrietta Ho,1 Paul T Chew,2 Chelvin Sng,1,2 Huiqi Huang,1 Tin Aung,1,2 Shamira A Perera1,21Singapore Eye Research Institute, Singapore National Eye Centre, Singapore; 2Yong Loo Lin School of Medicine, National University of Singapore and National University Health System, SingaporePurpose: To review the management regimes of acute primary angle closure (APAC in two hospitals in Singapore, and to identify the incidence of and risk factors for progression to glaucomatous optic neuropathy.Methods: We conducted a retrospective review of 40 patients from National University Hospital (NUH and 52 patients from Singapore National Eye Centre (SNEC who were diagnosed with APAC. Patients were treated with similar protocols of intensive medical therapy until laser peripheral iridotomy could be performed. In the event of failed medical treatment, patients at NUH only underwent laser iridoplasty. The 1-year outcomes were reviewed.Results: The demographic features of patients and presenting intraocular pressures (IOP were similar in both centers. More patients from NUH presented within 3 days of symptom onset, compared to those from SNEC (90.0% versus 71.2%, respectively (P = 0.037. The mean ± standard deviation time to break the attack was 18.2 ± 32.9 hours at SNEC and 9.80 ± 10.6 hours at NUH (P = 0.11. The mean follow up duration was 18.8 ± 14.0 months. Nineteen patients (36.5% from SNEC and six patients (22.5% from NUH developed raised IOP (P = 0.032 within 1-year of the attack. Of these, glaucomatous optic neuropathy developed in thirteen patients (68.4% from SNEC and all six patients (100% from NUH. At final review, the mean IOP of the APAC eye was 14.8 ± 4.3 mmHg from SNEC and 13.4 ± 3.0 mmHg from NUH. There was no significant difference in final visual acuity or IOP between both groups.Conclusion: Treatment strategies in both centers were effective in aborting an APAC attack. The development of raised IOP appears to be associated with a longer

  13. Multi-Layer Approach for the Detection of Selective Forwarding Attacks

    Directory of Open Access Journals (Sweden)

    Naser Alajmi

    2015-11-01

    Full Text Available Security breaches are a major threat in wireless sensor networks (WSNs. WSNs are increasingly used due to their broad range of important applications in both military and civilian domains. WSNs are prone to several types of security attacks. Sensor nodes have limited capacities and are often deployed in dangerous locations; therefore, they are vulnerable to different types of attacks, including wormhole, sinkhole, and selective forwarding attacks. Security attacks are classified as data traffic and routing attacks. These security attacks could affect the most significant applications of WSNs, namely, military surveillance, traffic monitoring, and healthcare. Therefore, there are different approaches to detecting security attacks on the network layer in WSNs. Reliability, energy efficiency, and scalability are strong constraints on sensor nodes that affect the security of WSNs. Because sensor nodes have limited capabilities in most of these areas, selective forwarding attacks cannot be easily detected in networks. In this paper, we propose an approach to selective forwarding detection (SFD. The approach has three layers: MAC pool IDs, rule-based processing, and anomaly detection. It maintains the safety of data transmission between a source node and base station while detecting selective forwarding attacks. Furthermore, the approach is reliable, energy efficient, and scalable.

  14. Multi-Layer Approach for the Detection of Selective Forwarding Attacks.

    Science.gov (United States)

    Alajmi, Naser; Elleithy, Khaled

    2015-11-19

    Security breaches are a major threat in wireless sensor networks (WSNs). WSNs are increasingly used due to their broad range of important applications in both military and civilian domains. WSNs are prone to several types of security attacks. Sensor nodes have limited capacities and are often deployed in dangerous locations; therefore, they are vulnerable to different types of attacks, including wormhole, sinkhole, and selective forwarding attacks. Security attacks are classified as data traffic and routing attacks. These security attacks could affect the most significant applications of WSNs, namely, military surveillance, traffic monitoring, and healthcare. Therefore, there are different approaches to detecting security attacks on the network layer in WSNs. Reliability, energy efficiency, and scalability are strong constraints on sensor nodes that affect the security of WSNs. Because sensor nodes have limited capabilities in most of these areas, selective forwarding attacks cannot be easily detected in networks. In this paper, we propose an approach to selective forwarding detection (SFD). The approach has three layers: MAC pool IDs, rule-based processing, and anomaly detection. It maintains the safety of data transmission between a source node and base station while detecting selective forwarding attacks. Furthermore, the approach is reliable, energy efficient, and scalable.

  15. Intact blood-brain barrier during spontaneous attacks of migraine without aura

    DEFF Research Database (Denmark)

    Amin, F M; Hougaard, A; Cramer, S P

    2017-01-01

    , brain stem, posterior pons and whole brain. The paired samples t test was used to compare Ki (permeability) values between the attack and headache-free days. RESULTS: Nineteen patients completed the study. Median time from onset of migraine attack to scan was 6.5 h (range 4.0-15.5 h). No change......BACKGROUND AND PURPOSE: The integrity of the blood-brain barrier (BBB) has been questioned in migraine, but BBB permeability has never been investigated during spontaneous migraine attacks. In the present study, BBB permeability during spontaneous attacks of migraine without aura was investigated...

  16. Cerebral blood flow velocities are reduced during attacks of unilateral migraine without aura

    DEFF Research Database (Denmark)

    Thomsen, L L; Iversen, Helle Klingenberg; Olesen, J

    1995-01-01

    It has been disputed whether or not large intracranial arteries are dilated during migraine attacks. In order to answer this question the present transcranial Doppler study focused on side-to-side differences of middle cerebral artery blood velocity during unilateral attacks of migraine without...... aura in 25 patients. Blood velocity in the middle cerebral artery was lower on the headache side (59 cm/s) than on the non-headache side (65 cm/s) during the migraine attack. No such difference was found outside of attack (65 cm/s both sides). The difference (headache side minus non-headache side...

  17. Defense Against Rocket Attacks in the Presence of False Cues

    National Research Council Canada - National Science Library

    Harari, Lior

    2008-01-01

    Rocket attacks on civilian and military targets, from both Hezbollah (South Lebanon) and Hamas (Gaza strip) have been causing a major operational problem for the Israeli Defense Force for over two decades...

  18. Reducing an attack surface of an operating system

    OpenAIRE

    VALKONEN, VILLE

    2012-01-01

    Certain security choices done on the operating system level can mitigate harm done by an malicious attacker or a program. The main focus in the thesis is on open source operating systems. Asiasanat: software security, operating system security

  19. Steering Angle Function Algorithm of Morphing of Residential Area

    Directory of Open Access Journals (Sweden)

    XIE Tian

    2015-07-01

    Full Text Available A residential area feature morphing method based on steering angle function is presented. To residential area with the same representation under two different scales,transforming the representation of the residential area polygon from vector coordinates to steering angle function,then using the steering angle function to match,and finding out the similarity and the differences between the residential areas under different scale to get the steering angle function of the the residential areas under any middle scale,the final,transforming the middle scale steering angle function to vector coordinates form,and get the middle shape interpolation of the the residential area polygon.Experimental results show:the residential area morphing method by using steering angle function presented can realize the continuous multi-scale representation under the premise of keeping in shape for the residential area with the rectangular boundary features.

  20. A comparison of two approaches to managing acute primary angle closure in Asian eyes.

    Science.gov (United States)

    Ho, Henrietta; Chew, Paul T; Sng, Chelvin; Huang, Huiqi; Aung, Tin; Perera, Shamira A

    2013-01-01

    To review the management regimes of acute primary angle closure (APAC) in two hospitals in Singapore, and to identify the incidence of and risk factors for progression to glaucomatous optic neuropathy. We conducted a retrospective review of 40 patients from National University Hospital (NUH) and 52 patients from Singapore National Eye Centre (SNEC) who were diagnosed with APAC. Patients were treated with similar protocols of intensive medical therapy until laser peripheral iridotomy could be performed. In the event of failed medical treatment, patients at NUH only underwent laser iridoplasty. The 1-year outcomes were reviewed. The demographic features of patients and presenting intraocular pressures (IOP) were similar in both centers. More patients from NUH presented within 3 days of symptom onset, compared to those from SNEC (90.0% versus 71.2%, respectively) (P = 0.037). The mean ± standard deviation time to break the attack was 18.2 ± 32.9 hours at SNEC and 9.80 ± 10.6 hours at NUH (P = 0.11). The mean follow up duration was 18.8 ± 14.0 months. Nineteen patients (36.5%) from SNEC and six patients (22.5%) from NUH developed raised IOP (P = 0.032) within 1-year of the attack. Of these, glaucomatous optic neuropathy developed in thirteen patients (68.4%) from SNEC and all six patients (100%) from NUH. At final review, the mean IOP of the APAC eye was 14.8 ± 4.3 mmHg from SNEC and 13.4 ± 3.0 mmHg from NUH. There was no significant difference in final visual acuity or IOP between both groups. Treatment strategies in both centers were effective in aborting an APAC attack. The development of raised IOP appears to be associated with a longer period of attack suggesting that greater urgency in aborting APAC attacks may entail better long term outcomes.

  1. Contemporary management of transient ischemic attack: role of the pharmacist.

    Science.gov (United States)

    Rhoney, Denise H

    2011-02-01

    Transient ischemic attacks (TIAs) have been redefined recently. The new tissue-based definition of TIA abandons the 24-hour restriction on symptom duration previously used to differentiate TIA from acute ischemic stroke and requires neuroimaging studies to identify the cause of the ischemia and to determine the presence and extent of brain injury. This new definition brings to light the need for urgent diagnostic testing and timely initiation of treatment, as well as secondary prevention measures to reduce the increased risk of stroke, cardiovascular complications, and death in the days and weeks after a TIA. Pharmacists play a key role in identifying patients at risk for a first or recurrent TIA or stroke, educating high-risk patients on the signs and symptoms of TIA or stroke and the need for urgent evaluation and treatment, overcoming barriers to timely diagnosis and treatment, and ensuring that appropriate primary or secondary prevention strategies are in place. Furthermore, studies have shown that pharmacist-led interventions can lead to significant improvements in modifiable risk factors, such as blood pressure and cholesterol levels, as well as drug adherence, and may reduce the occurrence of strokes. These interventions may also help maintain patients' health-related quality of life and improve patients' satisfaction with care.

  2. Relation of Temperature and Humidity to the Risk of Recurrent Gout Attacks

    Science.gov (United States)

    Neogi, Tuhina; Chen, Clara; Niu, Jingbo; Chaisson, Christine; Hunter, David J.; Choi, Hyon; Zhang, Yuqing

    2014-01-01

    Gout attack risk may be affected by weather (e.g., because of volume depletion). We therefore examined the association of temperature and humidity with the risk of recurrent gout attacks by conducting an internet-based case-crossover study in the United States (in 2003–2010) among subjects with a diagnosis of gout who had 1 or more attacks during 1 year of follow-up. We examined the association of temperature and humidity over the prior 48 hours with the risk of gout attacks using a time-stratified approach and conditional logistic regression. Among 632 subjects with gout, there was a significant dose-response relationship between mean temperature in the prior 48 hours and the risk of subsequent gout attack (P = 0.01 for linear trend). Higher temperatures were associated with approximately 40% higher risk of gout attack compared with moderate temperatures. There was a reverse J-shaped relationship between mean relative humidity and the risk of gout attacks (P = 0.03 for quadratic trend). The combination of high temperature and low humidity had the greatest association (odds ratio = 2.04, 95% confidence interval: 1.26, 3.30) compared with moderate temperature and relative humidity. Thus, high ambient temperature and possibly extremes of humidity were associated with an increased risk of gout attack, despite the likelihood that individuals are often in climate-controlled indoor environments. PMID:24993733

  3. Characterization of collective Gaussian attacks and security of coherent-state quantum cryptography.

    Science.gov (United States)

    Pirandola, Stefano; Braunstein, Samuel L; Lloyd, Seth

    2008-11-14

    We provide a simple description of the most general collective Gaussian attack in continuous-variable quantum cryptography. In the scenario of such general attacks, we analyze the asymptotic secret-key rates which are achievable with coherent states, joint measurements of the quadratures and one-way classical communication.

  4. Help-Seeking Behaviours of Adolescents in Relation to Terrorist Attacks: The Perceptions of Israeli Parents

    Science.gov (United States)

    Tatar, Moshe; Amram, Sima; Kelman, Talia

    2011-01-01

    Exposure to terrorism poses a challenge for children and adolescents as well as parents. For many years, Israeli citizens have been exposed to ongoing terrorist attacks. The present article is aimed at revealing the reactions of Israeli parents when facing terrorist attacks and their perceptions regarding the help-seeking behaviours of their…

  5. The effect of ad hominem attacks on the evaluation of claims promoted by scientists.

    Directory of Open Access Journals (Sweden)

    Ralph M Barnes

    Full Text Available Two experiments were conducted to determine the relative impact of direct and indirect (ad hominem attacks on science claims. Four hundred and thirty-nine college students (Experiment 1 and 199 adults (Experiment 2 read a series of science claims and indicated their attitudes towards those claims. Each claim was paired with one of the following: A a direct attack upon the empirical basis of the science claim B an ad hominem attack on the scientist who made the claim or C both. Results indicate that ad hominem attacks may have the same degree of impact as attacks on the empirical basis of the science claims, and that allegations of conflict of interest may be just as influential as allegations of outright fraud.

  6. Using the cumulative sum algorithm against distributed denial of service attacks in Internet of Things

    CSIR Research Space (South Africa)

    Machaka, Pheeha

    2015-11-01

    Full Text Available The paper presents the threats that are present in Internet of Things (IoT) systems and how they can be used to perpetuate a large scale DDoS attack. The paper investigates how the Cumulative Sum (CUSUM) algorithm can be used to detect a DDoS attack...

  7. Patients' perceptions of their heart attack and recovery: the influence of epidemiological "evidence" and personal experience.

    Science.gov (United States)

    Wiles, R

    1998-06-01

    Secondary prevention of heart disease is widely viewed as likely to be more successful and cost effective than primary prevention. However, people's willingness to adopt lifestyle change is a complex issue in which people's perceptions of disease causation and risk as well as a range of socio-economic factors are important. This paper reports on a qualitative study of people following heart attack which examines their understandings of heart attack and the salience that lifestyle advice has in the light of these understandings. In-depth, qualitative interviews were conducted with 25 people recovering from heart attack. Each person was interviewed twice: at around two weeks and five months following their heart attack. The study found that information about recovery provided by health professionals was based on a simplified version of epidemiological evidence. This information played a central role in people's understandings about the nature of heart attack and their future risk in the early weeks following heart attack. However, as interviewees came to terms with the shock of the event, they tended to lose their trust in "official" accounts of cause and recovery and evidence from lay epidemiology that contradicted official accounts tended to emerge. This evidence encouraged interviewees to question the explanatory power of official accounts and to view the adoption of long-term lifestyle change as an action that would not guarantee protection from a further heart attack. This was true whether or not people's experiences of recovery reflected those "predicted" by health professionals although those awaiting further surgery or tests tended to maintain trust in official accounts over a longer period. It is concluded that the failure of official accounts to acknowledge the random nature of the occurrence of heart attack, the severity of heart attack and the level of recovery from heart attack is a central feature in people's reluctance to view lifestyle change as a

  8. A cephalometric assessment of the nasolabial angle of an adult ...

    African Journals Online (AJOL)

    Objective: One of the most important components of orthodontic diagnosis and treatment planning is an evaluation of the patient's soft tissue profile. An assessment of the nasolabial angle is a vital component of this evaluation. The purpose of this study was to establish norms for the nasolabial angle of an adult Nigerian ...

  9. Application of stochastic discrete event system framework for detection of induced low rate TCP attack.

    Science.gov (United States)

    Barbhuiya, F A; Agarwal, Mayank; Purwar, Sanketh; Biswas, Santosh; Nandi, Sukumar

    2015-09-01

    TCP is the most widely accepted transport layer protocol. The major emphasis during the development of TCP was its functionality and efficiency. However, not much consideration was given on studying the possibility of attackers exploiting the protocol, which has lead to several attacks on TCP. This paper deals with the induced low rate TCP attack. Since the attack is relatively new, only a few schemes have been proposed to mitigate it. However, the main issues with these schemes are scalability, change in TCP header, lack of formal frameworks, etc. In this paper, we have adapted the stochastic DES framework for detecting the attack, which addresses most of these issues. We have successfully deployed and tested the proposed DES based IDS on a test bed. Copyright © 2015 ISA. Published by Elsevier Ltd. All rights reserved.

  10. Angioedema attacks in patients with hereditary angioedema : Local manifestations of a systemic activation process

    NARCIS (Netherlands)

    Hofman, Zonne L M; Relan, Anurag; Zeerleeder, Sacha; Drouet, Christian; Zuraw, Bruce; Hack, C. Erik

    Hereditary angioedema (HAE) caused by a deficiency of functional C1-inhibitor (C1INH) becomes clinically manifest as attacks of angioedema. C1INH is the main inhibitor of the contact system. Poor control of a local activation process of this system at the site of the attack is believed to lead to

  11. Angioedema attacks in patients with hereditary angioedema: Local manifestations of a systemic activation process

    NARCIS (Netherlands)

    Hofman, Zonne L. M.; Relan, Anurag; Zeerleder, Sacha; Drouet, Christian; Zuraw, Bruce; Hack, C. Erik

    2016-01-01

    Hereditary angioedema (HAE) caused by a deficiency of functional C1-inhibitor (C1INH) becomes clinically manifest as attacks of angioedema. C1INH is the main inhibitor of the contact system. Poor control of a local activation process of this system at the site of the attack is believed to lead to

  12. Angle Dependent Optics of Plasmonic Core-Shell Nanoparticles

    Science.gov (United States)

    2018-02-21

    function of spherical co-ordinates: azimuthal and polar angles. Absorption, scattering and emission of light from nanoparticles, especially when they are...placed on a substrate, can drastically depend on angle of excitation and angle of scattering/ emission . Such particle-substrate coupling can...V’ antenna with the Raman marker molecule nile blue chloride. Typical SERS spectra of nile blue from a ‘V’ antenna under different polarizations (0

  13. Liquid Missile Fuels as Means of Chemical Terrorist Attack

    International Nuclear Information System (INIS)

    Superina, V.; Orehovec, Z.

    2007-01-01

    Modern world is faced with numerous terrorist attacks whose goals, methods and means of the conduct are various. It seems that we have entered the era when terrorism, one's own little terrorism, is the easiest and the most painless way of achieving a goal. That is why that such a situation has contributed to the necessity for strengthening individual and collective protection and safety, import and export control, control of the production and illegal sale of the potential means for delivering terrorist act. It has also contributed to the necessity for devising means of the delivery. For more than 10 years, a series of congresses on CB MTS Industry has pointed at chemicals and chemical industry as potential means and targets of terrorism. The specialization and experience of different authors in the field of the missile technology and missile fuels, especially those of Eastern origin, and the threat that was the reality of the war conflicts in 1990s was the reason for making a scientific and expert analysis of the liquid missile fuels as means of terrorism. There are not many experts in the field of NBC protection who are familiar with the toxicity and reaction of liquid missile fuels still lying discarded and unprotected in abandoned barracks all over Europe and Asia. The purpose of this paper is to draw public attention to possible different abuses of liquid missile fuels for a terrorist purpose, as well as to possible consequences and prevention measures against such abuses. (author)

  14. Security of Quantum-Readout PUFs against quadrature based challenge estimation attacks

    NARCIS (Netherlands)

    Skoric, B.; Mosk, Allard; Pinkse, Pepijn Willemszoon Harry

    2013-01-01

    The concept of quantum-secure readout of Physical Unclonable Functions (PUFs) has recently been realized experimentally in an optical PUF system. We analyze the security of this system under the strongest type of classical attack: the challenge estimation attack. The adversary performs a measurement

  15. Estimating the probability of mountain pine beetle red-attack damage

    Science.gov (United States)

    Michael A Wulder; J. C. White; Barbara J Bentz; M. F. Alvarez; N. C. Coops

    2006-01-01

    Accurate spatial information on the location and extent of mountain pine beetle infestation is critical for the planning of mitigation and treatment activities. Areas of mixed forest and variable terrain present unique challenges for the detection and mapping of mountain pine beetle red-attack damage, as red-attack has a more heterogeneous distribution under these...

  16. A study of images of Projective Angles of pulmonary veins

    Energy Technology Data Exchange (ETDEWEB)

    Wang Jue [Beijing Anzhen Hospital, Beijing (China); Zhaoqi, Zhang [Beijing Anzhen Hospital, Beijing (China)], E-mail: zhaoqi5000@vip.sohu.com; Yu Wei; Miao Cuilian; Yan Zixu; Zhao Yike [Beijing Anzhen Hospital, Beijing (China)

    2009-09-15

    Aims: In images of magnetic resonance and computed tomography (CT) there are visible angles between pulmonary veins and the coronary, transversal or sagittal section of body. In this study these angles are measured and defined as Projective Angles of pulmonary veins. Several possible influential factors and characters of distribution are studied and analyzed for a better understanding of this imaging anatomic character of pulmonary veins. And it could be the anatomic base of adjusting correctly the angle of the central X-ray of the angiography of pulmonary veins undergoing the catheter ablation of atrial fibrillation (AF). Method: Images of contrast enhanced magnetic resonance angiography (CEMRA) and contrast enhanced computer tomography (CECT) of the left atrium and pulmonary veins of 137 health objects and patients with atrial fibrillation (AF) are processed with the technique of post-processing, and Projective Angles to the coronary and transversal sections are measured and analyzed statistically. Result: Project Angles of pulmonary veins are one of real and steady imaging anatomic characteristics of pulmonary veins. The statistical distribution of variables is relatively concentrated, with a fairly good representation of average value. It is possible to improve the angle of the central X-ray according to the average value in the selective angiography of pulmonary veins undergoing the catheter ablation of AF.

  17. Attack or attacked: The sensory and fluid mechanical constraints of copepods’ predator–prey interactions

    DEFF Research Database (Denmark)

    Kiørboe, Thomas

    2013-01-01

    Many animals are predator and prey at the same time. This dual position represents a fundamental dilemma because gathering food often leads to increased exposure to predators. The optimization of the tradeoff between eating and not being eaten depends strongly on the sensing, feeding...

  18. Detection of Variations of Local Irregularity of Traffic under DDOS Flood Attack

    Directory of Open Access Journals (Sweden)

    Ming Li

    2008-01-01

    Full Text Available The aim of distributed denial-of-service (DDOS flood attacks is to overwhelm the attacked site or to make its service performance deterioration considerably by sending flood packets to the target from the machines distributed all over the world. This is a kind of local behavior of traffic at the protected site because the attacked site can be recovered to its normal service state sooner or later even though it is in reality overwhelmed during attack. From a view of mathematics, it can be taken as a kind of short-range phenomenon in computer networks. In this paper, we use the Hurst parameter (H to measure the local irregularity or self-similarity of traffic under DDOS flood attack provided that fractional Gaussian noise (fGn is used as the traffic model. As flood attack packets of DDOS make the H value of arrival traffic vary significantly away from that of traffic normally arriving at the protected site, we discuss a method to statistically detect signs of DDOS flood attacks with predetermined detection probability and false alarm probability.

  19. Non-contact measurement of rotation angle with solo camera

    Science.gov (United States)

    Gan, Xiaochuan; Sun, Anbin; Ye, Xin; Ma, Liqun

    2015-02-01

    For the purpose to measure a rotation angle around the axis of an object, a non-contact rotation angle measurement method based on solo camera was promoted. The intrinsic parameters of camera were calibrated using chessboard on principle of plane calibration theory. The translation matrix and rotation matrix between the object coordinate and the camera coordinate were calculated according to the relationship between the corners' position on object and their coordinates on image. Then the rotation angle between the measured object and the camera could be resolved from the rotation matrix. A precise angle dividing table (PADT) was chosen as the reference to verify the angle measurement error of this method. Test results indicated that the rotation angle measurement error of this method did not exceed +/- 0.01 degree.

  20. Major depressive disorder following terrorist attacks: a systematic review of prevalence, course and correlates.

    Science.gov (United States)

    Salguero, José M; Fernández-Berrocal, Pablo; Iruarrizaga, Itziar; Cano-Vindel, Antonio; Galea, Sandro

    2011-06-01

    Terrorist attacks are traumatic events that may result in a wide range of psychological disorders for people exposed. This review aimed to systematically assess the current evidence on major depressive disorder (MDD) after terrorist attacks. A systematic review was performed. Studies included assessed the impact of human-made, intentional, terrorist attacks in direct victims and/or persons in general population and evaluated MDD based on diagnostic criteria. A total of 567 reports were identified, 11 of which were eligible for this review: 6 carried out with direct victims, 4 with persons in general population, and 1 with victims and general population. The reviewed literature suggests that the risk of MDD ranges between 20 and 30% in direct victims and between 4 and 10% in the general population in the first few months after terrorist attacks. Characteristics that tend to increase risk of MDD after a terrorist attack are female gender, having experienced more stressful situations before or after the attack, peritraumatic reactions during the attack, loss of psychosocial resources, and low social support. The course of MDD after terrorist attacks is less clear due to the scarcity of longitudinal studies. Methodological limitations in the literature of this field are considered and potentially important areas for future research such as the assessment of the course of MDD, the study of correlates of MDD or the comorbidity between MDD and other mental health problems are discussed.

  1. An Approach for Assessing Consequences of Potential Supply Chain and Insider Contributed Cyber Attacks on Nuclear Power Plants

    Energy Technology Data Exchange (ETDEWEB)

    Chu, Tsong L.

    2016-11-06

    The Stuxnet attack at the Natanz facility is an example of a targeted and successful cyber attack on a nuclear facility. Snowden's release of National Security Agency documents demonstrated the consequences of the insider threat. More recently, the United States tried to attack North Korea but failed, South Korea was attempting to attack North Korea, and both applied Stuxnet-like approaches. These sophisticated targeted attacks differ from web-site hacking events that are reported almost daily in the news mainly because targeted attacks require detailed design and operation information of the systems attacked and/or are often carried out by insiders. For instance, in order to minimize disruption of facilities around the world, Stuxnet remained idle until it recognized the specific configuration of the Natanz facility, demonstrating that the attackers possessed extremely detailed information about the facility. Such targeted cyber attacks could become a national-level military weapon and be used in coercion of hostile countries.

  2. Influence of anterior segment biometric parameters on the anterior chamber angle width in eyes with angle closure.

    Science.gov (United States)

    Matsuki, Takaaki; Hirose, Fumitaka; Ito, Shin-Ichiro; Hata, Masayuki; Hirami, Yasuhiko; Kurimoto, Yasuo

    2015-02-01

    To predict angle narrowing in eyes with angle closure in a Japanese population using anterior segment optical coherence tomography (AS-OCT) quantitative parameters. AS-OCT was used to examine 118 eyes of 118 patients with angle closure and 40 eyes of 40 patients with open angle under dark conditions. After measuring the angle opening distance 500 (AOD500), anterior chamber depth, iris thickness (IT), iris convexity (IC), pupil diameter, anterior chamber width, and crystalline lens rise, multivariate regression analyses were performed for the AOD500 in each group. With the exception of IT, significant differences were observed between the AS-OCT parameters for the angle closure and open-angle groups. Anterior chamber depth, IT, and IC were the explanatory variables associated with AOD500 for each group (P≤0.001). A significant negative association was found between IT and IC only in the angle-closure group (Pchamber depth was a major mechanism of angle narrowing, and that both IT and IC had a strong impact on angle narrowing. Moreover, the negative association found between IT and IC in only the angle closure group indicated the existence of the stretch force placed on the iris by relative pupillary block.

  3. Invulnerability of grown Peer-to-Peer networks under progressive targeted attacks

    Science.gov (United States)

    Peng, Hao; Zhao, Dandan; Han, Jianmin; Lu, Jianfeng

    2015-06-01

    Security issues of Peer-to-Peer (P2P) networks have attracted more and more research in recent years. In this paper, using complex features of P2P networks, we shift the focus to the study of invulnerability of grown P2P networks under progressive targeted attacks. Based on dynamic process and reverse percolation theory, we present several mechanisms that attacked P2P networks can adopt to minimize the disasters aftermath progressive targeted attacks. In this process, we proposed: (i) the dynamics of grown P2P networks under targeted attacks can make sure an attacked P2P network restore a power-law (PL) characteristic to a normal level; (ii) a global degree restoring process from the aftermath of progressive targeted attacks can restore the status of set of high degree peers to normal; (iii) a reverse percolation process glues the fragmented small connected component of a destroyed grown P2P network into a giant connected component (GCC). Experimental results show that an attacked grown P2P network can restore the key characteristics, such as power-law characteristic of original P2P network, the set of high degree peers and the giant connected component, to a regular status. In this way, we can illustrate the invulnerability of progressive targeted attacks on grown P2P networks which is particularly useful in designing complex P2P networks.

  4. Reachable Sets of Hidden CPS Sensor Attacks : Analysis and Synthesis Tools

    NARCIS (Netherlands)

    Murguia, Carlos; van de Wouw, N.; Ruths, Justin; Dochain, Denis; Henrion, Didier; Peaucelle, Dimitri

    2017-01-01

    For given system dynamics, control structure, and fault/attack detection procedure, we provide mathematical tools–in terms of Linear Matrix Inequalities (LMIs)–for characterizing and minimizing the set of states that sensor attacks can induce in the system while keeping the alarm rate of the

  5. Denial-of-service attack detection based on multivariate correlation analysis

    NARCIS (Netherlands)

    Tan, Zhiyuan; Jamdagni, Aruna; He, Xiangjian; Nanda, Priyadarsi; Liu, Ren Ping; Lu, Bao-Liang; Zhang, Liqing; Kwok, James

    2011-01-01

    The reliability and availability of network services are being threatened by the growing number of Denial-of-Service (DoS) attacks. Effective mechanisms for DoS attack detection are demanded. Therefore, we propose a multivariate correlation analysis approach to investigate and extract second-order

  6. 75 FR 55659 - Continuation of the National Emergency With Respect to Certain Terrorist Attacks

    Science.gov (United States)

    2010-09-13

    ..., 2010 Continuation of the National Emergency With Respect to Certain Terrorist Attacks Consistent with... Notice of September 10, 2010--Continuation of the National Emergency With Respect to Certain Terrorist Attacks #0; #0; #0; Presidential Documents #0; #0; #0;#0;Federal Register / Vol. 75 , No. 176 / Monday...

  7. Predicting the effect of climate change on wildfire behavior and initial attack success

    Science.gov (United States)

    Jeremy S. Fried; J. Keith Gilless; William J. Riley; Tadashi J. Moody; Clara Simon de Blas; Katharine Hayhoe; Max Mortiz; Scott Stephens; Margaret Torn

    2008-01-01

    This study focused on how climate change-induced effects on weather will translate into changes in wildland fire severity and outcomes in California, particularly on the effectiveness of initial attack at limiting the number of fires that escape initial attack. The results indicate that subtle shifts in fire behavior of the sort that might be induced by the climate...

  8. Glancing angle x-ray studies of oxide films

    International Nuclear Information System (INIS)

    Davenport, A.J.; Isaacs, H.S.

    1989-01-01

    High brightness synchrotron radiation incident at glancing angles has been used to study inhibiting species present in low concentrations in oxide films on aluminum. Glancing incident angle fluorescence measurements give surface-sensitive information on the valence state of elements from the shape of the x-ray absorption edge. Angle-resolved measurements show the depth distribution of the species present. 15 refs., 4 figs

  9. A Game Theoretical Approach to Hacktivism: Is Attack Likelihood a Product of Risks and Payoffs?

    Science.gov (United States)

    Bodford, Jessica E; Kwan, Virginia S Y

    2018-02-01

    The current study examines hacktivism (i.e., hacking to convey a moral, ethical, or social justice message) through a general game theoretic framework-that is, as a product of costs and benefits. Given the inherent risk of carrying out a hacktivist attack (e.g., legal action, imprisonment), it would be rational for the user to weigh these risks against perceived benefits of carrying out the attack. As such, we examined computer science students' estimations of risks, payoffs, and attack likelihood through a game theoretic design. Furthermore, this study aims at constructing a descriptive profile of potential hacktivists, exploring two predicted covariates of attack decision making, namely, peer prevalence of hacking and sex differences. Contrary to expectations, results suggest that participants' estimations of attack likelihood stemmed solely from expected payoffs, rather than subjective risks. Peer prevalence significantly predicted increased payoffs and attack likelihood, suggesting an underlying descriptive norm in social networks. Notably, we observed no sex differences in the decision to attack, nor in the factors predicting attack likelihood. Implications for policymakers and the understanding and prevention of hacktivism are discussed, as are the possible ramifications of widely communicated payoffs over potential risks in hacking communities.

  10. Electroencephalographic correlates of cataplectic attacks in narcoleptic canines.

    Science.gov (United States)

    Kushida, C A; Baker, T L; Dement, W C

    1985-07-01

    Cataplectic attacks were monitored behaviorally and polygraphically in 4 narcoleptic dogs, of which three inherited the disorder. The recorded EEG signals were evaluated by power spectral analysis. We found 3 distinct stages of cataplexy: an initial stage which resembled wakefulness with tonic suppression of EMG activity, a later stage which was highly similar to REM sleep, and a final transitional stage to wakefulness or NREM sleep. The first stage of cataplexy was characterized by full postural collapse, a waking-like EEG spectrum, visual tracking, and a hypotonic EMG. The second stage of cataplexy differed electrographically from the previous stage by the onset of hypersynchronous hippocampal theta activity, a REM-like EEG spectrum, larger amplitude EEG signals, and a higher peak theta frequency. Glazed eyes, sporadic rapid eye movements and muscle twitches were also present. The final stage of cataplexy was characterized by mixed amplitude, mixed frequency EEG activity, and by the absence of rapid eye movements, visual tracking, directed movements, and muscle twitches. The EEG spectra of two other narcoleptic phenomena, sleep-onset REM periods and NREM sleep onsets from cataplexy, were nearly identical to the spectra of the normally occurring REM and NREM sleep periods.

  11. Statistical Meta-Analysis of Presentation Attacks for Secure Multibiometric Systems.

    Science.gov (United States)

    Biggio, Battista; Fumera, Giorgio; Marcialis, Gian Luca; Roli, Fabio

    2017-03-01

    Prior work has shown that multibiometric systems are vulnerable to presentation attacks, assuming that their matching score distribution is identical to that of genuine users, without fabricating any fake trait. We have recently shown that this assumption is not representative of current fingerprint and face presentation attacks, leading one to overestimate the vulnerability of multibiometric systems, and to design less effective fusion rules. In this paper, we overcome these limitations by proposing a statistical meta-model of face and fingerprint presentation attacks that characterizes a wider family of fake score distributions, including distributions of known and, potentially, unknown attacks. This allows us to perform a thorough security evaluation of multibiometric systems against presentation attacks, quantifying how their vulnerability may vary also under attacks that are different from those considered during design, through an uncertainty analysis. We empirically show that our approach can reliably predict the performance of multibiometric systems even under never-before-seen face and fingerprint presentation attacks, and that the secure fusion rules designed using our approach can exhibit an improved trade-off between the performance in the absence and in the presence of attack. We finally argue that our method can be extended to other biometrics besides faces and fingerprints.

  12. Acidic Attack Resistance of Cement Mortar Treated with Alkaline

    Directory of Open Access Journals (Sweden)

    Nadia Nazhat Sabeeh

    2017-12-01

    Full Text Available The negative effect of acidic attack on the properties of concrete and cement mortar is a topic of increasing significance in the recent years. Many attempts has occurred to mitigate this negative impact by improving the properties of concrete and increase resistance to acids by using additives. The present study includes treatment of sand by alkaline material and examine the effect of treatment on cement mortar resistance towards hydrochloric and sulfuric acid. Results show that sand treatment by alkaline material significantly enhance mortar ability to resist acids. In terms of loss weight, the maximum weight rate gain was 25.54% for specimens immersed in Hydrochloric acid with water cement ratio 40%. For specimens immersed in HCl, the average gain in compressive strength is (20.15-19.433% for w/c (40-45% respectively. The average gain in modulus of rupture toward the influence of H2SO4 is (18.37–17.99% for w/c (40-45%, respectively.

  13. Development of an accelerated test for Internal Sulfate Attack study

    Directory of Open Access Journals (Sweden)

    Khelil Nacim

    2014-04-01

    Full Text Available Internal Sulfate Attack (ISA is a pathology that occurs under certain conditions in concrete having undergone heating above 70 °C at early age (through heating in pre-casting industry or due to hydration in large concrete parts. This reaction deemed very slow, numerous methods to speed up reactions leading to delayed ettringite formation have been developed. These methods are all based on the material damage. Another type of test is currently under development. It is based on rehabilitation techniques such as electrochemical chloride extraction (ECE in order to accelerate the leaching of alkalis that could be one of the triggers of the pathology. The study presented in this paper focused on concrete specimens prepared from cement (CEM I 52.5 N enriched with Na2SO4. These concretes have undergone a heat treatment typical of those used in precast plants (up to 24 hours with a maximum temperature of 80 °C. Various paths were explored for the development of the accelerated test. The first results showed that it was necessary to use a removable titanium anode ruthenium anode instead of stainless steel embedded in the concrete. Then tests with de-ionized water as the solute to the cathode did not accelerate the onset of expansions. The experiment has been modified and potassium carbonate was added to the solution. This modification didn’t show any significant improvement, and other experiments are being carried out to explain this result.

  14. Usefulness of chest radiographs in first asthma attacks

    International Nuclear Information System (INIS)

    Gershel, J.C.; Goldman, H.S.; Stein, R.E.K.; Shelov, S.P.; Ziprkowski, M.

    1983-01-01

    To assess the value of routine chest radiography during acute first attacks of asthma, we studied 371 consecutive children over one year of age who presented with an initial episode of wheezing. Three hundred fifty children (94.3%) had radiographic findings that were compatible with uncomplicated asthma and were considered negative. Twenty-one (5.7%) had positive findings: atelectasis and pneumonia were noted in seven, segmental atelectasis in six, pneumonia in five, multiple areas of subsegmental atelectasis in two, and pneumomediastinum in one. The patients with positive films were more likely to have a respiratory rate above 60 or a pulse rate above 160 (P < 0.001), localized rales or localized decreased breath sounds before treatment (P < 0.01), and localized rales (P < 0.005) and localized wheezing (P < 0.02) after treatment; also, these patients were admitted to the hospital more often (P < 0.001). Ninety-five percent (20 of 21) of the children with positive films could be identified before treatment on the basis of a combination of tachypnea, tachycardia, fever, and localized rales or localized decreased breath sounds. Most first-time wheezers will not have positive radiographs; careful clinical evaluation should reveal which patients will have abnormal radiographs and will therefore benefit from the procedure. 20 references, 3 tables

  15. Formal reconstruction of attack scenarios in mobile ad hoc and sensor networks

    Directory of Open Access Journals (Sweden)

    Rekhis Slim

    2011-01-01

    Full Text Available Abstract Several techniques of theoretical digital investigation are presented in the literature but most of them are unsuitable to cope with attacks in wireless networks, especially in Mobile Ad hoc and Sensor Networks (MASNets. In this article, we propose a formal approach for digital investigation of security attacks in wireless networks. We provide a model for describing attack scenarios in a wireless environment, and system and network evidence generated consequently. The use of formal approaches is motivated by the need to avoid ad hoc generation of results that impedes the accuracy of analysis and integrity of investigation. We develop an inference system that integrates the two types of evidence, handles incompleteness and duplication of information in them, and allows possible and provable actions and attack scenarios to be generated. To illustrate the proposal, we consider a case study dealing with the investigation of a remote buffer overflow attack.

  16. Security awareness for public bus transportation : case studies of attacks against the Israeli public bus system.

    Science.gov (United States)

    2012-03-01

    This report presents 16 case studies of attacks planned or carried out against Israeli bus targets, along with statistical data on the number, frequency, and lethality of attacks against bus targets that have taken place in Israel since 1970 and duri...

  17. Physical Attacks: An Analysis of Teacher Characteristics Using the Schools and Staffing Survey

    Science.gov (United States)

    Williams, Thomas O., Jr.; Ernst, Jeremy V.

    2016-01-01

    This study investigated physical attacks as reported by public school teachers on the most recent Schools and Staffing Survey (SASS) from the National Center for Education Statistics administered by the Institute of Educational Sciences. For this study, characteristics of teachers who responded affirmatively to having been physically attacked in…

  18. Resistance of borax–copper treated wood in aboveground exposure to attack by Formosan subterranean termites

    Science.gov (United States)

    Stan Lebow; Bessie Woodward; Douglas Crawford; William Abbott

    2005-01-01

    The spread of Formosan subterranean termites (FSTs) in the southern United States has increased public interest in finding a preservative treatment to protect framing lumber from termite attack. This study evaluated the use of a borax-based preservative to protect wood from FST attack. Southern Pine and Douglas-fir specimens were pressure-treated with three...

  19. Reasoning about Emotional Contents Following Shocking Terrorist Attacks: A Tale of Three Cities

    Science.gov (United States)

    Blanchette, Isabelle; Richards, Anne; Melnyk, Laura; Lavda, Anastasia

    2007-01-01

    The authors examined reasoning following the terrorist attacks carried out in London in July 2005. They tested participants in London (United Kingdom), Manchester (United Kingdom), and London (Canada) within 1 week of the attacks and again 6 months later. Participants reasoned about syllogisms of 3 types: neutral, generally emotional, and…

  20. Defense of Cyber Infrastructures Against Cyber-Physical Attacks Using Game-Theoretic Models.

    Science.gov (United States)

    Rao, Nageswara S V; Poole, Stephen W; Ma, Chris Y T; He, Fei; Zhuang, Jun; Yau, David K Y

    2016-04-01

    The operation of cyber infrastructures relies on both cyber and physical components, which are subject to incidental and intentional degradations of different kinds. Within the context of network and computing infrastructures, we study the strategic interactions between an attacker and a defender using game-theoretic models that take into account both cyber and physical components. The attacker and defender optimize their individual utilities, expressed as sums of cost and system terms. First, we consider a Boolean attack-defense model, wherein the cyber and physical subinfrastructures may be attacked and reinforced as individual units. Second, we consider a component attack-defense model wherein their components may be attacked and defended, and the infrastructure requires minimum numbers of both to function. We show that the Nash equilibrium under uniform costs in both cases is computable in polynomial time, and it provides high-level deterministic conditions for the infrastructure survival. When probabilities of successful attack and defense, and of incidental failures, are incorporated into the models, the results favor the attacker but otherwise remain qualitatively similar. This approach has been motivated and validated by our experiences with UltraScience Net infrastructure, which was built to support high-performance network experiments. The analytical results, however, are more general, and we apply them to simplified models of cloud and high-performance computing infrastructures. © 2015 Society for Risk Analysis.

  1. Nonstructural carbohydrate dynamics of lodgepole pine dying from mountain pine beetle attack.

    Science.gov (United States)

    Wiley, Erin; Rogers, Bruce J; Hodgkinson, Robert; Landhäusser, Simon M

    2016-01-01

    Bark beetle outbreaks are an important cause of tree death, but the process by which trees die remains poorly understood. The effect of beetle attack on whole-tree nonstructural carbohydrate (NSC) dynamics is particularly unclear, despite the potential role of carbohydrates in plant defense and survival. We monitored NSC dynamics of all organs in attacked and protected lodgepole pines (Pinus contorta) during a mountain pine beetle (Dendroctonus ponderosae) outbreak in British Columbia, starting before beetle flight in June 2011 through October 2012, when most attacked trees had died. Following attack, NSC concentrations were first reduced in the attacked region of the bole. The first NSC reduction in a distant organ appeared in the needles at the end of 2011, while branch and root NSC did not decline until much later in 2012. Attacked trees that were still alive in October 2012 had less beetle damage, which was negatively correlated with initial bark sugar concentrations in the attack region. The NSC dynamics of dying trees indicate that trees were killed by a loss of water conduction and not girdling. Further, our results identify locally reduced carbohydrate availability as an important mechanism by which stressors like drought may increase tree susceptibility to biotic attack. © 2015 The Authors. New Phytologist © 2015 New Phytologist Trust.

  2. 3 CFR - Continuation of the National Emergency With Respect to Certain Terrorist Attacks

    Science.gov (United States)

    2010-01-01

    ... to Certain Terrorist Attacks Presidential Documents Other Presidential Documents Notice of September 10, 2009 Continuation of the National Emergency With Respect to Certain Terrorist Attacks Consistent... national emergency declared on September 14, 2001, in Proclamation 7463, with respect to the terrorist...

  3. Collaborative Attack vs. Collaborative Defense

    Science.gov (United States)

    Xu, Shouhuai

    We have witnessed many attacks in the cyberspace. However, most attacks are launched by individual attackers even though an attack may involve many compromised computers. In this paper, we envision what we believe to be the next generation cyber attacks — collaborative attacks. Collaborative attacks can be launched by multiple attackers (i.e., human attackers or criminal organizations), each of which may have some specialized expertise. This is possible because cyber attacks can become very sophisticated and specialization of attack expertise naturally becomes relevant. To counter collaborative attacks, we might need collaborative defense because each “chain” in a collaborative attack may be only adequately dealt with by a different defender. In order to understand collaborative attack and collaborative defense, we present a high-level abstracted framework for evaluating the effectiveness of collaborative defense against collaborative attacks. As a first step towards realizing and instantiating the framework, we explore a characterization of collaborative attacks and collaborative defense from the relevant perspectives.

  4. Seven Deadliest Wireless Technologies Attacks

    CERN Document Server

    Haines, Brad

    2010-01-01

    How can an information security professional keep up with all of the hacks, attacks, and exploits? One way to find out what the worst of the worst are is to read the seven books in our Seven Deadliest Attacks Series. Not only do we let you in on the anatomy of these attacks but we also tell you how to get rid of them and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve. Attacks featured in this book include:Bluetooth AttacksCredit Card, Access Card, and Passport AttacksBad Encryption

  5. Predictors of Stroke After Transient Ischemic Attack in Children.

    Science.gov (United States)

    Lehman, Laura L; Watson, Christopher G; Kapur, Kush; Danehy, Amy R; Rivkin, Michael J

    2016-01-01

    Transient ischemic attack (TIA) in children has received far less attention compared with TIA in adults. The risk factors of stroke after TIA in children are relatively unknown. We aimed to determine the percentage of children who have stroke after TIA and the risk factors associated with stroke after TIA. We searched the medical records at Boston Children's Hospital for the year 2010 to find children who were evaluated for TIA to determine associated risk factors of stroke after TIA. We included children who were evaluated in 2009 through 2010 for TIA and had magnetic resonance imaging. We examined follow-up imaging through August 2014 for subsequent stroke. Logistic regression was used to calculate odds ratios for factors in our cohort who are associated with stroke after presentation with TIA. We identified 63 children who experienced a TIA. The mean time of imaging follow-up was 4.5 years after TIA presentation. Of the 63 children, 10 (16%) developed radiological evidence of ischemic cerebral injury within the follow-up period. Four of the 10 (6%) demonstrated diffusion abnormalities on magnetic resonance imaging at TIA presentation, whereas 8 (13%) had a stroke after their TIA. Arteriopathy, female sex, and autoimmune disorders were significantly associated with stroke after TIA. In our cohort of children, stroke occurred after TIA at a rate similar to that seen in adults, but the risk factors for stroke after TIA in children are different. © 2015 American Heart Association, Inc.

  6. Contact angle distribution of particles at fluid interfaces.

    Science.gov (United States)

    Snoeyink, Craig; Barman, Sourav; Christopher, Gordon F

    2015-01-27

    Recent measurements have implied a distribution of interfacially adsorbed particles' contact angles; however, it has been impossible to measure statistically significant numbers for these contact angles noninvasively in situ. Using a new microscopy method that allows nanometer-scale resolution of particle's 3D positions on an interface, we have measured the contact angles for thousands of latex particles at an oil/water interface. Furthermore, these measurements are dynamic, allowing the observation of the particle contact angle with high temporal resolution, resulting in hundreds of thousands of individual contact angle measurements. The contact angle has been found to fit a normal distribution with a standard deviation of 19.3°, which is much larger than previously recorded. Furthermore, the technique used allows the effect of measurement error, constrained interfacial diffusion, and particle property variation on the contact angle distribution to be individually evaluated. Because of the ability to measure the contact angle noninvasively, the results provide previously unobtainable, unique data on the dynamics and distribution of the adsorbed particles' contact angle.

  7. Frenzied attacks. A micro-sociological analysis of the emotional dynamics of extreme youth violence.

    Science.gov (United States)

    Weenink, Don

    2014-09-01

    Inspired by phenomenological and interactionist studies of youth violence, this article offers an empirical evaluation of Collins's micro-sociological theory of violence. The main question is whether situations of extreme violence have distinct situational dynamics. Based on analyses of 159 interactions taken from judicial case files, situations of extreme youth violence, here called frenzied attacks, were identified on the basis of the state of encapsulation of the attackers (absorbed in the violence, their sole focus is the destruction of the victim) and the disproportionateness of the violence (the attackers continue to hurt the victims even though they do not pose a threat or a challenge to them). Qualitative and statistical analyses revealed that this emotional state results from a social figuration in which the emotional balance shifts toward complete dominance of the attackers. Thus, the occurrence of frenzied attacks is associated with the moment victims hit the ground, paralyse and start to apologize, with the numerical dominance of the attackers' supportive group and with feelings of group membership, in the form of solidarity excitement and family ties in the attackers' group. Alcohol intoxication is of influence as well, but contrary to the expectation, this effect was independent from solidarity excitement. The article concludes that Collins's theory on the emotional dynamics of violence adds a new dimension to the phenomenological and interactionist traditions of research. © London School of Economics and Political Science 2014.

  8. Migraine Trainers as Models: the effectiveness of Lay trainerswith migraine for behavioural attack prevention

    NARCIS (Netherlands)

    S.Y.M. Mérelle (Saskia)

    2008-01-01

    textabstractMigraine is a chronic brain disorder, characterized by attacks of severe headache accompanied by nausea, vomiting and sensitivity to light, sound and smell. Attacks can be preceded by premonitory symptoms such as fatigue, muscular stiff ness or negative aff ect. It has been shown that

  9. Identifying Risk of Future Asthma Attacks Using UK Medical Record Data : A Respiratory Effectiveness Group Initiative

    NARCIS (Netherlands)

    Blakey, John D.; Price, David B.; Pizzichini, Emilio; Popov, Todor A.; Dimitrov, Borislav D.; Postma, Dirkje S.; Josephs, Lynn K.; Kaplan, Alan; Papi, Alberto; Kerkhof, Marjan; Hillyer, Elizabeth V.; Chisholm, Alison; Thomas, Mike

    BACKGROUND: Asthma attacks are common, serious, and costly. Individual factors associated with attacks, such as poor symptom control, are not robust predictors. OBJECTIVE: We investigated whether the rich data available in UK electronic medical records could identify patients at risk of recurrent

  10. Tales from the crypt : Fingerprinting attacks on encrypted channels by way of retainting

    NARCIS (Netherlands)

    Valkering, Michael; Slowinska, Asia; Bos, Herbert

    2009-01-01

    Paradoxically, encryption makes it hard to detect, fingerprint and stop exploits. We describe Hassle, a honeypot capable of detecting and fingerprinting monomorphic and polymorphic attacks on encrypted channels. It uses dynamic taint analysis in an emulator to detect attacks, and it tags each

  11. Single-cell transcript profiling of barley attacked by the powdery mildew fungus

    DEFF Research Database (Denmark)

    Gjetting, Torben; Hagedorn, Peter; Schweizer, Patrick

    2007-01-01

    In many plant-pathogen interactions, there are several possible outcomes for simultaneous attacks on the same leaf. For instance, an attack by the powdery mildew fungus on one barley leaf epidermal cell may succeed in infection and formation of a functional haustorium, whereas a neighboring cell...

  12. Increased intrinsic brain connectivity between pons and somatosensory cortex during attacks of migraine with aura

    DEFF Research Database (Denmark)

    Hougaard, Anders; Amin, Faisal Mohammad; Larsson, Henrik B W

    2017-01-01

    The neurological disturbances of migraine aura are caused by transient cortical dysfunction due to waves of spreading depolarization that disrupt neuronal signaling. The effects of these cortical events on intrinsic brain connectivity during attacks of migraine aura have not previously been...... investigated. Studies of spontaneous migraine attacks are notoriously challenging due to their unpredictable nature and patient discomfort. We investigated 16 migraine patients with visual aura during attacks and in the attack-free state using resting state fMRI. We applied a hypothesis-driven seed......-based approach focusing on cortical visual areas and areas involved in migraine pain, and a data-driven independent component analysis approach to detect changes in intrinsic brain signaling during attacks. In addition, we performed the analyses after mirroring the MRI data according to the side of perceived...

  13. Aerodynamic airfoil at critical angles of attack / Аэродинамические характеристики крыла при критическом угле атаки / Aerodinamičke karakteristike aeroprofila pri kritičnim napadnim uglovima

    Directory of Open Access Journals (Sweden)

    Čedomir Lj. Kostić

    2016-07-01

    Full Text Available Aircraft construction experts must not neglect the behavior of aircraft in extreme or closely extreme flight conditions, such as flights at critical angles of attack, where a normal flight can be easily converted into a stall. This paper highlights the essential factors that influence the behavior of aircraft in flight at critical angles of attack. Based on the available experimental results and estimations, the performances of airfoils were analysed depending on air flow conditions (categorized according to Mach and Reynolds numbers, airfoil shapes, dynamics of the transition of angles of attack, description of the flow around airfoils with increasing the angle of attack upon reaching a critical value, and the effect of roughness of airfoil surfaces at critical angles of attack. The paper gives a physical interpretation of a lift decrease and a stall. It minutely describes the origin of flow separation and categorizes airfoil sections by type of separation and their behavior during the flow at the critical angle of attack. Based on modern aerodynamics, this paper aims to show and explain the issues and the most important characteristics of the flow past the body at critical angles of attack and give practical recommendations for airfoil design. As such, it may be of interest to pilots and engineers as well as to educational and research institutions. / При разработке летательных аппаратов неследует пренебрегать фактором возникновения чрезвычайных ситуаций, а также условиями близкими критическим, так как при критическом угле атаки, обычный полет может перейти в аварийный режим. В данной работе приведены важные факторы, влияющие на состояние крыла в течение полета при к

  14. Effect of Helicobacter Pylori Treatment on the Number and Intensity of Migraine Attacks

    Directory of Open Access Journals (Sweden)

    Alireza Bakhshipour

    2012-06-01

    Full Text Available Background: Migraine is a common headache with an unknown cause. Migraine is about three times more common in women (18.2% than in men (6.2%. The recent studies have posed the possible relationship between the Helicobacter pylori infection and migraine headache. This study tries to analyze the effect of treating H. pylori infection on number and severity of migraine attacks.Materials and Methods: In this clinical pilot study, a number of 60 patients with migraine were examined in terms of infecting with H. pylori. Patients with the infections were treated by H. pylori eradication treatment standard triple regimen and the frequency and severity of their migraine attacks were measured for three months and finally the average of frequency and severity of attacks before and after treatment were compared. Results: The average frequency of the migraine attacks in patients with the H.pylori infection who have been treated was 7.1 before treatment and 2.7 after treatment (p=0.001. Likewise, the severity rate of such attacks in such patients was 9 which decreased to 4.5 after treatment (p=0.002. Conclusion: According to our study, patients with migraine attacks are preferred to be examined tested in terms of infecting with H. pylori. Thus, and eradication of this infection can be effective in decreasing of the migraine attacks.

  15. Real-Time Detection of Application-Layer DDoS Attack Using Time Series Analysis

    Directory of Open Access Journals (Sweden)

    Tongguang Ni

    2013-01-01

    Full Text Available Distributed denial of service (DDoS attacks are one of the major threats to the current Internet, and application-layer DDoS attacks utilizing legitimate HTTP requests to overwhelm victim resources are more undetectable. Consequently, neither intrusion detection systems (IDS nor victim server can detect malicious packets. In this paper, a novel approach to detect application-layer DDoS attack is proposed based on entropy of HTTP GET requests per source IP address (HRPI. By approximating the adaptive autoregressive (AAR model, the HRPI time series is transformed into a multidimensional vector series. Then, a trained support vector machine (SVM classifier is applied to identify the attacks. The experiments with several databases are performed and results show that this approach can detect application-layer DDoS attacks effectively.

  16. The latent structure of soccer in the phases of attack and defense.

    Science.gov (United States)

    Sporis, Goran; Samija, Kresimir; Vlahović, Tomislav; Milanović, Zoran; Barisić, Valentin; Bonacin, Dobromir; Talović, Munir

    2012-06-01

    With the aim of establishing the latent structure of tactical elements in the attack and defense phases of soccer 117 tactical elements of soccer were defined and their importance assessed by means of 30 variables that determine the basic segments of the game of soccer. 93 attack and 24 defense tactical elements were chosen as the entity sample and described by the 15 variables of the attack phase and 15 variables of the defense phase. Ten competent soccer experts determined the characteristics of the aforementioned entities by means of 30 variables. The experts graded from 0 to 5 the impact of every entity (tactical technique) on the individual variables that describe soccer in its phases of either attack and defense. A high level of inter-expert agreement was reached in regard to the properties of attack and defense techniques, as demonstrated by the objectivity coefficients. According to principal component factor analysis and the Kaiser and Guttman rule a total of five significant latent dimensions were obtained: finishing efficiency, ball possession performance, counter-attack efficiency, combined defense performance, and obstruction and redirection of the opposing team's attack build-up. The research partly resolved the issue of the hypothetical structure of tactical techniques in soccer by dividing the game into phases and sub-phases, attack and defense players'positions, and types (styles) of play in the attack and defense. If it is clear which movement structures have the most significant influence on the efficiency on a particular playing position and performance in the sub-phases and styles of play, it would be possible to create such training operators that will facilitate the formation of the most important motor skills in soccer.

  17. Interpersonal Attacks on the Dignity of Members of HIV Key Populations: A Descriptive and Exploratory Study.

    Science.gov (United States)

    Friedman, Samuel R; Pouget, Enrique R; Sandoval, Milagros; Rossi, Diana; Mateu-Gelabert, Pedro; Nikolopoulos, Georgios K; Schneider, John A; Smyrnov, Pavlo; Stall, Ron D

    2017-09-01

    Attacks on peoples' dignity help to produce and maintain stigmatization and interpersonal hostility. As part of an effort to develop innovative measures of possible pathways between structural interventions or socially-disruptive Big Events and HIV outbreaks, we developed items to measure dignity denial. These measures were administered to 300 people who inject drugs (PWID), 260 high-risk heterosexuals who do not inject drugs, and 191 men who have sex with men who do not inject drugs (MSM). All of the PWID and many of the high risk heterosexuals and MSM were referred to our study in 2012-2015 by a large New York city study that used respondent-driven sampling; the others were recruited by chain-referral. Members of all three key populations experienced attacks on their dignity fairly often and also reported frequently seeing others' dignity being attacked. Relatives are major sources of dignity attacks. MSM were significantly more likely to report having their dignity attacked by police officers than were the other groups. 40 % or more of each key population reported that dignity attacks are followed "sometimes" or more often both by using more drugs and also by using more alcohol. Dignity attacks and their health effects require more research and creative interventions, some of which might take untraditional forms like social movements.

  18. RESILIENT SCHEME AGAINST REDUCTION OF QUALITY (ROQ DISTRIBUTED DENIAL OF SERVICE ATTACK IN MANET

    Directory of Open Access Journals (Sweden)

    S.A. Arunmozhi

    2011-09-01

    Full Text Available Defending against denial-of-service attacks (DoS in a mobile ad hoc network (MANET is challenging because of the dynamic network topology. Security primitives must be dynamically adjusted to cope with the network. The Reduction-of-Quality (RoQ Distributed Denial of Service (DDoS attack is one which throttles the tcp throughput heavily and reduces the quality-of-service (QoS to end systems gradually rather than refusing the clients from the services completely. Supporting QoS in MANET is a challenging task, particularly in the presence of malicious users. In this paper, we propose a DoS resilient technique that uses a flow table to detect the attackers. The proposed defense mechanism identifies the attackers based on the congestion bit notification and asks the sending node to reduce the sending rate. Once the attackers are identified, all the packets from those nodes will be blocked. The throughput and delay performance of TCP or UDP flows are very sensitive to such RoQ attacks. Through extensive ns2 network simulations, we demonstrate the achievement of high throughput and low delay for a network under the RoQ attack.

  19. Survival of the relocated population of the U. S. after a nuclear attack. Final report

    Energy Technology Data Exchange (ETDEWEB)

    Haaland, C.M.; Chester, C.V.; Wigner, E.P.

    1976-06-01

    The feasibility of continued survival after a hypothetical nuclear attack is evaluated for people relocated from high-risk areas during the crisis period before the attack. The attack consists of 6559 MT, of which 5951 MT are ground bursts on military, industrial, and urban targets. Relocated people are assumed to be adequately protected from fallout radiation by shelters of various kinds. The major problems in the postattack situation will be the control of exposure to fallout radiation, and prevention of severe food shortages to several tens of millions of people.

  20. Investigation of Polarimetric SAR Data Acquired at Multiple Incidence Angles

    DEFF Research Database (Denmark)

    Svendsen, Morten Thougaard; Skriver, Henning; Thomsen, A.

    1998-01-01

    The dependence of different polarimetric parameters on the incidence angles in the range of 30° to 60° is investigated for a number of different crops using airborne SAR data. The purpose of the investigation is to determine the effect of the variation of incidence angle within a SAR image when...

  1. [First chemical mass attack in history of wars, Bolimów, January 31, 1915].

    Science.gov (United States)

    Zieliński, Andrzej

    2010-01-01

    World War I was the conflict, during which it was first used chemical warfare on a massive scale. The earliest chemical attack occurred on the Western Front in October 1914 in Neuve Chapelle, but its effects were so minimal that the Allies learned about it only after the war from German documents. The attack in the area Bolimow, made by the Germans against the Russian army with artillery shells containing gas T (xylyl and benzyl bromides), was therefore the first attack on a massive scale recorded on the victim side. The attack, which occurred after it made it possible to obtain some tactical success, but without a strategic breakthrough. Some of the later German attacks on the eastern front where chlorine was used proved to be more effective, but despite the many victims there was not any major strategic success achieved. The Russians did not take attempts to use chemical weapons in the First World War.

  2. Internet of Things Security: Layered classification of attacks and possible Countermeasures

    Directory of Open Access Journals (Sweden)

    Otmane El Mouaatamid

    2016-12-01

    Full Text Available Nowadays, the internet of things (IoT presents a strong focus of research with various initiatives working on the application, and usage of Internet standards in the IoT. But the big challenge of the internet of things is security. In this paper a layered classification and a goal based comparison of attacks in the IoT are presented so that a better understanding of IoT attacks can be achieved and subsequently more efficient and effective techniques and procedures to combat these attacks may be developed

  3. Ultrasound biomicroscopic features associated with angle closure in fellow eyes of acute primary angle closure after laser iridotomy.

    Science.gov (United States)

    Yao, Bao-qun; Wu, Ling-ling; Zhang, Chun; Wang, Xin

    2009-03-01

    To investigate the frequency of appositional angle closure and related anatomic characteristics in fellow eyes of Chinese subjects with acute primary angle closure (APAC) after laser peripheral iridotomy (LPI). Cross-sectional study. Consecutive subjects with APAC presenting from April 2006 to September 2006 at the Glaucoma Service of Peking University Eye Center, Peking University Third Hospital. Under dark conditions, fellow eyes were divided into 2 groups based on the detection of appositional angle closure by ultrasound biomicroscopy (UBM). For all subjects, UBM parameters were measured to evaluate the different anatomic features between the 2 groups. Darkroom provocative tests (DRPTs) and gonioscopy were performed to investigate the relationship between angle closure and intraocular pressure. Central anterior chamber depth (ACD); angle opening distance(500) (AOD(500)); angle recess area(750) (ARA(750)); trabecular-iris angle (T-I angle); trabecular-ciliary process distance (TCPD); peripheral iris thickness (IT(1)); iris-zonule distance (IZD); and the position of the iris insertion. Thirty-four post-LPI fellow eyes of 34 patients with APAC (8 men, 26 women; mean +/- standard deviation age 66.3+/-7.2 years, range 54-83) were included. Peripheral anterior synechiae (PAS) were not observed in any subject. Appositional angle closure was observed in at least 1 quadrant in 13 (38.2%) of the 34 patients. Compared with eyes without appositional closure, eyes with appositional closure showed significantly lower AOD(500), ARA(750), and T-I angle in 4 quadrants; shorter TCPD in the inferior and temporal quadrants; and thicker IT(1) in the superior and nasal quadrants (PAPAC showed appositional angle closure after LPI. The anatomic findings indicate a narrower angle, a more anterior position of the ciliary body, and a thicker peripheral iris in fellow eyes of APAC after LPI may be associated with an increased risk for progressive angle closure.

  4. Modeling and Analysis of Information Attack in Computer Networks

    National Research Council Canada - National Science Library

    Pepyne, David

    2003-01-01

    .... Such attacks are particularly problematic because they take place in a "virtual cyber world" that lacks the social, economic, legal, and physical barriers and protections that control and limit crime in the material world. Research outcomes include basic theory, a modeling framework for Internet worms and email viruses, a sensor for user profiling, and a simple protocol for enhancing wireless security.

  5. Kleptographic Attacks on ECDSA

    Directory of Open Access Journals (Sweden)

    Nadezhda Anatolievna Chepick

    2014-12-01

    Full Text Available This paper presents secretly trapdoor with universal protection (SETUP attacks on the elliptic curve digital signature algorithm ECDSA. It allows a malicious manufacturer of black-box cryptosystems to implement these attacks to get access to user’s private key. The attacker can obtain user’s private key. The way ECDSA can be used for encryption and key exchange is also described.

  6. Guideline on management of the acute asthma attack in children by Italian Society of Pediatrics.

    Science.gov (United States)

    Indinnimeo, Luciana; Chiappini, Elena; Miraglia Del Giudice, Michele

    2018-04-06

    Acute asthma attack is a frequent condition in children. It is one of the most common reasons for emergency department (ED) visit and hospitalization. Appropriate care is fundamental, considering both the high prevalence of asthma in children, and its life-threatening risks. Italian Society of Pediatrics recently issued a guideline on the management of acute asthma attack in children over age 2, in ambulatory and emergency department settings. The Grading of Recommendations Assessment, Development, and Evaluation (GRADE) methodology was adopted. A literature search was performed using the Cochrane Library and Medline/PubMed databases, retrieving studies in English or Italian and including children over age 2 year. Inhaled ß 2 agonists are the first line drugs for acute asthma attack in children. Ipratropium bromide should be added in moderate/severe attacks. Early use of systemic steroids is associated with reduced risk of ED visits and hospitalization. High doses of inhaled steroids should not replace systemic steroids. Aminophylline use should be avoided in mild/moderate attacks. Weak evidence supports its use in life-threatening attacks. Epinephrine should not be used in the treatment of acute asthma for its lower cost / benefit ratio, compared to β 2 agonists. Intravenous magnesium solphate could be used in children with severe attacks and/or forced expiratory volume1 (FEV1) lower than 60% predicted, unresponsive to initial inhaled therapy. Heliox could be administered in life-threatening attacks. Leukotriene receptor antagonists are not recommended. This Guideline is expected to be a useful resource in managing acute asthma attacks in children over age 2.

  7. Determination of the angle of attack on the mexico rotor using experimental data

    DEFF Research Database (Denmark)

    Yang, Hua; Shen, Wen Zhong; Sørensen, Jens Nørkær

    2010-01-01

    characteristics from experimental data on the MEXICO (Model Experiments in controlled Conditions) rotor. Detailed surface pressure and Particle Image Velocimetry (PIV) flow field at different rotor azimuth positions were examined for determining the sectional airfoil data. It is worthwhile noting that the present...

  8. Simulation of Canopy Leaf Inclination Angle in Rice

    Directory of Open Access Journals (Sweden)

    Xiao-cui ZHANG

    2013-11-01

    Full Text Available A leaf inclination angle distribution model, which is applicable to simulate leaf inclination angle distribution in six heights of layered canopy at different growth stages, was established by component factors affecting plant type in rice. The accuracy of the simulation results was validated by measured values from a field experiment. The coefficient of determination (R2 and the root mean square error (RMSE between the simulated and measured values were 0.9472 and 3.93%, respectively. The simulation results showed that the distribution of leaf inclination angles differed among the three plant types. The leaf inclination angles were larger in the compact variety Liangyoupeijiu with erect leaves than in the loose variety Shanyou 63 with droopy leaves and the intermediate variety Liangyou Y06. The leaf inclination angles were distributed in the lower range in Shanyou 63, which matched up with field measurements. The distribution of leaf inclination angles in the same variety changed throughout the seven growth stages. The leaf inclination angles enlarged gradually from transplanting to booting. During the post-booting period, the leaf inclination angle increased in Shanyou 63 and Liangyou Y06, but changed little in Liangyoupeijiu. At every growth stage of each variety, canopy leaf inclination angle distribution on the six heights of canopy layers was variable. As canopy height increased, the layered leaf area index (LAI decreased in all the three plant types. However, while the leaf inclination angles showed little change in Liangyoupeijiu, they became larger in Shanyou 63 but smaller in Liangyou Y06. The simulation results used in the constructed model were very similar to the actual measurement values. The model provides a method for estimating canopy leaf inclination angle distribution in rice production.

  9. Comparison of anterior segment parameters between the acute primary angle closure eye and the fellow eye.

    Science.gov (United States)

    Lee, Jong Rak; Sung, Kyung Rim; Han, Seungbong

    2014-05-20

    To investigate features of the anterior segment (AS) of the affected eye compared to the fellow eye within the same patient in acute primary angle closure (APAC). Thirty-six patients with unilateral APAC were imaged with AS optical coherence tomography (OCT) before medical or laser treatment for the acute attack. Anterior chamber depth (ACD), iris curvature (IC), iris thickness at 750 μm from the scleral spur (IT750), lens vault (LV), anterior chamber area (ACA), and iris area were estimated by using ImageJ software (version 1.46). Conditional logistic regression analysis was performed to find the associated factors with the prediction of APAC. When compared to fellow eyes, affected eyes showed significantly shallower ACD (1.90 ± 0.24 and 1.55 ± 0.30 mm, respectively; P APAC. Greater LV was the most prominent feature of affected eyes compared to fellow eyes in APAC patients when assessed by AS OCT. This may play a role in the development of acute attack in primary angle closure. Copyright 2014 The Association for Research in Vision and Ophthalmology, Inc.

  10. Small angle polarised neutron scattering investigation of magnetic nanoparticles

    International Nuclear Information System (INIS)

    Bergenti, I.; Deriu, A.; Savini, L.; Bonetti, E.; Spizzo, F.; Hoell, H.

    2003-01-01

    Small angle scattering of polarised neutron (SANSPOL) is a powerful technique for the determination of magnetisation, density and compositional profiles of nanostructured particles. We present here some examples of the magnetic profile determination using the SANSPOL technique and we discuss in detail its advantage with respect to the conventional small angle neutron scattering approach

  11. An assessment of recreational bank angling in the Free State ...

    African Journals Online (AJOL)

    Recreational angling is an important form of utilisation of inland fisheries in South Africa but there is little information on this sector. The objective of this study was to provide an assessment of recreational bank angling in the Free State Province using licence sale and tournament data. During 2013 and 2014, 8 256 and 7 ...

  12. Determination of the Optimum Collector Angle for Composite Solar ...

    African Journals Online (AJOL)

    A model for predicting solar radiation available at any given time in the inhabited area in Ilorin was developed. From the equation developed, the optimum tilt angle of the collector due south was carried out. The optimum angle of tilt of the collector and the orientation are dependent on the month of the year and the location ...

  13. Comparison of Anterior Segment-Optical Coherence Tomography Parameters in Phacomorphic Angle Closure and Acute Angle Closure Eyes.

    Science.gov (United States)

    Moghimi, Sasan; Ramezani, Farshid; He, Mingguang; Coleman, Anne L; Lin, Shan C

    2015-12-01

    The purpose of this study is to compare anterior segment-optical coherence tomography (AS-OCT) parameters in phacomorphic angle closure and acute primary angle closure (APAC) eyes. In this cross-sectional case series, a total of 134 patients with phacomorphic angle closure (28 eyes) or APAC (54 eyes), as well as normal control subjects (52 eyes), were enrolled. Patients underwent AS-OCT imaging and A-scan biometry of both eyes. Anterior chamber depth (ACD), anterior chamber area (ACA), iris thickness (IT), iris curvature, lens vault (LV), anterior vault (AV), and angle parameters including angle opening distance (AOD 500 and AOD750) and trabecular iris space area (TISA500 and TISA750) were measured in qualified images using the Zhongshan Angle Assessment Program and compared among eyes with phacomorphic angle closure, APAC, and normal control subjects. Phacomorphic angle closure and APAC eyes had smaller AOD, ACD, ACA, ACW, AV, and posterior corneal arc length and greater LV than normal controls (P APAC eyes: ACD 1042 μm (OR,12.12; P APAC eyes. In multivariate analysis, ACD, LV, AOD500, and axial length could significantly distinguish the two entities. Ocular biometric parameters can differentiate phacomorphic angle closure from APAC eyes. Shallower ACD and greater LV, axial length, and ACA are the main parameters that distinguish phacomorphic angle closure from APAC.

  14. Evaluation of the slag attack resistance of high alumina refractory free cement castable

    International Nuclear Information System (INIS)

    Menegazzo, A.P.M.; Pandofelli, V.C.; Rodrigues, J.A.; Carvalho, Julio C.

    1997-01-01

    The slag attack resistance is a very important property when the life time of refractory castable needs to be improved. The substitution of calcium aluminate cement by a free calcium hydraulic blinder has show a viable way to enhance the thermomechanical performance presented by these materials. At the present very few information is found regarding the slag attack of these free cement castable. In this study the slag attack resistance of high alumina castable with and without cement was evaluated by static test. The corroded region was analyzed by SEM and EDS. (author)

  15. Survey on Factors Affecting the Recurrence of Multiple sclerosis Attacks

    Directory of Open Access Journals (Sweden)

    Hasanzadeh F

    2015-02-01

    Full Text Available Background and Objective: Multiple sclerosis (MS is a chronic and progressive disease of the central nervous system. The identification of effective factors and patient education on the prevention of exposure to these factors can be effective in reducing relapses. Therefore, the present study aimed to investigate the factors that affect recurrence in patients with multiple sclerosis. Materials and Method: This cross-sectional study was conducted on 402 MS patients referred to the MS Association of Mashhad, Iran, in 2013. The study participants were selected using purposive sampling method. Data collection tools included a demographic questionnaire and a 40-item researcher-made questionnaire concerning factors affecting the recurrence of MS. The 40-item questionnaire consisted of 4 domains personal factors, medical condition, pharmaceutical conditions, and environmental factors. Data analysis was performed using SPSS software version 21 and Mann Whitney, Pearson correlation, Kruskal Wallis, and chi-square statistical tests. Results: Among the patients, 21/4% were male and 78/6% female. Most patients were 20-29 years old. The highest prevalence of recurrence of MS was observed in the summer (70.8% and in August (50.3%. There was no significant relationship between patient’s gender and their views about the relationship between infections, fatigue, and heat and recurrence of MS. However, a higher rate of women believed stress (P < 0.029 and sexual development (P < 0.001 to be effective on the incidence of MS recurrence, in comparison to men. Conclusion: Most patients with MS are women, and they believe stress to be more effective on the incidence of MS attack recurrence. Therefore, nurses, as the primary care educators, can improve the patients’ capability, disease management, and quality of life through training of stress management techniques.

  16. Injury pattern of suicide bomb attacks in Pakistan.

    Science.gov (United States)

    Yasin, M M A; Nasreen, G; Malik, S A

    2012-04-01

    The aim of our study was to analyze the pattern of injuries, hospital care, and outcome of the victims of suicide bomb attacks in Pakistan. This prospective, cohort study was conducted at the Combined Military Hospital Rawalpindi during the last 3 years. Seriously injured patients in the "immediate category" were resuscitated in the emergency operation theater adjacent to the emergency room and, after resuscitation, the patients were transferred to the main operation theaters, where consultant surgeons were available. During the study period, 1,296 terrorist victims presented to the emergency department and (86.9%) were admitted, with a mean hospital stay of 8.2 ± 2.1 days. The majority of patients arrived by ambulance (91%) and only 38 (3%) were evacuated by air. Penetrating splinter injuries were the most prevalent (87%), and 29% patients also had associated injuries. Open bone fractures were found in 48% and 42% had injured hollow and solid viscous. Overall, 33% of patients had thoracic injuries and neuro-trauma was observed in 16% of the study population. Deafness was a feature in 33% patients, 121 had to undergo limb amputations, and mortality remained in 7% of patients. Most of the problems encountered were logistic in nature. Early evacuation of the victims remains pivotal in saving lives. The major causes of death in peripheral patients was hypovolemic shock, sepsis, and hypothermia. Mortality and morbidity can be enhanced by ample fluid resuscitation, tetanus prophylaxis, and proficient first aid at the site of injury.

  17. Radiological assessment of the femoral bicondylar angle in a ...

    African Journals Online (AJOL)

    Background: Femoral bicondylar angle is the angle between the diaphysis of the femur and a line perpendicular to the infracondylar plane. It is indispensable in bipedal locomotion as it serves to place the knee and foot under the body's center of gravity during the single support phase of gait. Although the mechanism for the ...

  18. 46 CFR 58.01-40 - Machinery, angles of inclination.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 2 2010-10-01 2010-10-01 false Machinery, angles of inclination. 58.01-40 Section 58.01-40 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) MARINE ENGINEERING MAIN AND AUXILIARY MACHINERY AND RELATED SYSTEMS General Requirements § 58.01-40 Machinery, angles of inclination. (a) Propulsion machinery and all auxiliary...

  19. Terror attacks increases the risk of vascular injuries

    Directory of Open Access Journals (Sweden)

    Eitan eHeldenberg

    2014-05-01

    Full Text Available Objectives: Extensive literature exists about military trauma as opposed to the very limited literature regarding terror-related civilian trauma. However, terror-related vascular trauma (VT, as a unique type of injury, is yet to be addressed.Methods: A retrospective analysis of the Israeli National Trauma Registry was performed. All patients in the registry from 09/2000 to 12/2005 were included. The subgroup of patients with documented vascular trauma (VT (N=1,545 was analyzedand further subdivided into those suffering from Terror-related Vascular Trauma (TVT and Non-Terror related Vascular Trauma (NTVT. Both groups were analyzed according to mechanism of trauma, type and severity of injury and treatment.Results: Out of 2,446 terror related trauma admissions 243 sustained TVT (9.9% compared to 1302 VT patients from Non Terror trauma (1.1%. TVT injuries tend to be more complex and most patients were operated on. ICU admissions and hospitallength of stay was higher in the TVT group. Penetrating trauma was the prominent cause of injury among the TVT group. TVT group had a higher proportion of patients with severe injuries (ISS>16 and mortality. Thorax injuries were more frequent in the TVT group. Extremity injuries were the most prevalent vascular injuries in both groups; however NTVT group had more upper extremity injuries, while the TVT group had significantly more lower extremity injuries.Conclusion: Vascular injuries are remarkably more common among terror attack victims than among non-terror trauma victims and the injuries of terror casualties tend to be more complex. The presence of a vascular surgeon will ensure a comprehensive clinical care.

  20. Diffusion weighted MR imaging of transient ischemic attacks

    Energy Technology Data Exchange (ETDEWEB)

    Chung, Jin Il; Kim, Dong Ik; Lee, Seung Ik; Yoon, Pyung Ho [Research Institute of Radiological Science, College of Medicine, Yonsei University, Seoul (Korea, Republic of); Heo, Ji Hoe; Lee, Byung In [Medical College, Yonsei University, Seoul (Korea, Republic of)

    2000-07-01

    To investigate the findings of diffusion-weighted MR imaging in patients with transient ischemic attacks (TIA). Between August 1996 and June 1999, 41 TIA patients (M:F =3D 28:13, mean age 57 (range, 27-75) years) with neurologic symptoms lasting less than 24 hours underwent diffusion-weighted MR imaging. The time interval between the onset of symptoms and MR examination was less than one week in 29 patients, from one week to one month in eight, and undetermined in four. Conventional MR and DWI were compared in terms of location of infarction and lesion size (less than 1 cm, 1-3 cm, greater than 3 cm), and we also determined the anatomical vascular territory of acute stroke lesions and possible etiologic mechanisms. The findings of DWI were normal in 24/41 patients (58.5%), while 15 (36.6%) showed acute ischemic lesions. The other two showed old lacunar infarcts. All acute and old DWI lesions were revealed by conventional MR imaging. Among the 15 acute stroke patients, seven had small vessel lacunar disease. In three patients, the infarction was less than 1 cm in size. Six patients showed large vessel infarction in the territory of the MCA, PCA, and PICA; the size of this was less than 1 cm in three patients, 1-3 cm in two, and more than 3 cm in one. In two patients, embolic infarction of cardiac origin in the territory of the MCA and AICA was diagnosed. The possible mechanism of TIA is still undetermined, but acute lesions revealed by DWI in TIA patients tend, in any case, to be small and multiple. (author)

  1. Diffusion weighted MR imaging of transient ischemic attacks

    International Nuclear Information System (INIS)

    Chung, Jin Il; Kim, Dong Ik; Lee, Seung Ik; Yoon, Pyung Ho; Heo, Ji Hoe; Lee, Byung In

    2000-01-01

    To investigate the findings of diffusion-weighted MR imaging in patients with transient ischemic attacks (TIA). Between August 1996 and June 1999, 41 TIA patients (M:F =3D 28:13, mean age 57 (range, 27-75) years) with neurologic symptoms lasting less than 24 hours underwent diffusion-weighted MR imaging. The time interval between the onset of symptoms and MR examination was less than one week in 29 patients, from one week to one month in eight, and undetermined in four. Conventional MR and DWI were compared in terms of location of infarction and lesion size (less than 1 cm, 1-3 cm, greater than 3 cm), and we also determined the anatomical vascular territory of acute stroke lesions and possible etiologic mechanisms. The findings of DWI were normal in 24/41 patients (58.5%), while 15 (36.6%) showed acute ischemic lesions. The other two showed old lacunar infarcts. All acute and old DWI lesions were revealed by conventional MR imaging. Among the 15 acute stroke patients, seven had small vessel lacunar disease. In three patients, the infarction was less than 1 cm in size. Six patients showed large vessel infarction in the territory of the MCA, PCA, and PICA; the size of this was less than 1 cm in three patients, 1-3 cm in two, and more than 3 cm in one. In two patients, embolic infarction of cardiac origin in the territory of the MCA and AICA was diagnosed. The possible mechanism of TIA is still undetermined, but acute lesions revealed by DWI in TIA patients tend, in any case, to be small and multiple. (author)

  2. Seven deadliest USB attacks

    CERN Document Server

    Anderson, Brian

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting USB technology? Then you need Seven Deadliest USB Attacks. This book pinpoints the most dangerous hacks and exploits specific to USB, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: USB Hacksaw USB Switchblade USB Based Virus/Malicous Code Launch USB Device Overflow RAMdum

  3. Human perception of the measurement of a network attack taxonomy in near real-time

    CSIR Research Space (South Africa)

    van Heerden, R

    2014-07-01

    Full Text Available R. van Heerden et al. A Web Application such as a SQL Injection or a Web Crawl attack mechanism can be detected directly with specially crafted traps or logging of unusual web behaviour [33]. Error messages can also be used to detect SQL... Injection attacks [34]. SQL que- ries can be used to identify safe request and then identity attacks by restricting the allowed queries [35]. Misuse of Web applications are detected in the Application layer and has a high accuracy level. XSS Web...

  4. Physiological response to angling of Africa's premier freshwater ...

    African Journals Online (AJOL)

    Blood plasma was analysed for glucose, cortisol and lactate concentrations to assess the effects of angling duration, fish size and fish condition. Larger fish were angled for a longer duration. Plasma glucose concentrations decreased with greater lactate concentrations, an indication of the aerobic and anaerobic work done ...

  5. Contact angle hysteresis: a review of fundamentals and applications

    NARCIS (Netherlands)

    Eral, Burak; 't Mannetje, Dieter; Oh, J.M.

    2013-01-01

    Contact angle hysteresis is an important physical phenomenon. It is omnipresent in nature and also plays a crucial role in various industrial processes. Despite its relevance, there is a lack of consensus on how to incorporate a description of contact angle hysteresis into physical models. To

  6. Normal values of knee angle, intercondylar and intermalleolar ...

    African Journals Online (AJOL)

    There is little data on the range of variation of knee angle, intermalleolar and intercondylar distances in African children. Such measurements are needed to assist determining whether a child legs are normal or not. Knee angle intermalleolar and intercondylar distances were measured in 2166 Nigerian children aged one ...

  7. Presentation of Primary Open Angle Glaucoma (POAG) at Lions ...

    African Journals Online (AJOL)

    Objective Primary open angle glaucoma (POAG) is the most common type of glaucoma in Africa. We carried out a study to determine the clinical presentation pattern of patients with primary open angle glaucoma (POAG) at a tertiary hospital in Malawi. Design A cross-sectional study. Setting Lions Sight First Eye Hospital—a ...

  8. Engineering sidewall angles of silica-on-silicon waveguides

    DEFF Research Database (Denmark)

    Haiyan, Ou

    2004-01-01

    Burned photoresist is used as etch mask when producing silica-onsilicon waveguides. The sidewall angle of the optical glass waveguides is engineered by varying photoresist thickness and etch selectivity. The principle for the formation of the angles is introduced and very promising experimental...

  9. Effects of Sweep Angle on the Boundary-Layer Stability Characteristics of an Untapered Wing at Low Speeds

    Science.gov (United States)

    Boltz, Frederick W.; Kenyon, George C.; Allen, Clyde Q.

    1960-01-01

    An investigation was conducted in the Ames 12-Foot Low-Turbulence Pressure Tunnel to determine the effects of sweep on the boundary-layer stability characteristics of an untapered variable-sweep wing having an NACA 64(2)A015 section normal to the leading edge. Pressure distribution and transition were measured on the wing at low speeds at sweep angles of 0, 10, 20, 30, 40, and 50 deg. and at angles of attack from -3 to 3 deg. The investigation also included flow-visualization studies on the surface at sweep angles from 0 to 50 deg. and total pressure surveys in the boundary layer at a sweep angle of 30 deg. for angles of attack from -12 to 0 deg. It was found that sweep caused premature transition on the wing under certain conditions. This effect resulted from the formation of vortices in the boundary layer when a critical combination of sweep angle, pressure gradient, and stream Reynolds number was attained. A useful parameter in indicating the combined effect of these flow variables on vortex formation and on beginning transition is the crossflow Reynolds number. The critical values of crossflow Reynolds number for vortex formation found in this investigation range from about 135 to 190 and are in good agreement with those reported in previous investigations. The values of crossflow Reynolds number for beginning transitions were found to be between 190 and 260. For each condition (i.e., development of vortices and initiation of transition at a given location) the lower values in the specified ranges were obtained with a light coating of flow-visualization material on the surface. A method is presented for the rapid computation of crossflow Reynolds number on any swept surface for which the pressure distribution is known. From calculations based on this method, it was found that the maximum values of crossflow Reynolds number are attained under conditions of a strong pressure gradient and at a sweep angle of about 50 deg. Due to the primary dependence on pressure

  10. Before Using Aspirin to Lower Your Risk of Heart Attack or Stroke, Here Is What You Should Know

    Science.gov (United States)

    ... Medicines Safe Daily Use of Aspirin Before Using Aspirin to Lower Your Risk of Heart Attack or ... care provider can determine whether regular use of aspirin will help to prevent a heart attack or ...

  11. Dysfunction of Right Heart in Attack Period of Bronchial Asthma in Children

    Directory of Open Access Journals (Sweden)

    V.А. Kondratiev

    2015-11-01

    Full Text Available There were performed Doppler echocardiography investigations of functional state of the right heart in 42 children aged 5–17 years old in attack period of bronchial asthma of moderate to severe degree. Changes of intra-cardiac hemodynamics of the right heart in children in attack period of bronchial asthma were characterized by disturbance of systolic and diastolic function of the right ventricle and right atrium. Combined systolic-diastolic variant of the right ventricle dysfunction was typical for attack period of bronchial asthma in children and developed in 95.5 % of cases. Elevation of pressure in pulmonary artery was typical and significantly more often occurred in severe asthma attack, herewith pulmonary hypertension of the second degree predominated.

  12. An Efficient Algorithm for the Detection of Exposed and Hidden Wormhole Attack

    Directory of Open Access Journals (Sweden)

    ZUBAIR AHMED KHAN

    2016-07-01

    Full Text Available MANETs (Mobile Ad Hoc Networks are slowly integrating into our everyday lives, their most prominent uses are visible in the disaster and war struck areas where physical infrastructure is almost impossible or very hard to build. MANETs like other networks are facing the threat of malicious users and their activities. A number of attacks have been identified but the most severe of them is the wormhole attack which has the ability to succeed even in case of encrypted traffic and secure networks. Once wormhole is launched successfully, the severity increases by the fact that attackers can launch other attacks too. This paper presents a comprehensive algorithm for the detection of exposed as well as hidden wormhole attack while keeping the detection rate to maximum and at the same reducing false alarms. The algorithm does not require any extra hardware, time synchronization or any special type of nodes. The architecture consists of the combination of Routing Table, RTT (Round Trip Time and RSSI (Received Signal Strength Indicator for comprehensive detection of wormhole attack. The proposed technique is robust, light weight, has low resource requirements and provides real-time detection against the wormhole attack. Simulation results show that the algorithm is able to provide a higher detection rate, packet delivery ratio, negligible false alarms and is also better in terms of Ease of Implementation, Detection Accuracy/ Speed and processing overhead.

  13. Heart Attack

    Science.gov (United States)

    ... pain Fatigue Heart attack Symptoms & causes Diagnosis & treatment Advertisement Mayo Clinic does not endorse companies or products. ... a Job Site Map About This Site Twitter Facebook Google YouTube Pinterest Mayo Clinic is a not- ...

  14. Influence of Stockpile Angle in Natural Drying of Laterite Ore

    Directory of Open Access Journals (Sweden)

    Yoalbys Retirado-Mediaceja

    2016-10-01

    Full Text Available Natural drying is performed at Cuban nickel plants by depositing bulk ore in the open. The ore is currently being stockpiled without much consideration for the impact of the drying surface angle on the process power behavior. Simulations were carried out in this investigation, which prove that an increased triangular stockpile angle considerably reduces natural drying efficiency. A 45 sexagesimal degree angle to the horizontal plane results in exposure of a large volume of ore to natural drying and guarantees adequate energy performance.

  15. [Diagnostic value of Blumensaat angle for anterior cruciate ligament injury].

    Science.gov (United States)

    Cheng, Xiang-Yun; Feng, Jiang-Feng; Lu, Yan-Hui; Zhao, Yong-Liang; Yang, Zi-Quan

    2017-08-25

    The receiver operator characteristic(ROC) curve was used to determine the best Blumensaat angle for the diagnosis of anterior cruciate ligament injury, so as to objectively evaluate the diagnostic value of Blumensaat angle for anterior cruciate ligament injury. Total 167 patients who had knee arthroscopic treatment in a hospital from January 2015 to January 2016 were retrospectively studied, and the patients' age, gender, left and right limb condition were recorded. The patients were divided into two groups according to Blumensaat angle measured on the MRI: group A(Blumensaat angle0°). The ROC curve was drawn from the statistical data of the group B to get the best critical value of the anterior cruciate ligament injury when the Blumensaat angle was more than 0°. According to the best critical value obtained by ROC curve, the coincidence rate of the total sample was obtained. There were no significant differences in patients' age, gender, and affected limbs. There were 51 patients in group A, in which 49 patients were diagnosed as anterior cruciate injury under arthroscopy(gold standard for diagnosis of anterior cruciate ligament injury), and 2 patients were diagnosed as no anterior cruciate injury under arthroscopy. When the Blumensaat angle was=15°, the probability of anterior cruciate ligament injury was greater. When the Blumensaat angle was 0° to 15°, the anterior cruciate ligament was more likely to be not injured. The Blumensaat angle=15° were used to diagnose the injury of anterior cruciate ligament. Compared with the results of arthroscopy, the coincidence rate of the total sample was 92.8%. Blumensaat angle is helpful to diagnose the ACL injuries. When the Blumensaat angle was =15°, the probability of ACL injury is greater.

  16. Security awareness for public bus transportation : case studies of attacks against the Israeli public bus system [research brief].

    Science.gov (United States)

    2012-03-01

    Government regulators and transportation operators of public bus systems are concerned about terrorist attacks. Bus attacks in Israel between late September 2000 and the end of 2006, a period known as the Second Intifada, are particularly well known....

  17. High Angle of Attack Missile Aerodynamics at Mach Numbers 0.30 to 1.5

    Science.gov (United States)

    1980-11-01

    I AFWAL-TR-80-3070 I 45~//1° 4. N3B2 Cn 3d . 35 10 -2 36 30 37 50 2- S Cy ’ -1I __- 40 0 45 CAh ------ 50 -555 70- * 6C 50 504 40 ZS 8 9 LO R*N a 4. 5...Continued) 36. Drescher, H., "Messung Der Auf Querange-Sti"mte Zylinder Ausgeubten Zeitlich Verabderten Druck ," Z.F. Flugwss, Vol. 4, No. 1/2, 1956

  18. Angle of Attack and Sideslip Estimation Using an Inertial Reference Platform

    Science.gov (United States)

    1988-06-01

    VADD ...8217 SINCLUDE: ’ VADD . FOR’ SINCLIJDE: ’DOT. FoVZ // "-4 J I .4, APPENDIX D COMPUTER PROGRAM LAT , lv -I U. 4It ,44 ’I p. p. ~w 𔃾 ’S - 112 - LAT LAT is the...9070 -l 9080 IF CN.LT.IT) GOTO 151O 9390 CONTINUE 9100 END SINCLUDE:-’GMINV. FOR’ SINCLUDE: ’ VADD . FOR’ SINCLUDE: ’DOT. FOR’ -119- APPENDIX E

  19. Neutron small angle scattering of irradiated aluminium-silicon alloys

    International Nuclear Information System (INIS)

    Kostorz, G.

    1976-01-01

    Technically pure aluminium and aluminium-silicon alloys (0.43, 0.83 and 1.2% Si, also containing 0.11 to 0.14 at. % Fe) were investigated by slow neutron small angle scattering after irradiation with fast neutrons at low temperatures. Different irradiation levels, ageing at room temperature and at 60/70 0 C had no measurable effect upon small angle scattering cross-sections. From the experimental precision upper limit for the amount of Si involved in clustering after irradiation can be given. The observed small angle scattering shows a strong dependence on scattering angles and is attributed to large precipitates of Al 12 Fe 3 Si. A surface layer on the as-received samples is identified as another source of low-intensity small angle scattering. (orig.) [de

  20. The Framework for Simulation of Bioinspired Security Mechanisms against Network Infrastructure Attacks

    Directory of Open Access Journals (Sweden)

    Andrey Shorov

    2014-01-01

    Full Text Available The paper outlines a bioinspired approach named “network nervous system" and methods of simulation of infrastructure attacks and protection mechanisms based on this approach. The protection mechanisms based on this approach consist of distributed prosedures of information collection and processing, which coordinate the activities of the main devices of a computer network, identify attacks, and determine nessesary countermeasures. Attacks and protection mechanisms are specified as structural models using a set-theoretic approach. An environment for simulation of protection mechanisms based on the biological metaphor is considered; the experiments demonstrating the effectiveness of the protection mechanisms are described.