WorldWideScience

Sample records for attack damage due

  1. Assessment of damage potential to the TMI-2 lower head due to thermal attack by core debris

    International Nuclear Information System (INIS)

    Cronenberg, A.W.; Behling, S.R.; Broughton, J.M.

    1986-06-01

    Camera inspection of the Three Mile Island Unit 2 (TMI-2) inlet plenum region has shown that approximately 10 to 20 percent of the core material loading may have relocated to the lower plenum. Although vessel integrity was maintained, a question of primary concern is ''how close to vessel failure'' did this accident come. This report summarizes the results of thermal analyses aimed at assessing damage potential to the TMI-2 lower head and attached instrument penetration tubes due to thermal attack by hot core debris. Results indicate that the instrument penetration nozzles could have experienced melt failure at localized hot spot regions, with attendant debris drainage and plugging of the instrument lead tubes. However, only minor direct thermal attack of the vessel liner is predicted

  2. New Computational Model Based on Finite Element Method to Quantify Damage Evolution Due to External Sulfate Attack on Self-Compacting Concretes

    KAUST Repository

    Khelifa, Mohammed Rissel; Guessasma, Sofiane

    2012-01-01

    Abstract: This work combines experimental and numerical investigations to study the mechanical degradation of self-compacting concrete under accelerated aging conditions. Four different experimental treatments are tested among them constant immersion and immersion-drying protocols allow an efficient external sulfate attack of the material. Significant damage is observed due to interfacial ettringite. A predictive analysis is then adopted to quantify the relationship between ettringite growth and mechanical damage evolution during aging. Typical 3D microstructures representing the cement paste-aggregate structures are generated using Monte Carlo scheme. These images are converted into a finite element model to predict the mechanical performance under different criteria of damage kinetics. The effect of ettringite is then associated to the development of an interphase of lower mechanical properties. Our results show that the observed time evolution of Young's modulus is best described by a linear increase of the interphase content. Our model results indicate also that the interphase regions grow at maximum stress regions rather than exclusively at interfaces. Finally, constant immersion predicts a rate of damage growth five times lower than that of immersion-drying protocol. © 2012 Computer-Aided Civil and Infrastructure Engineering.

  3. New Computational Model Based on Finite Element Method to Quantify Damage Evolution Due to External Sulfate Attack on Self-Compacting Concretes

    KAUST Repository

    Khelifa, Mohammed Rissel

    2012-12-27

    Abstract: This work combines experimental and numerical investigations to study the mechanical degradation of self-compacting concrete under accelerated aging conditions. Four different experimental treatments are tested among them constant immersion and immersion-drying protocols allow an efficient external sulfate attack of the material. Significant damage is observed due to interfacial ettringite. A predictive analysis is then adopted to quantify the relationship between ettringite growth and mechanical damage evolution during aging. Typical 3D microstructures representing the cement paste-aggregate structures are generated using Monte Carlo scheme. These images are converted into a finite element model to predict the mechanical performance under different criteria of damage kinetics. The effect of ettringite is then associated to the development of an interphase of lower mechanical properties. Our results show that the observed time evolution of Young\\'s modulus is best described by a linear increase of the interphase content. Our model results indicate also that the interphase regions grow at maximum stress regions rather than exclusively at interfaces. Finally, constant immersion predicts a rate of damage growth five times lower than that of immersion-drying protocol. © 2012 Computer-Aided Civil and Infrastructure Engineering.

  4. Risk Due to Radiological Terror Attacks With Natural Radionuclides

    Science.gov (United States)

    Friedrich, Steinhäusler; Stan, Rydell; Lyudmila, Zaitseva

    2008-08-01

    The naturally occurring radionuclides radium (Ra-226) and polonium (Po-210) have the potential to be used for criminal acts. Analysis of international incident data contained in the Database on Nuclear Smuggling, Theft and Orphan Radiation Sources (CSTO), operated at the University of Salzburg, shows that several acts of murder and terrorism with natural radionuclides have already been carried out in Europe and Russia. Five different modes of attack (T) are possible: (1) Covert irradiation of an individual in order to deliver a high individual dose; (2) Covert irradiation of a group of persons delivering a large collective dose; (3) Contamination of food or drink; (4) Generation of radioactive aerosols or solutions; (5) Combination of Ra-226 with conventional explosives (Dirty Bomb). This paper assesses the risk (R) of such criminal acts in terms of: (a) Probability of terrorist motivation deploying a certain attack mode T; (b) Probability of success by the terrorists for the selected attack mode T; (c) Primary damage consequence (C) to the attacked target (activity, dose); (d) Secondary damage consequence (C') to the attacked target (psychological and socio-economic effects); (e) Probability that the consequences (C, C') cannot be brought under control, resulting in a failure to manage successfully the emergency situation due to logistical and/or technical deficits in implementing adequate countermeasures. Extensive computer modelling is used to determine the potential impact of such a criminal attack on directly affected victims and on the environment.

  5. Risk Due to Radiological Terror Attacks With Natural Radionuclides

    International Nuclear Information System (INIS)

    Friedrich, Steinhaeusler; Lyudmila, Zaitseva; Stan, Rydell

    2008-01-01

    The naturally occurring radionuclides radium (Ra-226) and polonium (Po-210) have the potential to be used for criminal acts. Analysis of international incident data contained in the Database on Nuclear Smuggling, Theft and Orphan Radiation Sources (CSTO), operated at the University of Salzburg, shows that several acts of murder and terrorism with natural radionuclides have already been carried out in Europe and Russia. Five different modes of attack (T) are possible: (1) Covert irradiation of an individual in order to deliver a high individual dose; (2) Covert irradiation of a group of persons delivering a large collective dose; (3) Contamination of food or drink; (4) Generation of radioactive aerosols or solutions; (5) Combination of Ra-226 with conventional explosives (Dirty Bomb).This paper assesses the risk (R) of such criminal acts in terms of: (a) Probability of terrorist motivation deploying a certain attack mode T; (b) Probability of success by the terrorists for the selected attack mode T; (c) Primary damage consequence (C) to the attacked target (activity, dose); (d) Secondary damage consequence (C') to the attacked target (psychological and socio-economic effects); (e) Probability that the consequences (C, C') cannot be brought under control, resulting in a failure to manage successfully the emergency situation due to logistical and/or technical deficits in implementing adequate countermeasures. Extensive computer modelling is used to determine the potential impact of such a criminal attack on directly affected victims and on the environment

  6. Network overload due to massive attacks

    Science.gov (United States)

    Kornbluth, Yosef; Barach, Gilad; Tuchman, Yaakov; Kadish, Benjamin; Cwilich, Gabriel; Buldyrev, Sergey V.

    2018-05-01

    We study the cascading failure of networks due to overload, using the betweenness centrality of a node as the measure of its load following the Motter and Lai model. We study the fraction of survived nodes at the end of the cascade pf as a function of the strength of the initial attack, measured by the fraction of nodes p that survive the initial attack for different values of tolerance α in random regular and Erdös-Renyi graphs. We find the existence of a first-order phase-transition line pt(α ) on a p -α plane, such that if p pt , pf is large and the giant component of the network is still present. Exactly at pt, the function pf(p ) undergoes a first-order discontinuity. We find that the line pt(α ) ends at a critical point (pc,αc) , in which the cascading failures are replaced by a second-order percolation transition. We find analytically the average betweenness of nodes with different degrees before and after the initial attack, we investigate their roles in the cascading failures, and we find a lower bound for pt(α ) . We also study the difference between localized and random attacks.

  7. A continuum damage analysis of hydrogen attack in 2.25 Cr-1Mo vessel

    DEFF Research Database (Denmark)

    van der Burg, M.W.D.; van der Giessen, E.; Tvergaard, Viggo

    1998-01-01

    A micromechanically based continuum damage model is presented to analyze the stress, temperature and hydrogen pressure dependent material degradation process termed hydrogen attack, inside a pressure vessel. Hydrogen attack (HA) is the damage process of grain boundary facets due to a chemical...... reaction of carbides with hydrogen, thus forming cavities with high pressure methane gas. Driven by the methane gas pressure, the cavities grow, while remote tensile stresses can significantly enhance the cavitation rate. The damage model gives the strain-rate and damage rate as a function...... of the temperature, hydrogen pressure and applied stresses. The model is applied to study HA in a vessel wall, where nonuniform distributions of hydrogen pressure, temperature and stresses result in a nonuniform damage distribution over the vessel wall. Stresses inside the vessel wall first tend to accelerate...

  8. Damage modelling in concrete subject to sulfate attack

    Directory of Open Access Journals (Sweden)

    N. Cefis

    2014-07-01

    Full Text Available In this paper, we consider the mechanical effect of the sulfate attack on concrete. The durability analysis of concrete structures in contact to external sulfate solutions requires the definition of a proper diffusion-reaction model, for the computation of the varying sulfate concentration and of the consequent ettringite formation, coupled to a mechanical model for the prediction of swelling and material degradation. In this work, we make use of a two-ions formulation of the reactive-diffusion problem and we propose a bi-phase chemo-elastic damage model aimed to simulate the mechanical response of concrete and apt to be used in structural analyses.

  9. Mathematical modeling of damage function when attacking file server

    Science.gov (United States)

    Kozlov, V. G.; Skrypnikov, A. V.; Chernyshova, E. V.; Mogutnov, R. V.; Levushkin, D. M.

    2018-05-01

    The development of information technologies in Russia and the prospects for their further improvement allow us to identify a stable trend of expansion of both functions of the corresponding automated information systems (AIS) and the spheres of their application. At the same time, many threats to information processes in the AIS are expanding, which in turn stimulates the development of adequate means and systems for ensuring the information security of the AS and methods for assessing their protection. It is necessary to assess the ability of the system to continue its normal functioning under the conditions of permanent destructive influences and to resist them, to adapt the functioning algorithms to new conditions and to organize functional restoration or to ensure functioning with a gradual process of degradation, possibly without losing the most significant “critical” information functions. The analysis and evaluation of reliability are needed to be transformed into the analysis and evaluation of survivability. Survivability can be considered as the ability of the information system to store and restore the performance of basic functions in a given volume and for a given time in the case of a change in the system structure and / or algorithms and the conditions of its functioning due to adverse effects. One of the system survivability indicators is the reserve of survivability (S-survivability) that is the critical number of defects reduced by a unit. The authors will consider defect as a unit of measurement of damage to the information system by adverse impact. U is denoted as the critical number of defects, then S = 1-U is the index of S-survivability. The article gives the definition of an analytical formula for the function of damage and risk.

  10. Individual vs. overarching protection for minimizing the expected damage caused by an attack

    International Nuclear Information System (INIS)

    Levitin, Gregory; Hausken, Kjell; Dai, Yuanshun

    2013-01-01

    The article considers a system consisting of identical elements which can be protected and attacked individually and collectively. The system is aimed at supplying a demand. If, following the attack, the cumulative performance of the elements becomes less than the demand the damage proportional to the unsupplied demand is inflicted. Additional damage is associated with the destruction of the equipment. To destroy any system element the attacker always must penetrate/destroy the collective (overarching) protection. Both the attacker and the defender have limited resources and can distribute them freely between the two types of attack and protection. The attacker chooses the resource distribution and the number of attacked elements to maximize the expected damage associated with equipment losses and unsupplied demand. The defender chooses the resource distribution and the number of protected elements to minimize the system destruction probability. The bi-contest minmax game is formulated and its solutions are presented and analyzed. The influence of the game parameters on the optimal defense and attack strategies is discussed

  11. Ovarian damage due to cyst removal

    DEFF Research Database (Denmark)

    Perlman, Signe; Kjer, Jens J

    2016-01-01

    INTRODUCTION: Surgical treatment of endometriomas and potential damage to the ovary have been debated. Studies have described the inconsistent risk of unintended removal of ovarian tissue when a cystectomy of an endometrioma is performed. We evaluated the risk of inadvertently removed ovarian tis...

  12. Coupled analysis of building damage due to tunneling

    NARCIS (Netherlands)

    Giardina, G.; Hendriks, M.A.N.; Rots, J.G.

    2009-01-01

    Excavation works in urban areas require a preliminary risk damage assessment. In historical cities, the prediction of building response to settlements is necessary to reduce the risk of damage of the architectural heritage. The current method used to predict the building damage due to ground

  13. Endothelial damage due to air pollution

    Directory of Open Access Journals (Sweden)

    Livio Dei Cas

    2010-05-01

    Full Text Available The first human deaths due to air pollution were recorded in the mid-20th century. There were 6,000 cases of illness recorded in Donora, Pennsylvania, in 1948 and 20,000 in London in 1952; 15 and 4,000 cases of death, respectively, were allegedly ascribed to air pollution. Since then, many countries have adopted standards of air quality in order to protect environmental and human health, although the quality of the air in some industrialized countries remains worrying. Emerging countries in the Far East and South America are also cause for concern because of the growth in the population, industrialization and transport. The WHO World Health Report 2002 estimated that air pollutants, particularly PM10, are associated with a mortality rate of 5% for cancer of the respiratory system, 2% for cardiovascular diseases and about 1% for respiratory tract infections. These estimates consider the mortality but not the morbidity rate, which would increase proportionally the number of cases of these pathologies, despite the difficulty in evaluation.

  14. Unique fatality due to claw injuries in a tiger attack: a case report.

    Science.gov (United States)

    Pathak, Hrishikesh; Dixit, Pradeep; Dhawane, Shailendra; Meshram, Satin; Shrigiriwar, Manish; Dingre, Niraj

    2014-11-01

    This paper describes a unique case of a fatal tiger attack in the wild. In the present case, a tiger fatally mauled a 34-year-old female with its claws, instead of the usual mechanism of killing by the bite injury to the neck. The autopsy revealed multiple fatal and non-fatal injuries caused by the tiger claws. The characteristic injuries due to the tooth impacts were absent as the teeth of the offending tiger were either fallen or non-functional. To the best of our knowledge, probably this rare case would be the first reported human fatality due to the tiger claw injuries in the world. The purpose of the present article is to highlight the fatal injuries due to the tiger claws, as the claw-induced fatal injuries in a tiger attack are not reported in the medico-legal literature. Moreover, this report would be an illustrative one for differentiation between the fatal injuries due to the claws and tooth impacts in a tiger attack. Furthermore, the present report establishes the importance of the tiger claws as a source of fatal injuries in a tiger attack. Copyright © 2014 Elsevier Ireland Ltd. All rights reserved.

  15. Damage of plants due to peroxyacyl nitrates (PAN)

    Energy Technology Data Exchange (ETDEWEB)

    Fukuda, H.; Terakado, K.

    1974-02-01

    In Japan plant damages began to resemble those due to PAN about 1972. Exposure experiments with artifically synthesized PAN in an environment simulation room determined the concentration of PAN and its duration to examine the relationship between these data in the field and crop damage. Synthesized PAN created by irradiating a mixture of ethyl nitrate and oxygen with ultraviolet light gave results similar to those seen in fields. From the end of April to the end of November, damages to petunias seemingly due to PAN appeared 15 times. The symptoms differed with the variety of petunia. After 14 experiments in fields from September 20 to November 30 with a continuous determination of the environmental concentration of PAN, damages to petunia were confirmed on 6 days when the maximum PAN concentration range was 3.0-6.7 ppb. The duration of concentrations higher than 3 ppb was 2-13 hr. The most serious damage appeared on September 20 when a concentration of more than 5 ppb continued for 7 hours. No damage appeared with a long continuation (6-12 hr) of a lower concentration of PAN of 2 ppb. Inter-varietal grafting showed that the symptoms and the degree of damage due to PAN were influenced only by the physiological specificity of the aerial portion of the plant. Leaves which are most affected by PAN differed with the variety of petunia.

  16. Takotsubo cardiomyopathy following recurrent doses of albuterol due to asthma attack: a very rare case report.

    Science.gov (United States)

    Parsa, Saeed Alipour; Khaheshi, Isa; Memaryan, Mehdi; Naderian, Mohammadreza

    2016-11-01

    To present an unusual case in order to clarify one of the most important differential diagnoses of ST-elevation myocardial infarction in a postmenopausal woman. A 72-year-old woman with asthma attack and retrosternal chest pain was presented to our emergency unit. She had used albuterol spray ten-times before admission due to accentuated dyspnea. Initial ECG revealed ST-segment elevation in leads V1-V6, I and aVL. Emergent coronary angiography indicated normal coronary arteries, and left ventriculography showed significant akinesia of apical segments. This unusual case emphasizes the fact that emergency physicians and cardiologists should be familiar with Takotsubo cardiomyopathy following overuse of β 2 -agonist due to asthma attack that can mimic ST-elevation myocardial infarction.

  17. Vulnerabilities of the security of nuclear material due to cyber attacks

    International Nuclear Information System (INIS)

    Daschil, F.

    2002-01-01

    Full text: The spread of new communication and computer technologies is now the potential for a dedicated, sophisticated adversary to conduct coordinated strikes against the computers, communications systems, and databases of nuclear material security systems. All weapons of cyber war, like viruses, Trojans, access to computer systems are potential risks for the security of nuclear material. New forms of destruction of electronic devices, e.g. Transient Electromagnetic Devices (TED), that could, in the hands of enemies, criminals, or terrorist pose a significant threat to nuclear safety infrastructure components that are based on micro-circuits and computer or micro-processor control. These examples shows the necessity to clearly identify possible risks as: information and communication based disorders and other disruptions and attacks; partial or complete failure of systems causing the risk of unexpected reaction or unmanageable situations; cracking of access codes and elimination of alarm equipment could give easy access to nuclear material; computer manipulation or complete computer and system takeover due to brute force attacks, viruses, Trojans and worms could lead to malfunctions, disruptions and nuclear disasters; computer spying and brute force attacks could give detailed information about technical, organizational and organizational data; combined actions of physical, electronic and computer attacks. The paper gives an overview of potential computer and communication safety gaps and points out strategic implications as the identification of the critical infrastructure, surveillance of computer systems, data access and communication paths. The basic necessity of the development of computer and communication breakdown backup systems as well as measures of precaution against cyber attacks is shown in the paper. (author)

  18. 78 FR 66852 - Housing Assistance Due to Structural Damage

    Science.gov (United States)

    2013-11-07

    ... constructed. This type of housing would have a life expectancy of more than 5 years, but less than 25 years... FEMA-2010-0035] RIN 1660-AA68 Housing Assistance Due to Structural Damage AGENCY: Federal Emergency...'s repair, replacement, and housing construction assistance regulations that clarify the eligibility...

  19. Reduction in thermal conductivity of ceramics due to radiation damage

    International Nuclear Information System (INIS)

    Klemens, P.G.; Hurley, G.F.; Clinard, F.W. Jr.

    1976-01-01

    Ceramics are required for a number of applications in fusion reactors. In several of these applications, the thermal conductivity is an important design parameter as it affects the level of temperature and thermal stress in service. Ceramic insulators are known to suffer substantial reduction in thermal conductivity due to neutron irradiation damage. The present study estimates the reduction in thermal conductivity at high temperature due to radiation induced defects. Point, extended, and extended partly transparent defects are considered

  20. Exploring aggregate economic damage functions due to climate change

    Energy Technology Data Exchange (ETDEWEB)

    Dowlatabadi, H.; Kandlikar, M.; Patwardhan, A. [and others

    1994-12-31

    A number of issues need to be considered when developing aggregated economic damage functions due to climate change. These include: (i) identification of production processes vulnerable to climate change, (ii) an understanding of the mechanism of vulnerability, (iii) the rate of technological advance and diffusion (iv) the issue of detection of damages and availability of response options. In this paper we will explore the implications of these considerations with the aid of an illustrative model. The findings suggest that there is a significant upward bias in damage functions calculated without consideration of these issues. Furthermore, this systematic bias is larger as climate change increases. We believe the approach explored here is a more suitable model for adoption in future integrated assessments of climate change.

  1. Exploring aggregate economic damage functions due to climate change

    International Nuclear Information System (INIS)

    Dowlatabadi, H.; Kandlikar, M.; Patwardhan, A.

    1994-01-01

    A number of issues need to be considered when developing aggregated economic damage functions due to climate change. These include: (1) identification of production processes vulnerable to climate change, (2) an understanding of the mechanism of vulnerability, (3) the rate of technological advance and diffusion, (4) the issue of detection of damages and availability of response options. In this paper the authors will explore the implications of these considerations with the aid of an illustrative model. The findings suggest that there is a significant upward bias in damage functions calculated without consideration of these issues. Furthermore, this systematic bias is larger as climate change increases. The authors believe the approach explored here is a more suitable model for adoption in future integrated assessments of climate change

  2. Preliminary observations of environmental damage due to the Gulf War

    International Nuclear Information System (INIS)

    El-Baz, F.

    1992-01-01

    Preparing for and conducting the Gulf War resulted in much damage to the environment of the region. The first and most visible effect is related to the damage caused by oil well fires in terms of air pollution as well as the potential damage to the petroleum reservoirs. The second detrimental effect has been caused by the oil spill in the Gulf water. Hundreds of miles of the western coastline of the Gulf are already covered with oil. Petroleum 'mats' have settled on coral reefs and have reduced Gulf water productivity. Foremost among the irreparable damages are changes to the terrain due to the digging of trenches, building walls of soil and otherwise disturbing the desert pavement in and around Kuwait. Disruption of the, usually, one-grain thick layer of pebbles on the desert floor exposes soil to wind action. Changing the contours of the normally flat land increases resistance to the wind and increases the potential of particle transport until the land is peneplained. This condition will increase the frequency and the ferocity of dust storms in the region. It will also result in the formation of new sand dunes; sand drifts already exist along roads in northern Kuwait. It is believed that the detrimental effects on the atmosphere will last for years, on the Gulf water for decades, and on the desert surface for centuries. (author). 12 refs, 1 fig

  3. Preliminary observations of environmental damage due to the Gulf War

    Energy Technology Data Exchange (ETDEWEB)

    El-Baz, F [Boston Univ., Boston, MA (United States). Center for Remote Sensing

    1992-02-01

    Preparing for and conducting the Gulf War resulted in much damage to the environment of the region. The first and most visible effect is related to the damage caused by oil well fires in terms of air pollution as well as the potential damage to the petroleum reservoirs. The second detrimental effect has been caused by the oil spill in the Gulf water. Hundreds of miles of the western coastline of the Gulf are already covered with oil. Petroleum 'mats' have settled on coral reefs and have reduced Gulf water productivity. Foremost among the irreparable damages are changes to the terrain due to the digging of trenches, building walls of soil and otherwise disturbing the desert pavement in and around Kuwait. Disruption of the, usually, one-grain thick layer of pebbles on the desert floor exposes soil to wind action. Changing the contours of the normally flat land increases resistance to the wind and increases the potential of particle transport until the land is peneplained. This condition will increase the frequency and the ferocity of dust storms in the region. It will also result in the formation of new sand dunes; sand drifts already exist along roads in northern Kuwait. It is believed that the detrimental effects on the atmosphere will last for years, on the Gulf water for decades, and on the desert surface for centuries. (author). 12 refs, 1 fig.

  4. Iron-Deficiency Anemia Leading to Transient Ischemic Attacks due to Intraluminal Carotid Artery Thrombus

    Directory of Open Access Journals (Sweden)

    H. Z. Batur Caglayan

    2013-01-01

    Full Text Available Reactive thrombocytosis secondary to iron-deficiency anemia (IDA is a rare but recognized cause of stroke. We report the case of a patient with iron-deficiency anemia presenting with multiple transient ischemic attacks (TIA due to intraluminal thrombus of an internal carotid artery. The putative mechanisms underlying anemia and stroke syndromes are not completely understood, and it is believed that iron deficiency may cause ischemic stroke by several potential mechanisms. Thrombocytosis is often associated with iron deficiency, and microcytosis produces a reduction in the red cell deformability and could produce a hypercoagulable state. The platelet count and function observed in iron-deficiency anemia could act synergistically to promote thrombus formation, especially in the setting of an underlying atherosclerotic disease. The presence of floating thrombus in a patient with clinical and MRI evidence of stroke represents a significant therapeutic dilemma and requires immediate decision about treatment.

  5. Modifying effect of age on the association between ambient ozone and nighttime primary care visits due to asthma attack.

    Science.gov (United States)

    Yamazaki, Shin; Shima, Masayuki; Ando, Michiko; Nitta, Hiroshi

    2009-01-01

    We examined the association between short-term exposure to outdoor air pollution and nighttime primary care visits due to asthma attack. We also investigated the modifying effects of age on this association. A case-crossover study was conducted at a primary care clinic in metropolitan Tokyo. The subjects were 308 children aged 0-14 years and 95 adolescents and adults aged 15-64 years. All subjects made visits to the clinic for an asthma attack at between 7 PM and 12 AM. Data on hourly concentrations of particulate matter with a 50% cut-off aerodynamic diameter asthma attack in warmer months; the association was greater among preschool children.

  6. Tracheoesophageal Fistula due to a Damaged Tracheal Stent

    Directory of Open Access Journals (Sweden)

    Masahiro Kimura

    2014-01-01

    Full Text Available We describe the management of a tracheoesophageal fistula due to a damaged tracheal stent, which was first inserted to treat tracheal stenosis. A 29-year-old woman with a history of treated epilepsy had a seizure and suffered from smoke inhalation during a fire. Breathing difficulties appeared and gradually worsened; consultation was obtained two years afterward. After undergoing a thorough examination, the patient was diagnosed with tracheal strangulation. A noncovered, metallic stent was inserted. When the patient was 37 years old, she was admitted to our hospital for the treatment of a tracheoesophageal fistula. We diagnosed it as a tracheoesophageal fistula due to the collapse of the damaged tracheal stent toward the esophageal side, and we decided to perform a mediastinal tracheostomy. Granulation may be formed in the circumference of a stent that has been present for a prolonged period, and removal of the stent may become difficult. This case suggests that insertion of a noncovered, metallic stent is contraindicated for a benign disease.

  7. Damage studies on tungsten due to helium ion irradiation

    International Nuclear Information System (INIS)

    Dutta, N.J.; Buzarbaruah, N.; Mohanty, S.R.

    2014-01-01

    Highlights: • Used plasma focus helium ion source to study radiation induced damage on tungsten. • Surface analyses confirm formation of micro-crack, bubbles, blisters, pinholes, etc. • XRD patterns confirm development of compressive stress due to thermal load. • Reduction in hardness value is observed in the case of exposed sample. - Abstract: Energetic and high fluence helium ions emitted in a plasma focus device have been used successfully to study the radiation induced damage on tungsten. The reference and irradiated samples were characterized by optical microscopy, field emission scanning electron microscopy, X-ray diffraction and by hardness testers. The micrographs of the irradiated samples at lower magnification show uniform mesh of cracks of micrometer width. However at higher magnification, various types of crystalline defects such as voids, pinholes, bubbles, blisters and microcracks are distinctly noticed. The prominent peaks in X-ray diffraction spectrum of irradiated samples are seen shifted toward higher Bragg angles, thus indicating accumulation of compressive stress due to the heat load delivered by helium ions. A marginal reduction in hardness of the irradiated sample is also noticed

  8. The Damage To The Armour Layer Due To Extreme Waves

    Science.gov (United States)

    Oztunali Ozbahceci, Berguzar; Ergin, Aysen; Takayama, Tomotsuka

    2010-05-01

    The sea waves are not regular but random and chaotic. In order to understand this randomness, it is common to make individual wave analysis in time domain or spectral analysis in frequency domain. Characteristic wave heights like Hmax, H%2,H1-10, H1-3, Hmean are obtained through individual wave analysis in time domain. These characteristic wave heights are important because they are used in the design of different type of coastal structures. It is common to use significant wave height, H1-3,for the design of rubble mound structures. Therefore, only spectrally derived or zero-crossing significant wave height is usually reported for the rubble mound breakwaters without any information on larger waves. However, even the values of H1-3are similar; some train of irregular waves may exhibit a large fluctuation of instantaneous wave energy, while another train may not show such a fluctuation (Goda, 1998). Moreover, freak or rogue wave, simply defined as the wave exceeding at least twice the significant wave height may also occur. Those larger waves were called as extreme waves in this study and the effect of extreme waves on the damage to the armour layer of rubble mound breakwaters was investigated by means of hydraulic model experiment. Rock armored rubble mound breakwater model with 1:1.5 slope was constructed in the wave channel of Hydraulics Laboratory of the Disaster Prevention Research Institute of Kyoto University, Japan. The model was consisted of a permeable core layer, a filter and armour layer with two stones thicknesses. Size of stones were same for both of the slopes as Dn50(armour)=0.034m, Dn50(filter)=0.021m and Dn50(core)=0.0148m for armour, filter and core layers, respectively. Time series which are approximately equal to 1000 waves, with similar significant wave height but different extreme wave height cases were generated. In order to generate necessary time series in the wave channel, they were firstly computed by numerically. For the numerical

  9. Bacterial Cell Surface Damage Due to Centrifugal Compaction

    NARCIS (Netherlands)

    Peterson, Brandon W.; Sharma, Prashant K.; van der Mei, Henny C.; Busscher, Henk J.

    Centrifugal damage has been known to alter bacterial cell surface properties and interior structures, including DNA. Very few studies exist on bacterial damage caused by centrifugation because of the difficulty in relating centrifugation speed and container geometry to the damage caused. Here, we

  10. Otolithic membrane damage in patients with endolymphatic hydrops and drop attacks.

    Science.gov (United States)

    Calzada, Audrey P; Lopez, Ivan A; Ishiyama, Gail; Ishiyama, Akira

    2012-12-01

    1. Evaluate the otolithic membrane in patients with endolymphatic hydrops (EH) and vestibular drop attacks (VDA) undergoing ablative labyrinthectomy. 2. Correlate intraoperative findings to archival temporal bone specimens of patients with EH. Retrospective case review. Tertiary referral center. SPECIMEN SOURCE: 1. Patients undergoing labyrinthectomy for incapacitating Ménière's disease (MD), delayed EH, VDA, or acoustic neuroma (AN) between 2004 and 2011. 2. Archival temporal bone specimens of patients with MD. Ablative labyrinthectomy. Examination of the utricular otolithic membrane. The otolithic membrane of the utricle was evaluated intraoperatively in 28 patients undergoing labyrinthectomy. Seven (25%) had a history of VDA, 6 (21%) had delayed EH, 9 (32%) had MD, and 6 (21%) had AN. All patients with VDA showed evidence of a disrupted utricular otolithic membrane, whereas only 50% and 56% of patients with delayed EH and MD, respectively, demonstrated otolithic membrane disruption (p = 0.051). None of the patients with AN showed otolithic membrane disruption (p = 0.004). The mean thickness of the otolithic membrane in 5 archival temporal bone MD specimens was 11.45 micrometers versus 38 micrometers in normal specimens (p = 0.001). The otolithic membrane is consistently damaged in patients with VDA. In addition, there is a significantly higher incidence of otolithic membrane injury in patients with MD and delayed EH compared with patients without hydrops, suggesting that the underlying pathophysiology in VDA results from injury to the otolithic membrane of the saccule and utricle, resulting in free-floating otoliths and atrophy.

  11. MRI findings of brain damage due to neonatal hypoglycemia

    International Nuclear Information System (INIS)

    Wang Lu; Fan Guoguang; Ji Xu; Sun Baohai; Guo Qiyong

    2009-01-01

    Objective: To report the MRI findings of brain damage observed in neonatal patients who suffered from isolated hypoglycemia and to explore the value of diffusion-weighted imaging(DWI) in early detection of neonatal hypoglycemic brain injury. Methods: Twelve neonates with isolated hypoglycemia (10 of the 12 were diagnosed to suffer from hypoglycemic encephalopathy) were enrolled in this study. They were first scanned at age from 3 days to 10 days with T 1 WI, T 2 WI and DWI(b is 0 s/mm 2 , 1000 s/mm 2 ), and 4 of them were then scanned from 7 days to 10 days following the initial scan. All acquired MR images were retrospectively analysed. Results: First series of DWI images showed distinct hyperintense signal in 11 cases in several areas including bilateral occipital cortex (2 cases), right occipital cortex (1 case), left occipital cortex and subcortical white matter(1 case), bilateral occipital cortex and subcortical white matter (2 cases), bilateral parieto-occipital cortex (2 cases), bilateral parieto-occipital cortex and subcortical white matter(2 cases), the splenium of corpus callosum (4 cases), bilateral corona radiata( 2 cases), left caudate nucleus and globus pallidus (1 case), bilateral thalamus (1 case), bilaterally posterior limb of internal capsule (1 case). In the initial T 1 WI and T 2 WI images, there were subtle hypointensity in the damaged cortical areas (3 cases), hyperintensity in the bilaterally affected occipital cortex( 1 case) on T 1 weighted images, and hyperintensity in the affected cortex and subcortical white matter with poor differentiation on T 2 weighted images. The followed-up MRI of 4 cases showed regional encephalomalacia in the affected occipital lobes(4 cases), slightly hyperintensity on T 2 weighted images in the damaged occipital cortex (2 cases), extensive demyelination (1 case), disappearance of hyperintensity of the splenium of corpus callosum (1 case), and persistent hyperintensity in the splenium of corpus callosum (1 case

  12. Damage symptoms of plants due to PAN exposure

    Energy Technology Data Exchange (ETDEWEB)

    Nouchi, I; Sawada, T; Ohashi, T; Odaira, T

    1974-11-01

    In order to identify the cause of plant damage which differed from that by ozone, a series of exposure experiments was carried out on Beta vulgaris, Japanese radish, French bean, luthern, tomato, and spinach in a controlled weather room by artificially synthesized PAN (peroxyacetyl nitrate). The damage appeared generally on younger leaves as a lustering and bronzing on the lower surface; there was a specific symptom in which the interveinary part of the lower surface depressed, leaving the veins in relief. At higher concentrations of PAN, damages appeared on the upper surface of leaves, however, bronzing and lustering were clearer during exposure to lower concentrations of PAN. The position of the leaves and the part of a leaf which was damaged were constant in the petunia, morning glory, and tobacco. There was a hyperbolic relationship between the concentration of PAN and the time period of appearance of the damage as was seen during sulfur dioxide and ozone exposures.

  13. Association of ambient air pollution and meteorological factors with primary care visits at night due to asthma attack.

    Science.gov (United States)

    Yamazaki, Shin; Shima, Masayuki; Yoda, Yoshiko; Oka, Katsumi; Kurosaka, Fumitake; Shimizu, Shigeta; Takahashi, Hironobu; Nakatani, Yuji; Nishikawa, Jittoku; Fujiwara, Katsuhiko; Mizumori, Yasuyuki; Mogami, Akira; Yamada, Taku; Yamamoto, Nobuharu

    2013-09-01

    The association of outdoor air pollution and meteorological elements with primary care visits at night due to asthma attack was studied. A case-crossover study was conducted in a primary care clinic in Himeji City, Japan. The subjects were 956 children aged 0-14 years who visited the clinic with an asthma attack between the hours of 9 p.m. and 6 a.m. Daily concentrations of particulate matter, ozone, nitrogen dioxide, and a number of meteorological elements were measured, and a conditional logistic regression model was used to estimate odds ratios (ORs) of primary care visits per unit increment of air pollutants or meteorological elements. The analyses took into consideration the effects of seasonality. Of the 956 children, 73 (7.6 %) were aged asthma attack at night in the spring or summer was found. An inverse relation between suspended particulate matter and primary care visits due to asthma attack was detected in the winter. ORs in the summer per degree increment in daily mean temperature was 1.31 [95 % confidential interval (CI) 1.09-1.56], and ORs in the autumn per hourly increment in daily hours of sunshine was 0.94 (95 % CI 0.90-0.99). The findings of our study fail to support any association between daily mean concentration of air pollutant and primary care visits at night. However, we did find evidence indicating that certain meteorological elements may be associated with primary care visits.

  14. Enamel subsurface damage due to tooth preparation with diamonds.

    Science.gov (United States)

    Xu, H H; Kelly, J R; Jahanmir, S; Thompson, V P; Rekow, E D

    1997-10-01

    In clinical tooth preparation with diamond burs, sharp diamond particles indent and scratch the enamel, causing material removal. Such operations may produce subsurface damage in enamel. However, little information is available on the mechanisms and the extent of subsurface damage in enamel produced during clinical tooth preparation. The aim of this study, therefore, was to investigate the mechanisms of subsurface damage produced in enamel during tooth preparation by means of diamond burs, and to examine the dependence of such damage on enamel rod orientation, diamond particle size, and removal rate. Subsurface damage was evaluated by a bonded-interface technique. Tooth preparation was carried out on two enamel rod orientations, with four clinical diamond burs (coarse, medium, fine, and superfine) used in a dental handpiece. The results of this study showed that subsurface damage in enamel took the form of median-type cracks and distributed microcracks, extending preferentially along the boundaries between the enamel rods. Microcracks within individual enamel rods were also observed. The median-type cracks were significantly longer in the direction parallel to the enamel rods than perpendicular to the rods. Preparation with the coarse diamond bur produced cracks as deep as 84 +/- 30 microns in enamel. Finishing with fine diamond burs was effective in crack removal. The crack lengths in enamel were not significantly different when the removal rate was varied. Based on these results, it is concluded that subsurface damage in enamel induced by tooth preparation takes the form of median-type cracks as well as inter- and intra-rod microcracks, and that the lengths of these cracks are sensitive to diamond particle size and enamel rod orientation, but insensitive to removal rate.

  15. A Study on health damage due to air pollution

    Energy Technology Data Exchange (ETDEWEB)

    Han, Hwa Jin; Oh, So Young [Korea Environment Institute, Seoul (Korea)

    1998-12-01

    According to the domestic and foreign change in given conditions of air preservation policy, the air preservation policy in Korea should be implemented scientifically and reasonably. A gradual turnover to receptor-oriented reflecting human health and ecological effect is needed to establish and promote the air preservation policy systemically and in a long-term basis. Based on the quantified health damage of a people, air preservation policy in Korea should develop as a management policy to develop and implement an optimum management mechanism to minimized health damage of receptor. 19 refs., 2 figs., 25 tabs.

  16. The neuroimaging evidence for chronic brain damage due to boxing

    Energy Technology Data Exchange (ETDEWEB)

    Moseley, I.F. [Lysholm Radiological Department, National Hospital for Neurology and Neurosurgery, London (United Kingdom)

    2000-01-01

    A number of imaging techniques have been used to investigate changes produced in the brain by boxing. Most morphological studies have failed to show significant correlations between putative abnormalities on imaging and clinical evidence of brain damage. Fenestration of the septum pellucidum, with formation of a cavum, one of the most frequent observations, does not appear to correlate with neurological or physiological evidence of brain damage. Serial studies on large groups may be more informative. Magnetic resonance spectroscopy and cerebral blood flow studies have been reported in only small numbers of boxers; serial studies are not available to date. (orig.)

  17. Videodensitometry in rats with pulmonary damage due to microembolism

    Energy Technology Data Exchange (ETDEWEB)

    Wegenius, G.; Wegener, T.; Ruhn, G.; Saldeen, T.; Erikson, U.

    Serial pulmonary angiography with videodensitometry was performed in 18 rats with pulmonary damage caused by administration of a fibrinolysis inhibitor, tranexamic acid (200 mg/kg body weight injected intraperitoneally) and bovine thrombin (500 NIH/kg body weight injected into the right femoral vein). The mean transit time (MTT) was calculated from videodensitometry, the observed area of interest consisting of approximately one-third of the right lung, including both central and peripheral parts. The impact of the pulmonary damage was analysed by morphologic methods and correlated to MTT. Although a pressure rise presumably occurred in the pulmonary circulation, no change in MTT was found after induction of pulmonary damage, indicating opening of actual and potential anastomoses between pulmonary arterioles and venules to serve as by-pass portions and as a safety-valve mechanism for the capillary bed and the right heart, respectively. Another explanation to unchanged MTT may be opening of resting capillary beds. Two rats with very severe pulmonary damage showed prolonged MTT. These rats may have suffered from cardiac failure.

  18. Videodensitometry in rats with pulmonary damage due to microembolism

    International Nuclear Information System (INIS)

    Wegenius, G.; Wegener, T.; Ruhn, G.; Saldeen, T.; Erikson, U.

    1985-01-01

    Serial pulmonary angiography with videodensitometry was performed in 18 rats with pulmonary damage caused by administration of a fibrinolysis inhibitor, tranexamic acid (200 mg/kg body weight injected intraperitoneally) and bovine thrombin (500 NIH/kg body weight injected into the right femoral vein). The mean transit time (MTT) was calculated from videodensitometry, the observed area of interest consisting of approximately one-third of the right lung, including both central and peripheral parts. The impact of the pulmonary damage was analysed by morphologic methods and correlated to MTT. Although a pressure rise presumably occurred in the pulmonary circulation, no change in MTT was found after induction of pulmonary damage, indicating opening of actual and potential anastomoses between pulmonary arterioles and venules to serve as by-pass portions and as a safety-valve mechanism for the capillary bed and the right heart, respectively. Another explanation to unchanged MTT may be opening of resting capillary beds. Two rats with very severe pulmonary damage showed prolonged MTT. These rats may have suffered from cardiac failure. (orig.)

  19. Un-repairable DNA damage in cell due to irradiation

    International Nuclear Information System (INIS)

    Yoshii, Giichi

    1992-01-01

    Radiation-induced cell reproductive deactivation is caused by damage to DNA. In a cell, cellular DNA radical reacts with diffusion controlled rate and generates DNA peroxide radical. The chemical repair of DNA radical with hydrogen donation by thiol competes with the reaction of oxygen with same radicals in the DNA molecules. From the point reaction rates, the prolongation of radical life time is not as great as expected from the reduction in the glutathione content of the cell. This indicates that further reducting compounds (protein bound thiol) are present in the cell. The residual radicals are altered to strand breaks, base damages and so on. The effective lesions for a number of endpoints is un-repaired double strand break, which has been discovered in a cluster. This event gives risk to high LET radiation or to a track end of X-rays. For X- or electron irradiations the strand breaks are frequently induced by the interactions between sublesions on two strands in DNA. A single strand break followed by radical action may be unstable excited state, because of remaining sugar radical action and of having negative charged phosphates, in which strands breaks will be rejoined in a short time to stable state. On the same time, a break in the double helix will be immediately produced if two breaks are on either or approximately opposite locations. The formation of a double strand break in the helix depends on the ion strength of the cell. The potassium ions are largely released from polyanionic strand during irradiation, which results in the induction of denatured region. Double strand break with the denatured region seems to be un-repairable DNA damage. (author)

  20. Extra lethal damage due to residual incompletely repaired sublethal damage in hyperfractionated and continuous radiation treatment

    Energy Technology Data Exchange (ETDEWEB)

    Chen, J.; van de Geijn, J.; Goffman, T. (ROB, DCT, NCI, NIH, Bethesda, Maryland 20892 (US))

    1991-05-01

    In the conventional linear--quadratic model of single-dose response, the {alpha} and {beta} terms reflect lethal damage created {ital during} the delivery of a dose, from two different presumed molecular processes, one linear with dose, the other quadratic. With the conventional one-fraction-per-day (or less) regimens, the sublethal damage (SLD), presumably repairing exponentially over time, is essentially completely fixed by the time of the next dose of radiation. If this assumption is true, the effects of subsequent fractions of radiation should be independent, that is, there should be little, if any, reversible damage left from previous fractions, at the time of the next dose. For multiple daily fractions, or for the limiting case, continuous radiation, this simplification may overlook damaged cells that have had insufficient time for repair. A generalized method is presented for accounting for extra lethal damage (ELD) arising from such residual SLD for hyperfractionation and continuous irradiation schemes. It may help to predict differences in toxicity and tumor control, if any, obtained with unconventional'' treatment regimens. A key element in the present model is the finite size and the dynamic character of the pool of sublethal damage. Besides creating the usual linear and quadratic components of lethal damage, each new fraction converts a certain fraction of the existing SLD into ELD, and creates some new SLD.

  1. Extra lethal damage due to residual incompletely repaired sublethal damage in hyperfractionated and continuous radiation treatment

    International Nuclear Information System (INIS)

    Chen, J.; van de Geijn, J.; Goffman, T.

    1991-01-01

    In the conventional linear--quadratic model of single-dose response, the α and β terms reflect lethal damage created during the delivery of a dose, from two different presumed molecular processes, one linear with dose, the other quadratic. With the conventional one-fraction-per-day (or less) regimens, the sublethal damage (SLD), presumably repairing exponentially over time, is essentially completely fixed by the time of the next dose of radiation. If this assumption is true, the effects of subsequent fractions of radiation should be independent, that is, there should be little, if any, reversible damage left from previous fractions, at the time of the next dose. For multiple daily fractions, or for the limiting case, continuous radiation, this simplification may overlook damaged cells that have had insufficient time for repair. A generalized method is presented for accounting for extra lethal damage (ELD) arising from such residual SLD for hyperfractionation and continuous irradiation schemes. It may help to predict differences in toxicity and tumor control, if any, obtained with ''unconventional'' treatment regimens. A key element in the present model is the finite size and the dynamic character of the pool of sublethal damage. Besides creating the usual linear and quadratic components of lethal damage, each new fraction converts a certain fraction of the existing SLD into ELD, and creates some new SLD

  2. Uncertainty in urban flood damage assessment due to urban drainage modelling and depth-damage curve estimation.

    Science.gov (United States)

    Freni, G; La Loggia, G; Notaro, V

    2010-01-01

    Due to the increased occurrence of flooding events in urban areas, many procedures for flood damage quantification have been defined in recent decades. The lack of large databases in most cases is overcome by combining the output of urban drainage models and damage curves linking flooding to expected damage. The application of advanced hydraulic models as diagnostic, design and decision-making support tools has become a standard practice in hydraulic research and application. Flooding damage functions are usually evaluated by a priori estimation of potential damage (based on the value of exposed goods) or by interpolating real damage data (recorded during historical flooding events). Hydraulic models have undergone continuous advancements, pushed forward by increasing computer capacity. The details of the flooding propagation process on the surface and the details of the interconnections between underground and surface drainage systems have been studied extensively in recent years, resulting in progressively more reliable models. The same level of was advancement has not been reached with regard to damage curves, for which improvements are highly connected to data availability; this remains the main bottleneck in the expected flooding damage estimation. Such functions are usually affected by significant uncertainty intrinsically related to the collected data and to the simplified structure of the adopted functional relationships. The present paper aimed to evaluate this uncertainty by comparing the intrinsic uncertainty connected to the construction of the damage-depth function to the hydraulic model uncertainty. In this way, the paper sought to evaluate the role of hydraulic model detail level in the wider context of flood damage estimation. This paper demonstrated that the use of detailed hydraulic models might not be justified because of the higher computational cost and the significant uncertainty in damage estimation curves. This uncertainty occurs mainly

  3. A method for the estimation of the probability of damage due to earthquakes

    International Nuclear Information System (INIS)

    Alderson, M.A.H.G.

    1979-07-01

    The available information on seismicity within the United Kingdom has been combined with building damage data from the United States to produce a method of estimating the probability of damage to structures due to the occurrence of earthquakes. The analysis has been based on the use of site intensity as the major damage producing parameter. Data for structural, pipework and equipment items have been assumed and the overall probability of damage calculated as a function of the design level. Due account is taken of the uncertainties of the seismic data. (author)

  4. Damage formation and annealing in InP due to swift heavy ions

    International Nuclear Information System (INIS)

    Kamarou, A.; Wesch, W.; Wendler, E.; Klaumuenzer, S.

    2004-01-01

    Virgin and pre-damaged InP samples were irradiated at room temperature (RT) and at liquid nitrogen temperature (LNT) with different fluences of 140 MeV Kr, 390 MeV Xe and 600 MeV Au ions. The pre-damaging was performed with 600 keV Ge ions at LNT to obtain different damage levels. The samples were analysed by means of Rutherford backscattering spectrometry (RBS) in random and channelling geometry. A relatively weak damage accumulation in virgin InP and a very significant defect annealing in pre-damaged InP occurs due to 140 MeV Kr irradiation. The damaging of virgin InP with 390 MeV Xe and 600 MeV Au is much more efficient in comparison with that of 140 MeV Kr. Further, annealing of the pre-damaged InP due to 390 MeV Xe irradiation is hardly visible. At LNT InP appears to be much more radiation-resistant to swift heavy ion (SHI) irradiation than at RT. Our results show that during SHI irradiation of InP both damage formation and damage annealing occur simultaneously. Whether the first or the second one plays a more important role depends on the SHI mass and energy

  5. An overview of road damages due to flooding: Case study in Kedah state, Malaysia

    Science.gov (United States)

    Ismail, Muhd Shahril Nizam; Ghani, Abdul Naser Abdul

    2017-10-01

    Flooding occurs frequently in many countries including Malaysia. Floods in Malaysia are usually due to heavy and prolonged rainfall, uncontrolled development, and drainage systems that are not being monitored. Road damage due to flooding event can cause huge expenditures for the post-flooding rehabilitation and maintenance. The required maintenance and rehabilitation could upset the original life cycle cost estimations. Data on road statistics were obtained from the Highway Planning Division, Ministry of Works Malaysia and data on flooding was collected from the Department of Irrigation and Drainage Malaysia for events between 2012 and 2015. The pilot sites were selected based on its historical cases of floods that caused road damages in Kedah. The pilot site indicated that the impact of flooding on road infrastructures systems can be used to plan better road design and maintenances. It also revealed that it costs more than RM 1 million to reinstate roads damaged by flooding in a typical district annually.

  6. Evaluation of environmental damage due to atmospheric pollution caused by power economy

    International Nuclear Information System (INIS)

    Burneikis, J.; Shtreimikiene, D.

    1996-01-01

    Methods to evaluate the environmental damage due to atmospheric pollution caused by power economy are presented. The products of burning fossil fuel (CO 2 , SO 2 , NO x and ashes) make the bulk of the pollutants that are being discharged into the atmosphere. To evaluate the damage caused by these pollutants an empirical method is suggested. The direct and analytical methods are used as a basis in collecting data for the empirical evaluation. All the three methods are described and empirical formulas suggested for calculating environmental damage due to burning fossil fuel in thermal power stations. The authors prove the necessity to change the present system of environmental taxes in Lithuania, which are purely symbolic. (author). 8 refs., 9 tabs

  7. Assessment of damage to the desert surfaces of Kuwait due to the Gulf War

    International Nuclear Information System (INIS)

    El-Baz, F.; Al-Ajmi, D.

    1993-01-01

    This is a preliminary report on a joint research project by Boston University and the Kuwait Institute for Scientific Research that commenced in April 1992. The project aim is to establish the extent and nature of environmental damage to the desert surface and coastal zone of Kuwait due to the Gulf War and its aftermath. Change detection image enhancement techniques were employed to enhance environmental change by comparison of Landsat Thematic Mapper images obtained before the wars and after the cessation of the oil and well fires. Higher resolution SPOT images were also utilized to evaluate the nature of the environmental damage to specific areas. The most prominent changes were due to: (1) the deposition of oil and course-grained soot on the desert surface as a result of ''oil rain'' from the plume that emanated from the oil well fires; (2) the formation of hundreds of oil lakes, from oil seepage at the damaged oil well heads; (3) the mobilization of sand and dust and (4) the pollution of segments of the coastal zone by the deposition of oil from several oil spills. Interpretation of satellite image data are checked in the field to confirm the observations, and to assess the nature of the damage. Final results will be utilized in establishing the needs for remedial action to counteract the harmful effects of the various types of damage to the environment of Kuwait

  8. The Clinical Test of Nano gold Cosmetic for Recovering Skin Damage Due to Chemicals: Special Case

    Science.gov (United States)

    Taufikurohmah, T.; Wardana, A. P.; Tjahjani, S.; Sanjaya, I. G. M.; Baktir, A.; Syahrani, A.

    2018-01-01

    Manufacturing of Nano gold cosmetics was done at PT. Gizi Indonesia. Clinical trials to cosmetics data supported that cosmetics are able to treat skin health which has been reported partially. For special cases, the recovery process of facial skin damage should also receive attention including cases of facial skin damage caused by chemicals such as phenol, HCl, aqua regia or other harsh chemicals. The problem determined whether the Nano gold is able to recover skin damage due to the harsh chemicals. This clinical trial data on the forms of early skin damage caused by phenol was delivered in the forms of facial photos patients. The recovery progress of facial skin condition was obtained every week for two months. The data included the forms of widespread wounds during the recovery process. This statement supported by anova statistical analysis of the widespread wound changing every week for 8 times. The conclusion is skin damage due to Phenol impregnation can be recovered with the use of Nano gold cosmetics for 8 weeks. This results support the manufacturing of Nano gold cosmetics for the needs of society. It also suggest that Nano gold material can be used for medicine manufacturing in the future.

  9. Association between PM2.5 and primary care visits due to asthma attack in Japan: relation to Beijing's air pollution episode in January 2013.

    Science.gov (United States)

    Yamazaki, Shin; Shima, Masayuki; Yoda, Yoshiko; Oka, Katsumi; Kurosaka, Fumitake; Shimizu, Shigeta; Takahashi, Hironobu; Nakatani, Yuji; Nishikawa, Jittoku; Fujiwara, Katsuhiko; Mizumori, Yasuyuki; Mogami, Akira; Yamada, Taku; Yamamoto, Nobuharu

    2014-03-01

    In January 2013, extremely high concentrations of fine particles (PM2.5) were observed around Beijing, China. In Japan, the health effects of transboundary air pollution have been a matter of concern. We examined the association between the levels of outdoor PM2.5 and other air pollutants with primary care visits (PCVs) at night due to asthma attack in Himeji City, western Japan. A case-crossover study was conducted in a primary care clinic in Himeji City, Japan, involving 112 subjects aged 0-80 years who visited the clinic due to an asthma attack between 9 p.m. and 6 a.m. during the period January-March, 2013. Daily concentrations of particulate matter, ozone, nitrogen dioxide, and some meteorological elements were measured, and a conditional logistic regression model was used to estimate the odds ratios (OR) of PCVs per unit increment in air pollutants or meteorological elements. Of the 112 subjects, 76 (68 %) were aged asthma attack at night. A positive relation between ozone and PCVs due to asthma attack was detected. The OR per 10 ppb increment in daily mean ozone the day before the visit was 2.31 (95 % confidence interval 1.16-4.61). These findings do not support an association between daily mean concentration of PM2.5 and PCVs at night. However, we did find evidence suggesting that ozone is associated with PCVs.

  10. Numerical assessment of wind turbine blade damage due to contact/impact with tower during installation

    Science.gov (United States)

    Shankar Verma, Amrit; Petter Vedvik, Nils; Gao, Zhen

    2017-12-01

    The use of floating crane vessel for installation of offshore wind turbine blades presents a great challenge in terms of its random motions and is likely to increase the probability of the blade hitting the preassembled tower during lifting operation. To evaluate the consequences of such scenarios and to determine the allowable motions or sea states for such operations, it is very important to understand the damage development in the blade due to impact. The present paper employs the application of high fidelity finite element method to investigate the damage behavior in the blade when the leading edge of the blade hits the tower. A nonlinear time domain structural analysis using ABAQUS was conducted on the DTU 10 MW reference blade model which is based on shell elements. Damage assessment along with the nature of evolution of various energies is examined and presented for two different impact velocities with modified layup stacking sequence at the contact region.

  11. New perspectives on the damage estimation for buried pipeline systems due to seismic wave propagation

    Energy Technology Data Exchange (ETDEWEB)

    Pineda Porras, Omar Andrey [Los Alamos National Laboratory

    2009-01-01

    Over the past three decades, seismic fragility fonnulations for buried pipeline systems have been developed following two tendencies: the use of earthquake damage scenarios from several pipeline systems to create general pipeline fragility functions; and, the use of damage scenarios from one pipeline system to create specific-system fragility functions. In this paper, the advantages and disadvantages of both tendencies are analyzed and discussed; in addition, a summary of what can be considered the new challenges for developing better pipeline seismic fragility formulations is discussed. The most important conclusion of this paper states that more efforts are needed to improve the estimation of transient ground strain -the main cause of pipeline damage due to seismic wave propagation; with relevant advances in that research field, new and better fragility formulations could be developed.

  12. Nonstructural damages of reinforced concrete buildings due to 2015 Ranau earthquake

    Science.gov (United States)

    Adiyanto, Mohd Irwan; Majid, Taksiah A.; Nazri, Fadzli Mohamed

    2017-07-01

    On 15th June 2016 a moderate earthquake with magnitude Mw5.9 was occurred in Sabah, Malaysia. Specifically, the epicentre was located at 16 km northwest of Ranau. Less than two days after the first event, a reconnaissance mission took action to investigate the damages on buildings. Since the reinforced concrete buildings in Ranau were designed based on gravity and wind load only, a lot of minor to severe damages was occurred. This paper presents the damages on the nonstructural elements of reinforced concrete buildings due to Ranau earthquake. The assessment was conducted via in-situ field investigation covering the visual observation, taking photo, and interview with local resident. Based on in-situ field investigation, there was a lot of damages occurred on the nonstructural elements like the brick walls. Such damages cannot be neglected since it can cause injury and fatality to the victims. Therefore, it can be concluded that the installation of nonstructural elements should be reviewed for the sake of safety.

  13. An investigation on damaged buildings in Ranau due the 2015 Sabah earthquake

    Science.gov (United States)

    Lim, Yang Soh; Tan, Jun Pin; Chiew, Lerk Qing; Chang, Wai Hoe; Lau, Tze Liang

    2017-10-01

    A magnitude 5.9 earthquake struck near Ranau district in Sabah, Malaysia on June 5, 2015. The epicenter was located 14 km from Ranau. Various buildings were damaged by the earthquake. This paper discusses the extent of the destruction to two severely damaged structures in Ranau. An assessment of damaged buildings in Ranau Hospital using microtremor data was conducted after the earthquake event. The building consists of two identical blocks with similar soft-story structural forms. Two microtremor observations were carried out before and after the repair work. The predominant frequencies of the damaged buildings were determined by using the Nakamura's H/V method. Based on the assumption that both identical blocks of building in Ranau Hospital have similar predominant frequencies due to the same structural design and construction quality, results show that B block of Ranau Hospital suffered more damage compared with another block of the building. The predominant frequency of B block is 10% lower than that of A Block. Results obtained are consistent with the observed building performance during the site reconnaissance. The predominant frequency of both buildings measured after the repair work shows 11% to 21% increment, which implies that the lateral stiffness of both buildings has been improved.

  14. Validity of reciprocity rule on mouse skin thermal damage due to CO2 laser irradiation

    Science.gov (United States)

    Parvin, P.; Dehghanpour, H. R.; Moghadam, M. S.; Daneshafrooz, V.

    2013-07-01

    CO2 laser (10.6 μm) is a well-known infrared coherent light source as a tool in surgery. At this wavelength there is a high absorbance coefficient (860 cm-1), because of vibration mode resonance of H2O molecules. Therefore, the majority of the irradiation energy is absorbed in the tissue and the temperature of the tissue rises as a function of power density and laser exposure duration. In this work, the tissue damage caused by CO2 laser (1-10 W, ˜40-400 W cm-2, 0.1-6 s) was measured using 30 mouse skin samples. Skin damage assessment was based on measurements of the depth of cut, mean diameter of the crater and the carbonized layer. The results show that tissue damage as assessed above parameters increased with laser fluence and saturated at 1000 J cm-2. Moreover, the damage effect due to high power density at short duration was not equivalent to that with low power density at longer irradiation time even though the energy delivered was identical. These results indicate the lack of validity of reciprocity (Bunsen-Roscoe) rule for the thermal damage.

  15. Mechanical damage due to corrosion of parts of pump technology and valves of LWR power installations

    International Nuclear Information System (INIS)

    Hron, J.; Krumpl, M.

    1986-01-01

    Two types are described of uneven corrosion of austenitic chromium-nickel steel: pitting and slit corrosion. The occurrence of slit corrosion is typical of parts of pumping technology and valves. The corrosion damage of austenitic chromium-nickel steels spreads as intergranular, transgranular or mixed corrosion. In nuclear power facilities with LWR's, intergranular corrosion is due to chlorides and sulphur compounds while transgranular corrosion is due to the presence of dissolved oxygen and chlorides. In mechanically stressed parts, stress corrosion takes place. The recommended procedures are discussed of reducing the corrosion-mechanical damage of pumping equipment of light water reactors during design, production and assembly. During the service of the equipment, corrosion cracks are detected using nondestructive methods and surface cracks are repaired by grinding and welding. (E.S.)

  16. Damage costs due to automotive air pollution and the influence of street canyons

    International Nuclear Information System (INIS)

    Spadaro, Joseph V.; Rabl, Ari

    2001-01-01

    Using the methodology of the ExternE Project of the European Commission, we have evaluated the damage costs of automotive air pollution by way of two case studies in France: a trip across Paris, and a trip from Paris to Lyon. This methodology involves an analysis of the impact pathways, starting with the emissions (e.g., g/km of particles form tailpipe), followed by local and regional dispersion (e.g., incremental μg/m 3 of particles), calculation of the physical impacts using exposure-response functions (e.g., cases of respiratory hospital admissions), and finally multiplication by unit costs factors (e.g., ε per hospital admission). Damages are aggregated over all affected receptors in Europe. In addition to the local and regional dispersion calculations carried out so far by ExternE, we also consider the increased microscale impacts due to the trapping of pollutants in street canyons, using numerical simulations with the FLUENT software. We have evaluated impacts to human health, agricultural crops and building materials, due to particles, NO x , CO, HC and CO 2 . Health impacts, especially reduced life expectancy, dominate in terms of cost. Damages for older cars (before 1997) range from 2 to 41Euro cents/km, whereas for newer cars (since 1997), the range 1-9 Euro cents/km, and there is continuing progress in reducing the emissions further. In large cities, the particulate emissions of diesel cars lead to the highest damages, exceeding those of gasoline cars by a factor of 7. For cars before 1997 the order of magnitude of the damage costs is comparable to the price of gasoline, and the loss of life expectancy is comparable to that from traffic accidents. (Author)

  17. Efficacy of nebulized fluticasone propionate in adult patients admitted to the emergency department due to bronchial asthma attack.

    Science.gov (United States)

    Starobin, Daniel; Bolotinsky, Ludmila; Or, Jack; Fink, Gershon; Shtoeger, Zev

    2008-01-01

    Locally delivered steroids by inhalers or nebulizers have been shown in small trials to be effective in acute asthma attack, but evidence-based data are insufficient to establish their place as routine management of adult asthma attacks. To determine the efficacy of nebulized compared to systemic steroids in adult asthmatics admitted to the emergency department following an acute attack. Adult asthmatics admitted to the ED were assigned in random consecutive case fashion to one of three protocol groups: group 1--nebulized steroid fluticasone (Flixotide Nebules), group 2--intravenous methylprednisolone, group 3--combined treatment by both routes. Objective and subjective parameters, such as peak expiratory flow, oxygen saturation, heart rate and dyspnea score, were registered before and 2 hours after ED treatment was initiated. Steroids were continued for 1 week following the ED visit according to the protocol arm. Data on hospital admission/discharge rate, ED readmissions in the week after enrollment and other major events related to asthma were registered. Altogether, 73 adult asthmatics were assigned to receive treatment: 24 patients in group 1, 23 in group 2 and 26 in group 3. Mean age was 44.4 +/- 16.8 years (range 17-75 years). Peak expiratory flow and dyspnea score significantly improved in group 1 patients compared with patients in the other groups after 2 hours of ED treatment (P = 0.021 and 0.009, respectively). The discharge rate after ED treatment was significantly higher in groups 1 and 3 than in group 2 (P = 0.05). All 73 patients were alive a week after enrollment. Five patients (20.8%) in the Flixotide treatment arm were hospitalized and required additional systemic steroids. Multivariate analysis of factors affecting hospitalization rate demonstrated that severity of asthma (odds ratio 8.11) and group 2 (OD 4.17) had a negative effect, whereas adherence to chronic anti-asthma therapy (OD 0.49) reduced the hospitalization rate. Our study cohort

  18. Degradation of self-compacting concrete (SCC) due to sulfuric acid attack: Experiment investigation on the effect of high volume fly ash content

    Science.gov (United States)

    Kristiawan, S. A.; Sunarmasto; Tyas, G. P.

    2016-02-01

    Concrete is susceptible to a variety of chemical attacks. In the sulfuric acid environment, concrete is subjected to a combination of sulfuric and acid attack. This research is aimed to investigate the degradation of self-compacting concrete (SCC) due to sulfuric acid attack based on measurement of compressive strength loss and diameter change. Since the proportion of SCC contains higher cement than that of normal concrete, the vulnerability of this concrete to sulfuric acid attack could be reduced by partial replacement of cement with fly ash at high volume level. The effect of high volume fly ash at 50-70% cement replacement levels on the extent of degradation owing to sulfuric acid will be assessed in this study. It can be shown that an increase in the utilization of fly ash to partially replace cement tends to reduce the degradation as confirmed by less compressive strength loss and diameter change. The effect of fly ash to reduce the degradation of SCC is more pronounced at a later age.

  19. Usage of prestressed vertical bolts for retrofitting flat slabs damaged due to punching shear

    Directory of Open Access Journals (Sweden)

    Hamed S. Askar

    2015-09-01

    An experimental investigation with the objective of retrofitting flat slabs damaged due to punching shear using prestressed vertical bolts is presented in this paper. The parameters examined in this study are vertical prestressed bolts with different ratios within the slab thickness, slab thickness and central column size. Through the experimental tests the load carrying capacity, deformation characteristics and the cracking behavior have been investigated. A comparison between the behavior of retrofitted slabs and their references showed that the proposed system of repair is effective and could be used in practice. A comparison between the experimental results and calculated punching failure load based on the formulas adopted by different codes, showed a reasonable agreement.

  20. Computed chest tomography in rats with pulmonary damage due to microembolism

    Energy Technology Data Exchange (ETDEWEB)

    Wegener, T.; Wegenius, G.; Hemmingsson, A.; Jung, B.; Saldeen, T.

    Computed chest tomography was performed in 13 rats with pulmonary damage due to microembolism, caused by injection of thrombin (500 NIH/kg body weight) and tranexamic acid, a fibrinolytic inhibitor (200 mg/kg body weight), and in 9 control rats. The purpose of the investigation was to perform attenuation measurements at two levels of the right lung, each with three regions of interest (anterior, mid and posterior). Alterations in attenuation, compared with controls, were correlated with lung weight. Compared with controls, the attenuation was significantly increased in the anterior and posterior regions at both levels in animals with pulmonary damage, but not in the mid regions. There was a statistically significant correlation between increasing attenuation and increasing lung weight. A significant difference was found between damaged and control lungs regarding the microscopic grade of interstitial oedema, alveolar oedema and fibrin. Histograms of attenuation values in computed tomograms might be of value in detecting alveolar oedema. It is concluded that computed chest tomography is a good method for detection pulmonary oedema at an early stage of experimental microembolism in the rat.

  1. Computed chest tomography in rats with pulmonary damage due to microembolism

    International Nuclear Information System (INIS)

    Wegener, T.; Wegenius, G.; Hemmingsson, A.; Jung, B.; Saldeen, T.; Uppsala Univ.; Uppsala Univ.; Uppsala Univ.

    1986-01-01

    Computed chest tomography was performed in 13 rats with pulmonary damage due to microembolism, caused by injection of thrombin (500 NIH/kg body weight) and tranexamic acid, a fibrinolytic inhibitor (200 mg/kg body weight), and in 9 control rats. The purpose of the investigation was to perform attenuation measurements at two levels of the right lung, each with three regions of interest (anterior, mid and posterior). Alterations in attenuation, compared with controls, were correlated with lung weight. Compared with controls, the attenuation was significantly increased in the anterior and posterior regions at both levels in animals with pulmonary damage, but not in the mid regions. There was a statistically significant correlation between increasing attenuation and increasing lung weight. A significant difference was found between damaged and control lungs regarding the microscopic grade of interstitial oedema, alveolar oedema and fibrin. Histograms of attenuation values in computed tomograms might be of value in detecting alveolar oedema. It is concluded that computed chest tomography is a good method for detection pulmonary oedema at an early stage of experimental microembolism in the rat. (orig.)

  2. Methodology for the assessment of possible damages in low voltage equipment due to lightning surges

    Energy Technology Data Exchange (ETDEWEB)

    Matsuo, Nelson M.; Kagan, Nelson [University of Sao Paulo (USP), SP (Brazil)], Emails: matsuonm@usp.br, nelsonk@pea.usp.br; Domingues, Ivo T. [AES Eletropaulo, SP (Brazil); Jesus, Nelson C. de [AES Sul, Porto Alegre, RS (Brazil); Silva, Marcelo H.I. da [Grupo Rede, Sao Paulo, SP (Brazil); Takauti, Edson H. [Bandeirante, Sao Paulo, SP (Brazil)

    2007-07-01

    This paper deals with the development of a methodology to assess the possibility of equipment damages in low voltage customers due to lightning surges. The main objective is to incorporate this methodology in a computation system that supports distribution companies to determine the possible causes of equipment damages claimed by customers and to decide whether the claims are to be reimbursed or not. The proposed methodology determines whether a specific customer could be affected by a lightning strike according to his/her location and to the lightning main parameters, by using data from a lightning detection system and from the specific equipment surge withstand capability. A specific study using ATP (Alternative Transients Program) was carried out to assess the propagation of lightning surges in electric power distribution systems and their impact over low voltage customers. On the other hand, the withstand capability of the main household appliances was determined by a series of tests carried out in the University's power quality laboratory. The paper details the modeling used for simulation, such as network configuration, grounding points, and modelling of insulator flashover, distribution transformer, low voltage loads. It also presents some results regarding the evaluation of over voltages in low voltage customers installations. A practical method is proposed for assessing the possibility of equipment damage and describes how the existing uncertainties were handled. Also, some issues regarding the withstand capability of electric household appliances to lightning surges are discussed and some results of the laboratory tests are presented. (author)

  3. Estimation of health damage due to emission of air pollutants by cars: the canyon effect

    Energy Technology Data Exchange (ETDEWEB)

    Spadaro, J.V. [Ecole des Mines, Centre d' Energetique, Paris, 75 (France); Rabl, A.

    1999-07-01

    Since current epidemiological evidence suggests that air pollution has harmful effects even at typical ambient concentrations and the dispersion is significant over hundreds to thousands of km, the estimation of total health damage involves consideration of local and regional effects. In recent years, several estimates have been published of health damage due to air pollution from cars, in particular by Delucchi et al of UC Davis and by the ExternE Project of the European Commission. To capture the geographic extent of pollutant dispersion, local and regional models have been used in combination. The present paper addresses a potentially significant contribution of the total damage, not yet taken into account in these studies: the increased concentration of pollutants inside urban street canyons. This canyon effect is appreciable only for primary pollutants, the time constants for the formation of secondary pollutants being long compared to the residence time in the canyon. We assumed linearity of incremental health impact with incremental concentration, in view of the lack of epidemiological evidence for no-effect thresholds or significant deviations from linearity at typical ambient concentrations; therefore, only long term average concentrations matter. We use the FLUENT software to model the dispersion inside a street canyon for a wide range of rectangular geometries and wind velocities. Our results suggest that the canyon effect is of marginal significance for total damages, the contribution of the canyon effect being roughly 10 to 20% of the total. The relative importance of the canyon effect is, of course, highly variable with local conditions; it could be much smaller but it is unlikely to add more than 100% to the flat terrain estimate. (Author)

  4. Assessment of damage from reduction of expected lifespan due to cancer

    Directory of Open Access Journals (Sweden)

    Boris Alengordovich Korobitsyn

    2013-09-01

    Full Text Available This paper presents the theoretical and methodological approaches to the assessment of damage from premature mortality and reduction of life expectancy due to various reasons. The concepts measuring the price of a human life are analyzed: the evaluation from the standpoint of the theory of human capital; indirect estimation taking into account non-monetary social costs; evaluation of individuals’ willingness to pay for the elimination of the risk of death; estimation based on the determination of insurance premiums and compensations under court decision; evaluation of the social investments, aimed to reduce the risk of premature mortality of the individual. The following indexes were calculated for all subordinate entities of the Russian Federation: reduction of life expectancy, lost years of potential life in the working age, and gross regional product lost due to the reduction of years of potential life in the working-age population as a result of cancer

  5. The assessment of damages due to climate change in a situation of uncertainty: the contribution of adaptation cost modelling

    International Nuclear Information System (INIS)

    Dumas, P.

    2006-01-01

    The aim of this research is to introduce new elements for the assessment of damages due to climate changes within the frame of compact models aiding the decision. Two types of methodologies are used: sequential optimisation stochastic models and simulation stochastic models using optimal assessment methods. The author first defines the damages, characterizes their different categories, and reviews the existing assessments. Notably, he makes the distinction between damages due to climate change and damages due to its rate. Then, he presents the different models used in this study, the numerical solutions, and gives a rough estimate of the importance of the considered phenomena. By introducing a new category of capital in an optimal growth model, he tries to establish a framework allowing the representation of adaptation and of its costs. He introduces inertia in macro-economical evolutions, climatic variability, detection of climate change and damages due to climate hazards

  6. Vulnerability Assessment of Housing Damage in the Philippines Due to an Increase Increase in Typhoon Intensity

    Science.gov (United States)

    Esteban, Miguel; Stromberg, Per; Gasparatos, Alexandros

    2010-05-01

    south is almost unaffected due to its proximity to the equator. The estimation of the damage shows that the number of houses partially or totally destroyed could increase by up to 58% in certain regions by 2085. The historical damage data shows how the adaptive capacity values of each region given by Yusuf and Herminia (2009) are crucial to the amount of damage recorded. These authors defined this parameter as the degree to which adjustments in practices, processes or structures can moderate or offset potential damage or take advantage of opportunities from climate change. This clearly highlights the importance of mitigation measures to increase the resilience of communities in the future. This is a significant conclusion of the present paper, independent of whether tropical cyclones increase in intensity or not.

  7. Damage to apparel layers and underlying tissue due to hand-gun bullets.

    Science.gov (United States)

    Carr, Debra; Kieser, Jules; Mabbott, Alexander; Mott, Charlotte; Champion, Stephen; Girvan, Elizabeth

    2014-01-01

    Ballistic damage to the clothing of victims of gunshot wounds to the chest can provide useful forensic evidence. Anyone shot in the torso will usually be wearing clothing which will be damaged by the penetrating impact event and can reportedly be the source of some of the debris in the wound. Minimal research has previously been reported regarding the effect of bullets on apparel fabrics and underlying tissue. This paper examines the effect of ammunition (9 mm full metal jacket [FMJ] DM11 A1B2, 8.0 g; and soft point flat nose Remington R357M3, 10.2 g) on clothing layers that cover the torso (T-shirt, T-shirt plus hoodie, T-shirt plus denim jacket) and underlying structures represented by porcine thoracic wall (skin, underlying tissue, ribs). Impacts were recorded using a Phantom V12 high speed camera. Ejected bone debris was collected before wound tracts were dissected and measured; any debris found was recovered for further analysis. Size and mass of bony debris was recorded; fibre debris recovered from the wound and impact damage to fabrics were imaged using scanning electron microscopy (SEM). Remington R357M3 ammunition was characteristically associated with stellate fabric damage; individual fibres were less likely to show mushrooming. In contrast, 9 mm FMJ ammunition resulted in punch-out damage to fabric layers, with mushrooming of individual fibres being more common. Entry wound sizes were similar for both types of ammunition and smaller than the diameter of the bullet that caused them. In this work, the Remington R357M3 ammunition resulted in larger exit wounds due to the bullet construction which mushroomed. That fabric coverings did not affect the amount of bony debris produced is interesting, particularly given there was some evidence that apparel layers affected the size of the wound. Recent work has suggested that denim (representative of jeans) can exacerbate wounding caused by high-velocity bullet impacts to the thigh when the bullet does not

  8. The influence of alkali-free and alkaline shotcrete accelerators within cement systems Influence of the temperature on the sulfate attack mechanisms and damage

    International Nuclear Information System (INIS)

    Paglia, C.; Wombacher, F.; Boehni, H.

    2003-01-01

    The resistance to sulfate attack of mixtures accelerated with alkali-free and alkaline accelerators was found to be mainly influenced by the Al 3+ and SO 4 2- added via the admixtures. Microstructural observations showed decalcification and disintegration of the CSH gel, which acted as an additional Ca 2+ supplier as compared to the CH for ettringite formation. The CSH decalcification was mainly observed with a homogeneous distribution of the alkali-free admixture. The disintegration of the CSH gel increased the porosity and allowed more sulfate solution to penetrate into the specimens. This process promoted the swelling of the specimens and directly contributed to the expansion, explaining the lack of a direct relationship between the ettringite formation and the expansion. Moreover, the CSH gel disintegration, typical for MgSO 4 attack, also occurred with Na 2 SO 4 solutions and depending on the aluminate-sulfate distribution and the extent of the CSH gel disintegration, different damage types were detected. At higher temperatures (65 deg. C) the damage was mainly controlled by the growth, the rearrangement and the thermal stability of ettringite

  9. Biomechanical evaluation of potential damage to hernia repair materials due to fixation with helical titanium tacks.

    Science.gov (United States)

    Lerdsirisopon, Sopon; Frisella, Margaret M; Matthews, Brent D; Deeken, Corey R

    2011-12-01

    This study aimed to determine whether the strength and extensibility of hernia repair materials are negatively influenced by the application of helical titanium tacks. This study evaluated 14 meshes including bare polypropylene, macroporous polytetrafluoroethylene, absorbable barrier, partially absorbable mesh, and expanded polytetrafluoroethylene materials. Each mesh provided 15 specimens, which were prepared in 7.5 × 7.5-cm squares. Of these, 5 "undamaged" specimens were subjected to ball-burst testing to determine their biomechanical properties before application of helical titanium tacks (ProTack). To 10 "damaged" specimens 7 tacks were applied 1 cm apart in a 3.5-cm-diameter circle using a tacking force of 25 to 28 N. The tacks were removed from five of the specimens before ball-burst testing and left intact in the remaining five specimens. The application of tacks had no effect on the tensile strength of Dualmesh, ProLite Ultra, Infinit, Ultrapro, C-QUR Lite (6 in.). Most of the meshes did not exhibit significantly different tensile strengths between removal of tacks and tacks left intact. Exceptions included C-QUR, Prolene, Ultrapro, and Bard Soft Mesh, which were weaker with removal of tacks than with tacks left intact during the test. Damage due to the application of helical titanium tacks also caused increased strain at a stress of 16 N/cm for all the meshes except C-QUR Lite (>6 in.) and Physiomesh. Many of the meshes evaluated in this study exhibited damage in the form of reduced tensile strength and increased extensibility after the application of tacks compared with the corresponding "undamaged" meshes. Meshes with smaller interstices and larger filaments were influenced negatively by the application of helical titanium tacks, whereas mesh designs with larger interstices and smaller filaments tended to maintain their baseline mechanical properties.

  10. Unexpected ICD pulse generator failure due to electronic circuit damage caused by electrical overstress.

    Science.gov (United States)

    Hauser, R G; Hayes, D L; Almquist, A K; Epstein, A E; Parsonnet, V; Tyers, G F; Vlay, S C; Schoenfeld, M H

    2001-07-01

    Because it is a lifesaving device, the unexpected failure of an ICD can be catastrophic. We report ICD electronic circuit failure due to electrical overstress damage (EOS) to the high voltage hybird circuit and other electronic components in a series of ICD pulse generator models. Data were obtained from the Multicenter Registry of Pacemaker and ICD Pacemaker and Lead Failures, and from the manufactures' adverse event reports, that were in the FDA's Manufacturer and User Facility Device Experience (MAUDE) database. Of 16 nonbattery Guidant/CPI ICD pulse generator failures reported to the registry, 6 (38%) have been confirmed by the manufacturer to be EOS related, and Guidant/CPI has reported 273 such failures to the FDA as of 12/29/00. The signs of failure included loss of telemetry and inability to deliver therapy, and some patients have experienced serious adverse events. Hybrid circuit damage may have occurred during capacitor charging or reform, and the majority appears to have happened during normal ICD function. While the incidence of this problem is unknown, a management strategy should be adopted that includes routine follow-up every 3 months and device evaluation after a shock or exposure to external defibrillation or electrosurgical devices. This study suggests that additional data are needed to determine the incidence of this problem, and that our present methods for monitoring the performance of ICD's following market release are inadequate.

  11. Analysis and evaluation of atom level composition variation and property change due to materials irradiation damage

    International Nuclear Information System (INIS)

    Furuya, Kazuo; Takeguchi, Masaki; Mitsuishi, Kazuki; Song Menhi; Saito, Tetsuya

    2000-01-01

    This study aims at general elucidation of atom level composition variation due to radiation damage and property change accompanied with this under intending to stressing application of the in-situ analysis and evaluation apparatus on material radiation damage. Then, by using the electron energy loss spectroscopy (EELS) capable of showing a power in composition analysis at microscopic region, measurement of EELS on crystal structure change after heat treatment of Xe precipitation was carried out under parallel of its high resolution observation. As a result, a precipitation with less than 30 nm in diameter was observed on a specimen inserted at 473 K. Xe precipitates in crystalline state began to change at 623 K, to be perfectly gassy state at 773 K. In an energy filter image (EFI) using low loss of Xe, distribution of crystalline and non-crystalline Xe was observed. In EELS, peaks at 14.6 and 15.3 eV were observed in 300 and 773 K, respectively, which were thought to be plasmon. And, difference of peak position at the core loss was thought to reflex difference of Xe state at 300 and 773 K. (G.K.)

  12. Mechanical Properties and Elastic Constants Due to Damage Accumulation and Amorphization in SiC

    International Nuclear Information System (INIS)

    Gao, Fei; Weber, William J.

    2004-01-01

    Damage accumulation due to cascade overlap, which was simulated previously, has been used to study the changes of elastic constants, bulk and elastic moduli as a function of dose. These mechanical properties generally decrease with increasing dose, and the rapid decrease at low-dose level indicates that point defects and small clusters play an important role in the changes of elastic constants rather than topological disorder. The internal strain relaxation has no effect on the elastic constants, C11 and C12, in perfect SiC, but it has a significant influence on all elastic constants calculated in damaged SiC. The elastic constants in the cascade-amorphized (CA) SiC decrease about 19%, 29% and 46% for C11, C12 and C44, respectively. The bulk modulus decrease 23% and the elastic modulus decreases 29%, which is consistent with experimental measurements. The stability of both the perfect SiC and CA-SiC under hydrostatic tension has been also investigated. All mechanical properties in the CA-SiC exhibit behavior similar to that in perfect SiC, but the critical stress at which the CA-SiC becomes structurally unstable is one order of magnitude smaller than that for perfect SiC

  13. Defective motion processing in children with cerebral visual impairment due to periventricular white matter damage.

    Science.gov (United States)

    Weinstein, Joel M; Gilmore, Rick O; Shaikh, Sumera M; Kunselman, Allen R; Trescher, William V; Tashima, Lauren M; Boltz, Marianne E; McAuliffe, Matthew B; Cheung, Albert; Fesi, Jeremy D

    2012-07-01

    We sought to characterize visual motion processing in children with cerebral visual impairment (CVI) due to periventricular white matter damage caused by either hydrocephalus (eight individuals) or periventricular leukomalacia (PVL) associated with prematurity (11 individuals). Using steady-state visually evoked potentials (ssVEP), we measured cortical activity related to motion processing for two distinct types of visual stimuli: 'local' motion patterns thought to activate mainly primary visual cortex (V1), and 'global' or coherent patterns thought to activate higher cortical visual association areas (V3, V5, etc.). We studied three groups of children: (1) 19 children with CVI (mean age 9y 6mo [SD 3y 8mo]; 9 male; 10 female); (2) 40 neurologically and visually normal comparison children (mean age 9y 6mo [SD 3y 1mo]; 18 male; 22 female); and (3) because strabismus and amblyopia are common in children with CVI, a group of 41 children without neurological problems who had visual deficits due to amblyopia and/or strabismus (mean age 7y 8mo [SD 2y 8mo]; 28 male; 13 female). We found that the processing of global as opposed to local motion was preferentially impaired in individuals with CVI, especially for slower target velocities (p=0.028). Motion processing is impaired in children with CVI. ssVEP may provide useful and objective information about the development of higher visual function in children at risk for CVI. © The Authors. Journal compilation © Mac Keith Press 2011.

  14. Cooperating attackers in neural cryptography.

    Science.gov (United States)

    Shacham, Lanir N; Klein, Einat; Mislovaty, Rachel; Kanter, Ido; Kinzel, Wolfgang

    2004-06-01

    A successful attack strategy in neural cryptography is presented. The neural cryptosystem, based on synchronization of neural networks by mutual learning, has been recently shown to be secure under different attack strategies. The success of the advanced attacker presented here, called the "majority-flipping attacker," does not decay with the parameters of the model. This attacker's outstanding success is due to its using a group of attackers which cooperate throughout the synchronization process, unlike any other attack strategy known. An analytical description of this attack is also presented, and fits the results of simulations.

  15. Multi-factor evaluation indicator method for the risk assessment of atmospheric and oceanic hazard group due to the attack of tropical cyclones

    Science.gov (United States)

    Qi, Peng; Du, Mei

    2018-06-01

    China's southeast coastal areas frequently suffer from storm surge due to the attack of tropical cyclones (TCs) every year. Hazards induced by TCs are complex, such as strong wind, huge waves, storm surge, heavy rain, floods, and so on. The atmospheric and oceanic hazards cause serious disasters and substantial economic losses. This paper, from the perspective of hazard group, sets up a multi-factor evaluation method for the risk assessment of TC hazards using historical extreme data of concerned atmospheric and oceanic elements. Based on the natural hazard dynamic process, the multi-factor indicator system is composed of nine natural hazard factors representing intensity and frequency, respectively. Contributing to the indicator system, in order of importance, are maximum wind speed by TCs, attack frequency of TCs, maximum surge height, maximum wave height, frequency of gusts ≥ Scale 8, rainstorm intensity, maximum tidal range, rainstorm frequency, then sea-level rising rate. The first four factors are the most important, whose weights exceed 10% in the indicator system. With normalization processing, all the single-hazard factors are superposed by multiplying their weights to generate a superposed TC hazard. The multi-factor evaluation indicator method was applied to the risk assessment of typhoon-induced atmospheric and oceanic hazard group in typhoon-prone southeast coastal cities of China.

  16. Integrity management of Brazil-Bolivia gas pipeline to reduce risks due third party damage

    Energy Technology Data Exchange (ETDEWEB)

    Vasconcellos, Carlos Renato Aragonez de; Monte, Oswaldo [PETROBRAS, Rio de Janeiro, RJ (Brazil); Colen, Eustaquio; Cunha, Roberto de Souza; Oliveira, Hudson Regis de [Transportadora Brasileira Gasoduto Bolivia-Brasil, S.A., Rio de Janeiro, RJ (Brazil); Lima, Rogerio de Souza [RSL Consultoria Geoprojetos (Brazil); Schultz Neto, Walter [Milton Braga Assessoria Tecnica (Brazil)

    2005-07-01

    The Bolivia-Brazil Natural Gas Pipeline has 2.600 kilometers from Rio Grande City in Bolivia to Canoas City, in the south of Brazil. The right-of-way crosses a lot of types of topography and areas subjected to various kinds of anthropological actions, like areas in class locations 3, locals under agricultural activities, forests and minerals explorations, and near constructions of highway and railway, industrial constructions, new pipelines in the same right-of -way, channels, dams, that requires special projects to avoid that the gas pipeline could be subject to strengths that were not consider in the original design. The aim of this paper is to present the jobs developed by TBG during seven years of gas pipeline operations, as public awareness program, procedures to design, construct and inspect specials constructions along and near the right-of -way, control of mineral and forest explorations, monitoring and controlling of excavations on the right-of-way to install new pipelines and optical cables, to reduce risks of gas pipeline damage due third party, as a component of TBG' Managing Integrity Gas Pipeline Program. (author)

  17. Parent material and weldments degradation on SASOL reduction reactors due to combined effect of thermal fatigue, vibration and hydrogen attack

    International Nuclear Information System (INIS)

    Borla, Jan Z.

    2002-01-01

    All six installed reduction reactors showed the same failure pattern, which can be attributed to inadequate original design, material degradation due to service conditions and improper maintenance activities. Service is typically low frequency fatigue load conditions with changes of pressure, temperature and batch load. All revealed defects severely affected the integrity of the pressure envelope and vessels were classified for major repair work with subsequent in situ monitoring program. The justification for such extensive and costly repair required a positive evaluation of the current condition of equipment. After complete study, a report was prepared which included the fitness for purpose evaluation, remaining life assessment and recommendation for future field inspections. All reactors were found to be suitable for repair. Within the scope of repair a number of critical elements were redesigned and replaced. The repair was successful and all reactors were put back into operation. Unique expertise was obtained regarding setting the parameters of dehydrogenation in reference to the heavy wall items. Taking replicas and surface sampling appeared to be very reliable and simple tools in monitoring the condition of pressure envelope. For the purpose of future inspection shutdowns specific inspection requirements were put in place to ensure continuous monitoring of the vessel integrity

  18. Cerebral blood flow and CO2 reactivity in transient ischemic attacks: comparison between TIAs due to the ICA occlusion and ICA mild stenosis

    International Nuclear Information System (INIS)

    Tsuda, Y.; Kimura, K.; Yoneda, S.; Etani, H.; Asai, T.; Nakamura, M.; Abe, H.

    1983-01-01

    Hemispheric mean cerebral blood flow (CBF), together with its CO2 reactivity in response to hyperventilation, was investigated in 18 patients with transient ischemic attacks (TIAs) by intraarterial 133Xe injection method in a subacute-chronic stage of the clinical course. In 8 patients, the lesion responsible for symptoms was regarded as unilateral internal carotid artery (ICA) occlusion, and in 10 patients, it was regarded as unilateral ICA mild stenosis (less than 50% stenosis in diameter). Resting flow values were significantly decreased in the affected hemisphere of TIA due to the ICA occlusion as compared with the unaffected hemisphere of the same patient, regarded as the relative control. It was not decreased in the affected hemisphere of TIA due to the ICA mild stenosis as compared with the control. With respect to the responsiveness of CBF to changes in PaCO2, it was preserved in both TIAs, due to the ICA occlusion and ICA mild stenosis. Vasoparalysis was not observed in either types of TIAs in the subacute-chronic stage. However, in the relationship of blood pressure and CO2 reactivity, expressed as delta CBF(%)/delta PaCO2, pressure-dependent CO2 reactivity as a group was observed with significance in 8 cases of TIA due to the ICA occlusion, while no such relationship was noted in 10 cases of TIA due to the ICA mild stenosis. Moreover, clinical features were different between TIAs due to the ICA occlusion and ICA mild stenosis, i.e., more typical, repeatable TIA (6.3 +/- 3.7 times) with shorter duration (less than 30 minutes) was observed in TIAs due to the ICA mild stenosis, while more prolonged, less repeatable TIA (2.4 +/- 1.4 times) was observed in TIAs due to fixed obstruction of the ICA. From these observations, two different possible mechanisms as to the pathogenesis of TIA might be expected

  19. Exposure to air pollution and meteorological factors associated with children's primary care visits at night due to asthma attack: case-crossover design for 3-year pooled patients.

    Science.gov (United States)

    Yamazaki, Shin; Shima, Masayuki; Yoda, Yoshiko; Oka, Katsumi; Kurosaka, Fumitake; Shimizu, Shigeta; Takahashi, Hironobu; Nakatani, Yuji; Nishikawa, Jittoku; Fujiwara, Katsuhiko; Mizumori, Yasuyuki; Mogami, Akira; Yamada, Taku; Yamamoto, Nobuharu

    2015-05-03

    We examined the association of outdoor air pollution and meteorological parameters with primary care visits (PCVs) at night due to asthma attack. A case-crossover study was conducted in a primary care clinic in Himeji City, Japan. Participants were 1447 children aged 0-14 years who visited the clinic with an asthma attack from April 2010 until March 2013. Daily concentrations of air pollutants and meteorological parameters were measured. PCVs at night due to asthma attack. A conditional logistic regression model was used to estimate ORs of PCVs per unit increment of air pollutants or meteorological parameters (the per-unit increments of particulate matter with an aerodynamic diameter ≤2.5 µm (PM₂.₅) and ozone were 10 μg/m(3) and 10 ppb, respectively). Analyses took into consideration the effects of seasonality. We noted an association between PCVs and daily ozone levels on the day before a PCV (OR=1.17; 95% CI 1.01 to 1.35; p=0.04), as well as between PCVs and 3-day mean ozone levels before a PCV (OR=1.29; 95% CI 1.00 to 1.46; p=0.04), from April until June. We also observed an association between PCVs and daily PM₂.₅ levels on the day before a PCV from December until March (OR=1.16; 95% CI 1.01 to 1.33; p=0.05). Meteorological parameters, such as hours of sunshine from September until November, atmospheric pressure from April until June, and temperature from April until August, were also found to be associated with PCVs. The findings in the present study supported an association between ozone and PCVs and suggest that certain meteorological items may be associated with PCVs. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.

  20. Damages to masonry due to interaction(s) between mortar and brick

    NARCIS (Netherlands)

    Klugt, L.J.A.R. van der

    1995-01-01

    Masonry consists of brick and mortar. Next to the laying mortar there can be a separate pointing mortar as well. Each of these components can suffer damage. Such damages, of course, have to do with the properties of the components and with the agressiveness of the environment. However, next to their

  1. Environmental Impacts to Residual Stand Damage due to Logging Operations in Hyrcanian Forest

    Directory of Open Access Journals (Sweden)

    Meghdad JOURGHOLAMI

    2012-08-01

    Full Text Available The development of harvesting systems aims to provide physically feasible, economically viable, and environmentally sound solutions. Residual stand-damage data have been collected from a mixed broadleaved stand in Kheyrud area in Hyrcanian forest in the northern of Iran. After the harvesting operations, for all trees, damage to the bole, roots, extent of the damage, wounding patterns, size and distribution was assessed using stratified systematic sampling with a random start and fixed area plots. Results show that wounding occurred on 16.4% of the remaining trees, but the severity of wounding varied significantly by species. Forty-six percent of wounding for all species combined was considered as small size. The greatest average amount of damage, to a bole, occurred along the first 1m up from the ground and also within 3m of the skid trail centerline (86.4%. Gouges were present on 79% of all scars. The stratification of the study unit would effectively improve accuracy of stand damage surveys. Selection of the appropriate method for damage reduction to trees adjacent skid trails was crucial. According to the results, skidding damage cannot be completely avoided in practice. We suggest that the education and the entertainment of the foresters and workers in forest would be enhanced and the injuries could be explained before the harvesting to the workers. In such a way the damages would be less in the future.

  2. Environmental problems associated with blasting in mines: public apprehensions of damage due to blast vibrations - case studies

    Energy Technology Data Exchange (ETDEWEB)

    Padhi, S.N. [DGMS, Bhubaneswar (India)

    1994-12-31

    Blast vibrations may be felt in intensities as small as 1/100 of that required to cause any damage to structures. Therefore, the public response and thus complaints regarding damages are often imaginary. The paper deals with three case studies, involving alleged damage from blasting in surface and underground coal mines where public litigations and agitations resulted due to such apprehensions. The paper is written in simple technical language as the situations warranted that the blast vibration studies should be understood by the general public. 7 tabs.

  3. DNA damage in human lymphocytes due to synergistic interaction between ionizing radiation and pesticide

    International Nuclear Information System (INIS)

    Kim, J. K.; Lee, K. H.; Lee, B. H.; Chun, K. J.

    2001-01-01

    Biological risks may arise from the possibility of the synergistic interaction between harmful factors such as ionizing radiation and pesticide. The effect of pesticide on radiation-induced DNA damage in human in human blood lymphocytes was evaluated by the single cell gel electrophoresis (SCGE) assay. The lymphocytes, with or without pretreatment of the pesticide, were exposed to 2.0 Gy of gamma ray. Significantly increased tail moment, which was a marker of DNA strand breaks in SCGE assay, showed an excellent dose-response relationship. The present study confirms that the pesticide has the cytotoxic effect on lymphocytes and that it interacts synergistically with ionizing radiationon DNA damage, as well

  4. Damage reconstruction due to impact of high-energetic particles on Malaysia Airlines flight MH17 (U)

    NARCIS (Netherlands)

    2015-01-01

    The Dutch Safety Board (DSB) investigates the crash of Malaysia Airlines flight MH17 which occurred on Thursday July 17, 2014 in the Donetsk region (Ukraine). The DSB wants to provide a clear picture of the cause of the crash. A possible cause is fatal damage to the aircraft due to detonation of the

  5. Measures to prevent concrete damage due to alkali-silica reaction in the Netherlands: Current state-of-affairs

    NARCIS (Netherlands)

    Heijnen, W.M.M.; Larbi, J.A.

    1999-01-01

    In CUR-Recommendation 38, various vital measures that need to be taken during design of new concrete-mixtures in order to prevent damage due to ASR in the concrete have been outlined. The most important of these measures are: • the use of blast furnace slag cement (with a high slag content: 50 % by

  6. Adverse effects of the antimalaria drug, mefloquine: due to primary liver damage with secondary thyroid involvement?

    Directory of Open Access Journals (Sweden)

    Herxheimer Andrew

    2002-03-01

    Full Text Available Abstract Background Mefloquine is a clinically important antimalaria drug, which is often not well tolerated. We critically reviewed 516 published case reports of mefloquine adverse effects, to clarify the phenomenology of the harms associated with mefloquine, and to make recommendations for safer prescribing. Presentation We postulate that many of the adverse effects of mefloquine are a post-hepatic syndrome caused by primary liver damage. In some users we believe that symptomatic thyroid disturbance occurs, either independently or as a secondary consequence of the hepatocellular injury. The mefloquine syndrome presents in a variety of ways including headache, gastrointestinal disturbances, nervousness, fatigue, disorders of sleep, mood, memory and concentration, and occasionally frank psychosis. Previous liver or thyroid disease, and concurrent insults to the liver (such as from alcohol, dehydration, an oral contraceptive pill, recreational drugs, and other liver-damaging drugs may be related to the development of severe or prolonged adverse reactions to mefloquine. Implications We believe that people with active liver or thyroid disease should not take mefloquine, whereas those with fully resolved neuropsychiatric illness may do so safely. Mefloquine users should avoid alcohol, recreational drugs, hormonal contraception and co-medications known to cause liver damage or thyroid damage. With these caveats, we believe that mefloquine may be safely prescribed in pregnancy, and also to occupational groups who carry out safety-critical tasks. Testing Mefloquine's adverse effects need to be investigated through a multicentre cohort study, with small controlled studies testing specific elements of the hypothesis.

  7. Protective effects of oleum curcumae wenchowensis on skin damage due to UVB

    International Nuclear Information System (INIS)

    Wang Zhicheng; Zhao Hongguang; Du Xiang; Li Yanbo; Guo Wei; Gong Shouliang; Xiao Jian; Yao Chongshun; Li Xiaokun

    2006-01-01

    Objective: To study the protective effects of oleum curcumae wenchowensis on skin damage exposed to UVB and its mechanism, and to provide the experimental basis for the protection of skin damage exposed to UVB. Methods: The skin of guinea pigs was exposed to UVB (28.38 J/cm 2 · 30 d) to establish the oxidative damage model. The skin erythema and the rough were observed during the experiment; the thickness of epiderm and the number of fibroblast were observed under light microscope after the experiment. The activities of GSH-Px, SOD, CAT and T-AOC and the contain of MDA in the supernate of skin homogenate were detected with biochemical methods. Results: The epiderm in UVB exposure group and blank group thickened, but that in protective group weren't observed; the number of fibroblast in UVB exposure group and blank group decreased, while that in protective group increased, but that in control group didn't. The content of MDA in the supemate of skin homogenate in UVB exposure group and blank group increased, but that in protective group deceased, and the activities of GSH-Px, SOD, CAT and T-AOC in UVB exposure group and blank group decreased, but those in protective group increased, and control group had no change. Conclusions: Oleum curcumae wenchowensis has the protective effects on skin damage exposed to UVB, which may be mediated by increasing the contain of antioxidases and eliminating the flee radical. (authors)

  8. Damage estimation of subterranean building constructions due to groundwater inundation – the GIS-based model approach GRUWAD

    Directory of Open Access Journals (Sweden)

    R. Schinke

    2012-09-01

    Full Text Available The analysis and management of flood risk commonly focuses on surface water floods, because these types are often associated with high economic losses due to damage to buildings and settlements. The rising groundwater as a secondary effect of these floods induces additional damage, particularly in the basements of buildings. Mostly, these losses remain underestimated, because they are difficult to assess, especially for the entire building stock of flood-prone urban areas. For this purpose an appropriate methodology has been developed and lead to a groundwater damage simulation model named GRUWAD. The overall methodology combines various engineering and geoinformatic methods to calculate major damage processes by high groundwater levels. It considers a classification of buildings by building types, synthetic depth-damage functions for groundwater inundation as well as the results of a groundwater-flow model. The modular structure of this procedure can be adapted in the level of detail. Hence, the model allows damage calculations from the local to the regional scale. Among others it can be used to prepare risk maps, for ex-ante analysis of future risks, and to simulate the effects of mitigation measures. Therefore, the model is a multifarious tool for determining urban resilience with respect to high groundwater levels.

  9. Damage of plates due to impact, dynamic pressure and explosive loads

    Directory of Open Access Journals (Sweden)

    Norman Jones

    Full Text Available It is the purpose of this article to present design equations which can be used to predict the damage of ductile plating when subjected to mass impact, dynamic pressure or impulsive loadings. The external loadings are sufficiently severe to produce inelastic material behaviour and produce finite transverse displacement, or geometry change, effects. The damage is characterised as the final or permanent transverse displacement of a plate. The theoretical method predicts values for the maximum permanent transverse displacements which agree reasonably well with the corresponding experimental results generated on aluminium alloy circular, square and rectangular plates. Thus, the equations presented in this article are valuable for preliminary design purposes and for forensic studies, while the experimental data can be used for validating numerical schemes.

  10. Detection of system changes due to damage using a tuned hyperchaotic probe

    International Nuclear Information System (INIS)

    Torkamani, S; Butcher, E A; Todd, M D; Park, G

    2011-01-01

    This study explores the use of a hyperchaotic signal as an excitation to probe a system for dynamic changes induced by damage events. In chaotic interrogation a deterministic chaotic input (rather than the more commonly employed stochastic white noise input) is applied to the structure and the dynamic response is mined for features derived from its state space reconstruction. The steady-state chaotic excitation is tuned to excite the structure in a way that optimal sensitivity to dimensionality changes in the response may be observed, resulting in damage-sensitive features extracted from the resulting attractors. The enhanced technique proposed in this paper explores a hyperchaotic excitation, which is fundamentally new in its use as an excitation. Hyperchaotic oscillators have at least two Lyapunov exponents, in contrast to simple chaotic oscillators. By using the Kaplan–Yorke conjecture and performing a parametric investigation, the steady-state hyperchaotic excitation is tuned to excite the structure in such a way that the optimal (as will be defined) dimensionality of the steady-state response is achieved. A feature called the 'average local attractor variance ratio' (ALAVR), which is based on attractor geometry, is used to compare the geometry of a baseline attractor to a test attractor. The enhanced technique is applied to analytically and experimentally analyze the response of an eight-degree-of-freedom system to the hyperchaotic excitation for the purpose of damage assessment. A comparison between the results obtained from current hyperchaotic excitation versus a chaotic excitation highlights the higher damage sensitivity in the system response to the hyperchaotic excitation

  11. Repair of radiation damage of Micrococcus radioproteolyticus due to gamma and UV irradiation

    International Nuclear Information System (INIS)

    Ryznar, L.; Drasil, V.

    1982-01-01

    Cells were irradiated in dry state with gamma radiation and UV radiation. The post-irradiation warming of freeze dried cells (2 hours to 60deg or to 80deg) influenced the ability to repair sublethal damage. Heating to 80deg caused a mild reduction in survival. The repair of irradiated and heated cells required more time than that of cells which had only been irradiated. (M.D.)

  12. Failure of Stainless Steel Welds Due to Microstructural Damage Prevented by In Situ Metallography

    OpenAIRE

    Lopez,Juan Manuel Salgado; Alvarado,María Inés; Hernandez,Hector Vergara; Quiroz,José Trinidad Perez; Olmos,Luis

    2016-01-01

    Abstract In stainless steels, microstructural damage is caused by precipitation of chromium carbides or sigma phase. These microconstituents are detrimental in stainless steel welds because they lead to weld decay. Nevertheless, they are prone to appear in the heat affected zone (HAZ) microstructure of stainless steel welds. This is particularly important for repairs of industrial components made of austenitic stainless steel. Non-destructive metallography can be applied in welding repairs of...

  13. Damages in American Samoa due to the 29 September 2009 Samoa Islands Region Earthquake Tsunami

    Science.gov (United States)

    Okumura, Y.; Takahashi, T.; Suzuki, S.

    2009-12-01

    A large earthquake of Mw 8.0 occurred in Samoa Islands Region in the early morning on 29 September 2009 (local time). A Large Tsunami generated by the earthquake hit Samoa, American Samoa, Tonga. Total 192 people were died or missing in these three countries (22 October 2009). The authors surveyed in Tutuila Island, American Samoa from 6 to 8 in October 2009 with the aim to find out damages in the disaster. In American Samoa, death and missing toll was 35. The main findings are as follows; first, human damages were little for tsunami run-up height of about 4 to 6 meters and tsunami arrival time of about 20 minutes. We can suppose that residents evacuated quickly after feeling shaking or something. Secondly, houses were severely damaged in some low elevation coastal villages such as Amanave, Leone, Pago Pago, Tula and so on. Third, a power plant and an airport, which are important infrastructures in relief and recovery phase, were also severely damaged. Inundation depth at the power plant was 2.31 meters. A blackout in the daytime lasted when we surveyed. On the other hand, the airport could use already at that time. But it was closed on the first day in the disaster because of a lot of disaster debris on the runway carried by tsunami. Inundation depth at the airport fence was measured in 0.7 to 0.8 meters. Other countries in the south-western Pacific region may have power plants or airports with similar risk, so it should be assessed against future tsunami disasters. Inundated thermal power plant in Pago Pago Debris on runway in Tafuna Airport (Provided by Mr. Chris Soti, DPA)

  14. Obesity-exposed oocytes accumulate and transmit damaged mitochondria due to an inability to activate mitophagy.

    Science.gov (United States)

    Boudoures, Anna L; Saben, Jessica; Drury, Andrea; Scheaffer, Suzanne; Modi, Zeel; Zhang, Wendy; Moley, Kelle H

    2017-06-01

    Mitochondria are the most prominent organelle in the oocyte. Somatic cells maintain a healthy population of mitochondria by degrading damaged mitochondria via mitophagy, a specialized autophagy pathway. However, evidence from previous work investigating the more general macroautophagy pathway in oocytes suggests that mitophagy may not be active in the oocyte. This would leave the vast numbers of mitochondria - poised to be inherited by the offspring - vulnerable to damage. Here we test the hypothesis that inactive mitophagy in the oocyte underlies maternal transmission of dysfunctional mitochondria. To determine whether oocytes can complete mitophagy, we used either CCCP or AntimycinA to depolarize mitochondria and trigger mitophagy. After depolarization, we did not detect co-localization of mitochondria with autophagosomes and mitochondrial DNA copy number remained unchanged, indicating the non-functional mitochondrial population was not removed. To investigate the impact of an absence of mitophagy in oocytes with damaged mitochondria on offspring mitochondrial function, we utilized in vitro fertilization of high fat high sugar (HF/HS)-exposed oocytes, which have lower mitochondrial membrane potential and damaged mitochondria. Here, we demonstrate that blastocysts generated from HF/HS oocytes have decreased mitochondrial membrane potential, lower metabolites involved in ATP generation, and accumulation of PINK1, a mitophagy marker protein. This mitochondrial phenotype in the blastocyst mirrors the phenotype we show in HF/HS exposed oocytes. Taken together, these data suggest that the mechanisms governing oocyte mitophagy are fundamentally distinct from those governing somatic cell mitophagy and that the absence of mitophagy in the setting of HF/HS exposure contributes to the oocyte-to-blastocyst transmission of dysfunctional mitochondria. Copyright © 2017 The Authors. Published by Elsevier Inc. All rights reserved.

  15. Destruction of reactor building due to hydrogen explosion. Release of radioactive materials and health damage

    International Nuclear Information System (INIS)

    Otaki, Hideyuki

    2017-01-01

    Among the effects of radiation dose on the failure of the organ, this paper mainly explains the calculation method of internal exposure dose and the examples of calculation. As for internal exposure, there is critical organ (organ where a certain nuclide is particularly easy to gather). Since cesium is evenly dispersed in all organs in the body, any internal organs may contract a disease after high internal exposure. Calculation procedures for internal exposure are defined by the International Commission on Radiation Protection (ICRP). According to the pharmacokinetics model of cesium, even if the radiation temporarily stays in one organ or tissue, it gradually shifts and attacks the neighboring organ, so it never remains absorbed by only one organ. The dose of an exposed organ (equivalent dose) can be calculated by multiplying the various radiation dose ingested by the tissue weighing coefficient, and if the equivalent dose are summed up for all the organs, the total dose (effective dose) of the nuclide can be obtained. For the calculation, the following items are taken into account: ingested amount of radiation, equivalent dose, tissue weighing coefficient, radiation dose in an organ (compartment), biological half-life, effective half-life, and radiation dose accumulated in the organ. Calculation examples in the following are shown: risk of cancer onset when the internal exposure from food was 8x10"6 Bq, and incidence probability of a person who aspirated 100 mSv per year from air. (A.O.)

  16. Filtered air plastic chamber as an experimental facility to prove visible damage of crops due to air pollution

    Energy Technology Data Exchange (ETDEWEB)

    Matsuoka, Y; Yoda, H; Omichi, S; Shiratori, K

    1975-01-01

    An experimental filtered air chamber was constructed to prove the visible damage of crops due to air pollution. The chamber was provided with another room into which non-filtered ambient air was introduced. The purified air was prepared by filtering ambient air with activated carbon. The average content of air pollutants in the purified air chamber was less than 10 to 20% of the ozone and 20% of the sulfur oxides in the ambient air. However, cultivated vegetables such as tobacco and spinach, which are susceptible to oxidant, showed no visible damage in the filtered air chamber, and showed the same damage in the nonfiltered air chamber as was seen in fields at the same time.

  17. Radiation effects and damage formation in semiconductors due to high-energy ion irradiation

    Energy Technology Data Exchange (ETDEWEB)

    Kamarou, A.

    2006-11-07

    The object of this thesis was the study of ion-beam induced damage formation and annealing in crystalline and conventionally predamaged Ge, GaAs, and InP. The samples were irradiated either at {approx}80 K or at room temperature with Kr, Xe, or Au ions with specific energy of about 0.3 MeV/u to 3 MeV/u. Thereafter the samples were studied by means of Rutherford backscattering spectroscopy and/or transmission electron microscopy.

  18. Radiation effects and damage formation in semiconductors due to high-energy ion irradiation

    International Nuclear Information System (INIS)

    Kamarou, A.

    2006-01-01

    The object of this thesis was the study of ion-beam induced damage formation and annealing in crystalline and conventionally predamaged Ge, GaAs, and InP. The samples were irradiated either at ∼80 K or at room temperature with Kr, Xe, or Au ions with specific energy of about 0.3 MeV/u to 3 MeV/u. Thereafter the samples were studied by means of Rutherford backscattering spectroscopy and/or transmission electron microscopy

  19. Failure of Stainless Steel Welds Due to Microstructural Damage Prevented by In Situ Metallography

    Directory of Open Access Journals (Sweden)

    Juan Manuel Salgado Lopez

    Full Text Available Abstract In stainless steels, microstructural damage is caused by precipitation of chromium carbides or sigma phase. These microconstituents are detrimental in stainless steel welds because they lead to weld decay. Nevertheless, they are prone to appear in the heat affected zone (HAZ microstructure of stainless steel welds. This is particularly important for repairs of industrial components made of austenitic stainless steel. Non-destructive metallography can be applied in welding repairs of AISI 304 stainless steel components where it is difficult to ensure that no detrimental phase is present in the HAZ microstructure. The need of microstructural inspection in repairs of AISI 304 is caused because it is not possible to manufacture coupons for destructive metallography, with which the microstructure can be analyzed. In this work, it is proposed to apply in situ metallography as non-destructive testing in order to identify microstructural damage in the microstructure of AISI 304 stainless steel welds. The results of this study showed that the external surface micrographs of the weldment are representative of HAZ microstructure of the stainless steel component; because they show the presence of precipitated metallic carbides in the grain boundaries or sigma phase in the microstructure of the HAZ.

  20. Physical Damages of Wood Fiber in Acacia Mangium due to Biopulping Treatment

    Directory of Open Access Journals (Sweden)

    Ridwan Yahya

    2016-05-01

    chrysosporium to Acacia mangium Willd can reduce lignin and improve holocellulose and cellulose content of the material. Fiber dimension recognized as other important factor for paper properties. The question is how the integrity and dimensions of the wood fiber that has been pretreated with the fungus. The objectives of present study were to know effect of pretreatment of P. chrysosporium to the integrity and dimensions of the fiber. The P. chrysosporium was cultured for 14 days in growth medium, and inoculated to wood chips 5% (w/v and incubated for 0, 15 and 30 days. The inoculated wood chips were chipped into 1 mm x 1 mm x 20 mm and macerated using franklin solution at 60 oC for 48 hours. Forty fibers from each incubated time were analized their physical damages using a light microscope at a 400 magnification. The inoculated fibers were measured theirs dimensions. The physical damage percentage of fibers pretreated using P. chrysosporium was 0%. Length and wall thickness of the pretreated fibers were can be categorized as middle class and thin fibers, respectively.

  1. Cyber Attacks and Combat Behavior

    Directory of Open Access Journals (Sweden)

    Carataș Maria Alina

    2017-01-01

    Full Text Available Cyber terrorism is an intangible danger, a real over the corner threat in the life of individuals,organizations, and governments and is getting harder to deal with its damages. The motivations forthe cyber-attacks are different, depending on the terrorist group, from cybercrime to hacktivism,attacks over the authorities’ servers. Organizations constantly need to find new ways ofstrengthening protection against cyber-attacks, assess their cyber readiness, expand the resiliencecapacity and adopts international security regulations.

  2. Real-Time Vehicle Routing for Repairing Damaged Infrastructures Due to Natural Disasters

    Directory of Open Access Journals (Sweden)

    Huey-Kuo Chen

    2011-01-01

    Full Text Available We address the task of repairing damaged infrastructures as a series of multidepot vehicle-routing problems with time windows in a time-rolling frame. The network size of the tackled problems changes from time to time, as new disaster nodes will be added to and serviced disaster nodes will be deleted from the current network. In addition, an inaccessible disaster node would become accessible when one of its adjacent disaster nodes has been repaired. By the “take-and-conquer” strategy, the repair sequence of the disaster nodes in the affected area can be suitably scheduled. Thirteen instances were tested with our proposed heuristic, that is, Chen et al.'s approach. For comparison, Hsueh et al.'s approach (2008 with necessary modification was also tested. The results show that Chen et al.'s approach performs slightly better for larger size networks in terms of objective value.

  3. Stress and Damage in Polymer Matrix Composite Materials Due to Material Degradation at High Temperatures

    Science.gov (United States)

    McManus, Hugh L.; Chamis, Christos C.

    1996-01-01

    This report describes analytical methods for calculating stresses and damage caused by degradation of the matrix constituent in polymer matrix composite materials. Laminate geometry, material properties, and matrix degradation states are specified as functions of position and time. Matrix shrinkage and property changes are modeled as functions of the degradation states. The model is incorporated into an existing composite mechanics computer code. Stresses, strains, and deformations at the laminate, ply, and micro levels are calculated, and from these calculations it is determined if there is failure of any kind. The rationale for the model (based on published experimental work) is presented, its integration into the laminate analysis code is outlined, and example results are given, with comparisons to existing material and structural data. The mechanisms behind the changes in properties and in surface cracking during long-term aging of polyimide matrix composites are clarified. High-temperature-material test methods are also evaluated.

  4. Shark Attack Project - Marine Attack at Towed Hydrophone Arrays

    National Research Council Canada - National Science Library

    Kalmijn, Adrianus J

    2005-01-01

    The original objective of the SIO Marine Attack project was to identify the electric and magnetic fields causing sharks to inflict serious damage upon the towed hydrophone arrays of US Navy submarines...

  5. Attack surfaces

    DEFF Research Database (Denmark)

    Gruschka, Nils; Jensen, Meiko

    2010-01-01

    The new paradigm of cloud computing poses severe security risks to its adopters. In order to cope with these risks, appropriate taxonomies and classification criteria for attacks on cloud computing are required. In this work-in-progress paper we present one such taxonomy based on the notion...... of attack surfaces of the cloud computing scenario participants....

  6. The effect of apple (Malus Domestica juice on the damage of mice liver cells due to paracetamol treatment

    Directory of Open Access Journals (Sweden)

    Anthony Hartanto

    2009-07-01

    Full Text Available The liver is an important organ for body metabolism process. Liver disease is one of serious health problems in developing countries including Indonesia. Liver damage is caused by viral infection, toxic agent exposure (medications, alcohol, hormonal disturbance, neoplasm and autoimmune diseases. The use of high dose paracetamol to reduce pain also leads to liver damage. Apple (Malus domestica juice is a natural anti oxidant agent. This laboratory experimental study was performed to discover the effect of giving apple juice on damaged cell regeneration due to the use of paracetamol. The study was performed in 21 male mice from Swiss-Webster strain that were divided into group I, II, and III. Group, I served as control while group II received 1 mg/ml paracetamol dose for 5 days and Group III received 1 mg/ml paracetamol for 5 days and 1 ml of apple juice on the 5th to 10th day. The observation of the mice liver cells was conducted using a light microscope with 400x magnification to get the number of necrotic liver cells per view field. The results of this study showed a difference in the number of necrotic liver cells between Group II and III. ANOVA statistical test ( = 0.05 concluded that apple juice significantly helps regeneration process in damaged liver cells caused by paracetamol.

  7. Quality control in the application of flow cytometric assays of genetic damage due to environmental contaminants

    International Nuclear Information System (INIS)

    McCreedy, C.D.; Jagoe, C.H.; Brisbin, I.L. Jr.; Wentworth, R.W.; Dallas, C.E.

    1995-01-01

    Clinical technologies, such as flow cytometry, are increasingly adopted by environmental toxicologists to identify resource damage associated with exposure to xenobiotics. One application of flow cytometry allows the rapid determination of the DNA content of large numbers of individual cells, and can be used to detect aneuploidy or other genetic abnormalities. The laboratory has used this methodology in studies of genetic toxicology of fish, birds, arid mammals exposed to organic pollutants, metals and radionuclides, However, without appropriate quality controls, false positive results and other artifacts can arise from sample handling and preparations, inter and intra-individual variations, instrument noise and other sources. The authors describe the routine measures this laboratory employs to maintain quality control of genomic DNA analysis, including the control of staining conditions, machine standardization, pulse-width doublet discrimination, and, in particular, the use of internal controls and the use of time as a cytometric parameter. Neglect of these controls can produce erroneous results, leading to conclusions of genetic abnormalities when none are present. Conversely, attention to these controls, routinely used in clinical settings, facilitates the interpretation of flow cytometric data and allows the application of this sensitive indicator of genotoxic effects to a variety of environmental problems

  8. Design retrofit to prevent damage due to heat transport pump operation under conditions of significant void

    International Nuclear Information System (INIS)

    Lam, K.F.

    1991-01-01

    The purpose of this paper is to provide a general review of certain key design areas which address the safety concerns of HT pump operation under conditions of significant void. To illustrate the challenges confronting designers and analysts, some of the highlights during the design of a protective system to prevent damage to HT piping and pump supports at Bruce NGS 'A' are outlined. The effects of this protective system on reactor safety are also discussed. HI pump operation under conditions of significant void offers a major challenge to designers and analysts to ensure that pump induced vibration and its effects on pump and piping are addressed. For an in-service station the search for a practical solution is often limited by existing. station equipment design and Layout. The diversity of design verification process requires a major commitment of engineering resources to ensure all. safety aspects meet the requirements of regulatory body. Work currently undertaken at Ontario Hydro Research Pump Test Complex on two-phase flow in pumps and piping may provide better prediction of vibration characteristics so that inherent conservativeness in fatigue Life prediction of HI system components can be reduced

  9. Design retrofit to prevent damage due to heat transport pump operation under conditions of significant void

    Energy Technology Data Exchange (ETDEWEB)

    Lam, K F [Bruce Engineering Department, In-Service Nuclear Projects, Ontario Hydro, North York, ON (Canada)

    1991-04-01

    The purpose of this paper is to provide a general review of certain key design areas which address the safety concerns of HT pump operation under conditions of significant void. To illustrate the challenges confronting designers and analysts, some of the highlights during the design of a protective system to prevent damage to HT piping and pump supports at Bruce NGS 'A' are outlined. The effects of this protective system on reactor safety are also discussed. HI pump operation under conditions of significant void offers a major challenge to designers and analysts to ensure that pump induced vibration and its effects on pump and piping are addressed. For an in-service station the search for a practical solution is often limited by existing. station equipment design and Layout. The diversity of design verification process requires a major commitment of engineering resources to ensure all. safety aspects meet the requirements of regulatory body. Work currently undertaken at Ontario Hydro Research Pump Test Complex on two-phase flow in pumps and piping may provide better prediction of vibration characteristics so that inherent conservativeness in fatigue Life prediction of HI system components can be reduced.

  10. Comet assay optimization for assessment of DNA damage due to radiation exposure

    International Nuclear Information System (INIS)

    Dwi Ramadhani; Devita Tetriana; Viria Agesti Suvifan

    2016-01-01

    Comet assay can be used to measure the deoxyribonucleic acid (DNA) damage level caused by ionizing radiation exposure in peripheral blood lymphocytes. The principle of the comet assay is based on the amount of denatured DNA fragments that migrated out of the cell nucleus during electrophoresis. There are several aspects that must be concerned when doing the comet assay. For example the agarose concentration, duration of alkaline incubation, electrophoresis conditions (time, temperature, and voltage gradient), and the measurement parameters that used in analyze the comet. Percentage of DNA in the comet tail (% tail DNA) is strongly recommended as a parameter when analyze the comet because it can be converted to lesions per 106 base pairs (bp) using calibration curve that show relationship between the dose of ionizing radiation and % tail DNA. To obtain an accurate result, the calibration curve must be made and comet should be analyzing using image processing analysis software since it can be increase the precision and reduce the subjectivity of the measurement process. (author)

  11. Cardiotoxic (Arrhythmogenic) Effects of 1,1-Difluoroethane Due to Electrolyte Imbalance and Cardiomyocyte Damage.

    Science.gov (United States)

    Joshi, Kaushal; Barletta, Michael; Wurpel, John

    2017-06-01

    Inhalant abuse is the intentional inhalation of chemical vapors to attain euphoric effects. Many common household products are abused by inhalation and one is 1,1-difluoroethane (DFE), which is a halogenated hydrocarbon used in refrigeration, dust-off spray, and airbrush painting. Although many human DFE abuse cases have been studied, the etiology and mechanism of sudden death is still unknown. In this study, an animal model was used to simulate the human conditions of DFE inhalation abuse that results in sudden death.Current research targets mechanistic studies involving electrolyte changes and cardiomyocyte damage after DFE administration in vivo. To investigate these changes, Sprague Dawley rats (N = 6) were exposed to 30 seconds of 20 L/min of DFE in multiple doses. Isoflurane acted as a control. Two additional groups, epinephrine and epinephrine + DFE, were included to simulate the clinical condition of DFE abuse. Plasma sodium, potassium, calcium, and magnesium levels were measured, followed by lactate dehydrogenase, creatine kinase, and cardiac troponin I levels. In addition, oxidative stress markers were also evaluated in all animal groups. Electrolyte levels showed a significant rise in plasma potassium and magnesium levels for the treated groups. In addition, lactate dehydrogenase, creatine kinase, and cardiac troponin I levels in DFE and epinephrine + DFE administered rats were significantly elevated as compared with control. Some oxidative stress makers were also elevated significantly in treatment groups. Furthermore, histopathological analysis showed hyperemia/congestion in treated rats.These results support cardiotoxic effects indicating that DFE results in fatal arrhythmias, and the study can be important during clinical cases involving inhalant abuse.

  12. Estimation of the Past and Future Infrastructure Damage Due the Permafrost Evolution Processes

    Science.gov (United States)

    Sergeev, D. O.; Chesnokova, I. V.; Morozova, A. V.

    2015-12-01

    The geocryological processes such as thermokarst, frost heaving and fracturing, icing, thermal erosion are the source of immediate danger for the structures. The economic losses during the construction procedures in the permafrost area are linked also with the other geological processes that have the specific character in cold regions. These processes are swamping, desertification, deflation, flooding, mudflows and landslides. Linear transport structures are most vulnerable component of regional and national economy. Because the high length the transport structures have to cross the landscapes with different permafrost conditions that have the different reaction to climate change. The climate warming is favorable for thermokarst and the frost heaving is linked with climate cooling. In result the structure falls in the circumstances that are not predicted in the construction project. Local engineering problems of structure exploitation lead to global risks of sustainable development of regions. Authors developed the database of geocryological damage cases for the last twelve years at the Russian territory. Spatial data have the attributive table that was filled by the published information from various permafrost conference proceedings. The preliminary GIS-analysis of gathered data showed the widespread territorial distribution of the cases of negative consequences of geocryological processes activity. The information about maximum effect from geocryological processes was validated by detailed field investigation along the railways in Yamal and Transbaicalia Regions. Authors expect the expanding of database by similar data from other sectors of Arctic. It is important for analyzing the regional, time and industrial tendencies of geocryological risk evolution. Obtained information could be used in insurance procedures and in information systems of decisions support in different management levels. The investigation was completed with financial support by Russian

  13. Remote damage control during the attacks on Paris: Lessons learned by the Paris Fire Brigade and evolutions in the rescue system.

    Science.gov (United States)

    Lesaffre, Xavier; Tourtier, Jean-Pierre; Violin, Yann; Frattini, Benoit; Rivet, Catherine; Stibbe, Olivier; Faure, Florian; Godefroy, Anne; Gallet, Jean-Claude; Ausset, Sylvain

    2017-06-01

    On November 13, 2015, in 40 minutes, Paris suffered four suicide bombers attacks; shootings at three different restaurant terraces; and an attack on the Bataclan concert hall, resulting in 130 dead and 495 wounded. How did the Parisian rescue system respond and how did it evolve since?We proved we could deploy quickly wide prehospital and hospital resources and teams' equipment and preparedness is being further developed. To secure a swifter initial response, we need a better integration of the operators of the rescue chain with a simpler and more robust organization as well as improved communications channels. We must continue to anticipate and prepare for possible future attacks.

  14. DNA damage due to perfluorooctane sulfonate based on nano-gold embedded in nano-porous poly-pyrrole film

    Energy Technology Data Exchange (ETDEWEB)

    Lu, Liping, E-mail: lipinglu@bjut.edu.cn; Xu, Laihui; Kang, Tianfang; Cheng, Shuiyuan

    2013-11-01

    DNA damage induced from perfluorooctane sulfonate (PFOS) was further developed on a nano-porous bionic interface. The interface was formed by assembling DNA on nano-gold particles which were embedded in a nano-porous overoxidized polypyrrole film (OPPy). Atomic force microscopy, scanning electron microscope and electrochemical investigations indicate that OPPy can be treated to form nano-pore structures. DNA damage due to PFOS was proved using electrochemistry and X-ray photoelectron spectroscopy (XPS) and was investigated by detecting differential pulse voltammetry (DPV) response of methylene blue (MB) which was used as electro-active indicator in the system. The current of MB attenuates obviously after incubation of DNA in PFOS. Moreover, electrochemical impedance spectroscopy (EIS) demonstrates that PFOS weakens DNA charge transport. The tentative binding ratio of PFOS: DNA base pair was obtained by analyzing XPS data of this system.

  15. Prediction of pressure tube fretting-wear damage due to fuel vibration

    International Nuclear Information System (INIS)

    Yetisir, M.; Fisher, N.J.

    1997-01-01

    Fretting marks between fuel bundle bearing pads and pressure tubes have been observed at the inlet end of some Darlington Nuclear Generating Station (NGS) and Bruce NGS fuel channels. The excitation mechanisms that lead to fretting are not fully understood. In this paper, the possibility of bearing pad-to-pressure tube fretting due to turbulence-induced motion of the fuel element is investigated. Numerical simulations indicate that this mechanism by itself is not likely to cause the level of fretting experienced in Darlington and Bruce NGSs. (orig.)

  16. Prediction of pressure tube fretting-wear damage due to fuel vibration

    Energy Technology Data Exchange (ETDEWEB)

    Yetisir, M; Fisher, N J [Atomic Energy of Canada Ltd., Chalk River, ON (Canada)

    1996-12-31

    Fretting marks between fuel bundle bearing pads and pressure tubes have been observed at the inlet end of some Darlington NGS (nuclear generating station) and Bruce NGS fuel channels. The excitation mechanisms that lead to fretting are not fully understood. In this paper, the possibility of bearing pad-to-pressure tube fretting due to turbulence-induced motion of the fuel element is investigated. Numerical simulations indicate that this mechanism by itself is not likely to cause the level of fretting experienced in Darlington and Bruce NGS`s (nuclear generating stations). (author). 12 refs., 2 tabs., 11 figs.

  17. Bulk damage and absorption in fused silica due to high-power laser applications

    Science.gov (United States)

    Nürnberg, F.; Kühn, B.; Langner, A.; Altwein, M.; Schötz, G.; Takke, R.; Thomas, S.; Vydra, J.

    2015-11-01

    Laser fusion projects are heading for IR optics with high broadband transmission, high shock and temperature resistance, long laser durability, and best purity. For this application, fused silica is an excellent choice. The energy density threshold on IR laser optics is mainly influenced by the purity and homogeneity of the fused silica. The absorption behavior regarding the hydroxyl content was studied for various synthetic fused silica grades. The main absorption influenced by OH vibrational excitation leads to different IR attenuations for OH-rich and low-OH fused silica. Industrial laser systems aim for the maximum energy extraction possible. Heraeus Quarzglas developed an Yb-doped fused silica fiber to support this growing market. But the performance of laser welding and cutting systems is fundamentally limited by beam quality and stability of focus. Since absorption in the optical components of optical systems has a detrimental effect on the laser focus shift, the beam energy loss and the resulting heating has to be minimized both in the bulk materials and at the coated surfaces. In collaboration with a laser research institute, an optical finisher and end users, photo thermal absorption measurements on coated samples of different fused silica grades were performed to investigate the influence of basic material properties on the absorption level. High purity, synthetic fused silica is as well the material of choice for optical components designed for DUV applications (wavelength range 160 nm - 260 nm). For higher light intensities, e.g. provided by Excimer lasers, UV photons may generate defect centers that effect the optical properties during usage, resulting in an aging of the optical components (UV radiation damage). Powerful Excimer lasers require optical materials that can withstand photon energy close to the band gap and the high intensity of the short pulse length. The UV transmission loss is restricted to the DUV wavelength range below 300 nm and

  18. Damaged Neocortical Perineuronal Nets Due to Experimental Focal Cerebral Ischemia in Mice, Rats and Sheep

    Directory of Open Access Journals (Sweden)

    Wolfgang Härtig

    2017-08-01

    Full Text Available As part of the extracellular matrix (ECM, perineuronal nets (PNs are polyanionic, chondroitin sulfate proteoglycan (CSPG-rich coatings of certain neurons, known to be affected in various neural diseases. Although these structures are considered as important parts of the neurovascular unit (NVU, their role during evolution of acute ischemic stroke and subsequent tissue damage is poorly understood and only a few preclinical studies analyzed PNs after acute ischemic stroke. By employing three models of experimental focal cerebral ischemia, this study was focused on histopathological alterations of PNs and concomitant vascular, glial and neuronal changes according to the NVU concept. We analyzed brain tissues obtained 1 day after ischemia onset from: (a mice after filament-based permanent middle cerebral artery occlusion (pMCAO; (b rats subjected to thromboembolic MACO; and (c sheep at 14 days after electrosurgically induced focal cerebral ischemia. Multiple fluorescence labeling was applied to explore simultaneous alterations of NVU and ECM. Serial mouse sections labeled with the net marker Wisteria floribunda agglutinin (WFA displayed largely decomposed and nearly erased PNs in infarcted neocortical areas that were demarcated by up-regulated immunoreactivity for vascular collagen IV (Coll IV. Subsequent semi-quantitative analyses in mice confirmed significantly decreased WFA-staining along the ischemic border zone and a relative decrease in the directly ischemia-affected neocortex. Triple fluorescence labeling throughout the three animal models revealed up-regulated Coll IV and decomposed PNs accompanied by activated astroglia and altered immunoreactivity for parvalbumin, a calcium-binding protein in fast-firing GABAergic neurons which are predominantly surrounded by neocortical PNs. Furthermore, ischemic neocortical areas in rodents simultaneously displayed less intense staining of WFA, aggrecan, the net components neurocan, versican and the

  19. Surface structural damage study in cortical bone due to medical drilling.

    Science.gov (United States)

    Tavera R, Cesar G; De la Torre-I, Manuel H; Flores-M, Jorge M; Hernandez M, Ma Del Socorro; Mendoza-Santoyo, Fernando; Briones-R, Manuel de J; Sanchez-P, Jorge

    2017-05-01

    A bone's fracture could be produced by an excessive, repetitive, or sudden load. A regular medical practice to heal it is to fix it in two possible ways: external immobilization, using a ferule, or an internal fixation, using a prosthetic device commonly attached to the bone by means of surgical screws. The bone's volume loss due to this drilling modifies its structure either in the presence or absence of a fracture. To observe the bone's surface behavior caused by the drilling effects, a digital holographic interferometer is used to analyze the displacement surface's variations in nonfractured post-mortem porcine femoral bones. Several nondrilled post-mortem bones are compressed and compared to a set of post-mortem bones with a different number of cortical drillings. During each compression test, a series of digital interferometric holograms were recorded using a high-speed CMOS camera. The results are presented as pseudo 3D mesh displacement maps for comparisons in the physiological range of load (30 and 50 lbs) and beyond (100, 200, and 400 lbs). The high resolution of the optical phase gives a better understanding about the bone's microstructural modifications. Finally, a relationship between compression load and bone volume loss due to the drilling was observed. The results prove that digital holographic interferometry is a viable technique to study the conditions that avoid the surgical screw from loosening in medical procedures of this kind.

  20. Investigation and studies on plant damage due to Tokyo photochemical smog. Part II. On the damage of petunia which showed the symptoms like injuries by pan (peroxyacetyl nitrate)

    Energy Technology Data Exchange (ETDEWEB)

    Terakado, K.

    1973-10-01

    Twice in the middle of June and in early Aug. 1972, petunia leaves were damaged by peroxyacetyl nitrate in Tokyo. The leaf damage, root activity, and pH and specific conductivity of the soil were studied. Similar plants were exposed experimentally to ozone for comparison. No damage was found on other types of plants in the same greenhouse, and different types of petunias were damaged to different degrees. The damage was studied by microscopy anbd by gross symptoms.

  1. Enhancement of First Wall Damage in Iter Type Tokamak due to Lenr Effects

    Science.gov (United States)

    Lipson, Andrei G.; Miley, George H.; Momota, Hiromu

    In recent experiments with pulsed periodic high current (J ~ 300-500 mA/cm2) D2-glow discharge at deuteron energies as low as 0.8-2.45 keV a large DD-reaction yield has been obtained. Thick target yield measurement show unusually high DD-reaction enhancement (at Ed = 1 keV the yield is about nine orders of magnitude larger than that deduced from standard Bosch and Halle extrapolation of DD-reaction cross-section to lower energies) The results obtained in these LENR experiments with glow discharge suggest nonnegligible edge plasma effects in the ITER TOKAMAK that were previously ignored. In the case of the ITER DT plasma core, we here estimate the DT reaction yield at the metal edge due to plasma ion bombardment of the first wall and/or divertor materials.

  2. Enhancement of first wall damage in ITER type tokamak due to LENR effects

    International Nuclear Information System (INIS)

    Lipson, Andrei G.; Miley, George H.; Momota, Hiromu

    2006-01-01

    In recent experiments with pulsed periodic high current (J - 300-500 mA/cm 2 ) D 2 -glow discharge at deuteron energies as low as 0.8-2.45 keV a large DD-reaction yield has been obtained. Thick target yield measurement show unusually high DD-reaction enhancement (at E d =1 keV the yield is about nine orders of magnitude larger than that deduced from standard Bosch and Halle extrapolation of DD-reaction cross-section to lower energies). The results obtained in these LENR experiments with glow discharge suggest nonnegligible edge plasma effects in the ITER TOKAMAK that were previously ignored. In the case of the ITER DT plasma core, we here estimate the DT reaction yield at the metal edge due to plasma ion bombardment of the first wall and/or divertor materials. (author)

  3. Heart Attack

    Science.gov (United States)

    ... properly causes your body's blood sugar levels to rise, increasing your risk of heart attack. Metabolic syndrome. This occurs when you have obesity, high blood pressure and high blood sugar. Having metabolic ...

  4. Heart Attack

    Science.gov (United States)

    ... family history of heart attack race – African Americans, Mexican Americans, Native Americans, and native Hawaiians are at ... Your doctor will prescribe the medicines that are right for you. If you have had a heart ...

  5. A comparison between the irradiation damage response of spinel and zirconia due to Xe ion bombardment

    International Nuclear Information System (INIS)

    Sickafus, K.E.; Wetteland, C.J.; Baker, N.P.; Yu Ning; Devanathan, R.; Nastasi, M.; Bordes, N.

    1998-01-01

    The mechanical properties of Xe-implanted spinel and cubic zirconia surfaces, as determined by nano-indentation measurements, are distinct and the differences can be related to their microstructures. Upon Xe 2+ ion irradiation to high dose at cryogenic temperature (120 K), the Young's modulus of irradiated spinel falls dramatically until the modulus is only about 3/4 the un-irradiated value. The maximum modulus occurs concurrent with the formation of a metastable crystalline phase of spinel. The subsequent elastic softening at higher Xe 2+ doses is an indication of the onset of amorphization of the spinel. Xe-implanted zirconia surfaces behave differently, in all cases showing almost no change in elastic modulus with increasing Xe 2+ ion dose. This is consistent with microstructural observations of Xe-implanted zirconia crystals which, unlike spinel, show no change in crystal structure with increasing ion dose. The hardness of both spinel and zirconia increases slightly for low Xe 2+ ion doses. At higher doses, zirconia shows little change in hardness, while the hardness of the implanted spinel falls by more than a factor of two. The initial increase in hardness of both spinel and zirconia is consistent with point defect accumulation and the precipitation of small interstitial clusters, while the drop in hardness of spinel at high Xe 2+ ion doses is due to the formation of an amorphous phase. (orig.)

  6. Honey can repairing damage of liver tissue due to protein energy malnutrition through induction of endogenous stem cells

    Directory of Open Access Journals (Sweden)

    R. Heru Prasetyo

    2017-06-01

    Full Text Available Aim: This study was to evaluate effect of honey in repairing damage of liver tissue due to energy protein malnutrition and in mobilization of endogenous stem cells. Materials and Methods: Male mice model of degenerative liver was obtained through food fasting but still have drinking water for 5 days. It caused energy protein malnutrition and damage of liver tissue. The administration of 50% (v/v honey was performed for 10 consecutive days, while the positive control group was fasted and not given honey and the negative control not fasted and without honey. Observations of regeneration the liver tissue based on histologically examination, observation of Hsp70 expression, and homing signal based on vascular endothelial growth factor-1 (VEGF-1 expression using immunohistochemistry technique. Observation on expression of CD34 and CD45 as the marker of auto mobilization of hematopoietic stem cells using flow cytometry technique. Results: There is regeneration of the liver tissue due to protein energy malnutrition, decrease of Hsp70 expression, increase of VEGF-1 expression, and high expression of CD34 and CD45. Conclusion: Honey can improve the liver tissue based on: (1 Mobilization of endogenous stem cells (CD34 and CD45; (2 Hsp70 and VEGF-1 expressions as regeneration marker of improvement, and (3 regeneration histologically of liver tissue.

  7. Honey can repairing damage of liver tissue due to protein energy malnutrition through induction of endogenous stem cells.

    Science.gov (United States)

    Prasetyo, R Heru; Hestianah, Eka Pramyrtha

    2017-06-01

    This study was to evaluate effect of honey in repairing damage of liver tissue due to energy protein malnutrition and in mobilization of endogenous stem cells. Male mice model of degenerative liver was obtained through food fasting but still have drinking water for 5 days. It caused energy protein malnutrition and damage of liver tissue. The administration of 50% (v/v) honey was performed for 10 consecutive days, while the positive control group was fasted and not given honey and the negative control not fasted and without honey. Observations of regeneration the liver tissue based on histologically examination, observation of Hsp70 expression, and homing signal based on vascular endothelial growth factor-1 (VEGF-1) expression using immunohistochemistry technique. Observation on expression of CD34 and CD45 as the marker of auto mobilization of hematopoietic stem cells using flow cytometry technique. There is regeneration of the liver tissue due to protein energy malnutrition, decrease of Hsp70 expression, increase of VEGF-1 expression, and high expression of CD34 and CD45. Honey can improve the liver tissue based on: (1) Mobilization of endogenous stem cells (CD34 and CD45); (2) Hsp70 and VEGF-1 expressions as regeneration marker of improvement, and (3) regeneration histologically of liver tissue.

  8. Analytical Characterization of Internet Security Attacks

    Science.gov (United States)

    Sellke, Sarah H.

    2010-01-01

    Internet security attacks have drawn significant attention due to their enormously adverse impact. These attacks includes Malware (Viruses, Worms, Trojan Horse), Denial of Service, Packet Sniffer, and Password Attacks. There is an increasing need to provide adequate defense mechanisms against these attacks. My thesis proposal deals with analytical…

  9. Advances in detecting localized road damage due to sinkholes induced by engineering works using high resolution RASARSAT-2 data

    Science.gov (United States)

    Chen, J.; Zebker, H. A.; Lakshmi, V.

    2016-12-01

    Sinkholes often occur in karst terrains such as found in central and eastern Pennsylvania. Voids produced by dissolution of carbonate rocks can result in soil transport leading to localized, gradual or rapid, sinking of the land surface. A cluster of sinkholes developed in 2000 around a small rural community beside Bushkill creek near a limestone quarry, and severely destroyed road bridges and railway tracks. At a cost of $6 million, the Pennsylvania DoT replaced the bridge, which was damaged again in 2004 by newly developed sinkholes likely associated with quarry's pumping activity. Here we present high-resolution spaceborne interferometric radar images of sinkhole development on this community. We show that this technique may be used to monitor regions with high sinkhole damage risk and assist future infrastructure route planning, especially in rural areas where hydrogeologic information is limited. Specifically, we processed 66 RADARSAT-2 interferograms to extract deformation occurred over Bushkill creek between Jun. 2015 and Mar. 2016 with a temporal resolution of 24 days. We advanced recent persistent scatterer techniques to preserve meter-level spatial resolution in the interferograms while minimizing temporal decorrelation and phase unwrapping error. We observe periodic deformation due to pumping activity at the quarry and localized subsidence along Bushkill creek that is co-located with recent reported sinkholes. We plan to use the automatic processing techniques developed for this study to study road damage in another region in Pennsylvania, along Lewiston Narrows, and also to monitor urban infrastructure improvements in Seattle, both again with RASARSAT-2 data. Our results demonstrate that recent advances in satellite geodesy can be transferred to benefit society beyond the science community.

  10. Two different mechanisms of fatigue damage due to cyclic stress loading at 77 K for MOCVD-YBCO-coated conductors

    International Nuclear Information System (INIS)

    Sugano, M; Yoshida, Y; Hojo, M; Shikimachi, K; Hirano, N; Nagaya, S

    2008-01-01

    Tensile fatigue tests were carried out at 77 K for YBCO-coated conductors fabricated by metal-organic chemical vapor deposition (MOCVD). The S-N relationship, variation of critical current (I c ) during cyclic loading and microscopic fatigue damage were investigated. Fatigue strength at 10 6 cycles was evaluated to be σ max = 1300 MPa and 890 MPa under the stress ratios of 0.5 and 0.1. Two different mechanisms of fatigue damage, depending on the number of stress cycles to failure, were observed. In one of the fracture mechanisms, fatigue behavior is characterized by overall fracture which occurs at 10 4 -10 5 cycles. For these specimens, I c after unloading does not degrade before overall fracture. Although only shallow slip bands were found at the Ag surface, fatigue cracks were found on the Hastelloy C-276 surface of the fractured specimen. These results suggest that overall fracture due to cyclic stress was caused by fatigue of the Hastelloy substrate. In the other fracture mechanism, even though overall fracture did not occur at 10 6 cycles, a slight decrease of I c was detected after 10 5 cycles. No fatigue crack was found on the Hastelloy surface, while deep slip bands corresponding to the initial stage of fatigue crack were observed on the Ag surface. From these results, we concluded that I c degradation at a high cycle number is attributed to the fatigue of the Ag stabilizing layer

  11. Expected damage to accelerator equipment due to the impact of the full LHC beam: beam instrumentation, experiments and simulations

    CERN Document Server

    Burkart, Florian

    The Large Hadron Collider (LHC) is the biggest and most powerful particle accelerator in the world, designed to collide two proton beams with particle momentum of 7 TeV/c each. The stored energy of 362MJ in each beam is sufficient to melt 500 kg of copper or to evaporate about 300 liter of water. An accidental release of even a small fraction of the beam energy can cause severe damage to accelerator equipment. Reliable machine protection systems are necessary to safely operate the accelerator complex. To design a machine protection system, it is essential to know the damage potential of the stored beam and the consequences in case of a failure. One (catastrophic) failure would be, if the entire beam is lost in the aperture due to a problem with the beam dumping system. This thesis presents the simulation studies, results of a benchmarking experiment, and detailed target investigation, for this failure case. In the experiment, solid copper cylinders were irradiated with the 440GeV proton beam delivered by the ...

  12. An Analysis of Cyber-Attack on NPP Considering Physical Impact

    Energy Technology Data Exchange (ETDEWEB)

    Lee, In Hyo; Kang, Hyun Gook [KAIST, Daejeon (Korea, Republic of); Son, Han Seong [Joonbu University, Geumsan (Korea, Republic of)

    2016-05-15

    Some research teams performed related works on cyber-physical system which is a system that cyber-attack can lead to serious consequences including product loss, damage, injury and death when it is attacked. They investigated the physical impact on cyber-physical system due to the cyber-attack. But it is hard to find the research about NPP cyber security considering the physical impact or safety. In this paper, to investigate the relationship between physical impact and cyber-attack, level 1 PSA results are utilized in chapter 2 and cyber-attack analysis is performed in chapter 3. The cyber security issue on NPP is inevitable issue. Unlike general cyber security, cyber-physical system like NPP can induce serious consequences such as core damage by cyber-attack. So in this paper, to find how hacker can attack the NPP, (1) PSA results were utilized to find the relationship between physical system and cyber-attack and (2) vulnerabilities on digital control systems were investigated to find how hacker can implement the possible attack. It is expected that these steps are utilized when establishing penetration test plans or cyber security drill plans.

  13. An Analysis of Cyber-Attack on NPP Considering Physical Impact

    International Nuclear Information System (INIS)

    Lee, In Hyo; Kang, Hyun Gook; Son, Han Seong

    2016-01-01

    Some research teams performed related works on cyber-physical system which is a system that cyber-attack can lead to serious consequences including product loss, damage, injury and death when it is attacked. They investigated the physical impact on cyber-physical system due to the cyber-attack. But it is hard to find the research about NPP cyber security considering the physical impact or safety. In this paper, to investigate the relationship between physical impact and cyber-attack, level 1 PSA results are utilized in chapter 2 and cyber-attack analysis is performed in chapter 3. The cyber security issue on NPP is inevitable issue. Unlike general cyber security, cyber-physical system like NPP can induce serious consequences such as core damage by cyber-attack. So in this paper, to find how hacker can attack the NPP, (1) PSA results were utilized to find the relationship between physical system and cyber-attack and (2) vulnerabilities on digital control systems were investigated to find how hacker can implement the possible attack. It is expected that these steps are utilized when establishing penetration test plans or cyber security drill plans

  14. Mutism and auditory agnosia due to bilateral insular damage--role of the insula in human communication.

    Science.gov (United States)

    Habib, M; Daquin, G; Milandre, L; Royere, M L; Rey, M; Lanteri, A; Salamon, G; Khalil, R

    1995-03-01

    We report a case of transient mutism and persistent auditory agnosia due to two successive ischemic infarcts mainly involving the insular cortex on both hemispheres. During the 'mutic' period, which lasted about 1 month, the patient did not respond to any auditory stimuli and made no effort to communicate. On follow-up examinations, language competences had re-appeared almost intact, but a massive auditory agnosia for non-verbal sounds was observed. From close inspection of lesion site, as determined with brain resonance imaging, and from a study of auditory evoked potentials, it is concluded that bilateral insular damage was crucial to both expressive and receptive components of the syndrome. The role of the insula in verbal and non-verbal communication is discussed in the light of anatomical descriptions of the pattern of connectivity of the insular cortex.

  15. Facio-brachio-crural dystonic episodes and drop attacks due to leucine rich glioma inactivated 1 encephalitis in two elderly Indian women

    Directory of Open Access Journals (Sweden)

    Boby Varkey Maramattom

    2013-01-01

    Full Text Available Two women in their 60′s are presented to us with sudden falls of acute onset. Prolonged observation revealed a gradually evolving syndrome of paroxysmal right sided faciobrachial dystonic (FBD posturing lasting seconds. Both patients went on to develop hyponatremia, following which the episodes worsened and appeared on both sides. In both cases, prolonged electroencephalography monitoring and magnetic resonance imaging brain were normal and the response to conventional anticonvulsants was poor. One patient improved spontaneously over 6 months. The 2 nd patient developed an amnestic syndrome and was started on intravenous methylprednisolone with which her movement disorder abated. Her amnestic syndrome improved and she was discharged on oral steroids. Both patients tested positive for leucine-rich glioma inactivated 1 (LGi1 antibodies. We present the first case reports of FBD episodes and drop attacks owing to LGi1 encephalitis from India and review the relevant literature pertinent to the subject.

  16. Facio-brachio-crural dystonic episodes and drop attacks due to leucine rich glioma inactivated 1 encephalitis in two elderly Indian women.

    Science.gov (United States)

    Maramattom, Boby Varkey; Jeevanagi, Sachin Rajashekar; George, Celinamma

    2013-10-01

    Two women in their 60's are presented to us with sudden falls of acute onset. Prolonged observation revealed a gradually evolving syndrome of paroxysmal right sided faciobrachial dystonic (FBD) posturing lasting seconds. Both patients went on to develop hyponatremia, following which the episodes worsened and appeared on both sides. In both cases, prolonged electroencephalography monitoring and magnetic resonance imaging brain were normal and the response to conventional anticonvulsants was poor. One patient improved spontaneously over 6 months. The 2(nd) patient developed an amnestic syndrome and was started on intravenous methylprednisolone with which her movement disorder abated. Her amnestic syndrome improved and she was discharged on oral steroids. Both patients tested positive for leucine-rich glioma inactivated 1 (LGi1) antibodies. We present the first case reports of FBD episodes and drop attacks owing to LGi1 encephalitis from India and review the relevant literature pertinent to the subject.

  17. Probabilistic analysis and fatigue damage assessment of offshore mooring system due to non-Gaussian bimodal tension processes

    Science.gov (United States)

    Chang, Anteng; Li, Huajun; Wang, Shuqing; Du, Junfeng

    2017-08-01

    Both wave-frequency (WF) and low-frequency (LF) components of mooring tension are in principle non-Gaussian due to nonlinearities in the dynamic system. This paper conducts a comprehensive investigation of applicable probability density functions (PDFs) of mooring tension amplitudes used to assess mooring-line fatigue damage via the spectral method. Short-term statistical characteristics of mooring-line tension responses are firstly investigated, in which the discrepancy arising from Gaussian approximation is revealed by comparing kurtosis and skewness coefficients. Several distribution functions based on present analytical spectral methods are selected to express the statistical distribution of the mooring-line tension amplitudes. Results indicate that the Gamma-type distribution and a linear combination of Dirlik and Tovo-Benasciutti formulas are suitable for separate WF and LF mooring tension components. A novel parametric method based on nonlinear transformations and stochastic optimization is then proposed to increase the effectiveness of mooring-line fatigue assessment due to non-Gaussian bimodal tension responses. Using time domain simulation as a benchmark, its accuracy is further validated using a numerical case study of a moored semi-submersible platform.

  18. Honey bee (Apis mellifera) drones survive oxidative stress due to increased tolerance instead of avoidance or repair of oxidative damage.

    Science.gov (United States)

    Li-Byarlay, Hongmei; Huang, Ming Hua; Simone-Finstrom, Michael; Strand, Micheline K; Tarpy, David R; Rueppell, Olav

    2016-10-01

    Oxidative stress can lead to premature aging symptoms and cause acute mortality at higher doses in a range of organisms. Oxidative stress resistance and longevity are mechanistically and phenotypically linked; considerable variation in oxidative stress resistance exists among and within species and typically covaries with life expectancy. However, it is unclear whether stress-resistant, long-lived individuals avoid, repair, or tolerate molecular damage to survive longer than others. The honey bee (Apis mellifera L.) is an emerging model system that is well-suited to address this question. Furthermore, this species is the most economically important pollinator, whose health may be compromised by pesticide exposure, including oxidative stressors. Here, we develop a protocol for inducing oxidative stress in honey bee males (drones) via Paraquat injection. After injection, individuals from different colony sources were kept in common social conditions to monitor their survival compared to saline-injected controls. Oxidative stress was measured in susceptible and resistant individuals. Paraquat drastically reduced survival but individuals varied in their resistance to treatment within and among colony sources. Longer-lived individuals exhibited higher levels of lipid peroxidation than individuals dying early. In contrast, the level of protein carbonylation was not significantly different between the two groups. This first study of oxidative stress in male honey bees suggests that survival of an acute oxidative stressor is due to tolerance, not prevention or repair, of oxidative damage to lipids. It also demonstrates colony differences in oxidative stress resistance that might be useful for breeding stress-resistant honey bees. Copyright © 2016 Elsevier Inc. All rights reserved.

  19. Studies on sulfate attack: Mechanisms, test methods, and modeling

    Science.gov (United States)

    Santhanam, Manu

    The objective of this research study was to investigate various issues pertaining to the mechanism, testing methods, and modeling of sulfate attack in concrete. The study was divided into the following segments: (1) effect of gypsum formation on the expansion of mortars, (2) attack by the magnesium ion, (3) sulfate attack in the presence of chloride ions---differentiating seawater and groundwater attack, (4) use of admixtures to mitigate sulfate attack---entrained air, sodium citrate, silica fume, and metakaolin, (5) effects of temperature and concentration of the attack solution, (6) development of new test methods using concrete specimens, and (7) modeling of the sulfate attack phenomenon. Mortar specimens using portland cement (PC) and tricalcium silicate (C 3S), with or without mineral admixtures, were prepared and immersed in different sulfate solutions. In addition to this, portland cement concrete specimens were also prepared and subjected to complete and partial immersion in sulfate solutions. Physical measurements, chemical analyses and microstructural studies were performed periodically on the specimens. Gypsum formation was seen to cause expansion of the C3S mortar specimens. Statistical analyses of the data also indicated that the quantity of gypsum was the most significant factor controlling the expansion of mortar bars. The attack by magnesium ion was found to drive the reaction towards the formation of brucite. Decalcification of the C-S-H and its subsequent conversion to the non-cementitious M-S-H was identified as the mechanism of destruction in magnesium sulfate attack. Mineral admixtures were beneficial in combating sodium sulfate attack, while reducing the resistance to magnesium sulfate attack. Air entrainment did not change the measured physical properties, but reduced the visible distress of the mortars. Sodium citrate caused a substantial reduction in the rate of damage of the mortars due to its retarding effect. Temperature and

  20. Early perception of stink bug damage in developing seeds of field-grown soybean induces chemical defences and reduces bug attack.

    Science.gov (United States)

    Giacometti, Romina; Barneto, Jesica; Barriga, Lucia G; Sardoy, Pedro M; Balestrasse, Karina; Andrade, Andrea M; Pagano, Eduardo A; Alemano, Sergio G; Zavala, Jorge A

    2016-08-01

    Southern green stink bugs (Nezara viridula L.) invade field-grown soybean crops, where they feed on developing seeds and inject phytotoxic saliva, which causes yield reduction. Although leaf responses to herbivory are well studied, no information is available about the regulation of defences in seeds. This study demonstrated that mitogen-activated protein kinases MPK3, MPK4 and MPK6 are expressed and activated in developing seeds of field-grown soybean and regulate a defensive response after stink bug damage. Although 10-20 min after stink bug feeding on seeds induced the expression of MPK3, MPK6 and MPK4, only MPK6 was phosphorylated after damage. Herbivory induced an early peak of jasmonic acid (JA) accumulation and ethylene (ET) emission after 3 h in developing seeds, whereas salicylic acid (SA) was also induced early, and at increasing levels up to 72 h after damage. Damaged seeds upregulated defensive genes typically modulated by JA/ET or SA, which in turn reduced the activity of digestive enzymes in the gut of stink bugs. Induced seeds were less preferred by stink bugs. This study shows that stink bug damage induces seed defences, which is perceived early by MPKs that may activate defence metabolic pathways in developing seeds of field-grown soybean. © 2015 Society of Chemical Industry. © 2015 Society of Chemical Industry.

  1. In field damage of high and low cyanogenic cassava due to a generalist insect herbivore Cyrtomenus bergi (Hemiptera: Cydnidae).

    Science.gov (United States)

    Riis, Lisbeth; Bellotti, Anthony Charles; Castaño, Oscar

    2003-12-01

    The hypothesis that cyanogenic potential in cassava roots deters polyphagous insects in the field is relevant to current efforts to reduce or eliminate the cyanogenic potential in cassava. To test this hypothesis, experiments were conducted in the field under natural selection pressure of the polyphagous root feeder Cyrtomenus bergi Froeschner (Hemiptera: Cydnidae). A number of cassava varieties (33) as well as 13 cassava siblings and their parental clone, each representing a determined level of cyanogenic potential (CNP), were scored for damage caused by C. bergi and related to CNP and nonglycosidic cyanogens, measured as hydrogen cyanide. Additionally, 161 low-CNP varieties (Agricultura Tropical (CIAT) were screened for resistance/tolerance to C. bergi. Low root damage scores were registered at all levels of CNP. Nevertheless, CNP and yield (or root size) partly explained the damage in cassava siblings (r2 = 0.82) and different cassava varieties (r2 = 0.42), but only when mean values of damage scores were used. This relation was only significant in one of two crop cycles. A logistic model describes the underlying negative relation between CNP and damage. An exponential model describes the underlying negative relation between root size and damage. Damage, caused by C. bergi feeding, released nonglycosidic cyanogens, and an exponential model fits the underlying positive relation. Fifteen low-CNP clones were selected for potential resistance/tolerance against C. bergi.

  2. Changing risk of spring frost damage in grapevines due to climate change? A case study in the Swiss Rhone Valley

    Science.gov (United States)

    Meier, Michael; Fuhrer, Jürg; Holzkämper, Annelie

    2018-01-01

    Late spring frost is a severe risk during early plant development. It may cause important economic damage to grapevine production. In a warming climate, late frost risk either could decline due to the reduction in frost days and an advancement of the last day of frost or increase due to a more pronounced shift forward of the start of the active growing period of the plants. These possibilities were analyzed in a case study for two locations in the lower Swiss Rhone Valley (Sion, Aigle) where viticulture is an important part of agriculture. Twelve phenology models were calibrated for the developmental stage BBCH09 (bud burst) using measured or reconstructed temperature data for two vineyards in Changins (1958 to 2012) and Leytron (1977 to 2014) together with observed phenological data. The day of year (DOY) for BBCH09 was then modelled for the years 1951 to 2050 using the best performing phenology model in combination with ten downscaled and bias-corrected climate scenarios. A 100-day period starting with BBCH09 was defined, during which daily mean and minimum temperatures were used to calculate three frost risk indices in each year. These indices were compared between the periods 1961-1990 (reference) and 2021-2050 (climate change scenario). Based on the average of the ensemble of climate model chains, BBCH09 advanced by 9 (range 7-11) (Aigle) and 7 (range 5-8) (Sion) days between the two time periods, similar to the shift in the last day of frost. The separate results of the different model chains suggest that, in the near future, late spring frost risk may increase or decrease, depending on location and climate change projections. While for the reference, the risk is larger at the warmer site (Sion) compared to that at the cooler site (Aigle), for the period 2021-2050, small shifts in both phenology and occurrence of frost (i.e., days with daily minimum temperature below 0 °C) lead to a small decrease in frost risk at the warmer but an increase at the cooler

  3. Changing risk of spring frost damage in grapevines due to climate change? A case study in the Swiss Rhone Valley.

    Science.gov (United States)

    Meier, Michael; Fuhrer, Jürg; Holzkämper, Annelie

    2018-06-01

    Late spring frost is a severe risk during early plant development. It may cause important economic damage to grapevine production. In a warming climate, late frost risk either could decline due to the reduction in frost days and an advancement of the last day of frost or increase due to a more pronounced shift forward of the start of the active growing period of the plants. These possibilities were analyzed in a case study for two locations in the lower Swiss Rhone Valley (Sion, Aigle) where viticulture is an important part of agriculture. Twelve phenology models were calibrated for the developmental stage BBCH09 (bud burst) using measured or reconstructed temperature data for two vineyards in Changins (1958 to 2012) and Leytron (1977 to 2014) together with observed phenological data. The day of year (DOY) for BBCH09 was then modelled for the years 1951 to 2050 using the best performing phenology model in combination with ten downscaled and bias-corrected climate scenarios. A 100-day period starting with BBCH09 was defined, during which daily mean and minimum temperatures were used to calculate three frost risk indices in each year. These indices were compared between the periods 1961-1990 (reference) and 2021-2050 (climate change scenario). Based on the average of the ensemble of climate model chains, BBCH09 advanced by 9 (range 7-11) (Aigle) and 7 (range 5-8) (Sion) days between the two time periods, similar to the shift in the last day of frost. The separate results of the different model chains suggest that, in the near future, late spring frost risk may increase or decrease, depending on location and climate change projections. While for the reference, the risk is larger at the warmer site (Sion) compared to that at the cooler site (Aigle), for the period 2021-2050, small shifts in both phenology and occurrence of frost (i.e., days with daily minimum temperature below 0 °C) lead to a small decrease in frost risk at the warmer but an increase at the cooler

  4. Electron Microscopy Study of Stainless Steel Radiation Damage Due to Long-Term Irradation by Alpha Particles Emitted From Plutonium

    Energy Technology Data Exchange (ETDEWEB)

    Unlu, Kenan [Univ. of Texas, Austin, TX (United States); Rios-Martinez, Carlos [Univ. of Texas, Austin, TX (United States); Saglam, Mehmet [Univ. of Texas, Austin, TX (United States); Hart, Ron R. [Texas A & M Univ., College Station, TX (United States); Shipp, John D. [Texas A & M Univ., College Station, TX (United States); Rennie, John [Texas A & M Univ., College Station, TX (United States)

    1998-04-16

    Radiation damage and associated surface and microstructural changes produced in stainless steel encapsulation by high-fluence alpha particle irradiations from weapons-grade plutonium of 316-stainless steel are being investigated.

  5. DEPENDENCE OF DISTRIBUTION FUNCTION OF COMMERCIAL DAMAGES DUE TO POSSIBLE EARTHQUAKES ON THE CLASS OF SEISMIC RESISTANCE OF A BUILDING

    Directory of Open Access Journals (Sweden)

    Hanzada R. Zajnulabidova

    2017-01-01

    Full Text Available Abstract. Objectives To determine the damage probability of earthquakes of different intensities on the example of a real projected railway station building having a framework design scheme based on the density function of damage distribution. Methods Uncertainty, always existing in nature, invalidates a deterministic approach to the assessment of territorial seismic hazards and, consequently, seismic risk. In this case, seismic risk assessment can be carried out on a probabilistic basis. Thus, the risk will always be there, but it must be minimised. The task of optimising the reinforcement costs is solved by using the density distribution function for seismic effects of varying intensity, taking into account the degree of building responsibility. Results The distribution functions of the expected damage for a building with a reinforced concrete frame located in a highly seismic region with a repetition of 9-point shocks every 500 years and 10-point shocks once every 5000 years are constructed. A significant effect of the seismic resistance class of a building on the form of the distribution functions is shown. For structures of a high seismic resistance class, not only is the seismic risk reduced, but also the variance of the expected damage. From the graphs obtained, it can be seen that the seismic resistance class significantly affects the damage distribution. At a probability of 0.997, the expected damage for a non-reinforced building will exceed 43%; for a reinforced one it is only 10%. It also follows from the graphs that the variance of the damage magnitude decreases with the growth of the seismic resistance class of the building. This fact is an additional incentive for investing in antiseismic reinforcement of buildings. Conclusion The study shows the expediency of working with the damage density distribution function when managing seismic risk. In this case, it becomes possible to strengthen the building with a specified probability of

  6. DEPENDENCE OF DISTRIBUTION FUNCTION OF COMMERCIAL DAMAGES DUE TO POSSIBLE EARTHQUAKES ON THE CLASS OF SEISMIC RESISTANCE OF A BUILDING

    OpenAIRE

    Hanzada R. Zajnulabidova; Alexander M. Uzdin; Tatiana M. Chirkst

    2017-01-01

    Abstract. Objectives To determine the damage probability of earthquakes of different intensities on the example of a real projected railway station building having a framework design scheme based on the density function of damage distribution. Methods Uncertainty, always existing in nature, invalidates a deterministic approach to the assessment of territorial seismic hazards and, consequently, seismic risk. In this case, seismic risk assessment can be carried out on a probabilistic basis. Thu...

  7. Developing a virtualised testbed environment in preparation for testing of network based attacks

    CSIR Research Space (South Africa)

    Van Heerden, RP

    2013-11-01

    Full Text Available Computer network attacks are difficult to simulate due to the damage they may cause to live networks and the complexity required simulating a useful network. We constructed a virtualised network within a vSphere ESXi environment which is able...

  8. Quantitative assessment of intergranular damage due to PWR primary water exposure in structural Ni-based alloys

    International Nuclear Information System (INIS)

    Ter-Ovanessian, Benoît; Deleume, Julien; Cloué, Jean-Marc; Andrieu, Eric

    2013-01-01

    Highlights: ► IG damage occurred on Ni-base alloys during exposure at high temperature water. ► Two characterization methods yield a tomographic analysis of this IG damage. ► Connected or isolated intergranular oxygen/oxide penetrations are quantified. ► Such quantitative description provides information on IGSCC susceptibility. - Abstract: Two nickel-based alloys, alloy 718 and alloy 600, known to have different resistances to IGSCC, were exposed to a simulated PWR primary water environment at 360 °C for 1000 h. The intergranular oxidation damage was analyzed in detail using an original approach involving two characterization methods (Incremental Mechanical Polishing/Microcopy procedure and SIMS imaging) which yielded a tomographic analysis of the damage. Intergranular oxygen/oxide penetrations occurred either as connected or isolated penetrations deep under the external oxide/substrate interface as far as 10 μm for alloy 600 and only 4 μm for alloy 718. Therefore, assessing this damage precisely is essential to interpret IGSCC susceptibility.

  9. ESTIMATION OF DAMAGED AREAS DUE TO THE 2010 CHILE EARTHQUAKE AND TSUNAMI USING SAR IMAGERY OF ALOS/PALSAR

    Directory of Open Access Journals (Sweden)

    P. J. Ni Made

    2016-06-01

    Full Text Available A large-scale earthquake and tsunami affect thousands of people and cause serious damages worldwide every year. Quick observation of the disaster damage is extremely important for planning effective rescue operations. In the past, acquiring damage information was limited to only field surveys or using aerial photographs. In the last decade, space-borne images were used in many disaster researches, such as tsunami damage detection. In this study, SAR data of ALOS/PALSAR satellite images were used to estimate tsunami damage in the form of inundation areas in Talcahuano, the area near the epicentre of the 2010 Chile earthquake. The image processing consisted of three stages, i.e. pre-processing, analysis processing, and post-processing. It was conducted using multi-temporal images before and after the disaster. In the analysis processing, inundation areas were extracted through the masking processing. It consisted of water masking using a high-resolution optical image of ALOS/AVNIR-2 and elevation masking which built upon the inundation height using DEM image of ASTER-GDEM. The area result was 8.77 Km2. It showed a good result and corresponded to the inundation map of Talcahuano. Future study in another area is needed in order to strengthen the estimation processing method.

  10. Evaluation of creep damage due to stress relaxation in SA533 grade B class 1 and SA508 class 3 pressure vessel steels

    International Nuclear Information System (INIS)

    Hoffmann, C.L.; Urko, W.

    1993-01-01

    Creep damage can result from stress relaxation of residual stresses in components when exposed to high temperature thermal cycles. Pressure vessels, such as the reactor vessel of the modular high-temperature gas reactor (MHTGR), which normally operate at temperatures well below the creep range can develop relatively high residual stresses in high stress locations. During short term excursions to elevated-temperatures, creep damage can be produced by the loadings on the vessel. In addition, residual stresses will relax out, causing greater creep damage in the pressure vessel material than might otherwise be calculated. The evaluation described in this paper assesses the magnitude of the creep damage due to relaxation of residual stresses resulting from short term exposure of the pressure vessel material to temperatures in the creep range. Creep relaxation curves were generated for SA533 Grade B, Class 1 and SA508 Class 3 pressure vessel steels using finite element analysis of a simple uniaxial truss loaded under constant strain conditions to produce an initial axial stress equal to 1.25 times the material yield strength at temperature. The strain is held constant for 1000 hours at prescribed temperatures from 700 F to 1000 F. The material creep law is used to calculate the relaxed stress for each time increment. The calculated stress relaxation versus time curves are compared with stress relaxation test data. Creep damage fractions are calculated by integrating the stress relaxation versus time curves and performing a linear creep damage summation using the minimum stress to rupture curves at the respective relaxation temperatures. Cumulative creep damage due to stress relaxation as a function of time and temperature is derived from the linear damage summation

  11. Marine Attack on Towed Hydrophone Arrays

    National Research Council Canada - National Science Library

    Kalmijn, Ad

    2002-01-01

    The original objective of the SIO Marine Attack project was to identify the electric and magnetic fields causing sharks to inflict serious damage upon the towed hydrophone arrays of US Navy submarines...

  12. Analysis of core damage frequency due to external events at the DOE [Department of Energy] N-Reactor

    International Nuclear Information System (INIS)

    Lambright, J.A.; Bohn, M.P.; Daniel, S.L.; Baxter, J.T.; Johnson, J.J.; Ravindra, M.K.; Hashimoto, P.O.; Mraz, M.J.; Tong, W.H.; Conoscente, J.P.; Brosseau, D.A.

    1990-11-01

    A complete external events probabilistic risk assessment has been performed for the N-Reactor power plant, making full use of all insights gained during the past ten years' developments in risk assessment methodologies. A detailed screening analysis was performed which showed that all external events had negligible contribution to core damage frequency except fires, seismic events, and external flooding. A limited scope analysis of the external flooding risk indicated that it is not a major risk contributor. Detailed analyses of the fire and seismic risks resulted in total (mean) core damage frequencies of 1.96E-5 and 4.60E-05 per reactor year, respectively. Detailed uncertainty analyses were performed for both fire and seismic risks. These results show that the core damage frequency profile for these events is comparable to that found for existing commercial power plants if proposed fixes are completed as part of the restart program. 108 refs., 85 figs., 80 tabs

  13. Analysis of core damage frequency due to external events at the DOE (Department of Energy) N-Reactor

    Energy Technology Data Exchange (ETDEWEB)

    Lambright, J.A.; Bohn, M.P.; Daniel, S.L. (Sandia National Labs., Albuquerque, NM (USA)); Baxter, J.T. (Westinghouse Hanford Co., Richland, WA (USA)); Johnson, J.J.; Ravindra, M.K.; Hashimoto, P.O.; Mraz, M.J.; Tong, W.H.; Conoscente, J.P. (EQE, Inc., San Francisco, CA (USA)); Brosseau, D.A. (ERCE, Inc., Albuquerque, NM (USA))

    1990-11-01

    A complete external events probabilistic risk assessment has been performed for the N-Reactor power plant, making full use of all insights gained during the past ten years' developments in risk assessment methodologies. A detailed screening analysis was performed which showed that all external events had negligible contribution to core damage frequency except fires, seismic events, and external flooding. A limited scope analysis of the external flooding risk indicated that it is not a major risk contributor. Detailed analyses of the fire and seismic risks resulted in total (mean) core damage frequencies of 1.96E-5 and 4.60E-05 per reactor year, respectively. Detailed uncertainty analyses were performed for both fire and seismic risks. These results show that the core damage frequency profile for these events is comparable to that found for existing commercial power plants if proposed fixes are completed as part of the restart program. 108 refs., 85 figs., 80 tabs.

  14. Modeling the yield of double-strand breaks due to formation of multiply damaged sites in irradiated plasmid DNA

    International Nuclear Information System (INIS)

    Xapsos, M.A.; Pogozelski, W.K.

    1996-01-01

    Although double-strand breaks have long been recognized as an important type of DNa lesion, it is well established that this broad class of damage does not correlate well with indicators of the effectiveness of radiation as the cellular level. Assays of double-strand breaks do not distinguish the degree of complexity or clustering of singly damaged sites produced in a single energy deposition event, which is currently hypothesized to be key to understanding cellular end points. As a step toward this understanding, double-strand breaks that are formed proportionally to dose in plasmid DNA are analyzed from the mechanistic aspect to evaluate the yield that arises from multiply damaged sites as hypothesized by Ward (Prog. Nucleic Acid Res. Mol. Biol. 35, 95-125, 1988) and Goodhead (Int. J. Radiat. Biol. 65, 7-17, 1994) as opposed to the yield that arises form single hydroxyl radicals as hypothesized by Siddiqi and Bothe (Radiat. Res. 112, 449-463, 1987). For low-LET radiation such as γ rays, the importance of multiply damaged sites is shown to increase with the solution's hydroxyl radical scavenging capacity. For moderately high-LET radiation such as 100 keV/μm helium ions, a much different behavior is observed. In this case, a large fraction of double-strand breaks are formed as a result of multiply damaged sties over a broad range of scavenging conditions. Results also indicate that the RBE for common cellular end points correlates more closely with the RBE for common cellular end points correlates more closely with the RBE for multiply damaged sites than with the RBE for total double-strand breaks over a range of LET up to at least 100 keV/μm. 22 refs., 3 figs., 2 tabs

  15. Effects of high repetition rate and beam size on hard tissue damage due to subpicosecond laser pulses

    International Nuclear Information System (INIS)

    Kim, Beop-Min; Feit, Michael D.; Rubenchik, Alexander M.; Joslin, Elizabeth J.; Eichler, Juergen; Stoller, Patrick C.; Da Silva, Luiz B.

    2000-01-01

    We report the effects of the repetition rate and the beam size on the threshold for ultrashort laser pulse induced damage in dentin. The observed results are explained as cumulative thermal effects. Our model is consistent with the experimental results and explains the dependence of the threshold on repetition rate, beam size, and exposure time. (c) 2000 American Institute of Physics

  16. Classifying network attack scenarios using an ontology

    CSIR Research Space (South Africa)

    Van Heerden, RP

    2012-03-01

    Full Text Available ) or to the target?s reputation. The Residue sub-phase refers to damage or artefacts of the attack that occur after the attack goal has been achieved, and occurs because the attacker loses control of some systems. For example after the launch of a DDOS..., A. (1995). Hacking theft of $10 million from citibank revealed. Retrieved 10/10, 2011, from http://articles.latimes.com/1995-08-19/business/fi-36656_1_citibank-system Hurley, E. (2004). SCO site succumbs to DDoS attack. Retrieved 10/10, 2011, from...

  17. Heart Attack Recovery FAQs

    Science.gov (United States)

    ... recommendations to make a full recovery. View an animation of a heart attack . Heart Attack Recovery Questions ... Support Network Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...

  18. Core damage vulnerability due to the loss of ESW [essential service water] systems at multiplant sites: An assessment and options

    International Nuclear Information System (INIS)

    Kohut, P.; Musicki, Z.; Fitzpatrick, R.

    1989-01-01

    The main objective of this study is to establish the core damage vulnerability caused by the failure of the ESW systems in multiplant units that have only two sw pumps per unit with crosstie capability. Design and operating data have been surveyed to derive system failure frequency. A core damage model is constructed including operating configurations, specific recovery actions, and time and leak rate dependent RCP seal LOCA model. The estimated CDF SW = 2.55 x 10 -4 /yr is significant indicating the potential vulnerability of this particular SW design arrangement. A number of different potential improvements have been considered. The addition of a swing pump serving both units is shown to have the most significant CDF reduction potential (∼50%) combined with advantageous cost/benefit aspects. 2 refs., 2 tabs

  19. Attenuation of radiation-induced DNA damage due to paracrine interactions between normal human epithelial and stromal cells

    International Nuclear Information System (INIS)

    Saenko, V.A.; Nakazawa, Yu.; Rogounovitch, T.I.; Suzuki, K.; Mitsutake, N.; Matsuse, M.; Yamashita, S.

    2007-01-01

    Complete text of publication follows. Objective: Developmentally, every tissue accommodates different types of cells, such as epitheliocytes and stromal cells in parenchymal organs. To better understand the complexity of radiation response, it is necessary to evaluate possible cross-talk between different tissue components. This work was set out to investigate reciprocal influence of normal human epithelial cells and fibroblasts on the extent of radiation-induced DNA damage. Methods: Model cultures of primary human thyrocytes (PT), normal diploid fibroblasts (BJ), PT/BJ cell co-culture and conditioned medium transfer were used to examine DNA damage in terms of γ-H2AX foci number per cell or by Comet assay after exposure to different doses of γ-rays. Results: In co-cultures, the kinetics of γ-H2AX foci number change was dose-dependent and similar to that in individual PT and BJ cultures. The number of γ-H2AX foci in co-cultures was significantly lower (∼25%) in both types of cells comparing to individual cultures. Reciprocal conditioned medium transfer to individual counterpart cells prior to irradiation resulted in approximately 35% reduction in the number γ-H2AX foci at 1 Gy and lower doses in both PT and BJ demonstrating the role of paracrine soluble factors. Comet assay corroborated the results of γ-H2AX foci counting in conditioned medium transfer experiments. In contrast to medium conditioned on PT cells, conditioned medium collected from several human thyroid cancer cell lines failed to establish DNA-protected state in BJ fibroblasts. In its turn, medium conditioned on BJ cells did not change the extent of radiation-induced DNA damage in cancer cell lines tested. Conclusion: The results imply the existence of a network of soluble factor-mediated paracrine interactions between normal epithelial and stromal cells that could be a part of natural mechanism by which cells protect DNA from genotoxic stress.

  20. Extent, perception and mitigation of damage due to high groundwater levels in the city of Dresden, Germany

    Directory of Open Access Journals (Sweden)

    H. Kreibich

    2009-07-01

    Full Text Available Flood risk analysis and management plans mostly neglect groundwater flooding, i.e. high groundwater levels. However, rising groundwater may cause considerable damage to buildings and infrastructure. To improve the knowledge about groundwater flooding and support risk management, a survey was undertaken in the city of Dresden (Saxony, Germany, resulting in 605 completed interviews with private households endangered by high groundwater levels. The reported relatively low flood impact and damage of groundwater floods in comparison with mixed floods was reflected by its scarce perception: Hardly anybody thinks about the risk of groundwater flooding. The interviewees thought that public authorities and not themselves, should be mainly responsible for preparedness and emergency response. Up to now, people do not include groundwater risk in their decision processes on self protection. The implementation of precautionary measures does not differ between households with groundwater or with mixed flood experience. However, less households undertake emergency measures when expecting a groundwater flood only. The state of preparedness should be further improved via an intensified risk communication about groundwater flooding by the authorities. Conditions to reach the endangered population are good, since 70% of the interviewed people are willing to inform themselves about groundwater floods. Recommendations for an improved risk communication are given.

  1. Aldh2 knockout mice were more sensitive to DNA damage in leukocytes due to ethyl tertiary butyl ether exposure.

    Science.gov (United States)

    Weng, Zuquan; Suda, Megumi; Ohtani, Katsumi; Mei, Nan; Kawamoto, Toshihiro; Nakajima, Tamie; Wang, Rui-Sheng

    2011-01-01

    To clarify the genotoxicity of ethyl tertiary butyl ether (ETBE), a gasoline additive, male and female C57BL/6 mice of Aldh2+/+ and Aldh2-/- genotypes, aged 8 wk, were exposed to 0, 500, 1,750, or 5,000 ppm ETBE for 6 h/day, 5 d per week for 13 wk. DNA damage in leukocytes was measured by the alkaline comet assay and expressed quantitatively as Tail Intensity (TI). For male mice, TI was significantly higher in all three groups exposed to ETBE than in those without exposure within Aldh2-/- mice, whereas within Aldh2+/+ mice, TI increased only in those exposed to 5,000 ppm of ETBE as compared with mice without exposure. For female mice, a significant increase in TI values was observed in the group exposed to 5,000 ppm of ETBE as compared with those without exposure within Aldh2-/- mice; TI in Aldh2-/- mice exposed to 1,750 and 5,000 ppm was significantly higher than in Aldh2+/+ mice without exposure. TI did not significantly increase in any of the groups exposed to ETBE within female Aldh2+/+ mice. Based on the results we suggest that Aldh2-/- mice are more sensitive to DNA damage caused by ETBE than Aldh2+/+ mice and that males seem more susceptible to this effect than females.

  2. Potentiality of Melatonin as a Radiation Protector against Hemoglobin Damage in the Experimental Animals Due to Gamma Irradiation

    International Nuclear Information System (INIS)

    Farag, H.; Hassan, R. A.; Mohamed, Sh.

    2013-01-01

    Ionizing radiation causes serious damage in biological system. Some drugs and antioxidants are used to prevent such damage. In the present study two doses of melatonin (10 mg⁄kg and 30 mg⁄kg) were selected to be used for such purpose. The radioprotective effects of melatonin on hemoglobin of red blood cells from female mice was studied through UV absorption spectrum, ESR spectroscopy, dielectric measurements and relative viscosity .The results of Hemoglobin absorption indicate that a pronounced increase in the average value of peak position and width at half maximum W hmax followed by a decrease in the absorbance of sort band, decrease in absorption ratio A 578 / A 540 in addition to disappearance of globin band at 275 nm. The free radicals which are expected to be formed after exposing to γ-irradiation are detected by electron spin resonance spectroscopy (ESR). The results indicate that the intensity of ESR signal for hemoglobin extracted from animals exposed to γ- irradiation is greater as compared with normal hemoglobin. Dielectric measurements indicate that there is an increase in dielectric permittivity (ε‵), the dielectric loss (ε‶) and the a.c conductivity (σ ac ) while some decrease is noticed in the viscosity measurements after exposing to irradiation. The data obtained from the whole studied parameters after treating animals with melatonin become closer to those for unirradiated samples.

  3. WILD PIG ATTACKS ON HUMANS

    Energy Technology Data Exchange (ETDEWEB)

    Mayer, J.

    2013-04-12

    Attacks on humans by wild pigs (Sus scrofa) have been documented since ancient times. However, studies characterizing these incidents are lacking. In an effort to better understand this phenomenon, information was collected from 412 wild pig attacks on humans. Similar to studies of large predator attacks on humans, data came from a variety of sources. The various attacks compiled occurred in seven zoogeographic realms. Most attacks occurred within the species native range, and specifically in rural areas. The occurrence was highest during the winter months and daylight hours. Most happened under non-hunting circumstances and appeared to be unprovoked. Wounded animals were the chief cause of these attacks in hunting situations. The animals involved were typically solitary, male and large in size. The fate of the wild pigs involved in these attacks varied depending upon the circumstances, however, most escaped uninjured. Most human victims were adult males traveling on foot and alone. The most frequent outcome for these victims was physical contact/mauling. The severity of resulting injuries ranged from minor to fatal. Most of the mauled victims had injuries to only one part of their bodies, with legs/feet being the most frequent body part injured. Injuries were primarily in the form of lacerations and punctures. Fatalities were typically due to blood loss. In some cases, serious infections or toxemia resulted from the injuries. Other species (i.e., pets and livestock) were also accompanying some of the humans during these attacks. The fates of these animals varied from escaping uninjured to being killed. Frequency data on both non-hunting and hunting incidents of wild pig attacks on humans at the Savannah River Site, South Carolina, showed quantitatively that such incidents are rare.

  4. Denial of Service Attack Techniques: Analysis, Implementation and Comparison

    Directory of Open Access Journals (Sweden)

    Khaled Elleithy

    2005-02-01

    Full Text Available A denial of service attack (DOS is any type of attack on a networking structure to disable a server from servicing its clients. Attacks range from sending millions of requests to a server in an attempt to slow it down, flooding a server with large packets of invalid data, to sending requests with an invalid or spoofed IP address. In this paper we show the implementation and analysis of three main types of attack: Ping of Death, TCP SYN Flood, and Distributed DOS. The Ping of Death attack will be simulated against a Microsoft Windows 95 computer. The TCP SYN Flood attack will be simulated against a Microsoft Windows 2000 IIS FTP Server. Distributed DOS will be demonstrated by simulating a distribution zombie program that will carry the Ping of Death attack. This paper will demonstrate the potential damage from DOS attacks and analyze the ramifications of the damage.

  5. Attacks on computer systems

    Directory of Open Access Journals (Sweden)

    Dejan V. Vuletić

    2012-01-01

    Full Text Available Computer systems are a critical component of the human society in the 21st century. Economic sector, defense, security, energy, telecommunications, industrial production, finance and other vital infrastructure depend on computer systems that operate at local, national or global scales. A particular problem is that, due to the rapid development of ICT and the unstoppable growth of its application in all spheres of the human society, their vulnerability and exposure to very serious potential dangers increase. This paper analyzes some typical attacks on computer systems.

  6. A phenomenological approach to simulating the evolution of radioactive-waste container damage due to pitting corrosion

    International Nuclear Information System (INIS)

    Henshall, G.A.

    1995-01-01

    The damage to high-level radioactive-waste containers by pitting corrosion is an important design and performance assessment consideration. It is desirable to calculate the evolution of the pit depth distribution, not just the time required for initial penetration of the containers, so that the area available for advective of diffusive release of radionuclides through the container can be estimated. A phenomenological approach for computing the time evolution of these distributions is presented which combines elements of the deterministic and stochastic aspects of pit growth. The consistency of this approach with the mechanisms believed to control the evolution of the pit depth distribution is discussed. Qualitative comparisons of preliminary model predictions with a variety of experimental data from the literature are shown to be generally favorable. The sensitivity of the simulated distributions to changes in the input parameters is discussed. Finally, the results of the current model are compared to those of existing approaches based on extreme-value statistics, particularly regarding the extrapolation of laboratory data to large exposed surface areas

  7. Impact of prenatal antimicrobial treatment on fetal brain damage due to autogenous fecal peritonitis in Wistar rats: A Histomorphometric Study

    Directory of Open Access Journals (Sweden)

    Neylane Gadelha

    2017-10-01

    Full Text Available Purpose: To investigate brain neuronal density in newborn rats whose mothers were subjected to fecal peritonitis and compare findings between rats born to mothers treated and not treated with antimicrobials. Methods: Peritonitis was induced with a 10% fecal suspension (4mL/kg in 2 pregnant rats. Of these, 1 received antimicrobial treatment 24 hours after peritonitis induction: moxifloxacin and dexamethasone plus 2 mL of the inner bark of the Schinus terebinthifolius raddi extract. One pregnant rat underwent no intervention and served as a control. Results: The newborn brains of rats born to mothers with fecal peritonitis were significantly smaller and of less firm consistency. Brain neuronal density was lower in the untreated group than in the control and treated groups (P<0.01. Conclusions: Untreated peritonitis caused brain damage in the offspring, which was averted by effective early antimicrobial treatment. This approach may provide an early avenue for translation of such therapy in humans. Keywords: peritonitis, brain injuries, rats

  8. Improved clinicopathologic assessments of acute liver damage due to trauma in Indian ring-necked parakeets (Psittacula krameri manillensis).

    Science.gov (United States)

    Williams, Susan M; Holthaus, Lisa; Barron, Heather Wilson; Divers, Stephen J; McBride, Michael; Almy, Frederic; Bush, Sharon; Latimer, Kenneth S

    2012-06-01

    Increased activities of certain biochemical enzymes (alanine aminotransferase [ALT], aspartate aminotransferase [AST], lactate dehydrogenase [LDH], alkaline phosphatase [ALP]) have been associated with blunt liver injury in many species. To evaluate changes in plasma hepatic biochemical parameters in acute avian liver disease caused by trauma and to compare biochemical changes with histologic lesions in hepatic parenchyma, 30 healthy fasted Indian ring-necked parakeets (Psittacula krameri manillensis) were divided into 2 groups, and traumatic liver injury was caused by endoscopic liver biopsy (group 1) or by liver biopsy and crushing injury to the hepatic parenchyma with endoscopic forceps (group 2) in anesthetized birds. Blood samples were collected at baseline and at 12, 24, 36, 48, 60, 72, 84, 96, 108, and 120 hours in alternate groups to compare analyte values after injury with those at baseline. Results showed consistently decreased plasma ALP activity (excluding 1 time point) throughout the study, which was thought to be associated with isoflurane administration. Plasma glutamate dehydrogenase activity initially increased but rapidly declined thereafter and was attributed to acute focal hepatocellular injury. In both groups, increases in plasma AST, ALT, and LDH activities was most likely caused by muscle injury because creatine kinase activity was concurrently increased. Compared with baseline values, bile acid concentration and y-glutamyl transferase activity were not affected by liver biopsy or crush injury. Plasma sorbitol dehydrogenase activity was the most specific indicator of liver injury in both groups. Histologic changes correlated poorly with biochemical results, possibly because the small area of hepatic parenchyma that was damaged did not affect enzyme values substantially.

  9. Spatial Distribution of Adult Anthonomus grandis Boheman (Coleoptera: Curculionidae) and Damage to Cotton Flower Buds Due to Feeding and Oviposition.

    Science.gov (United States)

    Grigolli, J F J; Souza, L A; Fernandes, M G; Busoli, A C

    2017-08-01

    The cotton boll weevil Anthonomus grandis Boheman (Coleoptera: Curculionidae) is the main pest in cotton crop around the world, directly affecting cotton production. In order to establish a sequential sampling plan, it is crucial to understand the spatial distribution of the pest population and the damage it causes to the crop through the different developmental stages of cotton plants. Therefore, this study aimed to investigate the spatial distribution of adults in the cultivation area and their oviposition and feeding behavior throughout the development of the cotton plants. The experiment was conducted in Maracaju, Mato Grosso do Sul, Brazil, in the 2012/2013 and 2013/2014 growing seasons, in an area of 10,000 m 2 , planted with the cotton cultivar FM 993. The experimental area was divided into 100 plots of 100 m 2 (10 × 10 m) each, and five plants per plot were sampled weekly throughout the crop cycle. The number of flower buds with feeding and oviposition punctures and of adult A. grandis was recorded throughout the crop cycle in five plants per plot. After determining the aggregation indices (variance/mean ratio, Morisita's index, exponent k of the negative binomial distribution, and Green's coefficient) and adjusting the frequencies observed in the field to the distribution of frequencies (Poisson, negative binomial, and positive binomial) using the chi-squared test, it was observed that flower buds with punctures derived from feeding, oviposition, and feeding + oviposition showed an aggregated distribution in the cultivation area until 85 days after emergence and a random distribution after this stage. The adults of A. grandis presented a random distribution in the cultivation area.

  10. Treatment of skin damage due to irradiation and post-irradiation skin tumours, at the Hornheide special clinic

    International Nuclear Information System (INIS)

    Drepper, H.

    1987-01-01

    A short precis of 54 years of history of the Hornheide special clinic for tumours, tuberculosis, and plastic surgery of face and skin is followed by a description of the current tasks of the clinic as an interdisciplinary center for plastic surgery and rehabilitation with facilities for tumour surgery, radiotherapy, skin and tissue pathology, and psychotherapy. Important special areas of this interdisciplinary cooperation are the treatment of skin disorders due to radiation and of tumours on irradiated skin, as well as treatment and plastic surgery after removal of tumours by irradiation in order to make the affected areas fit for renewed irradiation. (TRV) [de

  11. Defense and attack of complex and dependent systems

    International Nuclear Information System (INIS)

    Hausken, Kjell

    2010-01-01

    A framework is constructed for how to analyze the strategic defense of an infrastructure subject to attack by a strategic attacker. Merging operations research, reliability theory, and game theory for optimal analytical impact, the optimization program for the defender and attacker is specified. Targets can be in parallel, series, combined series-parallel, complex, k-out-of-n redundancy, independent, interdependent, and dependent. The defender and attacker determine how much to invest in defending versus attacking each of multiple targets. A target can have economic, human, and symbolic values, subjectively assessed by the defender and attacker. A contest success function determines the probability of a successful attack on each target, dependent on the investments by the defender and attacker into each target, and on characteristics of the contest. The defender minimizes the expected damage plus the defense costs. The attacker maximizes the expected damage minus the attack costs. Each agent is concerned about how his investments vary across the targets, and the impact on his utilities. Interdependent systems are analyzed where the defense and attack on one target impacts all targets. Dependent systems are analyzed applying Markov analysis and repeated games where a successful attack on one target in the first period impacts the unit costs of defense and attack, and the contest intensity, for the other target in the second period.

  12. Defense and attack of complex and dependent systems

    Energy Technology Data Exchange (ETDEWEB)

    Hausken, Kjell, E-mail: kjell.hausken@uis.n [Faculty of Social Sciences, University of Stavanger, N-4036 Stavanger (Norway)

    2010-01-15

    A framework is constructed for how to analyze the strategic defense of an infrastructure subject to attack by a strategic attacker. Merging operations research, reliability theory, and game theory for optimal analytical impact, the optimization program for the defender and attacker is specified. Targets can be in parallel, series, combined series-parallel, complex, k-out-of-n redundancy, independent, interdependent, and dependent. The defender and attacker determine how much to invest in defending versus attacking each of multiple targets. A target can have economic, human, and symbolic values, subjectively assessed by the defender and attacker. A contest success function determines the probability of a successful attack on each target, dependent on the investments by the defender and attacker into each target, and on characteristics of the contest. The defender minimizes the expected damage plus the defense costs. The attacker maximizes the expected damage minus the attack costs. Each agent is concerned about how his investments vary across the targets, and the impact on his utilities. Interdependent systems are analyzed where the defense and attack on one target impacts all targets. Dependent systems are analyzed applying Markov analysis and repeated games where a successful attack on one target in the first period impacts the unit costs of defense and attack, and the contest intensity, for the other target in the second period.

  13. Effect of TSUMURA Saiboku-to as an agent for healing damage in treatment of radiomucositis due to irradiation of the head and neck area and mediastinum

    Energy Technology Data Exchange (ETDEWEB)

    Saito, Yoshihiro (Tatebayashi Kosei Hospital, Gunma (Japan)); Mitsuhashi, Norio; Takahashi, Iku (and others)

    1992-12-01

    A joint multicenter study was conducted on the utility of TSUMURA Saiboku-to as an agent for healing radiation damage in treatment of radiomucositis due to irradiation of the head and neck area and mediastinum, with the following results. In a comparison of each clinical symptom, efficacy in the TSUMURA Saiboku-to group was not clear, but an overall evaluation of the individual cases showed a significantly increased number of subjects with evaluations of effective or better in the administration group. No serious side effects were observed. (author).

  14. Terrorists and Suicide Attacks

    National Research Council Canada - National Science Library

    Cronin, Audrey K

    2003-01-01

    Suicide attacks by terrorist organizations have become more prevalent globally, and assessing the threat of suicide attacks against the United States and its interests at home and abroad has therefore...

  15. Solidarity under Attack

    DEFF Research Database (Denmark)

    Meret, Susi; Goffredo, Sergio

    2017-01-01

    https://www.opendemocracy.net/can-europe-make-it/susi-meret-sergio-goffredo/solidarity-under-attack......https://www.opendemocracy.net/can-europe-make-it/susi-meret-sergio-goffredo/solidarity-under-attack...

  16. Pericarditis - after heart attack

    Science.gov (United States)

    ... include: A previous heart attack Open heart surgery Chest trauma A heart attack that has affected the thickness of your heart muscle Symptoms Symptoms include: Anxiety Chest pain from the swollen pericardium rubbing on the ...

  17. Heart attack first aid

    Science.gov (United States)

    First aid - heart attack; First aid - cardiopulmonary arrest; First aid - cardiac arrest ... A heart attack occurs when the blood flow that carries oxygen to the heart is blocked. The heart muscle ...

  18. SCADA system vulnerabilities to cyber attack

    Energy Technology Data Exchange (ETDEWEB)

    Shaw, W. T. [Cyber Security Consulting (Canada)

    2004-10-01

    The susceptibility to terrorist attacks of computer-based supervisory control (SCADA) systems that are used to monitor and control water distribution systems, oil and gas pipelines and the electrical grid, is discussed. The discussion includes ways in which SCADA systems may be attacked and remedial actions that may be taken to reduce or eliminate the possibility of such attacks. Attacks may take the form of causing the system to generate false data to divert attention from impending system disasters, or commandeer the system to seriously disable it, or cause damage to the process or equipment being controlled by sending improper control commands. SCADA systems are also vulnerable to internal threats, either from an accidental action that results in damage, or an intentional action, as for example by a disgruntled employee, or ex-employee, usually by way of reprogramming an RTU or PLC by accessing the polling/communications circuit. Recent SCADA systems are much more susceptible to concerted cyber attacks because of the adoption of IT technologies and standards into the design of such systems. (Older systems are more likely to be unique designs, hence less susceptible to attack). As far as protection of SCADA systems is concerned, there are no technologies that would prevent a technologically sophisticated terrorist or disgruntled employee from doing major damage to the system, however, the IT world has developed a range of technologies for the protection of IT assets, and many of these same technologies can also be used to safeguard modern SCADA systems.

  19. Laboratory evaluation of resistance to moisture damage in asphalt mixtures

    Directory of Open Access Journals (Sweden)

    Ahmed Ebrahim Abu El-Maaty Behiry

    2013-09-01

    Full Text Available Moisture damage in asphalt mixtures refers to loss in strength and durability due to the presence of water. Egypt road network is showing severe deterioration such as raveling and stripping because the bond between aggregates and asphalt film is broken due to water intrusion. To minimize moisture damage, asphalt mixes are investigated to evaluate the effect of air voids, degree of saturation, media of attack and the conditioning period. Two medias of attack are considered and two anti-stripping additives are used (hydrated lime and Portland cement. The retained Marshall stability and tensile strength ratio are calculated to determine the resistance to moisture damage. The results showed that both lime and cement could increase Marshall stability, resilient modulus, tensile strength and resistance to moisture damage of mixtures especially at higher condition periods. Use of hydrated lime had better results than Portland cement.

  20. Estimation of core-damage frequency to evolutionary ALWR [advanced light water reactor] due to seismic initiating events: Task 4.3.3

    International Nuclear Information System (INIS)

    Brooks, R.D.; Harrison, D.G.; Summitt, R.L.

    1990-04-01

    The Electric Power Research Institute (EPRI) is presently developing a requirements document for the design of advanced light water reactors (ALWRs). One of the basic goals of the EPRI ALWR Requirements Document is that the core-damage frequency for an ALWR shall be less than 1.0E-5. To aid in this effort, the Department of Energy's Advanced Reactor Severe Accident Program (ARSAP) initiated a functional probabilistic risk assessment (PRA) to determine how effectively the evolutionary plant requirements contained in the existing EPRI Requirements Document assure that this safety goal will be met. This report develops an approximation of the core-damage frequency due to seismic events for both evolutionary plant designs (pressurized-water reactor (PWR) and boiling-water reactor(BWR)) as modeled in the corresponding functional PRAs. Component fragility values were taken directly form information which has been submitted for inclusion in Appendix A to Volume 1 of the EPRI Requirements Document. The results show a seismic core-damage frequency of 5.2E-6 for PWRS and 5.0E-6 for BWRs. Combined with the internal initiators from the functional PRAs, the overall core-damage frequencies are 6.0E-6 for the pwr and BWR, both of which satisfy the 1.0E-5 EPRI goal. In addition, site-specific considerations, such as more rigid components and less conservative fragility data and seismic hazard curves, may further reduce these frequencies. The effect of seismic events on structures are not addressed in this generic evaluation and should be addressed separately on a design-specific basis. 7 refs., 6 figs., 3 tabs

  1. Composite Dos Attack Model

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2012-04-01

    Full Text Available Preparation for potential threats is one of the most important phases ensuring system security. It allows evaluating possible losses, changes in the attack process, the effectiveness of used countermeasures, optimal system settings, etc. In cyber-attack cases, executing real experiments can be difficult for many reasons. However, mathematical or programming models can be used instead of conducting experiments in a real environment. This work proposes a composite denial of service attack model that combines bandwidth exhaustion, filtering and memory depletion models for a more real representation of similar cyber-attacks. On the basis of the introduced model, different experiments were done. They showed the main dependencies of the influence of attacker and victim’s properties on the success probability of denial of service attack. In the future, this model can be used for the denial of service attack or countermeasure optimization.

  2. Evaluating the Impact of Juice Filming Charging Attack in Practical Environments

    DEFF Research Database (Denmark)

    Meng, Weizhi; Lee, Wang; Liu, Zhe

    2018-01-01

    Nowadays, smartphones are widely adopted in people’s daily lives. With the increasing capability, phone charging has become a basic requirement and a large number of public charging facilitates are under construction for this purpose. However, public charging stations may open a hole for cyber-cr...... then for the first time investigate the impact of JFC attack under three practical scenarios. Our work aims to complement the state-of-the-art and stimulate more research in this area....... the whole charging period. Due to the potential damage of JFC attacks, there is a need to investigate its influence in practical scenarios. Motivated by this, in this work, we firstly conduct a large user survey with over 2500 participants about their awareness and attitude towards charging attacks. We......-criminals to launch various attacks, especially charging attacks, to steal phone user’s private information. Juice filming charging (JFC) attack is one such threat, which can refer users’ sensitive information from both Android OS and iOS devices, through automatically monitoring and recording phone screen during...

  3. Network resilience against intelligent attacks constrained by the degree-dependent node removal cost

    International Nuclear Information System (INIS)

    Annibale, A; Coolen, A C C; Bianconi, G

    2010-01-01

    We study the resilience of complex networks against attacks in which nodes are targeted intelligently, but where disabling a node has a cost to the attacker which depends on its degree. Attackers have to meet these costs with limited resources, which constrains their actions. A network's integrity is quantified in terms of the efficacy of the process that it supports. We calculate how the optimal attack strategy and the most attack-resistant network degree statistics depend on the node removal cost function and the attack resources. The resilience of networks against intelligent attacks is found to depend strongly on the node removal cost function faced by the attacker. In particular, if node removal costs increase sufficiently fast with the node degree, power law networks are found to be more resilient than Poissonian ones, even against optimized intelligent attacks. For cost functions increasing quadratically in the node degrees, intelligent attackers cannot damage the network more than random damages would.

  4. Web server attack analyzer

    OpenAIRE

    Mižišin, Michal

    2013-01-01

    Web server attack analyzer - Abstract The goal of this work was to create prototype of analyzer of injection flaws attacks on web server. Proposed solution combines capabilities of web application firewall and web server log analyzer. Analysis is based on configurable signatures defined by regular expressions. This paper begins with summary of web attacks, followed by detection techniques analysis on web servers, description and justification of selected implementation. In the end are charact...

  5. Radiological attacks and accidents. Medical consequences

    International Nuclear Information System (INIS)

    Sakuta, Hidenari

    2007-01-01

    Probability of the occurrence of radiological attacks appears to be elevated after the terrorist attacks against the United States on September 11 in 2001. There are a lot of scenarios of radiological attack: simple radiological device, radiological disperse device (RDD or dirty bomb), attacks against nuclear reactor, improvised nuclear device, and nuclear weapons. Of these, RDD attack is the most probable scenario, because it can be easily made and can generate enormous psychological and economic damages. Radiological incidents are occurring to and fro in the world, including several cases of theft to nuclear facilities and unsuccessful terrorist attacks against them. Recently, a former Russian spy has allegedly been killed using polonium-210. In addition, serious radiological accidents have occurred in Chernobyl, Goiania, and Tokai-mura. Planning, preparation, education, and training exercise appear to be essential factors to cope with radiological attacks and accidents effectively without feeling much anxiety. Triage and psychological first aid are prerequisite to manage and provide effective medial care for mass casualties without inducing panic. (author)

  6. Seven Deadliest Microsoft Attacks

    CERN Document Server

    Kraus, Rob; Borkin, Mike; Alpern, Naomi

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Microsoft products? Then you need Seven Deadliest Microsoft Attacks. This book pinpoints the most dangerous hacks and exploits specific to Microsoft applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Windows Operating System-Password AttacksActive Directory-Escalat

  7. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... stroke symptoms. Popular Topics TIA Cardiac Catheter Cholesterol Heart Attack Stent © 2018, American Heart Association, Inc. All rights reserved. Unauthorized use prohibited. ...

  8. Seven deadliest USB attacks

    CERN Document Server

    Anderson, Brian

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting USB technology? Then you need Seven Deadliest USB Attacks. This book pinpoints the most dangerous hacks and exploits specific to USB, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: USB Hacksaw USB Switchblade USB Based Virus/Malicous Code Launch USB Device Overflow RAMdum

  9. A Framework for Attack-Resilient Industrial Control Systems : Attack Detection and Controller Reconfiguration

    OpenAIRE

    Paridari, Kaveh; O'Mahony, Niamh; Mady, Alie El-Din; Chabukswar, Rohan; Boubekeur, Menouer; Sandberg, Henrik

    2017-01-01

    Most existing industrial control systems (ICSs), such as building energy management systems (EMSs), were installed when potential security threats were only physical. With advances in connectivity, ICSs are now, typically, connected to communications networks and, as a result, can be accessed remotely. This extends the attack surface to include the potential for sophisticated cyber attacks, which can adversely impact ICS operation, resulting in service interruption, equipment damage, safety c...

  10. Optimal counterterrorism and the recruitment effect of large terrorist attacks

    DEFF Research Database (Denmark)

    Jensen, Thomas

    2011-01-01

    We analyze a simple dynamic model of the interaction between terrorists and authorities. Our primary aim is to study optimal counterterrorism and its consequences when large terrorist attacks lead to a temporary increase in terrorist recruitment. First, we show that an increase in counterterrorism...... makes it more likely that terrorist cells plan small rather than large attacks and therefore may increase the probability of a successful attack. Analyzing optimal counterterrorism we see that the recruitment effect makes authorities increase the level of counterterrorism after large attacks. Therefore......, in periods following large attacks a new attack is more likely to be small compared to other periods. Finally, we analyze the long-run consequences of the recruitment effect. We show that it leads to more counterterrorism, more small attacks, and a higher sum of terrorism damage and counterterrorism costs...

  11. Plants under dual attack

    NARCIS (Netherlands)

    Ponzio, C.A.M.

    2016-01-01

    Though immobile, plants are members of complex environments, and are under constant threat from a wide range of attackers, which includes organisms such as insect herbivores or plant pathogens. Plants have developed sophisticated defenses against these attackers, and include chemical responses

  12. Heart attack - discharge

    Science.gov (United States)

    ... and lifestyle Cholesterol - drug treatment Controlling your high blood pressure Deep vein thrombosis - discharge Dietary fats explained Fast food tips Heart attack - discharge Heart attack - what to ask your doctor Heart bypass ... pacemaker - discharge High blood pressure - what to ask your doctor How to read ...

  13. Effects of the addition of micro silica on the durability of mortars exposed to the sodium sulfate attack

    International Nuclear Information System (INIS)

    Nasser, C.; Meriam, M.

    2012-01-01

    This article presents a detailed experimental study on the sulfate attack of mortars of self compacting concrete, and the effectiveness of employs micro silica and limestone fillers in the minimization of the damage resulting from such an attack. The test solution used to supply the sulfate ions and the cations was the sodium sulfate solution 4.5%. The solution saturated with lime was employed as the reference solution. The main variables investigated in the study were the type of cement and mineral addition. The expansion measured on p rims of mortar of (40x40x160) millimeters was employed to estimate their durability after exposure to the sodium sulfate solution attack during 91 days-Specimens of mortars were visually examined to assess the extent of deterioration due to the sulfate attack. The x-ray diffraction was used to evaluate the microstructural nature of the sulfate attack. The test results proved that the use of micro silica had a beneficial effect on the expansion due to the sodium sulfate attack. While mortars with limestone filler have undergoes degradation even with the use of cement resistant to sulfates. (authors).

  14. A comparison between the performance degradation of 3T APS due to radiation exposure and the expected internal damage via Monte-Carlo Simulation

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Gi Yoon; Kim, Myung Soo; Lim, Kyung Taek; Lee, Eun Jung; Kim, Chan Kyu [Dept. of Nuclear and Quantum Engineering, KAIST, Daejeon (Korea, Republic of); Park, Jong Hwan [Luvantix ADM , Daejeon (Korea, Republic of)

    2015-02-15

    The trend of x-ray image sensor has been evolved from an amorphous silicon sensor to a crystal silicon sensor. A crystal silicon X-ray sensor, meaning a X-ray CIS (CMOS image sensor), is consisted of three transistors (Trs), i.e., a Reset Transistor, a Source Follower and a Select Transistor, and a photodiode. They are highly sensitive to radiation exposure. As the frequency of exposure to radiation increases, the quality of the imaging device dramatically decreases. The most well known effects of a X-ray CIS due to the radiation damage are increments in the reset voltage and dark currents. In this study, a pixel array of a X-ray CIS was made of 20×20 pixels and this pixel array was exposed to a high radiation dose. The radiation source was Co-60 and the total radiation dose was increased from 1 to 9 kGy with a step of 1 kGy. We irradiated the small pixel array to get the increments data of the reset voltage and the dark currents. Also, we simulated the radiation effects of the pixel by MCNP (Monte Carlo N-Particle) simulation. From the comparison of actual data and simulation data, the most affected location could be determined and the cause of the increments of the reset voltage and dark current could be found.

  15. A SEASONAL COMPARISON OF THE PHYSICAL DAMAGES ON RESIDUAL TREES AND SEEDLINGS DUE TO LOGGING OPERATION USING URUS MIII FOREST SKYLINE IN ARTVIN REGION

    OpenAIRE

    Habip Eroğlu; Ufuk Özcan Öztürk

    2008-01-01

    In this paper, the physical damages of logging activities using Urus MIII forest skylines on residual trees and seedlings were evaluated through comparison between harvesting operations took place in winter and summer seasons in Artvin region. In order to achieve our aims, both in winter and summer, 4 representative plots were taken in the harvesting areas using Urus MIII skyline. Physical damages caused by logging to residual trees and seedling were noted. Damage classes for the residual tr...

  16. Cybersecurity protecting critical infrastructures from cyber attack and cyber warfare

    CERN Document Server

    Johnson, Thomas A

    2015-01-01

    The World Economic Forum regards the threat of cyber attack as one of the top five global risks confronting nations of the world today. Cyber attacks are increasingly targeting the core functions of the economies in nations throughout the world. The threat to attack critical infrastructures, disrupt critical services, and induce a wide range of damage is becoming more difficult to defend against. Cybersecurity: Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare examines the current cyber threat landscape and discusses the strategies being used by governments and corporatio

  17. Cyber-physical attacks a growing invisible threat

    CERN Document Server

    Loukas, George

    2015-01-01

    Cyber-Physical Attacks: A Growing Invisible Threat presents the growing list of harmful uses of computers and their ability to disable cameras, turn off a building's lights, make a car veer off the road,  or a drone land in enemy hands. In essence, it details the ways cyber-physical attacks are replacing physical attacks in crime, warfare, and terrorism. The book explores how attacks using computers affect the physical world in ways that were previously only possible through physical means. Perpetrators can now cause damage without the same risk, and without the political, social, or moral

  18. [Terrorist attack trauma - an individual entity of polytrauma : A 10-year update].

    Science.gov (United States)

    Güsgen, C; Franke, A; Hentsch, S; Kollig, E; Schwab, R

    2017-10-01

    The incidence of terrorist attacks is increasing worldwide, and they have also become a permanent threat in European cities. Due to its complexity, terrorist attack trauma places high demands on the strategy of surgical treatment. The combination of various mechanisms, explosions and gunshot injuries, with the characteristic pressure (blast) damage and a high proportion of penetrating trauma with simultaneous burns are characteristic features. Unlike in military conflicts, injuries to people of all ages and without ballistic body protection (body armor) are to be expected. The mechanism of the attack and its local conditions are of relevance for the assessment of the situation and the expected injury patterns. Thus, suicide attacks result in several times higher numbers of fatalities and casualties. Explosions on free ground lead to different types of injury than those in closed or semi-enclosed spaces. The treatment principles of the Advanced Trauma Life Support (ATLS®) are based on the intrahospital care of casualties as well as damage control strategies with trigger factors. In order to prepare and educate clinics and surgeons in Germany for such scenarios, various course formats of the professional societies, the German Society for General and Visceral Surgery (DGAV) and the German Society for Trauma Surgery (DGU) have now been established.

  19. Heart Attack Payment - National

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – national data. This data set includes national-level data for payments associated with a 30-day episode of care for heart...

  20. Heart Attack Payment - Hospital

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – provider data. This data set includes provider data for payments associated with a 30-day episode of care for heart...

  1. Heart Attack Payment - State

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – state data. This data set includes state-level data for payments associated with a 30-day episode of care for heart...

  2. Integrated approach for investigating the durability of self-consolidating concrete to sulfate attack

    Science.gov (United States)

    Bassuoni, Mohamed Tamer F.

    tests, the combined sulfate attack tests captured performance risks and complex damage mechanisms associated with the SCC pore structure and constituent materials. Sodium sulfate attack with wetting-drying cycles and/or partial immersion under temperate-hot conditions synergistically caused significant damage to specimens, especially to quaternary cementitious systems having very fine pore structure, due to the build-up of salt crystals and sulfate reaction products. The deleterious effects of sulfate reaction products and salt crystallization on all cementitious systems were more severe under the combined sodium sulfate and freezing-thawing exposure, with a potential of sudden brittle failure. Laboratory experiments in the current work documented evidence for the occurrence of thaumasite sulfate attack (TSA) in cementitious systems containing limestone filler, not only under cold but also under temperate-hot conditions, which made specimens more vulnerable to damage in the combined sulfate attack tests. The field-like combined exposure of sodium sulfate, cyclic environments and flexural loading had synergistic effects on SCC specimens and caused the coexistence of multiple-complex degradation mechanisms (sulfate attack, TSA, stress-corrosion, salt crystallization, surface scaling and corrosion of surface steel fibres) depending on the mixture design variables. The current thesis demonstrates that relying only on sulfate immersion tests to evaluate the performance of cement-based materials can be risky. It also shows that linear and deterministic modeling of the performance of concrete structures under external sulfate attack is unrealistic. Fuzzy and adaptive-neuro fuzzy inference systems developed in the current thesis accurately and rationally predicted the serviceability, deterioration in engineering properties and time to failure of the SCC mixtures under the various sulfate attack exposure regimes adopted in the integrated testing approach. A durability evaluation

  3. Analysis of Network Vulnerability Under Joint Node and Link Attacks

    Science.gov (United States)

    Li, Yongcheng; Liu, Shumei; Yu, Yao; Cao, Ting

    2018-03-01

    The security problem of computer network system is becoming more and more serious. The fundamental reason is that there are security vulnerabilities in the network system. Therefore, it’s very important to identify and reduce or eliminate these vulnerabilities before they are attacked. In this paper, we are interested in joint node and link attacks and propose a vulnerability evaluation method based on the overall connectivity of the network to defense this attack. Especially, we analyze the attack cost problem from the attackers’ perspective. The purpose is to find the set of least costs for joint links and nodes, and their deletion will lead to serious network connection damage. The simulation results show that the vulnerable elements obtained from the proposed method are more suitable for the attacking idea of the malicious persons in joint node and link attack. It is easy to find that the proposed method has more realistic protection significance.

  4. Comparing Alternatives to Measure the Impact of DDoS Attack Announcements on Target Stock Prices

    NARCIS (Netherlands)

    Abhishta,; Joosten, Reinoud; Nieuwenhuis, Lambert J.M.

    2017-01-01

    Distributed denial of service (DDoS) attacks are responsible for creating unavailability of online resources. Botnets based on internet of things (IOT) devices are now being used to conduct DDoS attacks. The estimation of direct and indirect economic damages caused by these attacks is a complex

  5. The role of sleep in migraine attacks

    Directory of Open Access Journals (Sweden)

    Elaine Inamorato

    1993-11-01

    Full Text Available Migraine attacks may be precipitated by sleep deprivation or excessive sleep and sleep is also associated with relief of migraine attacks. In view of this variable relationship we studied the records of 159 consecutive outpatients of our Headache Unit. In 121 records there was reference to sleep involvement, in 55% by a single form and in 45% by more than one form. When only one form was related, relief was most common (70%. 30% of that group of patients had the migraine attack precipitated by sleep, 24% by deprivation and 6% by sleep excess. When the effects of sleep were multiple, these effects were as expected logically in 65%: «in accordance» group (e.g attack precipitated by sleep deprivation and relieved by sleep onset. In a second group, («conflicting» where the involvement was not logical, there were three different combinations of sleep involvement, possibly due to more than one pathophysiological mechanism.

  6. Command Disaggregation Attack and Mitigation in Industrial Internet of Things

    Directory of Open Access Journals (Sweden)

    Peng Xun

    2017-10-01

    Full Text Available A cyber-physical attack in the industrial Internet of Things can cause severe damage to physical system. In this paper, we focus on the command disaggregation attack, wherein attackers modify disaggregated commands by intruding command aggregators like programmable logic controllers, and then maliciously manipulate the physical process. It is necessary to investigate these attacks, analyze their impact on the physical process, and seek effective detection mechanisms. We depict two different types of command disaggregation attack modes: (1 the command sequence is disordered and (2 disaggregated sub-commands are allocated to wrong actuators. We describe three attack models to implement these modes with going undetected by existing detection methods. A novel and effective framework is provided to detect command disaggregation attacks. The framework utilizes the correlations among two-tier command sequences, including commands from the output of central controller and sub-commands from the input of actuators, to detect attacks before disruptions occur. We have designed components of the framework and explain how to mine and use these correlations to detect attacks. We present two case studies to validate different levels of impact from various attack models and the effectiveness of the detection framework. Finally, we discuss how to enhance the detection framework.

  7. Command Disaggregation Attack and Mitigation in Industrial Internet of Things.

    Science.gov (United States)

    Xun, Peng; Zhu, Pei-Dong; Hu, Yi-Fan; Cui, Peng-Shuai; Zhang, Yan

    2017-10-21

    A cyber-physical attack in the industrial Internet of Things can cause severe damage to physical system. In this paper, we focus on the command disaggregation attack, wherein attackers modify disaggregated commands by intruding command aggregators like programmable logic controllers, and then maliciously manipulate the physical process. It is necessary to investigate these attacks, analyze their impact on the physical process, and seek effective detection mechanisms. We depict two different types of command disaggregation attack modes: (1) the command sequence is disordered and (2) disaggregated sub-commands are allocated to wrong actuators. We describe three attack models to implement these modes with going undetected by existing detection methods. A novel and effective framework is provided to detect command disaggregation attacks. The framework utilizes the correlations among two-tier command sequences, including commands from the output of central controller and sub-commands from the input of actuators, to detect attacks before disruptions occur. We have designed components of the framework and explain how to mine and use these correlations to detect attacks. We present two case studies to validate different levels of impact from various attack models and the effectiveness of the detection framework. Finally, we discuss how to enhance the detection framework.

  8. Where can an Insider attack?

    DEFF Research Database (Denmark)

    Probst, Christian W.; Hansen, René Rydhof; Nielson, Flemming

    2006-01-01

    By definition, an insider has better access, is more trusted, and has better information about internal procedures, high-value targets, and potential weak spots in the security, than an outsider. Consequently, an insider attack has the potential to cause significant, even catastrophic, damage...... to the targeted organisation. While the problem is well recognised in the security community as well as in law-enforcement and intelligence communities, the main resort still is to audit log files \\$\\backslash\\$emph{after the fact}. There has been little research into developing models, automated tools......, and techniques for analysing and solving (parts of) the problem. In this paper we first develop a formal model of systems, that can describe real-world scenarios. These high-level models are then mapped to acKlaim, a process algebra with support for access control, that is used to study and analyse properties...

  9. Localization-Free Detection of Replica Node Attacks in Wireless Sensor Networks Using Similarity Estimation with Group Deployment Knowledge

    Directory of Open Access Journals (Sweden)

    Chao Ding

    2017-01-01

    Full Text Available Due to the unattended nature and poor security guarantee of the wireless sensor networks (WSNs, adversaries can easily make replicas of compromised nodes, and place them throughout the network to launch various types of attacks. Such an attack is dangerous because it enables the adversaries to control large numbers of nodes and extend the damage of attacks to most of the network with quite limited cost. To stop the node replica attack, we propose a location similarity-based detection scheme using deployment knowledge. Compared with prior solutions, our scheme provides extra functionalities that prevent replicas from generating false location claims without deploying resource-consuming localization techniques on the resource-constraint sensor nodes. We evaluate the security performance of our proposal under different attack strategies through heuristic analysis, and show that our scheme achieves secure and robust replica detection by increasing the cost of node replication. Additionally, we evaluate the impact of network environment on the proposed scheme through theoretic analysis and simulation experiments, and indicate that our scheme achieves effectiveness and efficiency with substantially lower communication, computational, and storage overhead than prior works under different situations and attack strategies.

  10. Projecting the risk of damage to reef-lined coasts due to intensified tropical cyclones and sea level rise in Palau to 2100

    OpenAIRE

    Hongo, Chuki; Kurihara, Haruko; Golbuu, Yimnang

    2017-01-01

    Tropical cyclones (TCs), sea level rise (SLR), and storm surges cause major problems including beach erosion, saltwater intrusion into groundwater, and damage to infrastructure in coastal areas. The magnitude and extent of damage is predicted to increase as a consequence of future climate change and local factors. Upward reef growth has attracted attention for its role as a natural breakwater able to reduce the risks of natural disasters to coastal communities. However, projections of change ...

  11. Damage to photosystem II due to heat stress without light-driven electron flow: involvement of enhanced introduction of reducing power into thylakoid membranes.

    Science.gov (United States)

    Marutani, Yoko; Yamauchi, Yasuo; Kimura, Yukihiro; Mizutani, Masaharu; Sugimoto, Yukihiro

    2012-08-01

    Under a moderately heat-stressed condition, the photosystems of higher plants are damaged in the dark more easily than they are in the presence of light. To obtain a better understanding of this heat-derived damage mechanism that occurs in the dark, we focused on the involvement of the light-independent electron flow that occurs at 40 °C during the damage. In various plant species, the maximal photochemical quantum yield of photosystem (PS) II (Fv/Fm) decreased as a result of heat treatment in the dark. In the case of wheat, the most sensitive plant species tested, both Fv/Fm and oxygen evolution rapidly decreased by heat treatment at 40 °C for 30 min in the dark. In the damage, specific degradation of D1 protein was involved, as shown by immunochemical analysis of major proteins in the photosystem. Because light canceled the damage to PSII, the light-driven electron flow may play a protective role against PSII damage without light. Light-independent incorporation of reducing power from stroma was enhanced at 40 °C but not below 35 °C. Arabidopsis mutants that have a deficit of enzymes which mediate the incorporation of stromal reducing power into thylakoid membranes were tolerant against heat treatment at 40 °C in the dark, suggesting that the reduction of the plastoquinone pool may be involved in the damage. In conclusion, the enhanced introduction of reducing power from stroma into thylakoid membranes that occurs around 40 °C causes over-reduction of plastoquinone, resulting in the damage to D1 protein under heat stress without linear electron flow.

  12. Cyber Attacks, Information Attacks, and Postmodern Warfare

    Directory of Open Access Journals (Sweden)

    Valuch Jozef

    2017-06-01

    Full Text Available The aim of this paper is to evaluate and differentiate between the phenomena of cyberwarfare and information warfare, as manifestations of what we perceive as postmodern warfare. We describe and analyse the current examples of the use the postmodern warfare and the reactions of states and international bodies to these phenomena. The subject matter of this paper is the relationship between new types of postmodern conflicts and the law of armed conflicts (law of war. Based on ICJ case law, it is clear that under current legal rules of international law of war, cyber attacks as well as information attacks (often performed in the cyberspace as well can only be perceived as “war” if executed in addition to classical kinetic warfare, which is often not the case. In most cases perceived “only” as a non-linear warfare (postmodern conflict, this practice nevertheless must be condemned as conduct contrary to the principles of international law and (possibly a crime under national laws, unless this type of conduct will be recognized by the international community as a “war” proper, in its new, postmodern sense.

  13. Seven Deadliest Wireless Technologies Attacks

    CERN Document Server

    Haines, Brad

    2010-01-01

    How can an information security professional keep up with all of the hacks, attacks, and exploits? One way to find out what the worst of the worst are is to read the seven books in our Seven Deadliest Attacks Series. Not only do we let you in on the anatomy of these attacks but we also tell you how to get rid of them and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve. Attacks featured in this book include:Bluetooth AttacksCredit Card, Access Card, and Passport AttacksBad Encryption

  14. The political attack ad

    Directory of Open Access Journals (Sweden)

    Palma Peña-Jiménez, Ph.D.

    2011-01-01

    Full Text Available During election campaigns the political spot has a clear objective: to win votes. This message is communicated to the electorate through television and Internet, and usually presents a negative approach, which includes a direct critical message against the opponent, rather than an exposition of proposals. This article is focused on the analysis of the campaign attack video ad purposely created to encourage the disapproval of the political opponent among voters. These ads focus on discrediting the opponent, many times, through the transmission of ad hominem messages, instead of disseminating the potential of the political party and the virtues and manifesto of its candidate. The article reviews the development of the attack ad since its first appearance, which in Spain dates back to 1996, when the famous Doberman ad was broadcast, and examines the most memorable campaign attack ads.

  15. A fatal elephant attack.

    Science.gov (United States)

    Hejna, Petr; Zátopková, Lenka; Safr, Miroslav

    2012-01-01

    A rare case of an elephant attack is presented. A 44-year-old man working as an elephant keeper was attacked by a cow elephant when he tripped over a foot chain while the animal was being medically treated. The man fell down and was consequently repeatedly attacked with elephant tusks. The man sustained multiple stab injuries to both groin regions, a penetrating injury to the abdominal wall with traumatic prolapse of the loops of the small bowel, multiple defects of the mesentery, and incomplete laceration of the abdominal aorta with massive bleeding into the abdominal cavity. In addition to the penetrating injuries, the man sustained multiple rib fractures with contusion of both lungs and laceration of the right lobe of the liver, and comminuted fractures of the pelvic arch and left femoral body. The man died shortly after he had been received at the hospital. The cause of death was attributed to traumatic shock. © 2011 American Academy of Forensic Sciences.

  16. Characteristics of latent damage trails due to high energy 208Pb and 238U ions in CR-39 and muscovite mica

    International Nuclear Information System (INIS)

    Chohan, A.S.; Akhtar, S.M.

    1988-01-01

    Experiments have been performed to study the characteristics of latent damage trails produced by (a) 17.14 MeV/nucleon- 208 Pb ions in mica and CR-39 track detectors and (b) 13.7 MeV/nucleon- 238 U in CR-39 track detectors. The parameters studied include (a) V t , average etching velocity along the track, (b) thermal stability of the latent damage trails, (c) the total etchable ranges, and (d) V g the general etching velocity of CR-39 track detectors previously annealed at different temperatures. It has been observed that the latent damage trails in CR-39 are greatly affected at temperatures around 200 0 C in CR-39 track detectors. The general etching velocity of a CR-39 detector has been found to increase with increasing annealing temperatures. (author)

  17. Discontinuous phase formation and selective attack of SiC materials exposed to low oxygen partial pressure environments

    Energy Technology Data Exchange (ETDEWEB)

    Butt, D.P. [Los Alamos National Lab., NM (United States); Tressler, R.E.; Spear, K.E. [Pennsylvania State Univ., University Park, PA (United States). Dept. of Materials Science and Engineering

    1993-09-01

    Three SiC materials were exposed to gas mixtures containing N{sub 2}, H{sub 2}, and CO at 1000-1300C, 1-740 torr for a few to 1000 h. Kinetic and thermodynamic studies indicate that CO is the predominant oxidizing species. A variety of corrosion processes were observed, including surface and internal pit formation, needle growth, grain boundary attack, and attack of impurities and surrounding material. In the case of a siliconized SiC, impurities such as Ca, Al, and Fe diffused rapidly through the Si matrix forming complex calcium aluminosilicates on the surface, leaving behind internal voids. Evaluation of the mechanical properties, including fractography, revealed a variety of degradative phenomena. Efforts to identify causes of pit formation suggested that the overall process was complex. Pits formed during attack of grain boundaries and regions containing transition metal impurities. Studies of single crystals showed preferential attack near impurities and crystalline defects, indicating that damaged crystals or certain crystal orientations in the polycrystalline materials are susceptible to attack. In addition, under some conditions where pit formation was observed, the strength of certain materials increased apparently due to flaw healing. It is suggested that flaws can heal in the absence of mechanical stress due to their high surface energy. However, second phases observed within partially healed surface cracks suggest impurities also contribute to the flaw healing processes.

  18. False Positive and False Negative Effects on Network Attacks

    Science.gov (United States)

    Shang, Yilun

    2018-01-01

    Robustness against attacks serves as evidence for complex network structures and failure mechanisms that lie behind them. Most often, due to detection capability limitation or good disguises, attacks on networks are subject to false positives and false negatives, meaning that functional nodes may be falsely regarded as compromised by the attacker and vice versa. In this work, we initiate a study of false positive/negative effects on network robustness against three fundamental types of attack strategies, namely, random attacks (RA), localized attacks (LA), and targeted attack (TA). By developing a general mathematical framework based upon the percolation model, we investigate analytically and by numerical simulations of attack robustness with false positive/negative rate (FPR/FNR) on three benchmark models including Erdős-Rényi (ER) networks, random regular (RR) networks, and scale-free (SF) networks. We show that ER networks are equivalently robust against RA and LA only when FPR equals zero or the initial network is intact. We find several interesting crossovers in RR and SF networks when FPR is taken into consideration. By defining the cost of attack, we observe diminishing marginal attack efficiency for RA, LA, and TA. Our finding highlights the potential risk of underestimating or ignoring FPR in understanding attack robustness. The results may provide insights into ways of enhancing robustness of network architecture and improve the level of protection of critical infrastructures.

  19. Why cryptography should not rely on physical attack complexity

    CERN Document Server

    Krämer, Juliane

    2015-01-01

    This book presents two practical physical attacks. It shows how attackers can reveal the secret key of symmetric as well as asymmetric cryptographic algorithms based on these attacks, and presents countermeasures on the software and the hardware level that can help to prevent them in the future. Though their theory has been known for several years now, since neither attack has yet been successfully implemented in practice, they have generally not been considered a serious threat. In short, their physical attack complexity has been overestimated and the implied security threat has been underestimated. First, the book introduces the photonic side channel, which offers not only temporal resolution, but also the highest possible spatial resolution. Due to the high cost of its initial implementation, it has not been taken seriously. The work shows both simple and differential photonic side channel analyses. Then, it presents a fault attack against pairing-based cryptography. Due to the need for at least two indepe...

  20. Attacker Model Lab

    OpenAIRE

    2006-01-01

    tut quiz present Tutorial Quiz Presentation Interactive Media Element This interactive tutorial the two sub-classes of computer attackers: amateurs and professionals. It provides valuable insight into the nature of necessary protection measure for information assets. CS3600 Information Assurance: Introduction to Computer Security Course

  1. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... major stroke. It's important to call 9-1-1 immediately for any stroke symptoms. Popular Topics TIA Cardiac Catheter Cholesterol Heart Attack Stent © 2018, American Heart Association, Inc. All rights reserved. Unauthorized use prohibited. The content in this ...

  2. Temporal Cyber Attack Detection.

    Energy Technology Data Exchange (ETDEWEB)

    Ingram, Joey Burton [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Draelos, Timothy J. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Galiardi, Meghan [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Doak, Justin E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-11-01

    Rigorous characterization of the performance and generalization ability of cyber defense systems is extremely difficult, making it hard to gauge uncertainty, and thus, confidence. This difficulty largely stems from a lack of labeled attack data that fully explores the potential adversarial space. Currently, performance of cyber defense systems is typically evaluated in a qualitative manner by manually inspecting the results of the system on live data and adjusting as needed. Additionally, machine learning has shown promise in deriving models that automatically learn indicators of compromise that are more robust than analyst-derived detectors. However, to generate these models, most algorithms require large amounts of labeled data (i.e., examples of attacks). Algorithms that do not require annotated data to derive models are similarly at a disadvantage, because labeled data is still necessary when evaluating performance. In this work, we explore the use of temporal generative models to learn cyber attack graph representations and automatically generate data for experimentation and evaluation. Training and evaluating cyber systems and machine learning models requires significant, annotated data, which is typically collected and labeled by hand for one-off experiments. Automatically generating such data helps derive/evaluate detection models and ensures reproducibility of results. Experimentally, we demonstrate the efficacy of generative sequence analysis techniques on learning the structure of attack graphs, based on a realistic example. These derived models can then be used to generate more data. Additionally, we provide a roadmap for future research efforts in this area.

  3. Blocking of Brute Force Attack

    OpenAIRE

    M.Venkata Krishna Reddy

    2012-01-01

    A common threat Web developers face is a password-guessing attack known as a brute-force attack. A brute-force attack is an attempt to discover a password by systematically trying every possible combination of letters, numbers, and symbols until you discover the one correct combination that works. If your Web site requires user authentication, you are a good target for a brute-force attack. An attacker can always discover a password through a brute-force attack, but the downside is that it co...

  4. VTAC: virtual terrain assisted impact assessment for cyber attacks

    Science.gov (United States)

    Argauer, Brian J.; Yang, Shanchieh J.

    2008-03-01

    Overwhelming intrusion alerts have made timely response to network security breaches a difficult task. Correlating alerts to produce a higher level view of intrusion state of a network, thus, becomes an essential element in network defense. This work proposes to analyze correlated or grouped alerts and determine their 'impact' to services and users of the network. A network is modeled as 'virtual terrain' where cyber attacks maneuver. Overlaying correlated attack tracks on virtual terrain exhibits the vulnerabilities exploited by each track and the relationships between them and different network entities. The proposed impact assessment algorithm utilizes the graph-based virtual terrain model and combines assessments of damages caused by the attacks. The combined impact scores allow to identify severely damaged network services and affected users. Several scenarios are examined to demonstrate the uses of the proposed Virtual Terrain Assisted Impact Assessment for Cyber Attacks (VTAC).

  5. Bluetooth security attacks comparative analysis, attacks, and countermeasures

    CERN Document Server

    Haataja, Keijo; Pasanen, Sanna; Toivanen, Pekka

    2013-01-01

    This overview of Bluetooth security examines network vulnerabilities and offers a comparative analysis of recent security attacks. It also examines related countermeasures and proposes a novel attack that works against all existing Bluetooth versions.

  6. An estimation of core damage frequency of a pressurized water reactor during midloop operation due to loss of residual heat removal

    International Nuclear Information System (INIS)

    Chao, C.C.; Chen, C.T.; Lee, M.

    1995-01-01

    The core damage frequency caused by loss of residual heat removal (RHR) events was assessed during midloop operation of a Westinghouse-designed three-loop pressurized water reactor. The assessment considers two types of outages (refueling and drained maintenance) and uses failure data collected specifically for shutdown condition. Event trees were developed for five categories of loss of RHR events. Human actions to mitigate the loss of RHR events were identified and human error probabilities were quantified using the human cognitive reliability (HCR) and the technique for human error rate prediction (THERP) models. The results showed that the core damage frequency caused by loss of RHR events during midloop operation was 3.4 x 10 -5 per year. The results also showed that the core damage frequency can be reduced significantly by removing a pressurizer safety valve before entering midloop operation. The establishment of reflux cooling, i.e., decay heat removal through the steam generator secondary side, also plays an important role in mitigating the loss of RHR events during midloop operation

  7. Impact of climate change, seedling type and provenance on the risk of damage to Norway spruce (Picea abies (L.) Karst.) seedlings in Sweden due to early summer frosts

    Energy Technology Data Exchange (ETDEWEB)

    Langvall, Ola (Swedish Univ. of Agricultural Sciences, Unit for Field-based Forest Research, Asa Forest Research Station, Lammhult (Sweden))

    2011-04-15

    A model including site-specific microclimate-affecting properties of a forest regeneration area together with seedling characteristics was used to evaluate the accumulated risk of frost damage to Norway spruce (Picea abies (L.) Karst.) seedlings. Climate change in Sweden was simulated on the basis of the regional climate model RCA3. The daily average temperature, the driving factor for bud burst in the model, was adjusted using the difference between the mean of the climate model data for the years 1961-1990 and 2036-2065. The model was run for a highly frost prone, clear-cut site in which bare-rooted Norway spruce seedlings of mid-Swedish provenance were planted. Alternate runs were conducted with data for containerized seedlings and seedlings of Belarusian origin. The study showed that bud burst will occur at earlier dates throughout Sweden in the period 2036-2065 if the climate changes according to either of the climate scenarios examined, compared to the reference period 1961-1990. Furthermore, the risk of damage to Norway spruce seedlings as a result of frost events during summer will increase in southern Sweden and be unaffected or decrease in northern Sweden. The risk of frost damage was exacerbated in containerized seedlings, while the risk was lower for the seedlings of Belarusian provenance when compared with bare-rooted seedlings or seedlings of mid-Swedish origin

  8. Choice of Cell Source in Cell-Based Therapies for Retinal Damage due to Age-Related Macular Degeneration: A Review

    Directory of Open Access Journals (Sweden)

    Sudhakar John

    2013-01-01

    Full Text Available Background. Age-related macular degeneration (AMD is a complex disorder that affects primarily the macula involving the retinal pigment epithelium (RPE but also to a certain extent the photoreceptor layer and the retinal neurons. Cell transplantation is a promising option for AMD and clinical trials are underway using different cell types. Methods. We hypothesize that instead of focusing on a particular cell source for concurrent regeneration of all the retinal layers and also to prevent exhaustive research on an array of cell sources for regeneration of each layer, the choice should depend on, precisely, which layer is damaged. Results. Thus, for a damage limited to the retinal pigment epithelial (RPE layer, the choice we suggest would be RPE cells. When the damage extends to rods and cones, the choice would be bone marrow stem cells and when retinal neurons are involved, relatively immature stem cell populations with an inherent capacity to yield neuronal lineage such as hematopoietic stem cells, embryonic stem cells, or induced pluripotent stem cells can be tried. Conclusion. This short review will prove to be a valuable guideline for those working on cell therapy for AMD to plan their future directions of research and therapy for this condition.

  9. Automated Discovery of Mimicry Attacks

    National Research Council Canada - National Science Library

    Giffin, Jonathon T; Jha, Somesh; Miller, Barton P

    2006-01-01

    .... These systems are useful only if they detect actual attacks. Previous research developed manually-constructed mimicry and evasion attacks that avoided detection by hiding a malicious series of system calls within a valid sequence allowed by the model...

  10. Heart Attack Symptoms in Women

    Science.gov (United States)

    ... fat, cholesterol and other substances (plaque). Watch an animation of a heart attack . Many women think the ... Support Network Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...

  11. Fatal injection: a survey of modern code injection attack countermeasures

    Directory of Open Access Journals (Sweden)

    Dimitris Mitropoulos

    2017-11-01

    Full Text Available With a code injection attack (CIA an attacker can introduce malicious code into a computer program or system that fails to properly encode data that comes from an untrusted source. A CIA can have different forms depending on the execution context of the application and the location of the programming flaw that leads to the attack. Currently, CIAs are considered one of the most damaging classes of application attacks since they can severely affect an organisation’s infrastructure and cause financial and reputational damage to it. In this paper we examine and categorize the countermeasures developed to detect the various attack forms. In particular, we identify two distinct categories. The first incorporates static program analysis tools used to eliminate flaws that can lead to such attacks during the development of the system. The second involves the use of dynamic detection safeguards that prevent code injection attacks while the system is in production mode. Our analysis is based on nonfunctional characteristics that are considered critical when creating security mechanisms. Such characteristics involve usability, overhead, implementation dependencies, false positives and false negatives. Our categorization and analysis can help both researchers and practitioners either to develop novel approaches, or use the appropriate mechanisms according to their needs.

  12. Alloys influence in ferritic steels with hydrogen attack

    International Nuclear Information System (INIS)

    Moro, L; Rey Saravia, D; Lombardich, J; Saggio, M; Juan, A; Blanco, J

    2003-01-01

    Materials exposed to a corrosive environment and high temperatures, are associated with a decrease of their mechanical properties and embitterment.At room temperatures atomic hydrogen diffuses easily through metals structure, it accumulates in lattice defects forming molecular hydrogen and generating cracking due to internal stresses.Under high temperatures the phenomenon is more complex.The steels in these conditions present different structures of precipitates, that the change under creep conditions period.In this work it is determined the influence of Cr and V alloys, the changes of ferritic steel resistance in a corrosive environment and high temperatures.1.25 Cr 1 Mo 0.25 V and 2.25Cr 1 Mo under different loads and temperatures previously attacked by hydrogen environment.The hydrogen is induced by the electrolytic technique, optimizing the choice of temperatures, current density, electrolyte, etc. In order to control an adequate cathode charge, a follow up procedure is carried out by electronic barrier microscopy.After the attack, the material is settled at room temperatures for certain period of time, to allow the hydrogen to leave and evaluate the residual damage.Creep by torsion assays, under constant load and temperature is used as an experimental technique.With the outcome data curves are drawn in order to study the secondary creep rate, with the applied load and temperature, determining the value of stress exponent n and the activation energy Q.Comparing to equal assays to the same ferritic steels but non attacked by hydrogen, these values allows the prediction of microstructure changes present during these tests

  13. Hydrogen attack evaluation of boiler tube using ultrasonic wave

    International Nuclear Information System (INIS)

    Won, Soon Ho; Hyun, Yang Ki; Lee, Jong O; Cho, Kyung Shik; Lee, Jae Do

    2001-01-01

    The presence of hydrogen in industrial plants is a source of damage. Hydrogen attack is one such form of degradation and often causing large tube ruptures that necessitate an immediate shutdown. Hydrogen attack may reduce the fracture toughness as well as the strength of steels. This reduction is caused partially by the presence of cavities and microcracks at the grain boundaries. In the past several techniques have been used with limited results. This paper describes the application of an ultrasonic velocity, attenuation and backscatter techniques for detecting the presence of hydrogen damage in utility boiler tubes. Ultrasonic tests showed a decrease in wave velocity and an increase in attenuation. Such results demonstrate the potential for ultrasonic nondestructive testing to quantify damage. Based on this study, recommendations are that both velocity and attenuation be used to detect hydrogen attack in steels.

  14. Attack Trees with Sequential Conjunction

    NARCIS (Netherlands)

    Jhawar, Ravi; Kordy, Barbara; Mauw, Sjouke; Radomirović, Sasa; Trujillo-Rasua, Rolando

    2015-01-01

    We provide the first formal foundation of SAND attack trees which are a popular extension of the well-known attack trees. The SAND at- tack tree formalism increases the expressivity of attack trees by intro- ducing the sequential conjunctive operator SAND. This operator enables the modeling of

  15. Quantitative security and safety analysis with attack-fault trees

    NARCIS (Netherlands)

    Kumar, Rajesh; Stoelinga, Mariëlle Ida Antoinette

    2017-01-01

    Cyber physical systems, like power plants, medical devices and data centers have to meet high standards, both in terms of safety (i.e. absence of unintentional failures) and security (i.e. no disruptions due to malicious attacks). This paper presents attack fault trees (AFTs), a formalism that

  16. Air exposure behavior of the semiterrestrial crab Neohelice granulata allows tolerance to severe hypoxia but not prevent oxidative damage due to hypoxia-reoxygenation cycle.

    Science.gov (United States)

    de Lima, Tábata Martins; Geihs, Márcio Alberto; Nery, Luiz Eduardo Maia; Maciel, Fábio Everton

    2015-11-01

    The air exposure behavior of the semi-terrestrial crab Neohelice granulata during severe hypoxia was studied. This study also verified whether this behavior mitigates possible oxidative damage, namely lipoperoxidation, caused by hypoxia and reoxygenation cycles. The lethal time for 50% of the crabs subjected to severe hypoxia (0.5 mgO2 · L(-1)) with free access to air was compared to that of crabs subjected to severe hypoxia without access to air. Crabs were placed in aquaria divided into three zones: water (when the animal was fully submersed), land (when the animal was completely emerged) and intermediate (when the animal was in contact with both environments) zones. Then the crabs were held in this condition for 270 min, and the time spent in each zone was recorded. Lipid peroxidation (LPO) damage to the walking leg muscles was determined for the following four experimental conditions: a--normoxic water with free access to air; b--hypoxic water without access to air; c--hypoxic water followed by normoxic water without air access; and d--hypoxic water with free access to air. When exposed to hypoxic water, N. granulata spent significantly more time on land, 135.3 ± 17.7 min, whereas control animals (exposed to normoxic water) spent more time submerged, 187.4 ± 20.2 min. By this behavior, N. granulata was able to maintain a 100% survival rate when exposed to severe hypoxia. However, N. granulata must still return to water after periods of air exposure (~ 14 min), causing a sequence of hypoxia/reoxygenation events. Despite increasing the survival rate, hypoxia with air access does not decrease the lipid peroxidation damage caused by the hypoxia and reoxygenation cycle experienced by these crabs.

  17. ICS logging solution for network-based attacks using Gumistix technology

    Science.gov (United States)

    Otis, Jeremy R.; Berman, Dustin; Butts, Jonathan; Lopez, Juan

    2013-05-01

    Industrial Control Systems (ICS) monitor and control operations associated with the national critical infrastructure (e.g., electric power grid, oil and gas pipelines and water treatment facilities). These systems rely on technologies and architectures that were designed for system reliability and availability. Security associated with ICS was never an inherent concern, primarily due to the protections afforded by network isolation. However, a trend in ICS operations is to migrate to commercial networks via TCP/IP in order to leverage commodity benefits and cost savings. As a result, system vulnerabilities are now exposed to the online community. Indeed, recent research has demonstrated that many exposed ICS devices are being discovered using readily available applications (e.g., ShodanHQ search engine and Google-esque queries). Due to the lack of security and logging capabilities for ICS, most knowledge about attacks are derived from real world incidents after an attack has already been carried out and the damage has been done. This research provides a method for introducing sensors into the ICS environment that collect information about network-based attacks. The sensors are developed using an inexpensive Gumstix platform that can be deployed and incorporated with production systems. Data obtained from the sensors provide insight into attack tactics (e.g., port scans, Nessus scans, Metasploit modules, and zero-day exploits) and characteristics (e.g., attack origin, frequency, and level of persistence). Findings enable security professionals to draw an accurate, real-time awareness of the threats against ICS devices and help shift the security posture from reactionary to preventative.

  18. Influence of Titanium Dioxide Nanoparticles on the Sulfate Attack upon Ordinary Portland Cement and Slag-Blended Mortars

    Directory of Open Access Journals (Sweden)

    Atta-ur-Rehman

    2018-02-01

    Full Text Available In this study, the effects of titanium dioxide (TiO2 nanoparticles on the sulfate attack resistance of ordinary Portland cement (OPC and slag-blended mortars were investigated. OPC and slag-blended mortars (OPC:Slag = 50:50 were made with water to binder ratio of 0.4 and a binder to sand ratio of 1:3. TiO2 was added as an admixture as 0%, 3%, 6%, 9% and 12% of the binder weight. Mortar specimens were exposed to an accelerated sulfate attack environment. Expansion, changes in mass and surface microhardness were measured. Scanning Electron Microscopy (SEM, Energy Dispersive Spectroscopy (EDS, X-ray Diffraction (XRD, Thermogravimetry Analysis (TGA and Differential Scanning Calorimetry (DSC tests were conducted. The formation of ettringite and gypsum crystals after the sulfate attack were detected. Both these products had caused crystallization pressure in the microstructure of mortars and deteriorated the mortars. Our results show that the addition of nano-TiO2 accelerated expansion, variation in mass, loss of surface microhardness and widened cracks in OPC and slag-blended mortars. Nano-TiO2 containing slag-blended mortars were more resistant to sulfate attack than nano-TiO2 containing OPC mortars. Because nano-TiO2 reduced the size of coarse pores, so it increased crystallization pressure due to the formation of ettringite and gypsum thus led to more damage under sulfate attack.

  19. Descriptive study of damage caused by the rhinoceros beetle, Oryctes agamemnon, and its influence on date palm oases of Rjim Maatoug, Tunisia.

    Science.gov (United States)

    Soltani, Rasmi; Lkbel, Chaieb; Habib Ben Hamouda, Med

    2008-01-01

    Oryctes agamemnon (Burmeister 1847) (Coleoptera, Scarabaeidae) was accidentally introduced in the southwestern oases of Tunisia (Tozeur) around 1980 and spread to the Rjim Maatoug region. In these areas O. agamemnon was specific to date palm trees causing severe damage that can result in potential danger due to collapse of the tree. This study was conducted from April 2004 to March 2006 in 4 sites in the region of Rjim Maatoug. Different levels of palm tree attack were determined, ovioposition sites were identified, and pest damage was described in detail to specify their relative importance and to indicate factors governing palm tree attack. Eggs were individually oviposited in the attacked parts. Dead parts of palm trees were the main target of O. agamemnon including the respiratory roots, tough, trunk bark, dry petiole and the periphery of the crown. The crown itself was not attacked. Feeding by larvae caused significant damage. The biggest danger occurred when heavy attacks of larvae invaded the respiratory roots at the level of the soil, and secondarily on the periphery of the crown, which can result in fungal diseases. Several cases of Deglet Nour date palm tree collapse were caused by this pest in Rjim Maatoug. Attacks on other parts of the tree were without danger for the palm tree. In the absence of pest management, application of a quarantine program combined with field cultivation techniques could help farmers significantly decrease attack of O. agamemnon on palm trees.

  20. A calculation of the physical parameters responsible for the enhancement of radiation damage due to the incorporation of Br/I atoms into the DNA

    International Nuclear Information System (INIS)

    Charlton, D.E.

    1992-01-01

    It is well known that when analogs of thymidine containing iodine or bromine are incorporated into the DNA of irradiated cells there is a decrease of the D 0 . Three mechanisms for this effect have been discussed: (a) photoactivation of the Br/I atom and the production of Auger electrons, (b) creation of highly reactive uracil radicals by the interaction of hydrated electrons with BrUdR/IUdR, leading to SSB, and (c) interference with repair or the fixation of the damage by the presence of the Br/I atoms. Experiments to investigate photoactivation of the Br/I atoms will include all three, so that knowledge of the relative size of each contribution is useful. The first process is reasonably well understood and here the second process is examined. It is assumed that the incorporated analogs only produce radicals if they are present in a region of DNA containing energy depositions. An SSB produced by this radical can combine with a nearby SSB produced by electron damage to give a DSB, thus increasing the yield of DSB compared to the yield without the analog present. The increased yields at various levels of Br/I incorporation are compared to experiment for different models of radical action

  1. Laser-induced damage of fused silica optics at 355 nm due to backward stimulated Brillouin scattering: experimental and theoretical results.

    Science.gov (United States)

    Lamaignère, Laurent; Gaudfrin, Kévin; Donval, Thierry; Natoli, Jeanyves; Sajer, Jean-Michel; Penninckx, Denis; Courchinoux, Roger; Diaz, Romain

    2018-04-30

    Forward pump pulses with nanosecond duration are able to generate an acoustic wave via electrostriction through a few centimeters of bulk silica. Part of the incident energy is then scattered back on this sound wave, creating a backward Stokes pulse. This phenomenon known as stimulated Brillouin scattering (SBS) might induce first energy-loss, variable change of the temporal waveform depending on the location in the spatial profile making accurate metrology impossible, and moreover it might also initiate front surface damage making the optics unusable. Experiments performed on thick fused silica optics at 355 nm with single longitudinal mode pulses allowed us to detect, observe and quantify these backward pulses. Experimental results are first compared to theoretical calculations in order to strengthen our confidence in metrology. On this basis a phase-modulator has been implemented on the continuous-wave seeders of the lasers leading to pulses with a wide spectrum that suppress SBS and do not exhibit temporal overshoots that also reduce Kerr effects. The developed set-ups are used to check the reduction of the backward stimulated Brillouin scattering and they allow measuring with accuracy the rear surface damage of thick fused silica optics.

  2. Inhibition of Hsp90 acts synergistically with topoisomerase II poisons to increase the apoptotic killing of cells due to an increase in topoisomerase II mediated DNA damage.

    Science.gov (United States)

    Barker, Catherine R; McNamara, Anne V; Rackstraw, Stephen A; Nelson, David E; White, Mike R; Watson, Alastair J M; Jenkins, John R

    2006-01-01

    Topoisomerase II plays a crucial role during chromosome condensation and segregation in mitosis and meiosis and is a highly attractive target for chemotherapeutic agents. We have identified previously topoisomerase II and heat shock protein 90 (Hsp90) as part of a complex. In this paper we demonstrate that drug combinations targeting these two enzymes cause a synergistic increase in apoptosis. The objective of our study was to identify the mode of cell killing and the mechanism behind the increase in topoisomerase II mediated DNA damage. Importantly we demonstrate that Hsp90 inhibition results in an increased topoiosmerase II activity but not degradation of topoisomerase II and it is this, in the presence of a topoisomerase II poison that causes the increase in cell death. Our results suggest a novel mechanism of action where the inhibition of Hsp90 disrupts the Hsp90-topoisomerase II interaction leading to an increase in and activation of unbound topoisomerase II, which, in the presence of a topoisomerase II poison leads to the formation of an increased number of cleavable complexes ultimately resulting in rise in DNA damage and a subsequent increase cell death.

  3. Seven Deadliest Unified Communications Attacks

    CERN Document Server

    York, Dan

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Unified Communications technology? Then you need Seven Deadliest Unified Communication Attacks. This book pinpoints the most dangerous hacks and exploits specific to Unified Communications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks featured in this book include: UC Ecosystem Attacks Insecure Endpo

  4. RISK DISCLOSURE AGAINST ATTACK ON CRITICAL INFRASTRUCTURES

    Science.gov (United States)

    Yoshida, Mamoru; Kobayashi, Kiyoshi

    This paper analyzes the government's defensive and disclosure strategies to reduce the damage caused by terrorists that attack critical infrastructures using subjective game theory. The government recognizes a terrorist as a hidden opponent and the government's decision making about the policies against terror attacks depends on the belief about the existence of terrorist. In addition, it is not necessarily true that the government and the terrorist play the common game and make their decisions. Considering these points, the paper formulates the model in which the government and the terrorist formulate the subjective games respectively, and they induce the strategies using the equilibriums of their subjective games. The paper concluded that the government's disclosure about the implementation of the countermeasure, rather than the disclosure of warning level related with the belief about the existence of terrorist, brings about the higher increment of the subjective payoffs of the government.

  5. Hyperglycemia in Streptozotocin-Induced Diabetes Leads to Persistent Inflammation and Tissue Damage Following Uveitis Due to Reduced Levels of Ciliary Body Heme Oxygenase-1

    Directory of Open Access Journals (Sweden)

    2006-01-01

    Full Text Available This study investigated the heme oxygenase-1 (HO-1 and the endotoxin-induced uveitis (EIU in diabetic streptozotocin (STZ-hyperglycemic rats. STZ-hyperglycemic rats had impaired levels of the enzyme HO-1 within the ciliary bodies if compared with the nondiabetic rats. STZ-hyperglycemic rats also predisposed the eye to produce high levels of both the cytokines IL-1 β and CXCL8. Subsequent EIU further and significantly P<.01 increased the cytokines production, an effect partly prevented by hemin treatment. Most importantly, hemin, an inducer of heme oxygenase expression and activity, recovered the huge number of infiltrated polymorphonuclear leukocytes PMN within the ciliary bodies associated with STZ-hyperglycemic state and EIU damage. Impairment of the stress-sensitive enzyme HO-1 in STZ-hyperglycemic rats increases and prolongs the inflammatory response to EIU.

  6. The use of near infrared transmittance kernel sorting technology to salvage high quality grain from grain downgraded due to Fusarium damage

    Directory of Open Access Journals (Sweden)

    Michael E. Kautzman

    2015-03-01

    Full Text Available The mycotoxins associated with specific Fusarium fungal infections of grains are a threat to global food and feed security. These fungal infestations are referred to as Fusarium Head Blight (FHB and lead to Fusarium Damaged Kernels (FDK. Incidence of FDK >0.25% will lower the grade, with a tolerance of 5% FDK for export feed grain. During infestation, the fungi can produce a variety of mycotoxins, the most common being deoxynivalenol (DON. Fusarium Damaged Kernels have been associated with reduced crude protein (CP, lowering nutritional, functional and grade value. New technology has been developed using Near Infrared Transmittance (NIT spectra that estimate CP of individual kernels of wheat, barley and durum. Our objective is to evaluate the technology's capability to reduce FDK and DON of downgraded wheat and ability to salvage high quality safe kernels. In five FDK downgraded sources of wheat, the lowest 20% CP kernels had significantly increased FDK and DON with the high CP fractions having decreased FDK and DON, thousand kernel weights (TKW and bushel weight (Bu. Strong positive correlations were observed between FDK and DON (r = 0.90; FDK and grade (r = 0.62 and DON and grade (r = 0.62. Negative correlations were observed between FDK and DON with CP (r = −0.27 and −0.32; TKW (r = −0.45 and −0.54 and Bu (r = −0.79 and −0.74. Results show improved quality and value of Fusarium downgraded grain using this technology.

  7. The attack navigator

    DEFF Research Database (Denmark)

    Probst, Christian W.; Willemson, Jan; Pieters, Wolter

    2016-01-01

    The need to assess security and take protection decisions is at least as old as our civilisation. However, the complexity and development speed of our interconnected technical systems have surpassed our capacity to imagine and evaluate risk scenarios. This holds in particular for risks...... that are caused by the strategic behaviour of adversaries. Therefore, technology-supported methods are needed to help us identify and manage these risks. In this paper, we describe the attack navigator: a graph-based approach to security risk assessment inspired by navigation systems. Based on maps of a socio...

  8. Recent "phishing" attacks

    CERN Multimedia

    IT Department

    2009-01-01

    Over the last few weeks there has been a marked increase in the number of attacks on CERN made by cybercriminals. Typical attacks arrive in the form of e-mail messages purporting to come from the CERN Help Desk, Mail Service, or some similarly official-sounding entity and suggest that there is a problem with your account, such as it being over-quota. They then ask you to click on a link or to reply and give your password. Please don’t! Be cautious of any unexpected messages containing web links even if they appear to come from known contacts. If you happen to click on such a link and if your permission is requested to run or install software, always decline it. NEVER provide your password or other details if these are requested. These messages try to trick you into clicking on Web links which will help them to install malicious software on your computer, and anti-virus software cannot be relied on to detect all cases. In case of questions on this topic, you may contact mailto:helpdesk@cern.ch. CERN Comput...

  9. Assessment of Brain Damage and Plasticity in the Visual System Due to Early Occipital Lesion: Comparison of FDG-PET with Diffusion MRI Tractography

    Science.gov (United States)

    Jeong, Jeong-won; Tiwari, Vijay N.; Shin, Joseph; Chugani, Harry T.; Juhász, Csaba

    2015-01-01

    Purpose To determine the relation between glucose metabolic changes of the primary visual cortex, structural abnormalities of the corresponding visual tracts, and visual symptoms in children with Sturge-Weber syndrome (SWS). Materials and Methods In 10 children with unilateral SWS (ages 1.5–5.5 years), a region-of-interest analysis was applied in the bilateral medial occipital cortex on positron emission tomography (PET) and used to track diffusion-weighted imaging (DWI) streamlines corresponding to the central visual pathway. Normalized streamline volumes of individual SWS patients were compared with values from age-matched control groups as well as correlated with normalized glucose uptakes and visual field deficit. Results Lower glucose uptake and lower corresponding streamline volumes were detected in the affected occipital lobe in 9/10 patients, as compared to the contralateral side. Seven of these 9 patients had visual field deficit and normal or decreased streamline volumes on the unaffected side. The two other children had no visual symptoms and showed high contralateral visual streamline volumes. There was a positive correlation between the normalized ratios on DWI and PET, indicating that lower glucose metabolism was associated with lower streamline volume in the affected hemisphere (R = 0.70, P = 0.024). Conclusion We demonstrated that 18F-flurodeoxyglucose (FDG)-PET combined with DWI tractography can detect both brain damage on the side of the lesion and contralateral plasticity in children with early occipital lesions. PMID:24391057

  10. PERTANGGUNGJAWABAN NEGARA TERHADAP KERUGIAN DAN KERUSAKAN LINGKUNGAN AKIBAT KEGIATAN EKSPOR IMPOR LIMBAH 83 (The State Responsibilities toward Environmental Damages due to Hazardous Wastes Export-Import Activities

    Directory of Open Access Journals (Sweden)

    Damianus Bilo

    2005-11-01

    Full Text Available ABSTRAK Penelitian ini bertujuan untuk menginvestigasi dan menganalisis fenomena legal dan praktek hukum yang mengatur pergerakan lintas batas B3 dan limbah 83. Penelitian ini mengkombinasikan pendekatan legal dan normatif. Informasi diinterpretasi dengan menggunakan metode Juridical-analytical dan evaluative-explanatory. Penelitian menyimpulkan bahwa fihak-fihak yang terlibat dalam pengeluaran limbah B3 adalah bertanggung jawab baik secara individual maupun kolektif untuk memberikan kompensasi kerusakan lingkungan yang diderita oleh fihak ketiga. Prinsip ini didasarkan pada hukum publik internasional yang menyatakan bahwa setiap tindakan pelanggaran hukum oleh suatu negara adalah menyangkut pertanggung jawaban international dari negara tersebut.    ABSTRACT This research aims to investigate and analyze legal phenomena and the practices of law that regulate transboundry movement of hazardous wastes and their disposal. The research combines the normative and empirical legal approach. Information is interpreted by using juridical analytical and evaluative explanatory method. The research concludes that the parties involved in the transmission of hazardous wastes are either individually or collectively responsible for compensating detriments and environmental damaged sufferes by the third parties. This principle is based on the public international law, which insists that every internationally wrongful act of a State entails the international responsibility of that State.

  11. Metrics for Assessment of Smart Grid Data Integrity Attacks

    Energy Technology Data Exchange (ETDEWEB)

    Annarita Giani; Miles McQueen; Russell Bent; Kameshwar Poolla; Mark Hinrichs

    2012-07-01

    There is an emerging consensus that the nation’s electricity grid is vulnerable to cyber attacks. This vulnerability arises from the increasing reliance on using remote measurements, transmitting them over legacy data networks to system operators who make critical decisions based on available data. Data integrity attacks are a class of cyber attacks that involve a compromise of information that is processed by the grid operator. This information can include meter readings of injected power at remote generators, power flows on transmission lines, and relay states. These data integrity attacks have consequences only when the system operator responds to compromised data by redispatching generation under normal or contingency protocols. These consequences include (a) financial losses from sub-optimal economic dispatch to service loads, (b) robustness/resiliency losses from placing the grid at operating points that are at greater risk from contingencies, and (c) systemic losses resulting from cascading failures induced by poor operational choices. This paper is focused on understanding the connections between grid operational procedures and cyber attacks. We first offer two examples to illustrate how data integrity attacks can cause economic and physical damage by misleading operators into taking inappropriate decisions. We then focus on unobservable data integrity attacks involving power meter data. These are coordinated attacks where the compromised data are consistent with the physics of power flow, and are therefore passed by any bad data detection algorithm. We develop metrics to assess the economic impact of these attacks under re-dispatch decisions using optimal power flow methods. These metrics can be use to prioritize the adoption of appropriate countermeasures including PMU placement, encryption, hardware upgrades, and advance attack detection algorithms.

  12. Seven Deadliest Social Network Attacks

    CERN Document Server

    Timm, Carl

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting social networks? Then you need Seven Deadliest Social Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Social Networking Infrastruct

  13. Examining food additives and spices for their anti-oxidant ability to counteract oxidative damage due to chronic exposure to free radicals from environmental pollutants

    Science.gov (United States)

    Martinez, Raul A., III

    The main objective of this work was to examine food additives and spices (from the Apiaceae family) to determine their antioxidant properties to counteract oxidative stress (damage) caused by Environmental pollutants. Environmental pollutants generate Reactive Oxygen species and Reactive Nitrogen species. Star anise essential oil showed lower antioxidant activity than extracts using DPPH scavenging. Dill Seed -- Anethum Graveolens -the monoterpene components of dill showed to activate the enzyme glutathione-S-transferase , which helped attach the antioxidant molecule glutathione to oxidized molecules that would otherwise do damage in the body. The antioxidant activity of extracts of dill was comparable with ascorbic acid, alpha-tocopherol, and quercetin in in-vitro systems. Black Cumin -- Nigella Sativa: was evaluated the method 1,1-diphenyl2-picrylhhydrazyl (DPPH) radical scavenging activity. Positive correlations were found between the total phenolic content in the black cumin extracts and their antioxidant activities. Caraway -- Carum Carvi: The antioxidant activity was evaluated by the scavenging effects of 1,1'-diphenyl-2-picrylhydrazyl (DPPH). Caraway showed strong antioxidant activity. Cumin -- Cuminum Cyminum - the major polyphenolic were extracted and separated by HPTLC. The antioxidant activity of the cumin extract was tested on 1,1'-diphenyl-2- picrylhydrazyl (DPPH) free radical scavenging. Coriander -- Coriandrum Sativum - the antioxidant and free-radical-scavenging property of the seeds was studied and also investigated whether the administration of seeds curtails oxidative stress. Coriander seed powder not only inhibited the process of Peroxidative damage, but also significantly reactivated the antioxidant enzymes and antioxidant levels. The seeds also showed scavenging activity against superoxides and hydroxyl radicals. The total polyphenolic content of the seeds was found to be 12.2 galic acid equivalents (GAE)/g while the total flavonoid content

  14. A Stochastic Framework for Quantitative Analysis of Attack-Defense Trees

    NARCIS (Netherlands)

    Jhawar, Ravi; Lounis, Karim; Mauw, Sjouke

    2016-01-01

    Cyber attacks are becoming increasingly complex, practically sophisticated and organized. Losses due to such attacks are important, varying from the loss of money to business reputation spoilage. Therefore, there is a great need for potential victims of cyber attacks to deploy security solutions

  15. SiC: An Agent Based Architecture for Preventing and Detecting Attacks to Ubiquitous Databases

    OpenAIRE

    Pinzón, Cristian; de Paz Santana, Yanira; Bajo Pérez, Javier; Abraham, Ajith P.; Corchado Rodríguez, Juan M.

    2009-01-01

    One of the main attacks to ubiquitous databases is the structure query language (SQL) injection attack, which causes severe damages both in the commercial aspect and in the user’s confidence. This chapter proposes the SiC architecture as a solution to the SQL injection attack problem. This is a hierarchical distributed multiagent architecture, which involves an entirely new approach with respect to existing architectures for the prevention and detection of SQL injections. SiC incorporates a k...

  16. Behavioral Modeling of WSN MAC Layer Security Attacks: A Sequential UML Approach

    DEFF Research Database (Denmark)

    Pawar, Pranav M.; Nielsen, Rasmus Hjorth; Prasad, Neeli R.

    2012-01-01

    is the vulnerability to security attacks/threats. The performance and behavior of a WSN are vastly affected by such attacks. In order to be able to better address the vulnerabilities of WSNs in terms of security, it is important to understand the behavior of the attacks. This paper addresses the behavioral modeling...... of medium access control (MAC) security attacks in WSNs. The MAC layer is responsible for energy consumption, delay and channel utilization of the network and attacks on this layer can introduce significant degradation of the individual sensor nodes due to energy drain and in performance due to delays....... The behavioral modeling of attacks will be beneficial for designing efficient and secure MAC layer protocols. The security attacks are modeled using a sequential diagram approach of Unified Modeling Language (UML). Further, a new attack definition, specific to hybrid MAC mechanisms, is proposed....

  17. Crony Attack: Strategic Attack’s Silver Bullet

    Science.gov (United States)

    2006-11-01

    physical assets or financial assets. The form of crony attack that most closely resembles classic strategic attack is to deny, degrade, or destroy a money...February 1951. Reprinted in Airpower Studies Coursebook , Air Command and Staff College, Maxwell AFB, AL, 2002, 152–58. Hirsch, Michael. “NATO’s Game of

  18. Nursery Pest Management of Phytolyma lata Walker (Scott) Attack ...

    African Journals Online (AJOL)

    The establishment of plantations of Milicia excelsa has been constrained by the gall-forming psyllid Phytolyma lata Walker (Scott) that causes extensive damage to young plants. We present findings of an experiment aimed at preventing Phytolyma attack on Milicia seedlings in the nursery using chemical control and ...

  19. Evolution of Army Attack Aviation: A Chaotic Coupled Pendulums Analogy

    Science.gov (United States)

    2013-05-23

    forward of the FLOT for 36 minutes.32 Ground Campaign: 4-229 AVN Deep Attack, 26-27 February With the commencement of the ground campaign on 24......battalions worth of tanks and armored personnel carriers while receiving no damage to 4-229 AVN aircraft.34 Prior planning, training, and command

  20. Microstructural changes due to laser peening in modified 9Cr-1Mo steel subjected to creep damage at 823K and 923K in air

    International Nuclear Information System (INIS)

    Nakasone, Yuji; Kizuki, Yuta; Suzuki, Hayao; Minowa, Takuya

    2013-01-01

    The present study has investigated microstructural changes due to laser peening in modified 9Cr-1Mo steel subjected to creep. The EBSD or Electron Backscatter Diffraction studies have been made on round-bar type specimens creeping at applied stresses of 230 and 240 MPa at 823 K and 105 MPa at 923K in air. Prior to the creep tests, laser peening was applied to specimens at laser power of 8.4-22GW/cm 2 per pulse in water. Microstructural change in each specimen after its creep test was investigated by EBSD/SEM. The EBSD/SEM analyses revealed that the laser peening treatment makes creep rupture time longer and it reveals local misorientation value for rupture. (author)

  1. Algebraic Side-Channel Attack on Twofish

    Directory of Open Access Journals (Sweden)

    Chujiao Ma

    2017-05-01

    Full Text Available While algebraic side-channel attack (ASCA has been successful in breaking simple cryptographic algorithms, it has never been done on larger or more complex algorithms such as Twofish. Compared to other algorithms that ASCA has been used on, Twofish is more difficult to attack due to the key-dependent S-boxes as well as the complex key scheduling. In this paper, we propose the first algebraic side-channel attack on Twofish, and examine the importance of side-channel information in getting past the key-dependent S-boxes and the complex key scheduling. The cryptographic algorithm and side-channel information are both expressed as boolean equations and a SAT solver is used to recover the key. While algebraic attack by itself is not sufficient to break the algorithm, with the help of side-channel information such as Hamming weights, we are able to correctly solve for 96 bits of the 128 bits key in under 2 hours with known plaintext/ciphertext.

  2. Matrix metalloproteinases during and outside of migraine attacks without aura

    DEFF Research Database (Denmark)

    Ashina, M.; Tvedskov, J.F.; Thiesen, Kerstin Lipka

    2010-01-01

    Ashina M, Tvedskov JF, Lipka K, Bilello J, Penkowa M & Olesen J. Matrix metalloproteinases during and outside of migraine attacks without aura. Cephalalgia 2009. London. ISSN 0333-1024To test the hypothesis that permeability of the blood-brain barrier (BBB) is altered during migraine attack due...... to enhanced activation of matrix metalloproteinases (MMPs), we investigated MMP-3, MMP-9 and tissue inhibitor of metalloproteases (TIMP)-1 in the external jugular vein during and outside of migraine attacks in 21 patients with migraine without aura. In addition, we measured plasma levels of several other...... of MMP-3 in the external jugular (P = 0.002) and cubital (P = 0.008) vein during attacks compared with outside of attacks. We found no correlation of ictal or interictal MMP-3, MMP-9 and TIMP-1 to migraine duration and frequency analysed in 21 patients (P > 0.05). There was no difference between ictal...

  3. Estimation of Concrete Corrosion Due to Attack of Chloride Salt

    Directory of Open Access Journals (Sweden)

    V. V. Babitski

    2005-01-01

    Full Text Available The paper provides results of experimental concrete research under conditions of concentrated chloride salt solutions. General principles of forecasting concrete corrosion resistance under salt physical corrosion are given in the paper. Analytical dependences for quantitative estimation of corroded concrete have been obtained.

  4. Invisible Trojan-horse attack

    DEFF Research Database (Denmark)

    Sajeed, Shihan; Minshull, Carter; Jain, Nitin

    2017-01-01

    We demonstrate the experimental feasibility of a Trojan-horse attack that remains nearly invisible to the single-photon detectors employed in practical quantum key distribution (QKD) systems, such as Clavis2 from ID Quantique. We perform a detailed numerical comparison of the attack performance...

  5. When Sinuses Attack! (For Kids)

    Science.gov (United States)

    ... First Aid & Safety Doctors & Hospitals Videos Recipes for Kids Kids site Sitio para niños How the Body Works ... Search English Español When Sinuses Attack! KidsHealth / For Kids / When Sinuses Attack! What's in this article? What ...

  6. Can You Recognize a Heart Attack or Stroke? What To Do When Every Moment Counts

    Science.gov (United States)

    ... Special Issues Subscribe August 2014 Print this issue Can You Recognize a Heart Attack or Stroke? What ... could prevent many of these deaths. Fast action can also limit permanent damage to the body. Heart ...

  7. Interaction of insecticide and media moisture on ambrosia beetle (Coleoptera: Curculionidae) attacks on ornamental trees

    Science.gov (United States)

    Exotic ambrosia beetles, particularly Xylosandrus crassiusculus (Motschulsky) and Xylosandrus germanus (Blandford), are among the most economically damaging pests of ornamental trees in nurseries. Growers have had few tactics besides insecticide applications to reduce ambrosia beetle attacks but rec...

  8. Can a Copycat Effect be Observed in Terrorist Suicide Attacks?

    Directory of Open Access Journals (Sweden)

    Nicholas Farnham

    2017-03-01

    Full Text Available The purpose of this paper is to explore how a copycat effect – established within the field of suicide studies – may manifest itself in terrorist suicide attacks, and takes an exploratory approach in evaluating the prospect of incorporating open-data resources in future counter-terrorism research. This paper explores a possible ‘copycat effect’ in cases of suicide terrorism, which entails a perpetrator being inspired by a preceding attack to carry out a similar attack not long after the original. In the wake of mounting risks of lone wolf terrorist attacks today and due to the general difficulties faced in preventing such attacks, in this paper we explore a potential area of future prevention in media reporting, security and anti-terrorism policies today. Using the START Global Terrorism Database (GTD, this paper investigates terrorist suicide-attack clusters and analyses the relationship between attacks found within the same cluster. Using a mixed-method approach, our analyses did not uncover clear evidence supporting a copycat effect among the studied attacks. These and other findings have numerous policy and future research implications.

  9. Invisible Trojan-horse attack.

    Science.gov (United States)

    Sajeed, Shihan; Minshull, Carter; Jain, Nitin; Makarov, Vadim

    2017-08-21

    We demonstrate the experimental feasibility of a Trojan-horse attack that remains nearly invisible to the single-photon detectors employed in practical quantum key distribution (QKD) systems, such as Clavis2 from ID Quantique. We perform a detailed numerical comparison of the attack performance against Scarani-Ac´ın-Ribordy-Gisin (SARG04) QKD protocol at 1924 nm versus that at 1536 nm. The attack strategy was proposed earlier but found to be unsuccessful at the latter wavelength, as reported in N. Jain et al., New J. Phys. 16, 123030 (2014). However at 1924 nm, we show experimentally that the noise response of the detectors to bright pulses is greatly reduced, and show by modeling that the same attack will succeed. The invisible nature of the attack poses a threat to the security of practical QKD if proper countermeasures are not adopted.

  10. High-Dose Polymerized Hemoglobin Fails to Alleviate Cardiac Ischemia/Reperfusion Injury due to Induction of Oxidative Damage in Coronary Artery.

    Science.gov (United States)

    Yang, Qian; Wu, Wei; Li, Qian; Chen, Chan; Zhou, Ronghua; Qiu, Yanhua; Luo, Ming; Tan, Zhaoxia; Li, Shen; Chen, Gang; Zhou, Wentao; Liu, Jiaxin; Yang, Chengmin; Liu, Jin; Li, Tao

    2015-01-01

    Objective. Ischemia/reperfusion (I/R) injury is an unavoidable event for patients in cardiac surgery under cardiopulmonary bypass (CPB). This study was designed to investigate whether glutaraldehyde-polymerized human placenta hemoglobin (PolyPHb), a hemoglobin-based oxygen carrier (HBOC), can protect heart against CPB-induced I/R injury or not and to elucidate the underlying mechanism. Methods and Results. A standard dog CPB model with 2-hour cardiac arrest and 2-hour reperfusion was established. The results demonstrated that a low-dose PolyPHb (0.1%, w/v) provided a significant protection on the I/R heart, whereas the high-dose PolyPHb (3%, w/v) did not exhibit cardioprotective effect, as evidenced by the impaired cardiac function, decreased myocardial oxygen utilization, and elevated enzymes release and pathological changes. Further study indicated that exposure of isolated coronary arteries or human umbilical vein endothelial cells (HUVECs) to a high-dose PolyPHb caused impaired endothelium-dependent relaxation, which was companied with increased reactive oxygen species (ROS) production, reduced superoxide dismutase (SOD) activity, and elevated malonaldehyde (MDA) formation. Consistent with the increased oxidative stress, the NAD(P)H oxidase activity and subunits expression, including gp91(phox), p47(phox), p67(phox), and Nox1, were greatly upregulated. Conclusion. The high-dose PolyPHb fails to protect heart from CPB-induced I/R injury, which was due to overproduction of NAD(P)H oxidase-induced ROS and resultant endothelial dysfunction.

  11. High-Dose Polymerized Hemoglobin Fails to Alleviate Cardiac Ischemia/Reperfusion Injury due to Induction of Oxidative Damage in Coronary Artery

    Directory of Open Access Journals (Sweden)

    Qian Yang

    2015-01-01

    Full Text Available Objective. Ischemia/reperfusion (I/R injury is an unavoidable event for patients in cardiac surgery under cardiopulmonary bypass (CPB. This study was designed to investigate whether glutaraldehyde-polymerized human placenta hemoglobin (PolyPHb, a hemoglobin-based oxygen carrier (HBOC, can protect heart against CPB-induced I/R injury or not and to elucidate the underlying mechanism. Methods and Results. A standard dog CPB model with 2-hour cardiac arrest and 2-hour reperfusion was established. The results demonstrated that a low-dose PolyPHb (0.1%, w/v provided a significant protection on the I/R heart, whereas the high-dose PolyPHb (3%, w/v did not exhibit cardioprotective effect, as evidenced by the impaired cardiac function, decreased myocardial oxygen utilization, and elevated enzymes release and pathological changes. Further study indicated that exposure of isolated coronary arteries or human umbilical vein endothelial cells (HUVECs to a high-dose PolyPHb caused impaired endothelium-dependent relaxation, which was companied with increased reactive oxygen species (ROS production, reduced superoxide dismutase (SOD activity, and elevated malonaldehyde (MDA formation. Consistent with the increased oxidative stress, the NAD(PH oxidase activity and subunits expression, including gp91phox, p47phox, p67phox, and Nox1, were greatly upregulated. Conclusion. The high-dose PolyPHb fails to protect heart from CPB-induced I/R injury, which was due to overproduction of NAD(PH oxidase-induced ROS and resultant endothelial dysfunction.

  12. Setting Component Priorities in Protecting NPPs against Cyber-Attacks Using Reliability Analysis Techniques

    International Nuclear Information System (INIS)

    Choi, Moon Kyoung; Seong, Poong Hyun; Son, Han Seong

    2017-01-01

    The digitalization of infrastructure makes systems vulnerable to cyber threats and hybrid attacks. According to ICS-CERT report, as time goes by, the number of vulnerabilities in ICS industries increases rapidly. Digital I and C systems have been developed and installed in nuclear power plants, and due to installation of the digital I and C systems, cyber security concerns are increasing in nuclear industry. However, there are too many critical digital assets to be inspected in digitalized NPPs. In order to reduce the inefficiency of regulation in nuclear facilities, the critical components that are directly related to an accident are elicited by using the reliability analysis techniques. Target initial events are selected, and their headings are analyzed through event tree analysis about whether the headings can be affected by cyber-attacks or not. Among the headings, the headings that can be proceeded directly to the core damage by the cyber-attack when they are fail are finally selected as the target of deriving the minimum cut-sets. We analyze the fault trees and derive the minimum set-cuts. In terms of original PSA, the value of probability for the cut-sets is important but the probability is not important in terms of cyber security of NPPs. The important factors is the number of basic events consisting of the minimal cut-sets that is proportional to vulnerability.

  13. Protecting infrastructure networks from cost-based attacks

    International Nuclear Information System (INIS)

    Wang Xingang; Guan Shuguang; Lai, Choy Heng

    2009-01-01

    It is well known that heterogeneous networks are vulnerable to the intentional removal of a small fraction of highly connected or loaded nodes, implying that to protect the network effectively, the important nodes should be allocated more defense resource than the others. However, if too much resource is allocated to the few important nodes, the numerous less-important nodes will be less protected, which if attacked together can still lead to devastating damage. A natural question is therefore how to efficiently distribute the limited defense resource among the network nodes such that the network damage is minimized against any attack strategy. In this paper, taking into account the factor of attack cost, the problem of network security is reconsidered in terms of efficient network defense against cost-based attacks. The results show that, for a general complex network, there exists an optimal distribution of the defense resource with which the network is best protected from cost-based attacks. Furthermore, it is found that the configuration of the optimal defense is dependent on the network parameters. Specifically, networks of larger size, sparser connection and more heterogeneous structure will more likely benefit from the defense optimization.

  14. A quantification of damage and assessment of economic loss due to crop raiding by Asian Elephant Elephas maximus (Mammalia: Proboscidea: Elephantidae: a case study of Manas National Park, Assam, India

    Directory of Open Access Journals (Sweden)

    Naba K. Nath

    2015-02-01

    Full Text Available A study was carried out in Manas National Park, Assam in northeastern India between 2007 and 2009 to understand the magnitude of human-elephant conflict through a quantification of damage and assessment of economic loss. A cluster of six villages adjacent to the Park was selected for this study. Five major agricultural crops were grown during the study period of which three were raided by elephants: winter paddy, autumn paddy and pulses. Paddy was the principle crop central to the farmers’ subsistence. Winter paddy was the most cultivated crop and autumn paddy was the least cultivated. The incidence rate of crop raiding was highest for autumn paddy and lowest for pulses. Overall economic loss due to crop raiding was negligible, however at the individual farmer level, it was quite high. The study revealed that human-elephant conflict is not so severe, indicating ample opportunity for human-elephant coexistence in the region. Crop fields adjacent to the Park were particularly vulnerable to crop raiding which necessitates creation of a buffer zone. The frequency of raiding and the extent of damage was found to be significantly less in crop fields which were guarded by farmers. This was due to traditional crop guarding practices being followed in the region, the strengthening of which could effectively reduce annual crop loss and thus human-elephant conflict could be minimized to a large extent.

  15. Vulnerability of water supply systems to cyber-physical attacks

    Science.gov (United States)

    Galelli, Stefano; Taormina, Riccardo; Tippenhauer, Nils; Salomons, Elad; Ostfeld, Avi

    2016-04-01

    The adoption of smart meters, distributed sensor networks and industrial control systems has largely improved the level of service provided by modern water supply systems. Yet, the progressive computerization exposes these critical infrastructures to cyber-physical attacks, which are generally aimed at stealing critical information (cyber-espionage) or causing service disruption (denial-of-service). Recent statistics show that water and power utilities are undergoing frequent attacks - such as the December power outage in Ukraine - , attracting the interest of operators and security agencies. Taking the security of Water Distribution Networks (WDNs) as domain of study, our work seeks to characterize the vulnerability of WDNs to cyber-physical attacks, so as to conceive adequate defense mechanisms. We extend the functionality of EPANET, which models hydraulic and water quality processes in pressurized pipe networks, to include a cyber layer vulnerable to repeated attacks. Simulation results on a medium-scale network show that several hydraulic actuators (valves and pumps, for example) can be easily attacked, causing both service disruption - i.e., water spillage and loss of pressure - and structural damages - e.g., pipes burst. Our work highlights the need for adequate countermeasures, such as attacks detection and reactive control systems.

  16. Protecting water and wastewater infrastructure from cyber attacks

    Institute of Scientific and Technical Information of China (English)

    Srinivas Panguluri; William Phillips; John Cusimano

    2011-01-01

    Multiple organizations over the years have collected and analyzed data on cyber attacks and they all agree on one conclusion:cyber attacks are real and can cause significant damages.This paper presents some recent statistics on cyber attacks and resulting damages.Water and wastewater utilities must adopt countermeasures to prevent or minimize the damage in case of such attacks.Many unique challenges are faced by the water and wastewater industry while selecting and implementing security countermeasures; the key challenges are:1) the increasing interconnection of their business and control system networks,2) large variation of proprietary industrial control equipment utilized,3) multitude of cross-sector cyber-security standards,and 4) the differences in the equipment vendor's approaches to meet these security standards.The utilities can meet these challenges by voluntarily selecting and adopting security standards,conducting a gap analysis,performing vulnerability/risk analysis,and undertaking countermeasures that best meets their security and organizational requirements.Utilities should optimally utilize their limited resources to prepare and implement necessary programs that are designed to increase cyber-security over the years.Implementing cyber security does not necessarily have to be expensive,substantial improvements can be accomplished through policy,procedure,training and awareness.Utilities can also get creative and allocate more funding through annual budgets and reduce dependence upon capital improvement programs to achieve improvements in cyber-security.

  17. Protecting water and wastewater infrastructure from cyber attacks

    Science.gov (United States)

    Panguluri, Srinivas; Phillips, William; Cusimano, John

    2011-12-01

    Multiple organizations over the years have collected and analyzed data on cyber attacks and they all agree on one conclusion: cyber attacks are real and can cause significant damages. This paper presents some recent statistics on cyber attacks and resulting damages. Water and wastewater utilities must adopt countermeasures to prevent or minimize the damage in case of such attacks. Many unique challenges are faced by the water and wastewater industry while selecting and implementing security countermeasures; the key challenges are: 1) the increasing interconnection of their business and control system networks, 2) large variation of proprietary industrial control equipment utilized, 3) multitude of cross-sector cyber-security standards, and 4) the differences in the equipment vendor's approaches to meet these security standards. The utilities can meet these challenges by voluntarily selecting and adopting security standards, conducting a gap analysis, performing vulnerability/risk analysis, and undertaking countermeasures that best meets their security and organizational requirements. Utilities should optimally utilize their limited resources to prepare and implement necessary programs that are designed to increase cyber-security over the years. Implementing cyber security does not necessarily have to be expensive, substantial improvements can be accomplished through policy, procedure, training and awareness. Utilities can also get creative and allocate more funding through annual budgets and reduce dependence upon capital improvement programs to achieve improvements in cyber-security.

  18. The Cyber-Physical Attacker

    DEFF Research Database (Denmark)

    Vigo, Roberto

    2012-01-01

    The world of Cyber-Physical Systems ranges from industrial to national interest applications. Even though these systems are pervading our everyday life, we are still far from fully understanding their security properties. Devising a suitable attacker model is a crucial element when studying...... the security properties of CPSs, as a system cannot be secured without defining the threats it is subject to. In this work an attacker scenario is presented which addresses the peculiarities of a cyber-physical adversary, and we discuss how this scenario relates to other attacker models popular in the security...

  19. Suggestion of a Framework to Analyze Failure Modes and Effect of Cyber Attacks in NPP

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Chan Young; Seong, Poong Hyun [KAIST, Daejeon (Korea, Republic of)

    2016-05-15

    The cyber security issue on NPP is inevitable issue. Unlike general cyber security, cyber-physical system like NPP can induce serious consequences such as core damage by cyber-attack. So in this paper, to find how hacker can attack the NPP, (1) PSA results were utilized to find the relationship between physical system and cyber-attack and (2) vulnerabilities on digital control systems were investigated to find how hacker can implement the possible attack. It is expected that these steps are utilized when establishing penetration test plans or cyber security drill plans.

  20. Suggestion of a Framework to Analyze Failure Modes and Effect of Cyber Attacks in NPP

    International Nuclear Information System (INIS)

    Lee, Chan Young; Seong, Poong Hyun

    2016-01-01

    The cyber security issue on NPP is inevitable issue. Unlike general cyber security, cyber-physical system like NPP can induce serious consequences such as core damage by cyber-attack. So in this paper, to find how hacker can attack the NPP, (1) PSA results were utilized to find the relationship between physical system and cyber-attack and (2) vulnerabilities on digital control systems were investigated to find how hacker can implement the possible attack. It is expected that these steps are utilized when establishing penetration test plans or cyber security drill plans

  1. AMC Model for Denial of Sleep Attack Detection

    OpenAIRE

    Bhattasali, Tapalina; Chaki, Rituparna

    2012-01-01

    Due to deployment in hostile environment, wireless sensor network is vulnerable to various attacks. Exhausted sensor nodes in sensor network become a challenging issue because it disrupts the normal connectivity of the network. Affected nodes give rise to denial of service that resists to get the objective of sensor network in real life. A mathematical model based on Absorbing Markov Chain (AMC)is proposed for Denial of Sleep attack detection in sensor network. In this mechanism, whether sens...

  2. Forensics Investigation of Web Application Security Attacks

    OpenAIRE

    Amor Lazzez; Thabet Slimani

    2015-01-01

    Nowadays, web applications are popular targets for security attackers. Using specific security mechanisms, we can prevent or detect a security attack on a web application, but we cannot find out the criminal who has carried out the security attack. Being unable to trace back an attack, encourages hackers to launch new attacks on the same system. Web application forensics aims to trace back and attribute a web application security attack to its originator. This may significantly reduce the sec...

  3. Lung Damage due to Chemotherapeutic Agents

    Directory of Open Access Journals (Sweden)

    Serdar Kalemci

    2014-12-01

    Full Text Available Chemotherapeutic drug-induced pulmonary toxicity not only emerges in cumulative doses, but also can be observed even at low dosages. Combined administration of many drugs, concurrent radiotherapy applications, opportunistic infections, lymphangitic tumor extension and pleural metastases complicate the disease diagnosis.

  4. Damage caused due to foundry smoke

    Energy Technology Data Exchange (ETDEWEB)

    1891-01-01

    A detailed analysis of an air pollution event which occurred in 1891 in the vicinity of a superphosphate plant is given. The logic and tests used to implicate HF as the causative agent of environmental stress are detailed thoroughly.

  5. Superposition Attacks on Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Funder, Jakob Løvstad; Nielsen, Jesper Buus

    2011-01-01

    of information. In this paper, we introduce a fundamentally new model of quantum attacks on classical cryptographic protocols, where the adversary is allowed to ask several classical queries in quantum superposition. This is a strictly stronger attack than the standard one, and we consider the security......Attacks on classical cryptographic protocols are usually modeled by allowing an adversary to ask queries from an oracle. Security is then defined by requiring that as long as the queries satisfy some constraint, there is some problem the adversary cannot solve, such as compute a certain piece...... of several primitives in this model. We show that a secret-sharing scheme that is secure with threshold $t$ in the standard model is secure against superposition attacks if and only if the threshold is lowered to $t/2$. We use this result to give zero-knowledge proofs for all of NP in the common reference...

  6. Genetic attack on neural cryptography.

    Science.gov (United States)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  7. Panic Attacks and Panic Disorder

    Science.gov (United States)

    ... Major changes in your life, such as a divorce or the addition of a baby Smoking or ... quality of life. Complications that panic attacks may cause or be linked to include: Development of specific ...

  8. Genetic attack on neural cryptography

    International Nuclear Information System (INIS)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-01-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size

  9. Genetic attack on neural cryptography

    Science.gov (United States)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  10. What Is a Heart Attack?

    Science.gov (United States)

    ... medical center. Support from family and friends also can help relieve stress and anxiety. Let your loved ones know how you feel and what they can do to help you. Risk of a Repeat Heart Attack Once ...

  11. Software-based Microarchitectural Attacks

    OpenAIRE

    Gruss, Daniel

    2017-01-01

    Modern processors are highly optimized systems where every single cycle of computation time matters. Many optimizations depend on the data that is being processed. Software-based microarchitectural attacks exploit effects of these optimizations. Microarchitectural side-channel attacks leak secrets from cryptographic computations, from general purpose computations, or from the kernel. This leakage even persists across all common isolation boundaries, such as processes, containers, and virtual ...

  12. OPERATION COBRA. Deliberate Attack, Exploitation

    Science.gov (United States)

    1984-05-25

    to attack Sens, then continue to Troyes , on the Seine River. CCA was in the north, crossing the Loing River at Souppes against light resistance and...advanced from Troyes and prepared positions close to Sens. Under strong artillery support, a task force from CCA (TF Oden) attacked the enemy frontally...movement towards the Seine River on 24 August with an advance toward Troyes . Facing the combat command were what remained of the 51st SS Brigade, light

  13. The accountability problem of flooding attacks in service-oriented architectures

    DEFF Research Database (Denmark)

    Jensen, Meiko; Schwenk, Jörg

    2009-01-01

    The threat of Denial of Service attacks poses a serious problem to the security of network-based services in general. For flooding attacks against service-oriented applications, this threat is dramatically amplified with potentially much higher impact and very little effort on the attacker's side....... Additionally, due to the high distribution of a SOA application's components, fending such attacks becomes a far more complex task. In this paper, we present the problem of accountability, referring to the issue of resolving the attacker in a highly distributed service-oriented application. Using a general...

  14. Collateral Damage to Satellites from an EMP Attack

    Science.gov (United States)

    2010-08-01

    field into regions of weak magnetic field [Stern. 1989, and references therein]. Birkeland’s work captured the interest of auroral researcher Stormer ...dipole magnetic field [ Stormer , 1907]. Although mathematically elegant, Stormer theory did not prove the existence of radiation belts; it set the stage...Based on work by Stormer , Alfven, and others, and on his experience with the Astron thermonuclear device, N. Christofolis in October 1957 suggested

  15. Damage analysis: damage function development and application

    International Nuclear Information System (INIS)

    Simons, R.L.; Odette, G.R.

    1975-01-01

    The derivation and application of damage functions, including recent developments for the U.S. LMFBR and CTR programs, is reviewed. A primary application of damage functions is in predicting component life expectancies; i.e., the fluence required in a service spectrum to attain a specified design property change. An important part of the analysis is the estimation of the uncertainty in such fluence limit predictions. The status of standardizing the procedures for the derivation and application of damage functions is discussed. Improvements in several areas of damage function development are needed before standardization can be completed. These include increasing the quantity and quality of the data used in the analysis, determining the limitations of the analysis due to the presence of multiple damage mechanisms, and finally, testing of damage function predictions against data obtained from material surveillance programs in operating thermal and fast reactors. 23 references. (auth)

  16. Multilevel Modeling of Distributed Denial of Service Attacks in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Katarzyna Mazur

    2016-01-01

    Full Text Available The growing popularity of wireless sensor networks increases the risk of security attacks. One of the most common and dangerous types of attack that takes place these days in any electronic society is a distributed denial of service attack. Due to the resource constraint nature of mobile sensors, DDoS attacks have become a major threat to its stability. In this paper, we established a model of a structural health monitoring network, being disturbed by one of the most common types of DDoS attacks, the flooding attack. Through a set of simulations, we explore the scope of flood-based DDoS attack problem, assessing the performance and the lifetime of the network under the attack condition. To conduct our research, we utilized the Quality of Protection Modeling Language. With the proposed approach, it was possible to examine numerous network configurations, parameters, attack options, and scenarios. The results of the carefully performed multilevel analysis allowed us to identify a new kind of DDoS attack, the delayed distributed denial of service, by the authors, referred to as DDDoS attack. Multilevel approach to DDoS attack analysis confirmed that, examining endangered environments, it is significant to take into account many characteristics at once, just to not overlook any important aspect.

  17. Development of an accelerated test for Internal Sulfate Attack study

    Directory of Open Access Journals (Sweden)

    Khelil Nacim

    2014-04-01

    Full Text Available Internal Sulfate Attack (ISA is a pathology that occurs under certain conditions in concrete having undergone heating above 70 °C at early age (through heating in pre-casting industry or due to hydration in large concrete parts. This reaction deemed very slow, numerous methods to speed up reactions leading to delayed ettringite formation have been developed. These methods are all based on the material damage. Another type of test is currently under development. It is based on rehabilitation techniques such as electrochemical chloride extraction (ECE in order to accelerate the leaching of alkalis that could be one of the triggers of the pathology. The study presented in this paper focused on concrete specimens prepared from cement (CEM I 52.5 N enriched with Na2SO4. These concretes have undergone a heat treatment typical of those used in precast plants (up to 24 hours with a maximum temperature of 80 °C. Various paths were explored for the development of the accelerated test. The first results showed that it was necessary to use a removable titanium anode ruthenium anode instead of stainless steel embedded in the concrete. Then tests with de-ionized water as the solute to the cathode did not accelerate the onset of expansions. The experiment has been modified and potassium carbonate was added to the solution. This modification didn’t show any significant improvement, and other experiments are being carried out to explain this result.

  18. Automated Generation of Attack Trees

    DEFF Research Database (Denmark)

    Vigo, Roberto; Nielson, Flemming; Nielson, Hanne Riis

    2014-01-01

    Attack trees are widely used to represent threat scenarios in a succinct and intuitive manner, suitable for conveying security information to non-experts. The manual construction of such objects relies on the creativity and experience of specialists, and therefore it is error-prone and impractica......Attack trees are widely used to represent threat scenarios in a succinct and intuitive manner, suitable for conveying security information to non-experts. The manual construction of such objects relies on the creativity and experience of specialists, and therefore it is error......-prone and impracticable for large systems. Nonetheless, the automated generation of attack trees has only been explored in connection to computer networks and levering rich models, whose analysis typically leads to an exponential blow-up of the state space. We propose a static analysis approach where attack trees...... are automatically inferred from a process algebraic specification in a syntax-directed fashion, encompassing a great many application domains and avoiding incurring systematically an exponential explosion. Moreover, we show how the standard propositional denotation of an attack tree can be used to phrase...

  19. Finding Multi-step Attacks in Computer Networks using Heuristic Search and Mobile Ambients

    NARCIS (Netherlands)

    Nunes Leal Franqueira, V.

    2009-01-01

    An important aspect of IT security governance is the proactive and continuous identification of possible attacks in computer networks. This is complicated due to the complexity and size of networks, and due to the fact that usually network attacks are performed in several steps. This thesis proposes

  20. Interval forecasting of cyber-attacks on industrial control systems

    Science.gov (United States)

    Ivanyo, Y. M.; Krakovsky, Y. M.; Luzgin, A. N.

    2018-03-01

    At present, cyber-security issues of industrial control systems occupy one of the key niches in a state system of planning and management Functional disruption of these systems via cyber-attacks may lead to emergencies related to loss of life, environmental disasters, major financial and economic damage, or disrupted activities of cities and settlements. There is then an urgent need to develop protection methods against cyber-attacks. This paper studied the results of cyber-attack interval forecasting with a pre-set intensity level of cyber-attacks. Interval forecasting is the forecasting of one interval from two predetermined ones in which a future value of the indicator will be obtained. For this, probability estimates of these events were used. For interval forecasting, a probabilistic neural network with a dynamic updating value of the smoothing parameter was used. A dividing bound of these intervals was determined by a calculation method based on statistical characteristics of the indicator. The number of cyber-attacks per hour that were received through a honeypot from March to September 2013 for the group ‘zeppo-norcal’ was selected as the indicator.

  1. An Analysis of Attacks on Blockchain Consensus

    OpenAIRE

    Bissias, George; Levine, Brian Neil; Ozisik, A. Pinar; Andresen, Gavin

    2016-01-01

    We present and validate a novel mathematical model of the blockchain mining process and use it to conduct an economic evaluation of the double-spend attack, which is fundamental to all blockchain systems. Our analysis focuses on the value of transactions that can be secured under a conventional double-spend attack, both with and without a concurrent eclipse attack. Our model quantifies the importance of several factors that determine the attack's success, including confirmation depth, attacke...

  2. Recurrent spontaneous attacks of dizziness.

    Science.gov (United States)

    Lempert, Thomas

    2012-10-01

    This article describes the common causes of recurrent vertigo and dizziness that can be diagnosed largely on the basis of history. Ninety percent of spontaneous recurrent vertigo and dizziness can be explained by six disorders: (1) Ménière disease is characterized by vertigo attacks, lasting 20 minutes to several hours, with concomitant hearing loss, tinnitus, and aural fullness. Aural symptoms become permanent during the course of the disease. (2) Attacks of vestibular migraine may last anywhere from minutes to days. Most patients have a previous history of migraine headaches, and many experience migraine symptoms during the attack. (3) Vertebrobasilar TIAs affect older adults with vascular risk factors. Most attacks last less than 1 hour and are accompanied by other symptoms from the posterior circulation territory. (4) Vestibular paroxysmia is caused by vascular compression of the eighth cranial nerve. It manifests itself with brief attacks of vertigo that recur many times per day, sometimes with concomitant cochlear symptoms. (5) Orthostatic hypotension causes brief episodes of dizziness lasting seconds to a few minutes after standing up and is relieved by sitting or lying down. In older adults, it may be accompanied by supine hypertension. (6) Panic attacks usually last minutes, occur in specific situations, and are accompanied by choking, palpitations, tremor, heat, and anxiety. Less common causes of spontaneous recurrent vertigo and dizziness include perilymph fistula, superior canal dehiscence, autoimmune inner ear disease, otosclerosis, cardiac arrhythmia, and medication side effects. Neurologists need to venture into otolaryngology, internal medicine, and psychiatry to master the differential diagnosis of recurrent dizziness.

  3. Nonlinear analysis of NPP safety against the aircraft attack

    International Nuclear Information System (INIS)

    Králik, Juraj; Králik, Juraj

    2016-01-01

    The paper presents the nonlinear probabilistic analysis of the reinforced concrete buildings of nuclear power plant under the aircraft attack. The dynamic load is defined in time on base of the airplane impact simulations considering the real stiffness, masses, direction and velocity of the flight. The dynamic response is calculated in the system ANSYS using the transient nonlinear analysis solution method. The damage of the concrete wall is evaluated in accordance with the standard NDRC considering the spalling, scabbing and perforation effects. The simple and detailed calculations of the wall damage are compared.

  4. Nonlinear analysis of NPP safety against the aircraft attack

    Energy Technology Data Exchange (ETDEWEB)

    Králik, Juraj, E-mail: juraj.kralik@stuba.sk [Faculty of Civil Engineering, STU in Bratislava, Radlinského 11, 813 68 Bratislava (Slovakia); Králik, Juraj, E-mail: kralik@fa.stuba.sk [Faculty of Architecture, STU in Bratislava, Námestie Slobody 19, 812 45 Bratislava (Slovakia)

    2016-06-08

    The paper presents the nonlinear probabilistic analysis of the reinforced concrete buildings of nuclear power plant under the aircraft attack. The dynamic load is defined in time on base of the airplane impact simulations considering the real stiffness, masses, direction and velocity of the flight. The dynamic response is calculated in the system ANSYS using the transient nonlinear analysis solution method. The damage of the concrete wall is evaluated in accordance with the standard NDRC considering the spalling, scabbing and perforation effects. The simple and detailed calculations of the wall damage are compared.

  5. Attacker-defender game from a network science perspective

    Science.gov (United States)

    Li, Ya-Peng; Tan, Suo-Yi; Deng, Ye; Wu, Jun

    2018-05-01

    Dealing with the protection of critical infrastructures, many game-theoretic methods have been developed to study the strategic interactions between defenders and attackers. However, most game models ignore the interrelationship between different components within a certain system. In this paper, we propose a simultaneous-move attacker-defender game model, which is a two-player zero-sum static game with complete information. The strategies and payoffs of this game are defined on the basis of the topology structure of the infrastructure system, which is represented by a complex network. Due to the complexity of strategies, the attack and defense strategies are confined by two typical strategies, namely, targeted strategy and random strategy. The simulation results indicate that in a scale-free network, the attacker virtually always attacks randomly in the Nash equilibrium. With a small cost-sensitive parameter, representing the degree to which costs increase with the importance of a target, the defender protects the hub targets with large degrees preferentially. When the cost-sensitive parameter exceeds a threshold, the defender switches to protecting nodes randomly. Our work provides a new theoretical framework to analyze the confrontations between the attacker and the defender on critical infrastructures and deserves further study.

  6. Mitigating Higher Ed Cyber Attacks

    Science.gov (United States)

    Rogers, Gary; Ashford, Tina

    2015-01-01

    In this presentation we will discuss the many and varied cyber attacks that have recently occurred in the higher ed community. We will discuss the perpetrators, the victims, the impact and how these institutions have evolved to meet this threat. Mitigation techniques and defense strategies will be covered as will a discussion of effective security…

  7. Detection of complex cyber attacks

    Science.gov (United States)

    Gregorio-de Souza, Ian; Berk, Vincent H.; Giani, Annarita; Bakos, George; Bates, Marion; Cybenko, George; Madory, Doug

    2006-05-01

    One significant drawback to currently available security products is their inabilty to correlate diverse sensor input. For instance, by only using network intrusion detection data, a root kit installed through a weak username-password combination may go unnoticed. Similarly, an administrator may never make the link between deteriorating response times from the database server and an attacker exfiltrating trusted data, if these facts aren't presented together. Current Security Information Management Systems (SIMS) can collect and represent diverse data but lack sufficient correlation algorithms. By using a Process Query System, we were able to quickly bring together data flowing from many sources, including NIDS, HIDS, server logs, CPU load and memory usage, etc. We constructed PQS models that describe dynamic behavior of complicated attacks and failures, allowing us to detect and differentiate simultaneous sophisticated attacks on a target network. In this paper, we discuss the benefits of implementing such a multistage cyber attack detection system using PQS. We focus on how data from multiple sources can be combined and used to detect and track comprehensive network security events that go unnoticed using conventional tools.

  8. Testing Silica Fume-Based Concrete Composites under Chemical and Microbiological Sulfate Attacks

    Directory of Open Access Journals (Sweden)

    Adriana Estokova

    2016-04-01

    Full Text Available Current design practices based on descriptive approaches to concrete specification may not be appropriate for the management of aggressive environments. In this study, the durability of cement-based materials with and without the addition of silica fume, subjected to conditions that leach calcium and silicon, were investigated. Chemical corrosion was simulated by employing various H2SO4 and MgSO4 solutions, and biological corrosion was simulated using Acidithiobacillus sp. bacterial inoculation, leading to disrupted and damaged surfaces; the samples’ mass changes were studied following both chemical and biological attacks. Different leaching trends were observed via X-ray fluorescence when comparing chemical with biological leaching. Lower leaching rates were found for concrete samples fortified with silica fume than those without silica fume. X-ray diffraction and scanning electron microscopy confirmed a massive sulfate precipitate formation on the concrete surface due to bacterial exposure.

  9. Current therapy for chronic cerebrovascular attack

    Directory of Open Access Journals (Sweden)

    A. A. Shmonin

    2015-01-01

    Full Text Available Chronic cerebrovascular attack (CCVA is a brain lesion caused by vascular factors. CCVA appears as cognitive impairments (CIs, affective (emotional disorders and focal syndromes. Treatment for CCVA requires a comprehensive approach. Effective combination therapy for CCVA involves secondary prevention of stroke and CIs; treatment of CIs; treatment of depression and other affective disorders; and neuroprotective therapy. Basic therapy for CCVA includes modification of risk factors, antihypertensive, hypolipidemic, and antithrombotic therapies. Central acetylcholinesterase inhibitors (galantamine, rivastigmine, donepezil and a reversible NMDA receptor blocker (memantine are symptomatically used at a stage of vascular and mixed dementia. There are no unique guidelines for the therapy of mild and moderate vascular nondementia-related CIs. Drug use, based on the neurochemical mechanisms underlying the development of vascular CIs, is substantiated. When choosing psychotropic agents, it is necessary to take into account the causes and clinical manifestations of neuromediator deficiency. Antidepressants are used as essential drugs. Neuroleptics and tranquilizers are additionally administered in complex-pattern syndromes, such as depression with marked anxiety. Prescription of neuroprotectors may be effective in treating both stroke and CCVA. These medicaments are most effective when a damaging factor acts, i.e. neuroprotectors should be given in a risk situation and to reduce damage. Citicoline is one of the most test drugs in a group of neuroprotectors. 

  10. Critical location identification and vulnerability analysis of interdependent infrastructure systems under spatially localized attacks

    International Nuclear Information System (INIS)

    Ouyang, Min

    2016-01-01

    Infrastructure systems are usually spatially distributed in a wide area and are subject to many types of hazards. For each type of hazards, modeling their direct impact on infrastructure components and analyzing their induced system-level vulnerability are important for identifying mitigation strategies. This paper mainly studies spatially localized attacks that a set of infrastructure components located within or crossing a circle shaped spatially localized area is subject to damage while other components do not directly fail. For this type of attacks, taking interdependent power and gas systems in Harris County, Texas, USA as an example, this paper proposes an approach to exactly identify critical locations in interdependent infrastructure systems and make pertinent vulnerability analysis. Results show that (a) infrastructure interdependencies and attack radius largely affect the position of critical locations; (b) spatially localized attacks cause less vulnerability than equivalent random failures; (c) in most values of attack radius critical locations identified by considering only node failures do not change when considering both node and edge failures in the attack area; (d) for many values of attack radius critical locations identified by topology-based model are also critical from the flow-based perspective. - Highlights: • We propose a method to identify critical locations in interdependent infrastructures. • Geographical interdependencies and attack radius largely affect critical locations. • Localized attacks cause less vulnerability than equivalent random failures. • Whether considering both node and edge failures affects critical locations. • Topology-based critical locations are also critical from flow-based perspective.

  11. Euxesta spp. NEW PEST IN Zea mays L. VAR. rugosa: ASSOCIATION WITH Heliothis zea ATTACKS IN SPRING AND SUMMER SEEDS

    Directory of Open Access Journals (Sweden)

    María Cecilia Curis

    2015-12-01

    Full Text Available The "corn silk fly" of maize (Euxesta spp. Loew, 1868 appeared in 2005 in Santa Fe (Argentina, causing damage to the ears. The attacks are related to temperature, crop growth stage and previous attack of other pests. For this new pest, we determined the species present, the damage on Bt sweet corn plantings in two seasons (August and February, the association of attacks with Heliothis zea (Boddie, 1850 and the presence of parasitoids. Larvae counts of H. zea and Euxesta spp. began in the phenological stage of R2 and ended in R5 and consisted of removing at random from each batch (three for each planting season four ears. In laboratory we determined the percentage of damage on the ears and number of larvae of Euxesta spp. and H. zea, discriminated by size. Fly was identified as E. eluta, damage was greatest in the early spring planting corn. Attacks were correlated with H. zea.

  12. Protection of Microkernel Environment L4Re from Stack-smashed Attacks

    OpenAIRE

    Vasily Andreevich Sartakov; Alexander Sergeevich Tarasikov

    2014-01-01

    Microkernel-based operating systems provide high level of protection due to the strong isolation of components, small size of Trusted Computing Base and execution of drivers in user space. At the same time, such systems are vulnerable to a stack overflow attacks, because these attacks exploit the hardware features of the platform, such as shared memory space for data and code. Modern architectures, such as AMD64 and ARM, provide opportunities to counteract attacks at the hardware level by dis...

  13. [Treatment strategies for mass casualty incidents and terrorist attacks in trauma and vascular surgery : Presentation of a treatment concept].

    Science.gov (United States)

    Friemert, B; Franke, A; Bieler, D; Achatz, A; Hinck, D; Engelhardt, M

    2017-10-01

    The treatment of patients in the context of mass casualty incidents (MCI) represents a great challenge for the participating rescue workers and clinics. Due to the increase in terrorist activities it is necessary to become familiar with this new kind of threat to civilization with respect to the medical treatment of victims of terrorist attacks. There are substantial differences between a "normal" MCI and a terrorist MCI with respect to injury patterns (blunt trauma vs. penetrating/perforating trauma), the type and form of the incident (MCI=static situation vs. terrorist attack MCI= dynamic situation) and the different security positions (rescue services vs. police services). This article is concerned with question of which changes in the surgical treatment of patients are made necessary by these new challenges. In this case it is necessary that physicians are familiar with the different injury patterns, whereby priority must be given to gunshot and explosion (blast) injuries. Furthermore, altered strategic and tactical approaches (damage control surgery vs. tactical abbreviated surgical care) are necessary to ensure survival for as many victims of terrorist attacks as possible and also to achieve the best possible functional results. It is only possible to successfully counter these new challenges by changing the mindset in the treatment of terrorist MCI compared to MCI incidents. An essential component of this mindset is the acquisition of a maximum of flexibility. This article would like to make a contribution to this problem.

  14. Exploring Energy Consumption of Juice Filming Charging Attack on Smartphones: A Pilot Study

    DEFF Research Database (Denmark)

    Jiang, Lijun; Meng, Weizhi; Wang, Michael Yu

    2017-01-01

    ) attack is one example, which can steal users’ sensitive information from both Android OS and iOS devices, through automatically recording phone-screen information and the user inputs during the charging process. The rationale is that users’ information can be leaked through a standard micro USB connector...... that employs the Mobile High-Definition Link (MHL) standard. Motivated by the potential damage of charging attack, we focus on JFC attack in this paper, and investigate for the first time the energy consumption, especially CPU usage caused by JFC attack. In particular, we conduct a user study with over 500...... participants and identify that JFC attack may increase CPU usage when connecting the phone to the malicious charger, but this anomaly is hard for raising the attention from a common user. Our work aims to complement existing state-of-the-art results, raise more attention and stimulate more research on charging...

  15. Cyber Attack on Critical Infrastructure and Its Influence on International Security

    OpenAIRE

    出口 雅史

    2017-01-01

     Since the internet appeared, with increasing cyber threats, the vulnerability of critical infrastructure has become a vital issue for international security. Although cyber attack was not lethal in the past, new type of cyber assaults such as stuxnet are able to damage not only computer system digitally, but also critical infrastructure physically. This article will investigate how the recent cyber attacks have threatened critical infrastructure and their influence on international security....

  16. PROTECTION WORKS AGAINST WAVE ATTACKS IN THE HAOR AREAS OF BANGLADESH: ANALYSIS OF SUSTAINABILITY

    Directory of Open Access Journals (Sweden)

    M.K. Alam

    2010-12-01

    Full Text Available Haor is the local name of the saucer-shaped, naturally depressed areas of Bangladesh. There are 414 haors in the northeast region that comprise approximately 17% of the country. These areas are submerged under deep water from July to November due to the overflow of rivers and heavy rainfall, causing them to appear like seas with erosive waves. Recently, the wave attack has drastically increased because of de-plantation and changing cropping patterns to allow for more agricultural production. The local people, government and Non-Government Organisations (NGOs have tried many techniques to protect life and property against wave attacks. A cost comparison shows that Cement Concrete (CC blocks over geotextile on the slope embankment is a cost-effective, environment friendly and socially acceptable method to prevent loss of life and property. However, the design rules employed by the engineers are faulty because there is knowledge gap in the application of wave hydraulics among these professionals. As a result, damage frequently occurs and maintenance costs are increasing. This study explores the sustainability of the CC blocks used in the Haor areas by evaluating two case studies with the verification of available design rules.

  17. Peacetime Use of Computer Network Attack

    National Research Council Canada - National Science Library

    Busby, Daniel

    2000-01-01

    .... PDD-63 alerts the nation to prepare for impending cyber attacks. This paper examines the nature, scale, and likelihood of cyber attacks posited in PDD-63 and finds that the country does not face an imminent "electronic Pearl Harbor...

  18. Women's Heart Disease: Heart Attack Symptoms

    Science.gov (United States)

    ... of this page please turn JavaScript on. Feature: Women's Heart Disease Heart Attack Symptoms Past Issues / Winter ... most common heart attack symptom in men and women is chest pain or discomfort. However, women also ...

  19. Stochastic Model of TCP SYN Attacks

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2011-08-01

    Full Text Available A great proportion of essential services are moving into internet space making the threat of DoS attacks even more actual. To estimate the real risk of some kind of denial of service (DoS attack in real world is difficult, but mathematical and software models make this task easier. In this paper we overview the ways of implementing DoS attack models and offer a stochastic model of SYN flooding attack. It allows evaluating the potential threat of SYN flooding attacks, taking into account both the legitimate system flow as well as the possible attack power. At the same time we can assess the effect of such parameters as buffer capacity, open connection storage in the buffer or filte­ring efficiency on the success of different SYN flooding attacks. This model can be used for other type of memory depletion denial of service attacks.Article in Lithuanian

  20. Robust Detection of Stepping-Stone Attacks

    National Research Council Canada - National Science Library

    He, Ting; Tong, Lang

    2006-01-01

    The detection of encrypted stepping-stone attack is considered. Besides encryption and padding, the attacker is capable of inserting chaff packets and perturbing packet timing and transmission order...

  1. Using an ontology for network attack planning

    CSIR Research Space (South Africa)

    Van Heerden, R

    2016-09-01

    Full Text Available The modern complexity of network attacks and their counter-measures (cyber operations) requires detailed planning. This paper presents a Network Attack Planning ontology which is aimed at providing support for planning such network operations within...

  2. Attack Graph Construction for Security Events Analysis

    Directory of Open Access Journals (Sweden)

    Andrey Alexeevich Chechulin

    2014-09-01

    Full Text Available The paper is devoted to investigation of the attack graphs construction and analysis task for a network security evaluation and real-time security event processing. Main object of this research is the attack modeling process. The paper contains the description of attack graphs building, modifying and analysis technique as well as overview of implemented prototype for network security analysis based on attack graph approach.

  3. Big News: The Indian Media and Student Attacks in Australia

    Directory of Open Access Journals (Sweden)

    Matt Wade

    2016-05-01

    Full Text Available By any measure, 2009 was a big year for news in India. And yet the safety of Indian students in Australia ranked among the major news events in India that year. The India-Australia Poll 2013 found 65 per cent of respondents believed the Indian media had accurately reported the problems faced by Indian students in Australia in 2009-10. That implies two-thirds of Indians accepted the Indian media’s mostly negative depictions of Australia. Those who believed the media reporting about Australia had been accurate were more likely to be from large cities, be tertiary educated and have relatively high-incomes. The poll found 62 per cent of respondents thought Australia was a dangerous place for Indian students and that 61 per cent believed attacks on Indian students were motivated by racism. The results suggest negative perceptions about Australia created by the media’s portrayal of the student attacks linger in the Indian community. The timing of the initial attacks, and the imagery associated with them, helped attract and sustain media attention on the issue. The diplomatic tensions created by the crisis highlighted the growing influence of the broadcast media on India’s foreign relations. But the episode also exposed a deep lack of understanding about India in Australia. Governments were slow to comprehend how much damage media coverage of student attacks could do to Australia’s reputation in India.

  4. Attacks and countermeasures on AES and ECC

    DEFF Research Database (Denmark)

    Tange, Henrik; Andersen, Birger

    2013-01-01

    AES (Advanced Encryption Standard) is widely used in LTE and Wi-Fi communication systems. AES has recently been exposed to new attacks which have questioned the overall security of AES. The newest attack is a so called biclique attack, which is using the fact that the content of the state array...

  5. Automated classification of computer network attacks

    CSIR Research Space (South Africa)

    Van Heerden, R

    2013-11-01

    Full Text Available according to the relevant types of attack scenarios depicted in the ontology. The two network attack instances are the Distributed Denial of Service attack on SpamHaus in 2013 and the theft of 42 million Rand ($6.7 million) from South African Postbank...

  6. Cyberprints: Identifying Cyber Attackers by Feature Analysis

    Science.gov (United States)

    Blakely, Benjamin A.

    2012-01-01

    The problem of attributing cyber attacks is one of increasing importance. Without a solid method of demonstrating the origin of a cyber attack, any attempts to deter would-be cyber attackers are wasted. Existing methods of attribution make unfounded assumptions about the environment in which they will operate: omniscience (the ability to gather,…

  7. A study on the mechanism of speculative attack and the defence strategy of the central bank.

    Directory of Open Access Journals (Sweden)

    Chang-Hyun Yun

    1999-09-01

    Full Text Available We first analyze the concrete mechanism of speculative attack on the foreign exchange market which became very prevalent phenomena during the foreign exchange crisis. When the central bank of the domestic country tries to defend the attack by increasing the interest rate, some problems can arise in that the speculative attacks through foreign exchange options market and/or index futures markets can be very successful due to that policy. So the central bank should pay much attention to the microstructure of the financial markets when the defence strategy against speculative attack is determined.

  8. Vesper: Using Echo-Analysis to Detect Man-in-the-Middle Attacks in LANs

    OpenAIRE

    Mirsky, Yisroel; Kalbo, Naor; Elovici, Yuval; Shabtai, Asaf

    2018-01-01

    The Man-in-the-Middle (MitM) attack is a cyber-attack in which an attacker intercepts traffic, thus harming the confidentiality, integrity, and availability of the network. It remains a popular attack vector due to its simplicity. However, existing solutions are either not portable, suffer from a high false positive rate, or are simply not generic. In this paper, we propose Vesper: a novel plug-and-play MitM detector for local area networks. Vesper uses a technique inspired from impulse respo...

  9. A simple coherent attack and practical security of differential phase shift quantum cryptography

    International Nuclear Information System (INIS)

    Kronberg, D A

    2014-01-01

    The differential phase shift quantum key distribution protocol reveals good security against such powerful attacks as unambiguous state discrimination and beam splitting attacks. Its complete security analysis is complex due to high dimensions of the supposed spaces and density operators. In this paper, we consider a particular and conceptually simple coherent attack, available in practical implementations. The main condition for this attack is the length of used coherent state tuples of order 8–12. We show that under this condition, no high level of practical distance between legitimate users can be achieved. (paper)

  10. Damages and methods for reparation; Hydropower structures; Skador och reparationsmetoder

    Energy Technology Data Exchange (ETDEWEB)

    Sandstroem, Tomas

    2008-10-15

    structures are also presented in this report. The input used for establishing the most common types of damage are taken from studies made in the USA and Sweden as well as from the literature and from observations made at some Swedish hydropower plants. In conclusion, the following can be said about the need of overlays in regard to Hydropower applications and about the deteriorating processes acting in those environments: The bulk of the damages that occur on the concrete structures can be derived to the environment and the physical and chemical attacks caused by it. The deterioration of concrete structures are therefore more likely to occur due to the environmental affects than due to extensive live loads caused by ice, wind, water, snow etc. Overlays and/toppings are repair techniques that are adequate for repairing most of the damages that occur on concrete structures in Hydropower environments. The performance of the repair work as well as the determination of the composition of the repair mortar or concrete can sometimes be difficult tasks to undertake, often due to the environment (location of the damage and the underlying cause of damage). The continuing work regarding overlays and toppings for Hydropower environments should focus on long-term properties and affects with regards to the whole repair work (including the repair material, the host material and the transition zone). The conclusions above show that there are a rather high potential good with the pursuing of an extensive knowledge in this area

  11. Breakthrough attacks in patients with hereditary angioedema receiving long-term prophylaxis are responsive to icatibant

    DEFF Research Database (Denmark)

    Aberer, Werner; Maurer, Marcus; Bouillet, Laurence

    2017-01-01

    BACKGROUND: Patients with hereditary angioedema (HAE) due to C1-inhibitor deficiency (C1-INH-HAE) experience recurrent attacks of cutaneous or submucosal edema that may be frequent and severe; prophylactic treatments can be prescribed to prevent attacks. However, despite the use of long-term prop...

  12. Securing ad hoc wireless sensor networks under Byzantine attacks by implementing non-cryptographic method

    Directory of Open Access Journals (Sweden)

    Shabir Ahmad Sofi

    2017-05-01

    Full Text Available Ad Hoc wireless sensor network (WSN is a collection of nodes that do not need to rely on predefined infrastructure to keep the network connected. The level of security and performance are always somehow related to each other, therefore due to limited resources in WSN, cryptographic methods for securing the network against attacks is not feasible. Byzantine attacks disrupt the communication between nodes in the network without regard to its own resource consumption. This paper discusses the performance of cluster based WSN comparing LEACH with Advanced node based clusters under byzantine attacks. This paper also proposes an algorithm for detection and isolation of the compromised nodes to mitigate the attacks by non-cryptographic means. The throughput increases after using the algorithm for isolation of the malicious nodes, 33% in case of Gray Hole attack and 62% in case of Black Hole attack.

  13. SYN Flood Attack Detection in Cloud Computing using Support Vector Machine

    Directory of Open Access Journals (Sweden)

    Zerina Mašetić

    2017-11-01

    Full Text Available Cloud computing is a trending technology, as it reduces the cost of running a business. However, many companies are skeptic moving about towards cloud due to the security concerns. Based on the Cloud Security Alliance report, Denial of Service (DoS attacks are among top 12 attacks in the cloud computing. Therefore, it is important to develop a mechanism for detection and prevention of these attacks. The aim of this paper is to evaluate Support Vector Machine (SVM algorithm in creating the model for classification of DoS attacks and normal network behaviors. The study was performed in several phases: a attack simulation, b data collection, cfeature selection, and d classification. The proposedmodel achieved 100% classification accuracy with true positive rate (TPR of 100%. SVM showed outstanding performance in DoS attack detection and proves that it serves as a valuable asset in the network security area.

  14. Neutralizing SQL Injection Attack Using Server Side Code Modification in Web Applications

    Directory of Open Access Journals (Sweden)

    Asish Kumar Dalai

    2017-01-01

    Full Text Available Reports on web application security risks show that SQL injection is the top most vulnerability. The journey of static to dynamic web pages leads to the use of database in web applications. Due to the lack of secure coding techniques, SQL injection vulnerability prevails in a large set of web applications. A successful SQL injection attack imposes a serious threat to the database, web application, and the entire web server. In this article, the authors have proposed a novel method for prevention of SQL injection attack. The classification of SQL injection attacks has been done based on the methods used to exploit this vulnerability. The proposed method proves to be efficient in the context of its ability to prevent all types of SQL injection attacks. Some popular SQL injection attack tools and web application security datasets have been used to validate the model. The results obtained are promising with a high accuracy rate for detection of SQL injection attack.

  15. Cyber attacks against state estimation in power systems: Vulnerability analysis and protection strategies

    Science.gov (United States)

    Liu, Xuan

    Power grid is one of the most critical infrastructures in a nation and could suffer a variety of cyber attacks. With the development of Smart Grid, false data injection attack has recently attracted wide research interest. This thesis proposes a false data attack model with incomplete network information and develops optimal attack strategies for attacking load measurements and the real-time topology of a power grid. The impacts of false data on the economic and reliable operations of power systems are quantitatively analyzed in this thesis. To mitigate the risk of cyber attacks, a distributed protection strategies are also developed. It has been shown that an attacker can design false data to avoid being detected by the control center if the network information of a power grid is known to the attacker. In practice, however, it is very hard or even impossible for an attacker to obtain all network information of a power grid. In this thesis, we propose a local load redistribution attacking model based on incomplete network information and show that an attacker only needs to obtain the network information of the local attacking region to inject false data into smart meters in the local region without being detected by the state estimator. A heuristic algorithm is developed to determine a feasible attacking region by obtaining reduced network information. This thesis investigates the impacts of false data on the operations of power systems. It has been shown that false data can be designed by an attacker to: 1) mask the real-time topology of a power grid; 2) overload a transmission line; 3) disturb the line outage detection based on PMU data. To mitigate the risk of cyber attacks, this thesis proposes a new protection strategy, which intends to mitigate the damage effects of false data injection attacks by protecting a small set of critical measurements. To further reduce the computation complexity, a mixed integer linear programming approach is also proposed to

  16. Calculating Adversarial Risk from Attack Trees: Control Strength and Probabilistic Attackers

    NARCIS (Netherlands)

    Pieters, Wolter; Davarynejad, Mohsen

    2015-01-01

    Attack trees are a well-known formalism for quantitative analysis of cyber attacks consisting of multiple steps and alternative paths. It is possible to derive properties of the overall attacks from properties of individual steps, such as cost for the attacker and probability of success. However, in

  17. Nonstructural carbohydrate dynamics of lodgepole pine dying from mountain pine beetle attack.

    Science.gov (United States)

    Wiley, Erin; Rogers, Bruce J; Hodgkinson, Robert; Landhäusser, Simon M

    2016-01-01

    Bark beetle outbreaks are an important cause of tree death, but the process by which trees die remains poorly understood. The effect of beetle attack on whole-tree nonstructural carbohydrate (NSC) dynamics is particularly unclear, despite the potential role of carbohydrates in plant defense and survival. We monitored NSC dynamics of all organs in attacked and protected lodgepole pines (Pinus contorta) during a mountain pine beetle (Dendroctonus ponderosae) outbreak in British Columbia, starting before beetle flight in June 2011 through October 2012, when most attacked trees had died. Following attack, NSC concentrations were first reduced in the attacked region of the bole. The first NSC reduction in a distant organ appeared in the needles at the end of 2011, while branch and root NSC did not decline until much later in 2012. Attacked trees that were still alive in October 2012 had less beetle damage, which was negatively correlated with initial bark sugar concentrations in the attack region. The NSC dynamics of dying trees indicate that trees were killed by a loss of water conduction and not girdling. Further, our results identify locally reduced carbohydrate availability as an important mechanism by which stressors like drought may increase tree susceptibility to biotic attack. © 2015 The Authors. New Phytologist © 2015 New Phytologist Trust.

  18. Assessing risk from intelligent attacks: A perspective on approaches

    International Nuclear Information System (INIS)

    Guikema, Seth D.; Aven, Terje

    2010-01-01

    Assessing the uncertainties in and severity of the consequences of intelligent attacks are fundamentally different from risk assessment for accidental events and other phenomena with inherently random failures. Intelligent attacks against a system involve adaptation on the part of the adversary. The probabilities of the initiating events depend on the risk management actions taken, and they may be more difficult to assess due to high degrees of epistemic uncertainty about the motivations and future actions of adversaries. Several fundamentally different frameworks have been proposed for assessing risk from intelligent attacks. These include basing risk assessment and management on game theoretic modelling of attacker actions, using a probabilistic risk analysis (PRA) approach based on eliciting probabilities of different initiating events from appropriate experts, assessing uncertainties beyond probabilities and expected values, and ignoring the probabilities of the attacks and choosing to protect highest valued targets. In this paper we discuss and compare the fundamental assumptions that underlie each of these approaches. We then suggest a new framework that makes the fundamental assumptions underlying the approaches clear to decision makers and presents them with a suite of results from conditional risk analysis methods. Each of the conditional methods presents the risk from a specified set of fundamental assumptions, allowing the decision maker to see the impacts of these assumptions on the risk management strategies considered and to weight the different conditional results with their assessments of the relative likelihood of the different sets of assumptions.

  19. Whispering through DDoS attack

    OpenAIRE

    Miralem Mehic; Jiri Slachta; Miroslav Voznak

    2016-01-01

    Denial of service (DoS) attack is an attempt of the attacker to disable victim's machine by depleting network or computing resources. If this attack is performed with more than one machine, it is called distributed denial of service (DDoS) attack. Covert channels are those channels which are used for information transmission even though they are neither designed nor intended to transfer information at all. In this article, we investigated the possibility of using of DDoS attack for purposes o...

  20. Script-viruses Attacks on UNIX OS

    Directory of Open Access Journals (Sweden)

    D. M. Mikhaylov

    2010-06-01

    Full Text Available In this article attacks on UNIX OS are considered. Currently antivirus developers are concentrated on protecting systems from viruses that are most common and attack popular operating systems. If the system or its components are not often attacked then the antivirus products are not protecting these components as it is not profitable. The same situation is with script-viruses for UNIX OS as most experts consider that it is impossible for such viruses to get enough rights to attack. Nevertheless the main conclusion of this article is the fact that such viruses can be very powerful and can attack systems and get enough rights.

  1. Protecting Cryptographic Memory against Tampering Attack

    DEFF Research Database (Denmark)

    Mukherjee, Pratyay

    In this dissertation we investigate the question of protecting cryptographic devices from tampering attacks. Traditional theoretical analysis of cryptographic devices is based on black-box models which do not take into account the attacks on the implementations, known as physical attacks. In prac......In this dissertation we investigate the question of protecting cryptographic devices from tampering attacks. Traditional theoretical analysis of cryptographic devices is based on black-box models which do not take into account the attacks on the implementations, known as physical attacks....... In practice such attacks can be executed easily, e.g. by heating the device, as substantiated by numerous works in the past decade. Tampering attacks are a class of such physical attacks where the attacker can change the memory/computation, gains additional (non-black-box) knowledge by interacting...... with the faulty device and then tries to break the security. Prior works show that generically approaching such problem is notoriously difficult. So, in this dissertation we attempt to solve an easier question, known as memory-tampering, where the attacker is allowed tamper only with the memory of the device...

  2. Attack Tree Generation by Policy Invalidation

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof

    2015-01-01

    through brainstorming of experts. In this work we formalize attack tree generation including human factors; based on recent advances in system models we develop a technique to identify possible attacks analytically, including technical and human factors. Our systematic attack generation is based......Attacks on systems and organisations increasingly exploit human actors, for example through social engineering, complicating their formal treatment and automatic identification. Formalisation of human behaviour is difficult at best, and attacks on socio-technical systems are still mostly identified...... on invalidating policies in the system model by identifying possible sequences of actions that lead to an attack. The generated attacks are precise enough to illustrate the threat, and they are general enough to hide the details of individual steps....

  3. Whispering through DDoS attack

    Directory of Open Access Journals (Sweden)

    Miralem Mehic

    2016-03-01

    Full Text Available Denial of service (DoS attack is an attempt of the attacker to disable victim's machine by depleting network or computing resources. If this attack is performed with more than one machine, it is called distributed denial of service (DDoS attack. Covert channels are those channels which are used for information transmission even though they are neither designed nor intended to transfer information at all. In this article, we investigated the possibility of using of DDoS attack for purposes of hiding data or concealing the existing covert channel. In addition, in this paper we analyzed the possibility of detection of such covert communication with the well-known statistical method. Also, we proposed the coordination mechanisms of the attack which may be used. A lot of research has been done in order to describe and prevent DDoS attacks, yet research on steganography on this field is still scarce.

  4. Network Protection Against DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Petr Dzurenda

    2015-03-01

    Full Text Available The paper deals with possibilities of the network protection against Distributed Denial of Service attacks (DDoS. The basic types of DDoS attacks and their impact on the protected network are presented here. Furthermore, we present basic detection and defense techniques thanks to which it is possible to increase resistance of the protected network or device against DDoS attacks. Moreover, we tested the ability of current commercial Intrusion Prevention Systems (IPS, especially Radware DefensePro 6.10.00 product against the most common types of DDoS attacks. We create five scenarios that are varied in type and strength of the DDoS attacks. The attacks intensity was much greater than the normal intensity of the current DDoS attacks.

  5. NETWORK SECURITY ATTACKS. ARP POISONING CASE STUDY

    Directory of Open Access Journals (Sweden)

    Luminiţa DEFTA

    2010-12-01

    Full Text Available Arp poisoning is one of the most common attacks in a switched network. A switch is a network device that limits the ability of attackers that use a packet sniffer to gain access to information from internal network traffic. However, using ARP poisoning the traffic between two computers can be intercepted even in a network that uses switches. This method is known as man in the middle attack. With this type of attack the affected stations from a network will have invalid entries in the ARP table. Thus, it will contain only the correspondence between the IP addresses of the stations from the same network and a single MAC address (the station that initiated the attack. In this paper we present step by step the initiation of such an attack in a network with three computers. We will intercept the traffic between two stations using the third one (the attacker.

  6. Cache timing attacks on recent microarchitectures

    DEFF Research Database (Denmark)

    Andreou, Alexandres; Bogdanov, Andrey; Tischhauser, Elmar Wolfgang

    2017-01-01

    Cache timing attacks have been known for a long time, however since the rise of cloud computing and shared hardware resources, such attacks found new potentially devastating applications. One prominent example is S$A (presented by Irazoqui et al at S&P 2015) which is a cache timing attack against...... AES or similar algorithms in virtualized environments. This paper applies variants of this cache timing attack to Intel's latest generation of microprocessors. It enables a spy-process to recover cryptographic keys, interacting with the victim processes only over TCP. The threat model is a logically...... separated but CPU co-located attacker with root privileges. We report successful and practically verified applications of this attack against a wide range of microarchitectures, from a two-core Nehalem processor (i5-650) to two-core Haswell (i7-4600M) and four-core Skylake processors (i7-6700). The attack...

  7. Suicide bomb attack causing penetrating craniocerebral injury

    Directory of Open Access Journals (Sweden)

    Hussain Manzar

    2013-02-01

    Full Text Available 【Abstract】Penetrating cerebral injuries caused by foreign bodies are rare in civilian neurosurgical trauma, al-though there are various reports of blast or gunshot inju-ries in warfare due to multiple foreign bodies like pellets and nails. In our case, a 30-year-old man presented to neurosur-gery clinic with signs and symptoms of right-sided weak-ness after suicide bomb attack. The skull X-ray showed a single intracranial nail. Small craniotomy was done and the nail was removed with caution to avoid injury to surround-ing normal brain tissue. At 6 months’ follow-up his right-sided power improved to against gravity. Key words: Head injury, penetrating; Bombs; Nails

  8. The confused world of sulfate attack on concrete

    International Nuclear Information System (INIS)

    Neville, Adam

    2004-01-01

    External sulfate attack is not completely understood. Part I identifies the issues involved, pointing out disagreements, and distinguishes between the mere occurrence of chemical reactions of sulfates with hydrated cement paste and the damage or deterioration of concrete; only the latter are taken to represent sulfate attack. Furthermore, sulfate attack is defined as deleterious action involving sulfate ions; if the reaction is physical, then, it is physical sulfate attack that takes place. The discussion of the two forms of sulfate attack leads to a recommendation for distinct nomenclature. Sulfate attack on concrete structures in service is not widespread, and the amount of laboratory-based research seems to be disproportionately large. The mechanisms of attack by different sulfates--sodium, calcium, and magnesium--are discussed, including the issue of topochemical and through-solution reactions. The specific aspects of the action of magnesium sulfate are discussed, and the differences between laboratory conditions and field exposure are pointed out. Part II discusses the progress of sulfate attack and its manifestations. This is followed by a discussion of making sulfate-resisting concrete. One of the measures is to use Type V cement, and this topic is extensively discussed. Likewise, the influence of w/c on sulfate resistance is considered. The two parameters are not independent of one another. Moreover, the cation in the sulfate salt has a strong bearing on the efficiency of the Type V cement. Recent interpretations of the Bureau of Reclamation tests, both long term and accelerated, are evaluated, and it appears that they need reworking. Part III reviews the standards and guides for the classification of the severity of exposure of structures to sulfates and points out the lack of calibration of the various classes of exposure. A particular problem is the classification of soils because much depends on the extraction ratio of sulfate in the soil: there is a

  9. SQL Injection Attacks and Defense

    CERN Document Server

    Clarke, Justin

    2012-01-01

    SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award "SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." -Richard Bejtlich, Tao Security blog SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information available for penetration testers, IT security consultants and practitioners, and web/software developers to turn to for help. SQL Injection Att

  10. Attack-Resistant Trust Metrics

    Science.gov (United States)

    Levien, Raph

    The Internet is an amazingly powerful tool for connecting people together, unmatched in human history. Yet, with that power comes great potential for spam and abuse. Trust metrics are an attempt to compute the set of which people are trustworthy and which are likely attackers. This chapter presents two specific trust metrics developed and deployed on the Advogato Website, which is a community blog for free software developers. This real-world experience demonstrates that the trust metrics fulfilled their goals, but that for good results, it is important to match the assumptions of the abstract trust metric computation to the real-world implementation.

  11. Structural damage

    International Nuclear Information System (INIS)

    Gray, R.E.; Bruhn, R.W.

    1992-01-01

    Virtually all structures show some signs of distress due to deterioration of the building components, to changed loads, or to changed support conditions. Changed support conditions result from ground movements. In mining regions many cases of structural distress are attributed to mining without considering alternative causes. This is particularly true of coal mining since it occurs under extensive areas. Coal mining is estimated to have already undermined more than eight million acres and may eventually undermine 40 million acres in the United States. Other nonmetal and metal underground mines impact much smaller areas. Although it is sometimes difficult, even with careful study, to identify the actual cause of damage, persons responsible for underground coal mining should at least be aware of possible causes of building stress other than mine subsidence. This paper presents information on distress to structures and briefly reviews a number of causes of ground movements other than subsidence: Mass movements, dissolution, erosion, frost action, shrinking and swelling, yield into excavations and compressibility

  12. Migraine attacks the Basal Ganglia

    Directory of Open Access Journals (Sweden)

    Bigal Marcelo

    2011-09-01

    Full Text Available Abstract Background With time, episodes of migraine headache afflict patients with increased frequency, longer duration and more intense pain. While episodic migraine may be defined as 1-14 attacks per month, there are no clear-cut phases defined, and those patients with low frequency may progress to high frequency episodic migraine and the latter may progress into chronic daily headache (> 15 attacks per month. The pathophysiology of this progression is completely unknown. Attempting to unravel this phenomenon, we used high field (human brain imaging to compare functional responses, functional connectivity and brain morphology in patients whose migraine episodes did not progress (LF to a matched (gender, age, age of onset and type of medication group of patients whose migraine episodes progressed (HF. Results In comparison to LF patients, responses to pain in HF patients were significantly lower in the caudate, putamen and pallidum. Paradoxically, associated with these lower responses in HF patients, gray matter volume of the right and left caudate nuclei were significantly larger than in the LF patients. Functional connectivity analysis revealed additional differences between the two groups in regard to response to pain. Conclusions Supported by current understanding of basal ganglia role in pain processing, the findings suggest a significant role of the basal ganglia in the pathophysiology of the episodic migraine.

  13. Anger attacks in obsessive compulsive disorder

    Directory of Open Access Journals (Sweden)

    Nitesh Prakash Painuly

    2011-01-01

    Full Text Available Background: Research on anger attacks has been mostly limited to depression, and only a few studies have focused on anger attacks in obsessive compulsive disorder. Materials and Methods: In a cross-sectional study all new obsessive compulsive disorder patients aged 20-60 years attending an outpatient clinic were assessed using the anger attack questionnaire, irritability, depression and anxiety scale (for the direction of the aggressive behavior and quality of life (QOL. Results: The sample consisted of 42 consecutive subjects with obsessive compulsive disorder, out of which 21 (50% had anger attacks. The obsessive compulsive disorder subjects with and without anger attacks did not show significant differences in terms of sociodemographic variables, duration of illness, treatment, and family history. However, subjects with anger attacks had significantly higher prevalence of panic attacks and comorbid depression. Significantly more subjects with anger attacks exhibited aggressive acts toward spouse, parents, children, and other relatives in the form of yelling and threatening to hurt, trying to hurt, and threatening to leave. However, the two groups did not differ significantly in terms of QOL, except for the psychological domain being worse in the subjects with anger attacks. Conclusion: Anger attacks are present in half of the patients with obsessive compulsive disorder, and they correlate with the presence of comorbid depression.

  14. Multi-Layer Approach for the Detection of Selective Forwarding Attacks.

    Science.gov (United States)

    Alajmi, Naser; Elleithy, Khaled

    2015-11-19

    Security breaches are a major threat in wireless sensor networks (WSNs). WSNs are increasingly used due to their broad range of important applications in both military and civilian domains. WSNs are prone to several types of security attacks. Sensor nodes have limited capacities and are often deployed in dangerous locations; therefore, they are vulnerable to different types of attacks, including wormhole, sinkhole, and selective forwarding attacks. Security attacks are classified as data traffic and routing attacks. These security attacks could affect the most significant applications of WSNs, namely, military surveillance, traffic monitoring, and healthcare. Therefore, there are different approaches to detecting security attacks on the network layer in WSNs. Reliability, energy efficiency, and scalability are strong constraints on sensor nodes that affect the security of WSNs. Because sensor nodes have limited capabilities in most of these areas, selective forwarding attacks cannot be easily detected in networks. In this paper, we propose an approach to selective forwarding detection (SFD). The approach has three layers: MAC pool IDs, rule-based processing, and anomaly detection. It maintains the safety of data transmission between a source node and base station while detecting selective forwarding attacks. Furthermore, the approach is reliable, energy efficient, and scalable.

  15. Multi-Layer Approach for the Detection of Selective Forwarding Attacks

    Directory of Open Access Journals (Sweden)

    Naser Alajmi

    2015-11-01

    Full Text Available Security breaches are a major threat in wireless sensor networks (WSNs. WSNs are increasingly used due to their broad range of important applications in both military and civilian domains. WSNs are prone to several types of security attacks. Sensor nodes have limited capacities and are often deployed in dangerous locations; therefore, they are vulnerable to different types of attacks, including wormhole, sinkhole, and selective forwarding attacks. Security attacks are classified as data traffic and routing attacks. These security attacks could affect the most significant applications of WSNs, namely, military surveillance, traffic monitoring, and healthcare. Therefore, there are different approaches to detecting security attacks on the network layer in WSNs. Reliability, energy efficiency, and scalability are strong constraints on sensor nodes that affect the security of WSNs. Because sensor nodes have limited capabilities in most of these areas, selective forwarding attacks cannot be easily detected in networks. In this paper, we propose an approach to selective forwarding detection (SFD. The approach has three layers: MAC pool IDs, rule-based processing, and anomaly detection. It maintains the safety of data transmission between a source node and base station while detecting selective forwarding attacks. Furthermore, the approach is reliable, energy efficient, and scalable.

  16. Defending networks against denial-of-service attacks

    Science.gov (United States)

    Gelenbe, Erol; Gellman, Michael; Loukas, George

    2004-11-01

    Denial of service attacks, viruses and worms are common tools for malicious adversarial behavior in networks. Experience shows that over the last few years several of these techniques have probably been used by governments to impair the Internet communications of various entities, and we can expect that these and other information warfare tools will be used increasingly as part of hostile behavior either independently, or in conjunction with other forms of attack in conventional or asymmetric warfare, as well as in other forms of malicious behavior. In this paper we concentrate on Distributed Denial of Service Attacks (DDoS) where one or more attackers generate flooding traffic and direct it from multiple sources towards a set of selected nodes or IP addresses in the Internet. We first briefly survey the literature on the subject, and discuss some examples of DDoS incidents. We then present a technique that can be used for DDoS protection based on creating islands of protection around a critical information infrastructure. This technique, that we call the CPN-DoS-DT (Cognitive Packet Networks DoS Defence Technique), creates a self-monitoring sub-network surrounding each critical infrastructure node. CPN-DoS-DT is triggered by a DDoS detection scheme, and generates control traffic from the objects of the DDoS attack to the islands of protection where DDOS packet flows are destroyed before they reach the critical infrastructure. We use mathematical modelling, simulation and experiments on our test-bed to show the positive and negative outcomes that may result from both the attack, and the CPN-DoS-DT protection mechanism, due to imperfect detection and false alarms.

  17. Depletion-of-Battery Attack: Specificity, Modelling and Analysis.

    Science.gov (United States)

    Shakhov, Vladimir; Koo, Insoo

    2018-06-06

    The emerging Internet of Things (IoT) has great potential; however, the societal costs of the IoT can outweigh its benefits. To unlock IoT potential, there needs to be improvement in the security of IoT applications. There are several standardization initiatives for sensor networks, which eventually converge with the Internet of Things. As sensor-based applications are deployed, security emerges as an essential requirement. One of the critical issues of wireless sensor technology is limited sensor resources, including sensor batteries. This creates a vulnerability to battery-exhausting attacks. Rapid exhaustion of sensor battery power is not only explained by intrusions, but can also be due to random failure of embedded sensor protocols. Thus, most wireless sensor applications, without tools to defend against rash battery exhausting, would be unable to function during prescribed times. In this paper, we consider a special type of threat, in which the harm is malicious depletion of sensor battery power. In contrast to the traditional denial-of-service attack, quality of service under the considered attack is not necessarily degraded. Moreover, the quality of service can increase up to the moment of the sensor set crashes. We argue that this is a distinguishing type of attack. Hence, the application of a traditional defense mechanism against this threat is not always possible. Therefore, effective methods should be developed to counter the threat. We first discuss the feasibility of rash depletion of battery power. Next, we propose a model for evaluation of energy consumption when under attack. Finally, a technique to counter the attack is discussed.

  18. Depletion-of-Battery Attack: Specificity, Modelling and Analysis

    Directory of Open Access Journals (Sweden)

    Vladimir Shakhov

    2018-06-01

    Full Text Available The emerging Internet of Things (IoT has great potential; however, the societal costs of the IoT can outweigh its benefits. To unlock IoT potential, there needs to be improvement in the security of IoT applications. There are several standardization initiatives for sensor networks, which eventually converge with the Internet of Things. As sensor-based applications are deployed, security emerges as an essential requirement. One of the critical issues of wireless sensor technology is limited sensor resources, including sensor batteries. This creates a vulnerability to battery-exhausting attacks. Rapid exhaustion of sensor battery power is not only explained by intrusions, but can also be due to random failure of embedded sensor protocols. Thus, most wireless sensor applications, without tools to defend against rash battery exhausting, would be unable to function during prescribed times. In this paper, we consider a special type of threat, in which the harm is malicious depletion of sensor battery power. In contrast to the traditional denial-of-service attack, quality of service under the considered attack is not necessarily degraded. Moreover, the quality of service can increase up to the moment of the sensor set crashes. We argue that this is a distinguishing type of attack. Hence, the application of a traditional defense mechanism against this threat is not always possible. Therefore, effective methods should be developed to counter the threat. We first discuss the feasibility of rash depletion of battery power. Next, we propose a model for evaluation of energy consumption when under attack. Finally, a technique to counter the attack is discussed.

  19. Due diligence

    International Nuclear Information System (INIS)

    Sanghera, G.S.

    1999-01-01

    The Occupational Health and Safety (OHS) Act requires that every employer shall ensure the health and safety of workers in the workplace. Issues regarding the practices at workplaces and how they should reflect the standards of due diligence were discussed. Due diligence was described as being the need for employers to identify hazards in the workplace and to take active steps to prevent workers from potentially dangerous incidents. The paper discussed various aspects of due diligence including policy, training, procedures, measurement and enforcement. The consequences of contravening the OHS Act were also described

  20. 34 CFR 674.64 - Discharge of student loan indebtedness for survivors of victims of the September 11, 2001, attacks.

    Science.gov (United States)

    2010-07-01

    ..., other safety or rescue personnel, or as a member of the Armed Forces; and (ii)(A) Died due to injuries... to injuries suffered in the terrorist attacks on September 11, 2001. (2) Died due to injuries suffered in the terrorist attacks on September 11, 2001 means the individual was present at the World Trade...

  1. DDOS ATTACK DETECTION SIMULATION AND HANDLING MECHANISM

    Directory of Open Access Journals (Sweden)

    Ahmad Sanmorino

    2013-11-01

    Full Text Available In this study we discuss how to handle DDoS attack that coming from the attacker by using detection method and handling mechanism. Detection perform by comparing number of packets and number of flow. Whereas handling mechanism perform by limiting or drop the packets that detected as a DDoS attack. The study begins with simulation on real network, which aims to get the real traffic data. Then, dump traffic data obtained from the simulation used for detection method on our prototype system called DASHM (DDoS Attack Simulation and Handling Mechanism. From the result of experiment that has been conducted, the proposed method successfully detect DDoS attack and handle the incoming packet sent by attacker.

  2. Model checking exact cost for attack scenarios

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming

    2017-01-01

    Attack trees constitute a powerful tool for modelling security threats. Many security analyses of attack trees can be seamlessly expressed as model checking of Markov Decision Processes obtained from the attack trees, thus reaping the benefits of a coherent framework and a mature tool support....... However, current model checking does not encompass the exact cost analysis of an attack, which is standard for attack trees. Our first contribution is the logic erPCTL with cost-related operators. The extended logic allows to analyse the probability of an event satisfying given cost bounds and to compute...... the exact cost of an event. Our second contribution is the model checking algorithm for erPCTL. Finally, we apply our framework to the analysis of attack trees....

  3. Securing internet by eliminating DDOS attacks

    Science.gov (United States)

    Niranchana, R.; Gayathri Devi, N.; Santhi, H.; Gayathri, P.

    2017-11-01

    The major threat caused to the authorised usage of Internet is Distributed Denial of Service attack. The mechanisms used to prevent the DDoS attacks are said to overcome the attack’s ability in spoofing the IP packets source addresses. By utilising Internet Protocol spoofing, the attackers cause a consequential load over the networks destination for policing attack packets. To overcome the IP Spoofing level on the Internet, We propose an Inter domain Packet Filter (IPF) architecture. The proposed scheme is not based on global routing information. The packets with reliable source addresses are not rejected, the IPF frame work works in such a manner. The spoofing capability of attackers is confined by IPF, and also the filter identifies the source of an attack packet by minimal number of candidate network.

  4. A New Mechanism to Improve the Detection Rate of Shilling Attacks in the Recommender Systems

    Directory of Open Access Journals (Sweden)

    javad nehriri

    2017-12-01

    Full Text Available Recommender systems are widely used, in social networks and online stores, to overcome the problems caused by the large amount of information. Most of these systems use a collaborative filtering method to generate recommendations to the users. But, as in this method users’ feedback is considered for recommendations, it can be significantly erroneous by the malicious people. In other words, there may be some users who open fake profiles and vote one-sided or biased in the system that may cause disturbance in providing proper recommendations to other users. This kind of damage is said to be shiling attacks. If the attackers succeed, the user's trust in the recommender systems will reduce. In recent years, efficient attack detection algorithms have been proposed, but each has its own limitations. In this paper, we use profile-based and item-based algorithms to provide a new mechanism to significantly reduce the detection error for shilling attacks.

  5. Effects of foliar herbivory by insects on the fitness of Raphanus raphanistrum: damage can increase male fitness.

    Science.gov (United States)

    Strauss, S Y; Conner, J K; Lehtilä, K P

    2001-11-01

    Generally, effects of herbivory on plant fitness have been measured in terms of female reproductive success (seed production). However, male plant fitness, defined as the number of seeds sired by pollen, contributes half of the genes to the next generation and is therefore crucial to the evolution of natural plant populations. This is the first study to examine effects of insect herbivory on both male and female plant reproductive success. Through controlled field and greenhouse experiments and genetic paternity analysis, we found that foliar damage by insects caused a range of responses by plants. In one environment, damaged plants had greater success as male parents than undamaged plants. Neither effects on pollen competitive ability nor pollinator visitation patterns could explain the greater siring success of these damaged plants. Success of damaged plants as male parents appeared to be due primarily to changes in allocation to flowers versus seeds after damage. Damaged plants produced more flowers early in the season, but not more seeds, than undamaged plants. Based on total seed production, male fitness measures from the first third of the season, and flower production, we estimated that damaged and undamaged plants had equal total reproductive success at the end of the season in this environment. In a second, richer environment, damaged and undamaged plants had equal male and female plant fitness, and no traits differed significantly between the treatments. Equal total reproductive success may not be ecologically or evolutionarily equivalent if it is achieved differentially through male versus female fitness. Genes from damaged plants dispersed through pollen may escape attack from herbivores, if such attack is correlated spatially from year to year.

  6. Radiation damage to histones

    International Nuclear Information System (INIS)

    Mee, L.K.; Adelstein, S.J.

    1985-01-01

    The damage to histones irradiated in isolation is being elaborated to aid the identification of the crosslinking sites in radiation-induced DNA-histone adducts. Histones are being examined by amino acid analysis to determine the destruction of residues and by polyacrylamide gel electrophoresis to delineate changes in conformation. For the slightly lysine-rich histone, H2A, a specific attack on selective residues has been established, the aromatic residues, tyrosine and phenylalanine, and the heterocyclic residue, histidine, being significantly destroyed. In addition, a significant increase in aspartic acid was found; this may represent a radiation product from scission of the ring in the histidine residues. The similarity of the effects on residues in nitrous oxide-saturated and nitrogen-saturated solutions suggests that OH . and e/sub aq//sup -/ are equally efficient and selective in their attack. On gel electrophoresis degradation of the histone H2A was found to be greatest for irradiations in nitrous oxide-saturated solutions, suggesting CH . is the most effective radical for producing changes in conformation; O/sub 2//sup -/ was essentially ineffective. Other histones are being examined for changes in amino acid composition, conformation, and for the formation of radiation products

  7. Transient ischemic attack: diagnostic evaluation.

    Science.gov (United States)

    Messé, Steven R; Jauch, Edward C

    2008-08-01

    A transient ischemic attack portends significant risk of a stroke. Consequently, the diagnostic evaluation in the emergency department is focused on identifying high-risk causes so that preventive strategies can be implemented. The evaluation consists of a facilitated evaluation of the patient's metabolic, cardiac, and neurovascular systems. At a minimum, the following tests are recommended: fingerstick glucose level, electrolyte levels, CBC count, urinalysis, and coagulation studies; noncontrast computed tomography (CT) of the head; electrocardiography; and continuous telemetry monitoring. Vascular imaging studies, such as carotid ultrasonography, CT angiography, or magnetic resonance angiography, should be performed on an urgent basis and prioritized according to the patient's risk stratification for disease. Consideration should be given for echocardiography if no large vessel abnormality is identified.

  8. Integrating cyber attacks within fault trees

    International Nuclear Information System (INIS)

    Nai Fovino, Igor; Masera, Marcelo; De Cian, Alessio

    2009-01-01

    In this paper, a new method for quantitative security risk assessment of complex systems is presented, combining fault-tree analysis, traditionally used in reliability analysis, with the recently introduced Attack-tree analysis, proposed for the study of malicious attack patterns. The combined use of fault trees and attack trees helps the analyst to effectively face the security challenges posed by the introduction of modern ICT technologies in the control systems of critical infrastructures. The proposed approach allows considering the interaction of malicious deliberate acts with random failures. Formal definitions of fault tree and attack tree are provided and a mathematical model for the calculation of system fault probabilities is presented.

  9. Visualizing Risks: Icons for Information Attack Scenarios

    National Research Council Canada - National Science Library

    Hosmer, Hilary

    2000-01-01

    .... Visual attack scenarios help defenders see system ambiguities, imprecision, vulnerabilities and omissions, thus speeding up risk analysis, requirements gathering, safeguard selection, cryptographic...

  10. A computer network attack taxonomy and ontology

    CSIR Research Space (South Africa)

    Van Heerden, RP

    2012-01-01

    Full Text Available of the attack that occur after the attack goal has been achieved, and occurs because the attacker loses control of some systems. For example, after the launch of a DDOS (Distributed Denial of Service) attack, zombie computers may still connect to the target...-scrap- value-of-a-hacked-pc-revisited/ . Lancor, L., & Workman, R. (2007). Using Google Hacking to Enhance Defense Strategies. ACM SIGCSE Bulletin, 39 (1), 491-495. Lau, F., Rubin, S. H., Smith, M. H., & Trajkovic, L. (2000). Distributed Denial of Service...

  11. Integrating cyber attacks within fault trees

    Energy Technology Data Exchange (ETDEWEB)

    Nai Fovino, Igor [Joint Research Centre - EC, Institute for the Protection and Security of the Citizen, Ispra, VA (Italy)], E-mail: igor.nai@jrc.it; Masera, Marcelo [Joint Research Centre - EC, Institute for the Protection and Security of the Citizen, Ispra, VA (Italy); De Cian, Alessio [Department of Electrical Engineering, University di Genova, Genoa (Italy)

    2009-09-15

    In this paper, a new method for quantitative security risk assessment of complex systems is presented, combining fault-tree analysis, traditionally used in reliability analysis, with the recently introduced Attack-tree analysis, proposed for the study of malicious attack patterns. The combined use of fault trees and attack trees helps the analyst to effectively face the security challenges posed by the introduction of modern ICT technologies in the control systems of critical infrastructures. The proposed approach allows considering the interaction of malicious deliberate acts with random failures. Formal definitions of fault tree and attack tree are provided and a mathematical model for the calculation of system fault probabilities is presented.

  12. Nondestructive damage detection and evaluation technique for seismically damaged structures

    Science.gov (United States)

    Adachi, Yukio; Unjoh, Shigeki; Kondoh, Masuo; Ohsumi, Michio

    1999-02-01

    The development of quantitative damage detection and evaluation technique, and damage detection technique for invisible damages of structures are required according to the lessons from the 1995 Hyogo-ken Nanbu earthquake. In this study, two quantitative damage sensing techniques for highway bridge structures are proposed. One method is to measure the change of vibration characteristics of the bridge structure. According to the damage detection test for damaged bridge column by shaking table test, this method can successfully detect the vibration characteristic change caused by damage progress due to increment excitations. The other method is to use self-diagnosis intelligent materials. According to the reinforced concrete beam specimen test, the second method can detect the damage by rupture of intelligent sensors, such as optical fiber or carbon fiber reinforced plastic rod.

  13. Planning guidance for emergency response to a hypothetical nuclear attack on Riyadh, Saudi Arabia

    Science.gov (United States)

    Shubayr, Nasser Ali M.

    The threat of nuclear attack will remain imminent in an ever-advancing society. Saudi Arabia is not immune to this threat. This dissertation establishes planning guidance for response to a nuclear attack on Riyadh, the capital of Saudi Arabia, based on a hypothetical scenario of a nuclear detonation. A case scenario of a one-megaton thermonuclear bomb detonated at ground level over Riyadh is used to support the thesis. Previous nuclear tests and the Hiroshima and Nagasaki bombings have been used to present possible effects on Riyadh. US planning guidance and lessons learned from the Chernobyl and Fukushima nuclear plants accidents have been used to develop the emergency response guidance. The planning guidance outlines a rapid response to the nuclear detonation. Four damage zones have been identified; severe damage zone, moderate damage zone, light damage zone and dangerous fallout zone. Actions that are recommended, and those that should be avoided, have been determined for each zone. Shelter/ evacuation evaluation for blast-affected and fallout-affected areas is the basis for the recommendation that shelter in place is the best decision for the first hours to days after the attack. Guidelines for medical care response and population monitoring and decontamination are included to reduce the early and long-term effects of the attack. Recommendations to the Saudi Arabian authorities have been made to facilitate suitable preparedness and response for such an event.

  14. Experimental and numerical study on cement paste degradation under external sulfate attack

    NARCIS (Netherlands)

    Ma, X.; Copuroglu, O.; Schlangen, H.E.J.G.; Han, N; Xing, F; Saouma, V.; Bolander, J.; Landis, E.

    2016-01-01

    External sulfate attack is one of the situations that may cause gradual but severe damage in cementitious materials, which may lead to cracking, increased permeability and strength loss. In this paper, thin-walled hollow cement paste cylinders with a wall thickness of 2.5mm were made considering the

  15. DNA damage in neurodegenerative diseases

    Energy Technology Data Exchange (ETDEWEB)

    Coppedè, Fabio, E-mail: fabio.coppede@med.unipi.it; Migliore, Lucia, E-mail: lucia.migliore@med.unipi.it

    2015-06-15

    Highlights: • Oxidative DNA damage is one of the earliest detectable events in the neurodegenerative process. • The mitochondrial DNA is more vulnerable to oxidative attack than the nuclear DNA. • Cytogenetic damage has been largely documented in Alzheimer's disease patients. • The question of whether DNA damage is cause or consequence of neurodegeneration is still open. • Increasing evidence links DNA damage and repair with epigenetic phenomena. - Abstract: Following the observation of increased oxidative DNA damage in nuclear and mitochondrial DNA extracted from post-mortem brain regions of patients affected by neurodegenerative diseases, the last years of the previous century and the first decade of the present one have been largely dedicated to the search of markers of DNA damage in neuronal samples and peripheral tissues of patients in early, intermediate or late stages of neurodegeneration. Those studies allowed to demonstrate that oxidative DNA damage is one of the earliest detectable events in neurodegeneration, but also revealed cytogenetic damage in neurodegenerative conditions, such as for example a tendency towards chromosome 21 malsegregation in Alzheimer's disease. As it happens for many neurodegenerative risk factors the question of whether DNA damage is cause or consequence of the neurodegenerative process is still open, and probably both is true. The research interest in markers of oxidative stress was shifted, in recent years, towards the search of epigenetic biomarkers of neurodegenerative disorders, following the accumulating evidence of a substantial contribution of epigenetic mechanisms to learning, memory processes, behavioural disorders and neurodegeneration. Increasing evidence is however linking DNA damage and repair with epigenetic phenomena, thereby opening the way to a very attractive and timely research topic in neurodegenerative diseases. We will address those issues in the context of Alzheimer's disease

  16. DNA damage in neurodegenerative diseases

    International Nuclear Information System (INIS)

    Coppedè, Fabio; Migliore, Lucia

    2015-01-01

    Highlights: • Oxidative DNA damage is one of the earliest detectable events in the neurodegenerative process. • The mitochondrial DNA is more vulnerable to oxidative attack than the nuclear DNA. • Cytogenetic damage has been largely documented in Alzheimer's disease patients. • The question of whether DNA damage is cause or consequence of neurodegeneration is still open. • Increasing evidence links DNA damage and repair with epigenetic phenomena. - Abstract: Following the observation of increased oxidative DNA damage in nuclear and mitochondrial DNA extracted from post-mortem brain regions of patients affected by neurodegenerative diseases, the last years of the previous century and the first decade of the present one have been largely dedicated to the search of markers of DNA damage in neuronal samples and peripheral tissues of patients in early, intermediate or late stages of neurodegeneration. Those studies allowed to demonstrate that oxidative DNA damage is one of the earliest detectable events in neurodegeneration, but also revealed cytogenetic damage in neurodegenerative conditions, such as for example a tendency towards chromosome 21 malsegregation in Alzheimer's disease. As it happens for many neurodegenerative risk factors the question of whether DNA damage is cause or consequence of the neurodegenerative process is still open, and probably both is true. The research interest in markers of oxidative stress was shifted, in recent years, towards the search of epigenetic biomarkers of neurodegenerative disorders, following the accumulating evidence of a substantial contribution of epigenetic mechanisms to learning, memory processes, behavioural disorders and neurodegeneration. Increasing evidence is however linking DNA damage and repair with epigenetic phenomena, thereby opening the way to a very attractive and timely research topic in neurodegenerative diseases. We will address those issues in the context of Alzheimer's disease

  17. Toward Exposing Timing-Based Probing Attacks in Web Applications.

    Science.gov (United States)

    Mao, Jian; Chen, Yue; Shi, Futian; Jia, Yaoqi; Liang, Zhenkai

    2017-02-25

    Web applications have become the foundation of many types of systems, ranging from cloud services to Internet of Things (IoT) systems. Due to the large amount of sensitive data processed by web applications, user privacy emerges as a major concern in web security. Existing protection mechanisms in modern browsers, e.g., the same origin policy, prevent the users' browsing information on one website from being directly accessed by another website. However, web applications executed in the same browser share the same runtime environment. Such shared states provide side channels for malicious websites to indirectly figure out the information of other origins. Timing is a classic side channel and the root cause of many recent attacks, which rely on the variations in the time taken by the systems to process different inputs. In this paper, we propose an approach to expose the timing-based probing attacks in web applications. It monitors the browser behaviors and identifies anomalous timing behaviors to detect browser probing attacks. We have prototyped our system in the Google Chrome browser and evaluated the effectiveness of our approach by using known probing techniques. We have applied our approach on a large number of top Alexa sites and reported the suspicious behavior patterns with corresponding analysis results. Our theoretical analysis illustrates that the effectiveness of the timing-based probing attacks is dramatically limited by our approach.

  18. Toward Exposing Timing-Based Probing Attacks in Web Applications

    Directory of Open Access Journals (Sweden)

    Jian Mao

    2017-02-01

    Full Text Available Web applications have become the foundation of many types of systems, ranging from cloud services to Internet of Things (IoT systems. Due to the large amount of sensitive data processed by web applications, user privacy emerges as a major concern in web security. Existing protection mechanisms in modern browsers, e.g., the same origin policy, prevent the users’ browsing information on one website from being directly accessed by another website. However, web applications executed in the same browser share the same runtime environment. Such shared states provide side channels for malicious websites to indirectly figure out the information of other origins. Timing is a classic side channel and the root cause of many recent attacks, which rely on the variations in the time taken by the systems to process different inputs. In this paper, we propose an approach to expose the timing-based probing attacks in web applications. It monitors the browser behaviors and identifies anomalous timing behaviors to detect browser probing attacks. We have prototyped our system in the Google Chrome browser and evaluated the effectiveness of our approach by using known probing techniques. We have applied our approach on a large number of top Alexa sites and reported the suspicious behavior patterns with corresponding analysis results. Our theoretical analysis illustrates that the effectiveness of the timing-based probing attacks is dramatically limited by our approach.

  19. Developing advanced fingerprint attacks on challenge-based collaborative intrusion detection networks

    DEFF Research Database (Denmark)

    Li, Wenjuan; Meng, Weizhi; Kwok, Lam-For

    2017-01-01

    Traditionally, an isolated intrusion detection system (IDS) is vulnerable to various types of attacks. In order to enhance IDS performance, collaborative intrusion detection networks (CIDNs) are developed through enabling a set of IDS nodes to communicate with each other. Due to the distributed...... network architecture, insider attacks are one of the major threats. In the literature, challenge-based trust mechanisms have been built to identify malicious nodes by evaluating the satisfaction levels between challenges and responses. However, such mechanisms rely on two major assumptions, which may...... result in a weak threat model. In this case, CIDNs may be still vulnerable to advanced insider attacks in real-world deployment. In this paper, we propose a novel collusion attack, called passive message fingerprint attack (PMFA), which can collect messages and identify normal requests in a passive way...

  20. Attack Trees for Practical Security Assessment: Ranking of Attack Scenarios with ADTool 2.0

    NARCIS (Netherlands)

    Gadyatskaya, Olga; Jhawar, Ravi; Kordy, P.T.; Lounis, Karim; Mauw, Sjouke; Trujillo-Rasua, Rolando

    2016-01-01

    In this tool demonstration paper we present the ADTool2.0: an open-source software tool for design, manipulation and analysis of attack trees. The tool supports ranking of attack scenarios based on quantitative attributes entered by the user; it is scriptable; and it incorporates attack trees with

  1. The work-averse cyber attacker model : theory and evidence from two million attack signatures

    NARCIS (Netherlands)

    Allodi, L.; Massacci, F.; Williams, J.

    The typical cyber attacker is assumed to be all powerful and to exploit all possible vulnerabilities. In this paper we present, and empirically validate, a novel and more realistic attacker model. The intuition of our model is that an attacker will optimally choose whether to act and weaponize a new

  2. Estimative of core damage frequency in IPEN's IEA-R1 research reactor (PSA level 1) due to the initiating event of loss of coolant caused by large rupture in the pipe of the primary circuit

    International Nuclear Information System (INIS)

    Hirata, Daniel Massami

    2009-01-01

    This work applies the methodology of probabilistic safety assessment level 1 to the research reactor IEA-R1 IPEN-CNEN/SP. Two categories of identified initiating events of accidents in the reactor are studied: loss of flow and loss of primary coolant. Among the initiating events, blockage of flow channel and loss of cooling fluid by major pipe rupture in the primary circuit are chosen for a detailed analysis. The event tree technique is used to analyze the evolution of the accident, including the actuation or the fail of actuation of the safety systems and the reactor damages. Using the fault tree the reliability of the following reactor safety systems is evaluated: reactor shutdown system, isolation of the reactor pool, emergency core cooling system (ECCS) and the electric system. Estimative for the frequency of damage to the reactor core and the probability of failure of the analyzed systems are calculated. The estimated values for the frequencies of core damage are within the expected margins and are of the same order of magnitude as those found for similar reactors. The reliability of the reactor shutdown system, isolation of the reactor pool and ECCS are satisfactory for the conditions these systems are required. However, for the electric system it is suggested an upgrade to increase its reliability. (author)

  3. Spectroscopic photoacoustics for assessing ischemic kidney damage

    Science.gov (United States)

    Berndl, Elizabeth S. L.; He, Xiaolin; Yuen, Darren A.; Kolios, Michael C.

    2018-02-01

    Ischemic reperfusion injuries (IRIs) are caused by return of blood to a tissue or organ after a period without oxygen or nutrients. Damage in the microvasculature causes an inflammatory response and heterogeneous scarring, which is associated with an increase in collagen in the extracellular matrix. Although most often associated with heart attacks and strokes, IRI also occurs when blood reperfuses a transplanted organ. Currently, monitoring for IRI is limited to biopsies, which are invasive and sample a limited area. In this work, we explored photoacoustic (PA) biomarkers of scarring. IRI events were induced in mice (n=2) by clamping the left renal artery, then re-establishing flow. At 53 days post-surgery, kidneys were saline perfused and cut in half laterally. One half was immediately imaged with a VevoX system (Fujifilm-VisualSonics, Toronto) in two near infrared ranges - 680 to 970 nm (NIR), and 1200 to 1350 nm (NIR II). The other half was decellularized and then imaged at NIR and NIR II. Regions of interest were manually identified and analyzed for each kidney. For both cellularized and decellularized samples, the PA signal ratio based on irradiation wavelengths of 715:930 nm was higher in damaged kidneys than for undamaged kidneys (p collagen in the NIR II range, while healthy kidneys did not. Collagen rich spectra were more apparent in decellularized kidneys, suggesting that in the cellularized samples, other components may be contributing to the signal. PA imaging using spectral ratios associated with collagen signatures may provide a non-invasive tool to determine areas of tissue damage due to IRIs.

  4. Attack Tree Generation by Policy Invalidation

    NARCIS (Netherlands)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, René Rydhof; Kammüller, Florian; Naeem Akram, R.; Jajodia, S.

    2015-01-01

    Attacks on systems and organisations increasingly exploit human actors, for example through social engineering, complicating their formal treatment and automatic identi﬿cation. Formalisation of human behaviour is difficult at best, and attacks on socio-technical systems are still mostly identi﬿ed

  5. Evaluation of Crosstalk Attacks in Access Networks

    DEFF Research Database (Denmark)

    Wagner, Christoph; Eiselt, Michael; Grobe, Klaus

    2016-01-01

    WDM-PON systems regained interest as low-cost solution for metro and access networks. We present a comparative analysis of resilience of wavelength-selective and wavelength-routed architectures against crosstalk attackers. We compare the vulnerability of these architectures against attacks...

  6. Drammer : Deterministic Rowhammer attacks on mobile platforms

    NARCIS (Netherlands)

    Van Der Veen, Victor; Fratantonio, Yanick; Lindorfer, Martina; Gruss, Daniel; Maurice, Clémentine; Vigna, Giovanni; Bos, Herbert; Razavi, Kaveh; Giuffrida, Cristiano

    2016-01-01

    Recent work shows that the Rowhammer hardware bug can be used to craft powerful attacks and completely subvert a system. However, existing efforts either describe probabilistic (and thus unreliable) attacks or rely on special (and often unavailable) memory management features to place victim objects

  7. Collaborative Attack Mitigation and Response: A survey

    NARCIS (Netherlands)

    Steinberger, Jessica; Sperotto, Anna; Baier, Harald; Pras, Aiko

    2015-01-01

    Over recent years, network-based attacks have become to one of the top causes of network infrastructure and service outages. To counteract a network-based attack, an approach is to move mitigation from the target network to the networks of Internet Service Providers (ISP). However, it remains

  8. Rotational Rebound Attacks on Reduced Skein

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Nikolic, Ivica; Rechberger, Christian

    2010-01-01

    In this paper we combine a recent rotational cryptanalysis with the rebound attack, which results in the best cryptanalysis of Skein, a candidate for the SHA-3 competition. The rebound attack approach was so far only applied to AES-like constructions. For the first time, we show that this approach...

  9. Interaction of Insecticide and Media Moisture on Ambrosia Beetle (Coleoptera: Curculionidae) Attacks on Selected Ornamental Trees.

    Science.gov (United States)

    Frank, Steven D; Anderson, Amanda L; Ranger, Christopher M

    2017-12-08

    Exotic ambrosia beetles, particularly Xylosandrus crassiusculus (Motschulsky) (Coleoptera: Curculionidae: Scolytinae) and Xylosandrus germanus (Blandford) (Coleoptera: Curculionidae: Scolytinae), are among the most damaging pests of ornamental trees in nurseries. Growers have had few tactics besides insecticide applications to reduce ambrosia beetle attacks but recent research has shown that attacks may be reduced by maintaining media moisture below a 50% threshold thereby reducing flood stress. We compared the efficacy of managing media moisture and insecticide applications for reducing ambrosia beetle attacks on three ornamental tree species in North Carolina. During trials in spring 2013 and 2015, flooded Cornus florida and Cornus kousa were heavily attacked despite sprays with permethrin, but nonflooded C. kousa or C. florida were not attacked. In spring 2015 trials, both nonflooded and flooded Styrax japonicus were heavily attacked regardless of permethrin applications. Although ethanol emissions were not measured, the apparently healthy nonflooded S. japonicus trees may have been exposed to an unknown physiological stress, such as low temperature injury, the previous winter, which predisposed them to beetle attack. However, ethanol levels within host tissues were not measured as part of the current study. X. crassiusculus (75%), Xyloborinus saxesenii Ratzburg (13%), and X. germanus (9%) were the most abundant species collected in ethanol baited traps deployed in 2015, while X. crassiusculus (63%) and X. germanus (36%) were the predominant species reared from attacked trees. Results indicate that managing media moisture levels at or below 50%, and maximizing tree health overall, may provide significant protection against Xylosandrus spp. attacks in flood intolerant tree species. © The Authors 2017. Published by Oxford University Press on behalf of Entomological Society of America. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  10. Practical security and privacy attacks against biometric hashing using sparse recovery

    Science.gov (United States)

    Topcu, Berkay; Karabat, Cagatay; Azadmanesh, Matin; Erdogan, Hakan

    2016-12-01

    Biometric hashing is a cancelable biometric verification method that has received research interest recently. This method can be considered as a two-factor authentication method which combines a personal password (or secret key) with a biometric to obtain a secure binary template which is used for authentication. We present novel practical security and privacy attacks against biometric hashing when the attacker is assumed to know the user's password in order to quantify the additional protection due to biometrics when the password is compromised. We present four methods that can reconstruct a biometric feature and/or the image from a hash and one method which can find the closest biometric data (i.e., face image) from a database. Two of the reconstruction methods are based on 1-bit compressed sensing signal reconstruction for which the data acquisition scenario is very similar to biometric hashing. Previous literature introduced simple attack methods, but we show that we can achieve higher level of security threats using compressed sensing recovery techniques. In addition, we present privacy attacks which reconstruct a biometric image which resembles the original image. We quantify the performance of the attacks using detection error tradeoff curves and equal error rates under advanced attack scenarios. We show that conventional biometric hashing methods suffer from high security and privacy leaks under practical attacks, and we believe more advanced hash generation methods are necessary to avoid these attacks.

  11. Combating Memory Corruption Attacks On Scada Devices

    Science.gov (United States)

    Bellettini, Carlo; Rrushi, Julian

    Memory corruption attacks on SCADA devices can cause significant disruptions to control systems and the industrial processes they operate. However, despite the presence of numerous memory corruption vulnerabilities, few, if any, techniques have been proposed for addressing the vulnerabilities or for combating memory corruption attacks. This paper describes a technique for defending against memory corruption attacks by enforcing logical boundaries between potentially hostile data and safe data in protected processes. The technique encrypts all input data using random keys; the encrypted data is stored in main memory and is decrypted according to the principle of least privilege just before it is processed by the CPU. The defensive technique affects the precision with which attackers can corrupt control data and pure data, protecting against code injection and arc injection attacks, and alleviating problems posed by the incomparability of mitigation techniques. An experimental evaluation involving the popular Modbus protocol demonstrates the feasibility and efficiency of the defensive technique.

  12. Use of Attack Graphs in Security Systems

    Directory of Open Access Journals (Sweden)

    Vivek Shandilya

    2014-01-01

    Full Text Available Attack graphs have been used to model the vulnerabilities of the systems and their potential exploits. The successful exploits leading to the partial/total failure of the systems are subject of keen security interest. Considerable effort has been expended in exhaustive modeling, analyses, detection, and mitigation of attacks. One prominent methodology involves constructing attack graphs of the pertinent system for analysis and response strategies. This not only gives the simplified representation of the system, but also allows prioritizing the security properties whose violations are of greater concern, for both detection and repair. We present a survey and critical study of state-of-the-art technologies in attack graph generation and use in security system. Based on our research, we identify the potential, challenges, and direction of the current research in using attack graphs.

  13. Automatic Classification of Attacks on IP Telephony

    Directory of Open Access Journals (Sweden)

    Jakub Safarik

    2013-01-01

    Full Text Available This article proposes an algorithm for automatic analysis of attack data in IP telephony network with a neural network. Data for the analysis is gathered from variable monitoring application running in the network. These monitoring systems are a typical part of nowadays network. Information from them is usually used after attack. It is possible to use an automatic classification of IP telephony attacks for nearly real-time classification and counter attack or mitigation of potential attacks. The classification use proposed neural network, and the article covers design of a neural network and its practical implementation. It contains also methods for neural network learning and data gathering functions from honeypot application.

  14. Possible Radiation-Induced Damage to the Molecular Structure of Wooden Artifacts Due to Micro-Computed Tomography, Handheld X-Ray Fluorescence, and X-Ray Photoelectron Spectroscopic Techniques

    Directory of Open Access Journals (Sweden)

    Madalena Kozachuk

    2016-05-01

    Full Text Available This study was undertaken to ascertain whether radiation produced by X-ray photoelectron spectroscopy (XPS, micro-computed tomography (μCT and/or portable handheld X-ray fluorescence (XRF equipment might damage wood artifacts during analysis. Changes at the molecular level were monitored by Fourier transform infrared (FTIR analysis. No significant changes in FTIR spectra were observed as a result of μCT or handheld XRF analysis. No substantial changes in the collected FTIR spectra were observed when XPS analytical times on the order of minutes were used. However, XPS analysis collected over tens of hours did produce significant changes in the FTIR spectra.

  15. Estimative of core damage frequency in IPEN'S IEA-R1 research reactor due to the initiating event of loss of coolant caused by large rupture in the pipe of the primary circuit

    International Nuclear Information System (INIS)

    Hirata, Daniel Massami; Sabundjian, Gaiane; Cabral, Eduardo Lobo Lustosa

    2009-01-01

    The National Commission of Nuclear Energy (CNEN), which is the Brazilian nuclear regulatory commission, imposes safety and licensing standards in order to ensure that the nuclear power plants operate in a safe way. For licensing a nuclear reactor one of the demands of CNEN is the simulation of some accidents and thermalhydraulic transients considered as design base to verify the integrity of the plant when submitted to adverse conditions. The accidents that must be simulated are those that present large probability to occur or those that can cause more serious consequences. According to the FSAR (Final Safety Analysis Report) the initiating event that can cause the largest damage in the core, of the IEA-R1 research reactor at IPEN-CNEN/SP, is the LOCA (Loss of Coolant Accident). The objective of this paper is estimate the frequency of the IEA-R1 core damage, caused by this initiating event. In this paper we analyze the accident evolution and performance of the systems which should mitigate this event: the Emergency Coolant Core System (ECCS) and the isolated pool system. They will be analyzed by means of the event tree. In this work the reliability of these systems are also quantified using the fault tree. (author)

  16. Spontaneous pain attacks: neuralgic pain

    NARCIS (Netherlands)

    de Bont, L.G.

    2006-01-01

    Paroxysmal orofacial pains can cause diagnostic problems, especially when different clinical pictures occur simultaneously. Pain due to pulpitis, for example, may show the same characteristics as pain due to trigeminal neuralgia would. Moreover, the trigger point of trigeminal neuralgia can either

  17. Attack tree analysis for insider threats on the IoT using isabelle

    DEFF Research Database (Denmark)

    Kammüller, Florian; Nurse, Jason R. C.; Probst, Christian W.

    2016-01-01

    The Internet-of-Things (IoT) aims at integrating small devices around humans. The threat from human insiders in "regular" organisations is real; in a fully-connected world of the IoT, organisations face a substantially more severe security challenge due to unexpected access possibilities and info....... On the classified IoT attack examples, we show how this logical approach can be used to make the models more precise and to analyse the previously identified Insider IoT attacks using Isabelle attack trees....

  18. Radiation damage

    CERN Document Server

    Heijne, Erik H M; CERN. Geneva

    1998-01-01

    a) Radiation damage in organic materials. This series of lectures will give an overview of radiation effects on materials and components frequently used in accelerator engineering and experiments. Basic degradation phenomena will be presented for organic materials with comprehensive damage threshold doses for commonly used rubbers, thermoplastics, thermosets and composite materials. Some indications will be given for glass, scintillators and optical fibres. b) Radiation effects in semiconductor materials and devices. The major part of the time will be devoted to treat radiation effects in semiconductor sensors and the associated electronics, in particular displacement damage, interface and single event phenomena. Evaluation methods and practical aspects will be shown. Strategies will be developed for the survival of the materials under the expected environmental conditions of the LHC machine and detectors. I will describe profound revolution in our understanding of black holes and their relation to quantum me...

  19. Adaptive cyber-attack modeling system

    Science.gov (United States)

    Gonsalves, Paul G.; Dougherty, Edward T.

    2006-05-01

    The pervasiveness of software and networked information systems is evident across a broad spectrum of business and government sectors. Such reliance provides an ample opportunity not only for the nefarious exploits of lone wolf computer hackers, but for more systematic software attacks from organized entities. Much effort and focus has been placed on preventing and ameliorating network and OS attacks, a concomitant emphasis is required to address protection of mission critical software. Typical software protection technique and methodology evaluation and verification and validation (V&V) involves the use of a team of subject matter experts (SMEs) to mimic potential attackers or hackers. This manpower intensive, time-consuming, and potentially cost-prohibitive approach is not amenable to performing the necessary multiple non-subjective analyses required to support quantifying software protection levels. To facilitate the evaluation and V&V of software protection solutions, we have designed and developed a prototype adaptive cyber attack modeling system. Our approach integrates an off-line mechanism for rapid construction of Bayesian belief network (BN) attack models with an on-line model instantiation, adaptation and knowledge acquisition scheme. Off-line model construction is supported via a knowledge elicitation approach for identifying key domain requirements and a process for translating these requirements into a library of BN-based cyber-attack models. On-line attack modeling and knowledge acquisition is supported via BN evidence propagation and model parameter learning.

  20. Situational awareness of a coordinated cyber attack

    Science.gov (United States)

    Sudit, Moises; Stotz, Adam; Holender, Michael

    2005-03-01

    As technology continues to advance, services and capabilities become computerized, and an ever increasing amount of business is conducted electronically the threat of cyber attacks gets compounded by the complexity of such attacks and the criticality of the information which must be secured. A new age of virtual warfare has dawned in which seconds can differentiate between the protection of vital information and/or services and a malicious attacker attaining their goal. In this paper we present a novel approach in the real-time detection of multistage coordinated cyber attacks and the promising initial testing results we have obtained. We introduce INFERD (INformation Fusion Engine for Real-time Decision-making), an adaptable information fusion engine which performs fusion at levels zero, one, and two to provide real-time situational assessment and its application to the cyber domain in the ECCARS (Event Correlation for Cyber Attack Recognition System) system. The advantages to our approach are fourfold: (1) The complexity of the attacks which we consider, (2) the level of abstraction in which the analyst interacts with the attack scenarios, (3) the speed at which the information fusion is presented and performed, and (4) our disregard for ad-hoc rules or a priori parameters.

  1. Detecting unknown attacks in wireless sensor networks that contain mobile nodes.

    Science.gov (United States)

    Banković, Zorana; Fraga, David; Moya, José M; Vallejo, Juan Carlos

    2012-01-01

    As wireless sensor networks are usually deployed in unattended areas, security policies cannot be updated in a timely fashion upon identification of new attacks. This gives enough time for attackers to cause significant damage. Thus, it is of great importance to provide protection from unknown attacks. However, existing solutions are mostly concentrated on known attacks. On the other hand, mobility can make the sensor network more resilient to failures, reactive to events, and able to support disparate missions with a common set of sensors, yet the problem of security becomes more complicated. In order to address the issue of security in networks with mobile nodes, we propose a machine learning solution for anomaly detection along with the feature extraction process that tries to detect temporal and spatial inconsistencies in the sequences of sensed values and the routing paths used to forward these values to the base station. We also propose a special way to treat mobile nodes, which is the main novelty of this work. The data produced in the presence of an attacker are treated as outliers, and detected using clustering techniques. These techniques are further coupled with a reputation system, in this way isolating compromised nodes in timely fashion. The proposal exhibits good performances at detecting and confining previously unseen attacks, including the cases when mobile nodes are compromised.

  2. Acid rain attack on outdoor sculpture in perspective

    Science.gov (United States)

    Livingston, Richard A.

    2016-12-01

    A major concern motivating research in acid rain materials effects has been the potential for damage to cultural heritage, particularly outdoor marble and bronze sculpture. However, a combination of field and laboratory studies has failed to show a correlation between rain pH and loss of materials. In order to understand this counterintuitive lack of acid rain effect, an aqueous geochemical modeling approach was used to analyze rain runoff chemistry for the relative importance of acid rain neutralization, dry deposition, and in the case of marble, natural carbonate dissolution. This approach involved the development of pH - SO42- phase diagrams for marble (calcium carbonate) and bronze (copper) under ambient environmental conditions. This then enabled reaction path modeling of the acid neutralization process using the pH range typically found in wet deposition (3.5-6). The results were for marble that the theoretical maximum amount of Ca2+ ion that could be lost due acid rain neutralization would be 0.158 mmol/l compared to 10.5 mmol/l by dry deposition, and for bronze, the Cu2+ ion losses would be 0.21 mmol/l and 47.3 mmol/l respectively. Consequently dry deposition effects on these materials have the potential to dominate over wet deposition effects. To test these predictions the geochemical models were applied to examples of data sets from mass balance (runoff vs rainfall) studies on a marble statue in New York City and some bronze memorial plaques at Gettysburg PA. Although these data sets were collected in the early 1980s they remain valid for demonstrating the mass balance method. For the marble statue, the mean Ca2+ losses by dry deposition was about 69% of the total compared 0.3% for acid rain neutralization, which was less than the natural carbonate dissolution losses of 0.8%. For the bronze, the mean Cu2+ losses were 70.6% by SO42- dry deposition and 23% by NO3- dry deposition compared to 6.4% by acid rain neutralization. Thus for both cases the wet

  3. Classification of cyber attacks in South Africa

    CSIR Research Space (South Africa)

    Van Heerden, R

    2016-05-01

    Full Text Available various ATM's throughout South Africa. Two criminals, Motsoane and Masoleng, were arrested in February 2012 and both sentenced to 15 years in jail [36, 37]. 3.10 2013: IOL DDoS Anonymous Africa claimed responsibility for launching a Distributed Denial... of Service (DDoS) attack on the Independent Newspaper web site iol.co.za. The attack was in response to claims that the IOL group supports Zimbabwean president Robert Mugabe. The following taunt was sent to boast about the attack: “IOL bad boys bad boys...

  4. Attacker Modelling in Ubiquitous Computing Systems

    DEFF Research Database (Denmark)

    Papini, Davide

    in with our everyday life. This future is visible to everyone nowadays: terms like smartphone, cloud, sensor, network etc. are widely known and used in our everyday life. But what about the security of such systems. Ubiquitous computing devices can be limited in terms of energy, computing power and memory...... attacker remain somehow undened and still under extensive investigation. This Thesis explores the nature of the ubiquitous attacker with a focus on how she interacts with the physical world and it denes a model that captures the abilities of the attacker. Furthermore a quantitative implementation...

  5. Tort Damages

    NARCIS (Netherlands)

    L.T. Visscher (Louis)

    2008-01-01

    textabstractAbstract: In this Chapter, I provide an overview of Law and Economics literature regarding tort damages. Where necessary, attention is also spent to rules of tort liability. Both types of rules provide behavioral incentives to both injurers and victims, with respect to their level of

  6. YET ANOTHER ATTACK ON WAGES AND CONDITIONS.

    Science.gov (United States)

    McCarthy, Andrew

    2016-10-01

    An unobjectionable-sounding title obscures the real intent of the latest in a series of Bills which the federal Coalition government is attempting to legislate in its ongoing attempts to undermine employee wages and conditions and attack unions.

  7. A Unique Fatal Moose Attack Mimicking Homicide.

    Science.gov (United States)

    Gudmannsson, Petur; Berge, Johan; Druid, Henrik; Ericsson, Göran; Eriksson, Anders

    2018-03-01

    Fatalities caused by animal attacks are rare, but have the potential to mimic homicide. We present a case in which a moose attacked and killed a woman who was walking her dog in a forest. Autopsy showed widespread blunt trauma with a large laceration on one leg in which blades of grass were embedded. Flail chest was the cause of death. The case was initially conceived as homicide by means of a riding lawn mower. A review of the case by moose experts and analyses of biological trace material that proved to originate from moose, established the true source of injury. The dog probably provoked a moose, which, in response, stomped and gored the victim to death. The injuries resembled those previously reported from attacks by cattle and water buffalo. Fatal moose attacks constitute an extremely rare threat in boreal areas, but can be considered in traumatic deaths of unknown cause. © 2017 American Academy of Forensic Sciences.

  8. Diabetes - preventing heart attack and stroke

    Science.gov (United States)

    Diabetes complications - heart; Coronary artery disease - diabetes; CAD - diabetes; Cerebrovascular disease - diabetes ... People with diabetes have a higher chance of having heart attacks and strokes. Smoking and having high blood pressure and high ...

  9. Heuristic attacks against graphical password generators

    CSIR Research Space (South Africa)

    Peach, S

    2010-05-01

    Full Text Available In this paper the authors explore heuristic attacks against graphical password generators. A new trend is emerging to use user clickable pictures to generate passwords. This technique of authentication can be successfully used for - for example...

  10. On localization attacks against cloud infrastructure

    Science.gov (United States)

    Ge, Linqiang; Yu, Wei; Sistani, Mohammad Ali

    2013-05-01

    One of the key characteristics of cloud computing is the device and location independence that enables the user to access systems regardless of their location. Because cloud computing is heavily based on sharing resource, it is vulnerable to cyber attacks. In this paper, we investigate a localization attack that enables the adversary to leverage central processing unit (CPU) resources to localize the physical location of server used by victims. By increasing and reducing CPU usage through the malicious virtual machine (VM), the response time from the victim VM will increase and decrease correspondingly. In this way, by embedding the probing signal into the CPU usage and correlating the same pattern in the response time from the victim VM, the adversary can find the location of victim VM. To determine attack accuracy, we investigate features in both the time and frequency domains. We conduct both theoretical and experimental study to demonstrate the effectiveness of such an attack.

  11. Using agility to combat cyber attacks.

    Science.gov (United States)

    Anderson, Kerry

    2017-06-01

    Some incident response practitioners feel that they have been locked in a battle with cyber criminals since the popular adoption of the internet. Initially, organisations made great inroads in preventing and containing cyber attacks. In the last few years, however, cyber criminals have become adept at eluding defence security technologies and rapidly modifying their exploit strategies for financial or political gains. Similar to changes in military combat tactics, cyber criminals utilise distributed attack cells, real-time communications, and rapidly mutating exploits to minimise the potential for detection. Cyber criminals have changed their attack paradigm. This paper describes a new incident response paradigm aimed at combating the new model of cyber attacks with an emphasis on agility to increase the organisation's ability to respond rapidly to these new challenges.

  12. Social engineering attack examples, templates and scenarios

    CSIR Research Space (South Africa)

    Mouton, Francois

    2016-06-01

    Full Text Available that are representative of real-world examples, whilst still being general enough to encompass several different real-world examples. The proposed social engineering attack templates cover all three types of communication, namely bidirectional communication...

  13. Compiling symbolic attacks to protocol implementation tests

    Directory of Open Access Journals (Sweden)

    Michael Rusinowitch

    2013-07-01

    Full Text Available Recently efficient model-checking tools have been developed to find flaws in security protocols specifications. These flaws can be interpreted as potential attacks scenarios but the feasability of these scenarios need to be confirmed at the implementation level. However, bridging the gap between an abstract attack scenario derived from a specification and a penetration test on real implementations of a protocol is still an open issue. This work investigates an architecture for automatically generating abstract attacks and converting them to concrete tests on protocol implementations. In particular we aim to improve previously proposed blackbox testing methods in order to discover automatically new attacks and vulnerabilities. As a proof of concept we have experimented our proposed architecture to detect a renegotiation vulnerability on some implementations of SSL/TLS, a protocol widely used for securing electronic transactions.

  14. ATTACK WARNING: Costs to Modernize NORAD's Computer System Significantly Understated

    National Research Council Canada - National Science Library

    Cross, F

    1991-01-01

    ...) Integrated Tactical Warning and Attack Assessment (ITW/AA) system. These subsystems provide critical strategic surveillance and attack warning and assessment information to United States and Canadian leaders...

  15. Study design of the CLOSURE I Trial: a prospective, multicenter, randomized, controlled trial to evaluate the safety and efficacy of the STARFlex septal closure system versus best medical therapy in patients with stroke or transient ischemic attack due to presumed paradoxical embolism through a patent foramen ovale.

    Science.gov (United States)

    Furlan, Anthony J; Reisman, Mark; Massaro, Joseph; Mauri, Laura; Adams, Harold; Albers, Gregory W; Felberg, Robert; Herrmann, Howard; Kar, Saibal; Landzberg, Michael; Raizner, Albert; Wechsler, Lawrence

    2010-12-01

    Some strokes of unknown etiology may be the result of a paradoxical embolism traversing through a nonfused foramen ovale (patent foramen ovale [PFO]). The utility of percutaneously placed devices for treatment of patients with cryptogenic stroke or transient ischemic attack (TIA) and PFO is unknown. In addition, there are no clear data about the utility of medical interventions or other surgical procedures in this situation. Despite limited data, many patients are being treated with PFO closure devices. Thus, there is a strong need for clinical trials that test the potential efficacy of PFO occlusive devices in this situation. To address this gap in medical knowledge, we designed the CLOSURE I trial, a randomized, clinical trial comparing the use of a percutaneously placed PFO occlusive device and best medical therapy versus best medical therapy alone for prevention of recurrent ischemic neurologic symptoms among persons with TIA or ischemic stroke. This prospective, multicenter, randomized, controlled trial has finished enrollment. Two-year follow-up for all 910 patients is required. The primary end point is the 2-year incidence of stroke or TIA, all-cause mortality for the first 30 days, and neurologic mortality from ≥ 31 days of follow-up, as adjudicated by a panel of physicians who are unaware of treatment allocation. This article describes the rationale and study design of CLOSURE I. This trial should provide information as to whether the STARFlex septal closure system is safe and more effective than best medical therapy alone in preventing recurrent stroke/TIA and mortality in patients with PFO and whether the STARFlex septal closure device can demonstrate superiority compared with best medical therapy alone. Clinical Trial Registration-URL: http://www.clinicaltrials.gov. Unique identifier: NCT00201461.

  16. RAPTOR: Ransomware Attack PredicTOR

    OpenAIRE

    Quinkert, Florian; Holz, Thorsten; Hossain, KSM Tozammel; Ferrara, Emilio; Lerman, Kristina

    2018-01-01

    Ransomware, a type of malicious software that encrypts a victim's files and only releases the cryptographic key once a ransom is paid, has emerged as a potentially devastating class of cybercrimes in the past few years. In this paper, we present RAPTOR, a promising line of defense against ransomware attacks. RAPTOR fingerprints attackers' operations to forecast ransomware activity. More specifically, our method learns features of malicious domains by looking at examples of domains involved in...

  17. Attack Helicopter Operations: Art or Science

    Science.gov (United States)

    1991-05-13

    ATTACK HELICOPTER OPERATIONS: ART OR SCIENCE ? BY LIEUTENANT COLONEL JAN CALLEN United States Army DISTRIBUTION STATEMENT A: Approved for public release...TASK IWORK UNIT ELEMENT NO. NO. NO. ACCESSION NC 11. TITLE (Include Socurity Classification) Attack Helicopter Operations: Art or Science ? 12. PERSONAL...OPERATIONS: ART OR SCIENCE ? AN INDIVIDUAL STUDY PROJECT by Lieutenant Colonel Jan Callen United States Army Colonel Greg Snelgrove Project Adviser U.S

  18. Protecting mobile agents from external replay attacks

    OpenAIRE

    Garrigues Olivella, Carles; Migas, Nikos; Buchanan, William; Robles, Sergi; Borrell Viader, Joan

    2014-01-01

    Peer-reviewed This paper presents a protocol for the protection of mobile agents against external replay attacks. This kind of attacks are performed by malicious platforms when dispatching an agent multiple times to a remote host, thus making it reexecute part of its itinerary. Current proposals aiming to address this problem are based on storing agent identifiers, or trip markers, inside agent platforms, so that future reexecutions can be detected and prevented. The problem of these solut...

  19. Semantic Identification Attacks on Web Browsing

    OpenAIRE

    Guha, Neel

    2016-01-01

    We introduce a Semantic Identification Attack, in which an adversary uses semantic signals about the pages visited in one browsing session to identify other browsing sessions launched by the same user. This attack allows an adver- sary to determine if two browsing sessions originate from the same user regardless of any measures taken by the user to disguise their browser or network. We use the MSNBC Anonymous Browsing data set, which contains a large set of user visits (labeled by category) t...

  20. Consciousness in Non-Epileptic Attack Disorder

    OpenAIRE

    Reuber, M.; Kurthen, M.

    2011-01-01

    Non-epileptic attack disorder (NEAD) is one of the most important differential diagnoses of epilepsy. Impairment of\\ud consciousness is the key feature of non-epileptic attacks (NEAs). The first half of this review summarises the clinical research\\ud literature featuring observations relating to consciousness in NEAD. The second half places this evidence in the wider context\\ud of the recent discourse on consciousness in neuroscience and the philosophy of mind. We argue that studies of consci...

  1. Cyber Security Audit and Attack Detection Toolkit

    Energy Technology Data Exchange (ETDEWEB)

    Peterson, Dale

    2012-05-31

    This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.

  2. Distinguishing attack and second-preimage attack on encrypted message authentication codes (EMAC)

    Science.gov (United States)

    Ariwibowo, Sigit; Windarta, Susila

    2016-02-01

    In this paper we show that distinguisher on CBC-MAC can be applied to Encrypted Message Authentication Code (EMAC) scheme. EMAC scheme in general is vulnerable to distinguishing attack and second preimage attack. Distinguishing attack simulation on AES-EMAC using 225 message modifications, no collision have been found. According to second preimage attack simulation on AES-EMAC no collision found between EMAC value of S1 and S2, i.e. no second preimage found for messages that have been tested. Based on distinguishing attack simulation on truncated AES-EMAC we found collision in every message therefore we cannot distinguish truncated AES-EMAC with random function. Second-preimage attack is successfully performed on truncated AES-EMAC.

  3. Combined Heuristic Attack Strategy on Complex Networks

    Directory of Open Access Journals (Sweden)

    Marek Šimon

    2017-01-01

    Full Text Available Usually, the existence of a complex network is considered an advantage feature and efforts are made to increase its robustness against an attack. However, there exist also harmful and/or malicious networks, from social ones like spreading hoax, corruption, phishing, extremist ideology, and terrorist support up to computer networks spreading computer viruses or DDoS attack software or even biological networks of carriers or transport centers spreading disease among the population. New attack strategy can be therefore used against malicious networks, as well as in a worst-case scenario test for robustness of a useful network. A common measure of robustness of networks is their disintegration level after removal of a fraction of nodes. This robustness can be calculated as a ratio of the number of nodes of the greatest remaining network component against the number of nodes in the original network. Our paper presents a combination of heuristics optimized for an attack on a complex network to achieve its greatest disintegration. Nodes are deleted sequentially based on a heuristic criterion. Efficiency of classical attack approaches is compared to the proposed approach on Barabási-Albert, scale-free with tunable power-law exponent, and Erdős-Rényi models of complex networks and on real-world networks. Our attack strategy results in a faster disintegration, which is counterbalanced by its slightly increased computational demands.

  4. Genetic doping and health damages.

    Science.gov (United States)

    Fallahi, Aa; Ravasi, Aa; Farhud, Dd

    2011-01-01

    Use of genetic doping or gene transfer technology will be the newest and the lethal method of doping in future and have some unpleasant consequences for sports, athletes, and outcomes of competitions. The World Anti-Doping Agency (WADA) defines genetic doping as "the non-therapeutic use of genes, genetic elements, and/or cells that have the capacity to enhance athletic performance ". The purpose of this review is to consider genetic doping, health damages and risks of new genes if delivered in athletes. This review, which is carried out by reviewing relevant publications, is primarily based on the journals available in GOOGLE, ELSEVIER, PUBMED in fields of genetic technology, and health using a combination of keywords (e.g., genetic doping, genes, exercise, performance, athletes) until July 2010. There are several genes related to sport performance and if they are used, they will have health risks and sever damages such as cancer, autoimmunization, and heart attack.

  5. Supraventricular Tachycardia Atackt Due to Losewieght Drug

    Directory of Open Access Journals (Sweden)

    Murat Yalcin

    2016-01-01

    Full Text Available Obesity is an important health problem. Treatment of obesity includes diet, exercise and drugs. Some of these drugs are out of prescription. Advers effects of these drugs have not been known. In this report; we present a case with supraventricular tachycardia attack due to loseweight drug containing mangostana (mango, hibiscus, citrus mate, L-karnitin, guarana.

  6. Password-only authenticated three-party key exchange proven secure against insider dictionary attacks.

    Science.gov (United States)

    Nam, Junghyun; Choo, Kim-Kwang Raymond; Paik, Juryon; Won, Dongho

    2014-01-01

    While a number of protocols for password-only authenticated key exchange (PAKE) in the 3-party setting have been proposed, it still remains a challenging task to prove the security of a 3-party PAKE protocol against insider dictionary attacks. To the best of our knowledge, there is no 3-party PAKE protocol that carries a formal proof, or even definition, of security against insider dictionary attacks. In this paper, we present the first 3-party PAKE protocol proven secure against both online and offline dictionary attacks as well as insider and outsider dictionary attacks. Our construct can be viewed as a protocol compiler that transforms any 2-party PAKE protocol into a 3-party PAKE protocol with 2 additional rounds of communication. We also present a simple and intuitive approach of formally modelling dictionary attacks in the password-only 3-party setting, which significantly reduces the complexity of proving the security of 3-party PAKE protocols against dictionary attacks. In addition, we investigate the security of the well-known 3-party PAKE protocol, called GPAKE, due to Abdalla et al. (2005, 2006), and demonstrate that the security of GPAKE against online dictionary attacks depends heavily on the composition of its two building blocks, namely a 2-party PAKE protocol and a 3-party key distribution protocol.

  7. Detecting and Mitigating Smart Insider Jamming Attacks in MANETs Using Reputation-Based Coalition Game

    Directory of Open Access Journals (Sweden)

    Ashraf Al Sharah

    2016-01-01

    Full Text Available Security in mobile ad hoc networks (MANETs is challenging due to the ability of adversaries to gather necessary intelligence to launch insider jamming attacks. The solutions to prevent external attacks on MANET are not applicable for defense against insider jamming attacks. There is a need for a formal framework to characterize the information required by adversaries to launch insider jamming attacks. In this paper, we propose a novel reputation-based coalition game in MANETs to detect and mitigate insider jamming attacks. Since there is no centralized controller in MANETs, the nodes rely heavily on availability of transmission rates and a reputation for each individual node in the coalition to detect the presence of internal jamming node. The nodes will form a stable grand coalition in order to make a strategic security defense decision, maintain the grand coalition based on node reputation, and exclude any malicious node based on reputation value. Simulation results show that our approach provides a framework to quantify information needed by adversaries to launch insider attacks. The proposed approach will improve MANET’s defense against insider attacks, while also reducing incorrect classification of legitimate nodes as jammers.

  8. Non-invasive ventilation in severe asthma attack, its possibilities and problems.

    Science.gov (United States)

    Murase, K; Tomii, K; Chin, K; Niimi, A; Ishihara, K; Mishima, M

    2011-06-01

    Asthma attack is characterized by episodic attacks of cough, dyspnea and wheeze occurring due to bronchoconstriction, airway hyperresponsiveness and mucous hypersecretion. Although nationwide clinical guidelines have been published to establish the standard care of asthma, choices in the treatment of fatal asthma attacks remain of clinical significance. Especially, in a severe asthma attack, despite the application of conventional medical treatment, respiratory management is critical. Even though non-invasive ventilation (NIV) has been shown to be effective in a wide variety of clinical settings, reports of NIV in asthmatic patients are scarce. According to a few prospective clinical trials reporting promising results in favour of the use of NIV in a severe asthma attack, a trial of NIV prior to invasive mechanical ventilation seems acceptable and may benefit patients by decreasing the need for intubation and by supporting pharmaceutical treatments. Although selecting the appropriate patients for NIV use is a key factor in successful NIV application, how to distinguish such patients is quite controversial. Larger high quality clinical trails are urgently required to confirm the benefits of NIV to patients with severe asthma attack. In this article, we focus on the body of evidence supporting the use of NIV in asthma attacks and discuss its advantages as well its problems.

  9. DETECTION AND LOCALIZATION OF MULTIPLE SPOOFING ATTACKERS FOR MOBILE WIRELESS NETWORKS

    Directory of Open Access Journals (Sweden)

    R. Maivizhi

    2015-06-01

    Full Text Available The openness nature of wireless networks allows adversaries to easily launch variety of spoofing attacks and causes havoc in network performance. Recent approaches used Received Signal Strength (RSS traces, which only detect spoofing attacks in mobile wireless networks. However, it is not always desirable to use these methods as RSS values fluctuate significantly over time due to distance, noise and interference. In this paper, we discusses a novel approach, Mobile spOofing attack DEtection and Localization in WIireless Networks (MODELWIN system, which exploits location information about nodes to detect identity-based spoofing attacks in mobile wireless networks. Also, this approach determines the number of attackers who used the same node identity to masquerade as legitimate device. Moreover, multiple adversaries can be localized accurately. By eliminating attackers the proposed system enhances network performance. We have evaluated our technique through simulation using an 802.11 (WiFi network and an 802.15.4 (Zigbee networks. The results prove that MODELWIN can detect spoofing attacks with a very high detection rate and localize adversaries accurately.

  10. Exploiting Hardware Vulnerabilities to Attack Embedded System Devices: a Survey of Potent Microarchitectural Attacks

    Directory of Open Access Journals (Sweden)

    Apostolos P. Fournaris

    2017-07-01

    Full Text Available Cyber-Physical system devices nowadays constitute a mixture of Information Technology (IT and Operational Technology (OT systems that are meant to operate harmonically under a security critical framework. As security IT countermeasures are gradually been installed in many embedded system nodes, thus securing them from many well-know cyber attacks there is a lurking danger that is still overlooked. Apart from the software vulnerabilities that typical malicious programs use, there are some very interesting hardware vulnerabilities that can be exploited in order to mount devastating software or hardware attacks (typically undetected by software countermeasures capable of fully compromising any embedded system device. Real-time microarchitecture attacks such as the cache side-channel attacks are such case but also the newly discovered Rowhammer fault injection attack that can be mounted even remotely to gain full access to a device DRAM (Dynamic Random Access Memory. Under the light of the above dangers that are focused on the device hardware structure, in this paper, an overview of this attack field is provided including attacks, threat directives and countermeasures. The goal of this paper is not to exhaustively overview attacks and countermeasures but rather to survey the various, possible, existing attack directions and highlight the security risks that they can pose to security critical embedded systems as well as indicate their strength on compromising the Quality of Service (QoS such systems are designed to provide.

  11. Predicting Factors of Zone 4 Attack in Volleyball.

    Science.gov (United States)

    Costa, Gustavo C; Castro, Henrique O; Evangelista, Breno F; Malheiros, Laura M; Greco, Pablo J; Ugrinowitsch, Herbert

    2017-06-01

    This study examined 142 volleyball games of the Men's Super League 2014/2015 seasons in Brazil from which we analyzed 24-26 games of each participating team, identifying 5,267 Zone 4 attacks for further analysis. Within these Zone 4 attacks, we analyzed the association between the effect of the attack carried out and the separate effects of serve reception, tempo and type of attack. We found that the reception, tempo of attack, second tempo of attack, and power of diagonal attack were predictors of the attack effect in Zone 4. Moreover, placed attacks showed a tendency to not yield a score. In conclusion, winning points in high-level men's volleyball requires excellent receptions, a fast attack tempo and powerfully executed of attacks.

  12. Earthquake damage to underground facilities

    International Nuclear Information System (INIS)

    Pratt, H.R.; Hustrulid, W.A.; Stephenson, D.E.

    1978-11-01

    The potential seismic risk for an underground nuclear waste repository will be one of the considerations in evaluating its ultimate location. However, the risk to subsurface facilities cannot be judged by applying intensity ratings derived from the surface effects of an earthquake. A literature review and analysis were performed to document the damage and non-damage due to earthquakes to underground facilities. Damage from earthquakes to tunnels, s, and wells and damage (rock bursts) from mining operations were investigated. Damage from documented nuclear events was also included in the study where applicable. There are very few data on damage in the subsurface due to earthquakes. This fact itself attests to the lessened effect of earthquakes in the subsurface because mines exist in areas where strong earthquakes have done extensive surface damage. More damage is reported in shallow tunnels near the surface than in deep mines. In mines and tunnels, large displacements occur primarily along pre-existing faults and fractures or at the surface entrance to these facilities.Data indicate vertical structures such as wells and shafts are less susceptible to damage than surface facilities. More analysis is required before seismic criteria can be formulated for the siting of a nuclear waste repository

  13. Face Spoof Attack Recognition Using Discriminative Image Patches

    Directory of Open Access Journals (Sweden)

    Zahid Akhtar

    2016-01-01

    Full Text Available Face recognition systems are now being used in many applications such as border crossings, banks, and mobile payments. The wide scale deployment of facial recognition systems has attracted intensive attention to the reliability of face biometrics against spoof attacks, where a photo, a video, or a 3D mask of a genuine user’s face can be used to gain illegitimate access to facilities or services. Though several face antispoofing or liveness detection methods (which determine at the time of capture whether a face is live or spoof have been proposed, the issue is still unsolved due to difficulty in finding discriminative and computationally inexpensive features and methods for spoof attacks. In addition, existing techniques use whole face image or complete video for liveness detection. However, often certain face regions (video frames are redundant or correspond to the clutter in the image (video, thus leading generally to low performances. Therefore, we propose seven novel methods to find discriminative image patches, which we define as regions that are salient, instrumental, and class-specific. Four well-known classifiers, namely, support vector machine (SVM, Naive-Bayes, Quadratic Discriminant Analysis (QDA, and Ensemble, are then used to distinguish between genuine and spoof faces using a voting based scheme. Experimental analysis on two publicly available databases (Idiap REPLAY-ATTACK and CASIA-FASD shows promising results compared to existing works.

  14. Civilian casualties of Iraqi ballistic missile attack to

    Directory of Open Access Journals (Sweden)

    Khaji Ali

    2012-06-01

    Full Text Available 【Abstract】Objective: To determine the pattern of causalities of Iraqi ballistic missile attacks on Tehran, the capital of Iran, during Iraq-Iran war. Methods: Data were extracted from the Army Staff Headquarters based on daily reports of Iranian army units during the war. Results: During 52 days, Tehran was stroked by 118 Al-Hussein missiles (a modified version of Scud missile. Eighty-six missiles landed in populated areas. During Iraqi missile attacks, 422 civilians died and 1 579 injured (4.9 deaths and 18.3 injuries per missile. During 52 days, 8.1 of the civilians died and 30.4 injured daily. Of the cases that died, 101 persons (24% were excluded due to the lack of information. Among the remainders, 179 (55.8% were male and 142 (44.2% were female. The mean age of the victims was 25.3 years±19.9 years. Our results show that the high accuracy of modified Scud missiles landed in crowded ar-eas is the major cause of high mortality in Tehran. The pres-ence of suitable warning system and shelters could reduce civilian casualties. Conclusion: The awareness and readiness of civilian defense forces, rescue services and all medical facilities for dealing with mass casualties caused by ballistic missile at-tacks are necessary. Key words: Mortality; War; Mass casualty incidents; Wounds and injuries

  15. Permeability Damage Due to Asphaltene Deposition : Experimental and Modeling Aspects Endommagement d'un milieu poreux par dépôts d'asphaltènes : expériences et modélisation

    Directory of Open Access Journals (Sweden)

    Minssieux L.

    2006-12-01

    Full Text Available The flow properties of several asphaltenic crudes were studied at reservoir temperature in rocks of different morphology and mineralogy. The experiments performed showed a progressive reduction in permeability to oil during injection, varying in rate according to the system considered. The existence of organic deposits was verified by Rock-Evalpyrolysis measurements made on sections of samples taken at the end of flow at different distances from the entry face. This technique enables the profile of the deposits to be quantified. The interpretation of the permeability damage experiments and their simulation are treated by comparing the asphaltenes in oil to colloidal particles in suspension, capable of being deposited at the surface of the pores and thus reducing the permeability of the porous medium. The first simulations were carried out using the PARISIFP particle damage model, which has recently been extended to the case of multi-layer deposition. A satisfactory qualitative agreement is observed with the experimental results. Les propriétés d'écoulement de plusieurs bruts asphalténiques ont été étudiées à la température du réservoir d'origine dans des roches de morphologie et minéralogie différentes. Les expériences réalisées mettent en évidence une réduction progressive de la perméabilité à l'huile au cours de l'injection, plus ou moins rapide selon les cas. L'existence de dépôts organiques a été vérifiée par des mesures de pyrolyse Rock-Evaleffectuées sur des sections d'échantillons prélevées en fin d'écoulement à différentes distances de la face d'entrée. Cette technique permet de quantifier le profil des dépôts. L'interprétation des expériences de colmatage et leur simulation sont traitées en assimilant les asphaltènes dans l'huile à des particules colloïdales en suspension, susceptibles de se déposer à la surface des pores et ainsi de réduire la perméabilité du milieu poreux. Les premi

  16. Evaluation of corrosion attack of chimney liners

    Directory of Open Access Journals (Sweden)

    Blahetová M.

    2016-06-01

    Full Text Available The case study of chimney liner corrosion addresses three specific cases of damage of chimney systems from of stainless steels. These systems were used for flue of gas arising from the combustion of brown coal in small automatic boilers, which are used for heating. Detailed analyzes implied that the cause of devastating corrosion of the steel AISI 316 and 304 steel (CSN 17349, 17241 was particularly high content of halides (chlorides and fluorides, which caused a severe pitting corrosion, which led up to the perforation of the liner material. Simultaneous reduction of the thickness of the used sheets was due to by the general corrosion, which was caused by the sulfur in the solid fuel. The condensation then led to acid environment and therefore the corrosion below the dew point of the sulfuric acid has occurred. All is documented by metallographic analysis and microanalysis of the corrosion products.

  17. Terrorism and nuclear damage coverage

    International Nuclear Information System (INIS)

    Horbach, N. L. J. T.; Brown, O. F.; Vanden Borre, T.

    2004-01-01

    This paper deals with nuclear terrorism and the manner in which nuclear operators can insure themselves against it, based on the international nuclear liability conventions. It concludes that terrorism is currently not covered under the treaty exoneration provisions on 'war-like events' based on an analysis of the concept on 'terrorism' and travaux preparatoires. Consequently, operators remain liable for nuclear damage resulting from terrorist acts, for which mandatory insurance is applicable. Since nuclear insurance industry looks at excluding such insurance coverage from their policies in the near future, this article aims to suggest alternative means for insurance, in order to ensure adequate compensation for innocent victims. The September 11, 2001 attacks at the World Trade Center in New York City and the Pentagon in Washington, DC resulted in the largest loss in the history of insurance, inevitably leading to concerns about nuclear damage coverage, should future such assaults target a nuclear power plant or other nuclear installation. Since the attacks, some insurers have signalled their intentions to exclude coverage for terrorism from their nuclear liability and property insurance policies. Other insurers are maintaining coverage for terrorism, but are establishing aggregate limits or sublimits and are increasing premiums. Additional changes by insurers are likely to occur. Highlighted by the September 11th events, and most recently by those in Madrid on 11 March 2004, are questions about how to define acts of terrorism and the extent to which such are covered under the international nuclear liability conventions and various domestic nuclear liability laws. Of particular concern to insurers is the possibility of coordinated simultaneous attacks on multiple nuclear facilities. This paper provides a survey of the issues, and recommendations for future clarifications and coverage options.(author)

  18. Nonepileptic attack disorder among married women.

    Science.gov (United States)

    Dhanaraj, M; Rangaraj, R; Arulmozhi, T; Vengatesan, A

    2005-06-01

    To study the clinical features, precipitating stressful life events and prognosis of nonepileptic attack disorder (NEAD) among married women. Prospective cohort study with 1-year follow-up. A tertiary care teaching hospital. Of the 1020 patients with epilepsy referred to the epilepsy clinic during 2002-2003, 30 were married women with NEAD. The diagnostic criteria for NEAD included normal EEG during ictal and post-ictal phase of the generalized 'attack.' The data collected included clinical characteristics, semiology of the attacks, precipitating stressful events, and co-morbid psychiatric disorders. The control group included 30 age-matched married women with generalized tonic-clonic seizures. The long-term outcome and factors influencing the outcomes were analyzed. The mean duration of illness was 18 months, and the pattern of the attack was 'fall and lying still' in 53% and 'fall with generalized motor movements' in 47%. The frequency was one or more per week in 57% and occasionally in 43%. The important stressful events were matrimonial discord following illegal relationship of the husband with another woman (chi2 = 9.02, P = 0.003) and constant quarrel with other family members (chi2 = 5.19, P = 0.02). The prevalence of sexual abuse was low (7%). Co-morbid psychiatric disorder was observed in 70%. At the end of 1 year, 39% were free from the attack. Resolution of the stressful life events (chi2 = 4.52, P = 0.03) and lower frequency of attack at the time of reporting (chi2 = 3.88, P = 0.05) correlated with good outcomes. Among patients with NEAD in India, the major precipitating factors were matrimonial discord following illegal relationship of the husband with another woman and constant quarrel with other family members and not sexual abuse. Women with low frequency of attack at the time of reporting and the remission of the stressful events had better outcomes.

  19. [Clinical pathway for management of patients with acute asthma attack].

    Science.gov (United States)

    Azuma, Naoto; Katada, Yoshinori; Kobayashi, Masaaki; Kojima, Makiko; Nakajima, Yumi; Shibano, Miyo; Tomita, Hitomi; Yamanaka, Takao; Harada, Yoshinori; Ishii, Taeko; Saeki, Yukihiko

    2008-11-01

    There have been few reports of clinical pathway (CP) for treatment of asthma attack, because patients with asthma always admit emergently and the severity varies. We introduced CP so that standard asthma treatment can be widely used, and investigated its clinical usefulness. We designed a new CP for treating asthma attack according to the guideline (Japanese guideline (JGL) and Global Initiative for Asthma (GINA)). 136 patients who admitted to our hospital due to asthma attack from January 1999 to November 2006, were enrolled our study. Excluding cases complicated with pneumonia, COPD or cardiac failure, we evaluated 46 cases treated with the CP comparing with 19 cases treated without the CP. The clinical evaluations include systemic and inhaled steroid use, FEV1.0%, history of asthma, and the duration of asthma attack. Furthermore, we investigated difference between cases with and without prolonged admission. While the rates of systemic and inhaled steroid use in cases without the CP were 57.9% and 52.6% respectively, those in cases with the CP were approximately 100%. Employing the CP, FEV 1.0% at discharge time was elevated from 71.7% to 76.3% and the duration of hospitalization was shortened from 14.2 days to 11.5 days. Mean age of the cases with prolonged admission was higher than the rest. The asthma CP is an effective way for the standard treatment according to the guideline to be used widely even by doctors who are not familiar with asthma treatment. It improves the efficacy of in-hospital treatment.

  20. Classification of HTTP Attacks: A Study on the ECML/PKDD 2007 Discovery Challenge

    Energy Technology Data Exchange (ETDEWEB)

    Gallagher, Brian [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Eliassi-Rad, Tina [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2009-07-08

    As the world becomes more reliant on Web applications for commercial, financial, and medical transactions, cyber attacks on the World Wide Web are increasing in frequency and severity. Web applications provide an attractive alternative to traditional desktop applications due to their accessibility and ease of deployment. However, the accessibility of Web applications also makes them extremely vulnerable to attack. This inherent vulnerability is intensified by the distributed nature ofWeb applications and the complexity of configuring application servers. These factors have led to a proliferation of Web-based attacks, in which attackers surreptitiously inject code into HTTP requests, allowing them to execute arbitrary commands on remote systems and perform malicious activities such as reading, altering, or destroying sensitive data. One approach for dealing with HTTP-based attacks is to identify malicious code in incoming HTTP requests and eliminate bad requests before they are processed. Using machine learning techniques, we can build a classifier to automatically label requests as “Valid” or “Attack.” For this study, we develop a simple, but effective HTTP attack classifier, based on the vector space model used commonly for Information Retrieval. Our classifier not only separates attacks from valid requests, but can also identify specific attack types (e.g., “SQL Injection” or “Path Traversal”). We demonstrate the effectiveness of our approach through experiments on the ECML/PKDD 2007 Discovery Challenge data set. Specifically, we show that our approach achieves higher precision and recall than previous methods. In addition, our approach has a number of desirable characteristics, including robustness to missing contextual information, interpretability of models, and scalability.

  1. Attack tree based cyber security analysis of nuclear digital instrumentation and control systems

    International Nuclear Information System (INIS)

    Khand, P.A.

    2009-01-01

    To maintain the cyber security, nuclear digital Instrumentation and Control (I and C) systems must be analyzed for security risks because a single security breach due to a cyber attack can cause system failure, which can have catastrophic consequences on the environment and staff of a Nuclear Power Plant (NPP). Attack trees have been widely used to analyze the cyber security of digital systems due to their ability to capture system specific as well as attacker specific details. Therefore, a methodology based on attack trees has been proposed to analyze the cyber security of the systems. The methodology has been applied for the Cyber Security Analysis (CSA) of a Bistable Processor (BP) of a Reactor Protection System (RPS). Threats have been described according to their source. Attack scenarios have been generated using the attack tree and possible counter measures according to the Security Risk Level (SRL) of each scenario have been suggested. Moreover, cyber Security Requirements (SRs) have been elicited, and suitability of the requirements has been checked. (author)

  2. Advanced unambiguous state discrimination attack and countermeasure strategy in a practical B92 QKD system

    Science.gov (United States)

    Ko, Heasin; Choi, Byung-Seok; Choe, Joong-Seon; Youn, Chun Ju

    2018-01-01

    Even though unconditional security of B92 quantum key distribution (QKD) system is based on the assumption of perfect positive-operator-valued measures, practical B92 systems only utilize two projective measurements. Unfortunately, such implementation may degrade the security of the B92 QKD system due to Eve's potential attack exploiting the imperfection of system. In this paper, we propose an advanced attack strategy with an unambiguous state discrimination (USD) measurement which makes practical B92 QKD systems insecure even under a lossless channel. In addition, we propose an effective countermeasure against the advanced USD attack model by monitoring double-click events. We further address a fundamental approach to make the B92 QKD system tolerable to attack strategies with USD measurements using a multi-qubit scheme.

  3. Social Sentiment Sensor in Twitter for Predicting Cyber-Attacks Using ℓ₁ Regularization.

    Science.gov (United States)

    Hernandez-Suarez, Aldo; Sanchez-Perez, Gabriel; Toscano-Medina, Karina; Martinez-Hernandez, Victor; Perez-Meana, Hector; Olivares-Mercado, Jesus; Sanchez, Victor

    2018-04-29

    In recent years, online social media information has been the subject of study in several data science fields due to its impact on users as a communication and expression channel. Data gathered from online platforms such as Twitter has the potential to facilitate research over social phenomena based on sentiment analysis, which usually employs Natural Language Processing and Machine Learning techniques to interpret sentimental tendencies related to users’ opinions and make predictions about real events. Cyber-attacks are not isolated from opinion subjectivity on online social networks. Various security attacks are performed by hacker activists motivated by reactions from polemic social events. In this paper, a methodology for tracking social data that can trigger cyber-attacks is developed. Our main contribution lies in the monthly prediction of tweets with content related to security attacks and the incidents detected based on ℓ 1 regularization.

  4. Social Sentiment Sensor in Twitter for Predicting Cyber-Attacks Using ℓ1 Regularization

    Directory of Open Access Journals (Sweden)

    Aldo Hernandez-Suarez

    2018-04-01

    Full Text Available In recent years, online social media information has been the subject of study in several data science fields due to its impact on users as a communication and expression channel. Data gathered from online platforms such as Twitter has the potential to facilitate research over social phenomena based on sentiment analysis, which usually employs Natural Language Processing and Machine Learning techniques to interpret sentimental tendencies related to users’ opinions and make predictions about real events. Cyber-attacks are not isolated from opinion subjectivity on online social networks. Various security attacks are performed by hacker activists motivated by reactions from polemic social events. In this paper, a methodology for tracking social data that can trigger cyber-attacks is developed. Our main contribution lies in the monthly prediction of tweets with content related to security attacks and the incidents detected based on ℓ 1 regularization.

  5. Vulnerability assessment of IPv6 websites to SQL injection and other application level attacks.

    Science.gov (United States)

    Cho, Ying-Chiang; Pan, Jen-Yi

    2013-01-01

    Given the proliferation of internet connected devices, IPv6 has been proposed to replace IPv4. Aside from providing a larger address space which can be assigned to internet enabled devices, it has been suggested that the IPv6 protocol offers increased security due to the fact that with the large number of addresses available, standard IP scanning attacks will no longer become feasible. However, given the interest in attacking organizations rather than individual devices, most initial points of entry onto an organization's network and their attendant devices are visible and reachable through web crawling techniques, and, therefore, attacks on the visible application layer may offer ways to compromise the overall network. In this evaluation, we provide a straightforward implementation of a web crawler in conjunction with a benign black box penetration testing system and analyze the ease at which SQL injection attacks can be carried out.

  6. A Study on the VHCF Fatigue Behaviors of Hydrogen Attacked Inconel 718 Alloy

    Energy Technology Data Exchange (ETDEWEB)

    Suh, Chang-Min [Kyungpook National Univ., DMI Senior Fellow, Daegu (Korea, Republic of); Nahm, Seung-Hoon [Korea Research Institute of Standards and Science, Daejeon (Korea, Republic of); Kim, Jun-Hyong; Pyun, Young-Sik [Sun Moon Univ., Chunan (Korea, Republic of)

    2016-07-15

    This study is to investigate the influence of hydrogen attack and UNSM on fatigue behaviors of the Inconel 718 alloy. The decrease of the fatigue life between the untreated and the hydrogen attacked material is 10-20%. The fatigue lives of hydrogen attacked specimen decreased without a fatigue limit, similar to those of nonferrous materials. Due to hydrogen embrittlement, about 80% of the surface cracks were smaller than the average grain size of 13 μm. Many small surface cracks caused by the embrittling effect of hydrogen attack were initiated at the grain boundaries and surface scratches. Cracks were irregularly distributed, grew, and then coalesced through tearing, leading to a reduction of fatigue life. Results revealed that the fatigue lives of UNSM-treated specimens were longer than those of the untreated specimens.

  7. Vulnerability Assessment of IPv6 Websites to SQL Injection and Other Application Level Attacks

    Directory of Open Access Journals (Sweden)

    Ying-Chiang Cho

    2013-01-01

    Full Text Available Given the proliferation of internet connected devices, IPv6 has been proposed to replace IPv4. Aside from providing a larger address space which can be assigned to internet enabled devices, it has been suggested that the IPv6 protocol offers increased security due to the fact that with the large number of addresses available, standard IP scanning attacks will no longer become feasible. However, given the interest in attacking organizations rather than individual devices, most initial points of entry onto an organization's network and their attendant devices are visible and reachable through web crawling techniques, and, therefore, attacks on the visible application layer may offer ways to compromise the overall network. In this evaluation, we provide a straightforward implementation of a web crawler in conjunction with a benign black box penetration testing system and analyze the ease at which SQL injection attacks can be carried out.

  8. Social Sentiment Sensor in Twitter for Predicting Cyber-Attacks Using ℓ1 Regularization

    Science.gov (United States)

    Sanchez-Perez, Gabriel; Toscano-Medina, Karina; Martinez-Hernandez, Victor; Olivares-Mercado, Jesus; Sanchez, Victor

    2018-01-01

    In recent years, online social media information has been the subject of study in several data science fields due to its impact on users as a communication and expression channel. Data gathered from online platforms such as Twitter has the potential to facilitate research over social phenomena based on sentiment analysis, which usually employs Natural Language Processing and Machine Learning techniques to interpret sentimental tendencies related to users’ opinions and make predictions about real events. Cyber-attacks are not isolated from opinion subjectivity on online social networks. Various security attacks are performed by hacker activists motivated by reactions from polemic social events. In this paper, a methodology for tracking social data that can trigger cyber-attacks is developed. Our main contribution lies in the monthly prediction of tweets with content related to security attacks and the incidents detected based on ℓ1 regularization. PMID:29710833

  9. Influence of Internal Sulfate Attack on Some Properties of High Strength Concrete

    Directory of Open Access Journals (Sweden)

    Nada Mahdi Fawzi

    2015-08-01

    Full Text Available One of the most important problems that faces the concrete industry in Iraq is the deterioration due to internal sulfate attack , since it reduces the compressive strength and increases the expansion of concrete. Consequently, the concrete structure may be damage .The effects of total and total effective sulfate contents on high strength concrete (HSC have been studied in the present study. The research studied the effect of sulfate content in cement , sand and gravel , as well as comparing the total sulfate content with the total effective SO3 content. Materials used were divided into two groups of SO3 in cement ,three groups of SO3 in sand ,and two groups of SO3 in gravel. The results show that considering the total effective sulfate content is better than the total content of sulfates since the effect of sulfate in each constituent of concrete, depends on it's granular size .The smaller the particle size of the material the more effective is the sulfate in it. Therefore, it is recommended to follow the Iraqi specification for total effective sulfate content, because it gives more flexibility to the use of sand and gravel with higher sulfate content. The results of compressive strength at 90-days show that the effect of total effective SO3 content of ( 2.647% , 2.992% , 3.424% that correspond to total sulfate of ( 3.778%, 3.294%, 4.528% decrease the compressive strength by (7.53%, 11.44%, 14.59% respectively.

  10. Characterization of Women Requesting Inter-consultations of Psychology Due to Violence

    Directory of Open Access Journals (Sweden)

    Alain Darcout Rodríguez

    2017-02-01

    Full Text Available Foundation: partner violence against women is a problem which cause chronic psychological damages in addition to physical damage, so as disability, sequelae and decreased quality of life. Objective: to characterize women requesting inter-consultation of psychology due to violence in the Riobamba province. Methods: a descriptive cross study about violence against women, during the period between April 2015 and May 2016. A total of 132 female were included. As a method of data collection it was used documentary revision. The variables analyzed were: distribution of women according to age, level of instruction, occupation, relationship with the attacker, place of origin, type of violence received, frequency and reason for the attack, measures taken and consequences of violence. The data were processed according to descriptive statistics. Results: women between 20 and 29 years old predominated (32 %, with secondary education level, housewives (43 %, living in the south of the city (41 %, violence was predominantly exercised by the spouse (49 %, of psychological type (54 % and reporting it was for the first time (48 %, associating it with alcohol consumption of the attacker (17 % and women’s insubordination (16 %, (41 % left their houses, and (83 % present as negative sequale negative emotions and problems with their children (82 %. Conclusion: women victims of violence were predominantly young, with a secondary level of instruction, living in the south zone of the Riobamba city. Violence was exercised mainly by the spouse and psychological violence predominated. They reacted living their houses and presented as main sequelae negative emotions and problems with their children.

  11. 12 CFR 263.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 3 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is brought in... shall be excused based on the pendency before any court of any interlocutory appeal or collateral attack. ...

  12. 12 CFR 509.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding....17 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is... shall be excused based on the pendency before any court of any interlocutory appeal or collateral attack. ...

  13. A Game Theoretic Approach to Cyber Attack Prediction

    Energy Technology Data Exchange (ETDEWEB)

    Peng Liu

    2005-11-28

    The area investigated by this project is cyber attack prediction. With a focus on correlation-based prediction, current attack prediction methodologies overlook the strategic nature of cyber attack-defense scenarios. As a result, current cyber attack prediction methodologies are very limited in predicting strategic behaviors of attackers in enforcing nontrivial cyber attacks such as DDoS attacks, and may result in low accuracy in correlation-based predictions. This project develops a game theoretic framework for cyber attack prediction, where an automatic game-theory-based attack prediction method is proposed. Being able to quantitatively predict the likelihood of (sequences of) attack actions, our attack prediction methodology can predict fine-grained strategic behaviors of attackers and may greatly improve the accuracy of correlation-based prediction. To our best knowledge, this project develops the first comprehensive framework for incentive-based modeling and inference of attack intent, objectives, and strategies; and this project develops the first method that can predict fine-grained strategic behaviors of attackers. The significance of this research and the benefit to the public can be demonstrated to certain extent by (a) the severe threat of cyber attacks to the critical infrastructures of the nation, including many infrastructures overseen by the Department of Energy, (b) the importance of cyber security to critical infrastructure protection, and (c) the importance of cyber attack prediction to achieving cyber security.

  14. Trace Attack against Biometric Mobile Applications

    Directory of Open Access Journals (Sweden)

    Sanaa Ghouzali

    2016-01-01

    Full Text Available With the exponential increase in the dependence on mobile devices in everyday life, there is a growing concern related to privacy and security issues in the Gulf countries; therefore, it is imperative that security threats should be analyzed in detail. Mobile devices store enormous amounts of personal and financial information, unfortunately without any security. In order to secure mobile devices against different threats, biometrics has been applied and shown to be effective. However, biometric mobile applications are also vulnerable to several types of attacks that can decrease their security. Biometric information itself is considered sensitive data; for example, fingerprints can leave traces in touched objects and facial images can be captured everywhere or accessed by the attacker if the facial image is stored in the mobile device (lost or stolen. Hence, an attacker can easily forge the identity of a legitimate user and access data on a device. In this paper, the effects of a trace attack on the sensitivity of biometric mobile applications are investigated in terms of security and user privacy. Experimental results carried out on facial and fingerprint mobile authentication applications using different databases have shown that these mobile applications are vulnerable to the proposed attack, which poses a serious threat to the overall system security and user privacy.

  15. Subclinical endophthalmitis following a rooster attack.

    Science.gov (United States)

    Lekse Kovach, Jaclyn; Maguluri, Srilakshmi; Recchia, Franco M

    2006-12-01

    Ocular injury resulting from rooster attacks is rarely reported in the literature. Sadly, the target of these attacks is most often children younger than 3 years old, whose naiveté of the aggressive, territorial behavior of birds can place them at risk. Acute sequelae of these attacks can result in a lifetime of visual impairment. The possibility of a subacute or occult infection is an unusual occurrence that must always be considered. In an effort to prevent future attacks and ocular casualties, we present a case of a 12-month-old boy who suffered an open globe following a rooster attack. The open globe was emergently repaired. One week later, a white cataract was noticed on examination in the absence of systemic or ocular signs of inflammation. Traumatic endophthalmitis and lenticular abscess were suspected during examination under anesthesia. Vitrectomy, lensectomy, and injection of intravitreal antibiotics were performed. Culture of lenticular and vitreous aspirates grew alpha-streptococcus. Alpha-streptococcal endophthalmitis can result from ocular injuries caused by rooster pecking. The infection may present insidiously and without typical ocular or systemic symptoms or signs. Management is challenging and may require surgery.

  16. Modeling attacking of high skills volleyball players

    Directory of Open Access Journals (Sweden)

    Vladimir Gamaliy

    2014-12-01

    Full Text Available Purpose: to determine the model indicators of technical and tactical actions in the attack highly skilled volleyball players. Material and Methods: the study used statistical data of major international competitions: Olympic Games – 2012 World Championships – 2010, World League – 2010–2014 European Championship – 2010–2014. A total of 130 analyzed games. Methods were used: analysis and generalization of scientific and methodological literature, analysis of competitive activity highly skilled volleyball players, teacher observation, modeling technical and tactical actions in attacking highly skilled volleyball players. Results: it was found that the largest volume application of technical and tactical actions in the attack belongs to the group tactics «supple movement», whose indicator is 21,3%. The smallest amount of application belongs to the group tactics «flight level» model whose indicators is 5,4%, the efficiency of 3,4%, respectively. It is found that the power service in the jump from model parameters used in 51,6% of cases, the planning targets – 21,7% and 4,4% planning to reduce. Attacks performed with the back line, on model parameters used in the amount of 20,8% efficiency –13,7%. Conclusions: we prove that the performance of technical and tactical actions in the attack can be used as model in the control system of training and competitive process highly skilled volleyball players

  17. Maize terpene volatiles serve as precursors to an array of defensive phytoalexins following insect and pathogen attack

    Science.gov (United States)

    Phytoalexins are inducible biochemicals that locally protect plant tissues against biotic attack. Due to their agronomic significance, maize and rice have been extensively investigated for their terpenoid-based defenses which include insect-inducible monoterpene and sesquiterpene vol...

  18. On the anatomy of social engineering attacks : A literature-based dissection of successful attacks

    NARCIS (Netherlands)

    Bullee, Jan-Willem; Montoya, L.; Pieters, Wolter; Junger, Marianne; Hartel, Pieter H.

    The aim of this studywas to explore the extent towhich persuasion principles are used in successful social engineering attacks. Seventy-four scenarioswere extracted from 4 books on social engineering (written by social engineers) and analysed. Each scenariowas split into attack steps, containing

  19. Attacks on public telephone networks: technologies and challenges

    Science.gov (United States)

    Kosloff, T.; Moore, Tyler; Keller, J.; Manes, Gavin W.; Shenoi, Sujeet

    2003-09-01

    Signaling System 7 (SS7) is vital to signaling and control in America's public telephone networks. This paper describes a class of attacks on SS7 networks involving the insertion of malicious signaling messages via compromised SS7 network components. Three attacks are discussed in detail: IAM flood attacks, redirection attacks and point code spoofing attacks. Depending on their scale of execution, these attacks can produce effects ranging from network congestion to service disruption. Methods for detecting these denial-of-service attacks and mitigating their effects are also presented.

  20. Cross-site scripting attacks procedure and Prevention Strategies

    Directory of Open Access Journals (Sweden)

    Wang Xijun

    2016-01-01

    Full Text Available Cross-site scripting attacks and defense has been the site of attack and defense is an important issue, this paper, the definition of cross-site scripting attacks, according to the current understanding of the chaos on the cross-site scripting, analyzes the causes and harm cross-site scripting attacks formation of attacks XXS complete process XSS attacks made a comprehensive analysis, and then for the web program includes Mobility there are cross-site scripting filter laxity given from ordinary users browse the web and web application developers two the defense cross-site scripting attacks effective strategy.

  1. Critical supply network protection against intentional attacks: A game-theoretical model

    International Nuclear Information System (INIS)

    Bricha, Naji; Nourelfath, Mustapha

    2013-01-01

    A crucial issue in today's critical supply chains is how to protect facilities against intentional attacks, since it has become unacceptable to ignore the high impact of low probability disruptions caused by these attacks. This article develops a game-theoretical model to deal with the protection of facilities, in the context of the uncapacitated fixed-charge location problem. Given a set of investment alternatives for protecting the facilities against identified threats, the objective is to select the optimal defence strategy. The attacker is considered as a player who tries to maximise the expected damage while weighing against the attacks expenditures. The conflict on facilities vulnerability is modelled using the concept of contest. The vulnerability of a facility is defined by its destruction probability. Contest success functions determine the vulnerability of each facility dependent on the relative investments of the defender and the attacker on each facility, and on the characteristics of the contest. A method is developed to evaluate the utilities of the players (i.e., the defender and the attacker). This method evaluates many expected costs, including the cost needed to restore disabled facilities, the backorder cost, and the cost incurred because of the increase in transportation costs after attacks. In fact, when one or several facilities are unavailable, transportation costs will increase since reassigned customers may receive shipments from facilities which are farther away. The model considers a non-cooperative two-period game between the players, and an algorithm is presented to determine the equilibrium solution and the optimal defence strategy. An illustrative example is presented. The approach is compared to other suggested strategies, and some managerial insights are provided in the context of facility location

  2. Vulnerability analysis and critical areas identification of the power systems under terrorist attacks

    Science.gov (United States)

    Wang, Shuliang; Zhang, Jianhua; Zhao, Mingwei; Min, Xu

    2017-05-01

    This paper takes central China power grid (CCPG) as an example, and analyzes the vulnerability of the power systems under terrorist attacks. To simulate the intelligence of terrorist attacks, a method of critical attack area identification according to community structures is introduced. Meanwhile, three types of vulnerability models and the corresponding vulnerability metrics are given for comparative analysis. On this basis, influence of terrorist attacks on different critical areas is studied. Identifying the vulnerability of different critical areas will be conducted. At the same time, vulnerabilities of critical areas under different tolerance parameters and different vulnerability models are acquired and compared. Results show that only a few number of vertex disruptions may cause some critical areas collapse completely, they can generate great performance losses the whole systems. Further more, the variation of vulnerability values under different scenarios is very large. Critical areas which can cause greater damage under terrorist attacks should be given priority of protection to reduce vulnerability. The proposed method can be applied to analyze the vulnerability of other infrastructure systems, they can help decision makers search mitigation action and optimum protection strategy.

  3. Modeling Resources Allocation in Attacker-Defender Games with "Warm Up" CSF.

    Science.gov (United States)

    Guan, Peiqiu; Zhuang, Jun

    2016-04-01

    Like many other engineering investments, the attacker's and defender's investments may have limited impact without initial capital to "warm up" the systems. This article studies such "warm up" effects on both the attack and defense equilibrium strategies in a sequential-move game model by developing a class of novel and more realistic contest success functions. We first solve a single-target attacker-defender game analytically and provide numerical solutions to a multiple-target case. We compare the results of the models with and without consideration of the investment "warm up" effects, and find that the defender would suffer higher expected damage, and either underestimate the attacker effort or waste defense investment if the defender falsely believes that no investment "warm up" effects exist. We illustrate the model results with real data, and compare the results of the models with and without consideration of the correlation between the "warm up" threshold and the investment effectiveness. Interestingly, we find that the defender is suggested to give up defending all the targets when the attack or the defense "warm up" thresholds are sufficiently high. This article provides new insights and suggestions on policy implications for homeland security resource allocation. © 2015 Society for Risk Analysis.

  4. Overview of DOS attacks on wireless sensor networks and experimental results for simulation of interference attacks

    Directory of Open Access Journals (Sweden)

    Željko Gavrić

    2018-01-01

    Full Text Available Wireless sensor networks are now used in various fields. The information transmitted in the wireless sensor networks is very sensitive, so the security issue is very important. DOS (denial of service attacks are a fundamental threat to the functioning of wireless sensor networks. This paper describes some of the most common DOS attacks and potential methods of protection against them. The case study shows one of the most frequent attacks on wireless sensor networks – the interference attack. In the introduction of this paper authors assume that the attack interference can cause significant obstruction of wireless sensor networks. This assumption has been proved in the case study through simulation scenario and simulation results.

  5. Counteracting Power Analysis Attacks by Masking

    Science.gov (United States)

    Oswald, Elisabeth; Mangard, Stefan

    The publication of power analysis attacks [12] has triggered a lot of research activities. On the one hand these activities have been dedicated toward the development of secure and efficient countermeasures. On the other hand also new and improved attacks have been developed. In fact, there has been a continuous arms race between designers of countermeasures and attackers. This chapter provides a brief overview of the state-of-the art in the arms race in the context of a countermeasure called masking. Masking is a popular countermeasure that has been extensively discussed in the scientific community. Numerous articles have been published that explain different types of masking and that analyze weaknesses of this countermeasure.

  6. The WOMBAT Attack Attribution Method: Some Results

    Science.gov (United States)

    Dacier, Marc; Pham, Van-Hau; Thonnard, Olivier

    In this paper, we present a new attack attribution method that has been developed within the WOMBAT project. We illustrate the method with some real-world results obtained when applying it to almost two years of attack traces collected by low interaction honeypots. This analytical method aims at identifying large scale attack phenomena composed of IP sources that are linked to the same root cause. All malicious sources involved in a same phenomenon constitute what we call a Misbehaving Cloud (MC). The paper offers an overview of the various steps the method goes through to identify these clouds, providing pointers to external references for more detailed information. Four instances of misbehaving clouds are then described in some more depth to demonstrate the meaningfulness of the concept.

  7. Damage caused by different levels of artificial defoliation, simulating the leaf-cutting ants attack on young plantations of Pinus taeda and Eucalyptus grandis Danos causados por diferentes níveis de desfolha artificial para simulação do ataque de formigas cortadeiras em Pinus taeda e Eucalyptus grandis

    Directory of Open Access Journals (Sweden)

    Wilson Reis Filho

    2011-03-01

    Full Text Available

    The artificial defoliation allows to measure the defoliation intensity caused by insects. The objectives of this work were to evaluate the damages caused by leaf-cutting ants in young plantations of Pinus taeda and Eucalyptus grandis using different levels of artificial defoliation. A classification was established according to defoliation levels that were caused by leaf-cutting ants in P. taeda: level 1: 50%, level 2: 75%, level 3: 100% and level 4: 100%, including the cut of the apical meristem. And in E. grandis: level 1: 50% of defoliation; level 2: 75% and level 3: 100%. After one year, the P. taeda seedlings had losses in diameter and height for defoliation level above 75%. Seedlings severely defoliated (level 4, had losses of 37.0% in height and 45.4% in diameter. The E. grandis seedlings had losses since three months old and the reductions were proportional to the defoliation intensity. After one year, the losses of 13.3% in height and 20% in diameter were verified in plants with 100% of defoliation. P. taeda plants are more damaged by leaf-cutting attack.

    doi: 10.4336/2011.pfb.31.65.37

    A desfolha artificial permite mensurar a intensidade do dano devido à desfolha causada por insetos. No presente estudo, buscou-se avaliar os danos causados por formigas cortadeiras em plantios de Pinus taeda e Eucalyptus grandis com 30 dias de idade. Foi estabelecida uma classificação baseada em níveis de desfolha semelhantes aos causados por formigas cortadeiras. Para P. taeda, os níveis foram: N1: 50%, N2: 75%, N3: 100% e N4: 100% de desfolha, incluindo o corte do meristema apical. Para E. grandis, os níveis foram N1: 50%, N2: 75% e N3: 100% de desfolha, incluindo o corte do meristema apical. Após um ano, as mudas de P. taeda tiveram perdas em altura e diâmetro nos níveis de N2 a N4. Mudas de P. taeda desfolhadas no nível N4 apresentaram perdas de

  8. Practising of radiological emergency caused by a terrorist attack

    International Nuclear Information System (INIS)

    Racana, R.; Terrado, C.

    2006-01-01

    After the events of September 11, 2001 terrorist working has become an important factor in the forecasts to adopt in the face of the possibility of confronting different radiological emergencies. The not wanted events of exposure to ionizing radiations can take place by flaws of systems or accidents, or also by criminal voluntary actions. These malevolent actions can include attacks or sabotages in nuclear plants, detonation of manufactured nuclear devices or acquired under ground, robbery of radioactive sources to manufacture the calls dirty bombs or to cause damage, panic or threats. In the scenarios in that the radiological emergency is voluntarily provoked the moment and place of the attack are chosen by the aggressors, therefore the ionizing radiations will be in not prepared atmospheres neither equipped to the effect. This increases the confusion, the panic and the damage not only caused by the radiation effects but also by the uncertainty and consequent reactions. To diminish the effects of this type of threats it is necessary to make forecasts and to train the personnel that it can be direct or indirectly involved. During 2005, an exercise in which it was outlined the robbery by part of a group command of a source of Co 60 of 5000 Ci that it was transported to make a decanting in a medical center of The Pampa county, Argentina. It was about a cabinet exercise, planned and executed jointly among the Nuclear Regulatory Authority and the Secretary of Interior Safety, in which participated the professionals of the nuclear area that by law are the responsible ones of coordinating the actions in the event of an emergency of this type, and the safety forces that depend of the Secretary of Interior Safety, Federal and Provincial Policemen, Naval Prefecture and National Gendarmerie. The exercise last one day during which 9 main situations were approached that were unchained after having produced the attack and initial robbery. For each situation it was checked the

  9. How to detect the location and time of a covert chemical attack a Bayesian approach

    OpenAIRE

    See, Mei Eng Elaine.

    2009-01-01

    Approved for public release, distribution unlimited In this thesis, we develop a Bayesian updating model that estimates the location and time of a chemical attack using inputs from chemical sensors and Atmospheric Threat and Dispersion (ATD) models. In bridging the critical gap between raw sensor data and threat evaluation and prediction, the model will help authorities perform better hazard prediction and damage control. The model is evaluated with respect to settings representing real-wo...

  10. Improved Deep Belief Networks (IDBN Dynamic Model-Based Detection and Mitigation for Targeted Attacks on Heavy-Duty Robots

    Directory of Open Access Journals (Sweden)

    Lianpeng Li

    2018-04-01

    Full Text Available In recent years, the robots, especially heavy-duty robots, have become the hardest-hit areas for targeted attacks. These attacks come from both the cyber-domain and the physical-domain. In order to improve the security of heavy-duty robots, this paper proposes a detection and mitigation mechanism which based on improved deep belief networks (IDBN and dynamic model. The detection mechanism consists of two parts: (1 IDBN security checks, which can detect targeted attacks from the cyber-domain; (2 Dynamic model and security detection, used to detect the targeted attacks which can possibly lead to a physical-domain damage. The mitigation mechanism was established on the base of the detection mechanism and could mitigate transient and discontinuous attacks. Moreover, a test platform was established to carry out the performance evaluation test for the proposed mechanism. The results show that, the detection accuracy for the attack of the cyber-domain of IDBN reaches 96.2%, and the detection accuracy for the attack of physical-domain control commands reaches 94%. The performance evaluation test has verified the reliability and high efficiency of the proposed detection and mitigation mechanism for heavy-duty robots.

  11. A novel proposed network security management approach for cyber attacks

    International Nuclear Information System (INIS)

    Ahmed, Z.; Nazir, B.; Zafar, M.F.; Anwar, M.M.; Azam, K.; Asar, A.U.

    2007-01-01

    Network security is a discipline that focuses on securing networks from unauthorized access. Given the Escalating threats of malicious cyber attacks, modern enterprises employ multiple lines of defense. A comprehensive defense strategy against such attacks should include (I) an attack detection component that deter- mines the fact that a program is compromised, (2) an attack identification and prevention component that identifies attack packets so that one can block such packets in the future and prevents the attack from further propagation. Over the last decade, a significant amount of research has been vested in the systems that can detect cyber attacks either statically at compile time or dynamically at run time, However, not much effort is spent on automated attack packet identification or attack prevention. In this paper we present a unified solution to the problems mentioned above. We implemented this solution after the forward engineering of Open Source Security Information Management (OSSIM) system called Preventive Information Security management (PrISM) system that correlates input from different sensors so that the resulting product can automatically detect any cyber attack against it and prevents by identifying the actual attack packet(s). The PrISM was always able to detect the attacks, identify the attack packets and most often prevent by blocking the attacker's IP address to continue normal execution. There is no additional run-time performance overhead for attack prevention. (author)

  12. Playing Attack and Defense with Trusted Storage

    DEFF Research Database (Denmark)

    Gonzalez, Javier; Bonnet, Philippe; Bouganim, Luc

    2014-01-01

    It is often convenient to assume in a data management platform that one or several computing devices are trusted, specially when the goal is to provide privacy guarantees over personal data. But what does it take for a computing device to be trusted? More specifically, how can a personal device...... provide trusted storage? This is the question we tackle in this demonstration. We describe how secure devices, equipped with a trusted execution environment, differ from general purpose devices. We illustrate with our demonstration scenario, that it is much more difficult to attack a storage service...... running on a secure device, than to attack the same service running on a general purpose device....

  13. Rotational Rebound Attacks on Reduced Skein

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Nikolić, Ivica; Rechberger, Christian

    2014-01-01

    ciphers, including the new standard SHA-3 (Keccak). The rebound attack is a start-from-the-middle approach for finding differential paths and conforming pairs in byte-oriented designs like Substitution-Permutation networks and AES. We apply our new compositional attack to the reduced version of the hash...... number of rounds. We also use neutral bits and message modification methods from the practice of collision search in MD5 and SHA-1 hash functions. These methods push the rotational property through more rounds than previous analysis suggested, and eventually establish a distinguishing property...

  14. A Distinguish Attack on COSvd Cipher

    OpenAIRE

    Mohammad Ali Orumiehchi ha; R. Mirghadri

    2007-01-01

    The COSvd Ciphers has been proposed by Filiol and others (2004). It is a strengthened version of COS stream cipher family denoted COSvd that has been adopted for at least one commercial standard. We propose a distinguish attack on this version, and prove that, it is distinguishable from a random stream. In the COSvd Cipher used one S-Box (10×8) on the final part of cipher. We focus on S-Box and use weakness this S-Box for distinguish attack. In addition, found a leak on HNLL that the sub s-bo...

  15. Attacks and infections in percolation processes

    International Nuclear Information System (INIS)

    Janssen, Hans-Karl; Stenull, Olaf

    2017-01-01

    We discuss attacks and infections at propagating fronts of percolation processes based on the extended general epidemic process. The scaling behavior of the number of the attacked and infected sites in the long time limit at the ordinary and tricritical percolation transitions is governed by specific composite operators of the field-theoretic representation of this process. We calculate corresponding critical exponents for tricritical percolation in mean-field theory and for ordinary percolation to 1-loop order. Our results agree well with the available numerical data. (paper)

  16. Attack strategies on quantum cryptographic protocols

    International Nuclear Information System (INIS)

    Schauer, S.; Suda, M.

    2006-01-01

    Full text: Quantum key distribution (QKD) and quantum authentication (QA) have been a topic of extensive research in the last 20 years. In course of that many attacks on QKD and QA protocols have been studied. Among these, Zhang, Lee and Guo presented an attack on a QKD protocol using entanglement swapping. Based on that strategy we take a look at other protocols to inspect how much information an adversary may get if he shares entanglement with either one or both parties. We will present some protocols where an adversary can even get full information about the key using entanglement. (author)

  17. An Attack Model Development Process for the Cyber Security of Safety Related Nuclear Digital I and C Systems

    Energy Technology Data Exchange (ETDEWEB)

    Khand, Parvaiz Ahmed; Seong, Poong Hyun [Korea Advanced Institute of Science and Technology, Daejeon (Korea, Republic of)

    2007-10-15

    Nuclear power plants (NPPs), the redundant safety related systems are designed to take automatic action to prevent and mitigate accident conditions if the operators and the non-safety systems fail to maintain the plant within normal operating conditions. Presently, there is trend of connecting computer networks of commercial NPPs to corporate local area networks (LANs) to give engineers access to plant data for economic benefits. An increase in plant efficiency of a couple percentage points can translate to millions upon millions of dollars per year. The nuclear industry is also moving in the direction of installing digital controls that would allow for remote operation of plant functions, perhaps within a few years. However, this connectivity may also cause new security problems such as: in 2003, a computer worm named as slammer penetrated a private computer network at Ohio's Davis-Besse nuclear plant and disabled a safety monitoring system called a safety parameter display system (SPDS). Moreover, the present systems were developed with consideration of reliability and safety rather than security. In present scenario, there is a need to model and understand the cyber attacks towards these systems in a systematic way, and to demonstrate that the plant specific procedures and the imposed security controls adequately protect the systems from analyzed cyber security attacks. Attack trees provide a systematic, disciplined and effective way to model and understand cyber attacks towards any type of systems, make it possible to understand risks from deliberate, malicious intrusions from attackers, and make security decisions. Using attack trees the security of large systems can be modeled by considering a security breach as a system failure, and describing it with a set of events that can lead to system failure in a combinatorial way. The attacks towards the system are represented in a tree structure, with an attack that can significantly damage the system operation

  18. An Attack Model Development Process for the Cyber Security of Safety Related Nuclear Digital I and C Systems

    International Nuclear Information System (INIS)

    Khand, Parvaiz Ahmed; Seong, Poong Hyun

    2007-01-01

    Nuclear power plants (NPPs), the redundant safety related systems are designed to take automatic action to prevent and mitigate accident conditions if the operators and the non-safety systems fail to maintain the plant within normal operating conditions. Presently, there is trend of connecting computer networks of commercial NPPs to corporate local area networks (LANs) to give engineers access to plant data for economic benefits. An increase in plant efficiency of a couple percentage points can translate to millions upon millions of dollars per year. The nuclear industry is also moving in the direction of installing digital controls that would allow for remote operation of plant functions, perhaps within a few years. However, this connectivity may also cause new security problems such as: in 2003, a computer worm named as slammer penetrated a private computer network at Ohio's Davis-Besse nuclear plant and disabled a safety monitoring system called a safety parameter display system (SPDS). Moreover, the present systems were developed with consideration of reliability and safety rather than security. In present scenario, there is a need to model and understand the cyber attacks towards these systems in a systematic way, and to demonstrate that the plant specific procedures and the imposed security controls adequately protect the systems from analyzed cyber security attacks. Attack trees provide a systematic, disciplined and effective way to model and understand cyber attacks towards any type of systems, make it possible to understand risks from deliberate, malicious intrusions from attackers, and make security decisions. Using attack trees the security of large systems can be modeled by considering a security breach as a system failure, and describing it with a set of events that can lead to system failure in a combinatorial way. The attacks towards the system are represented in a tree structure, with an attack that can significantly damage the system operation as a

  19. Mapping the most significant computer hacking events to a temporal computer attack model

    CSIR Research Space (South Africa)

    Van Heerden, R

    2012-09-01

    Full Text Available of an impending net- work attack, and occur before any real damage has occurred. Popular reconnaissance actions include network mapping and scanning with tools such as Nmap and Nessus. Google and other search engines can also be used to identify potential weak.... ? Reconnaissance: Using well-known search engines to search for potential weak- nesses in the Windows operating system and Microsoft Outlook. ? Ramp-up: Writing the I-LOVE-YOU worm code. ? Damage: The spreading the I-LOVE-YOU worm via e-mail. It led...

  20. RESISTANCE TO THE ATTACK OF DRY-WOOD TERMITES (Cryptotermes brevis) OF SIX WOOD SPECIES

    OpenAIRE

    Fabrício Gomes Gonçalves; José Tarcísio da Silva Oliveira

    2006-01-01

    The dry wood termites are one of the largest causes of damages in wood used in Brazil. This work analyzed the attackof the Cryptotermes brevis in six commercials wood species in the north of the Rio de Janeiro and south of the Espírito Santo. The testobserved the number of holes, the percentage of died individuals and the damage of the pieces. When compared to the Pinus sp(reference), the species with less susceptibility to the attack were Cedrela fissilis, Cariocar brasiliense and Goupia gla...

  1. Irradiation damage

    Energy Technology Data Exchange (ETDEWEB)

    Howe, L.M

    2000-07-01

    There is considerable interest in irradiation effects in intermetallic compounds from both the applied and fundamental aspects. Initially, this interest was associated mainly with nuclear reactor programs but it now extends to the fields of ion-beam modification of metals, behaviour of amorphous materials, ion-beam processing of electronic materials, and ion-beam simulations of various kinds. The field of irradiation damage in intermetallic compounds is rapidly expanding, and no attempt will be made in this chapter to cover all of the various aspects. Instead, attention will be focused on some specific areas and, hopefully, through these, some insight will be given into the physical processes involved, the present state of our knowledge, and the challenge of obtaining more comprehensive understanding in the future. The specific areas that will be covered are: point defects in intermetallic compounds; irradiation-enhanced ordering and irradiation-induced disordering of ordered alloys; irradiation-induced amorphization.

  2. Irradiation damage

    International Nuclear Information System (INIS)

    Howe, L.M.

    2000-01-01

    There is considerable interest in irradiation effects in intermetallic compounds from both the applied and fundamental aspects. Initially, this interest was associated mainly with nuclear reactor programs but it now extends to the fields of ion-beam modification of metals, behaviour of amorphous materials, ion-beam processing of electronic materials, and ion-beam simulations of various kinds. The field of irradiation damage in intermetallic compounds is rapidly expanding, and no attempt will be made in this chapter to cover all of the various aspects. Instead, attention will be focused on some specific areas and, hopefully, through these, some insight will be given into the physical processes involved, the present state of our knowledge, and the challenge of obtaining more comprehensive understanding in the future. The specific areas that will be covered are: point defects in intermetallic compounds; irradiation-enhanced ordering and irradiation-induced disordering of ordered alloys; irradiation-induced amorphization

  3. Cross-Layer Damage Assessment for Cyber Situational Awareness

    Science.gov (United States)

    Liu, Peng; Jia, Xiaoqi; Zhang, Shengzhi; Xiong, Xi; Jhi, Yoon-Chan; Bai, Kun; Li, Jason

    Damage assessment plays a very important role in securing enterprise networks and systems. Gaining good awareness about the effects and impact of cyber attack actions would enable security officers to make the right cyber defense decisions and take the right cyber defense actions. A good number of damage assessment techniques have been proposed in the literature, but they typically focus on a single abstraction level (of the software system in concern). As a result, existing damage assessment techniques and tools are still very limited in satisfying the needs of comprehensive damage assessment which should not result in any “blind spots”.

  4. Do White Shark Bites on Surfers Reflect Their Attack Strategies on Pinnipeds?

    Directory of Open Access Journals (Sweden)

    Erich Ritter

    2016-01-01

    Full Text Available The theory of mistaken identity states that sharks, especially white sharks, Carcharodon carcharias, mistake surfers for pinnipeds when looking at them from below and thus bite them erroneously. Photographs of surfer wounds and board damage were interpreted with special emphasis on shark size, wound severity, and extent of damage to a board. These were compared with the concurrent literature on attack strategies of white sharks on pinnipeds and their outcomes. The results show that the majority of damage to surfers and their boards is at best superficial-to-moderate in nature and does not reflect the level of damage needed to immobilize or stun a pinniped. It is further shown that the size distribution of sharks biting surfers differs from that in pinnipeds. The results presented show that the theory of mistaken identity, where white sharks erroneously mistake surfers for pinnipeds, does not hold true and should be rejected.

  5. Develop a solution for protecting and securing enterprise networks from malicious attacks

    Science.gov (United States)

    Kamuru, Harshitha; Nijim, Mais

    2014-05-01

    In the world of computer and network security, there are myriad ways to launch an attack, which, from the perspective of a network, can usually be defined as "traffic that has huge malicious intent." Firewall acts as one of the measure in order to secure the device from incoming unauthorized data. There are infinite number of computer attacks that no firewall can prevent, such as those executed locally on the machine by a malicious user. From the network's perspective, there are numerous types of attack. All the attacks that degrade the effectiveness of data can be grouped into two types: brute force and precision. The Firewall that belongs to Juniper has the capability to protect against both types of attack. Denial of Service (DoS) attacks are one of the most well-known network security threats under brute force attacks, which is largely due to the high-profile way in which they can affect networks. Over the years, some of the largest, most respected Internet sites have been effectively taken offline by Denial of Service (DOS) attacks. A DoS attack typically has a singular focus, namely, to cause the services running on a particular host or network to become unavailable. Some DoS attacks exploit vulnerabilities in an operating system and cause it to crash, such as the infamous Win nuke attack. Others submerge a network or device with traffic so that there are no more resources to handle legitimate traffic. Precision attacks typically involve multiple phases and often involves a bit more thought than brute force attacks, all the way from reconnaissance to machine ownership. Before a precision attack is launched, information about the victim needs to be gathered. This information gathering typically takes the form of various types of scans to determine available hosts, networks, and ports. The hosts available on a network can be determined by ping sweeps. The available ports on a machine can be located by port scans. Screens cover a wide variety of attack traffic

  6. Anti-spoofing for display and print attacks on palmprint verification systems

    Science.gov (United States)

    Kanhangad, Vivek; Bhilare, Shruti; Garg, Pragalbh; Singh, Pranjalya; Chaudhari, Narendra

    2015-05-01

    A number of approaches for personal authentication using palmprint features have been proposed in the literature, majority of which focus on improving the matching performance. However, of late, preventing potential attacks on biometric systems has become a major concern as more and more biometric systems get deployed for wide range of applications. Among various types of attacks, sensor level attack, commonly known as spoof attack, has emerged as the most common attack due to simplicity in its execution. In this paper, we present an approach for detection of display and print based spoof attacks on palmprint verifcation systems. The approach is based on the analysis of acquired hand images for estimating surface re ectance. First and higher order statistical features computed from the distributions of pixel intensities and sub-band wavelet coeefficients form the feature set. A trained binary classifier utilizes the discriminating information to determine if the acquired image is of real hand or a fake one. Experiments are performed on a publicly available hand image dataset, containing 1300 images corresponding to 230 subjects. Experimental results show that the real hand biometrics samples can be substituted by the fake digital or print copies with an alarming spoof acceptance rate as high as 79.8%. Experimental results also show that the proposed spoof detection approach is very effective for discriminating between real and fake palmprint images. The proposed approach consistently achieves over 99% average 10-fold cross validation classification accuracy in our experiments.

  7. A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS

    Directory of Open Access Journals (Sweden)

    S.Seetha

    2010-06-01

    Full Text Available Distributed Denial of service is a major threat to the availability of internet services. Due to the distributed, large scale nature of the Internet makes DDoS (Distributed Denial-of-Service attacks stealthy and difficult to counter. Defense against Distributed Denial- of -Service attacks is one of the hardest security problems on the Internet. Recently these network attacks have been increasing. Therefore more effective countermeasures are required to counter the threat. This requirement has motivated us to propose a novel mechanism against DDoS attack. This paper presents the design details of a distributed defense mechanism against DDoS attack. In our approach, the egress routers of the intermediate network coordinate with each other to provide the information necessary to detect and respond to the attack. Thus, a detection system based on single site will have either high positive or high negative rates. Unlike the traditional IDSs (Intrusion Detection System this method has the potential to achieve high true positive ratio. This work has been done by using consensus algorithms for exchanging the information between the detection systems. So the overall detection time would be reduced for global decision making.

  8. Investigating the Possibility to Individualize Asthma Attack Therapy Based on Attack Severity and Patient Characteristics

    Directory of Open Access Journals (Sweden)

    Sárkány Zoltán

    2016-03-01

    Full Text Available Introduction: The objective of this study was to investigate with the help of a computerized simulation model whether the treatment of an acute asthma attack can be individualized based on the severity of the attack and the characteristics of the patient. Material and Method: A stochastic lung model was used to simulate the deposition of 1 nm - 10 μm particles during a mild and a moderate asthma attack. Breathing parameters were varied to maximize deposition, and simulation results were compared with those obtained in the case of a severe asthma attack. In order to investigate the effect of height on the deposition of inhaled particles, another series of simulations was carried out with identical breathing parameters, comparing patient heights of 155 cm, 175 cm and 195 cm. Results: The optimization process yielded an increase in the maximum deposition values of around 6-7% for each type of investigated asthma attack, and the difference between attacks of different degree of severity was around 5% for both the initial and the optimized values, a higher degree of obstruction increasing the amount of deposited particles. Conclusions: Our results suggest that the individualization of asthma attack treatment cannot be based on particles of different size, as the highest deposited fraction in all three types of attacks can be obtained using 0.01 μm particles. The use of a specific set of breathing parameters yields a difference between a mild and a moderate, as well as a moderate and a severe asthma attack of around 5%.

  9. Vulnerability to terrorist attacks in European electricity decarbonisation scenarios: Comparing renewable electricity imports to gas imports

    International Nuclear Information System (INIS)

    Lilliestam, Johan

    2014-01-01

    The decarbonised future European electricity system must remain secure: reliable electricity supply is a prerequisite for the functioning of modern society. Scenarios like Desertec, which partially rely on solar power imports from the Middle East and North Africa, may be attractive for decarbonisation, but raise concerns about terrorists interrupting supply by attacking the long, unprotected transmission lines in the Sahara. In this paper, I develop new methods and assess the European vulnerability to terrorist attacks in the Desertec scenario. I compare this to the vulnerability of today's system and a decarbonisation scenario in which Europe relies on gas imports for electricity generation. I show that the vulnerability of both gas and electricity imports is low, but electricity imports are more vulnerable than gas imports, due to their technical characteristics. Gas outages (and, potentially, resulting blackouts) are the very unlikely consequence even of very high-number attacks against the gas import system, whereas short blackouts are the potential consequence of a few attacks against the import electricity lines. As the impacts of all except extreme attacks are limited, terrorists cannot attack energy infrastructure and cause spectacular, fear-creating outages. Both gas and electricity import infrastructure are thus unattractive and unlikely terrorist targets. - Highlights: • A comparison of terrorism risks of importing solar power and gas for power generation. • Both scenarios show low vulnerability to terrorist attacks. • Within low vulnerabilities, gas imports are less vulnerable than electricity imports. • Causing spectacular, large and long outages is very difficult for attacker. • The attractiveness of gas and power import infrastructure as terrorist target is low

  10. Frost induced damages within porous materials - from concrete technology to fuel cells technique

    Science.gov (United States)

    Palecki, Susanne; Gorelkov, Stanislav; Wartmann, Jens; Heinzel, Angelika

    2017-12-01

    Porous media like concrete or layers of membrane electrode assemblies (MEA) within fuel cells are affected by a cyclic frost exposure due to different damage mechanisms which could lead to essential degradation of the material. In general, frost damages can only occur in case of a specific material moisture content. In fuel cells, residual water is generally available after shut down inside the membrane i.e. the gas diffusion layer (GDL). During subsequent freezing, this could cause various damage phenomena such as frost heaves and delamination effects of the membrane electrode assembly, which depends on the location of pore water and on the pore structure itself. Porous materials possess a pore structure that could range over several orders of magnitudes with different properties and freezing behaviour of the pore water. Latter can be divided into macroscopic, structured and pre-structured water, influenced by surface interactions. Therefore below 0 °C different water modifications can coexist in a wide temperature range, so that during frost exposure a high amount of unfrozen and moveable water inside the pore system is still available. This induces transport mechanisms and shrinkage effects. The physical basics are similar for porous media. While the freezing behaviour of concrete has been studied over decades of years, in order to enhance the durability, the know-how about the influence of a frost attack on fuel cell systems is not fully understood to date. On the basis of frost damage models for concrete structures, an approach to describe the impact of cyclic freezing and thawing on membrane electrode assemblies has been developed within this research work. Major aim is beyond a better understanding of the frost induced mechanisms, the standardization of a suitable test procedure for the assessment of different MEA materials under such kind of attack. Within this contribution first results will be introduced.

  11. Sequential and Parallel Attack Tree Modelling

    NARCIS (Netherlands)

    Arnold, Florian; Guck, Dennis; Kumar, Rajesh; Stoelinga, Mariëlle Ida Antoinette; Koornneef, Floor; van Gulijk, Coen

    The intricacy of socio-technical systems requires a careful planning and utilisation of security resources to ensure uninterrupted, secure and reliable services. Even though many studies have been conducted to understand and model the behaviour of a potential attacker, the detection of crucial

  12. Cooperative Electronic Attack using Unmanned Air Vehicles

    National Research Council Canada - National Science Library

    Mears, Mark J

    2006-01-01

    ... that are salient in the context of cooperative control. The utility of electronic attack is described in the context of integrated air defense systems that rely on RADAR sites that act as a network to gather information about potential airborne threats...

  13. Attack Classification Schema for Smart City WSNs

    Directory of Open Access Journals (Sweden)

    Victor Garcia-Font

    2017-04-01

    Full Text Available Urban areas around the world are populating their streets with wireless sensor networks (WSNs in order to feed incipient smart city IT systems with metropolitan data. In the future smart cities, WSN technology will have a massive presence in the streets, and the operation of municipal services will be based to a great extent on data gathered with this technology. However, from an information security point of view, WSNs can have failures and can be the target of many different types of attacks. Therefore, this raises concerns about the reliability of this technology in a smart city context. Traditionally, security measures in WSNs have been proposed to protect specific protocols in an environment with total control of a single network. This approach is not valid for smart cities, as multiple external providers deploy a plethora of WSNs with different security requirements. Hence, a new security perspective needs to be adopted to protect WSNs in smart cities. Considering security issues related to the deployment of WSNs as a main data source in smart cities, in this article, we propose an intrusion detection framework and an attack classification schema to assist smart city administrators to delimit the most plausible attacks and to point out the components and providers affected by incidents. We demonstrate the use of the classification schema providing a proof of concept based on a simulated selective forwarding attack affecting a parking and a sound WSN.

  14. Adversarial Feature Selection Against Evasion Attacks.

    Science.gov (United States)

    Zhang, Fei; Chan, Patrick P K; Biggio, Battista; Yeung, Daniel S; Roli, Fabio

    2016-03-01

    Pattern recognition and machine learning techniques have been increasingly adopted in adversarial settings such as spam, intrusion, and malware detection, although their security against well-crafted attacks that aim to evade detection by manipulating data at test time has not yet been thoroughly assessed. While previous work has been mainly focused on devising adversary-aware classification algorithms to counter evasion attempts, only few authors have considered the impact of using reduced feature sets on classifier security against the same attacks. An interesting, preliminary result is that classifier security to evasion may be even worsened by the application of feature selection. In this paper, we provide a more detailed investigation of this aspect, shedding some light on the security properties of feature selection against evasion attacks. Inspired by previous work on adversary-aware classifiers, we propose a novel adversary-aware feature selection model that can improve classifier security against evasion attacks, by incorporating specific assumptions on the adversary's data manipulation strategy. We focus on an efficient, wrapper-based implementation of our approach, and experimentally validate its soundness on different application examples, including spam and malware detection.

  15. Intrusion-Tolerant Replication under Attack

    Science.gov (United States)

    Kirsch, Jonathan

    2010-01-01

    Much of our critical infrastructure is controlled by large software systems whose participants are distributed across the Internet. As our dependence on these critical systems continues to grow, it becomes increasingly important that they meet strict availability and performance requirements, even in the face of malicious attacks, including those…

  16. Strengthening Crypto-1 Cipher Against Algebraic Attacks

    Directory of Open Access Journals (Sweden)

    Farah Afianti

    2015-08-01

    Full Text Available In the last few years, several studies addressed the problem of data security in Mifare Classic. One of its weaknesses is the low random number quality. This causes SAT solver attacks to have lower complexity. In order to strengthen Crypto-1 against SAT solver attacks, a modification of the feedback function with better cryptographic properties is proposed. It applies a primitive polynomial companion matrix. SAT solvers cannot directly attack the feedback shift register that uses the modified Boolean feedback function, the register has to be split into smaller groups. Experimental testing showed that the amount of memory and CPU time needed were highest when attacking the modified Crypto-1 using the modified feedback function and the original filter function. In addition, another modified Crypto-1, using the modified feedback function and a modified filter function, had the lowest percentage of revealed variables. It can be concluded that the security strength and performance of the modified Crypto-1 using the modified feedback function and the modified filter function are better than those of the original Crypto-1.

  17. Wrap-Attack Pack: Product Packaging Exercise

    Science.gov (United States)

    Lee, Seung Hwan; Hoffman, K. Douglas

    2016-01-01

    Although many marketing courses discuss traditional concepts pertaining to product strategy, concepts specifically relating to packaging are often glossed over. This exercise, "Wrap-Attack Pack," teaches students about the utilitarian and hedonic design elements of packaging. More specifically, the primary objective is to creatively…

  18. Social Engineering Attack Detection Model: SEADMv2

    CSIR Research Space (South Africa)

    Mouton, F

    2015-10-01

    Full Text Available link in the security chain. A social engineering attack targets this weakness by using various manipulation techniques to elicit individuals to perform sensitive requests. The field of social engineering is still in its infancy as far as formal...

  19. Attack Classification Schema for Smart City WSNs.

    Science.gov (United States)

    Garcia-Font, Victor; Garrigues, Carles; Rifà-Pous, Helena

    2017-04-05

    Urban areas around the world are populating their streets with wireless sensor networks (WSNs) in order to feed incipient smart city IT systems with metropolitan data. In the future smart cities, WSN technology will have a massive presence in the streets, and the operation of municipal services will be based to a great extent on data gathered with this technology. However, from an information security point of view, WSNs can have failures and can be the target of many different types of attacks. Therefore, this raises concerns about the reliability of this technology in a smart city context. Traditionally, security measures in WSNs have been proposed to protect specific protocols in an environment with total control of a single network. This approach is not valid for smart cities, as multiple external providers deploy a plethora of WSNs with different security requirements. Hence, a new security perspective needs to be adopted to protect WSNs in smart cities. Considering security issues related to the deployment of WSNs as a main data source in smart cities, in this article, we propose an intrusion detection framework and an attack classification schema to assist smart city administrators to delimit the most plausible attacks and to point out the components and providers affected by incidents. We demonstrate the use of the classification schema providing a proof of concept based on a simulated selective forwarding attack affecting a parking and a sound WSN.

  20. Armed Deterrence: Countering Soft Target Attacks

    Science.gov (United States)

    2016-02-06

    offer no security. With over 17,430 such geographically separated military sites across the United States, these fatal shootings by a Kuwaiti- born ...increasing trend and the carnage 4 that IS sympathizers can unleash. This coordinated attack on a concert hall, a soccer stadium, and restaurant