WorldWideScience

Sample records for attack registry rationale

  1. [Romanian national registry for interstitial lung diseases and sarcoidosis (REGIS): rationale and methods].

    Science.gov (United States)

    Strâmbu, Irina; Ioniţă, Diana; Belaconi, Ionela; Stoia, Irina; Tudorache, Voicu

    2012-01-01

    Interstitial lung diseases (ILD) are a group of extremely heterogeneous conditions (over 200), with low prevalence, but in most cases with severe impact on the quality of life and survival of the patients. The ILD group comprises: idiopathic pulmonary fibrosis, sarcoidosis, hypersensitivity pneumonitis, colagen diseases, vasculitis, eosinophilic pneumonia etc. The prevalence of these diseases is unknown in Romania; the accurate diagnosis needs access to special investigations and expertise with this group of diseases. The authors propose the initiation of a National Registry for Interstitial Lung Diseases and Sarcoidosis (REGIS), based on the lessons learned from other national ILD) registries, which should allow building-up an extended clinical expertise in ILD, evaluating epidemiological data, creating an educational platform for young physicians, better understanding of the outcome and prognosis of these diseases, shaping Romanian Guidelines for the diagnosis and management of ILD, using the data base for clinical research. The registry is started as a pilot in two Romanian centres: "Marius Nasta" Institute of Pneumology in Bucharest and Pneumology Clinic, "Victor Babey" Infectious Diseases Hospital Timişoara. After refining the inclusion criteria for the data base, editing guidelines for ILD diagnosis and launching the registry website, other Romanian centres with interest in ILD will also be able to feed information. PMID:22545484

  2. Transaortic transcatheter aortic valve implantation - rationale and design of the multicenter, multinational prospective ROUTE registry

    OpenAIRE

    Bramlage, Peter; Romano, Mauro; Bonaros, Nikolaos; Cocchieri, Ricardo; Jagielak, Dariusz; Frank, Derk; Bapat, Vinayak

    2014-01-01

    Background Transaortic transcatheter aortic valve implantation (TAo-TAVI) is a recently developed approach that provides an alternative delivery route for valve replacement in patients with vascular abnormalities or existing comorbidities. While initial studies have shown the principal efficacy and safety, the real world effectiveness and safety of this approach remains to be fully assessed. Methods/Design In this regard, the Registry Of the Utilization of the TAo-TAVI approach using the Edwa...

  3. The Vermont oxford neonatal encephalopathy registry: rationale, methods, and initial results

    Directory of Open Access Journals (Sweden)

    Pfister Robert H

    2012-06-01

    Full Text Available Abstract Background In 2006, the Vermont Oxford Network (VON established the Neonatal Encephalopathy Registry (NER to characterize infants born with neonatal encephalopathy, describe evaluations and medical treatments, monitor hypothermic therapy (HT dissemination, define clinical research questions, and identify opportunities for improved care. Methods Eligible infants were ≥ 36 weeks with seizures, altered consciousness (stupor, coma during the first 72 hours of life, a 5 minute Apgar score of ≤ 3, or receiving HT. Infants with central nervous system birth defects were excluded. Results From 2006–2010, 95 centers registered 4232 infants. Of those, 59% suffered a seizure, 50% had a 5 minute Apgar score of ≤ 3, 38% received HT, and 18% had stupor/coma documented on neurologic exam. Some infants experienced more than one eligibility criterion. Only 53% had a cord gas obtained and only 63% had a blood gas obtained within 24 hours of birth, important components for determining HT eligibility. Sixty-four percent received ventilator support, 65% received anticonvulsants, 66% had a head MRI, 23% had a cranial CT, 67% had a full channel encephalogram (EEG and 33% amplitude integrated EEG. Of all infants, 87% survived. Conclusions The VON NER describes the heterogeneous population of infants with NE, the subset that received HT, their patterns of care, and outcomes. The optimal routine care of infants with neonatal encephalopathy is unknown. The registry method is well suited to identify opportunities for improvement in the care of infants affected by NE and study interventions such as HT as they are implemented in clinical practice.

  4. Dutch Chronic Pancreatitis Registry (CARE) : Design and rationale of a nationwide prospective evaluation and follow-up

    NARCIS (Netherlands)

    Ali, U. Ahmed; Issa, Y.; van Goor, H.; van Eijck, C. H.; Nieuwenhuijs, V. B.; Keulemans, Y.; Fockens, P.; Busch, O. R.; Drenth, J. P.; Dejong, C. H.; van Dullemen, H. M.; van Hooft, J. E.; Siersema, P. D.; Spanier, B. W. M.; Poley, J. W.; Poen, A. C.; Timmer, R.; Seerden, T.; Tan, A. C.; Thijs, W. J.; Witteman, B. J. M.; Romkens, T. E. H.; Roeterdink, A. J.; Gooszen, H. G.; Van Santvoort, H. C.; Bruno, M. J.; Boermeester, M. A.

    2015-01-01

    Background: Chronic pancreatitis is a complex disease with many unanswered questions regarding the natural history and therapy. Prospective longitudinal studies with long-term follow-up are warranted. Methods: The Dutch Chronic Pancreatitis Registry (CARE) is a nationwide registry aimed at prospecti

  5. Physician-initiated prospective Italian Registry of carotid stenting with the C-Guard mesh-stent: the IRON-Guard registry. Rationale and design.

    Science.gov (United States)

    Setacci, C; Speziale, F; De Donato, G; Sirignano, P; Setacci, F; Capoccia, L; Galzerano, G; Mansour, W

    2015-10-01

    According to the World Health Organization, every year, 5 million peoples die for stroke and another 5 million are permanently disabled. Although there are many causes of acute stroke, a common treatable cause of acute stroke is atheromatous narrowing at the carotid bifurcation. Carotid endarterectomy is still the standard of car, even if carotid artery stenting (CAS) has become an effective, less invasive alterantive. Unfortunately, CAS procedure is not yet perfect; regardless the use of an embolic protection device (EPD), percutaneous treatment has been correlated with a risk of cerebral ischemic events related to distal embolization. The objective of the IRON-Guard Registry is to evaluate the clinical outcome of treatment by means of stenting with the C-Guard (InspireMD, Boston, MA, USA) in subjects requiring CAS due to significant extracranial carotid artery stenosis with a physician-initiated, Italian, prospective, multicenter, single-arm study. A total of 200 enrolled subjects divided over different centers are planned to be enrolled. CAS will performed by implanting of C-Guard stent. Procedure will be performed according to the physician's standard of care. Standard procedures will be followed based on the Instructions for Use, for the C-Guard device of Inspire. The primary endpoint of this study is the 30-day rate of major adverse events (MAE), defined as the cumulative incidence of any periprocedural (≤30 days postprocedure) death, stroke or myocardial infarction. Secondary endpoints are rate of late ipsilateral stroke (31 through 365 days), system technical success, device malfunctions, major adverse events (MAEs), serious device-related and procedure-related adverse events, target lesion revascularization, and in-stent restenosis rates. PMID:25996843

  6. Trends in the Attack Rates, Incidence, and Mortality of Stroke during 1986–2012: Data of Kaunas (Lithuania) Stroke Registry

    Science.gov (United States)

    Radisauskas, Ricardas; Malinauskiene, Vilija; Milinaviciene, Egle; Kranciukaite-Butylkiniene, Daina; Tamosiunas, Abdonas; Bernotiene, Gailute; Luksiene, Dalia; Milasauskiene, Zemyna; Sopagiene, Diana; Rastenyte, Daiva

    2016-01-01

    Background There is a lack of reliable epidemiological data on longitudinal trends in stroke attack rates, incidence, and mortality in the countries of the Baltic region. Aims The aim of the present study was to explore the longitudinal trends of stroke in middle-aged urban population of Lithuania during the period of 1986 through 2012. Methods All stroke events in the studied population were ascertained and validated according to the standardized criteria outlined by the WHO MONICA Project. The study included all patients in Kaunas (Lithuania) city aged 25 to 64 years who experienced a stroke between 1986 and 2012. Estimates of time-trends of the annual percentage change in stroke attack rates, incidence of stroke, and mortality from this condition were made by applying the Joinpoint regression analysis. Results During the study period, 9,992 stroke events were registered. The overall proportion of recurrent events was 25.7%. Overall, 18.9% of the events (20.0% in men, and 17.4% in women) were fatal within 28 days. During the period of 1986 to 2012, a flat trend in the incidence of stroke was observed among both male and female middle-aged inhabitants of Kaunas city, while attack rates were increasing due to the increase in recurrent strokes. Both mortality and 28-day case fatality of stroke declined significantly over the study period in both sexes. Conclusions An increase both in the incidence and recurrence of stroke among middle-aged men residing in Kaunas city and in the recurrence of stroke among women denotes the inefficiency of measures applied both for primary and secondary prevention of stroke in Lithuania. The revision of current prevention strategies and the introduction of new ones are of paramount importance in order to fight the epidemic of stroke. PMID:27124412

  7. Exploring Clinical and Epidemiological Characteristics of Interstitial Lung Diseases: Rationale, Aims, and Design of a Nationwide Prospective Registry—The EXCITING-ILD Registry

    Directory of Open Access Journals (Sweden)

    Michael Kreuter

    2015-01-01

    Full Text Available Despite a number of prospective registries conducted in past years, the current epidemiology of interstitial lung diseases (ILD is still not well defined, particularly regarding the prevalence and incidence, their management, healthcare utilisation needs, and healthcare-associated costs. To address these issues in Germany, a new prospective ILD registry, “Exploring Clinical and Epidemiological Characteristics of Interstitial Lung Diseases” (EXCITING-ILD, is being conducted by the German Centre for Lung Research in association with ambulatory, inpatient, scientific pulmonology organisations and patient support groups. This multicentre, noninterventional, prospective, and observational ILD registry aims to collect comprehensive and validated data from all healthcare institutions on the incidence, prevalence, characteristics, management, and outcomes regarding all ILD presentations in the real-world setting. Specifically, this registry will collect demographic data, disease-related data such as ILD subtype, treatments, diagnostic procedures (e.g., HRCT, surgical lung biopsy, risk factors (e.g., familial ILD, significant comorbidities, ILD managements, and disease outcomes as well as healthcare resource consumption. The EXCITING-ILD registry will include in-patient and out-patient ILD healthcare facilities in more than 100 sites. In summary, this registry will document comprehensive and current epidemiological data as well as important health economic data for ILDs in Germany.

  8. The management of acute venous thromboembolism in clinical practice – study rationale and protocol of the European PREFER in VTE Registry

    OpenAIRE

    Agnelli, Giancarlo; Gitt, Anselm K; Bauersachs, Rupert; Fronk, Eva-Maria; Laeis, Petra; Mismetti, Patrick; Monreal, Manuel; Willich, Stefan N.; Wolf, Wolf-Peter; Cohen, Alexander T.; ,

    2015-01-01

    Background Venous thromboembolism (VTE) is a major health problem, with over one million events every year in Europe. However, there is a paucity of data on the current management in real life, including factors influencing treatment pathways, patient satisfaction, quality of life (QoL), and utilization of health care resources and the corresponding costs. The PREFER in VTE registry has been designed to address this and to understand medical care and needs as well as potential gaps for improv...

  9. Safety and efficacy of intensive vs. guideline antiplatelet therapy in high‐risk patients with recent ischemic stroke or transient ischemic attack: rationale and design of the Triple Antiplatelets for Reducing Dependency after Ischaemic Stroke (TARDIS) trial (ISRCTN47823388)

    OpenAIRE

    ,

    2015-01-01

    Rationale The risk of recurrence following a stroke or transient ischemic attack is high, especially immediately after the event. Hypothesis Because two antiplatelet agents are superior to one in patients with non‐cardioembolic events, more intensive treatment might be even more effective. Sample size estimates The sample size of 4100 patients will allow a shift to less recurrence, and less severe recurrence, to be detected (odds ratio 0·68) with 90% power at 5% significance. Methods and desi...

  10. Racionalidade e métodos: estudo BREATHE - I registro brasileiro de insuficiência cardíaca Rationale and design: BREATHE registry - I brazilian registry of heart failure

    Directory of Open Access Journals (Sweden)

    2013-05-01

    Full Text Available FUNDAMENTO: Diversos registros locais buscam de forma isolada retratar características clínicas de pacientes internados com Insuficiência Cardíaca (IC em hospitais e comunidades brasileiras. De forma geral, a análise desses dados sugere que existam diferenças importantes na etiologia, nos fatores de descompensação, no tratamento e no prognóstico de pacientes com IC nas diferentes regiões brasileiras. OBJETIVOS: Avaliar as características demográficas, clínicas, prognósticas de 1.200 pacientes admitidos com diagnóstico clínico de insuficiência cardíaca descompensada em um grupo de 60 hospitais representativos das diferentes regiões brasileiras. MÉTODOS: Estudo observacional transversal (registro com seguimento longitudinal de doze meses (visitas de admissão, alta hospitalar, três meses, seis meses e doze meses após inclusão, em que pacientes admitidos em hospitais da rede pública e privada com quadro clínico primariamente de IC definida serão estudados. RESULTADOS: Os resultados serão apresentados logo após o término da coleta, avaliação da qualidade e análise estatística dos dados. CONCLUSÕES: A análise dos resultados deste registro multicêntrico permitirá um planejamento mais adequado do aporte de recursos financeiros, pessoais e tecnológicos para a área da saúde, bem como o planejamento de medidas preventivas mais eficazes na IC descompensada.BACKGROUND: Several local registries have sought to individually depict clinical characteristics of patients hospitalized with heart failure (HF in Brazilian hospitals and communities. Overall, the analysis of these data suggests that there are important differences in etiology, decompensation factors, treatment and prognosis of patients with HF in different Brazilian regions. OBJECTIVES: To evaluate the demographic, clinical and prognostic characteristics of 1,200 patients admitted with a clinical diagnosis of decompensated HF in a group of 60 hospitals

  11. Nanomaterial Registry

    Data.gov (United States)

    U.S. Department of Health & Human Services — The Nanomaterial Registry compiles data from multiple databases into a single resource. The goal of this resource is to establish a curated nanomaterial registry,...

  12. Post-ICU discharge and outcome: rationale and methods of the The French and euRopean Outcome reGistry in Intensive Care Units (FROG-ICU) observational study

    OpenAIRE

    Mebazaa, Alexandre; Chiara Casadio, Maria; Azoulay, Elie; Guidet, Bertrand; Jaber, Samir; Lévy, Bruno; Payen, Didier; Vicaut, Eric; Resche-Rigon, Matthieu; Gayat, Etienne

    2015-01-01

    Background Previous studies have demonstrated that ICU (intensive care unit) survivors have decreased long-term survival rates compared to the general population. However, knowledge about how to identify ICU survivors with higher risk of death and the adjustable factors associated with mortality is still lacking. Methods and Design The FROG-ICU (the French and European Outcome Registry in Intensive Care Units) study is a prospective, observational, multicenter cohort study where ICU survivors...

  13. Stroke Trials Registry

    Science.gov (United States)

    ... News About Neurology Image Library Search The Internet Stroke Center Trials Registry Clinical Trials Interventions Conditions Sponsors ... a clinical trial near you Welcome to the Stroke Trials Registry Our registry of clinical trials in ...

  14. Clinical Case Registries (CCR)

    Data.gov (United States)

    Department of Veterans Affairs — The Clinical Case Registries (CCR) replaced the former Immunology Case Registry and the Hepatitis C Case Registry with local and national databases. The CCR:HIV and...

  15. Impact of Frailty and Other Geriatric Syndromes on Clinical Management and Outcomes in Elderly Patients With Non-ST-Segment Elevation Acute Coronary Syndromes: Rationale and Design of the LONGEVO-SCA Registry.

    Science.gov (United States)

    Alegre, Oriol; Ariza-Solé, Albert; Vidán, María T; Formiga, Francesc; Martínez-Sellés, Manuel; Bueno, Héctor; Sanchís, Juan; López-Palop, Ramón; Abu-Assi, Emad; Cequier, Àngel

    2016-07-01

    The incidence of acute coronary syndromes (ACS) is high in the elderly. Despite a high prevalence of frailty and other aging-related variables, little information exists about the optimal clinical management in patients with coexisting geriatric syndromes. The aim of the LONGEVO-SCA registry (Impacto de la Fragilidad y Otros Síndromes Geriátricos en el Manejo y Pronóstico Vital del Anciano con Síndrome Coronario Agudo sin Elevación de Segmento ST) is to assess the impact of aging-related variables on clinical management, prognosis, and functional status in elderly patients with ACS. A series of 500 consecutive octogenarian patients with non-ST-segment elevation ACS from 57 centers in Spain will be included. A comprehensive geriatric assessment will be performed during the admission, assessing functional status (Barthel Index, Lawton-Brody Index), frailty (FRAIL scale, Short Physical Performance Battery), comorbidity (Charlson Index), nutritional status (Mini Nutritional Assessment-Short Form), and quality of life (Seattle Angina Questionnaire). Patients will be managed according to current recommendations. The primary outcome will be the description of mortality and its causes at 6 months. Secondary outcomes will be changes in functional status and quality of life. Results from this study might significantly improve the knowledge about the impact of aging-related variables on management and outcomes of elderly patients with ACS. Clinical management of these patients has become a major health care problem due to the growing incidence of ACS in the elderly and its particularities. PMID:27362592

  16. EMI Registry Design

    CERN Document Server

    Memon, S

    2011-01-01

    Grid services are the fundamental building blocks of today's Distributed Computing Infrastructures (DCI). The discovery of services in the DCI is a primary function that is a precursor to other tasks such as workload and data management. In this context, a service registry can be used to fulfil such a requirement. Existing service registries, such as the ARC Information Index or UNICORE Registry, are examples that have proven themselves in production environments. Such implementations provide a centralized service registry, however, todays DCIs, such as EGI, are based on a federation model. It is therefore necessary for the service registry to mirror such a model in order for it to seamlessly fit into the operational and management requirements - a DCI built using federated approach. This document presents an architecture for a federated service registry and a prototype based on this architecture, the EMI Registry. Special attention is given to how the federated service registry is robust to environment failu...

  17. Panic Attack or Heart Attack?

    Science.gov (United States)

    Panic Attack or Heart Attack? Diagnosing heart disease in women A Healthy Hearts Guide ® Heart disease in women is often mistaken for panic attack with shortness of breath, anxiety, palpitations and indigestion. ...

  18. The Virtual Observatory Registry

    CERN Document Server

    Demleitner, Markus; Sidaner, Pierre Le; Plante, Raymond L

    2014-01-01

    In the Virtual Observatory (VO), the Registry provides the mechanism with which users and applications discover and select resources -- typically, data and services -- that are relevant for a particular scientific problem. Even though the VO adopted technologies in particular from the bibliographic community where available, building the Registry system involved a major standardisation effort, involving about a dozen interdependent standard texts. This paper discusses the server-side aspects of the standards and their application, as regards the functional components (registries), the resource records in both format and content, the exchange of resource records between registries (harvesting), as well as the creation and management of the identifiers used in the system based on the notion of authorities. Registry record authors, registry operators or even advanced users thus receive a big picture serving as a guideline through the body of relevant standard texts. To complete this picture, we also mention comm...

  19. Facility Registry Service (FRS)

    Data.gov (United States)

    U.S. Environmental Protection Agency — The Facility Registry Service (FRS) provides an integrated source of comprehensive (air, water, and waste) environmental information about facilities across EPA,...

  20. What are cancer registries

    Directory of Open Access Journals (Sweden)

    Miladinov-Mikov Marica

    2004-01-01

    Full Text Available Introduction Population-based cancer registries attempt to collect, process, analyze, store and interpret data on persons with cancer in a certain population (most frequently a geographical area. Hospital-based cancer registries register all cases in a given hospital, usually without knowledge of the background population; the emphasis is to serve the needs of the hospital administration, the hospital cancer program, and, above all, the individual patient. History of Cancer Registries Registration of persons suffering from cancer is a slow process. Around the year 1900, England and Germany demanded improvement of statistical investigation on spread of cancer in population in order to undertake etiological researches. The oldest example of a modern cancer registry is that in Hamburg. Today there are more than 200 population-based cancer registries, but they cover only 5% of the world population, mainly in developed countries of the world. Cancer registry of Vojvodina Cancer registry of Vojvodina was established in 1966; it is a member of International Agency for Research on Cancer (IARC and it is still the only cancer registry from our country whose data are cited in scientific monographs of IARC. The main purpose of cancer registries is to produce statistics on the occurrence of cancer in a defined populatin and to provide a framework for assessing and controlling the impact of cancer on the community. Cancer registries are essential parts of any rational program of cancer control. Their data can be used in a wide variety of areas of cancer control, ranging from etiological research in epidemiology, through primary and secondary prevention to health-care planning and patient care, so benefiting both the individual and society.

  1. Attack surfaces

    DEFF Research Database (Denmark)

    Gruschka, Nils; Jensen, Meiko

    The new paradigm of cloud computing poses severe security risks to its adopters. In order to cope with these risks, appropriate taxonomies and classification criteria for attacks on cloud computing are required. In this work-in-progress paper we present one such taxonomy based on the notion of at...... attack surfaces of the cloud computing scenario participants. © 2010 IEEE....

  2. Heart Attack

    Science.gov (United States)

    ... a million people in the U.S. have a heart attack. About half of them die. Many people have permanent heart damage or die because they don't get ... It's important to know the symptoms of a heart attack and call 9-1-1 if someone ...

  3. Data Element Registry Services

    Data.gov (United States)

    U.S. Environmental Protection Agency — Data Element Registry Services (DERS) is a resource for information about value lists (aka code sets / pick lists), data dictionaries, data elements, and EPA data...

  4. FCC Master PSAP Registry

    Data.gov (United States)

    Federal Communications Commission — In December 2003, the FCC began collecting data to build a registry of public safety answering points (PSAPs). A primary PSAP is defined as a PSAP to which 9-1-1...

  5. Second generation registry framework

    OpenAIRE

    Bellgard, Matthew I.; Render, Lee; Radochonski, Maciej; Hunter, Adam

    2014-01-01

    Background Information management systems are essential to capture data be it for public health and human disease, sustainable agriculture, or plant and animal biosecurity. In public health, the term patient registry is often used to describe information management systems that are used to record and track phenotypic data of patients. Appropriate design, implementation and deployment of patient registries enables rapid decision making and ongoing data mining ultimately leading to improved pat...

  6. Trauma registry reengineered.

    Science.gov (United States)

    Wargo, Christina; Bolig, Nicole; Hixson, Heather; McWilliams, Nate; Rummerfield, Heather; Stratton, Elaine; Woodruff, Tracy

    2014-01-01

    A successful trauma registry balances accuracy of abstraction and timeliness of case submissions to achieve quality performance. Staffing to achieve quality performance is a challenge at times based on competitive institutional need. The aim of this performance improvement timing study was to identify trauma registry job responsibilities and redesign the responsibilities to create increased abstraction time and maintain accuracy of data abstraction. The outcome is measured by case submission rates with existing staffing and interrater reliability outcomes. PMID:25397337

  7. Heart Attack

    Science.gov (United States)

    ... having another heart attack. These medicines include: aspirin, beta blockers, statins, ACE inhibitors and fish oil. Your doctor ... have had a stent placed in your heart. Beta blockers are a group of drugs that lower the ...

  8. Panic Attack

    OpenAIRE

    Scantamburlo, Gabrielle; Ansseau, Marc

    2004-01-01

    Panic attacks can occur unexpectedly and in almost any situation. The present article discusses the main features of anxiety states, the approach, the management and the practice guidelines for the treatment of panic disorder. Peer reviewed

  9. The Qingdao Twin Registry

    DEFF Research Database (Denmark)

    Duan, Haiping; Ning, Feng; Zhang, Dongfeng; Wang, Shaojie; Zhang, Dong; Tan, Qihua; Tian, Xiaocao; Pang, Zengchang

    2013-01-01

    In 1998, the Qingdao Twin Registry was initiated as the main part of the Chinese National Twin Registry. By 2005, a total of 10,655 twin pairs had been recruited. Since then new twin cohorts have been sampled, with one longitudinal cohort of adolescent twins selected to explore determinants of...... metabolic disorders and health behaviors during puberty and young adulthood. Adult twins have been sampled for studying heritability of multiple phenotypes associated with metabolic disorders. In addition, an elderly twin cohort has been recruited with a focus on genetic studies of aging-related phenotypes...... using twin modeling and genome-wide association analysis. Cross-cultural collaborative studies have been carried out between China, Denmark, Finland, and US cohorts. Ongoing data collection and analysis for the Qingdao Twin Registry will be discussed in this article....

  10. The Danish Twin Registry

    DEFF Research Database (Denmark)

    Skytthe, Axel; Ohm Kyvik, Kirsten; Vilstrup Holm, Niels; Christensen, Kaare

    Introduction: The Danish Twin Registry is a unique source for studies of genetic, familial and environmental factors on life events, health conditions and diseases. Content: More than 85,000 twin pairs born 1870-2008 in Denmark. Validity and coverage: Four main ascertainment methods have been...... employed. Completeness of ascertainment varies according to birth cohorts. For birth cohorts 1870-1930 both twins should survive to age 6 years. From 1931-1968 72% of all twin pairs has been ascertained, with complete ascertainment of all live born twins since 1968. CONCLUSION: Because twins have been...... identified independent of traits and on a population basis, the Danish Twin Registry is well suited for studies to understand the influence of genetic and environmental factors for a wide variety of diseases and traits....

  11. Heart Attack Risk Assessment

    Science.gov (United States)

    ... Pressure Tools & Resources Stroke More Heart Attack Risk Assessment Updated:May 31,2016 We're sorry, but ... Can You Recognize a Heart Attack? Quiz Risk Assessment Patient Information Sheets: Heart Attack Heart Attack Personal ...

  12. National registry of myocardial infarction

    OpenAIRE

    Amin Daemi; Mehdi Jafari

    2016-01-01

    The Registry of Myocardial Infarctions (MI Registry) is a national registry in Iran that collects and reports the data on myocardial infarctions. Its main advantage is that it covers the whole country and is mandatory for hospitals to register the MI cases in it. Then, the qualified individuals at the provincial and national levels can get intended reports and make appropriate decisions. Such reports, further to the policy makers and managers, can be very valuable for researchers. The regi...

  13. Does Design Rationale Enhance Creativity?

    OpenAIRE

    Jing Wang; Umer Farooq; John M. Carroll

    2010-01-01

    Creativity and rationale are often viewed as two contrasting facets in software design. A lack in recognizing the facilitative relationship between creativity and rationale not only underestimates the benefits designers can obtain from rationale practices, but also confines the approaches that support creativity in software design. Our exploratory study provides empirical evidence of the positive correlation between rationale and creativity. Furthermore, we found that the feasibility of desig...

  14. Attack warning

    Energy Technology Data Exchange (ETDEWEB)

    1988-12-01

    The North American Aerospace Defense Command, located at Cheyenne Mountain Air Force Station, is responsible for warning the United States and Canadian leaders that North America is under air, missile, or space attack. The Air Force has been developing a replacement for NORAD's communications computer system, and it expects to spend about $281 million on this program-about $72 million for block I and $209 million for block II. Block I of the replacement system has experienced significant schedule and performance problems, such as the inability to meet the requirement for the unit to restore full mission capability within 267 minutes after a total loss of power, and the incompatibility of the unit with other computer equipment due to the wiring standard. These problems have pushed the planned installation data from 1986 to 1999. The Air Force intends to have the contractor correct the deficiencies during block II development. This report discusses how the replacement program should be reassessed.

  15. Does Design Rationale Enhance Creativity?

    Directory of Open Access Journals (Sweden)

    Jing Wang

    2010-01-01

    Full Text Available Creativity and rationale are often viewed as two contrasting facets in software design. A lack in recognizing the facilitative relationship between creativity and rationale not only underestimates the benefits designers can obtain from rationale practices, but also confines the approaches that support creativity in software design. Our exploratory study provides empirical evidence of the positive correlation between rationale and creativity. Furthermore, we found that the feasibility of design alternatives and the comprehensiveness of tradeoff evaluation are critical to enhancing novelty, persuasiveness, and insightfulness. We also discuss future directions to further understand how these properties, or rationale quality in general, affects design creativity.

  16. Worldwide variability in deceased organ donation registries

    OpenAIRE

    Rosenblum, Amanda M.; Li, Alvin Ho-Ting; Roels, Leo; Stewart, Bryan; Prakash, Versha; Beitel, Janice; Young, Kimberly; Shemie, Sam; Nickerson, Peter; Garg, Amit X

    2012-01-01

    The variability in deceased organ donation registries worldwide has received little attention. We considered all operating registries, where individual wishes about organ donation were recorded in a computerized database. We included registries which recorded an individual's decision to be a donor (donor registry), and registries which only recorded an individual's objection (non-donor registry). We collected information on 15 characteristics including history, design, use and number of regis...

  17. The Danish Twin Registry

    DEFF Research Database (Denmark)

    Skytthe, Axel; Christiansen, Lene; Kyvik, Kirsten Ohm; Bødker, Frans L; Hvidberg, Lars; Petersen, Inge; Nielsen, Morten M F; Bingley, Paul; Hjelmborg, Jacob; Tan, Qihua; Holm, Niels V; Vaupel, James W; McGue, Matt; Christensen, Kaare

    2013-01-01

    Over the last 60 years, the resources and the research in the Danish Twin Registry (DTR) have periodically been summarized. Here, we give a short overview of the DTR and a more comprehensive description of new developments in the twenty-first century. First, we outline our experience over the last...... decade of combining questionnaire and survey data with national demographic, social, and health registers in Statistics Denmark. Second, we describe our most recent data collection effort, which was conducted during the period 2008-2011 and included both in-person assessments of 14,000+ twins born 1931......-1969 and sampling of biological material, hereby expanding and consolidating the DTR biobank. Third, two examples of intensively studied twin cohorts are given. The new developments in the DTR in the last decade have facilitated the ongoing research and laid the groundwork for new research directions....

  18. Heart Attack Recovery FAQs

    Science.gov (United States)

    ... Pressure High Blood Pressure Tools & Resources Stroke More Heart Attack Recovery FAQs Updated:Aug 24,2016 Most people ... recovery. View an animation of a heart attack . Heart Attack Recovery Questions and Answers What treatments will I ...

  19. Tools and data services registry

    DEFF Research Database (Denmark)

    Ison, Jon; Rapacki, Kristoffer; Ménager, Hervé;

    2016-01-01

    Life sciences are yielding huge data sets that underpin scientific discoveries fundamental to improvement in human health, agriculture and the environment. In support of these discoveries, a plethora of databases and tools are deployed, in technically complex and diverse implementations, across...... at hand.Here we present a community-driven curation effort, supported by ELIXIR-the European infrastructure for biological information-that aspires to a comprehensive and consistent registry of information about bioinformatics resources. The sustainable upkeep of this Tools and Data Services Registry......, the registry can become a standard for dissemination of information about bioinformatics resources: we welcome everyone to join us in this common endeavour. The registry is freely available at https://bio.tools....

  20. Active Linkability Attacks

    OpenAIRE

    Schnoor, Henning; Woizekowski, Oliver

    2013-01-01

    We study linking attacks on communication protocols. We show that an active attacker is strictly more powerful in this setting than previously-considered passive attackers. We introduce a formal model to reason about active linkability attacks, formally define security against these attacks and give very general conditions for both security and insecurity of protocols. In addition, we introduce a composition-like technique that allows to obtain security proofs by only studying small component...

  1. Retrievability; rationale, measures, impacts

    International Nuclear Information System (INIS)

    The concept of deep geological disposal was developed in order to permanently remove radioactive wastes from the human environment. Retrieval of wastes was reckoned to be a scenario of such low probability that little effort was initially devoted to its study. In recent years, however, there has been an increasingly active debate on whether fully passive (and safe) systems provide a sufficient level of practicability of retrievability. This debate is linked directly to practical, technical matters, such as the design of the facility, the operating procedures and also the institutional programs throughout the lifetime of a repository. But there are also philosophical issues involved in addition to these purely technical issues. For retrievability, the questions are: How easy does retrieval have to be in the different stages of repository development? What is the rationale for requiring retrievability? What technical measures and methods are feasible? Should specific features facilitating retrievability be introduced into the repository design? How do such measures impact on other aspects of system performance and on other issues (such as safeguards)? This paper addresses the questions raised and presents a subjective set of conclusions, as a means to stimulate further debate on this topical issue. Copyright (2001) Material Research Society

  2. Worldwide variability in deceased organ donation registries.

    Science.gov (United States)

    Rosenblum, Amanda M; Li, Alvin Ho-Ting; Roels, Leo; Stewart, Bryan; Prakash, Versha; Beitel, Janice; Young, Kimberly; Shemie, Sam; Nickerson, Peter; Garg, Amit X

    2012-08-01

    The variability in deceased organ donation registries worldwide has received little attention. We considered all operating registries, where individual wishes about organ donation were recorded in a computerized database. We included registries which recorded an individual's decision to be a donor (donor registry), and registries which only recorded an individual's objection (non-donor registry). We collected information on 15 characteristics including history, design, use and number of registrants for 27 registries (68%). Most registries are nationally operated and government-owned. Registrations in five nations expire and require renewal. Some registries provide the option to make specific organ selections in the donation decision. Just over half of donor registries provide legally binding authorization to donation. In all national donor registries, except one, the proportion of adults (15+) registered is modest (donation decision mandatory to obtain a driver's license. Registered objections in non-donor registries are rare (organ donor registries worldwide necessitates public discourse and quality improvement initiatives, to identify and support leading practices in registry use. PMID:22507140

  3. Environmental Agents Service (EAS) Registry System of Records

    Data.gov (United States)

    Department of Veterans Affairs — The Environmental Agent Service (EAS) Registries is the information system encompassing the Ionizing Radiation Registry (IRR), the Agent Orange Registry (AOR), and...

  4. Generating IDS Attack Pattern Automatically Based on Attack Tree

    Institute of Scientific and Technical Information of China (English)

    向尕; 曹元大

    2003-01-01

    Generating attack pattern automatically based on attack tree is studied. The extending definition of attack tree is proposed. And the algorithm of generating attack tree is presented. The method of generating attack pattern automatically based on attack tree is shown, which is tested by concrete attack instances. The results show that the algorithm is effective and efficient. In doing so, the efficiency of generating attack pattern is improved and the attack trees can be reused.

  5. Heart attack first aid

    Science.gov (United States)

    First aid - heart attack; First aid - cardiopulmonary arrest; First aid - cardiac arrest ... A heart attack occurs when the blood flow that carries oxygen to the heart is blocked. The heart muscle becomes ...

  6. Pericarditis - after heart attack

    Science.gov (United States)

    ... medlineplus.gov/ency/article/000166.htm Pericarditis - after heart attack To use the sharing features on this page, ... occur in the days or weeks following a heart attack. Causes Two types of pericarditis can occur after ...

  7. Heart attack first aid

    Science.gov (United States)

    First aid - heart attack; First aid - cardiopulmonary arrest; First aid - cardiac arrest ... A heart attack occurs when the blood flow that carries oxygen to the heart is blocked. The heart muscle ...

  8. Breast and Colon Cancer Family Registries

    Science.gov (United States)

    The Breast Cancer Family Registry and the Colon Cancer Family Registry were established by the National Cancer Institute as a resource for investigators to use in conducting studies on the genetics and molecular epidemiology of breast and colon cancer.

  9. Essential Hypotension and Adaptability Registry

    Science.gov (United States)

    2016-05-30

    Blood Pressure; Depression; Panic Attack; Fibromyalgia; POTS; Inappropriate Sinus Tachycardia; Coronary Heart Disease; Acute Coronary Syndrome (ACS); Acute Myocardial Infarction (AMI); Cerebrovascular Disease (CVD); Transient Ischemic Attack (TIA); Atrial Fibrillation; Diabetes Mellitus; Cancer; Systolic Heart Failure; Diastolic Heart Failure; Chronic Fatigue Syndrome; Syncope; Vasovagal Syncope

  10. The Danish National Prescription Registry

    DEFF Research Database (Denmark)

    Kildemoes, Helle Wallach; Toft Sørensen, Henrik; Hallas, Jesper

    Introduction: Individual-level data on all prescription drugs sold in Danish community pharmacies has since 1994 been recorded in the Register of Medicinal Products Statistics of the Danish Medicines Agency. Content: The register subset, termed the Danish National Prescription Registry (DNPR), co...

  11. The Danish Shoulder Arthroplasty Registry

    DEFF Research Database (Denmark)

    Rasmussen, Jeppe; Jakobsen, John; Brorson, Stig;

    2012-01-01

    The Danish Shoulder Arthroplasty Registry (DSR) was established in 2004. Data are reported electronically by the surgeons. Patient-reported outcome is collected 10-14 months postoperatively using the Western Ontario osteoarthritis of the shoulder index (WOOS). 2,137 primary shoulder arthroplasties...

  12. 27 CFR 24.115 - Registry number.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2010-04-01 2010-04-01 false Registry number. 24.115... OF THE TREASURY LIQUORS WINE Establishment and Operations Application § 24.115 Registry number. Upon approval of the application, the appropriate TTB officer will assign a registry number to the bonded...

  13. Seven Deadliest Network Attacks

    Energy Technology Data Exchange (ETDEWEB)

    Prowell, Stacy J [ORNL; Borkin, Michael [None; Kraus, Robert [Solutionary, Inc.

    2010-05-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you need "Seven Deadliest Network Attacks". This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Denial of Service; War Dialing; Penetration 'Testing'; Protocol Tunneling; Spanning Tree Attacks; Man-in-the-Middle; and, Password Replay. Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally. Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how. Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable.

  14. New registry: National Cancer Patient Registry--Colorectal Cancer.

    Science.gov (United States)

    Wendy, L; Radzi, M

    2008-09-01

    Colorectal cancer is emerging as one of the commonest cancers in Malaysia. Data on colorectal cancer from the National Cancer Registry is very limited. Comprehensive information on all aspects of colorectal cancer, including demographic details, pathology and treatment outcome are needed as the management of colorectal cancer has evolved rapidly over the years involving several disciplines including gastroenterology, surgery, radiology, pathology and oncology. This registry will be an important source of information that can help the development of guidelines to improve colorectal cancer care relevant to this country. The database will initially recruit all colorectal cancer cases from eight hospitals. The data will be stored on a customized web-based case report form. The database has begun collecting data from 1 October 2007 and will report on its first year findings at the end of 2008. PMID:19230248

  15. What Is a Heart Attack?

    Science.gov (United States)

    ... from the NHLBI on Twitter. What Is a Heart Attack? Español A heart attack happens when the flow ... This Content: NEXT >> Featured Video What is a heart attack? 05/22/2014 Describes how a heart attack ...

  16. What Causes a Heart Attack?

    Science.gov (United States)

    ... from the NHLBI on Twitter. What Causes a Heart Attack? Coronary Heart Disease A heart attack happens if ... This Content: NEXT >> Featured Video What is a heart attack? 05/22/2014 Describes how a heart attack ...

  17. Life After a Heart Attack

    Science.gov (United States)

    ... from the NHLBI on Twitter. Life After a Heart Attack Many people survive heart attacks and live active, ... a few weeks. Anxiety and Depression After a Heart Attack After a heart attack, many people worry about ...

  18. On the Cooperation of Independent Registries

    CERN Document Server

    Miraz, Matteo

    2010-01-01

    Registries play a key role in service-oriented applications. Originally, they were neutral players between service providers and clients. The UDDI Business Registry (UBR) was meant to foster these concepts and provide a common reference for companies interested in Web services. The more Web services were used, the more companies started create their own local registries: more efficient discovery processes, better control over the quality of published information, and also more sophisticated publication policies motivated the creation of private repositories. The number and heterogeneity of the different registries - besides the decision to close the UBR are pushing for new and sophisticated means to make different registries cooperate. This paper proposes DIRE (DIstributed REgistry), a novel approach based on a publish and subscribe (P/S) infrastructure to federate different heterogeneous registries and make them exchange information about published services. The paper discusses the main motivations for the P...

  19. CIRSE Vascular Closure Device Registry

    International Nuclear Information System (INIS)

    Purpose: Vascular closure devices are routinely used after many vascular interventional radiology procedures. However, there have been no major multicenter studies to assess the safety and effectiveness of the routine use of closure devices in interventional radiology. Methods: The CIRSE registry of closure devices with an anchor and a plug started in January 2009 and ended in August 2009. A total of 1,107 patients were included in the registry. Results: Deployment success was 97.2%. Deployment failure specified to access type was 8.8% [95% confidence interval (95% CI) 5.0–14.5] for antegrade access and 1.8% (95% CI 1.1–2.9) for retrograde access (P = 0.001). There was no difference in deployment failure related to local PVD at the access site. Calcification was a reason for deployment failure in only 5.9 cm, and two vessel occlusions. Conclusion: The conclusion of this registry of closure devices with an anchor and a plug is that the use of this device in interventional radiology procedures is safe, with a low incidence of serious access site complications. There seems to be no difference in complications between antegrade and retrograde access and other parameters.

  20. Nocturnal panic attacks

    OpenAIRE

    Lopes Fabiana L; Nardi Antonio E; Nascimento Isabella; Valença Alexandre M.; Zin Walter A.

    2002-01-01

    The panic-respiration connection has been presented with increasing evidences in the literature. We report three panic disorder patients with nocturnal panic attacks with prominent respiratory symptoms, the overlapping of the symptoms with the sleep apnea syndrome and a change of the diurnal panic attacks, from spontaneous to situational pattern. The implication of these findings and awareness to the distinct core of the nocturnal panic attacks symptoms may help to differentiate them from sle...

  1. Seven deadliest USB attacks

    CERN Document Server

    Anderson, Brian

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting USB technology? Then you need Seven Deadliest USB Attacks. This book pinpoints the most dangerous hacks and exploits specific to USB, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: USB Hacksaw USB Switchblade USB Based Virus/Malicous Code Launch USB Device Overflow RAMdum

  2. Seven Deadliest Microsoft Attacks

    CERN Document Server

    Kraus, Rob; Borkin, Mike; Alpern, Naomi

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Microsoft products? Then you need Seven Deadliest Microsoft Attacks. This book pinpoints the most dangerous hacks and exploits specific to Microsoft applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Windows Operating System-Password AttacksActive Directory-Escalat

  3. Seven Deadliest Network Attacks

    CERN Document Server

    Prowell, Stacy; Borkin, Mike

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you need Seven Deadliest Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Denial of Service War Dialing Penetration "Testing" Protocol Tunneling Spanning Tree At

  4. Mathematical Attacks on RSA Cryptosystem

    Directory of Open Access Journals (Sweden)

    Imad K. Salah

    2006-01-01

    Full Text Available In this paper some of the most common attacks against Rivest, Shamir, and Adleman (RSA cryptosystem are presented. We describe the integer factoring attacks, attacks on the underlying mathematical function, as well as attacks that exploit details in implementations of the algorithm. Algorithms for each type of attacks are developed and analyzed by their complexity, memory requirements and area of usage.

  5. Atraumatic extractions: a biomechanical rationale.

    Science.gov (United States)

    Misch, Carl E; Perez, Helena M

    2008-08-01

    Biomechanical aspects of force have been applied to tooth extraction for centuries. However, the mechanical advantages available to extract the teeth were primarily applied to hold the crown of the tooth, rather than help extract it. An extraction device (Physics Forceps) has been developed to apply a biomechanical rationale to the extraction process of a tooth using a class 1 lever, creep, and shear components of force. PMID:18717405

  6. Multicenter breast cancer collaborative registry.

    Science.gov (United States)

    Sherman, Simon; Shats, Oleg; Fleissner, Elizabeth; Bascom, George; Yiee, Kevin; Copur, Mehmet; Crow, Kate; Rooney, James; Mateen, Zubeena; Ketcham, Marsha A; Feng, Jianmin; Sherman, Alexander; Gleason, Michael; Kinarsky, Leo; Silva-Lopez, Edibaldo; Edney, James; Reed, Elizabeth; Berger, Ann; Cowan, Kenneth

    2011-01-01

    The Breast Cancer Collaborative Registry (BCCR) is a multicenter web-based system that efficiently collects and manages a variety of data on breast cancer (BC) patients and BC survivors. This registry is designed as a multi-tier web application that utilizes Java Servlet/JSP technology and has an Oracle 11g database as a back-end. The BCCR questionnaire has accommodated standards accepted in breast cancer research and healthcare. By harmonizing the controlled vocabulary with the NCI Thesaurus (NCIt) or Systematized Nomenclature of Medicine-Clinical Terms (SNOMED-CT), the BCCR provides a standardized approach to data collection and reporting. The BCCR has been recently certified by the National Cancer Institute's Center for Biomedical Informatics and Information Technology (NCI CBIIT) as a cancer Biomedical Informatics Grid (caBIG(®)) Bronze Compatible product.The BCCR is aimed at facilitating rapid and uniform collection of critical information and biological samples to be used in developing diagnostic, prevention, treatment, and survivorship strategies against breast cancer. Currently, seven cancer institutions are participating in the BCCR that contains data on almost 900 subjects (BC patients and survivors, as well as individuals at high risk of getting BC). PMID:21918596

  7. Nocturnal panic attacks

    Directory of Open Access Journals (Sweden)

    Lopes Fabiana L.

    2002-01-01

    Full Text Available The panic-respiration connection has been presented with increasing evidences in the literature. We report three panic disorder patients with nocturnal panic attacks with prominent respiratory symptoms, the overlapping of the symptoms with the sleep apnea syndrome and a change of the diurnal panic attacks, from spontaneous to situational pattern. The implication of these findings and awareness to the distinct core of the nocturnal panic attacks symptoms may help to differentiate them from sleep disorders and the search for specific treatment.

  8. Private provider participation in statewide immunization registries

    Directory of Open Access Journals (Sweden)

    Cowan Anne E

    2006-02-01

    Full Text Available Abstract Background Population-based registries have been promoted as an effective method to improve childhood immunization rates, yet rates of registry participation in the private sector are low. We sought to describe, through a national overview, the perspectives of childhood immunization providers in private practice regarding factors associated with participation or non-participation in immunization registries. Methods Two mailed surveys, one for 264 private practices identified as registry non-participants and the other for 971 identified as registry participants, from 15 of the 31 states with population-based statewide immunization registries. Frequency distributions were calculated separately for non-participants and participants regarding the physician-reported factors that influenced decisions related to registry participation. Pearson chi-square tests of independence were used to assess associations among categorical variables. Results Overall response rate was 62% (N = 756. Among non-participants, easy access to records of vaccines provided at other sites (N = 101, 68% and printable immunization records (N = 82, 55% were most often cited as "very important" potential benefits of a registry, while the most commonly cited barriers to participation were too much cost/staff time (N = 36, 38% and that the practice has its own system for recording and monitoring immunizations (N = 35, 37%. Among registry participants, most reported using the registry to input data on vaccines administered (N = 326, 87% and to review immunization records of individual patients (N = 302, 81%. A minority reported using it to assess their practice's immunization coverage (N = 110, 29% or generate reminder/recall notices (N = 54, 14%. Few participants reported experiencing "significant" problems with the registry; the most often cited was cost/staff time to use the registry (N = 71, 20%. Conclusion Most registry participants report active participation with few

  9. Signs of a Heart Attack

    Science.gov (United States)

    ... attack Heart Health and Stroke Signs of a heart attack Related information Make the Call. Don't Miss ... to top More information on Signs of a heart attack Read more from womenshealth.gov Make the Call, ...

  10. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... TIA , or transient ischemic attack, is a "mini stroke" that occurs when a blood clot blocks an ... a short time. The only difference between a stroke and TIA is that with TIA the blockage ...

  11. Heart Attack Payment - State

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – state data. This data set includes state-level data for payments associated with a 30-day episode of care for heart...

  12. Heart Attack Payment - National

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – national data. This data set includes national-level data for payments associated with a 30-day episode of care for...

  13. Heart Attack Payment - Hospital

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – provider data. This data set includes provider data for payments associated with a 30-day episode of care for heart...

  14. Windows registry forensics advanced digital forensic analysis of the Windows registry

    CERN Document Server

    Carvey, Harlan

    2011-01-01

    Harlan Carvey brings readers an advanced book on Windows Registry - the most difficult part of Windows to analyze in forensics! Windows Registry Forensics provides the background of the Registry to help develop an understanding of the binary structure of Registry hive files. Approaches to live response and analysis are included, and tools and techniques for postmortem analysis are discussed at length. Tools and techniques will be presented that take the analyst beyond the current use of viewers and into real analysis of data contained in the Registry. This book also has a DVD containing tools, instructions and videos.

  15. Service registry design: an information service approach

    NARCIS (Netherlands)

    Ferreira Pires, Luis; Oostrum, van Arjen; Wijnhoven, Fons; Wang, J.

    2010-01-01

    A service registry is a Service-Oriented Architecture (SOA) component that keeps a ‘catalogue’ of available services. It stores service specifications so that these specifications can be found by potential users. Discussions on the design of service registries currently focus on technical issues, wh

  16. 50 CFR 600.1410 - Registry process.

    Science.gov (United States)

    2010-10-01

    ... 50 Wildlife and Fisheries 8 2010-10-01 2010-10-01 false Registry process. 600.1410 Section 600.1410 Wildlife and Fisheries FISHERY CONSERVATION AND MANAGEMENT, NATIONAL OCEANIC AND ATMOSPHERIC... United States § 600.1410 Registry process. (a) A person may register through the NMFS web site at...

  17. The Western Denmark Cardiac Computed Tomography Registry

    DEFF Research Database (Denmark)

    Nielsen, Lene Hüche; Nørgaard, Bjarne Linde; Tilsted, Hans Henrik;

    2015-01-01

    BACKGROUND: As a subregistry to the Western Denmark Heart Registry (WDHR), the Western Denmark Cardiac Computed Tomography Registry (WDHR-CCTR) is a clinical database established in 2008 to monitor and improve the quality of cardiac computed tomography (CT) in Western Denmark. OBJECTIVE: We...

  18. Southern Saskatchewan Ticagrelor Registry experience

    Directory of Open Access Journals (Sweden)

    Dehghani P

    2014-10-01

    Full Text Available Payam Dehghani,1 Varun Chopra,1 Ali Bell,2 Sheila Kelly,1 Lori Zulyniak,2 Jeff Booker,1 Rodney Zimmermann,1 William Semchuk,2 Asim N Cheema,3 Andrea J Lavoie1 1Prairie Vascular Research Network, University of Saskatchewan, Regina, SK, 2Regina Qu’Appelle Health Region, Regina, SK, 3St Michael’s Hospital, University of Toronto, Toronto, ON, Canada Background: As ticagrelor enters into clinical use for acute coronary syndrome, it is ­important to understand patient/physician behavior in terms of appropriate use, adherence, and event rates. Methods: The Saskatchewan Registry is a prospective, observational, multicenter cohort study that identifies consecutive patients started on ticagrelor. We aimed to evaluate both on- and off-label use, identify characteristics of patients who prematurely stop ticagrelor, and describe patient/physician behavior contributing to inappropriate stoppage of this medication. Results: From April 2012 to September 2013, 227 patients were initiated on ticagrelor, with a mean age of 62.2±12.1 years. The participants were 66% men and had a mean follow up of 157.4±111.7 days. Seventy-four patients (32.4% had off-label indications. Forty-seven patients (20.7% prematurely stopped ticagrelor and were more likely to be older, women, nonwhite, present with shock, and complain of dyspnea. Twenty-six of the 47 patients stopped ticagrelor inappropriately because of patient nonadherence (18 patients and physician advice (eight patients. A composite outcome event of death from vascular causes, myocardial infarction, or stroke occurred in 8.8% of the entire cohort and was more likely to occur in those older then 65 years, those presenting with cardiogenic shock, and those who prematurely stopped ticagrelor. Conclusion: In this real-world registry of patients started on ticagrelor, a third have off-label indications and a fifth prematurely stop the medication. Premature discontinuation was an independent predictor of major

  19. Structural Learning of Attack Vectors for Generating Mutated XSS Attacks

    OpenAIRE

    Yi-Hsun Wang; Ching-Hao Mao; Hahn-Ming Lee

    2010-01-01

    Web applications suffer from cross-site scripting (XSS) attacks that resulting from incomplete or incorrect input sanitization. Learning the structure of attack vectors could enrich the variety of manifestations in generated XSS attacks. In this study, we focus on generating more threatening XSS attacks for the state-of-the-art detection approaches that can find potential XSS vulnerabilities in Web applications, and propose a mechanism for structural learning of attack vectors with the aim of...

  20. XQuery Injection Attack and Countermeasures

    Institute of Scientific and Technical Information of China (English)

    谭玉森

    2014-01-01

    As a database that allows data to be stored in XML format, XML database suffers from some similar attacks as traditional relational database does. These attacks include injection attack by XQuey function in application software. These include BaseX, eXist and MarkLogic. In order to defeat these attacks, countermeasures are proposed.

  1. Seven Deadliest Wireless Technologies Attacks

    CERN Document Server

    Haines, Brad

    2010-01-01

    How can an information security professional keep up with all of the hacks, attacks, and exploits? One way to find out what the worst of the worst are is to read the seven books in our Seven Deadliest Attacks Series. Not only do we let you in on the anatomy of these attacks but we also tell you how to get rid of them and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve. Attacks featured in this book include:Bluetooth AttacksCredit Card, Access Card, and Passport AttacksBad Encryption

  2. Firms' Rationales for Interaction with Research Universities

    OpenAIRE

    Broström, Anders

    2008-01-01

    R&D managers at 50 firms randomly selected from all firms who have formal relations with two research universities in Stockholm are being interviewed about their rationales for collaboration. Drawing on this material, a distinctive typology of rationales and the therewith associated effects from cooperative relations is presented. As expected, rationales related to innovation, in terms of invented or improved products or processes, are found to be the main drivers for interaction. As regards ...

  3. EPA Facility Registry Service (FRS): SDWIS

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of facilities that link...

  4. EPA Facility Registry Service (FRS): RADINFO

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of facilities that link...

  5. EPA Facility Registry Service (FRS): BIA

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of facilities that link...

  6. EPA Facility Registry Service (FRS): OIL

    Data.gov (United States)

    U.S. Environmental Protection Agency — This dataset contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of facilities that link to the Oil...

  7. EPA Facility Registry Service (FRS): RBLC

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of facilities that link...

  8. Substance Identification Information from EPA's Substance Registry

    Data.gov (United States)

    U.S. Environmental Protection Agency — The Substance Registry Services (SRS) is the authoritative resource for basic information about substances of interest to the U.S. EPA and its state and tribal...

  9. EPA Facility Registry Service (FRS): RMP

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of facilities that link...

  10. EPA Facility Registry Service (FRS): RCRA

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of hazardous waste...

  11. EPA Facility Registry Service (FRS): ACRES

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service consists of location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of sites that link...

  12. EPA Facility Registry Service (FRS): LANDFILL

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of non-hazardous waste...

  13. EPA Facility Registry Service (FRS): TRI

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of facilities that link...

  14. EPA Facility Registry System (FRS): NEPT

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry System (FRS) for the subset of facilities that link...

  15. EPA Facility Registry Service (FRS): NCDB

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of facilities that link...

  16. EPA Facility Registry Service (FRS): ICIS

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of facilities that link...

  17. EPA Facility Registry Service (FRS): BRAC

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of facilities that link...

  18. EPA Facility Registry Service (FRS): NEI

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of facilities that link...

  19. EPA Facility Registry Service (FRS): CAMDBS

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of facilities that link...

  20. [Taxonomy and definition of clinical registries].

    Science.gov (United States)

    Costa, Giuseppe

    2015-09-01

    In order to assess the needs of knowledge about surveillance and registries in Italy and to prepare a proposal for the advancement of monitoring and recording capacity, a working group led by the Italian Association of Epidemiology and composed by the University of Turin, the Institute of Health and Agenas, carried out a survey of definitions and approaches used in public health and consulted the main Italian experts in surveillance and registries. Some of the reflections developed in this project are presented, to assess to which extent they are adaptable to the prospects the program PRIER aims to. Different aspects of the issue are analyzed: from the frame work necessary to identify information needs and how to improve the ability to measure and types of definitions and taxonomies of the registers, to the implications of the choices about what to include in registries on regulation of the instruments and investment priorities for new registries and surveillance. PMID:26418503

  1. EPA Facility Registry System (FRS): NCES

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry System (FRS) for the subset of facilities that link...

  2. Temporal Analysis of Windows MRU Registry Keys

    Science.gov (United States)

    Zhu, Yuandong; Gladyshev, Pavel; James, Joshua

    The Microsoft Windows registry is an important resource in digital forensic investigations. It contains information about operating system configuration, installed software and user activity. Several researchers have focused on the forensic analysis of the Windows registry, but a robust method for associating past events with registry data values extracted from Windows restore points is not yet available. This paper proposes a novel algorithm for analyzing the most recently used (MRU) keys found in consecutive snapshots of the Windows registry. The algorithm compares two snapshots of the same MRU key and identifies data values within the key that have been updated in the period between the two snapshots. User activities associated with the newly updated data values can be assumed to have occurred during the period between the two snapshots.

  3. Linking Medicare, Medicaid, and Cancer Registry Data...

    Data.gov (United States)

    U.S. Department of Health & Human Services — Linking Medicare, Medicaid, and Cancer Registry Data to Study the Burden of Cancers in West Virginia In the United States, the elderly carry an unequal burden of...

  4. Veterans Affairs Central Cancer Registry (VACCR)

    Data.gov (United States)

    Department of Veterans Affairs — The Veterans Affairs Central Cancer Registry (VACCR) receives and stores information on cancer diagnosis and treatment constraints compiled and sent in by the local...

  5. The United States Transuranium and Uranium Registries

    International Nuclear Information System (INIS)

    The United States Transuranium and Uranium Registries are unique parallel research programs devoted to the study of the actinide elements in man. The primary mission of the Registries is to verify and ensure the adequacy and applicability of radiation protection standards for the actinides. To accomplish this task, the Registries utilize tissues obtained postmortem from informed volunteer donors with confirmed or high likelihood of exposure to plutonium, americium, or other actinides. These are collected at autopsy and radiochemically analyzed for actinide content. The results, along with relevant details of occupational and exposure history, medical history and health physics data are used to determine the distribution, biokinetics and dosimetry of the actinides in humans, and to correlate estimates of deposition and dose made during life with postmortem findings. Other important applications of the Registries' research is scaling of animal studies to man and validation or refinement of biokinetic models on which the safety standards are based

  6. Fatal crocodile attack.

    Science.gov (United States)

    Chattopadhyay, Saurabh; Shee, Biplab; Sukul, Biswajit

    2013-11-01

    Attacks on human beings by various animals leading to varied types of injuries and even death in some cases are not uncommon. Crocodile attacks on humans have been reported from a number of countries across the globe. Deaths in such attacks are mostly due to mechanical injuries or drowning. Bites by the crocodiles often cause the limbs to be separated from the body. The present case refers to an incident of a fatal attack by a crocodile on a 35 years old female where only the mutilated head of the female was recovered. Multiple lacerated wounds over the face and scalp along with fracture of the cranial bones was detected on autopsy. Two distinct bite marks in the form of punched in holes were noted over the parietal and frontal bones. Injuries on the head with its traumatic amputation from the body were sufficient to cause death. However, the presence of other fatal injuries on the unrecovered body parts could not be ruled out. PMID:24237838

  7. Patient registries for substance use disorders

    Directory of Open Access Journals (Sweden)

    Tai B

    2014-07-01

    Full Text Available Betty Tai,1 Lian Hu,2 Udi E Ghitza,1 Steven Sparenborg,1 Paul VanVeldhuisen,2 Robert Lindblad2 1Center for the Clinical Trials Network, National Institute on Drug Abuse, National Institutes of Health, Bethesda, MD, USA; 2The EMMES Corporation, Rockville, MD, USA Abstract: This commentary discusses the need for developing patient registries of substance use disorders (SUD in general medical settings. A patient registry is a tool that documents the natural history of target diseases. Clinicians and researchers use registries to monitor patient comorbidities, care procedures and processes, and treatment effectiveness for the purpose of improving care quality. Enactments of the Affordable Care Act 2010 and the Mental Health Parity and Addiction Equity Act 2008 open opportunities for many substance users to receive treatment services in general medical settings. An increased number of patients with a wide spectrum of SUD will initially receive services with a chronic disease management approach in primary care. The establishment of computer-based SUD patient registries can be assisted by wide adoption of electronic health record systems. The linkage of SUD patient registries with electronic health record systems can facilitate the advancement of SUD treatment research efforts and improve patient care. Keywords: substance use disorders, primary care, registry, electronic health records, chronic care model

  8. Bluetooth security attacks comparative analysis, attacks, and countermeasures

    CERN Document Server

    Haataja, Keijo; Pasanen, Sanna; Toivanen, Pekka

    2013-01-01

    This overview of Bluetooth security examines network vulnerabilities and offers a comparative analysis of recent security attacks. It also examines related countermeasures and proposes a novel attack that works against all existing Bluetooth versions.

  9. PCCR: Pancreatic Cancer Collaborative Registry.

    Science.gov (United States)

    Sherman, Simon; Shats, Oleg; Ketcham, Marsha A; Anderson, Michelle A; Whitcomb, David C; Lynch, Henry T; Ghiorzo, Paola; Rubinstein, Wendy S; Sasson, Aaron R; Grizzle, William E; Haynatzki, Gleb; Feng, Jianmin; Sherman, Alexander; Kinarsky, Leo; Brand, Randall E

    2011-01-01

    The Pancreatic Cancer Collaborative Registry (PCCR) is a multi-institutional web-based system aimed to collect a variety of data on pancreatic cancer patients and high-risk subjects in a standard and efficient way. The PCCR was initiated by a group of experts in medical oncology, gastroenterology, genetics, pathology, epidemiology, nutrition, and computer science with the goal of facilitating rapid and uniform collection of critical information and biological samples to be used in developing diagnostic, prevention and treatment strategies against pancreatic cancer. The PCCR is a multi-tier web application that utilizes Java/JSP technology and has Oracle 10 g database as a back-end. The PCCR uses a "confederation model" that encourages participation of any interested center, irrespective of its size or location. The PCCR utilizes a standardized approach to data collection and reporting, and uses extensive validation procedures to prevent entering erroneous data. The PCCR controlled vocabulary is harmonized with the NCI Thesaurus (NCIt) or Systematized Nomenclature of Medicine-Clinical Terms (SNOMED-CT). The PCCR questionnaire has accommodated standards accepted in cancer research and healthcare. Currently, seven cancer centers in the USA, as well as one center in Italy are participating in the PCCR. At present, the PCCR database contains data on more than 2,700 subjects (PC patients and individuals at high risk of getting this disease). The PCCR has been certified by the NCI Center for Biomedical Informatics and Information Technology as a cancer Biomedical Informatics Grid (caBIG(®)) Bronze Compatible product. The PCCR provides a foundation for collaborative PC research. It has all the necessary prerequisites for subsequent evolution of the developed infrastructure from simply gathering PC-related data into a biomedical computing platform vital for successful PC studies, care and treatment. Studies utilizing data collected in the PCCR may engender new approaches

  10. Cell Counting Attack and Browser Attack against TOR Network

    OpenAIRE

    Swati

    2014-01-01

    The onion router (TOR) allows to hide your identity various software under this categories are available that allows online anonymity network, supporting TCP applications over the Internet. It doesn't allow network surveillance or traffic analysis to get tracked but most of these software used equal size of cells (512B). In this paper we are comparing cell-counting attacks and browser attacks against TOR. Different from cell-counting attacks, these attacks can confirm anonymou...

  11. Blocking of Brute Force Attack

    Directory of Open Access Journals (Sweden)

    M.Venkata Krishna Reddy

    2012-08-01

    Full Text Available A common threat Web developers face is a password-guessing attack known as a brute-force attack. A brute-force attack is an attempt to discover a password by systematically trying every possible combination of letters, numbers, and symbols until you discover the one correct combination that works. If your Web site requires user authentication, you are a good target for a brute-force attack. An attacker can always discover a password through a brute-force attack, but the downside is that it could take years to find it. Depending on the password's length and complexity, there could be trillions of possible combinations. To speed things up a bit, a brute-force attack could start with dictionary words or slightly modified dictionary words because most people will use those rather than a completely random password. These attacks are called dictionary attacks or hybrid brute-force attacks. Brute-force attacks put user accounts at risk and flood your site with unnecessary traffic. Hackers launch brute-force attacks using widely available tools that utilize wordlists and smart rule set to intelligently and automatically guess user passwords. Although such attacks are easy to detect, they are not so easy to prevent

  12. ATTACK PATTERNS FOR DETECTING AND PREVENTING DDOS AND REPLAY ATTACKS

    Directory of Open Access Journals (Sweden)

    A.MADHURI,

    2010-09-01

    Full Text Available In this paper, we discuss the methods for detecting and preventing the DDoS Attacks and Replay Attacks, which have been posing the problems for the Internet. We explained a scheme AMFDR (AttackPatterns for Marking Filtering DoS and Replay attacks that identifies the attack packets from the packets that are sent by legitimate users and filters the attack packets. A Denial of service attack is generally launched to make a service unavailable even to an unauthorized user. If this attack uses many computers across the world, it is called Distributed Denial of service attack. Replay attack is retransmission of a data transmission which used to gain authentication in a fraudulent manner. These replayed packets or attack packets are identified. This scheme is less expensive and the implementation of this scheme needs minimal interaction with routers. The scheme is like firewall system, so that the occurrence of an attack is recognized quickly and a punitive action is taken without any loss genuine packets.

  13. Simultaneous Attacks by Terrorist Organisations

    Directory of Open Access Journals (Sweden)

    Kathleen Deloughery

    2013-12-01

    Full Text Available While terror attacks that are a part of a coordinated effort receive attention in the popular media, they have not received much attention in the academic literature. The decision to carry out simultaneous attacks should be examined as one of the choices a terrorist organisation makes about the method of attack. Determining the impact of simultaneous attacks vis-à-vis a single attack can explain why groups would use this method. Up to one quarter of all attacks coded in two major databases, GTD and ITERATE, may be part of a simultaneous campaign. Empirical analysis shows simultaneous attacks are more likely to be successful and cause more fatalities, though not in a one-to-one fashion. These results underline the importance of considering simultaneous attacks in empirical analysis.

  14. Database and Registry Research in Orthopaedic Surgery: Part 2: Clinical Registry Data.

    Science.gov (United States)

    Pugely, Andrew J; Martin, Christopher T; Harwood, Jared; Ong, Kevin L; Bozic, Kevin J; Callaghan, John J

    2015-11-01

    The use of large-scale national databases for observational research in orthopaedic surgery has grown substantially in the last decade, and the data sets can be categorized as either administrative claims or clinical registries. Clinical registries contain secondary data on patients with a specific diagnosis or procedure. The data are typically used for patient outcome surveillance to improve patient safety and health-care quality. Registries used in orthopaedic research exist at the regional, national, and international levels, and many were designed to specifically collect outcomes relevant to orthopaedics, such as short-term surgical complications, longer-term outcomes (implant survival or reoperations), and patient-reported outcomes. Although heterogeneous, clinical registries-in contrast to claims data-typically have a more robust list of variables, with relatively precise prospective data input, management infrastructure, and reporting systems. Some weaknesses of clinical registries include a smaller number of patients, inconstant follow-up duration, and use of sampling methods that may limit generalizability. Within the U.S., national joint registry adoption has lagged international joint registries. Given the changing health-care environment, it is likely that clinical registries will provide valuable information that has the potential to influence clinical practice improvement and health-care policy in the future. PMID:26537168

  15. When women attack.

    Science.gov (United States)

    McLaughlin, Bryan; Davis, Catasha; Coppini, David; Kim, Young Mie; Knisely, Sandra; McLeod, Douglas

    2015-01-01

    The common assumption that female candidates on the campaign trail should not go on the attack, because such tactics contradict gender stereotypes, has not received consistent support. We argue that in some circumstances gender stereotypes will favor female politicians going negative. To test this proposition, this study examines how gender cues affect voter reactions to negative ads in the context of a political sex scandal, a context that should prime gender stereotypes that favor females. Using an online experiment involving a national sample of U.S. adults (N = 599), we manipulate the gender and partisan affiliation of a politician who attacks a male opponent caught in a sex scandal involving sexually suggestive texting to a female intern. Results show that in the context of a sex scandal, a female candidate going on the attack is evaluated more positively than a male. Moreover, while female participants viewed the female sponsor more favorably, sponsor gender had no effect on male participants. Partisanship also influenced candidate evaluations: the Democratic female candidate was evaluated more favorably than her Republican female counterpart. PMID:26399945

  16. LITERATURE SURVEY ON WORMHOLE ATTACK

    OpenAIRE

    Avinash S. Bundela

    2015-01-01

    Security plays an important role in Mobile Ad Hoc Network when data transmission is performed within un - trusted wireless scenario. Various attacks like Black hole, Wormhole, Gray hole and many more have been identified & corresponding solutions have been proposed. These attacks are caused by the malicious node hence ad hoc wireless network is unprotected from the attacks of the malicious node. Between all these attacks the wormhole att ...

  17. The National Mental Health Registry (NMHR).

    Science.gov (United States)

    Aziz, A A; Salina, A A; Abdul Kadir, A B; Badiah, Y; Cheah, Y C; Nor Hayati, A; Ruzanna, Z Z; Sharifah Suziah, S M; Chee, K Y

    2008-09-01

    The National Mental Health Registry (NMHR) collects information about patients with mental disorder in Malaysia. This information allows us to estimate the incidence of selected mental disorders, and to evaluate risk factors and treatment in the country. The National Mental Health Registry (NMHR) presented its first report in 2004, a year after its establishment. The report focused on schizophrenia as a pioneer project for the National Mental Health Registry. The development of the registry has progressed with data collected from government-based facilities, the academia and the private sector. The 2003-2005 report was recently published and distributed. Since then the registry has progressed to include suicides and other mental illnesses such as depression. The NMHR Report 2003-2005 provides detailed information about the profile of persons with Schizophrenia who presented for the first time to various psychiatry and mental health providers throughout Malaysia. More detailed description regarding pharmacotherapy is reported and few cross tabulations done in an effort to provide better understanding and more clinically meaningful reports. PMID:19227671

  18. Structural Learning of Attack Vectors for Generating Mutated XSS Attacks

    Directory of Open Access Journals (Sweden)

    Yi-Hsun Wang

    2010-09-01

    Full Text Available Web applications suffer from cross-site scripting (XSS attacks that resulting from incomplete or incorrect input sanitization. Learning the structure of attack vectors could enrich the variety of manifestations in generated XSS attacks. In this study, we focus on generating more threatening XSS attacks for the state-of-the-art detection approaches that can find potential XSS vulnerabilities in Web applications, and propose a mechanism for structural learning of attack vectors with the aim of generating mutated XSS attacks in a fully automatic way. Mutated XSS attack generation depends on the analysis of attack vectors and the structural learning mechanism. For the kernel of the learning mechanism, we use a Hidden Markov model (HMM as the structure of the attack vector model to capture the implicit manner of the attack vector, and this manner is benefited from the syntax meanings that are labeled by the proposed tokenizing mechanism. Bayes theorem is used to determine the number of hidden states in the model for generalizing the structure model. The paper has the contributions as following: (1 automatically learn the structure of attack vectors from practical data analysis to modeling a structure model of attack vectors, (2 mimic the manners and the elements of attack vectors to extend the ability of testing tool for identifying XSS vulnerabilities, (3 be helpful to verify the flaws of blacklist sanitization procedures of Web applications. We evaluated the proposed mechanism by Burp Intruder with a dataset collected from public XSS archives. The results show that mutated XSS attack generation can identify potential vulnerabilities.

  19. Seven Deadliest Unified Communications Attacks

    CERN Document Server

    York, Dan

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Unified Communications technology? Then you need Seven Deadliest Unified Communication Attacks. This book pinpoints the most dangerous hacks and exploits specific to Unified Communications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks featured in this book include: UC Ecosystem Attacks Insecure Endpo

  20. Improving Attack Graph Visualization through Data Reduction and Attack Grouping

    Energy Technology Data Exchange (ETDEWEB)

    John Homer; Ashok Varikuti; Xinming Ou; Miles A. McQueen

    2008-09-01

    Various tools exist to analyze enterprise network systems and to produce attack graphs detailing how attackers might penetrate into the system. These attack graphs, however, are often complex and difficult to comprehend fully, and a human user may find it problematic to reach appropriate configuration decisions. This paper presents methodologies that can 1) automatically identify portions of an attack graph that do not help a user to understand the core security problems and so can be trimmed, and 2) automatically group similar attack steps as virtual nodes in a model of the network topology, to immediately increase the understandability of the data. We believe both methods are important steps toward improving visualization of attack graphs to make them more useful in configuration management for large enterprise networks. We implemented our methods using one of the existing attack-graph toolkits. Initial experimentation shows that the proposed approaches can 1) significantly reduce the complexity of attack graphs by trimming a large portion of the graph that is not needed for a user to understand the security problem, and 2) significantly increase the accessibility and understandability of the data presented in the attack graph by clearly showing, within a generated visualization of the network topology, the number and type of potential attacks to which each host is exposed.

  1. Structural Learning of Attack Vectors for Generating Mutated XSS Attacks

    CERN Document Server

    Wang, Yi-Hsun; Lee, Hahn-Ming; 10.4204/EPTCS.35.2

    2010-01-01

    Web applications suffer from cross-site scripting (XSS) attacks that resulting from incomplete or incorrect input sanitization. Learning the structure of attack vectors could enrich the variety of manifestations in generated XSS attacks. In this study, we focus on generating more threatening XSS attacks for the state-of-the-art detection approaches that can find potential XSS vulnerabilities in Web applications, and propose a mechanism for structural learning of attack vectors with the aim of generating mutated XSS attacks in a fully automatic way. Mutated XSS attack generation depends on the analysis of attack vectors and the structural learning mechanism. For the kernel of the learning mechanism, we use a Hidden Markov model (HMM) as the structure of the attack vector model to capture the implicit manner of the attack vector, and this manner is benefited from the syntax meanings that are labeled by the proposed tokenizing mechanism. Bayes theorem is used to determine the number of hidden states in the model...

  2. The attack navigator

    DEFF Research Database (Denmark)

    Probst, Christian W.; Willemson, Jan; Pieters, Wolter

    2016-01-01

    The need to assess security and take protection decisions is at least as old as our civilisation. However, the complexity and development speed of our interconnected technical systems have surpassed our capacity to imagine and evaluate risk scenarios. This holds in particular for risks that are...... caused by the strategic behaviour of adversaries. Therefore, technology-supported methods are needed to help us identify and manage these risks. In this paper, we describe the attack navigator: a graph-based approach to security risk assessment inspired by navigation systems. Based on maps of a socio...

  3. Attacks on computer systems

    Directory of Open Access Journals (Sweden)

    Dejan V. Vuletić

    2012-01-01

    Full Text Available Computer systems are a critical component of the human society in the 21st century. Economic sector, defense, security, energy, telecommunications, industrial production, finance and other vital infrastructure depend on computer systems that operate at local, national or global scales. A particular problem is that, due to the rapid development of ICT and the unstoppable growth of its application in all spheres of the human society, their vulnerability and exposure to very serious potential dangers increase. This paper analyzes some typical attacks on computer systems.

  4. Bioethics: A Rationale and a Model

    Science.gov (United States)

    Barman, Charles R.; Rusch, John J.

    1978-01-01

    Discusses the rationale for and development of an undergraduate bioethics course. Based on experiences with the course, general suggestions are offered to instructors planning to add bioethics to existing curricula. (MA)

  5. How Is a Heart Attack Treated?

    Science.gov (United States)

    ... from the NHLBI on Twitter. How Is a Heart Attack Treated? Early treatment for a heart attack can ... or years after the procedure. Other Treatments for Heart Attack Other treatments for heart attack include: Medicines Medical ...

  6. How Is a Heart Attack Diagnosed?

    Science.gov (United States)

    ... from the NHLBI on Twitter. How Is a Heart Attack Diagnosed? Your doctor will diagnose a heart attack ... This Content: NEXT >> Featured Video What is a heart attack? 05/22/2014 Describes how a heart attack ...

  7. The Danish Cerebral Palsy Registry. A registry on a specific impairment

    DEFF Research Database (Denmark)

    Uldall, P; Michelsen, Susan Ishøy; Topp, M;

    2001-01-01

    Cerebral palsy (CP) is the commonest disabling impairment in childhood, with a prevalence of 2-3 per 1000 live births. The Danish Cerebral Palsy Registry is a research registry that contains cases of CP from birth year 1925 and has estimated the birth prevalence since 1950. Data on children with CP...... are collected from paediatric departments and one special institution for disabled children. The children are included by a child neurologist and an obstetrician, and information on pregnancy, birth, neonatal period, impairments and demographic data on the child and mother are registered in a standard...... registries in Denmark will allow the social consequences of CP to be described....

  8. Recent "phishing" attacks

    CERN Multimedia

    IT Department

    2009-01-01

    Over the last few weeks there has been a marked increase in the number of attacks on CERN made by cybercriminals. Typical attacks arrive in the form of e-mail messages purporting to come from the CERN Help Desk, Mail Service, or some similarly official-sounding entity and suggest that there is a problem with your account, such as it being over-quota. They then ask you to click on a link or to reply and give your password. Please don’t! Be cautious of any unexpected messages containing web links even if they appear to come from known contacts. If you happen to click on such a link and if your permission is requested to run or install software, always decline it. NEVER provide your password or other details if these are requested. These messages try to trick you into clicking on Web links which will help them to install malicious software on your computer, and anti-virus software cannot be relied on to detect all cases. In case of questions on this topic, you may contact mailto:helpdesk@cern.ch. CERN Comput...

  9. The Savant Syndrome Registry: A Preliminary Report.

    Science.gov (United States)

    Treffert, Darold A; Rebedew, David L

    2015-08-01

    A registry has been established to document certain characteristics on a sizeable worldwide sample of individuals with savant syndrome, a rare but remarkable condition in which persons with developmental disabilities, brain injury, or brain disease have some spectacular "islands" of skill or ability that stand in jarring, marked contrast to overall handicap. Of the 319 savants included in the registry, 90% are congenital savants, while 10% are acquired savants. The registry includes individuals from 33 countries, with 70% from the United States or Canada. Sex distribution was 79% male vs. 21% female (4:1). This report summarizes the findings in the congenital savant syndrome category of the registry. Among the individuals with congenital savant syndrome, the most common underlying disability was Autistic Spectrum Disorder (75%); various other central nervous system (CNS) disorders were present in the other 25%. Fifty-five percent possessed a single special skill, while 45% had multiple skills. Music was the most frequent principal skill followed by art, memory, mathematics, calendar calculating, language, visual-spatial/mechanical, athletic, computer, extrasensory perception, and other skills. PMID:26436185

  10. [The Austrian Stroke-Unit-Registry].

    Science.gov (United States)

    Hofer, Christine; Kiechl, Stefan; Lang, Wilfried

    2008-01-01

    Since 2003 the Austrian Stroke-Unit-Registry has been administered by the Gesundheit Osterreich GmbH. A total of 26 out of the 32 existing Stroke Units in Austria take part in the project, financed by the Federal Ministry of Health and accompanied by a steering group. This paper provides a description of the objectives, organisation, methodology and the data set of the registry. The main objective of the registry is quality assurance and quality improvement of stroke-treatment in stroke units. Therefore, the participating stroke units document their cases using a web-based database. The data are discussed in the steering group and the stroke units get feedback in terms of benchmarking-graphs. The data set follows a modular approach and contains information about stroke, transport, admission to the hospital, stroke unit discharge and the 3-month follow-up. Between 2003 and 2007 about 27,000 cases (containing about 20,000 strokes) were documented in the registry. PMID:18766309

  11. An active registry for bioinformatics web services.

    NARCIS (Netherlands)

    Pettifer, S.; Thorne, D.; McDermott, P.; Attwood, T.; Baran, J.; Bryne, J.C.; Hupponen, T.; Mowbray, D.; Vriend, G.

    2009-01-01

    SUMMARY: The EMBRACE Registry is a web portal that collects and monitors web services according to test scripts provided by the their administrators. Users are able to search for, rank and annotate services, enabling them to select the most appropriate working service for inclusion in their bioinfor

  12. International Clinical Trials Registry Platform (ICTRP)

    Institute of Scientific and Technical Information of China (English)

    2011-01-01

    @@ Introduction The mission of the WHO Intemational Clinical Trials Registry Platform is to ensure that a complete view of research is accessible to all those involved in health care decision making.This will improve research transparency and will ultimately strengthen tha validity and value of the scientific evidence base.The registration of all interventional trials is a scientific, ethical and moral responsibility.

  13. A review of national shoulder and elbow joint replacement registries

    DEFF Research Database (Denmark)

    Rasmussen, Jeppe V; Olsen, Bo S; Fevang, Bjørg-Tilde S; Furnes, Ove; Skytta, Eerik T; Rahme, Hans; Salomonsson, Björn; Mohammed, Khalid D; Page, Richard S; Carr, Andrew J

    2012-01-01

    The aim was to review the funding, organization, data handling, outcome measurements, and findings from existing national shoulder and elbow joint replacement registries; to consider the possibility of pooling data between registries; and to consider wether a pan european registry might be feasible....

  14. 20 CFR 655.144 - Electronic job registry.

    Science.gov (United States)

    2010-04-01

    ... order posted on the Electronic Job Registry until the end of 50 percent of the contract period as set... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Electronic job registry. 655.144 Section 655... Certification § 655.144 Electronic job registry. (a) Location of and placement in the electronic job...

  15. The Danish Multiple Sclerosis Registry. History, data collection and validity

    DEFF Research Database (Denmark)

    Koch-Henriksen, N; Rasmussen, S; Stenager, E;

    2001-01-01

    The Danish Multiple Sclerosis Registry was formally established in 1956 but started operating in 1949 with a nationwide prevalence survey. Since then, the Registry has continued collecting data on new and old cases of multiple sclerosis (MS) or suspected MS from multiple sources. The Registry...

  16. 37 CFR 201.25 - Visual Arts Registry.

    Science.gov (United States)

    2010-07-01

    ... 37 Patents, Trademarks, and Copyrights 1 2010-07-01 2010-07-01 false Visual Arts Registry. 201.25... AND PROCEDURES GENERAL PROVISIONS § 201.25 Visual Arts Registry. (a) General. This section prescribes the procedures relating to the submission of Visual Arts Registry Statements by visual artists...

  17. FLOODING ATTACK AWARE SECURE AODV

    OpenAIRE

    Madhavi, S; K. Duraiswamy

    2013-01-01

    Providing security in a Mobile Ad hoc Network (MANET) is a challenging task due to its inherent nature. Flooding is a type of Denial of Service (DoS) attack in MANET. Intentional flooding may lead to disturbances in the networking operation. This kind of attack consumes battery power, storage space and bandwidth. Flooding the excessive number of packets may degrade the performance of the network. This study considers hello flooding attack. As the hello packets are continuously flooded by the ...

  18. Sulfate attack expansion mechanisms

    Energy Technology Data Exchange (ETDEWEB)

    Müllauer, Wolfram, E-mail: wolf_m@gmx.at; Beddoe, Robin E.; Heinz, Detlef

    2013-10-15

    A specially constructed stress cell was used to measure the stress generated in thin-walled Portland cement mortar cylinders caused by external sulfate attack. The effects of sulfate concentration of the storage solution and C{sub 3}A content of the cement were studied. Changes in mineralogical composition and pore size distribution were investigated by X-ray diffraction and mercury intrusion porosimetry, respectively. Damage is due to the formation of ettringite in small pores (10–50 nm) which generates stresses up to 8 MPa exceeding the tensile strength of the binder matrix. Higher sulfate concentrations and C{sub 3}A contents result in higher stresses. The results can be understood in terms of the effect of crystal surface energy and size on supersaturation and crystal growth pressure.

  19. Seven Deadliest Web Application Attacks

    CERN Document Server

    Shema, Mike

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting web applications? Then you need Seven Deadliest Web Application Attacks. This book pinpoints the most dangerous hacks and exploits specific to web applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. .. .. Attacks detailed in this book include: ..: ..; Cross-Site Scripting (XSS) ..; Cross-Site Request Fo

  20. Seven Deadliest Social Network Attacks

    CERN Document Server

    Timm, Carl

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting social networks? Then you need Seven Deadliest Social Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Social Networking Infrastruct

  1. Plasma Exchange in Severe Attacks of Neuromyelitis Optica

    Directory of Open Access Journals (Sweden)

    Mickael Bonnan

    2012-01-01

    Full Text Available Background. Neuromyelitis optica (NMO attacks are poorly controlled by steroids and evolve in stepwise neurological impairments. Assuming the strong humoral response underlying NMO attacks, plasma exchange (PLEX is an appropriate technique in severe NMO attacks. Objective. Presenting an up-to-date review of the literature of PLEX in NMO. Methods. We summarize the rationale of PLEX in relation with the physiology of NMO, the main technical aspects, and the available studies. Results. PLEX in severe attacks from myelitis or optic neuritis are associated with a better outcome, depending on PLEX delay (“time is cord and eyes”. NMO-IgG status has no influence. Finally, we build up an original concept linking the inner dynamic of the lesion, the timing of PLEX onset and the expected clinical results. Conclusion. PLEX is a safe and efficient add-on therapy in NMO, in synergy with steroids. Large therapeutic trials are required to definitely assess the procedure and define the time opportunity window.

  2. Towards a national trauma registry for the United Arab Emirates

    Directory of Open Access Journals (Sweden)

    Barka Ezedin

    2010-07-01

    Full Text Available Abstract Background Trauma is a major health problem in the United Arab Emirates (UAE as well as worldwide. Trauma registries provide large longitudinal databases for analysis and policy improvement. We aim in this paper to report on the development and evolution of a national trauma registry using a staged approach by developing a single-center registry, a two-center registry, and then a multi-center registry. The three registries were established by developing suitable data collection forms, databases, and interfaces to these databases. The first two registries collected data for a finite period of time and the third is underway. The steps taken to establish these registries depend on whether the registry is intended as a single-center or multi-center registry. Findings Several issues arose and were resolved during the development of these registries such as the relational design of the database, whether to use a standalone database management system or a web-based system, and the usability and security of the system. The inclusion of preventive medicine data elements is important in a trauma registry and the focus on road traffic collision data elements is essential in a country such as the UAE. The first two registries provided valuable data which has been analyzed and published. Conclusions The main factors leading to the successful establishment of a multi-center trauma registry are the development of a concise data entry form, development of a user-friendly secure web-based database system, the availability of a computer and Internet connection in each data collection center, funded data entry personnel well trained in extracting medical data from the medical record and entering it into the computer, and experienced personnel in trauma injuries and data analysis to continuously maintain and analyze the registry.

  3. Random Visitor: Defense against Identity Attacks in P2P Networks

    Science.gov (United States)

    Gu, Jabeom; Nah, Jaehoon; Kwon, Hyeokchan; Jang, Jonsoo; Park, Sehyun

    Various advantages of cooperative peer-to-peer networks are strongly counterbalanced by the open nature of a distributed, serverless network. In such networks, it is relatively easy for an attacker to launch various attacks such as misrouting, corrupting, or dropping messages as a result of a successful identifier forgery. The impact of an identifier forgery is particularly severe because the whole network can be compromised by attacks such as Sybil or Eclipse. In this paper, we present an identifier authentication mechanism called random visitor, which uses one or more randomly selected peers as delegates of identity proof. Our scheme uses identity-based cryptography and identity ownership proof mechanisms collectively to create multiple, cryptographically protected indirect bindings between two peers, instantly when needed, through the delegates. Because of these bindings, an attacker cannot achieve an identifier forgery related attack against interacting peers without breaking the bindings. Therefore, our mechanism limits the possibility of identifier forgery attacks efficiently by disabling an attacker's ability to break the binding. The design rationale and framework details are presented. A security analysis shows that our scheme is strong enough against identifier related attacks and that the strength increases if there are many peers (more than several thousand) in the network.

  4. Thrombolytic drugs for heart attack

    Science.gov (United States)

    ... attack URL of this page: //medlineplus.gov/ency/article/007488.htm Thrombolytic drugs for heart attack To use the sharing features on this page, ... the management of patients with non-ST-elevation acute coronary syndromes: a report ... myocardial infarction: a report of the American College of Cardiology ...

  5. Superposition Attacks on Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Funder, Jakob Løvstad; Nielsen, Jesper Buus;

    2011-01-01

    information. In this paper, we introduce a fundamentally new model of quantum attacks on classical cryptographic protocols, where the adversary is allowed to ask several classical queries in quantum superposition. This is a strictly stronger attack than the standard one, and we consider the security of...... string model. While our protocol is classical, it is sound against a cheating unbounded quantum prover and computational zero-knowledge even if the verifier is allowed a superposition attack. Finally, we consider multiparty computation and show that for the most general type of attack, simulation based...... several primitives in this model. We show that a secret-sharing scheme that is secure with threshold $t$ in the standard model is secure against superposition attacks if and only if the threshold is lowered to $t/2$. We use this result to give zero-knowledge proofs for all of NP in the common reference...

  6. Thyroid Cancer and Tumor Collaborative Registry (TCCR)

    OpenAIRE

    Shats, Oleg; Goldner, Whitney; Feng, Jianmin; Sherman, Alexander; Smith, Russell B.; Sherman, Simon

    2016-01-01

    A multicenter, web-based Thyroid Cancer and Tumor Collaborative Registry (TCCR, http://tccr.unmc.edu) allows for the collection and management of various data on thyroid cancer (TC) and thyroid nodule (TN) patients. The TCCR is coupled with OpenSpecimen, an open-source biobank management system, to annotate biospecimens obtained from the TCCR subjects. The demographic, lifestyle, physical activity, dietary habits, family history, medical history, and quality of life data are provided and may ...

  7. Charity, Publicity, and the Donation Registry

    OpenAIRE

    Cooter, Robert D; Broughman, Brian

    2005-01-01

    Many Americans donate little or nothing to charity. Our social environment is the cause, not human nature. Experiments show that people are generous when their contributions are observable by others. Taking advantage of this fact, we propose a small policy change to increase transparency and elicit generosity. Specifically, we propose that the IRS establish a voluntary donation registry to publicize the proportion of income that individuals donate to charity. Although participation would be v...

  8. Charity, Publicity, and the Donation Registry

    OpenAIRE

    Cooter, Robert D; Broughman, Brian

    2005-01-01

    Many Americans donate little or nothing to charity. Our social environment is the cause, not human nature. Experiments show that people are generous when their contributions are observable by others. Taking advantage of this fact, we propose a small policy change to increase transparency and elicit generosity. Specifically, we propose that the IRS establish a voluntary donation registry to publicize the proportion of income that individuals donate to charity. Although participation would ...

  9. Registry of Mineral and Petroleum Titles

    Energy Technology Data Exchange (ETDEWEB)

    Maclellan, I. M.; Kaizer, J. L.; McCulloch, P. D.; Ratcliffe, R.; Wenning, A. S. [Nova Scotia Dept. of Natural Resources, Halifax, NS (Canada)

    2000-07-01

    Activities of the Nova Scotia Registry of Mineral and Petroleum Titles are described, including statistical information about staking and mining activity in the province during 1999. In terms of activities, the Registry receives applications and issues licenses and leases for mineral and petroleum rights, receives statements of exploration expenditures and assessment reports that pertain to renewal of licenses and leases, maintains maps showing the disposition of lands under license or lease, and maintains a system of prospector registration. In addition, the Registry processes applications for underground gas storage rights and treasure trove rights and maintains a database of information concerning production and employment in Nova Scotia mines and quarries. At the end 1999 there were 230,660 hectares under exploration licence. Exploration expenditures, including engineering, economic and feasibility studies during 1999 totalled $4.2 million, mostly by junior mining companies searching for industrial mineral commodities. Mining activity during 1999 generated revenues of $340 million. Coal production dropped by 25 per cent, due mainly to the closure of the Phalen Mine. Gypsum production was up to 7.9 million tonnes; shipments of cement, barite and clay products also increased during 1999; salt production remained unchanged from 1998 with 842,000 tonnes. Production of construction aggregates totalled 10.6 million tonnes, down slightly from the year before. Mineral industry employment was roughly 2,500 persons, down by 24 per cent from 1998 levels, due primarily to the closure of the Phalen Mine.

  10. WILD PIG ATTACKS ON HUMANS

    Energy Technology Data Exchange (ETDEWEB)

    Mayer, J.

    2013-04-12

    Attacks on humans by wild pigs (Sus scrofa) have been documented since ancient times. However, studies characterizing these incidents are lacking. In an effort to better understand this phenomenon, information was collected from 412 wild pig attacks on humans. Similar to studies of large predator attacks on humans, data came from a variety of sources. The various attacks compiled occurred in seven zoogeographic realms. Most attacks occurred within the species native range, and specifically in rural areas. The occurrence was highest during the winter months and daylight hours. Most happened under non-hunting circumstances and appeared to be unprovoked. Wounded animals were the chief cause of these attacks in hunting situations. The animals involved were typically solitary, male and large in size. The fate of the wild pigs involved in these attacks varied depending upon the circumstances, however, most escaped uninjured. Most human victims were adult males traveling on foot and alone. The most frequent outcome for these victims was physical contact/mauling. The severity of resulting injuries ranged from minor to fatal. Most of the mauled victims had injuries to only one part of their bodies, with legs/feet being the most frequent body part injured. Injuries were primarily in the form of lacerations and punctures. Fatalities were typically due to blood loss. In some cases, serious infections or toxemia resulted from the injuries. Other species (i.e., pets and livestock) were also accompanying some of the humans during these attacks. The fates of these animals varied from escaping uninjured to being killed. Frequency data on both non-hunting and hunting incidents of wild pig attacks on humans at the Savannah River Site, South Carolina, showed quantitatively that such incidents are rare.

  11. The Cyber-Physical Attacker

    DEFF Research Database (Denmark)

    Vigo, Roberto

    2012-01-01

    The world of Cyber-Physical Systems ranges from industrial to national interest applications. Even though these systems are pervading our everyday life, we are still far from fully understanding their security properties. Devising a suitable attacker model is a crucial element when studying the...... security properties of CPSs, as a system cannot be secured without defining the threats it is subject to. In this work an attacker scenario is presented which addresses the peculiarities of a cyber-physical adversary, and we discuss how this scenario relates to other attacker models popular in the security...

  12. Suicide Attacks on the Rise

    OpenAIRE

    CCS Research Staff

    2008-01-01

    This article was published in Culture and Conflict Review (March 2008), v.2 no.2 "The last six weeks has brought some of the worst violence in Afghanistan since 2001. In 2007, there were more than 230 Improvised Explosive Device (IED) attacks and 145 suicide attacks. Casualty rates were at least 25 percent higher in 2007 than the previous year. In the past 18 months, IED attacks have targeted numerous police and army busses, a group of legislators outside a factory at Baghlan, a five-star ...

  13. Lifestyle Changes for Heart Attack Prevention

    Science.gov (United States)

    ... from the NHLBI on Twitter. How Can a Heart Attack Be Prevented? Lowering your risk factors for coronary ... This Content: NEXT >> Featured Video What is a heart attack? 05/22/2014 Describes how a heart attack ...

  14. Social Engineering:A Partial Technical attack

    OpenAIRE

    P.S.Maan; Manish Sharma

    2012-01-01

    This paper suggests the crystal clear concept behind the social engineering attack. Basically social engineering is a non technical attack. But social engineering attack is an attack on human psychology to get the information, but using what? Basically it is an attack on human psychology by using some technical skills or technology. Social engineering attack has many types like fake mail, telephonic cheat etc. which are impossible without any technical skills, so in this paper we suggest that...

  15. Genetic attack on neural cryptography

    Science.gov (United States)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  16. Genetic attack on neural cryptography

    International Nuclear Information System (INIS)

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size

  17. Acute ischemic cerebral attack

    Directory of Open Access Journals (Sweden)

    Franco-Garcia Samir

    2010-12-01

    Full Text Available The decrease of the cerebral blood flow below the threshold of autoregulation led to changes of cerebral ischemia and necrosis that traduce in signs and symtoms of focal neurologic dysfunction called acute cerebrovascular symdrome (ACS or stroke. Two big groups according to its etiology are included in this category the hemorragic that constitue a 20% and the ischemic a 80% of cases. Great interest has wom the ischemic ACS because of its high social burden, being the third cause of no violent death in the world and the first of disability. Many risk factors favor the presentation of these events and some of them are susceptible of modification and therfore are objetives of primary prevention just as the control of diabetes, hypertension and the practice of healthy habits of life. The advances in the knowledge of the physiopatology, had taken to sustantial change in the nomenclature and management of ischemic ACS. Within these changes it was substituted the term cerebrovascular accident fo acute stroke, making emphasis in the key rol of a timely management with goals of time similiar to the acute coronary syndrome. It was redefined the time of acute ischemic attack to a one hour. Once stablished the cerebrovascular attack the semiology of symtoms with frecuency will led us make a topographic diagnosis of the in injury that joined to the cerebral TAC will allow us to exclude an hemorragic event and to start the treatment. In the management of these patients its essential the coordination of the differents teams of work, from the early recognition of symtoms on the part of patients andthe family, the rapid activation and response of emergency systems and the gearing of health care institutions. Are pillars of treatment: the abcde of reanimatiion, to avoid the hiperpirexis, the seizures, the hipoglicemy, the hiperglicemy, to achieve the thrombolysis in the first three hours of the begining of symtoms, to use antiplatelets, antithrombotic profilaxis

  18. Panic Attacks and Panic Disorders

    OpenAIRE

    Fontaine, Rejean; Beaudry, Paul

    1984-01-01

    The diagnosis and treatment of panic attacks and panic disorders have progressed markedly during the last decade. Unlike phobic disorders, the key feature of panic disorders is the many panic attacks that are mostly spontaneous or not caused by a particular situation. Recent studies linking its pathogenesis with lactate infusion tests are reviewed. For treatment, psychotherapy combined with in vivo exposure and pharmacotherapy is more efficacious than either treatment alone. In most cases, ps...

  19. Impersonation Attack on EKE Protocol

    OpenAIRE

    Shirisha Tallapally

    2010-01-01

    The key exchange protocol is one of the most elegant ways of establishing secure communication between pair of users by using a session key. The passwords are of low entropy, hence the protocol should resist all types of password guessing attacks. Recently ECC-3PEKE protocol has been proposed by Chang and Chang. They claimed the protocol is secure, efficient and practical. Unless their claims Yoon and Yoo presented an Undetectable online password guessing attack on the above protocol. A key r...

  20. Migraine attacks the Basal Ganglia

    OpenAIRE

    Bigal Marcelo; Brawn Jennifer; Pendse Gautam; Nutile Lauren; Becerra Lino; Maleki Nasim; Burstein Rami; Borsook David

    2011-01-01

    Abstract Background With time, episodes of migraine headache afflict patients with increased frequency, longer duration and more intense pain. While episodic migraine may be defined as 1-14 attacks per month, there are no clear-cut phases defined, and those patients with low frequency may progress to high frequency episodic migraine and the latter may progress into chronic daily headache (> 15 attacks per month). The pathophysiology of this progression is completely unknown. Attempting to unr...

  1. National dose registry in Switzerland - ten years of experience

    International Nuclear Information System (INIS)

    The Swiss National Dose Registry came into operation 1990. In the ten years of operating, the Registry has proved to be a valuable instrument for monitoring, controlling and registering of occupational radiation exposure in the country. When the Registry was designed, three focal points were taken into account: the Registry should fit in the rather complicated organization of the personal dosimetry in Switzerland, it should allow very high flexibility for future developments (computer and database technologies) and it should be possible to use it actively for different purposes and not only as an archive database. The experience has shown that the features of the Registry that allow fulfilling these conditions are crucial to a perfect operation of the Registry. (author)

  2. [Influence of registries on the quality of care].

    Science.gov (United States)

    Stengel, D; Dreinhöfer, K; Kostuj, T

    2016-06-01

    Registries are a topic of lively debate amongst all stakeholders in healthcare, politics and economics. In general, registries are national or international (prospective) databases documenting the current state of diagnostic, therapeutic and long-term outcome variables of subjects with a distinct condition or health problem. The access to and handling of registry information is subject to strict legal, methodological and ethical principles and regulations before these data can be scientifically utilized and reentered into the routine daily practice. Because of the representativeness and reality of data, registries are widely regarded as the backbone of health systems and budgets.Currently there is only indirect evidence that registries influence outcomes and the quality of care. Recent statistical techniques may allow quasi-experimental modelling of observational information. In orthopedic and trauma surgery, current and upcoming registries should be wisely utilized to develop and evaluate innovations and to make informed decisions relevant to care. PMID:27164976

  3. Social Engineering:A Partial Technical attack

    Directory of Open Access Journals (Sweden)

    P. S. Maan

    2012-03-01

    Full Text Available This paper suggests the crystal clear concept behind the social engineering attack. Basically social engineering is a non technical attack. But social engineering attack is an attack on human psychology to get the information, but using what? Basically it is an attack on human psychology by using some technical skills or technology. Social engineering attack has many types like fake mail, telephonic cheat etc. which are impossible without any technical skills, so in this paper we suggest that , it is a partial technical attack and can be divided in human based and typical computer based social engineering attack.

  4. Australia and New Zealand Dialysis and Transplant Registry

    OpenAIRE

    McDonald, Stephen P

    2015-01-01

    The ANZDATA Registry includes all patients treated with renal replacement therapy (RRT) throughout Australia and New Zealand. Funding is predominantly from government sources, together with the non-government organization Kidney Health Australia. Registry operations are overseen by an Executive committee, and a Steering Committee with wide representation. Data is collected from renal units throughout Australia and New Zealand on a regular basis, and forwarded to the Registry. Areas covered in...

  5. Prostate Cancer Registries: Current Status and Future Directions

    OpenAIRE

    Gandaglia, G; Bray, F.; Cooperberg, MR; Karnes, RJ; Leveridge, MJ; Moretti, K; Murphy, DG; Penson, DF; Miller, DC

    2016-01-01

    © 2015 European Association of Urology. Context: Disease-specific registries that enroll a considerable number of patients play a major role in prostate cancer (PCa) research. Objective: To evaluate available registries, describe their strengths and limitations, and discuss the potential future role of PCa registries in outcomes research. Evidence acquisition: We performed a literature review of the Medline, Embase, and Web of Science databases. The search strategy included the terms prostate...

  6. Show Me The Data: The Pilot UK Research Data Registry

    Directory of Open Access Journals (Sweden)

    Alexander Ball

    2014-07-01

    Full Text Available The UK Research Data (Metadata Registry (UKRDR pilot project is implementing a prototype registry for the UK’s research data assets, enabling the holdings of subject-based data centres and institutional data repositories alike to be searched from a single location. The purpose of the prototype is to prove the concept of the registry, and uncover challenges that will need to be addressed if and when the registry is developed into a sustainable service. The prototype is being tested using metadata records harvested from nine UK data centres and the data repositories of nine UK universities.

  7. The quality and use of two health registries in Russia

    OpenAIRE

    Vaktskjold, Arild

    2012-01-01

    Objectives. In the late 1990s, a birth registry (KBR) was set up for theborough of Mončegorsk in the Kola Peninsula and a cancer registry forArkhangelskaja Oblast (AO), both located in north-west Russia. Thework in this thesis involved an assessment of the quality and content ofthe two registries (1,2), including an estimation of the site- and genderspecificcancer incidence in AO (2). The work also involved the use ofthe birth registry to study the effect of maternal exposure to nickel atthe ...

  8. The Danish Cerebral Palsy Registry. A registry on a specific impairment

    DEFF Research Database (Denmark)

    Uldall, P; Michelsen, S I; Topp, M;

    2001-01-01

    form. The uptake area is eastern Denmark, covering about 50% of the population, but the rest of Denmark is planned to be included from 2001. The Registry is large, well established and validated, and the definitions and collection procedures have not changed through several decades. It therefore has...

  9. 9/11-Related Experiences and Tasks of Landfill and Barge Workers: Qualitative Analysis from the World Trade Center Health Registry

    OpenAIRE

    Cone James E; Scheu Katherine E; Ekenga Christine C; Stellman Steven D; Farfel Mark R

    2011-01-01

    Abstract Background Few studies have documented the experiences of individuals who participated in the recovery and cleanup efforts at the World Trade Center Recovery Operation at Fresh Kills Landfill, on debris loading piers, and on transport barges after the September 11, 2001 terrorist attack. Methods Semi-structured telephone interviews were conducted with a purposive sample of workers and volunteers from the World Trade Center Health Registry. Qualitative methods were used to analyze the...

  10. Thyroid Cancer and Tumor Collaborative Registry (TCCR).

    Science.gov (United States)

    Shats, Oleg; Goldner, Whitney; Feng, Jianmin; Sherman, Alexander; Smith, Russell B; Sherman, Simon

    2016-01-01

    A multicenter, web-based Thyroid Cancer and Tumor Collaborative Registry (TCCR, http://tccr.unmc.edu) allows for the collection and management of various data on thyroid cancer (TC) and thyroid nodule (TN) patients. The TCCR is coupled with OpenSpecimen, an open-source biobank management system, to annotate biospecimens obtained from the TCCR subjects. The demographic, lifestyle, physical activity, dietary habits, family history, medical history, and quality of life data are provided and may be entered into the registry by subjects. Information on diagnosis, treatment, and outcome is entered by the clinical personnel. The TCCR uses advanced technical and organizational practices, such as (i) metadata-driven software architecture (design); (ii) modern standards and best practices for data sharing and interoperability (standardization); (iii) Agile methodology (project management); (iv) Software as a Service (SaaS) as a software distribution model (operation); and (v) the confederation principle as a business model (governance). This allowed us to create a secure, reliable, user-friendly, and self-sustainable system for TC and TN data collection and management that is compatible with various end-user devices and easily adaptable to a rapidly changing environment. Currently, the TCCR contains data on 2,261 subjects and data on more than 28,000 biospecimens. Data and biological samples collected by the TCCR are used in developing diagnostic, prevention, treatment, and survivorship strategies against TC. PMID:27168721

  11. The national registry for radiation workers

    International Nuclear Information System (INIS)

    The National Registry for Radiation Workers (NRRW) was set up by the National Radiological Protection Board in 1976. The analysis of registry data has four aims: a) To determine whether there is any evidence of differences in the causes of and ages at death of workers exposed to different levels of radiation and, if any differences are found, whether it seems likely that they can be attributed to radiation. b) To estimate the magnitude of the risk, if any differences are found, that seem likely to be attributable to radiation. c) To estimate bounds to the possible risk for particular types of malignancy, such as leukemia. d) To compare the mortality experience of radiation workers with national mortality data and also with that of other industrial groups for whom data exist. If current estimates of the risks of ionizing radiation are correct, very few deaths will be induced in the study population and it will be impossible to detect them statistically. The NRRW currently includes records for over 60,000 individuals. 6 refs

  12. Thyroid Cancer and Tumor Collaborative Registry (TCCR)

    Science.gov (United States)

    Shats, Oleg; Goldner, Whitney; Feng, Jianmin; Sherman, Alexander; Smith, Russell B.; Sherman, Simon

    2016-01-01

    A multicenter, web-based Thyroid Cancer and Tumor Collaborative Registry (TCCR, http://tccr.unmc.edu) allows for the collection and management of various data on thyroid cancer (TC) and thyroid nodule (TN) patients. The TCCR is coupled with OpenSpecimen, an open-source biobank management system, to annotate biospecimens obtained from the TCCR subjects. The demographic, lifestyle, physical activity, dietary habits, family history, medical history, and quality of life data are provided and may be entered into the registry by subjects. Information on diagnosis, treatment, and outcome is entered by the clinical personnel. The TCCR uses advanced technical and organizational practices, such as (i) metadata-driven software architecture (design); (ii) modern standards and best practices for data sharing and interoperability (standardization); (iii) Agile methodology (project management); (iv) Software as a Service (SaaS) as a software distribution model (operation); and (v) the confederation principle as a business model (governance). This allowed us to create a secure, reliable, user-friendly, and self-sustainable system for TC and TN data collection and management that is compatible with various end-user devices and easily adaptable to a rapidly changing environment. Currently, the TCCR contains data on 2,261 subjects and data on more than 28,000 biospecimens. Data and biological samples collected by the TCCR are used in developing diagnostic, prevention, treatment, and survivorship strategies against TC. PMID:27168721

  13. VoIP Malware: Attack Tool & Attack Scenarios

    OpenAIRE

    Nassar, Mohamed; State, Radu; Festor, Olivier

    2009-01-01

    With the appearance of new Internet services like Voice over IP and IP television, malwares are in the way to update and extend their targets. In this paper, we discuss the emergence of a new generation of malwares attacking VoIP infrastructures and services. Such malwares constitute a real threat to the currently deployed VoIP architectures without strong security measures in place. We present one implemented environment that can be used to evaluate such attacks. Our ``VoIP bots'' support a ...

  14. Encouraging Health Information Management Graduates to Pursue Cancer Registry Careers.

    Science.gov (United States)

    Peterson, Jennifer

    2016-01-01

    The cancer registry profession has grown dramatically since its inception in 1926. Certified tumor registrars (CTRs) have become an integral part of the cancer care team by providing quality cancer data for research, statistical purposes, public health, and cancer control. In addition, CTRs have been found to be valuable in other cancer and health-related fields. Based on the need for high-quality, accurate data, the National Cancer Registrars Association (NCRA), the certification body for CTRs, has increased the educational requirement for eligibility for the CTR certification exam. This has resulted in fewer individuals who are able to meet the requirements for CTR certification. In addition, the existing cancer registry workforce is, on average, older than other allied health professions, and therefore will face an increasing number of retirements in the next few years. The high demand for CTRs, the decreased pool of CTR-eligible applicants, and the aging cancer registry workforce has resulted in an existing shortage that will only get worse as the population ages and the incidence of cancer increases. Health information management (HIM) students are well suited to pursuing further training in the cancer registry field and gaining the CTR credential. HIM students or new graduates have the needed skill set and education to pursue a cancer registry career. There are many avenues HIM educational programs can take to encourage students to pursue CTR certification and a cancer registry career. Including cancer registry functions in courses throughout the HIM curriculum, bringing in cancer registry speakers, encouraging networking, and promoting the cancer registry field and profession in general are just a few of the methods that HIM programs can use to raise awareness of and promote a cancer registry career to their students. Illinois State University has used these methods and has found them to be successful in encouraging a percentage of their graduates to pursue

  15. RESIST SRP AGAINST WORMHOLE ATTACK

    Directory of Open Access Journals (Sweden)

    Marjan Kuchaki Rafsanjani

    2013-06-01

    Full Text Available Ad-hoc networks refer to temporary or interim networks which form for special purposes. Actually they are wireless networks with mobile nodes. These networks use no network assisting element for path routing and in these networks available nodes are responsible for path routing. Therefore when malicious nodes want to find a way to interfere with the path routing then the existence of a secure route protocol (SRP can prevent the interference. SRP protocol is one of the secure algorithms of path routing protocol but it is notresistant against wormhole attack. Wormhole attack is considered as a subtle attack in which two malicious nodes make a short connection in network's topology through private or implicit connection and represent two non neighbor nodes as neighbors and prevent the correctoperation of path routing protocol by using this method. One of the methods of preventing wormhole attack is by using packet leashes. We try to decrease the wormhole attack occurrence in this routing protocol by a kind of packet leashes called temporal leashes. We alsowill minimize problems resulting from using temporal leashes by different methods and modifications in its structure.

  16. The 2006 ERA-EDTA Registry annual report: a precis

    NARCIS (Netherlands)

    V.S. Stel; A. Kramer; C. Zoccali; K.J. Jager

    2009-01-01

    Introduction: This paper provides a summary of the 2006 European Renal Association-European Dialysis and Transplant Association (ERA-EDTA) Registry report. Methods: Data on renal replacement therapy (RRT) were available from 50 national and regional registries in 28 countries in Europe and bordering

  17. Data quality in the Danish National Acute Leukemia Registry

    DEFF Research Database (Denmark)

    Ostgård, Lene Sofie Granfeldt; Nørgaard, Jan Maxwell; Severinsen, Marianne Tang;

    2013-01-01

    The Danish National Acute Leukemia Registry (DNLR) has documented coverage of above 98.5%. Less is known about the quality of the recorded data.......The Danish National Acute Leukemia Registry (DNLR) has documented coverage of above 98.5%. Less is known about the quality of the recorded data....

  18. The growing number of hemophilia registries : Quantity vs. quality

    NARCIS (Netherlands)

    Keipert, C; Hesse, J; Haschberger, B; Heiden, M; Seitz, R; van den Berg, H M; Hilger, A

    2015-01-01

    Registries for rare diseases provide a tool for obtaining an overview of the clinical situation and can be used to discover points of improvement and to monitor long-term safety. Registries could also become a powerful tool to provide supporting information for marketing authorization. There is an u

  19. Paper 6: EUROCAT member registries: organization and activities

    DEFF Research Database (Denmark)

    Greenlees, Ruth; Neville, Amanda; Addor, Marie-Claude;

    2011-01-01

    EUROCAT is a network of population-based congenital anomaly registries providing standardized epidemiologic information on congenital anomalies in Europe. There are three types of EUROCAT membership: full, associate, or affiliate. Full member registries send individual records of all congenital a...

  20. Design of a prospective, multinational registry to evaluate patients hospitalized with hyponatremia: the HN Registry

    Directory of Open Access Journals (Sweden)

    Hauptman PJ

    2013-08-01

    Full Text Available Paul J Hauptman,1 Arthur Greenberg,2 Joseph G Verbalis,3 Alpesh Amin,4 Samuel Sigal,5 Jun Chiong,6 Sandra Chase,7 Joseph Dasta81Saint Louis University School of Medicine, St Louis, MO, USA; 2Duke University Medical Center, Durham, NC, USA; 3Georgetown University Medical Center, Washington, DC, USA; 4University of California, Irvine, CA, USA; 5New York University Langone Medical Center, New York, NY, USA; 6Loma Linda University, Loma Linda, CA, USA; 7Otsuka America Pharmaceutical, Inc, Princeton, NJ, USA; 8University of Texas at Austin, TX, USABackground: Hyponatremia is a prevalent condition in patients hospitalized across a broad range of conditions, including heart failure, cirrhosis, and the syndrome of inappropriate antidiuretic hormone (SIADH secretion. Whether present on admission or developing during hospitalization, hyponatremia has been associated with increased mortality, longer hospital stays, and higher costs. Little is known, however, about its management and outcomes outside of clinical trial settings.Methods: The Hyponatremia Registry (HN Registry is a prospective, observational, multicenter, multinational study of patients hospitalized with either hypervolemic hyponatremia (cirrhosis and heart failure in the United States or euvolemic hyponatremia (SIADH in both the United States and Europe. Study enrollment began in September 2010 at community, tertiary, and academic medical centers. Overall, the HN Registry is expected to enroll >5,000 patients with hyponatremia, at >280 sites. Data will be used to characterize demographic and clinical characteristics of patients hospitalized with hyponatremia, evaluate the comparative effectiveness of available treatment modalities, and document and compare length of hospital stay as a reflection of resource use associated with hospital management.Discussion: Despite better understanding of the clinical consequences, economic impact, and prognostic significance of euvolemic and hypervolemic

  1. 76 FR 36896 - Notice of Establishment of a New Plant Protection and Quarantine Stakeholder Registry

    Science.gov (United States)

    2011-06-23

    ... Protection and Quarantine Stakeholder Registry AGENCY: Animal and Plant Health Inspection Service, USDA... of interest. FOR FURTHER INFORMATION CONTACT: For information on the PPQ Stakeholder Registry... Protection and Quarantine (PPQ) stakeholder registry is an email subscription service that allows...

  2. The GEOSS Component and Service Registry

    Science.gov (United States)

    Di, L.; Bai, Y.; Shen, D.; Shao, Y.; Shrestha, R.; Wang, H.; Nebert, D. D.

    2011-12-01

    Petabytes of Earth science data have been accumulated through space- and air-borne Earth observation programs during the last several decades. The data are valuable both scientifically and socioeconomically. The value of these data could be further increased significantly if the data from these programs can be easily discovered, accessed, integrated, and analyzed. The Global Earth Observation System of Systems (GEOSS) is addressing this need. Coordinated by the Group on Earth Observations (or GEO), a voluntary partnership of 86 governments, the European Commission, and 61 intergovernmental, international, and regional organizations has been working on implementing GEOSS for a number of years. After four years of international collaboration, the GEOSS Common Infrastructure (GCI) has been established. GCI consists of the Standards and Interoperability Registry (SIR), the Component and Service Registry (CSR), the GEO clearinghouse, and the GEO Portal. The SIR maintains the list of the public standards recognized by the GEO. CSR provides a centralized registry for available Earth Observation resources. The GEO clearinghouse works as a single search facility for GEOSS-wide resources and the GEO Portal provides an integrated Web-based interfaces for users. Since January 2007, researchers at CSISS, GMU have collaborated with officials from the Federal Geographic Data Committee (FGDC) on designing, implementing, maintaining, and upgrading CSR. Currently CSR provides the following capabilities for data providers: user registration, resource registration, and service interface registration. The CSR clients can discover the resources registered in CSR through OGC Catalog for Web (CSW), UUDI, and other standard interfaces. During the resource registration process, providers may define detailed descriptive information for their resources, in particular, the targeted societal benefit area and sub-areas of focus, and the targeted critical Earth Observations. The service

  3. Novel features of 3q29 deletion syndrome: Results from the 3q29 registry.

    Science.gov (United States)

    Glassford, Megan R; Rosenfeld, Jill A; Freedman, Alexa A; Zwick, Michael E; Mulle, Jennifer G

    2016-04-01

    3q29 deletion syndrome is caused by a recurrent, typically de novo heterozygous 1.6 Mb deletion, but because incidence of the deletion is rare (1 in 30,000 births) the phenotype is not well described. To characterize the range of phenotypic manifestations associated with 3q29 deletion syndrome, we have developed an online registry (3q29deletion.org) for ascertainment of study subjects and phenotypic data collection via Internet-based survey instruments. We report here on data collected during the first 18 months of registry operation, from 44 patients. This is the largest cohort of 3q29 deletion carriers ever assembled and surveyed in a systematic way. Our data reveal that 28% of registry participants report neuropsychiatric phenotypes, including anxiety disorder, panic attacks, depression, bipolar disorder, and schizophrenia. Other novel findings include a high prevalence (64%) of feeding problems in infancy and reduced weight at birth for 3q29 deletion carriers (average reduction 13.9 oz (394 g), adjusted for gestational age and sex, P = 6.5e-07). We further report on the frequency of heart defects, autism, recurrent ear infections, gastrointestinal phenotypes, and dental phenotypes, among others. We also report on the expected timing of delayed developmental milestones. This is the most comprehensive description of the 3q29 deletion phenotype to date. These results are clinically actionable toward improving patient care for 3q29 deletion carriers, and can guide the expectations of physicians and parents. These data also demonstrate the value of patient-reported outcomes to reveal the full phenotypic spectrum of rare genomic disorders. © 2016 Wiley Periodicals, Inc. PMID:26738761

  4. The Twin Research Registry at SRI International.

    Science.gov (United States)

    Krasnow, Ruth E; Jack, Lisa M; Lessov-Schlaggar, Christina N; Bergen, Andrew W; Swan, Gary E

    2013-02-01

    The Twin Research Registry (TRR) at SRI International is a community-based registry of twins established in 1995 by advertising in local media, mainly on radio stations and in newspapers. As of August 2012, there are 3,120 same- and opposite-sex twins enrolled; 86% are 18 years of age or older (mean age 44.9 years, SD 16.9 years) and 14% less than 18 years of age (mean age 8.9 years, SD 4.5); 67% are female, and 62% are self-reported monozygotic (MZ). More than 1,375 twins have participated in studies over the last 15 years in collaboration with the University of California Medical Center in San Francisco, the University of Texas MD Anderson Cancer Center, and the Stanford University School of Medicine. Each twin completes a registration form with basic demographic information either online at the TRR Web site or during a telephone interview. Contact is maintained with members by means of annual newsletters and birthday cards. The managers of the TRR protect the confidentiality of twin data with established policies; no information is given to other researchers without prior permission from the twins; and all methods and procedures are reviewed by an Institutional Review Board. Phenotypes studied thus far include those related to nicotine metabolism, mutagen sensitivity, pain response before and after administration of an opioid, and a variety of immunological responses to environmental exposures, including second-hand smoke and vaccination for seasonal influenza virus and Varicella zoster virus. Twins in the TRR have participated in studies of complex, clinically relevant phenotypes that would not be feasible to measure in larger samples. PMID:23084148

  5. Pilot Aircraft Interface Objectives/Rationale

    Science.gov (United States)

    Shively, Jay

    2010-01-01

    Objective: Database and proof of concept for guidelines for GCS compliance a) Rationale: 1) Provide research test-bed to develop guidelines. 2) Modify GCS for NAS Compliance to provide proof of concept. b) Approach: 1) Assess current state of GCS technology. 2) Information Requirements Definition. 3) SME Workshop. 4) Modify an Existing GCS for NAS Compliance. 5) Define exemplar UAS (choose system to develop prototype). 6) Define Candidate Displays & Controls. 7) Evaluate/ refine in Simulations. 8) Demonstrate in flight. c) Deliverables: 1) Information Requirements Report. 2) Workshop Proceedings. 3) Technical Reports/ papers on Simulations & Flight Demo. 4) Database for guidelines.

  6. Rationale for reduced tornado design bases

    International Nuclear Information System (INIS)

    This paper provides a rationale for relaxing the present NRC tornado design requirements, which are based on a design basis tornado (DBT) whose frequency of exceedance is 10-7 per year. It is proposed that a reduced DBT frequency of 10-5 to 10-6 per year is acceptable. This change in the tornado design bases for LMFBRs (and possibly all types of nuclear plants) is justified based on (1) existing NRC regulations and guidelines, (2) probabilistic arguments, (3) consistency with NRC trial safety goals, and (4) cost-benefit analysis

  7. Rationales of Verse: Poe and Other Critics

    OpenAIRE

    Barragão, Fernando Pedro Cleto Rodrigues

    2010-01-01

    “The Rationale of Verse” is probably among the less widely known theoretic/critical essays by Edgar Allan Poe. Nevertheless, it is a text whose rediscovery matters due to the pertinence of most of Poe’s conceptions regarding topics such as prosody and the correct scansion of a poem (if there is such a thing). Poe’s essay is also surprising because of the author’s proposal of a new method for scanning verse based on a musical notation. In this context, other authors such as Gerard Manley Hopki...

  8. Automated Generation of Attack Trees

    DEFF Research Database (Denmark)

    Vigo, Roberto; Nielson, Flemming; Nielson, Hanne Riis

    2014-01-01

    Attack trees are widely used to represent threat scenarios in a succinct and intuitive manner, suitable for conveying security information to non-experts. The manual construction of such objects relies on the creativity and experience of specialists, and therefore it is error-prone and impractica...

  9. Television Journalism During Terror Attacks

    DEFF Research Database (Denmark)

    Mogensen, Kirsten

    This article views television news coverage of ongoing terrorist attacks and their immediate aftermath as a special genre within journalism, and describes norms connected with the genre. The description is based on qualitative analyses of the coverage on the major American networks in the fi rst ...

  10. Television journalism during terror attacks

    DEFF Research Database (Denmark)

    Mogensen, Kirsten

    2008-01-01

    This article views television news coverage of ongoing terrorist attacks and their immediate aftermath as a special genre within journalism, and describes norms connected with the genre. The description is based on qualitative analyses of the coverage on major American networks the first 24 hours...

  11. FLOODING ATTACK AWARE SECURE AODV

    Directory of Open Access Journals (Sweden)

    S. Madhavi

    2013-01-01

    Full Text Available Providing security in a Mobile Ad hoc Network (MANET is a challenging task due to its inherent nature. Flooding is a type of Denial of Service (DoS attack in MANET. Intentional flooding may lead to disturbances in the networking operation. This kind of attack consumes battery power, storage space and bandwidth. Flooding the excessive number of packets may degrade the performance of the network. This study considers hello flooding attack. As the hello packets are continuously flooded by the malicious node, the neighbor node is not able to process other packets. The functioning of the legitimate node is diverted and destroys the networking operation. Absence of hello packet during the periodical hello interval may lead to wrong assumption that the neighbor node has moved away. So one of the intermediate neighbor nodes sends Route Error (RERR message and the source node reinitiates the route discovery process. In a random fashion the hello interval values are changed and convey this information to other nodes in the network in a secured manner. This study identifies and prevents the flooding attack. This methodology considers the performance parameters such as packet delivery ratio, delay and throughput. This algorithm is implemented in Secure AODV and tested in ad hoc environment. The result of the proposed algorithm decreases the control overhead by 2%.

  12. The Timing of Terrorist Attacks

    DEFF Research Database (Denmark)

    Jensen, Thomas

    2016-01-01

    I use a simple optimal stopping model to derive policy relevant insights on the timing of one-shot attacks by small autonomous terrorist units or “lone wolf” individuals. A main insight is that an increase in proactive counterterrorism measures can lead to a short term increase in the number of a...

  13. Performance of attack strategies on modular networks

    CERN Document Server

    da Cunha, Bruno Requião

    2016-01-01

    Vulnerabilities of complex networks have became a trend topic in complex systems recently due to its real world applications. Most real networks tend to be very fragile to high betweenness adaptive attacks. However, recent contributions have shown the importance of interconnected nodes in the integrity of networks and module-based attacks have appeared promising when compared to traditional malicious non-adaptive attacks. In the present work we deeply explore the trade-off associated with attack procedures, introducing a generalized robustness measure and presenting an attack performance index that takes into account both robustness of the network against the attack and the run-time needed to obtained the list of targeted nodes for the attack. Besides, we introduce the concept of deactivation point aimed to mark the point at which the network stops to function properly. We then show empirically that non-adaptive module-based attacks perform better than high degree and betweenness adaptive attacks in networks ...

  14. Glocal clinical registries: pacemaker registry design and implementation for global and local integration--methodology and case study.

    Directory of Open Access Journals (Sweden)

    Kátia Regina da Silva

    Full Text Available BACKGROUND: The ability to apply standard and interoperable solutions for implementing and managing medical registries as well as aggregate, reproduce, and access data sets from legacy formats and platforms to advanced standard formats and operating systems are crucial for both clinical healthcare and biomedical research settings. PURPOSE: Our study describes a reproducible, highly scalable, standard framework for a device registry implementation addressing both local data quality components and global linking problems. METHODS AND RESULTS: We developed a device registry framework involving the following steps: (1 Data standards definition and representation of the research workflow, (2 Development of electronic case report forms using REDCap (Research Electronic Data Capture, (3 Data collection according to the clinical research workflow and, (4 Data augmentation by enriching the registry database with local electronic health records, governmental database and linked open data collections, (5 Data quality control and (6 Data dissemination through the registry Web site. Our registry adopted all applicable standardized data elements proposed by American College Cardiology / American Heart Association Clinical Data Standards, as well as variables derived from cardiac devices randomized trials and Clinical Data Interchange Standards Consortium. Local interoperability was performed between REDCap and data derived from Electronic Health Record system. The original data set was also augmented by incorporating the reimbursed values paid by the Brazilian government during a hospitalization for pacemaker implantation. By linking our registry to the open data collection repository Linked Clinical Trials (LinkedCT we found 130 clinical trials which are potentially correlated with our pacemaker registry. CONCLUSION: This study demonstrates how standard and reproducible solutions can be applied in the implementation of medical registries to constitute a re

  15. Description and Rationale for the Planning, Monitoring, and Implementation (PMI) Model: Rationale.

    Science.gov (United States)

    Cort, H. Russell

    The rationale for the Planning, Monitoring, and Implementation Model (PMI) is the subject of this paper. The Superintendent of the District of Columbia Public Schools requested a model for systematic evaluation of educational programs to determine their effectiveness. The school system's emphasis on objective-referenced instruction and testing,…

  16. Network robustness under large-scale attacks

    CERN Document Server

    Zhou, Qing; Liu, Ruifang

    2012-01-01

    Network Robustness under Large-Scale Attacks provides the analysis of network robustness under attacks, with a focus on large-scale correlated physical attacks. The book begins with a thorough overview of the latest research and techniques to analyze the network responses to different types of attacks over various network topologies and connection models. It then introduces a new large-scale physical attack model coined as area attack, under which a new network robustness measure is introduced and applied to study the network responses. With this book, readers will learn the necessary tools to

  17. Generic attack approaches for industrial control systems.

    Energy Technology Data Exchange (ETDEWEB)

    Duggan, David P.

    2006-01-01

    This report suggests a generic set of attack approaches that are expected to be used against Industrial Control Systems that have been built according to a specific reference model for control systems. The posed attack approaches are ordered by the most desirable, based upon the goal of an attacker. Each attack approach is then graded by the category of adversary that would be capable of utilizing that attack approach. The goal of this report is to identify necessary levels of security required to prevent certain types of attacks against Industrial Control Systems.

  18. Rationale and Roadmap for Moon Exploration

    Science.gov (United States)

    Foing, B. H.; ILEWG Team

    We discuss the different rationale for Moon exploration. This starts with areas of scientific investigations: clues on the formation and evolution of rocky planets, accretion and bombardment in the inner solar system, comparative planetology processes (tectonic, volcanic, impact cratering, volatile delivery), records astrobiology, survival of organics; past, present and future life. The rationale includes also the advancement of instrumentation: Remote sensing miniaturised instruments; Surface geophysical and geochemistry package; Instrument deployment and robotic arm, nano-rover, sampling, drilling; Sample finder and collector. There are technologies in robotic and human exploration that are a drive for the creativity and economical competitivity of our industries: Mecha-electronics-sensors; Tele control, telepresence, virtual reality; Regional mobility rover; Autonomy and Navigation; Artificially intelligent robots, Complex systems, Man-Machine interface and performances. Moon-Mars Exploration can inspire solutions to global Earth sustained development: In-Situ Utilisation of resources; Establishment of permanent robotic infrastructures, Environmental protection aspects; Life sciences laboratories; Support to human exploration. We also report on the IAA Cosmic Study on Next Steps In Exploring Deep Space, and ongoing IAA Cosmic Studies, ILEWG/IMEWG ongoing activities, and we finally discuss possible roadmaps for robotic and human exploration, starting with the Moon-Mars missions for the coming decade, and building effectively on joint technology developments.

  19. Hidden Attacks on Power Grid: Optimal Attack Strategies and Mitigation

    OpenAIRE

    Deka, Deepjyoti; Baldick, Ross; Vishwanath, Sriram

    2014-01-01

    Real time operation of the power grid and synchronism of its different elements require accurate estimation of its state variables. Errors in state estimation will lead to sub-optimal Optimal Power Flow (OPF) solutions and subsequent increase in the price of electricity in the market or, potentially overload and create line outages. This paper studies hidden data attacks on power systems by an adversary trying to manipulate state estimators. The adversary gains control of a few meters, and is...

  20. Perfection of Recent Attacks using IP

    Directory of Open Access Journals (Sweden)

    A. RENGARAJAN

    2012-02-01

    Full Text Available The Internet threat monitoring (ITM systems have been deployed to detect widespread attacks on the Internet in recent years. However, the effectiveness of ITM systems critically depends on the confidentiality of the location of their monitors. If adversaries learn the monitor locations of an ITM system, they can bypass the monitors and focus on the uncovered IP address space without being detected. In this paper, we study a new class of attacks, the invisible LOCalization (iLOC attack. The iLOC attack can accurately and invisibly localize monitors of ITM systems. In the iLOC attack, the attacker launches low-rate port-scan traffic, encoded with a selected pseudo noise code (PN-code, to targeted networks. While the secret PN-code is invisible to others, the attacker can accurately determine the existence of monitors in the targeted networks based on whether the PN-code is embedded in the report data queried from the data center of the ITM system. We formally analyze the impact of various parameters on attack effectiveness. We implement the iLOC attack and conduct the performance evaluation on a real-world ITM system to demonstrate the possibility of such attacks. We also conduct extensive simulations on the iLOC attack using real-world traces. Our data show that the iLOC attack can accurately identify monitors while being invisible to ITM systems. Finally, we present a set of guidelines to counteract the iLOC attack.

  1. Intermittent hypoendorphinaemia in migraine attack.

    Science.gov (United States)

    Baldi, E; Salmon, S; Anselmi, B; Spillantini, M G; Cappelli, G; Brocchi, A; Sicuteri, F

    1982-06-01

    Beta-endorphin (RIA method, previous chromatographic extraction) was evaluated in plasma of migraine sufferers in free periods and during attacks. Decreased levels of the endogenous opioid peptide were found in plasma sampled during the attacks but not in free periods. Even chronic headache sufferers exhibited significantly lowered levels of beta-endorphin, when compared with control subjects with a negative personal and family history of head pains. The mechanism of the hypoendorphinaemia is unknown: lowered levels of the neuropeptide, which controls nociception, vegetative functions and hedonia, could be important in a syndrome such as migraine, characterized by pain, dysautonomia and anhedonia. The impairment of monoaminergic synapses ("empty neuron" condition) constantly present in sufferers from serious headaches, could be due to the fact that opioid neuropeptides, because of a receptoral or metabolic impairment, poorly modulate the respective monoaminergic neurons, resulting in imbalance of synaptic neurotransmission. PMID:6290072

  2. Diabetes Ups Risk of Heart Attack Death

    Science.gov (United States)

    ... 159557.html Diabetes Ups Risk of Heart Attack Death Study points to need for better coordinated care, ... people with diabetes have a higher risk of death after a heart attack. "We knew that following ...

  3. Diabetes - preventing heart attack and stroke

    Science.gov (United States)

    ... medlineplus.gov/ency/patientinstructions/000080.htm Diabetes - preventing heart attack and stroke To use the sharing features on ... with diabetes have a higher chance of having heart attacks and strokes. Smoking and having high blood pressure ...

  4. Heart attack - what to ask your doctor

    Science.gov (United States)

    ... this page: //medlineplus.gov/ency/patientinstructions/000231.htm Heart attack - what to ask your doctor To use the ... features on this page, please enable JavaScript. A heart attack occurs when blood flow to a part of ...

  5. Being active after a heart attack (image)

    Science.gov (United States)

    ... best activity when you start exercising after a heart attack. Start slowly, and increase the amount of time ... best activity when you start exercising after a heart attack. Start slowly, and increase the amount of time ...

  6. DULOXETINE-RELATED PANIC ATTACKS

    OpenAIRE

    Sabljić, Vladimir; Rakun, Radmir; Ružić, Klementina; Grahovac, Tanja

    2011-01-01

    Side-effects arising on the grounds of antidepressant administration pose as a substantial obstacle hindering successful depressive disorder treatment. Side-effects, especially those severe or those manifested through dramatic clinical presentations such as panic attacks, make the treatment far more difficult and shake patients’ trust in both the treatment and the treating physician. This case report deals with a patient experiencing a moderately severe depressive episode, who respon...

  7. Coyote Attacks: An Increasing Suburban Problem

    OpenAIRE

    Timm, Robert M.; Baker, Rex O.; Bennett, Joe R.; Coolahan, Craig C.

    2004-01-01

    Coyote attacks on humans and pets have increased within the past 5 years in California. We discuss documented occurrences of coyote aggression and attacks on people, using data from USDA Wildlife Services, the California Department of Fish & Game, and other sources. Forty-eight such attacks on children and adults were verified from 1998 through 2003, compared to 41 attacks during the period 1988 through 1997; most incidents occurred in Southern California near the suburban-wildland interfac...

  8. Sybil attack in Wireless Sensor Network

    OpenAIRE

    Abirami.K; Santhi.B

    2013-01-01

    Wireless network is very susceptible to different types of attack. The main attack is Sybil attack, which allows forming other attacks on the network. Security is very important to the wireless network. In wireless sensor network, to verify node identities by cryptographic authentication but this is not easy because sensor node which contains limited resources. Therefore the current research is going on how to handling the situation of different traffic levels and transmission power for secur...

  9. Faked states attack and quantum cryptography protocols

    CERN Document Server

    Denny, Travis

    2011-01-01

    Leveraging quantum mechanics, cryptographers have devised provably secure key sharing protocols. Despite proving the security in theory, real-world application falls short of the ideal. Last year, cryptanalysts completed an experiment demonstrating a successful eavesdropping attack on commercial quantum key distribution (QKD) systems. This attack exploits a weakness in the typical real-world implementation of quantum cryptosystems. Cryptanalysts have successfully attacked several protocols. In this paper, we examine the Kak quantum cryptography protocol and how it may perform under such attacks.

  10. Panic attacks simulate presence of somatic illnesses

    OpenAIRE

    Latas Milan; Soldatović Ivan; Stamenović Marko; Starčević Vladan

    2009-01-01

    Introduction. Panic attacks are characterized with sudden attacks of anxiety with numerous somatic symptoms, such as palpitations, tachycardia, tachypnea, nausea, vertigo. The objective of this study was to analyze symptoms of panic attacks in patients with panic disorder, especially, to determine the specific relationship of somatic and neurological symptoms of panic attacks in boundaries of somatic systems. Material and methods. The study sample consisted of 97 patients with primary diagnos...

  11. Attacks and countermeasures on AES and ECC

    DEFF Research Database (Denmark)

    Tange, Henrik; Andersen, Birger

    2013-01-01

    AES (Advanced Encryption Standard) is widely used in LTE and Wi-Fi communication systems. AES has recently been exposed to new attacks which have questioned the overall security of AES. The newest attack is a so called biclique attack, which is using the fact that the content of the state array...

  12. Understand Your Risk of Heart Attack

    Science.gov (United States)

    ... Stroke More Understand Your Risks to Prevent a Heart Attack Updated:Aug 2,2016 Knowledge is power, so ... medication. This content was last reviewed June 2016. Heart Attack • Home • About Heart Attacks Acute Coronary Syndrome (ACS) • ...

  13. Attacks and countermeasures on AES and ECC

    DEFF Research Database (Denmark)

    Tange, Henrik; Andersen, Birger

    foreseeable while the rounds are performed. ECC (Elliptic Curve Cryptography) is used as a public key crypto system with the key purpose of creating a private shared between two participants in a communication network. Attacks on ECC include the Pohlig-Hellman attack and the Pollard's rho attack. Furthermore...

  14. A Novel Attack against Android Phones

    CERN Document Server

    Backes, Michael; von Styp-Rekowsky, Philipp

    2011-01-01

    In the first quarter of 2011, Android has become the top-selling operating system for smartphones. In this paper, we present a novel, highly critical attack that allows unprompted installation of arbitrary applications from the Android Market. Our attack is based on a single malicious application, which, in contrast to previously known attacks, does not require the user to grant it any permissions.

  15. The National Anesthesia Clinical Outcomes Registry.

    Science.gov (United States)

    Liau, Adrian; Havidich, Jeana E; Onega, Tracy; Dutton, Richard P

    2015-12-01

    The Anesthesia Quality Institute (AQI) was chartered in 2008 by the American Society of Anesthesiologists to develop the National Anesthesia Clinical Outcomes Registry (NACOR). In this Technical Communication, we will describe how data enter NACOR, how they are authenticated, and how they are analyzed and reported. NACOR accepts case-level administrative, clinical, and quality capture data from voluntarily participating anesthesia practices and health care facilities in the United States. All data are transmitted to the AQI in summary electronic files generated by billing, quality capture, and electronic health care record software, typically on a monthly basis. All data elements are mapped to fields in the NACOR schema in accordance with a publicly available data dictionary. Incoming data are loaded into NACOR by AQI technologists and are subject to both manual and automated review to identify systematically missing elements, miscoding, and inadvertent corruption. Data are deidentified in compliance with Health Insurance Portability and Accountability Act regulations. The database server of AQI, which houses the NACOR database, is protected by 2 firewalls within the American Society of Anesthesiologists' network infrastructure; this system has not been breached. The NACOR Participant User File, a deidentified case-level dataset of information from NACOR, is available to researchers at participating institutions. NACOR architecture and the nature of the Participant User File include both strengths and weaknesses. PMID:26579661

  16. Italian registry of cardiac magnetic resonance

    International Nuclear Information System (INIS)

    Objectives: Forty sites were involved in this multicenter and multivendor registry, which sought to evaluate indications, spectrum of protocols, impact on clinical decision making and safety profile of cardiac magnetic resonance (CMR). Materials and methods: Data were prospectively collected on a 6-month period and included 3376 patients (47.2 ± 19 years; range 1–92 years). Recruited centers were asked to complete a preliminary general report followed by a single form/patient. Referral physicians were not required to exhibit any specific certificate of competency in CMR imaging. Results: Exams were performed with 1.5 T scanners in 96% of cases followed by 3 T (3%) and 1 T (1%) magnets and contrast was administered in 84% of cases. The majority of cases were performed for the workup of inflammatory heart disease/cardiomyopathies representing overall 55.7% of exams followed by the assessment of myocardial viability and acute infarction (respectively 6.9% and 5.9% of patients). In 49% of cases the final diagnosis provided was considered relevant and with impact on patient's clinical/therapeutic management. Safety evaluation revealed 30 (0.88%) clinical events, most of which due to patient's preexisting conditions. Radiological reporting was recorded in 73% of exams. Conclusions: CMR is performed in a large number of centers in Italy with relevant impact on clinical decision making and high safety profile

  17. Italian registry of cardiac magnetic resonance

    Energy Technology Data Exchange (ETDEWEB)

    Francone, Marco [Department of Radiological, Oncological and Pathological Sciences, Sapienza University of Rome (Italy); Di Cesare, Ernesto, E-mail: ernesto.dicesare@cc.univaq.it [Dipartimento di Scienze Cliniche Applicate e Biotecnologie, Università di L’Aquila (Italy); Cademartiri, Filippo [Cardio-Vascular Imaging Unit, Giovanni XXIII Hospital, Monastier di Treviso, TV (Italy); Erasmus Medical Center University, Rotterdam (Netherlands); Pontone, Gianluca [IRCCS Centro Cardiologico Monzino (Italy); Lovato, Luigi [Policlinico S. Orsola Bologna (Italy); Matta, Gildo [Azienda ospedaliera G Brotzu Cagliari (Italy); Secchi, Francesco [IRCCS Policlinico San Donato, Radiology Unit, Milan (Italy); Maffei, Erica [Cardio-Vascular Imaging Unit, Giovanni XXIII Hospital, Monastier di Treviso, TV (Italy); Erasmus Medical Center University, Rotterdam (Netherlands); Pradella, Silvia [Azienda Ospedaliera Universitaria Careggi (Italy); Carbone, Iacopo [Department of Radiological, Oncological and Pathological Sciences, Sapienza University of Rome (Italy); Marano, Riccardo [Policlinico Gemelli, Università Cattolica Roma (Italy); Bacigalupo, Lorenzo [Ospedale Galliera, Genova (Italy); Chiodi, Elisabetta [Ospedale S. Anna Ferrara (Italy); Donato, Rocco [Azienda Ospedaliera Universitaria G. Martino, Me (Italy); Sbarbati, Stefano [Ospedale Madre Giuseppina Vannini, Roma (Italy); De Cobelli, Francesco [IRCCS S. Raffaele, Università Vita Salute, Milano (Italy); Di Renzi, Paolo [Fate Bene Fratelli Isola tiberina, Roma (Italy); Ligabue, Guido; Mancini, Andrea [Azienda Ospedaliera-Universitaria Policlinico di Modena (Italy); Palmieri, Francesco [Diparimento di Diagnostica per immagini e radiologia interventistica, Ospedale S. Maria delle Grazie, Pozzuoli, Napoli (Italy); and others

    2014-01-15

    Objectives: Forty sites were involved in this multicenter and multivendor registry, which sought to evaluate indications, spectrum of protocols, impact on clinical decision making and safety profile of cardiac magnetic resonance (CMR). Materials and methods: Data were prospectively collected on a 6-month period and included 3376 patients (47.2 ± 19 years; range 1–92 years). Recruited centers were asked to complete a preliminary general report followed by a single form/patient. Referral physicians were not required to exhibit any specific certificate of competency in CMR imaging. Results: Exams were performed with 1.5 T scanners in 96% of cases followed by 3 T (3%) and 1 T (1%) magnets and contrast was administered in 84% of cases. The majority of cases were performed for the workup of inflammatory heart disease/cardiomyopathies representing overall 55.7% of exams followed by the assessment of myocardial viability and acute infarction (respectively 6.9% and 5.9% of patients). In 49% of cases the final diagnosis provided was considered relevant and with impact on patient's clinical/therapeutic management. Safety evaluation revealed 30 (0.88%) clinical events, most of which due to patient's preexisting conditions. Radiological reporting was recorded in 73% of exams. Conclusions: CMR is performed in a large number of centers in Italy with relevant impact on clinical decision making and high safety profile.

  18. EPA Facility Registry Service (FRS): RCRA_TRANS

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of facilities that link...

  19. EPA Facility Registry Service (FRS): ER_CERCLIS

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry System (FRS) for the subset of facilities that link...

  20. EPA Facility Registry Service (FRS): ER_WWTP_NPDES

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry System (FRS) for the subset of Waste Water Treatment...

  1. EPA Facility Registry Service (FRS): Facility Interests Dataset - Intranet

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service consists of location and facility identification information from EPA's Facility Registry Service (FRS) for all sites that are available in...

  2. EPA Facility Registry Service (FRS): Facility Interests Dataset - Intranet Download

    Data.gov (United States)

    U.S. Environmental Protection Agency — This downloadable data package consists of location and facility identification information from EPA's Facility Registry Service (FRS) for all sites that are...

  3. EPA Facility Registry Service (FRS): AIRS_AQS

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of facilities that link...

  4. EPA Facility Registry Service (FRS): AIRS_AFS

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of facilities that link...

  5. EPA Facility Registry Service (FRS): ER_EPLAN

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry System (FRS) for the subset of facilities that link...

  6. EPA Facility Registry Service (FRS): Facility Interests Dataset Download

    Data.gov (United States)

    U.S. Environmental Protection Agency — This downloadable data package consists of location and facility identification information from EPA's Facility Registry Service (FRS) for all sites that are...

  7. EPA Facility Registry Service (FRS): AIRS_AFS_MAJOR

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of facilities that link...

  8. EPA Facility Registry Service (FRS): RCRA_INACTIVE

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of hazardous waste...

  9. EPA Facility Registry Service (FRS): RCRA_ACTIVE

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of active hazardous...

  10. EPA Facility Registry Service (FRS): CERCLIS_NPL

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of facilities that are...

  11. EPA Facility Registry Service (FRS): ER_TRI

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry System (FRS) for the subset of facilities that link...

  12. NOAA's Coastal and Marine Spatial Planning (CMSP) Data Registry

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — NOAA’s Coastal and Marine Spatial Planning (CMSP) Data Registry is a collection of Web-accessible NOAA geospatial data deemed essential for local, regional, or...

  13. EPA Facility Registry Service (FRS): ER_FRP

    Data.gov (United States)

    U.S. Environmental Protection Agency — This dataset contains location and facility identification information from EPA's Facility Registry System (FRS) for the subset of facilities that link to Facility...

  14. EPA Facility Registry Service (FRS): ER_RCRATSD

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry System (FRS) for the subset of facilities that link...

  15. EPA Facility Registry Service (FRS): ER_RMP

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry System (FRS) for the subset of facilities that link...

  16. EPA Facility Registry Service (FRS): Facility Interests Dataset

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service consists of location and facility identification information from EPA's Facility Registry Service (FRS) for all sites that are available in...

  17. Environmental Protection Agency (EPA) Facility Registry Service (FRS) Power Plants

    Data.gov (United States)

    Department of Homeland Security — This GIS dataset contains data on wastewater treatment plants, based on EPA's Facility Registry Service (FRS) and NPDES, along with Clean Watersheds Needs Survey...

  18. EPA Facility Registry Service (FRS): RCRA_TSD

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of Hazardous Waste...

  19. EPA Facility Registry Service (FRS): RCRA_LQG

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of facilities that link...

  20. EPA Facility Registry Service (FRS): PCS_NPDES

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of facilities that link...

  1. EPA Facility Registry Service (FRS): PCS_NPDES_MAJOR

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of facilities that are...

  2. EPA Facility Registry Service (FRS): ALL FRS INTERESTS LAYER

    Data.gov (United States)

    U.S. Environmental Protection Agency — This data provides location and attribute information on all facilities in EPA's Facility Registry Service (FRS) for a internet web feature service . The FRS is an...

  3. EPA Facility Registry Service (FRS): Wastewater Treatment Plants

    Data.gov (United States)

    U.S. Environmental Protection Agency — This GIS dataset contains data on wastewater treatment plants, based on EPA's Facility Registry Service (FRS), EPA's Integrated Compliance Information System (ICIS)...

  4. EPA Facility Registry Service (FRS): ER_TSCA

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry System (FRS) for the subset of facilities that link...

  5. Encoding of public records and procedures in electronic registries

    OpenAIRE

    Παπαθεοδώρου, Χρήστος; Προκοπιάδου, Γεωργία; Μοσχόπουλος, Διονύσης

    2004-01-01

    An electronic registry is the main mechanism for the official distribution of public records, which are created within the framework of administrative procedures and business transactions. The encoding of public records within a registry is realized according to a certain format to facilitate information management. However, these formats do not refer to semantics, which are considered essential for: a) the description of the administrative procedures, and b) efficient information retrieval. ...

  6. The growing number of hemophilia registries: Quantity vs. quality.

    Science.gov (United States)

    Keipert, C; Hesse, J; Haschberger, B; Heiden, M; Seitz, R; van den Berg, H M; Hilger, A

    2015-05-01

    Registries for rare diseases provide a tool for obtaining an overview of the clinical situation and can be used to discover points of improvement and to monitor long-term safety. Registries could also become a powerful tool to provide supporting information for marketing authorization. There is an urgent need for a pan-European or global strategy that supports consistent data. Therefore, transparency in data collection, harmonization of the database structures, and the convergence of scientific approaches are required. PMID:25669198

  7. Emerging roles for cancer registries in cancer control.

    OpenAIRE

    Greenwald, P.; Sondik, E. J.; Young, J. L.

    1986-01-01

    Cancer registries are a vital part of the national cancer effort to cut United States cancer mortality rates in half by the year 2000. Registries provide the data to focus programs and monitor progress. Success in meeting the year 2000 goal will require aggressive attention to the opportunities for prevention, early detection, treatment, and applied cancer control research, all of which complement the current emphasis on basic research.

  8. The Entity Registry System. From concept to deployment

    OpenAIRE

    Gramada, Mihai

    2016-01-01

    The entity registry system (ERS) is a decentralized entity registry that can be used to replace the Web as a platform for publishing linked data when the latter is not available. In developing countries, where off-line is the default mode of operation, centralized linked data solutions fail to address the needs of the communities. Although the features are mostly completed, the system is not yet ready for deployment. This project aims to provide extensive tests and scalability investigations ...

  9. Utility of an Australasian registry for children undergoing radiation treatment

    International Nuclear Information System (INIS)

    The aim of this study was to evaluate the utility of an Australasian registry ('the Registry') for children undergoing radiation treatment (RT). Children under the age of 16years who received a course of radiation between January 1997 and December 2010 and were enrolled on the Registry form the subjects of this study. A total of 2232 courses of RT were delivered, predominantly with radical intent (87%). Registrations fluctuated over time, but around one-half of children diagnosed with cancer undergo a course of RT. The most prevalent age range at time of RT was 10–15years, and the most common diagnoses were central nervous system tumours (34%) and acute lymphoblastic leukaemia (20%). The Registry provides a reflection of the patterns of care of children undergoing RT in Australia and a mechanism for determining the resources necessary to manage children by RT (human, facilities and emerging technologies, such as proton therapy). It lacks the detail to provide information on radiotherapy quality and disease outcomes which should be the subject of separate audit studies. The utility of the Registry has been hampered by its voluntary nature and varying needs for consent. Completion of registry forms is a logical requirement for inclusion in the definition of a subspecialist in paediatric radiation oncology.

  10. "Socialized Music": Historical Formations of Community Music through Social Rationales

    Science.gov (United States)

    Yerichuk, Deanna

    2014-01-01

    This article traces the formation of community music through professional and scholarly articles over the last century in North America, and argues that community music has been discursively formed through social rationales, although the specific rationales have shifted. The author employs an archaeological framework inspired by Michel Foucault to…

  11. Methods of Identifying and Preventing SQL Attacks

    Directory of Open Access Journals (Sweden)

    Bojken Shehu

    2012-11-01

    Full Text Available The paper begins by identifying the organizations which are vulnerable to the SQL attack referred to as an SQL injection attack. The term SQL injection attack is defined and a diagram is used to illustrate the way that attack occurs. In another section, the paper identifies the methods used to detect an attack to SQL, whereby the techniques are discussed extensively using relevant diagrams for illustration. The other sections cover the preventive methods, where the methods are also discussed with an illustration using diagrams.

  12. Whispering through DDoS attack

    OpenAIRE

    Miralem Mehic; Jiri Slachta; Miroslav Voznak

    2016-01-01

    Denial of service (DoS) attack is an attempt of the attacker to disable victim's machine by depleting network or computing resources. If this attack is performed with more than one machine, it is called distributed denial of service (DDoS) attack. Covert channels are those channels which are used for information transmission even though they are neither designed nor intended to transfer information at all. In this article, we investigated the possibility of using of DDoS attack for purposes o...

  13. Attacking Embedded Systems through Power Analysis

    Directory of Open Access Journals (Sweden)

    Dr. Sastry JKR

    2011-03-01

    Full Text Available Embedded Systems are being used for the development and implementation of Safety and Mission Critical Systems. Malfunctions of such type of embedded systems will lead to disasters at times. The embedded systems must be fully secured from outside intervention in order to have effective functioning as well as to provide protective environment to these mission critical systems. There are several attacking systems discussed in the literature each requiring a kind of counter attacking system. Power Analysis and variations of power analysis are the significant attacking mechanisms discussed in the literature. Crypto servers are the main areas of attacking as they deal with securing the data that flow in-between several components of the embedded systems. Most of the attacking systems suggested in the litterer suffer from lack of experimental models to emulate the attacking system. An attacking system could be amply proved when several samples of data are used for attacking and the samples of data provides for knowledge base. In this paper an experimental setup is proposed which is an embedded system itself for creation of a Knowledgebase which shall form the basis for attacking. The experimental setup required for undertaking the actual attacking with the usage of the knowledgebase is also presented. Further the proposed attacking system is applied for mission critical system and the experimental results obtained through the simulation are also presented.

  14. NETWORK SECURITY ATTACKS. ARP POISONING CASE STUDY

    Directory of Open Access Journals (Sweden)

    Luminiţa DEFTA

    2010-12-01

    Full Text Available Arp poisoning is one of the most common attacks in a switched network. A switch is a network device that limits the ability of attackers that use a packet sniffer to gain access to information from internal network traffic. However, using ARP poisoning the traffic between two computers can be intercepted even in a network that uses switches. This method is known as man in the middle attack. With this type of attack the affected stations from a network will have invalid entries in the ARP table. Thus, it will contain only the correspondence between the IP addresses of the stations from the same network and a single MAC address (the station that initiated the attack. In this paper we present step by step the initiation of such an attack in a network with three computers. We will intercept the traffic between two stations using the third one (the attacker.

  15. SQL Injection Attacks and Defense

    CERN Document Server

    Clarke, Justin

    2012-01-01

    SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award "SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." -Richard Bejtlich, Tao Security blog SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information available for penetration testers, IT security consultants and practitioners, and web/software developers to turn to for help. SQL Injection Att

  16. What Are the Symptoms of a Heart Attack?

    Science.gov (United States)

    ... on Twitter. What Are the Symptoms of a Heart Attack? Not all heart attacks begin with the sudden, ... This Content: NEXT >> Featured Video What is a heart attack? 05/22/2014 Describes how a heart attack ...

  17. Migraine attacks the Basal Ganglia

    Directory of Open Access Journals (Sweden)

    Bigal Marcelo

    2011-09-01

    Full Text Available Abstract Background With time, episodes of migraine headache afflict patients with increased frequency, longer duration and more intense pain. While episodic migraine may be defined as 1-14 attacks per month, there are no clear-cut phases defined, and those patients with low frequency may progress to high frequency episodic migraine and the latter may progress into chronic daily headache (> 15 attacks per month. The pathophysiology of this progression is completely unknown. Attempting to unravel this phenomenon, we used high field (human brain imaging to compare functional responses, functional connectivity and brain morphology in patients whose migraine episodes did not progress (LF to a matched (gender, age, age of onset and type of medication group of patients whose migraine episodes progressed (HF. Results In comparison to LF patients, responses to pain in HF patients were significantly lower in the caudate, putamen and pallidum. Paradoxically, associated with these lower responses in HF patients, gray matter volume of the right and left caudate nuclei were significantly larger than in the LF patients. Functional connectivity analysis revealed additional differences between the two groups in regard to response to pain. Conclusions Supported by current understanding of basal ganglia role in pain processing, the findings suggest a significant role of the basal ganglia in the pathophysiology of the episodic migraine.

  18. To mitigate Black-hole attack with CBDS in MANET

    OpenAIRE

    Navjot; Er.Pooja Ran

    2015-01-01

    Mobile ad-hoc network is self configured network that consist of mobile nodes which communicate with each other. Distributed self-organized nature of this network makes it venerable to various attacks likes DOS attack, Black hole attack, wormhole attack and jamming attack etc. Blackhole attack is one of the serious attack in network in which information loss occur which degrades the performance of network. In this work black hole attack is detected with the help of CBDS (cooperati...

  19. Anger attacks in obsessive compulsive disorder

    Directory of Open Access Journals (Sweden)

    Nitesh Prakash Painuly

    2011-01-01

    Full Text Available Background: Research on anger attacks has been mostly limited to depression, and only a few studies have focused on anger attacks in obsessive compulsive disorder. Materials and Methods: In a cross-sectional study all new obsessive compulsive disorder patients aged 20-60 years attending an outpatient clinic were assessed using the anger attack questionnaire, irritability, depression and anxiety scale (for the direction of the aggressive behavior and quality of life (QOL. Results: The sample consisted of 42 consecutive subjects with obsessive compulsive disorder, out of which 21 (50% had anger attacks. The obsessive compulsive disorder subjects with and without anger attacks did not show significant differences in terms of sociodemographic variables, duration of illness, treatment, and family history. However, subjects with anger attacks had significantly higher prevalence of panic attacks and comorbid depression. Significantly more subjects with anger attacks exhibited aggressive acts toward spouse, parents, children, and other relatives in the form of yelling and threatening to hurt, trying to hurt, and threatening to leave. However, the two groups did not differ significantly in terms of QOL, except for the psychological domain being worse in the subjects with anger attacks. Conclusion: Anger attacks are present in half of the patients with obsessive compulsive disorder, and they correlate with the presence of comorbid depression.

  20. Opening Minds in Canada: Background and Rationale

    Science.gov (United States)

    Stuart, Heather; Chen, Shu-Ping; Christie, Romie; Dobson, Keith; Kirsh, Bonnie; Knaak, Stephanie; Koller, Michelle; Krupa, Terry; Lauria-Horner, Bianca; Luong, Dorothy; Modgill, Geeta; Patten, Scott B; Pietrus, Mike; Szeto, Andrew; Whitley, Rob

    2014-01-01

    Objective: To summarize the background and rationale of the approach taken by the Mental Health Commission of Canada’s Opening Minds (OM) Anti-Stigma Initiative. Method: The approach taken by OM incorporates a grassroots, community development philosophy, has clearly defined target groups, uses contact-based education as the central organizing element across interventions, and has a strong evaluative component, so that best practices can be identified, replicated, and disseminated. Contact-based education occurs when people who have experienced a mental illness share their personal story of recovery and hope. Results: OM has acted as a catalyst to develop partnerships between community groups who are undertaking anti-stigma work and an interdisciplinary team of academic researchers in 5 universities who are evaluating the results of these programs. Conclusions: Building partnerships with existing community programs and promoting systematic evaluation using standardized approaches and instruments have contributed to our understanding of best practices in the field of anti-stigma programming. PMID:25565705

  1. Rationale for Antioxidant Supplementation in Hemodialysis Patients

    Directory of Open Access Journals (Sweden)

    Morena Marion

    2001-01-01

    Full Text Available Oxidative stress, which results from an imbalance between reactive oxygen species (ROS production and antioxidant defense mechanisms, is now a well recognized pathogenic process in hemodialysis (HD patients that could be involved in dialysis-related pathologies such as accelerated atherosclerosis, amyloidosis and anemia. This review is aimed at evaluating the rationale for preventive intervention against oxidative damage during HD as well as the putative causal factors implicated in this imbalance. The antioxidant system is severely impaired in uremic patients and impairment increases with the degree of renal failure. HD further worsens this condition mainly by losses of hydrophilic unbound small molecular weight substances such as vitamin C, trace elements and enzyme regulatory compounds. Moreover, inflammatory state due to the hemo-incompatibility of the dialysis system plays a critical role in the production of oxidants contributing further to aggravate the pro-oxidant status of uremic patients. Prevention of ROS overproduction can be achieved by improvement of dialysis biocompatibility, a main component of adequate dialysis, and further complimented by antioxidant supplementation. This could be achieved either orally or via the extracorporeal circuit. Antioxidants such as vitamin E could be bound on dialyzer membranes. Alternatively, hemolipodialysis consisting of loading HD patients with vitamin C or E via an ancillary circuit made of vitamin E-rich liposomes may be used.

  2. Factors associated with poor control of 9/11-related asthma 10–11 years after the 2001 World Trade Center terrorist attacks

    OpenAIRE

    Jordan, Hannah T.; Stellman, Steven D; Reibman, Joan; Farfel, Mark R.; Brackbill, Robert M; Friedman, Stephen M.; Li, Jiehui; Cone, James E.

    2015-01-01

    Abstract Objective: To identify key factors associated with poor asthma control among adults in the World Trade Center (WTC) Health Registry, a longitudinal study of rescue/recovery workers and community members who were directly exposed to the 2001 WTC terrorist attacks and their aftermath. Methods: We studied incident asthma diagnosed by a physician from 12 September 2001 through 31 December 2003 among participants aged ≥18 on 11 September 2001, as reported on an enrollment (2003–2004) or f...

  3. European operative registry to avoid complications in operative gynecology.

    Science.gov (United States)

    Putz, Andreas; Bohlin, Tonje; Rakovan, Martin; Putz, Ariane Maria; De Wilde, Rudy Leon

    2016-08-01

    The aim of this study is to determine how complications can be avoided in gynecological minimally invasive surgery in Europe. The Norwegian Gynecological Endoscopic Registry (NGER) facilitates medical research over a long duration. Can experiences from the Norwegian registry be used to develop a European registry to avoid complications? To answer this question, we used the NGER data from February 2013 until March 2015 to analyze the complications of gynecological endoscopy. The registry includes sociodemographic factors, related comorbidity, previous surgery, present procedure, and intraoperative complications. Postoperative complications were identified with a questionnaire administered 4 weeks after surgery. The risk factors leading to complications in gynecological endoscopy were found to be obesity, diabetes mellitus, heart disease, hypertension, previous surgery due to cervical carcinoma in situ, and low educational level. Regional differences in the complication rate were noted. National web-based operation registries such as the NGER can identify the risk factors for complications of gynecological endoscopic surgery and can help improve the outcome after surgery. The experience from NGER can be used to establish a European register. PMID:26805611

  4. OCLC Registry of Digital Masters – Opportunities for European Cooperation

    Directory of Open Access Journals (Sweden)

    Janet Lees

    2005-11-01

    Full Text Available I would like to thank the Preservation Division for the invitation to participate in the programme today. I would also like to thank the LIBER Board for their interest in the early stages of this project culminating in the announcement LIBER President Erland Kolding Nielsen made last night about LIBER support and collaboration with OCLC PICA with respect to the Digital Registry. This initiative reflects my new role within OCLC PICA, which is to identify opportunities for joint development with our major shareholder OCLC, and sometimes 3rd parties such as LIBER. My main purpose today is to provide a descriptive paper to inform LIBER members about the OCLC Digital Registry and to outline the possible role for LIBER and its membership in a model for European participation. My presentation will be in three phases: the need for a registry, a description of the Registry and finally, and perhaps most importantly, to outline opportunities for LIBER and its members in establishing a model for European contribution. We are all familiar with the concept of a registry through our participation in union catalogues and perhaps also from our experience with microfilms through the European Register of Microform Masters (EROMM hosted by our friends in Göttingen.

  5. Percolation of localized attack on complex networks

    CERN Document Server

    Shao, Shuai; Stanley, H Eugene; Havlin, Shlomo

    2014-01-01

    The robustness of complex networks against node failure and malicious attack has been of interest for decades, while most of the research has focused on random attack or hub-targeted attack. In many real-world scenarios, however, attacks are neither random nor hub-targeted, but localized, where a group of neighboring nodes in a network are attacked and fail. In this paper we develop a percolation framework to analytically and numerically study the robustness of complex networks against such localized attack. In particular, we investigate this robustness in Erd\\H{o}s-R\\'{e}nyi networks, random-regular networks, and scale-free networks. Our results provide insight into how to better protect networks, enhance cybersecurity, and facilitate the design of more robust infrastructures.

  6. Classification of Attacks in Wireless Sensor Networks

    OpenAIRE

    Messai, Mohamed-Lamine

    2014-01-01

    In wireless sensor networks (WSNs), security has a vital importance. Recently, there was a huge interest to propose security solutions in WSNs because of their applications in both civilian and military domains. Adversaries can launch different types of attacks, and cryptography is used to countering these attacks. This paper presents challenges of security and a classification of the different possible attacks in WSNs. The problems of security in each layer of the network's OSI model are dis...

  7. Detection Block Model for SQL Injection Attacks

    OpenAIRE

    Diksha G. Kumar; Madhumita Chatterjee

    2014-01-01

    With the rapid development of Internet, more and more organizations connect their databases to the Internet for resource sharing. However, due to developers' lack of knowledge of all possible attacks, web applications become vulnerable to multiple attacks. Thus the network databases could face multiple threats. Web applications generally consist of a three tier architecture where database is in the third pole, which is the most valuable asset in any organization. SQL injection is an attack te...

  8. Where can an Insider attack?

    DEFF Research Database (Denmark)

    Probst, Christian W.; Hansen, René Rydhof; Nielson, Flemming

    2006-01-01

    the targeted organisation. While the problem is well recognised in the security community as well as in law-enforcement and intelligence communities, the main resort still is to audit log files \\$\\backslash\\$emph{after the fact}. There has been little research into developing models, automated tools......By definition, an insider has better access, is more trusted, and has better information about internal procedures, high-value targets, and potential weak spots in the security, than an outsider. Consequently, an insider attack has the potential to cause significant, even catastrophic, damage to...... properties of the modelled systems. Our analysis of processes identifies which actions may be performed by whom, at which locations, accessing which data. This allows to compute a superset of audit results---before an incident occurs....

  9. Detecting Denial of Service Attacks in Tor

    Science.gov (United States)

    Danner, Norman; Krizanc, Danny; Liberatore, Marc

    Tor is currently one of the more popular systems for anonymizing near real-time communications on the Internet. Recently, Borisov et al. proposed a denial of service based attack on Tor (and related systems) that significantly increases the probability of compromising the anonymity provided. In this paper, we propose an algorithm for detecting such attacks and examine the effectiveness of the obvious approach to evading such detection. We implement a simplified version of the detection algorithm and study whether the attack may be in progress on the current Tor network. Our preliminary measurements indicate that the attack was probably not implemented during the period we observed the network.

  10. Off-Path Attacking the Web

    CERN Document Server

    Gilad, Yossi

    2012-01-01

    We show how an off-path (spoofing-only) attacker can perform cross-site scripting (XSS), cross-site request forgery (CSRF) and site spoofing/defacement attacks, without requiring vulnerabilities in either web-browser or server and circumventing known defenses. Attacker can also launch devastating denial of service (DoS) attacks, even when the connection between the client and the server is secured with SSL/TLS. The attacks are practical and require a puppet (malicious script in browser sandbox) running on a the victim client machine, and attacker capable of IP-spoofing on the Internet. Our attacks use a technique allowing an off-path attacker to learn the sequence numbers of both client and server in a TCP connection. The technique exploits the fact that many computers, in particular those running Windows, use a global IP-ID counter, which provides a side channel allowing efficient exposure of the connection sequence numbers. We present results of experiments evaluating the learning technique and the attacks ...

  11. Integrating cyber attacks within fault trees

    International Nuclear Information System (INIS)

    In this paper, a new method for quantitative security risk assessment of complex systems is presented, combining fault-tree analysis, traditionally used in reliability analysis, with the recently introduced Attack-tree analysis, proposed for the study of malicious attack patterns. The combined use of fault trees and attack trees helps the analyst to effectively face the security challenges posed by the introduction of modern ICT technologies in the control systems of critical infrastructures. The proposed approach allows considering the interaction of malicious deliberate acts with random failures. Formal definitions of fault tree and attack tree are provided and a mathematical model for the calculation of system fault probabilities is presented.

  12. REAC/TS Radiation Accident Registry: An Overview

    Energy Technology Data Exchange (ETDEWEB)

    Doran M. Christensen, DO, REAC/TS Associate Director and Staff Physician Becky Murdock, REAC/TS Registry and Health Physics Technician

    2012-12-12

    Over the past four years, REAC/TS has presented a number of case reports from its Radiation Accident Registry. Victims of radiological or nuclear incidents must meet certain dose criteria for an incident to be categorized as an “accident” and be included in the registry. Although the greatest numbers of “accidents” in the United States that have been entered into the registry involve radiation devices, the greater percentage of serious accidents have involved sealed sources of one kind or another. But if one looks at the kinds of accident scenarios that have resulted in extreme consequence, i.e., death, the greater share of deaths has occurred in medical settings.

  13. Patient-reported outcome measures in arthroplasty registries.

    Science.gov (United States)

    Rolfson, Ola; Eresian Chenok, Kate; Bohm, Eric; Lübbeke, Anne; Denissen, Geke; Dunn, Jennifer; Lyman, Stephen; Franklin, Patricia; Dunbar, Michael; Overgaard, Søren; Garellick, Göran; Dawson, Jill

    2016-07-01

    The International Society of Arthroplasty Registries (ISAR) Steering Committee established the Patient-Reported Outcome Measures (PROMs) Working Group to convene, evaluate, and advise on best practices in the selection, administration, and interpretation of PROMs and to support the adoption and use of PROMs for hip and knee arthroplasty in registries worldwide. The 2 main types of PROMs include generic (general health) PROMs, which provide a measure of general health for any health state, and specific PROMs, which focus on specific symptoms, diseases, organs, body regions, or body functions. The establishment of a PROM instrument requires the fulfillment of methodological standards and rigorous testing to ensure that it is valid, reliable, responsive, and acceptable to the intended population. A survey of the 41 ISAR member registries showed that 8 registries administered a PROMs program that covered all elective hip or knee arthroplasty patients and 6 registries collected PROMs for sample populations; 1 other registry had planned but had not started collection of PROMs. The most common generic instruments used were the EuroQol 5 dimension health outcome survey (EQ-5D) and the Short Form 12 health survey (SF-12) or the similar Veterans RAND 12-item health survey (VR-12). The most common specific PROMs were the Hip disability and Osteoarthritis Outcome Score (HOOS), the Knee injury and Osteoarthritis Outcome Score (KOOS), the Oxford Hip Score (OHS), the Oxford Knee Score (OKS), the Western Ontario and McMaster Universities Arthritis Index (WOMAC), and the University of California at Los Angeles Activity Score (UCLA). PMID:27168175

  14. Rationales for Place-based Approaches in Scotland

    OpenAIRE

    Bynner, Claire

    2016-01-01

    The aim of this paper is to remove the confusion surrounding what place-based approaches are, the rationales behind their use, the development of this approach to public service reform in Scotland and the future challenges presented by austerity and welfare reform. Key arguments presented in this paper:  The rationales driving the emergence of new place-based approaches at the neighbourhood level include: o The Civic – in the need for higher quality, more responsive services and for co...

  15. Influencing Acceptability of Parent Training Interventions Through Treatment Rationales

    OpenAIRE

    Chase, Trisha

    2015-01-01

    Parent training is an effective intervention for parents of children with a variety of childhood disorders, and parents often view behavioral parent training as acceptable. Explanations and rationales for parent training are commonly provided at the beginning of treatment. However, there is little research regarding how rationales may influence acceptability. There is also limited information on whether fathers and mothers judge the acceptability of parent training differently. The purpose of...

  16. Agent Based Preventive Measure for UDP Flood Attack in DDoS Attacks

    Directory of Open Access Journals (Sweden)

    AARTI SINGH,

    2010-08-01

    Full Text Available Distributed Denial-of-Service (DDoS attack is an attack which makes victim resources and services unavailable to its intended users. In particular, User Datagram Protocol (UDP flood attack in DDoS attacks is a method causing host based denial of service. It occurs when attacker sends UDP packets to a random port on the victim system,causing responses to be sent to forged IP address. The basic thrust of this paper is agent based solution for UDP lood attack because software agent technology seems to be a strong candidate for defending DDoS attacks and very few researchers have thought of deploying agents towards providing solution for UDP attack earlier.

  17. Spatially localized attacks on interdependent networks: the existence of a finite critical attack size

    CERN Document Server

    Berezin, Yehiel; Danziger, Michael M; Li, Daqing; Havlin, Shlomo

    2013-01-01

    Many real world complex systems such as infrastructure, communication and transportation networks are embedded in space, where entities of one system may depend on entities of other systems. These systems are subject to geographically localized failures due to malicious attacks or natural disasters. Here we study the resilience of a system composed of two interdependent spatially embedded networks to localized geographical attacks. We find that if an attack is larger than a finite (zero fraction of the system) critical size, it will spread through the entire system and lead to its complete collapse. If the attack is below the critical size, it will remain localized. In contrast, under random attack a finite fraction of the system needs to be removed to initiate system collapse. We present both numerical simulations and a theoretical approach to analyze and predict the effect of local attacks and the critical attack size. Our results demonstrate the high risk of local attacks on interdependent spatially embedd...

  18. Regulatory insight into the European human pluripotent stem cell registry.

    Science.gov (United States)

    Kurtz, Andreas; Stacey, Glyn; Kidane, Luam; Seriola, Anna; Stachelscheid, Harald; Veiga, Anna

    2014-12-01

    The European pluripotent stem cell registry aims at listing qualified pluripotent stem cell (PSC) lines that are available globally together with relevant information for each cell line. Specific emphasis is being put on documenting ethical procurement of the cells and providing evidence of pluripotency. The report discusses the tasks and challenges for a global PSC registry as an instrument to develop collaboration, to access cells from diverse resources and banks, and to implement standards, and as a means to follow up usage of cells and support adherence to regulatory and scientific standards and transparency for stakeholders. PMID:25457963

  19. Service Registry: A Key Piece for Enhancing Reuse in SOA

    Directory of Open Access Journals (Sweden)

    Juan Pablo García-González

    2013-01-01

    Full Text Available One of the promises of adopting a service-oriented approach in organizations is the potential cost savings that result from the reuse of existing services. A service registry is one of the fundamental pieces of service oriented architecture (SOA for achieving reuse. It refers to a place in which service providers can impart information about their offered services and potential clients can search for services. In this article, we provide advice for implementing an enterprise-wide service registry. We also discuss open issues in industry and academia that affect the management of service- repository information.

  20. Using registries to identify type 2 diabetes patients

    Directory of Open Access Journals (Sweden)

    Thomsen RW

    2014-12-01

    Full Text Available Reimar W Thomsen, Henrik Toft Sørensen Department of Clinical Epidemiology, Aarhus University Hospital, DenmarkValidation studies of health care registries are considered boring by some. An epidemiologist recently conducted a validation study based on the Danish National Registry of Patients and received the following unflattering comment from a reviewer: “A good example of a paper of limited scope that probably would only be published electronically where space is unlimited”. We do not subscribe to this point of view. See Original Research article

  1. CMS Run Registry: Data Certification Bookkeeping and Publication System

    Science.gov (United States)

    Rapsevicius, V.; CMS DQM Group

    2011-12-01

    The Run Registry of the CMS experiment at the LHC is the central tool for the tracking of the data quality monitoring and data certification workflows and the bookkeeping of the results. It consists of a Java web application frontend which connects to an Oracle database in the backend. The current production version 2 of the Run Registry application, was deployed in the beginning of the year 2010, before the LHC data taking started, and has since then undergone a number of full release cycles. In this note we describe the architecture and the experiences from the first year of datataking.

  2. IVOA Recommendation: Registry Relational Schema Version 1.0

    CERN Document Server

    Demleitner, Markus; Molinaro, Marco; Greene, Gretchen; Dower, Theresa; Perdikeas, Menelaos

    2015-01-01

    Registries provide a mechanism with which VO applications can discover and select resources - first and foremost data and services - that are relevant for a particular scientific problem. This specification defines an interface for searching this resource metadata based on the IVOA's TAP protocol. It specifies a set of tables that comprise a useful subset of the information contained in the registry records, as well as the table's data content in terms of the XML VOResource data model. The general design of the system is geared towards allowing easy authoring of queries.

  3. Initial experiences of a multicenter transluminal revascularization registry

    International Nuclear Information System (INIS)

    This paper establishes a multicenter registry for collection and analysis of data from a large series of patients undergoing percutaneous transluminal revascularization of peripheral vascular lesions. The registry began as a joint collaboration between the radiology departments of Thomas Jefferson University Hospital and the University of Pennsylvania, through the Philadelphia Society of Angiography/Interventional Radiology. The American College of Radiology research office in Philadelphia is used as the data collection center. A detailed data form has been developed. It includes information about patient history, procedure indications, lesion location and morphology, techniques used, immediate angiographic and clinical outcome, and clinical follow-up at intervals up to 5 years

  4. The Medical Birth Registry of Norway – An international perspective

    Directory of Open Access Journals (Sweden)

    Allen J. Wilcox

    2007-01-01

    Full Text Available Some of the most practical questions of perinatal medicine are regarding couples who have had pregnancy problems in the past, and their risk of having such problems in future pregnancies. For example, if a couple has a child with a birth defect, what are their chances that their next child will have a defect? The key to answering such questions is the availability of linked data such as those provided by the Medical Birth Registry of Norway. Such linked data provide a unique resource for addressing a broad range of questions in perinatal epidemiology. The Medical Birth Registry of Norway has been a pioneer in answering such questions.

  5. Terrorist attacks escalate in frequency and fatalities preceding highly lethal attacks.

    Directory of Open Access Journals (Sweden)

    Andy Martens

    Full Text Available Highly lethal terrorist attacks, which we define as those killing 21 or more people, account for 50% of the total number of people killed in all terrorist attacks combined, yet comprise only 3.5% of terrorist attacks. Given the disproportionate influence of these incidents, uncovering systematic patterns in attacks that precede and anticipate these highly lethal attacks may be of value for understanding attacks that exact a heavy toll on life. Here we examined whether the activity of terrorist groups escalates--both in the number of people killed per attack and in the frequency of attacks--leading up to highly lethal attacks. Analyses of terrorist attacks drawn from a state-of-the-art international terrorism database (The Global Terrorism Database showed evidence for both types of escalation leading up to highly lethal attacks, though complexities to the patterns emerged as well. These patterns of escalation do not emerge among terrorist groups that never commit a highly lethal attack.

  6. A Efficient Approach for Password Attacks

    Directory of Open Access Journals (Sweden)

    I. Naga Geethika

    2014-03-01

    Full Text Available Online password guessing attacks has emerged as a major problem in password based systems. To avoid this we implemented many solutions day by day to restrict bruteforce attacks and password guessing attacks and dictionary attacks. The approach in this paper is that using of mobile alert messages and giving options to the mobile user for more security that will intimate admin that someone is trying to hack his email. The legal users/attackers are challenged to answer the code that is sent to the mobile to retrieve the login page when the number of failed login attempts from a single machine crosses certain threshold value. This protocol uses either the IP addresses of the machines or the browser cookies, or both to identify the machines from which successful logins are made previously. A machine is said to be known when a successful login is made from it and its IP address is added to whitelist. The main goal of this protocol is to limit the attackers with a few failed login attempts made from each unknown machine and forcing them to challenge the security options. Attackers can have a threshold value (For ex 5 which is Whenever a user/attacker types an invalid username.

  7. Panic attacks simulate presence of somatic illnesses

    Directory of Open Access Journals (Sweden)

    Latas Milan

    2009-01-01

    Full Text Available Introduction. Panic attacks are characterized with sudden attacks of anxiety with numerous somatic symptoms, such as palpitations, tachycardia, tachypnea, nausea, vertigo. The objective of this study was to analyze symptoms of panic attacks in patients with panic disorder, especially, to determine the specific relationship of somatic and neurological symptoms of panic attacks in boundaries of somatic systems. Material and methods. The study sample consisted of 97 patients with primary diagnosis of panic disorder, without any acute, severe and unstable somatic illness. The presence and frequency of symptoms of panic attacks were estimated by the Panic Disorder Questionnaire. Results. The study results indicate that the most frequent symptoms of panic attacks were cardiological signs (heart pounding or racing and trembling, followed by unsteady and fainting feeling symptoms, sweating, respiratory symptoms and gastroenterological symptoms. The results of correlation analyses indicate that symptoms of panic attacks classified into cardio-vascular, gastro-enterological, respiratory and neuro-otological systems show statistically significant correlations. Conclusion. The results of analyses of symptoms of panic attacks point to their intercorrelation. This specific association of the symptoms, if they are examined on their own in the patients, could lead to false clinical manifestation of some somatic illness. Therefore, it is necessary to analyze adequately and make the proper differential diagnosis of patients with panic disorder.

  8. Fast Collision Attack on MD5

    NARCIS (Netherlands)

    Stevens, M.M.J.

    2006-01-01

    In this paper, we present an improved attack algorithm to find two-block collisions of the hash function MD5. The attack uses the same differential path of MD5 and the set of sufficient conditions that was presented by Wang et al. We present a new technique which allows us to deterministically fulfi

  9. Rotational Rebound Attacks on Reduced Skein

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Nikolic, Ivica; Rechberger, Christian

    In this paper we combine a recent rotational cryptanalysis with the rebound attack, which results in the best cryptanalysis of Skein, a candidate for the SHA-3 competition. The rebound attack approach was so far only applied to AES-like constructions. For the first time, we show that this approach...

  10. The cost of attack in competing networks.

    Science.gov (United States)

    Podobnik, B; Horvatic, D; Lipic, T; Perc, M; Buldú, J M; Stanley, H E

    2015-11-01

    Real-world attacks can be interpreted as the result of competitive interactions between networks, ranging from predator-prey networks to networks of countries under economic sanctions. Although the purpose of an attack is to damage a target network, it also curtails the ability of the attacker, which must choose the duration and magnitude of an attack to avoid negative impacts on its own functioning. Nevertheless, despite the large number of studies on interconnected networks, the consequences of initiating an attack have never been studied. Here, we address this issue by introducing a model of network competition where a resilient network is willing to partially weaken its own resilience in order to more severely damage a less resilient competitor. The attacking network can take over the competitor's nodes after their long inactivity. However, owing to a feedback mechanism the takeovers weaken the resilience of the attacking network. We define a conservation law that relates the feedback mechanism to the resilience dynamics for two competing networks. Within this formalism, we determine the cost and optimal duration of an attack, allowing a network to evaluate the risk of initiating hostilities. PMID:26490628

  11. Automated Detection System for SQL Injection Attacks

    Directory of Open Access Journals (Sweden)

    Dr K.V.N.Sunitha

    2010-10-01

    Full Text Available Many software systems have evolved to include a Web-based component that makes them available to the public via the Internet and can expose them to a variety of Web-based attacks. One of these attacks is SQL Injection vulnerability (SQLIV, which can give attackers unrestricted access to the databases that underlie Web applications and has become increasingly frequent and serious. The intent is that Web applications will limit the kinds of queries that can be generated to a safe subset of all possible queries, regardless of what input users provide. SQL Injection attacks are possible due to the design drawbacks of the web sites, which interact with back-end databases. Successful attacks may damage more. We introduce a system that deals with new automated technique for preventing SQLIA based on the novel concept of regular expressions is to detect SQL Injection attacks. The proposed system can detect the attacks that are from Internet and Insider Attacks, by analyzing the packets of the network servers.

  12. A report of the Malaysian dialysis registry of the National Renal Registry, Malaysia.

    Science.gov (United States)

    Lim, Y N; Lim, T O; Lee, D G; Wong, H S; Ong, L M; Shaariah, W; Rozina, G; Morad, Z

    2008-09-01

    The Malaysian National Renal Registry was set up in 1992 to collect data for patients on renal replacement therapy (RRT). We present here the report of the Malaysian dialysis registry. The objectives of this papar are: (1) To examine the overall provision of dialysis treatment in Malaysia and its trend from 1980 to 2006. (2) To assess the treatment rate according to the states in the country. (3) To describe the method, location and funding of dialysis. (4) To characterise the patients accepted for dialysis treatment. (5) To analyze the outcomes of the dialysis treatment. Data on patients receiving dialysis treatment were collected at initiation of dialysis, at the time of any significant outcome, as well as yearly. The number of dialysis patients increased from 59 in 1980 to almost 15,000 in 2006. The dialysis acceptance rate increased from 3 per million population in 1980 to 116 per million population in 2006, and the prevalence rate from 4 to 550 per million population over the same period. The economically advantaged states of Malaysia had much higher dialysis treatment rates compared to the less economically advanced states. Eighty to 90% of new dialysis patients were accepted into centre haemodialysis (HD), and the rest into the chronic ambulatory peritoneal dialysis (CAPD) programme. The government provided about half of the funding for dialysis treatment. Patients older than 55 years accounted for the largest proportion of new patients on dialysis since the 1990s. Diabetes mellitus has been the main cause of ESRD and accounted for more than 50% of new ESRD since 2002. Annual death rate averaged about 10% on HD and 15% on CAPD. The unadjusted 5-year patient survival on both HD and CAPD was about 80%. Fifty percent of dialysis patients reported very good median QoL index score. About 70% of dialysis patients were about to work full or part time. There has been a very rapid growth of dialysis provision in Malaysia particularly in the older age groups. ESRD

  13. Evaluating Deterioration of Concrete by Sulfate Attack

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    Effects of factors such as water to cement ratio, fly ash and silica fume on the resistance of concrete to sulfate attack were investigated by dry-wet cycles and immersion method. The index of the resistance to sulfate attack was used to evaluate the deterioration degree of concrete damaged by sulfate. The relationship between the resistance of concrete to sulfate attack and its permeability/porosity were analyzed as well as its responding mechanism. Results show that the depth of sulfate crystal attack from surface to inner of concrete can be reduced by decreasing w/c and addition of combining fly ash with silica fume. The variation of relative elastic modulus ratio and relative flexural strength ratio of various specimens before and after being subjected to sulfate attack was compared.

  14. Automatic Classification of Attacks on IP Telephony

    Directory of Open Access Journals (Sweden)

    Jakub Safarik

    2013-01-01

    Full Text Available This article proposes an algorithm for automatic analysis of attack data in IP telephony network with a neural network. Data for the analysis is gathered from variable monitoring application running in the network. These monitoring systems are a typical part of nowadays network. Information from them is usually used after attack. It is possible to use an automatic classification of IP telephony attacks for nearly real-time classification and counter attack or mitigation of potential attacks. The classification use proposed neural network, and the article covers design of a neural network and its practical implementation. It contains also methods for neural network learning and data gathering functions from honeypot application.

  15. Combating Memory Corruption Attacks On Scada Devices

    Science.gov (United States)

    Bellettini, Carlo; Rrushi, Julian

    Memory corruption attacks on SCADA devices can cause significant disruptions to control systems and the industrial processes they operate. However, despite the presence of numerous memory corruption vulnerabilities, few, if any, techniques have been proposed for addressing the vulnerabilities or for combating memory corruption attacks. This paper describes a technique for defending against memory corruption attacks by enforcing logical boundaries between potentially hostile data and safe data in protected processes. The technique encrypts all input data using random keys; the encrypted data is stored in main memory and is decrypted according to the principle of least privilege just before it is processed by the CPU. The defensive technique affects the precision with which attackers can corrupt control data and pure data, protecting against code injection and arc injection attacks, and alleviating problems posed by the incomparability of mitigation techniques. An experimental evaluation involving the popular Modbus protocol demonstrates the feasibility and efficiency of the defensive technique.

  16. Rotational Rebound Attacks on Reduced Skein

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Nikolic, Ivica; Rechberger, Christian

    2010-01-01

    In this paper we combine a recent rotational cryptanalysis with the rebound attack, which results in the best cryptanalysis of Skein, a candidate for the SHA-3 competition. The rebound attack approach was so far only applied to AES-like constructions. For the first time, we show that this approach...... Threefish cipher. The new techniques include an analytical search for optimal input values in the rotational cryptanalysis, which allows to extend the outbound phase of the attack with a precomputation phase, an approach never used in any rebound-style attack before. Further we show how to combine multiple...... inside-out computations and neutral bits in the inbound phase of the rebound attack, and give well-defined rotational distinguishers as certificates of weaknesses for the compression functions and block ciphers....

  17. New Multi-step Worm Attack Model

    CERN Document Server

    Robiah, Y; Shahrin, S; Faizal, M A; Zaki, M Mohd; Marliza, R

    2010-01-01

    The traditional worms such as Blaster, Code Red, Slammer and Sasser, are still infecting vulnerable machines on the internet. They will remain as significant threats due to their fast spreading nature on the internet. Various traditional worms attack pattern has been analyzed from various logs at different OSI layers such as victim logs, attacker logs and IDS alert log. These worms attack pattern can be abstracted to form worms' attack model which describes the process of worms' infection. For the purpose of this paper, only Blaster variants were used during the experiment. This paper proposes a multi-step worm attack model which can be extended into research areas in alert correlation and computer forensic investigation.

  18. SURVEY OF PACKET DROPPING ATTACK IN MANET

    Directory of Open Access Journals (Sweden)

    A.Janani

    2014-03-01

    Full Text Available Mobile Ad-hoc NETwork (MANET is an application of wireless network with self-configuring mobile nodes. MANET does not require any fixed infrastructure. Its development never has any threshold range. Nodes in MANET can communicate with each other if and only if all the nodes are in the same range. This wide distribution of nodes makes MANET vulnerable to various attacks, packet dropping attack or black hole attack is one of the possible attack. It is very hard to detect and prevent. To prevent from packet dropping attack, detection of misbehavior links and selfish nodes plays a vital role in MANETs. In this paper, a omprehensive investigation on detection of misbehavior links and malicious nodes is carried out.

  19. Use of Attack Graphs in Security Systems

    Directory of Open Access Journals (Sweden)

    Vivek Shandilya

    2014-01-01

    Full Text Available Attack graphs have been used to model the vulnerabilities of the systems and their potential exploits. The successful exploits leading to the partial/total failure of the systems are subject of keen security interest. Considerable effort has been expended in exhaustive modeling, analyses, detection, and mitigation of attacks. One prominent methodology involves constructing attack graphs of the pertinent system for analysis and response strategies. This not only gives the simplified representation of the system, but also allows prioritizing the security properties whose violations are of greater concern, for both detection and repair. We present a survey and critical study of state-of-the-art technologies in attack graph generation and use in security system. Based on our research, we identify the potential, challenges, and direction of the current research in using attack graphs.

  20. 78 FR 1825 - Notice of Establishment of an Animal and Plant Health Inspection Service Stakeholder Registry

    Science.gov (United States)

    2013-01-09

    ... Inspection Service Stakeholder Registry AGENCY: Animal and Plant Health Inspection Service, USDA. ACTION... Service stakeholder registry. FOR FURTHER INFORMATION CONTACT: Ms. Hallie Zimmers, Advisor for State and Stakeholder Relations, Legislative and Public Affairs, APHIS, room 1147, 1400 Independence Avenue...

  1. The National Registry of Evidence-based Programs and Practices (NREPP)

    Data.gov (United States)

    U.S. Department of Health & Human Services — The National Registry of Evidence-based Programs and Practices (NREPP) is a searchable online registry of mental health and substance abuse interventions that have...

  2. Detection Block Model for SQL Injection Attacks

    Directory of Open Access Journals (Sweden)

    Diksha G. Kumar

    2014-10-01

    Full Text Available With the rapid development of Internet, more and more organizations connect their databases to the Internet for resource sharing. However, due to developers' lack of knowledge of all possible attacks, web applications become vulnerable to multiple attacks. Thus the network databases could face multiple threats. Web applications generally consist of a three tier architecture where database is in the third pole, which is the most valuable asset in any organization. SQL injection is an attack technique in which specially crafted input string is entered in user input field. It is submitted to server and result is returned to the user. In SQL injection vulnerability, the database server is forced to execute malicious operations which may cause the data loss or corruption, denial of access, and unauthentic access to sensitive data by crafting specific inputs. An attacker can directly compromise the database, and that is why this is a most threatening web attack. SQL injection attack occupies first position in top ten vulnerabilities as specified by Open Web Application Security Project. It is probably the most common Website vulnerability today. Current scenarios which provide solutions to SQL injection attack either have limited scope i.e. can’t be implemented across all platforms, or do not cover all types of SQL injection attacks. In this work we implement Message Authentication Code (MAC based solution against SQL injection attacks. The model works both on client and server side. Client side implements a filter function and server side is based on information theory. MAC of static and dynamic queries is compared to detect SQL injection attack.

  3. BioSWR--semantic web services registry for bioinformatics.

    Directory of Open Access Journals (Sweden)

    Dmitry Repchevsky

    Full Text Available Despite of the variety of available Web services registries specially aimed at Life Sciences, their scope is usually restricted to a limited set of well-defined types of services. While dedicated registries are generally tied to a particular format, general-purpose ones are more adherent to standards and usually rely on Web Service Definition Language (WSDL. Although WSDL is quite flexible to support common Web services types, its lack of semantic expressiveness led to various initiatives to describe Web services via ontology languages. Nevertheless, WSDL 2.0 descriptions gained a standard representation based on Web Ontology Language (OWL. BioSWR is a novel Web services registry that provides standard Resource Description Framework (RDF based Web services descriptions along with the traditional WSDL based ones. The registry provides Web-based interface for Web services registration, querying and annotation, and is also accessible programmatically via Representational State Transfer (REST API or using a SPARQL Protocol and RDF Query Language. BioSWR server is located at http://inb.bsc.es/BioSWR/and its code is available at https://sourceforge.net/projects/bioswr/under the LGPL license.

  4. National Marrow Donor Program and Be The Match Registry

    Science.gov (United States)

    ... version of this page please turn Javascript on. Feature: Bone Marrow Transplants The National Marrow Donor Program and Be The Match Registry Past Issues / Summer 2011 Table of Contents Creating connections. Saving lives. Founded in 1987 by the federal government, the ...

  5. The European Registry for Patients with Mechanical Circulatory Support (EUROMACS)

    DEFF Research Database (Denmark)

    de By, Theo M M H; Mohacsi, Paul; Gummert, Jan; Bushnaq, Hasan; Krabatsch, Thomas; Gustafsson, Finn; Leprince, Pascal; Martinelli, Luigi; Meyns, Bart; Morshuis, Michiel; Netuka, Ivan; Potapov, Evgenij; Zittermann, Armin; Delmo Walter, Eva Maria; Hetzer, Roland

    2015-01-01

    other founding international members. It aims to promote scientific research to improve care of end-stage heart failure patients with ventricular assist device or a total artificial heart as long-term mechanical circulatory support. Likewise, the organization aims to provide and maintain a registry of...

  6. Chemical Abstracts Service Chemical Registry System: History, Scope, and Impacts.

    Science.gov (United States)

    Weisgerber, David W.

    1997-01-01

    Describes the history, scope, and applications of the Chemical Abstracts Service Chemical Registry System, a computerized database that uniquely identifies chemical substances on the basis of their molecular structures. Explains searching the system is and discusses its use as an international resource. (66 references) (Author/LRW)

  7. Retinoblastoma Registry report--Hospital Kuala Lumpur experience.

    Science.gov (United States)

    Jamalia, R; Sunder, R; Alagaratnam, J; Goh, P P

    2010-06-01

    Retinoblastoma is a childhood ocular cancer. The aim of this paper is to describe the clinical and epidemiological characteristics of patients with retinoblastoma in a major paediatric ophthalmology center in the country. Retrospective information was collected through the retinoblastoma registry. Late presentation with advanced staging is a major problem. PMID:21488473

  8. How Suitable Are Registry Data for Recurrence Risk Calculations?

    DEFF Research Database (Denmark)

    Ellesøe, Sabrina Gade; Jensen, Anders Boeck; Ängquist, Lars Henrik;

    2016-01-01

    BACKGROUND: Congenital heart disease (CHD) occurs in approximately 1% of all live births, and 3% to 8% of these have until now been considered familial cases, defined as the occurrence of two or more affected individuals in a family. The validity of CHD diagnoses in Danish administrative registry...

  9. BioSWR--semantic web services registry for bioinformatics.

    Science.gov (United States)

    Repchevsky, Dmitry; Gelpi, Josep Ll

    2014-01-01

    Despite of the variety of available Web services registries specially aimed at Life Sciences, their scope is usually restricted to a limited set of well-defined types of services. While dedicated registries are generally tied to a particular format, general-purpose ones are more adherent to standards and usually rely on Web Service Definition Language (WSDL). Although WSDL is quite flexible to support common Web services types, its lack of semantic expressiveness led to various initiatives to describe Web services via ontology languages. Nevertheless, WSDL 2.0 descriptions gained a standard representation based on Web Ontology Language (OWL). BioSWR is a novel Web services registry that provides standard Resource Description Framework (RDF) based Web services descriptions along with the traditional WSDL based ones. The registry provides Web-based interface for Web services registration, querying and annotation, and is also accessible programmatically via Representational State Transfer (REST) API or using a SPARQL Protocol and RDF Query Language. BioSWR server is located at http://inb.bsc.es/BioSWR/and its code is available at https://sourceforge.net/projects/bioswr/under the LGPL license. PMID:25233118

  10. BioSWR – Semantic Web Services Registry for Bioinformatics

    Science.gov (United States)

    Repchevsky, Dmitry; Gelpi, Josep Ll.

    2014-01-01

    Despite of the variety of available Web services registries specially aimed at Life Sciences, their scope is usually restricted to a limited set of well-defined types of services. While dedicated registries are generally tied to a particular format, general-purpose ones are more adherent to standards and usually rely on Web Service Definition Language (WSDL). Although WSDL is quite flexible to support common Web services types, its lack of semantic expressiveness led to various initiatives to describe Web services via ontology languages. Nevertheless, WSDL 2.0 descriptions gained a standard representation based on Web Ontology Language (OWL). BioSWR is a novel Web services registry that provides standard Resource Description Framework (RDF) based Web services descriptions along with the traditional WSDL based ones. The registry provides Web-based interface for Web services registration, querying and annotation, and is also accessible programmatically via Representational State Transfer (REST) API or using a SPARQL Protocol and RDF Query Language. BioSWR server is located at http://inb.bsc.es/BioSWR/and its code is available at https://sourceforge.net/projects/bioswr/under the LGPL license. PMID:25233118

  11. hPSCreg--the human pluripotent stem cell registry.

    Science.gov (United States)

    Seltmann, Stefanie; Lekschas, Fritz; Müller, Robert; Stachelscheid, Harald; Bittner, Marie-Sophie; Zhang, Weiping; Kidane, Luam; Seriola, Anna; Veiga, Anna; Stacey, Glyn; Kurtz, Andreas

    2016-01-01

    The human pluripotent stem cell registry (hPSCreg), accessible at http://hpscreg.eu, is a public registry and data portal for human embryonic and induced pluripotent stem cell lines (hESC and hiPSC). Since their first isolation the number of hESC lines has steadily increased to over 3000 and new iPSC lines are generated in a rapidly growing number of laboratories as a result of their potentially broad applicability in biomedicine and drug testing. Many of these lines are deposited in stem cell banks, which are globally established to store tens of thousands of lines from healthy and diseased donors. The Registry provides comprehensive and standardized biological and legal information as well as tools to search and compare information from multiple hPSC sources and hence addresses a translational research need. To facilitate unambiguous identification over different resources, hPSCreg automatically creates a unique standardized name for each cell line registered. In addition to biological information, hPSCreg stores extensive data about ethical standards regarding cell sourcing and conditions for application and privacy protection. hPSCreg is the first global registry that holds both, manually validated scientific and ethical information on hPSC lines, and provides access by means of a user-friendly, mobile-ready web application. PMID:26400179

  12. The United States Transuranium and Uranium Registries: 1968-1993

    International Nuclear Information System (INIS)

    The historical development and scientific contributions of the United States Transuranium and Uranium Registries are briefly traced. Further to encourage radiobiology studies and to provide unique materials for research in other areas such as biomarkers including oncogenes, the Registries have established the National Human Radiobiology Tissue Repository, which includes more than 20,000 tissue samples and solutions, histopathology slides, and related materials from persons with internal depositions, including radium dial painters, available to other investigators for collaborative or individual research purposes. Emphasis is given to recent findings of the Registries with respect to biokinetic models for the actinides and the post-mortem analysis of USTUR Case 0246, an individual who suffered a massive intake of 241Am eleven years prior to death from heart disease. Registries studies show that, in addition to skeleton and liver, muscle is an appreciable reservoir for both plutonium and americium. The systemic biokinetics of plutonium and americium are well represented by a three-compartment model that includes skeleton, liver, and muscle, although the biokinetic parameters of these two transuranium elements differ significantly. Initial uptake fractions for plutonium are 0.4, 0.4, and 0.2, with residence half-times of 50, 20 and 10 years, respectively, for skeleton, liver and muscle. For americium, the comparable uptake fractions are 0.45, 0.25, 0.3 with residence half-times of 50, 2.5 and 10 years for the three compartments. (author)

  13. Is it feasible to merge data from national shoulder registries?

    DEFF Research Database (Denmark)

    Rasmussen, Jeppe V; Brorson, Stig; Hallan, Geir; Dale, Håvard; Äärimaa, Ville; Mokka, Jari; Jensen, Steen L; Fenstad, Anne M; Salomonsson, Björn

    2016-01-01

    BACKGROUND: The Nordic Arthroplasty Register Association was initiated in 2007, and several papers about hip and knee arthroplasty have been published. Inspired by this, we aimed to examine the feasibility of merging data from the Nordic national shoulder arthroplasty registries by defining a com...

  14. Process produces accurate registry between circuit board prints

    Science.gov (United States)

    1966-01-01

    Tapes and quick-mount circles of contrasting colors aid in obtaining precise registry between the two circuits of two-sided printed circuit boards. The tapes and circles are mounted on opposite sides of transparent plastic film to define the conductive path and feed-through hole locations.

  15. Clinical Cancer Registries - Are They Up for Health Services Research?

    Science.gov (United States)

    Pobiruchin, Monika; Bochum, Sylvia; Martens, Uwe M; Schramm, Wendelin

    2016-01-01

    Clinical cancer registries are a valuable data source for health services research (HSR). HSR is in need of high quality routine care data for its evaluations. However, the secondary use of routine data - such as documented cancer cases in a disease registry - poses new challenges in terms of data quality, IT-management, documentation processes and data privacy. In the clinical cancer registry Heilbronn-Franken, real-world data from the Giessen Tumor Documentation System (GTDS) was utilized for analyses of patients' disease processes and guideline adherence in follow-up care. A process was developed to map disease state definitions to fields of the GTDS database and extract patients' disease progress information. Thus, the disease process of sub-cohorts could be compared to each other, e.g., comparison of disease free survival of HER2 (human epidermal growth factor receptor 2)-positive and -negative women who were treated with Trastuzumab, a targeted therapy applied in breast cancer. In principle, such comparisons are feasible and of great value for HSR as they depict a routine care setting of a diverse patient cohort. Yet, local documentation practice, missing flow of information from external health care providers or small sub-cohorts impede the analyses of clinical cancer registries data bases and usage for HSR. PMID:27577380

  16. Research on First Attack Probability Model of an Attacker Level Bombing Anti-air Radars

    Institute of Scientific and Technical Information of China (English)

    LUO Peng-cheng; MU Fu-ling; ZHOU Jing-lun

    2007-01-01

    The paper mainly studies the first attack probability (FAP) of an attacker level bombing anti-air radars through analyzing the radiant point orientation and attack (RPOA) process of attackers. Firstly, the searching target process is analyzed, and a corresponding target finding model is brought forward. Secondly, the target approaching process is concretely analyzed when the attacker levelly bombs the anti-air radar, and a corresponding target approaching model is presented. Finally, a demonstration is given to analyze the major factors in the model and prove its validity.

  17. A FACTOR ANALYTIC APPROACH TO USERS PERFORMANCE EVALUATION OF ONDO STATE LAND REGISTRY

    OpenAIRE

    Babajide OJO; Michael Adedayo ADEBAYO

    2012-01-01

    Land registry worldwide provides best service for guaranteeing ownership of land and facilitates property transactions. The development and sustenance of effective land registry is vital for creation of free movement of interests in land. The land registry provides ready access to up-to-date land information and ensures confident dealings in property and security of title. One of the goals of land registry in developing economy and in Nigeria in particular, is to render services to users in s...

  18. The Toxicology Investigators Consortium Case Registry--the 2012 experience.

    Science.gov (United States)

    Wiegand, Timothy; Wax, Paul; Smith, Eric; Hart, Katherine; Brent, Jeffrey

    2013-12-01

    In 2010, the American College of Medical Toxicology (ACMT) established its Case Registry, the Toxicology Investigators Consortium (ToxIC). All cases are entered prospectively and include only suspected and confirmed toxic exposures cared for at the bedside by board-certified or board-eligible medical toxicologists at its participating sites. The primary aims of establishing this Registry include the development of a realtime toxico-surveillance system in order to identify and describe current or evolving trends in poisoning and to develop a research tool in toxicology. ToxIC allows for extraction of data from medical records from multiple sites across a national and international network. All cases seen by medical toxicologists at participating institutions were entered into the database. Information characterizing patients entered in 2012 was tabulated and data from the previous years including 2010 and 2011 were included so that cumulative numbers and trends could be described as well. The current report includes data through December 31st, 2012. During 2012, 38 sites with 68 specific institutions contributed a total of 7,269 cases to the Registry. The total number of cases entered into the Registry at the end of 2012 was 17,681. Emergency departments remained the most common source of consultation in 2012, accounting for 61 % of cases. The most common reason for consultation was for pharmaceutical overdose, which occurred in 52 % of patients including intentional (41 %) and unintentional (11 %) exposures. The most common classes of agents were sedative-hypnotics (1,422 entries in 13 % of cases) non-opioid analgesics (1,295 entries in 12 % of cases), opioids (1,086 entries in 10 % of cases) and antidepressants (1,039 entries in 10 % of cases). N-acetylcysteine (NAC) was the most common antidote administered in 2012, as it was in previous years, followed by the opioid antagonist naloxone, sodium bicarbonate, physostigmine and flumazenil. Anti-crotalid Fab

  19. Improving Diabetes Outcomes Using a Web-Based Registry and Interactive Education: A Multisite Collaborative Approach

    Science.gov (United States)

    Morrow, Robert W.; Fletcher, Jason; Kelly, Kim F.; Shea, Laura A.; Spence, Maureen M.; Sullivan, Janet N.; Cerniglia, Joan R.; Yang, YoonJung

    2013-01-01

    Introduction: To support the adoption of guideline concordant care by primary care practices, the New York Diabetes Coalition (NYDC) promoted use of an electronic diabetes registry and developed an interactive educational module on using the registry and improving patient communication. The NYDC hypothesized that use of a registry with immediate…

  20. The Euro-VO Registry, Re-engineering the Back-end

    Science.gov (United States)

    Arviset, C.; Perdikeas, M.; Osuna, P.; Gonzalez, J.

    2015-09-01

    The Euro-VO Registry, located, developed and operated at ESAC, is one of the full searchable registries available worldwide, gathering information about all VO-compliant resources. The Euro-VO Registry serves as a registration point for European - and other countries- VO actors and data centres wishing to publish VO services. It harvests other registries to ensure its completeness so VO applications developers and VO users can use it to discover all VO resources, from Europe and from all other VO projects. The Euro-VO Registry provides as well a harvesting interface to other registries in the world to make sure the European VO services are also included in all other worldwide full registries. In particular, the new Euro-VO registry will be supporting the new RegTAP search interface for the relational registry allowing arbitrary ADQL queries against its contents over a compliant TAP service. The recently obsolete (for future developments) SOAP-based legacy search interface will also be supported for backwards compatibility purposes. Furthermore, in the context of the IVOA, some quality control and curation procedures for the registry resources are being defined. The Euro-VO Registry implements these procedures to ensure the high quality of the VO resources it references. This paper gives an overview of the recent development of the new Euro-VO Registry, together with its new curation facilities, both of which are being performed under a contract awarded to Neuropublic, under ESA special initiative to Greece.

  1. Limitations of drug registries to evaluate orphan medicinal products for the treatment of lysosomal storage disorders

    NARCIS (Netherlands)

    C.E.M. Hollak; J.M.F.G. Aerts; S. Aymé; J. Manuel

    2011-01-01

    Orphan drugs are often approved under exceptional circumstances, requiring submission of additional data on safety and effectiveness through registries. These registries are mainly focused on one drug only and data is frequently incomplete. Some registries also address phenotypic heterogeneity and n

  2. Home enteral nutrition in Spain: NADYA registry 2011-2012

    Directory of Open Access Journals (Sweden)

    Carmina Wanden-Berghe

    2014-06-01

    Full Text Available Objective: To describe the results of the home enteral nutrition (HEN registry of the NADYA-SENPE group in 2011 and 2012. Material and methods: We retrieved the data of the patients recorded from January 1st 2011 to December 31st 2012. Results: There were 3021 patients in the registry during the period from 29 hospitals, which gives 65.39 per million inhabitants. 97.95% were adults, 51.4% male. Mean age was 67.64 ± 19.1, median age was 72 years for adults and 7 months for children. Median duration with HEN was 351 days and for 97.5% was their first event with HEN. Most patients had HEN because of neurological disease (57.8%. Access route was nasogastric tube for 43.5% and gastrostomy for 33.5%. Most patients had limited activity level and, concerning autonomy, 54.8% needed total help. Nutritional formula was supplied from chemist's office to 73.8% of patients and disposables, when necessary, was supplied from hospitals to 53.8% of patients. HEN was finished for 1,031 patients (34.1% during the period of study, 56.6% due to decease and 22.2% due to recovery of oral intake. Conclusions: Data from NADYA-SENPE registry must be explained cautiously because it is a non-compulsory registry. In spite of the change in the methodology of the registry in 2010, tendencies regarding HEN have been maintained, other than oral route.

  3. Developing a provisional and national renal disease registry for Iran

    Directory of Open Access Journals (Sweden)

    Sima Ajami

    2015-01-01

    Full Text Available Background: Disease registry is a database that includes information about people suffering a special kind of disease. The aim of this study was to first identify and compare the National Renal Disease Registry (NRDR characteristics in some countries with Iran; and second, develop a provisional and NRDR for Iran. Materials and Methods: Retrieval of data of the NRDR was performed by scholars responsible in related agencies, including the Ministry of Health and Medical Education, Renal Disease charity, and data registries in the United States, United Kingdom, Malaysia, and Iran. This research was applied, and the study was descriptive-comparative. The study population consisted of the NRDR in selected countries in which data were collected by forms that were designed according to the study objectives. Sources of data were researchers, articles, books, journals, databases, websites, related documents, and people who are active in this regard, and related agencies, including the Ministry of Health and Medical Education, and patient support charity. The researchers collected data for each country based on the study objectives and then put them in comparative tables. Data were analyzed by descriptive, comparative, and theoretical methods. Results: Most of the renal transplant teams report their own results as a single center experiences. America and Britain have a preeminent national registry of renal disease compared to other countries. Conclusion: Given that control, prevention, and treatment of chronic renal diseases incur high expenses and the disease is one of leading mortality factors in Iran and across the world and since national registry system for chronic renal diseases can provide better tools and strategies to manage and evaluate patients′ characteristics as well as risk factors which eventually leads to making better decisions.

  4. Inception of a national multidisciplinary registry for stereotactic radiosurgery.

    Science.gov (United States)

    Sheehan, Jason P; Kavanagh, Brian D; Asher, Anthony; Harbaugh, Robert E

    2016-01-01

    Stereotactic radiosurgery (SRS) represents a multidisciplinary approach to the delivery of ionizing high-dose radiation to treat a wide variety of disorders. Much of the radiosurgical literature is based upon retrospective single-center studies along with a few randomized controlled clinical trials. More timely and effective evidence is needed to enhance the consistency and quality of and clinical outcomes achieved with SRS. The authors summarize the creation and implementation of a national SRS registry. The American Association of Neurological Surgeons (AANS) through NeuroPoint Alliance, Inc., started a successful registry effort with its lumbar spine initiative. Following a similar approach, the AANS and NeuroPoint Alliance collaborated with corporate partners and the American Society for Radiation Oncology to devise a data dictionary for an SRS registry. Through administrative and financial support from professional societies and corporate partners, a framework for implementation of the registry was created. Initial plans were devised for a 3-year effort encompassing 30 high-volume SRS centers across the country. Device-specific web-based data-extraction platforms were built by the corporate partners. Data uploaders were then used to port the data to a common repository managed by Quintiles, a national and international health care trials company. Audits of the data for completeness and veracity will be undertaken by Quintiles to ensure data fidelity. Data governance and analysis are overseen by an SRS board comprising equal numbers of representatives from the AANS and NeuroPoint Alliance. Over time, quality outcome assessments and post hoc research can be performed to advance the field of SRS. Stereotactic radiosurgery offers a high-technology approach to treating complex intracranial disorders. Improvements in the consistency and quality of care delivered to patients who undergo SRS should be afforded by the national registry effort that is underway. PMID

  5. Utilizing Probabilistic Linear Equations in Cube Attacks

    Institute of Scientific and Technical Information of China (English)

    Yuan Yao; Bin Zhang; Wen-Ling Wu

    2016-01-01

    Cube attacks, proposed by Dinur and Shamir at EUROCRYPT 2009, have shown huge power against stream ciphers. In the original cube attacks, a linear system of secret key bits is exploited for key recovery attacks. However, we find a number of equations claimed linear in previous literature actually nonlinear and not fit into the theoretical framework of cube attacks. Moreover, cube attacks are hard to apply if linear equations are rare. Therefore, it is of significance to make use of probabilistic linear equations, namely nonlinear superpolys that can be approximated by linear expressions effectively. In this paper, we suggest a way to test out and utilize these probabilistic linear equations, thus extending cube attacks to a wider scope. Concretely, we employ the standard parameter estimation approach and the sequential probability ratio test (SPRT) for linearity test in the preprocessing phase, and use maximum likelihood decoding (MLD) for solving the probabilistic linear equations in the online phase. As an application, we exhibit our new attack against 672 rounds of Trivium and reduce the number of key bits to search by 7.

  6. Radiological attacks and accidents. Medical consequences

    International Nuclear Information System (INIS)

    Probability of the occurrence of radiological attacks appears to be elevated after the terrorist attacks against the United States on September 11 in 2001. There are a lot of scenarios of radiological attack: simple radiological device, radiological disperse device (RDD or dirty bomb), attacks against nuclear reactor, improvised nuclear device, and nuclear weapons. Of these, RDD attack is the most probable scenario, because it can be easily made and can generate enormous psychological and economic damages. Radiological incidents are occurring to and fro in the world, including several cases of theft to nuclear facilities and unsuccessful terrorist attacks against them. Recently, a former Russian spy has allegedly been killed using polonium-210. In addition, serious radiological accidents have occurred in Chernobyl, Goiania, and Tokai-mura. Planning, preparation, education, and training exercise appear to be essential factors to cope with radiological attacks and accidents effectively without feeling much anxiety. Triage and psychological first aid are prerequisite to manage and provide effective medial care for mass casualties without inducing panic. (author)

  7. Forensics Investigation of Web Application Security Attacks

    Directory of Open Access Journals (Sweden)

    Amor Lazzez

    2015-02-01

    Full Text Available Nowadays, web applications are popular targets for security attackers. Using specific security mechanisms, we can prevent or detect a security attack on a web application, but we cannot find out the criminal who has carried out the security attack. Being unable to trace back an attack, encourages hackers to launch new attacks on the same system. Web application forensics aims to trace back and attribute a web application security attack to its originator. This may significantly reduce the security attacks targeting a web application every day, and hence improve its security. The aim of this paper is to carry out a detailed overview about the web application forensics. First, we define the web applications forensics, and we present a taxonomic structure of the digital forensics. Then, we present the methodology of a web application forensics investigation. After that, we illustrate the forensics supportive tools for a web application forensics investigation. After that, we present a detailed presentation of a set of the main considered web application forensics tools. Finally, we provide a comparison of the main considered web application forensics tools.

  8. Situational awareness of a coordinated cyber attack

    Science.gov (United States)

    Sudit, Moises; Stotz, Adam; Holender, Michael

    2005-03-01

    As technology continues to advance, services and capabilities become computerized, and an ever increasing amount of business is conducted electronically the threat of cyber attacks gets compounded by the complexity of such attacks and the criticality of the information which must be secured. A new age of virtual warfare has dawned in which seconds can differentiate between the protection of vital information and/or services and a malicious attacker attaining their goal. In this paper we present a novel approach in the real-time detection of multistage coordinated cyber attacks and the promising initial testing results we have obtained. We introduce INFERD (INformation Fusion Engine for Real-time Decision-making), an adaptable information fusion engine which performs fusion at levels zero, one, and two to provide real-time situational assessment and its application to the cyber domain in the ECCARS (Event Correlation for Cyber Attack Recognition System) system. The advantages to our approach are fourfold: (1) The complexity of the attacks which we consider, (2) the level of abstraction in which the analyst interacts with the attack scenarios, (3) the speed at which the information fusion is presented and performed, and (4) our disregard for ad-hoc rules or a priori parameters.

  9. Smart Grid Integrity Attacks: Characterizations and Countermeasures

    Energy Technology Data Exchange (ETDEWEB)

    Annarita Giani; Eilyan Bitar; Miles McQueen; Pramod Khargonekar; Kameshwar Poolla

    2011-10-01

    Real power injections at loads and generators, and real power flows on selected lines in a transmission network are monitored, transmitted over a SCADA network to the system operator, and used in state estimation algorithms to make dispatch, re-balance and other energy management system [EMS] decisions. Coordinated cyber attacks of power meter readings can be arranged to be undetectable by any bad data detection algorithm. These unobservable attacks present a serious threat to grid operations. Of particular interest are sparse attacks that involve the compromise of a modest number of meter readings. An efficient algorithm to find all unobservable attacks [under standard DC load flow approximations] involving the compromise of exactly two power injection meters and an arbitrary number of power meters on lines is presented. This requires O(n2m) flops for a power system with n buses and m line meters. If all lines are metered, there exist canonical forms that characterize all 3, 4, and 5-sparse unobservable attacks. These can be quickly detected in power systems using standard graph algorithms. Known secure phase measurement units [PMUs] can be used as countermeasures against an arbitrary collection of cyber attacks. Finding the minimum number of necessary PMUs is NP-hard. It is shown that p + 1 PMUs at carefully chosen buses are sufficient to neutralize a collection of p cyber attacks.

  10. FAST CORRELATION ATTACKS ON BLUETOOTH COMBINER

    Institute of Scientific and Technical Information of China (English)

    Ma Weiju; Feng Dengguo

    2006-01-01

    A simple fast correlation attack is used to analysis the security of Bluetooth combiner in this paper.This attack solves the tradeoff between the length of the keystream and the computing complexity needed to recover the secret key. We give the computing complexities of the attack algorithm according to different lengths of the known keystream. The result is less time-consuming than before. It is also shown that the security of the modified Bluetooth combiner by Hermelin and Nyberg is not significantly enhanced.

  11. Review Paper on Flooding Attack in MANET

    Directory of Open Access Journals (Sweden)

    Ruchita Meher,

    2014-01-01

    Full Text Available Mobile ad-hoc network (MANET is widely applicable in various areas like military services, civilian environments and emergency operations. The issues in MANET are broadcasting, clustering, mobility management, bandwidth management and power management. Broadcasting becomes an important issue in MANET for route information discovery. The different routing attacks in MANET are flooding, black hole, link spoofing and wormhole attack. In this paper we are representing works proposed by various author on flooding attack. Our contribution in this paper is that we have presented details comparison of various counter based schemes.

  12. RAPTOR: Routing Attacks on Privacy in Tor

    OpenAIRE

    Sun, Yixin; Edmundson, Anne; Vanbever, Laurent; Li, Oscar; Rexford, Jennifer; Chiang, Mung; Mittal, Prateek

    2015-01-01

    The Tor network is a widely used system for anonymous communication. However, Tor is known to be vulnerable to attackers who can observe traffic at both ends of the communication path. In this paper, we show that prior attacks are just the tip of the iceberg. We present a suite of new attacks, called Raptor, that can be launched by Autonomous Systems (ASes) to compromise user anonymity. First, AS-level adversaries can exploit the asymmetric nature of Internet routing to increase the chance of...

  13. Security Attacks On MANET Routing Protocols

    Directory of Open Access Journals (Sweden)

    Chiragkumar V. Patel

    2013-10-01

    Full Text Available The paper gives idea about various routing protocols for Mobile Ad-Hoc Network against security issues. MANET is vulnerable to various security attacks due to its dynamically changing topology, self configurable nature and lack of centralized control. Malicious node can significantly degrade the performance and reliability of Ad-hoc Network routing protocols. From the survey it has been made quite clear that basic MANET protocols are vulnerable to various routing attacks. While Secure AODV (SAODV routing protocol performs quite well to improve performance in presence of security attack in MANET.

  14. Medical complications in patients with stroke: data validity in a stroke registry and a hospital discharge registry

    Directory of Open Access Journals (Sweden)

    Annette Ingeman

    2010-03-01

    Full Text Available Annette Ingeman1, Grethe Andersen2, Heidi H Hundborg1, Søren P Johnsen11Department of Clinical Epidemiology, 2Department of Neurology, Aarhus University Hospital, DenmarkBackground: Stroke patients frequently experience medical complications; yet, data on incidence, causes, and consequences are sparse.Objective: To examine the data validity of medical complications among patients with stroke in a population-based clinical registry and a hospital discharge registry.Methods: We examined the predictive values, sensitivity and specificity of medical complications among patients admitted to specialized stroke units and registered in the Danish National Indicator Project (DNIP and the Danish National Registry of Patients (NRP between January 2003 and December 2006 (n = 8,024. We retrieved and reviewed medical records from a random sample of patients (n = 589, 7.3%.Results: We found substantial variation in the data quality of stroke-related medical complication diagnoses both within the specific complications and between the registries. The positive predictive values ranged from 39.0%–87.1% in the DNIP, and from 0.0%–92.9% in the NRP. The negative predictive values ranged from 71.6%–98.9% in the DNIP and from 63.3% to 97.4% in the NRP. In both registries the specificity of the diagnoses was high. The sensitivity ranged from 23.5% (95% confidence interval [CI]: 14.9–35.4 for falls to 62.9% (95% CI: 54.9–70.4 for urinary infection in the DNIP, and from 0.0 (95% CI: 0.0–4.99 for falls to 18.1% (95% CI: 2.3–51.8 for pressure ulcer in the NRP.Conclusion: The DNIP may be useful for studying medical complications among patients with stroke.Keywords: stroke, medical complications, data validity, clinical database

  15. Who Is at Risk for a Heart Attack?

    Science.gov (United States)

    ... on Twitter. Who Is at Risk for a Heart Attack? Certain risk factors make it more likely that ... This Content: NEXT >> Featured Video What is a heart attack? 05/22/2014 Describes how a heart attack ...

  16. Proposed Methodology for Securing Wireless LANs from Wormhole Attack

    OpenAIRE

    Patel, A K; Jaypalsinh. A. Gohil; D.T. Meva

    2010-01-01

    Wormhole attacks enable an attacker with limited Resources and no cryptographic material to wreak havoc on wireless networks. Initial research focused that this attack is possible only on Adhoc networks, but in present condition wormhole attack is possible on infrastructure based wireless LANs also. We propose architecture and analyze the possibility of wormhole attack along with a countermeasure to avoid such an attack. The proposed mechanism involves the shared information between commun...

  17. 9/11-Related Experiences and Tasks of Landfill and Barge Workers: Qualitative Analysis from the World Trade Center Health Registry

    Directory of Open Access Journals (Sweden)

    Cone James E

    2011-05-01

    Full Text Available Abstract Background Few studies have documented the experiences of individuals who participated in the recovery and cleanup efforts at the World Trade Center Recovery Operation at Fresh Kills Landfill, on debris loading piers, and on transport barges after the September 11, 2001 terrorist attack. Methods Semi-structured telephone interviews were conducted with a purposive sample of workers and volunteers from the World Trade Center Health Registry. Qualitative methods were used to analyze the narratives. Results Twenty workers and volunteers were interviewed. They described the transport of debris to the Landfill via barges, the tasks and responsibilities associated with their post-9/11 work at the Landfill, and their reflections on their post-9/11 experiences. Tasks included sorting through debris, recovering human remains, searching for evidence from the terrorist attacks, and providing food and counseling services. Exposures mentioned included dust, fumes, and odors. Eight years after the World Trade Center disaster, workers expressed frustration about poor risk communication during recovery and cleanup work. Though proud of their contributions in the months after 9/11, some participants were concerned about long-term health outcomes. Conclusions This qualitative study provided unique insight into the experiences, exposures, and concerns of understudied groups of 9/11 recovery and cleanup workers. The findings are being used to inform the development of subsequent World Trade Center Health Registry exposure and health assessments.

  18. The role of sleep in migraine attacks

    Directory of Open Access Journals (Sweden)

    Elaine Inamorato

    1993-11-01

    Full Text Available Migraine attacks may be precipitated by sleep deprivation or excessive sleep and sleep is also associated with relief of migraine attacks. In view of this variable relationship we studied the records of 159 consecutive outpatients of our Headache Unit. In 121 records there was reference to sleep involvement, in 55% by a single form and in 45% by more than one form. When only one form was related, relief was most common (70%. 30% of that group of patients had the migraine attack precipitated by sleep, 24% by deprivation and 6% by sleep excess. When the effects of sleep were multiple, these effects were as expected logically in 65%: «in accordance» group (e.g attack precipitated by sleep deprivation and relieved by sleep onset. In a second group, («conflicting» where the involvement was not logical, there were three different combinations of sleep involvement, possibly due to more than one pathophysiological mechanism.

  19. Recovery of infrastructure networks after localised attacks

    Science.gov (United States)

    Hu, Fuyu; Yeung, Chi Ho; Yang, Saini; Wang, Weiping; Zeng, An

    2016-04-01

    The stability of infrastructure network is always a critical issue studied by researchers in different fields. A lot of works have been devoted to reveal the robustness of the infrastructure networks against random and malicious attacks. However, real attack scenarios such as earthquakes and typhoons are instead localised attacks which are investigated only recently. Unlike previous studies, we examine in this paper the resilience of infrastructure networks by focusing on the recovery process from localised attacks. We introduce various preferential repair strategies and found that they facilitate and improve network recovery compared to that of random repairs, especially when population size is uneven at different locations. Moreover, our strategic repair methods show similar effectiveness as the greedy repair. The validations are conducted on simulated networks, and on real networks with real disasters. Our method is meaningful in practice as it can largely enhance network resilience and contribute to network risk reduction.

  20. SECURING MANET FROM BLACKHOLE AND WORMHOLE ATTACKS

    Directory of Open Access Journals (Sweden)

    C.M.Vidhyapathi

    2013-06-01

    Full Text Available Mobile Ad-Hoc networks are self-configuring and self-organizing multi-hop wireless networks. They do not have any fixed infrastructure or centralized management. Due to this, the ad hoc networks are vulnerable to attacks. The routing protocol for MANET considered in this paper is AODV(Ad hoc On-demand Distance Vector Routing Protocol. Blackhole and Wormhole nodes are malicious nodeswhich degrade the performance of the network. They actively participate in the network and conform to forward packets to the destination. The Watchdog Mechanism is used to correct the network from both blackhole and wormhole attacks. The networks originally, with the attacks and after being prevented from attacks are compared on the basis of packets received, throughput, end-to-end delay and packet delivery ratio. ns2 software is used for the simulation.

  1. Women's Heart Disease: Heart Attack Symptoms

    Science.gov (United States)

    ... this page please turn JavaScript on. Feature: Women's Heart Disease Heart Attack Symptoms Past Issues / Winter 2014 Table ... NHLBI has uncovered some of the causes of heart diseases and conditions, as well as ways to prevent ...

  2. Karachi Commander Escapes Attack, 10 Dead

    Institute of Scientific and Technical Information of China (English)

    潘志强

    2004-01-01

    KARACHI: The army commander in the Pakistani city of Karachi narrowly① escaped assassination② yesterday when gunmen attacked his convoy③ with gunfire and a bomb, killing at least 10 and wounding his driver, officials said.

  3. Compiling symbolic attacks to protocol implementation tests

    Directory of Open Access Journals (Sweden)

    Michael Rusinowitch

    2013-07-01

    Full Text Available Recently efficient model-checking tools have been developed to find flaws in security protocols specifications. These flaws can be interpreted as potential attacks scenarios but the feasability of these scenarios need to be confirmed at the implementation level. However, bridging the gap between an abstract attack scenario derived from a specification and a penetration test on real implementations of a protocol is still an open issue. This work investigates an architecture for automatically generating abstract attacks and converting them to concrete tests on protocol implementations. In particular we aim to improve previously proposed blackbox testing methods in order to discover automatically new attacks and vulnerabilities. As a proof of concept we have experimented our proposed architecture to detect a renegotiation vulnerability on some implementations of SSL/TLS, a protocol widely used for securing electronic transactions.

  4. AN APPROACH OF DEFENDING AGAINST DDOS ATTACK

    Institute of Scientific and Technical Information of China (English)

    Wu Zhijun; Duan Haixin; Li Xing

    2006-01-01

    An approach of defending against Distributed Denial of Service (DDoS) attack based on flow model and flow detection is presented. The proposed approach can protect targets from DDoS attacking, and allow targets to provide good service to legitimate traffic under DDoS attacking, with fast reaction. This approach adopts the technique of dynamic comb filter, yields a low level of false positives of less than 1.5%,drops similar percentage of good traffic, about 1%, and passes neglectable percentage of attack bandwidth to the victim, less than 1.5%. The prototype of commercial product, D-fighter, is developed by implementing this proposed approach on Intel network processor platform IXP 1200.

  5. A NEW METHOD FOR RESYNCHRONIZATION ATTACK

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    This paper presents a new method for resynchronization attack, which is the combination of the differential cryptanalysis and algebraic attack. By using the new method one gets a system of linear equations or low-degree equations about initial keys, and the solution of the system of equations results in the recovery of the initial keys. This method has a lower computational complexity and better performance of attack in contrast to the known methods. Accordingly, the design of the resynchronization stream generators should be reconsidered to make them strong enough to avoid our attacks. When implemented to the Toyocrypt, our method gains the computational complexity of O(217), and that of O(267) for LILI-128.

  6. Desynchronization Attacks on RFID Security Protocols

    Directory of Open Access Journals (Sweden)

    Miaolei Deng

    2013-02-01

    Full Text Available The characteristics of radio frequency identification (RFID systems introduce growing security and privacy concerns. RFID systems need security protocols to provide confidentiality, user privacy, mutual authentication and etc. Many security protocols for the RFID system have been presented. This paper analyze several of the newest RFID security protocols which proposed by Niu et al., Fu et al. and Habibi et al. respectively form the security viewpoint of data desynchronization attack. These lightweight protocols were expected to proposed security protections for the RFID system and safeguard against almost all major attacks. However, we found that these RFID security protocols were vulnerable to the attack of data desynchronization. Based on strand spaces model, data desynchronization attacks on these protocols were analyzed and described. Furthermore, improvements to overcome the security vulnerabilities of two protocols presented by Niu et al. and Fu et al. were given.

  7. Dengue Virus May Bolster Zika's Attack

    Science.gov (United States)

    ... page: https://medlineplus.gov/news/fullstory_159534.html Dengue Virus May Bolster Zika's Attack Prior exposure to ... 23, 2016 (HealthDay News) -- Prior exposure to the dengue fever virus may increase the severity of Zika ...

  8. Fault attacks on two software countermeasures

    OpenAIRE

    Moro, Nicolas; Heydemann, Karine; Dehbaoui, Amine; Robisson, Bruno; Encrenaz, Emmanuelle

    2014-01-01

    Short version of the article "Experimental evaluation of two software countermeasures against fault attacks" presented at the 2014 IEEE Symposium on Hardware-Oriented Security and Trust (HOST) in May 2014.

  9. CASE STUDY OF SQL INJECTION ATTACKS

    OpenAIRE

    Sonakshi*, Rakesh Kumar, Girdhar Gopal

    2016-01-01

    Today, most of the web applications are associated with database at back-end so there are possibilities of SQL injection attacks (SQLIA) on it. A number of preventive measures have also been discovered by various researchers to overcome this attack, but which measure is more convenient and provides fast access to application without compromising the security is also a major concern nowadays. This paper provides a clear distinction among different types of SQLIAs and how these can be performed...

  10. Compiling symbolic attacks to protocol implementation tests

    OpenAIRE

    Michael Rusinowitch; Ghazi Maatoug; Hatem Ghabri

    2013-01-01

    Recently efficient model-checking tools have been developed to find flaws in security protocols specifications. These flaws can be interpreted as potential attacks scenarios but the feasability of these scenarios need to be confirmed at the implementation level. However, bridging the gap between an abstract attack scenario derived from a specification and a penetration test on real implementations of a protocol is still an open issue. This work investigates an architecture for automatically g...

  11. Panic Attack during Elective Gastrointestinal Endoscopy

    OpenAIRE

    Charalampos Mitsonis; Nikolaos Dimopoulos; Marianna Zavrou; Vassiliki Psarra; Christos Giofkos; Christos Fiorakis; Athanasios Dimitriadis; Dimitrios Valavanis; Eleni Vousoura; Iannis Zervas; Efstathios Papavassiliou

    2011-01-01

    Background. Esophagogastroduodenoscopy (EGD) and colonoscopy (CS) can evoke anxiety, embarrassment, and discomfort. These concerns can culminate in panic attacks, which may traumatize patients and significantly decrease their compliance to the procedure. The objective of this study was to evaluate the relationship between preendoscopic anxiety and the possibility of a panic attack during an elective gastrointestinal endoscopy (EGE). Methods. The study population comprised of 79 Greek outpatie...

  12. Attacks in WEB Based Embedded Applications

    OpenAIRE

    C. Yaashuwanth; Ramesh, R.

    2010-01-01

    This paper deals with the issues related to embedded applications when they are implemented in internet. There are various attacks in embedded systems when implemented in the internet. These attacks have a negligible effect in the operating system which results in the decrease in the system performance. But in embedded system case, it has life and death consequence attached to it. Many of these embedded systems work in hazardous environment where a system failure results to catastrophic effec...

  13. Wireless Sensor Networks Attacks and Solutions

    OpenAIRE

    Alajmi, Naser

    2014-01-01

    A few years ago, wireless sensor networks (WSNs) used by only military. Now, we have seen many of organizations use WSNs for some purposes such as weather, pollution, traffic control, and healthcare. Security is becoming on these days a major concern for wireless sensor network. In this paper I focus on the security types of attacks and their detection. This paper anatomizes the security requirements and security attacks in wireless sensor networks. Also, indicate to the benchmarks for the se...

  14. Cluster headache attacks and multiple sclerosis

    OpenAIRE

    Gentile, Salvatore; Ferrero, Margherita; Vaula, Giovanna; Rainero, Innocenzo; Pinessi, Lorenzo

    2007-01-01

    We report the case of a patient who developed typical cluster headache attacks and was diagnosed as having multiple sclerosis (MS) at the same time. The headache attacks resolved after i.v. treatment with methylprednisolone. MR imaging showed a pontine demyelinating lesion involving the trigeminal nerve root inlet area, on the same side as the pain. The association between cluster headache and MS has been rarely described before. This case suggests that in patients with cluster headache neuro...

  15. Cyber Security Audit and Attack Detection Toolkit

    Energy Technology Data Exchange (ETDEWEB)

    Peterson, Dale

    2012-05-31

    This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.

  16. Two Improved Multiple-Differential Collision Attacks

    OpenAIRE

    An Wang; Liji Wu; Zongyue Wang; Xuexin Zheng; Man Chen; Jing Ma

    2014-01-01

    In CHES 2008, Bogdanov proposed multiple-differential collision attacks which could be applied to the power analysis attacks on practical cryptographic systems. However, due to the effect of countermeasures on FPGA, there are some difficulties during the collision detection, such as local high noise and the lack of sampling points. In this paper, keypoints voting test is proposed for solving these problems, which can increase the success ratio from 35% to 95% on the example of one implementat...

  17. Various Database Attacks and its Prevention Techniques

    OpenAIRE

    K.A.VarunKumar; M.Prabakaran; Ajay Kaurav; S.Sibi Chakkaravarthy; Thiyagarajan, S; Pokala Venkatesh

    2014-01-01

    Increasing in the popularity of internet, the application of database also widely spread. There are some serious threats because of hackers done various attempts to steal the data in the database. Various attacks like Sql injection, Cross site scripting may change the information in the databases which decreases the truthfulness of the database. Intrusion detection system is used to detect whether the attack is carried on the database. In this paper we surveyed different types of database att...

  18. Private Circuits II versus Fault Injection Attacks

    OpenAIRE

    Rakotomalala, Henitsoa; Ngo, Xuan Thuy; Najm, Zakaria; Danger, Jean-Luc; Guilley, Sylvain

    2015-01-01

    —Cryptographic implementations are subject to physical attacks. Private circuits II is a proven protection against a strong attacker, able to read and write on a finite number of chosen internal nodes. In practice, side-channel analyses and fault injections are less accurate: typically, classical injection techniques (clock and power glitches, electromagnetic pulses, etc.) can be reproducible, but they do not allow to choose the targeted nodes (the situation is different for software dual-rai...

  19. Logical Modes of Attack in Argumentation Networks

    OpenAIRE

    Gabbay, Dov M.; Garcez, A. S. D. Avila

    2009-01-01

    This paper studies methodologically robust options for giving logical contents to nodes in abstract argumentation networks. It defines a variety of notions of attack in terms of the logical contents of the nodes in a network. General properties of logics are refined both in the object level and in the meta level to suit the needs of the application. The network-based system improves upon some of the attempts in the literature to define attacks in terms of defeasible proofs, the...

  20. Session Initiation Protocol Attacks and Challenges

    OpenAIRE

    Keshavarz, Hassan; Sattari, Mohammad Reza Jabbarpour; Noor, Rafidah Md

    2012-01-01

    In recent years, Session Initiation Protocol (SIP) has become widely used in current internet protocols. It is a text-based protocol much like Hyper Text Transport Protocol (HTTP) and Simple Mail Transport Protocol (SMTP). SIP is a strong enough signaling protocol on the internet for establishing, maintaining, and terminating session. In this paper the areas of security and attacks in SIP are discussed. We consider attacks from diverse related perspectives. The authentication schemes are comp...

  1. To mitigate Black-hole attack with CBDS in MANET

    Directory of Open Access Journals (Sweden)

    Navjot

    2015-06-01

    Full Text Available Mobile ad-hoc network is self configured network that consist of mobile nodes which communicate with each other. Distributed self-organized nature of this network makes it venerable to various attacks likes DOS attack, Black hole attack, wormhole attack and jamming attack etc. Blackhole attack is one of the serious attack in network in which information loss occur which degrades the performance of network. In this work black hole attack is detected with the help of CBDS (cooperative Bait Detection Algorithm and MD5 is used for the security purpose. This work is implemented in Network simulator and performance is checked on the bases of network parameters.

  2. Noncombatants and liability to be attacked in wars

    DEFF Research Database (Denmark)

    Lippert-Rasmussen, Kasper

    2013-01-01

    attack," I mean that S has forfeited his or her right not to be attacked by armed forces. Here, "liable" is used in a normative-cum-legal sense, not descriptively as it is when one says "some colors are liable to darken in perpetual shade," and "attack" is used passively, as an equivalent of be attacked...... mean to focus on intended, as opposed to incidental, attacks. Finally, although "attack" often implies initiation of a conflict ("I didn't attack him! He started it!"), it does not do so here. An unjust aggressor who initiates a conflict can be, and indeed very often is, liable to attack. All...

  3. Distinguishing attack and second-preimage attack on encrypted message authentication codes (EMAC)

    Science.gov (United States)

    Ariwibowo, Sigit; Windarta, Susila

    2016-02-01

    In this paper we show that distinguisher on CBC-MAC can be applied to Encrypted Message Authentication Code (EMAC) scheme. EMAC scheme in general is vulnerable to distinguishing attack and second preimage attack. Distinguishing attack simulation on AES-EMAC using 225 message modifications, no collision have been found. According to second preimage attack simulation on AES-EMAC no collision found between EMAC value of S1 and S2, i.e. no second preimage found for messages that have been tested. Based on distinguishing attack simulation on truncated AES-EMAC we found collision in every message therefore we cannot distinguish truncated AES-EMAC with random function. Second-preimage attack is successfully performed on truncated AES-EMAC.

  4. Nanotubes Motion on Layered Materials: A Registry Perspective

    CERN Document Server

    Oz, Inbal; Itkin, Yaron; Buchwalter, Asaf; Akulov, Katherine; Hod, Oded

    2015-01-01

    At dry and clean material junctions of rigid materials the corrugation of the sliding energy landscape is dominated by variations of Pauli repulsions. These occur when electron clouds centered around atoms in adjacent layers overlap as they slide across each other. In such cases there exists a direct relation between interfacial surface (in)commensurability and superlubricity, a frictionless and wearless tribological state. The Registry Index is a purely geometrical parameter that quanti?es the degree of interlayer commensurability, thus providing a simple and intuitive method for the prediction of sliding energy landscapes at rigid material interfaces. In the present study, we extend the applicability of the Registry Index to non-parallel surfaces, using a model system of nanotubes motion on ?at hexagonal materials. Our method successfully reproduces sliding energy landscapes of carbon nanotubes on Graphene calculated using a Lennard-Jones type and the Kolmogorov-Crespi interlayer potentials. Furthermore, it...

  5. Registry Evaluation of Digital Ulcers in Systemic Sclerosis

    Directory of Open Access Journals (Sweden)

    Felice Galluccio

    2010-01-01

    Full Text Available Digital ulcers are a very frequent complication of systemic sclerosis affecting about half of the SSc patients, and about 75% of the affected patients have their first DU episode within 5 years from their first non-Raynaud symptom. The lack of adequate classification criteria as well as the lack of knowledge of the development of DU have contributed to the opening of specific registries to better understand the natural history of these lesions. For these reason, specific disease registries play a fundamental role in this field of research. Thanks to the systematic collection of data and their subsequent analysis and comparison between different cohorts, it is possible to improve understanding of the underlying trigger mechanisms of DU development and to determine temporal trends. In the future, the development of recommendations for the management of DU remains of pivotal importance to prevent DU development and obtain rapid healing as well as reduction of pain and disability.

  6. The German Aortic Valve Registry (GARY): in-hospital outcome

    OpenAIRE

    Hamm, Christian W.; Möllmann, Helge; Holzhey, David; Beckmann, Andreas; Veit, Christof; Figulla, Hans-Reiner; Cremer, J; Kuck, Karl-Heinz; Lange, Rüdiger; Zahn, Ralf; Sack, Stefan; Schuler, Gerhard; Walther, Thomas; Beyersdorf, Friedhelm; Böhm, Michael

    2013-01-01

    Background Aortic stenosis is a frequent valvular disease especially in elderly patients. Catheter-based valve implantation has emerged as a valuable treatment approach for these patients being either at very high risk for conventional surgery or even deemed inoperable. The German Aortic Valve Registry (GARY) provides data on conventional and catheter-based aortic procedures on an all-comers basis. Methods and results A total of 13 860 consecutive patients undergoing repair for aortic valve d...

  7. Results from a multicentre international registry of familial Mediterranean fever

    DEFF Research Database (Denmark)

    Ozen, Seza; Demirkaya, Erkan; Amaryan, Gayane;

    2014-01-01

    BACKGROUND AND AIM: Familial Mediterranean fever (FMF) is an autoinflammatory disease caused by mutations of the MEFV gene. We analyse the impact of ethnic, environmental and genetic factors on the severity of disease presentation in a large international registry. METHODS: Demographic, genetic and...... history. CONCLUSIONS: Eastern Mediterranean FMF patients have a milder disease phenotype once they migrate to Europe, reflecting the effect of environment on the expression of a monogenic disease....

  8. Baseline Characteristics of the Korean Registry of Pulmonary Arterial Hypertension

    OpenAIRE

    Chung, Wook-Jin; Park, Yong Bum; Jeon, Chan Hong; Jung, Jo Won; Ko, Kwang-Phil; Choi, Sung Jae; Seo, Hye Sun; Lee, Jae Seung; Jung, Hae Ok; ,

    2015-01-01

    Despite recent advances in understanding of the pathobiology and targeted treatments of pulmonary arterial hypertension (PAH), epidemiologic data from large populations have been limited to western countries. The aim of the Korean Registry of Pulmonary Arterial Hypertension (KORPAH) was to examine the epidemiology and prognosis of Korean patients with PAH. KORPAH was designed as a nationwide, multicenter, prospective data collection using an internet webserver from September 2008 to December ...

  9. Pleural Mesothelioma Surveillance: Validity of Cases from a Tumour Registry

    Directory of Open Access Journals (Sweden)

    France Labrèche

    2012-01-01

    Full Text Available BACKGROUND: Pleural mesothelioma is a rare tumour associated with exposure to asbestos fibres. Fewer than than one-quarter of cases registered in the Quebec Tumour Registry (QTR have been compensated as work-related. While establishing a surveillance system, this led to questioning as to whether there has been over-registration of cases that are not authentic pleural mesotheliomas in the QTR.

  10. The German IVF-Registry – D·I·R

    Directory of Open Access Journals (Sweden)

    Bühler K

    2013-01-01

    Full Text Available Systematic data collection in the field of assisted reproductive techniques is performed in Germany since 30 years. Since 1997, data collection is performed electronically and in a prospective way. In 1998, by a code of the German Medical Association participation at the registry has become mandatory for all IVF centres in Germany. Different software solutions can be used in the centres for data collection. All of them have to cooperate with a special “DIRmod-DLL”, controlling online plausibility and prospectivity of the collected data. More than one million treatment cycles have been reported in the annuals published since 1996 up to 2010. All in all 1.2 millions cycles are included in the registry. Clinical pregnancy rate increased continuously and miscarriage rate decreased. By reduction of the mean number of transferred embryos of about 20% the percentage of born triplets in relationship to all children born after ART decreased of about 80%. It can be shown with the huge number of documented cycles that political decisions exert a dominating influence on treatment and drug choice. The German IVF registry has been established over the last 30 years as an instrument of quality assurance and has experienced highest regard by colleagues and by the international scientific world.

  11. Military Orthopaedic Trauma Registry: Quality Data Now Available.

    Science.gov (United States)

    Rivera, Jessica C; Greer, Renee M; Wenke, Joseph C; Ficke, James R; Johnson, Anthony E

    2016-01-01

    The Military Orthopaedic Trauma Registry (MOTR) orginally began as part of the Department of Defense Trauma Registry (DoDTR) and became a live registry in 2013. As a quality improvement process, this study examined MOTR data for 20 female amputees compared with DoDTR data. The DoDTR provided diagnosis and procedure codes as a list but no details. The MOTR provided additional data, including specific limb, fracture classifications, and associated injuries per limb. The MOTR allowed for construction of a treatment time line for each limb, including number and timing of debridements, antibiotics, and implant types. Orthopaedic-specific complications were also coded more frequently in the MOTR and clearly identified with a specific injury and treatment. During initial quality control checks, the MOTR provides a greater volume and granularity of detail for orthopaedic-specific injury and treatment information, indicating that the MOTR is on track to provide a valuable repository for data-driven orthopaedic management of combat injury. PMID:27518292

  12. When Regional Innovation Policies Meet Policy Rationales and Evidence:

    DEFF Research Database (Denmark)

    Borrás, Susana; Jordana, Jacint

    innovation policy rationales, advocating for more specialisation; likewise, greater data availability at the regional level has allowed more sophisticated assessment of innovation performance. Finally, the crisis since 2008 has had ravaging effects in some regions, with job losses and severe economic...

  13. Building "Applied Linguistic Historiography": Rationale, Scope, and Methods

    Science.gov (United States)

    Smith, Richard

    2016-01-01

    In this article I argue for the establishment of "Applied Linguistic Historiography" (ALH), that is, a new domain of enquiry within applied linguistics involving a rigorous, scholarly, and self-reflexive approach to historical research. Considering issues of rationale, scope, and methods in turn, I provide reasons why ALH is needed and…

  14. Karl Popper and Jean Piaget: A Rationale for Constructivism

    Science.gov (United States)

    Harlow, Steve; Cummings, Rhoda; Aberasturi, Suzanne M.

    2006-01-01

    The current faddish use of the term constructivism has taken on as many different definitions as the number of people attempting to define it. This essay clarifies the meaning of constructivism through an examination of Karl Popper's and Jean Piaget's theories. The authors provide a rationale for the use of Popper's paradigm of "Three Worlds" and…

  15. Strength Training. Rationale for Current Guidelines for Adult Fitness Programs.

    Science.gov (United States)

    Feigenbaum, Matthew S.; Pollock, Michael L.

    1997-01-01

    Strength training is an effective method of developing musculoskeletal strength and is often prescribed for fitness, health, and for prevention and rehabilitation of orthopedic injuries. This paper describes and presents a rationale for the population-specific strength training guidelines established by major health organizations. (SM)

  16. Rationale of Early Adopters of Fossil Fuel Divestment

    Science.gov (United States)

    Beer, Christopher Todd

    2016-01-01

    Purpose: This research uses the social science perspectives of institutions, ecological modernization and social movements to analyze the rationale used by the early-adopting universities of fossil fuel divestment in the USA. Design/methodology/approach: Through analysis of qualitative data from interviews with key actors at the universities that…

  17. Introducing ICT in Schools in England: Rationale and Consequences

    Science.gov (United States)

    Hammond, Michael

    2014-01-01

    This paper provides a critical perspective on the attempts to promote the use of information and communication technology (ICT) in teaching and learning in England. It describes the rationale given for the introduction of ICT in terms of its potential to impact on educational standards to contribute to developing a curriculum which has more…

  18. Social Stories[TM]: A Possible Theoretical Rationale

    Science.gov (United States)

    Reynhout, Georgina; Carter, Mark

    2011-01-01

    Social Stories[TM] are an intervention widely used with individuals with autism spectrum disorders (ASD). This paper discusses a possible theoretical rationale that might account for the purported efficacy of Social Stories[TM]. Attributes of individuals with ASD in relation to Social Story intervention including difficulties with theory of mind…

  19. Meeting a Moral Imperative: A Rationale for Teaching the Holocaust

    Science.gov (United States)

    Lindquist, David H.

    2011-01-01

    A primary rationale for studying the Holocaust (Shoah) involves the opportunity to consider the moral implications that can be drawn from examining the event. Studying the Shoah forces students to consider what it means to be human and humane by examining the full continuum of individual behavior, from "ultimate evil" to "ultimate good". This…

  20. Rationales behind the choice of administration form with fentanyl

    DEFF Research Database (Denmark)

    Jacobsen, Ramune; Møldrup, Claus; Christrup, Lona

    2010-01-01

    BACKGROUND AND AIM: The aim of this study was to describe the rationale behind the choice of fentanyl administration forms among Danish general practitioners (GPs). METHODS: Thirty-eight Danish GPs were contacted via an Internet survey system to perform a Delphi survey. In the brainstorming phase...

  1. A Rationale for Mixed Methods (Integrative) Research Programmes in Education

    Science.gov (United States)

    Niaz, Mansoor

    2008-01-01

    Recent research shows that research programmes (quantitative, qualitative and mixed) in education are not displaced (as suggested by Kuhn) but rather lead to integration. The objective of this study is to present a rationale for mixed methods (integrative) research programs based on contemporary philosophy of science (Lakatos, Giere, Cartwright,…

  2. Framing Involvement: Rationale Construction in an Interorganisational Collaboration

    Science.gov (United States)

    Siegel, David J.

    2008-01-01

    An analysis of the different rationales articulated and utilized by partners in an interorganizational collaboration is the focus of this paper. The Leadership Education and Development (LEAD) Program in Business is an initiative involving 12 US universities, nearly 40 multinational corporations, a federal government agency, and a non-profit…

  3. The Jericho Option: Al-Qa'ida and Attacks on Critical Infrastructure

    Energy Technology Data Exchange (ETDEWEB)

    Ackerman, G; Blair, C; Bale, J; Hahn, G; DiLorenzo, E; Vadlamudi, S; Lunsford, C

    2006-08-28

    There is no doubt that al-Qaida and its affiliates have displayed, and continue to display, an acute interest in attacking targets that are considered to be important components of the infrastructure of the United States. What has not thus far been carried out, however, is an in-depth examination of the basic nature, historical evolution, and present scope of the organization's objectives that might help government personnel develop sound policy recommendations and analytical indicators to assist in detecting and interdicting plots of this nature. This study was completed with the financial support of the Lawrence Livermore National Laboratory, through a project sponsored by the U.S. Department of Homeland Security, Science and Technology Directorate. It is specifically intended to increase counterterrorism analysts understanding of certain features of al-Qaida's strategy and operations in order to facilitate the anticipation and prevention of attacks directed against our most critical infrastructures. The procedure adopted herein has involved consulting a wide variety of source materials that bear on the topic, ranging from sacred religious texts and historical accounts to al-Qaida-linked materials and the firsthand testimony of captured members of the group. It has also intentionally combined multiple approaches, including exploring the more esoteric religion-historical referents that have served to influence al-Qaida's behavior, providing a strategic analysis of its objectives and targeting rationales, closely examining the statements and writings of al-Qaida leaders and spokesmen (in part on the basis of material translated from primary sources), offering a descriptive analysis of its past global attack patterns, and producing concise but nonetheless in-depth case studies of its previous ''infrastructural'' attacks on U.S. soil. The analyses contained herein tend to support the preliminary assessment made by some of the

  4. Measuring and maximizing coverage in the World Trade Center Health Registry.

    Science.gov (United States)

    Murphy, Joe; Brackbill, Robert M; Thalji, Lisa; Dolan, Melissa; Pulliam, Paul; Walker, Deborah J

    2007-04-15

    The World Trade Center Health Registry (WTCHR) is a database for following people who were exposed to the disaster of 11 September 2001. Hundreds of thousands of people were exposed to the immense cloud of dust and debris, the indoor dust, the fumes from persistent fires, and the mental trauma of the terrorist attacks on the WTC on 9/11. The purpose of the WTCHR is to evaluate the potential short- and long-term physical and mental health effects of the disaster. The definitions of the exposed groups are broad and defined based on an understanding of which groups had the highest exposures to the WTC disaster and its aftermath. The four exposure groups include rescue and recovery workers, residents, students and school staff, and building occupants and passersby in Lower Manhattan. While one goal of the WTCHR was to maximize coverage overall and for each exposure group, another was to ensure equal representation within exposure groups. Because of the multiple sample types pursued, several approaches were required to determine eligibility. Estimates of the number of eligible persons in each of the exposed populations were based on the best available information including Census, entity-specific employment figures, and public and private school enrollment data, among other publicly available sources. To address issues of undercoverage and overcoverage a variety of methods were assessed or applied, including a capture-recapture analyses test of overlapping sample building list sources and automated deduplication of sample records. Estimates of the true eligible population indicate that over 400,000 unique individuals were eligible for the baseline health survey. Interviewer-administered surveys were completed with more than 71,000 persons, resulting in an overall enrollment rate of approximately 17 per cent. Coverage was highest among rescue and recovery workers, followed by residents, students and school staff, and building occupants. Both the accuracy of coverage

  5. Report of incidence and mortality in China cancer registries, 2009

    Institute of Scientific and Technical Information of China (English)

    Wanqing Chen; Rongshou Zheng; Siwei Zhang; Ping Zhao; Guanglin Li; Lingyou Wu; Jie He

    2013-01-01

    The National Central Cancer Registry (NCCR) collected cancer registration data in 2009 from local cancer registries in 2012,and analyzed to describe cancer incidence and mortality in China.Methods.:On basis of the criteria of data quality from NCCR,data subrnitted from 104 registries were checked and evaluated.There were 72 registries' data qualified and accepted for cancer registry annual report in 2012.Descriptive analysis included incidence and mortality stratified by area (urban/rural),sex,age group and cancer site.The top 10 common cancers in different groups,proportion and cumulative rates were also calculated.Chinese population census in 1982 and Segi's population were used for age-standardized incidence/mortality rates.Results:All 72 cancer registries covered a total of 85,470,522 population (57,489,009 in urban and 27,981,513 in rural areas).The total new cancer incident cases and cancer deaths were 244,366 and 154,310,respectively.The morphology verified cases accounted for 67.23%,and 3.14% of incident cases only had information from death certifications.The crude incidence rate in Chinese cancer registration areas was 285.91/100,000(males 317.97/100,000,females 253.09/100,000),age-standardized incidence rates by Chinese standard population (ASIRC) and by world standard population (ASIRW) were 146.87/100,000 and 191.72/100,000 with the cumulative incidence rate (0-74 age years old) of 22.08%.The cancer incidence and ASIRC were 303.39/100,000 and 150.31/100,000 in urban areas whereas in rural areas,they were 249.98/100,000 and 139.68/100,000,respectively.The cancer mortality in Chinese cancer regist-ation areas was 180.54/100,000 (224.20/100,000 in males and 135.85/100,000 in females),age-standardized umortality rates by Chinese standard population (ASMRC) and by world standard population (ASMRW) were 85.06/100,000 and 115.65/100,000,and the cumulative incidence rate (0-74 age years old) was 12.94%.The cancer mortality and ASMRC were 181

  6. Panic Attack during Elective Gastrointestinal Endoscopy

    Directory of Open Access Journals (Sweden)

    Charalampos Mitsonis

    2011-01-01

    Full Text Available Background. Esophagogastroduodenoscopy (EGD and colonoscopy (CS can evoke anxiety, embarrassment, and discomfort. These concerns can culminate in panic attacks, which may traumatize patients and significantly decrease their compliance to the procedure. The objective of this study was to evaluate the relationship between preendoscopic anxiety and the possibility of a panic attack during an elective gastrointestinal endoscopy (EGE. Methods. The study population comprised of 79 Greek outpatients. The examination was carried out without the use of conscious sedation. Patients' anxiety levels were assessed before the procedure using the Greek version of the Spielberger State-Trait Anxiety Inventory (STAI-Y. Results. Seventy-nine patients were enrolled: 45 EGD and 34 CS. Females had higher state and trait anxiety levels than males (48.14 ± 7.94 versus 44.17 ± 7.43, <0.05; and 43.68 ± 6.95 versus 39.86 ± 7.46, <0.05. Patients who experienced panic attack had significantly higher levels of both trait and state anxiety, compared to those who were panic-free. There was no significant relationship between panic attacks and sex or type of procedure. Conclusions. Patients who experience panic attacks during endoscopic procedures appear to have significantly higher anxiety levels before the procedure. Administering the STAI questionnaire prior to the endoscopy seems to be a useful screening method for vulnerable patients.

  7. Detecting and Localizing Wireless Network Attacks Techniques

    Directory of Open Access Journals (Sweden)

    Iyad Aldasouqi

    2010-03-01

    Full Text Available In order to increase employee productivity within a feasible budget, we have to track newtechnologies, investigate and choose the best plan and implementation of these technologies.WLAN is vulnerable to malicious attacks due to their shared medium in unlicensed frequencyspectrum, thus requiring security features for a variety of applications.This paper will discuss some techniques and approaches which can help to detect, localize andidentify wireless network attacks, which present a unique set of challenges to IT and securityprofessionals. All efforts were focusing on the ability to identity based attacks in which amalicious device uses forged MAC addresses to masquerade as a specific client or to createmultiple illegitimate identities. Also, to be sure that the network is able to robustly identify eachtransmitter independently of packet contents, allowing detection of a large class of identity-basedattacks with high probability.The attacker can listen to all wireless traffic, compromise encryption and Use attenuators,amplifiers, directional antennas, software radios, but he cannot be at the location of user or at thelocation of access points. However, we have to choose the best design, implementation, andevaluation techniques in order to secure our network from attackers, where our choice willdepend on a technical implementation to mitigate the risk on the enterprise network infrastructure.

  8. Power analysis attacks revealing the secrets of smart cards

    CERN Document Server

    Mangard, Stefan; Popp, Thomas

    2008-01-01

    A comprehensive treatment of power analysis attacks and countermeasures. Based on the principle that the only way to defend against power analysis attacks is to understand them, this book explains how power analysis attacks work. It discusses simple and differential power analysis as well as advanced techniques like template attacks.

  9. Coronary Artery Dissection: Not Just a Heart Attack

    Science.gov (United States)

    ... Stroke More Coronary Artery Dissection: Not Just a Heart Attack Updated:May 24,2016 Sometimes a heart attack ... Disease Go Red For Women Types of aneurysms Heart Attack • Home • About Heart Attacks Acute Coronary Syndrome (ACS) • ...

  10. A Game Theoretic Approach to Cyber Attack Prediction

    Energy Technology Data Exchange (ETDEWEB)

    Peng Liu

    2005-11-28

    The area investigated by this project is cyber attack prediction. With a focus on correlation-based prediction, current attack prediction methodologies overlook the strategic nature of cyber attack-defense scenarios. As a result, current cyber attack prediction methodologies are very limited in predicting strategic behaviors of attackers in enforcing nontrivial cyber attacks such as DDoS attacks, and may result in low accuracy in correlation-based predictions. This project develops a game theoretic framework for cyber attack prediction, where an automatic game-theory-based attack prediction method is proposed. Being able to quantitatively predict the likelihood of (sequences of) attack actions, our attack prediction methodology can predict fine-grained strategic behaviors of attackers and may greatly improve the accuracy of correlation-based prediction. To our best knowledge, this project develops the first comprehensive framework for incentive-based modeling and inference of attack intent, objectives, and strategies; and this project develops the first method that can predict fine-grained strategic behaviors of attackers. The significance of this research and the benefit to the public can be demonstrated to certain extent by (a) the severe threat of cyber attacks to the critical infrastructures of the nation, including many infrastructures overseen by the Department of Energy, (b) the importance of cyber security to critical infrastructure protection, and (c) the importance of cyber attack prediction to achieving cyber security.

  11. Transforming Graphical System Models to Graphical Attack Models

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof;

    2016-01-01

    approach to transforming graphical system models to graphical attack models in the form of attack trees. Based on an asset in the model, our transformations result in an attack tree that represents attacks by all possible actors in the model, after which the actor in question has obtained the asset....

  12. Proposed Methodology for Securing Wireless LANs from Wormhole Attack

    Directory of Open Access Journals (Sweden)

    A.K. Patel

    2010-05-01

    Full Text Available Wormhole attacks enable an attacker with limited Resources and no cryptographic material to wreak havoc on wireless networks. Initial research focused that this attack is possible only on Adhoc networks, but in present condition wormhole attack is possible on infrastructure based wireless LANs also. We propose architecture and analyze the possibility of wormhole attack along with a countermeasure to avoid such an attack. The proposed mechanism involves the shared information between communicating Access Points to prevent Rouge Access Points from masquerading as false neighbours. Our defense greatly diminishes the threat of wormhole attacks and requires no location information or clock synchronization.

  13. Attack Prevention for Collaborative Spectrum Sensing in Cognitive Radio Networks

    CERN Document Server

    Duan, Lingjie; Huang, Jianwei; Shin, Kang G

    2011-01-01

    Collaborative spectrum sensing can significantly improve the detection performance of secondary unlicensed users (SUs). However, the performance of collaborative sensing is vulnerable to sensing data falsification attacks, where malicious SUs (attackers) submit manipulated sensing reports to mislead the fusion center's decision on spectrum occupancy. Moreover, attackers may not follow the fusion center's decision regarding their spectrum access. This paper considers a challenging attack scenario where multiple rational attackers overhear all honest SUs' sensing reports and cooperatively maximize attackers' aggregate spectrum utilization. We show that, without attack-prevention mechanisms, honest SUs are unable to transmit over the licensed spectrum, and they may further be penalized by the primary user for collisions due to attackers' aggressive transmissions. To prevent such attacks, we propose two novel attack-prevention mechanisms with direct and indirect punishments. The key idea is to identify collisions...

  14. Liability for damage caused by terrorist attacks

    International Nuclear Information System (INIS)

    After the terrorist attacks on September 11, 2001, one of the questions raised was about the potential liability of the operator of a nuclear power plant for damage sustained by a third party as a result of a comparable terrorist attack on a nuclear power plant. Internationally, this situation is regulated by the Convention on Third-Party Liability in Nuclear Power, the so-called Paris Liability Convention, of 1960, 1964, 1982. Among other things, that Convention excludes liability in cases directly resulting form 'actions of armed conflict..'. The problem arises, among other things, from the absence of an internationally acknowledged definition of terrorism or terrorist attack, and from the idea that, according to the Paris Convention, the legal entities assumed to be involved in such actions are states and weapons. National and international agreements and laws about the liability of the operator of nuclear facility for damage to third parties as a result of terrorist actions are analyzed and discussed. (orig.)

  15. Quantifying Mixed Uncertainties in Cyber Attacker Payoffs

    Energy Technology Data Exchange (ETDEWEB)

    Chatterjee, Samrat; Halappanavar, Mahantesh; Tipireddy, Ramakrishna; Oster, Matthew R.; Saha, Sudip

    2015-04-15

    Representation and propagation of uncertainty in cyber attacker payoffs is a key aspect of security games. Past research has primarily focused on representing the defender’s beliefs about attacker payoffs as point utility estimates. More recently, within the physical security domain, attacker payoff uncertainties have been represented as Uniform and Gaussian probability distributions, and intervals. Within cyber-settings, continuous probability distributions may still be appropriate for addressing statistical (aleatory) uncertainties where the defender may assume that the attacker’s payoffs differ over time. However, systematic (epistemic) uncertainties may exist, where the defender may not have sufficient knowledge or there is insufficient information about the attacker’s payoff generation mechanism. Such epistemic uncertainties are more suitably represented as probability boxes with intervals. In this study, we explore the mathematical treatment of such mixed payoff uncertainties.

  16. Counteracting Power Analysis Attacks by Masking

    Science.gov (United States)

    Oswald, Elisabeth; Mangard, Stefan

    The publication of power analysis attacks [12] has triggered a lot of research activities. On the one hand these activities have been dedicated toward the development of secure and efficient countermeasures. On the other hand also new and improved attacks have been developed. In fact, there has been a continuous arms race between designers of countermeasures and attackers. This chapter provides a brief overview of the state-of-the art in the arms race in the context of a countermeasure called masking. Masking is a popular countermeasure that has been extensively discussed in the scientific community. Numerous articles have been published that explain different types of masking and that analyze weaknesses of this countermeasure.

  17. Early Detection of SQL Injection Attacks

    Directory of Open Access Journals (Sweden)

    Hossain Shahriar

    2013-07-01

    Full Text Available SQL Injection (SQLI is a common vulnerability found in web applications.The starting point of SQLIattack is the client-side (browser. If attack inputs can be detected early at the browse side, then it could bethwarted early by not forwarding the malicious inputs to the server-side for further processing.This paperpresents a client-side approach to detect SQLI attacks1. The client-side accepts shadow SQL queries fromthe server-side and checks any deviation betweenshadow queries with dynamic queries generated withuser supplied inputs. We measure the deviation of shadow query and dynamic query based on conditionalentropy metrics and propose four metrics in this direction. We evaluate the approach with three PHPapplications containing SQLI vulnerabilities. The evaluation results indicate that our approach can detectwell-known SQLI attacks early at the client-side and impose negligible overhead.

  18. A framework for design rationale capture and use during geometry design

    OpenAIRE

    Van Schaik, Jeroen Robbert

    2014-01-01

    Despite broad agreement on the utility of design rationale use and capture, a review of the relevant literature shows that industrial usage remains limited, especially during geometry design. An initial field study confirmed low design rationale capture during the geometry design stage. The lack of linking between design rationale and geometry models is identified as a factor holding back design rationale capture. A toolset is presented to link entities in geometry models to design ra...

  19. Quantifying Public Response towards Islam on Twitter after Paris Attacks

    OpenAIRE

    Magdy, Walid; Darwish, Kareem; Abokhodair, Norah

    2015-01-01

    The Paris terrorist attacks occurred on November 13, 2015 prompted a massive response on social media including Twitter, with millions of posted tweets in the first few hours after the attacks. Most of the tweets were condemning the attacks and showing support to Parisians. One of the trending debates related to the attacks concerned possible association between terrorism and Islam and Muslims in general. This created a global discussion between those attacking and those defending Islam and M...

  20. Quality control and assurance in hematopoietic stem cell transplantation data registries in Japan and other countries.

    Science.gov (United States)

    Kuwatsuka, Yachiyo

    2016-01-01

    Observational studies from national and international registries with large volumes of patients are commonly performed to identify superior strategies for hematopoietic stem cell transplantation. Major international and national stem cell transplant registries collect outcome data using electronic data capture systems, and a systematic study support process has been developed. Statistical support for studies is available from some major international registries, and international and national registries also mutually collaborate to promote stem cell transplant outcome studies and transplant-related activities. Transplant registries additionally take measures to improve data quality to further improve the quality of outcome studies by utilizing data capture systems and manual data management. Data auditing can potentially even further improve data quality; however, human and budgetary resources can be limiting factors in system construction and audits of the Japanese transplant registry are not currently performed. PMID:26563189

  1. Effect of migraine attacks on paracetamol absorption.

    OpenAIRE

    Tokola, R A; Neuvonen, P J

    1984-01-01

    The absorption of effervescent paracetamol (1000 mg) was investigated in nine female patients during a migraine attack and in the same patients when headache free. Migraine attack decreased (P less than 0.05) the areas under the serum paracetamol concentration-time curves (AUC) of 0-2 h, 0-4 h and 0-6 h and the peak serum concentration. The severity of nausea correlated significantly with the decrease in the AUC values. Our results support findings of delayed gastric emptying in migraine atta...

  2. Attack strategies on quantum cryptographic protocols

    International Nuclear Information System (INIS)

    Full text: Quantum key distribution (QKD) and quantum authentication (QA) have been a topic of extensive research in the last 20 years. In course of that many attacks on QKD and QA protocols have been studied. Among these, Zhang, Lee and Guo presented an attack on a QKD protocol using entanglement swapping. Based on that strategy we take a look at other protocols to inspect how much information an adversary may get if he shares entanglement with either one or both parties. We will present some protocols where an adversary can even get full information about the key using entanglement. (author)

  3. Session Initiation Protocol Attacks and Challenges

    CERN Document Server

    Keshavarz, Hassan; Noor, Rafidah Md

    2012-01-01

    In recent years, Session Initiation Protocol (SIP) has become widely used in current internet protocols. It is a text-based protocol much like Hyper Text Transport Protocol (HTTP) and Simple Mail Transport Protocol (SMTP). SIP is a strong enough signaling protocol on the internet for establishing, maintaining, and terminating session. In this paper the areas of security and attacks in SIP are discussed. We consider attacks from diverse related perspectives. The authentication schemes are compared, the representative existing solutions are highlighted, and several remaining research challenges are identified. Finally, the taxonomy of SIP threat will be presented.

  4. Fast Collision Attack on MD5

    OpenAIRE

    Stevens, Marc

    2006-01-01

    In this paper, we present an improved attack algorithm to find two-block collisions of the hash function MD5. The attack uses the same differential path of MD5 and the set of sufficient conditions that was presented by Wang et al. We present a new technique which allows us to deterministically fulfill restrictions to properly rotate the differentials in the first round. We will present a new algorithm to find the first block and we will use an algorithm of Klima to find the second block. To o...

  5. Textual Manipulation for SQL Injection Attacks

    Directory of Open Access Journals (Sweden)

    Hussein AlNabulsi

    2013-11-01

    Full Text Available SQL injection attacks try to use string or text manipulations to access illegally websites and their databases. This is since using some symbols or characters in SQL statements may trick the authentication system to incorrectly allow such SQL statements to be processed or executed. In this paper, we highlighted several examples of such text manipulations that can be successfully used in SQL injection attacks. We evaluated the usage of those strings on several websites and web pages using SNORT open source. We also conducted an extensive comparison study of some relevant papers.

  6. Defending Against Wormhole Attack in OLSR

    Institute of Scientific and Technical Information of China (English)

    HONG Liang; HONG Fan; FU Cai

    2006-01-01

    OLSR (optimal link state routing) is one of the four basic routing protocols used in mobile ad hoc Networks by the MANET working group of IETF(Internet engineering task force). OLSR, a proactive routing protocol, is based on a multipoint relaying flooding technique to reduce the number of topology broadcast. OLSR uses periodic HELLO packets to neighbor detection. As introduced in Reference [1], the wormhole attack can form a serious threat in wireless Networks, especially against many ad hoc Network routing protocols and location-based wireless security systems. Here, a trust model to handle this attack in OLSR is provided and simulated in NS2.

  7. A novel proposed network security management approach for cyber attacks

    International Nuclear Information System (INIS)

    Network security is a discipline that focuses on securing networks from unauthorized access. Given the Escalating threats of malicious cyber attacks, modern enterprises employ multiple lines of defense. A comprehensive defense strategy against such attacks should include (I) an attack detection component that deter- mines the fact that a program is compromised, (2) an attack identification and prevention component that identifies attack packets so that one can block such packets in the future and prevents the attack from further propagation. Over the last decade, a significant amount of research has been vested in the systems that can detect cyber attacks either statically at compile time or dynamically at run time, However, not much effort is spent on automated attack packet identification or attack prevention. In this paper we present a unified solution to the problems mentioned above. We implemented this solution after the forward engineering of Open Source Security Information Management (OSSIM) system called Preventive Information Security management (PrISM) system that correlates input from different sensors so that the resulting product can automatically detect any cyber attack against it and prevents by identifying the actual attack packet(s). The PrISM was always able to detect the attacks, identify the attack packets and most often prevent by blocking the attacker's IP address to continue normal execution. There is no additional run-time performance overhead for attack prevention. (author)

  8. Establishment and use of national registries for actinide elements in humans

    International Nuclear Information System (INIS)

    This TECDOC covers all aspects of the establishment and use of registries for actinide elements in Member States. These aspects include assessing the need for such registries; defining scope of the work and developing objectives; administration; organization and staffing; policies; practices; procedures; protocols; registration and enrollment; data collection and evaluation; establishing and analytical laboratory; publication of results and application of findings. Not all aspects will be relevant to all Member States establishing such registries. 1 tab

  9. Quality of record linkage in a highly automated cancer registry that relies on encrypted identity data

    OpenAIRE

    Schmidtmann, Irene; Sariyar, Murat; Borg, Andreas; Gerold-Ay, Aslihan; Heidinger, Oliver; Hense, Hans-Werner; Krieg, Volker; Hammer, Gaël Paul

    2016-01-01

    Objectives: In the absence of unique ID numbers, cancer and other registries in Germany and elsewhere rely on identity data to link records pertaining to the same patient. These data are often encrypted to ensure privacy. Some record linkage errors unavoidably occur. These errors were quantified for the cancer registry of North Rhine Westphalia which uses encrypted identity data. Methods: A sample of records was drawn from the registry, record linkage information was included. In parallel, pl...

  10. A most convenient flag : the development of the Singapore ship registry, 1969-82

    OpenAIRE

    Tenold, Stig

    2000-01-01

    The aim of this report is to trace the development of the Singapore Ship Registry, from the introduction of open registry in 1969 until the tightening of registration requirements from the late 1970s. The extraordinary growth of the Singapore merchant marine is analysed in the light of the policies of the Singapore government. In many respects, the opening of the registry mirrors the Singapore economic policies in general, as it facilitated the growth of domestic employment and production, wi...

  11. Malignancies in Swedish persons with haemophilia: a longitudinal registry study.

    Science.gov (United States)

    Lövdahl, Susanna; Henriksson, Karin M; Baghaei, Fariba; Holmström, Margareta; Berntorp, Erik; Astermark, Jan

    2016-09-01

    The aim of the study was to investigate, over time, the incidence of and mortality due to malignant diseases among persons with haemophilia, compared to matched controls. Persons with haemophilia A or B were enrolled via registries at each haemophilia centre, as well as from the National Patient Registry, and were compared to five sex and age-matched controls per patient. Data from the national Cancer Registry were linked to the study participants. A total of 1431 persons with haemophilia and 7150 matched controls were enrolled. Between the years 1972 and 2008, 164 malignancies were reported. The most common type of cancer among patients was prostate cancer, followed by haematologic malignancies, including lymphoma and leukaemia, which were significantly more frequent in patients [n = 35 (2.4%) vs. n = 60 (0.8%); P < 0.001]. Malignancies in bladder and other urinary organs were also significantly different [n = 21 (1.5%) vs. n = 46 (0.6%); P < 0.01]. The overall incidence rate ratio of malignancies per 1000 person-years compared to the controls was 1.3 [95% confidence interval (CI) 1.1, 1.6]. In subgroup analysis, the corresponding incidence rate ratios per 1000 person-years for persons with severe haemophilia was 1.7 (95% CI 0.9, 3.1) and that for mild/moderate haemophilia 1.1 (95% CI 0.8, 1.5). Swedish persons with haemophilia had a significantly higher incidence of malignant diseases than controls. These were primarily haematologic malignancies and cancer in urinary organs, and the difference independent of any co-infections with HIV and/or viral hepatitis. The findings indicate the importance of further studies and close follow-up of malignancies in persons with haemophilia. PMID:26974329

  12. Pelvic Floor Disorders Registry: Study Design and Outcome Measures.

    Science.gov (United States)

    Weber LeBrun, Emily; Adam, Rony A; Barber, Matthew D; Boyles, Sarah Hamilton; Iglesia, Cheryl B; Lukacz, Emily S; Moalli, Pamela; Moen, Michael D; Richter, Holly E; Subak, Leslee L; Sung, Vivian W; Visco, Anthony G; Bradley, Catherine S

    2016-01-01

    Pelvic floor disorders affect up to 24% of adult women in the United States, and many patients with pelvic organ prolapse (POP) choose to undergo surgical repair to improve their quality of life. While a variety of surgical repair approaches and techniques are utilized, including mesh augmentation, there is limited comparative effectiveness and safety outcome data guiding best practice. In conjunction with device manufacturers, federal regulatory organizations, and professional societies, the American Urogynecologic Society developed the Pelvic Floor Disorders Registry (PFDR) designed to improve the quality of POP surgery by facilitating quality improvement and research on POP treatments. The PFDR will serve as a resource for surgeons interested in benchmarking and outcomes data and as a data repository for Food and Drug Administration-mandated POP surgical device studies. Provider-reported clinical data and patient-reported outcomes will be collected prospectively at baseline and for up to 3 years after treatment. All data elements including measures of success, adverse events, and surgeon characteristics were identified and defined within the context of the anticipated multifunctionality of the registry, and with collaboration from multiple stakeholders. The PFDR will provide a platform to collect high-quality, standardized patient-level data from a variety of nonsurgical (pessary) and surgical treatments of POP and other pelvic floor disorders. Data from this registry may be used to evaluate short- and longer-term treatment outcomes, patient-reported outcomes, and complications, as well as to identify factors associated with treatment success and failure with the overall goal of improving the quality of care for women with these conditions. PMID:26825404

  13. The Pelvic Floor Disorders Registry: Purpose and Development.

    Science.gov (United States)

    Bradley, Catherine S; Visco, Anthony G; Weber LeBrun, Emily E; Barber, Matthew D

    2016-01-01

    Pelvic organ prolapse (POP) is a common problem that negatively impacts women's quality of life. A variety of surgeries exist for POP treatment, including procedures performed with and without mesh augmentation. The growing use of mesh in prolapse surgeries in the 2000s was associated with increasing reports of complications, resulting in Food and Drug Administration (FDA) Safety Notifications, and in 2012, the FDA ordered transvaginal mesh manufacturers to conduct prospective studies to evaluate longer-term outcomes. These requirements provided incentives and an environment conducive to collaboration. American Urogynecologic Society leaders collaborated with device manufacturers, the FDA, and other professional organizations to establish the Pelvic Floor Disorders Registry (PFDR), a collection of interrelated registries, which could meet manufacturers' needs but also allow surgeons to track individual and aggregate outcomes for quality improvement. The PFDR was developed and launched by American Urogynecologic Society with objectives of (1) collecting, storing, and analyzing clinical data related to POP treatment; (2) establishing common data elements and quality metrics; and (3) providing a framework for external stakeholders to conduct POP research. The PFDR includes industry-sponsored studies, as well as 2 options for volunteer registry participation, the PFDR-Quality Improvement and PFDR-Research. The PFDR promotes quality improvement and national benchmarking and will provide real-world comparative safety and effectiveness data for prolapse surgeries. The PFDR can serve as a model for collaboration between medical practitioners, researchers, industry, and federal agencies and may allow progress toward our similar goal of high-quality surgical care of women with prolapse. PMID:26829344

  14. Commensurate Registry and Chemisorption at a Hetero-organic Interface

    Science.gov (United States)

    Stadtmüller, Benjamin; Sueyoshi, Tomoki; Kichin, Georgy; Kröger, Ingo; Soubatch, Sergey; Temirov, Ruslan; Tautz, F. Stefan; Kumpf, Christian

    2012-03-01

    We present evidence for a partly chemisorptive bonding between single monolayers of copper-II-phthalocyanine (CuPc) and 3,4,9,10-perylene-tetracarboxylic-dianhydride (PTCDA) that are stacked on Ag(111). A commensurate registry between the two molecular layers and the substrate, i.e., a common crystallographic lattice for CuPc and PTCDA films as well as for the Ag(111) surface, indicates that the growth of the upper layer is dominated by the structure of the lower. Photoemission spectroscopy clearly reveals a gradual filling of the lowest unoccupied molecular orbital of PTCDA due to CuPc adsorption, which proves the chemisorptive character.

  15. Commensurate registry and chemisorptions at a hetero-organic interface

    OpenAIRE

    Stadtmüller, B; Sueyoshi, T; Kichin, G.; Kröger, I.; Soubatch, S.; Temirov, R.; Tautz, F. S.; Kumpf, C.

    2012-01-01

    We present evidence for a partly chemisorptive bonding between single monolayers of copper-II-phthalocyanine (CuPc) and 3,4,9,10-perylene-tetracarboxylic-dianhydride (PTCDA) that are stacked on Ag(111). A commensurate registry between the two molecular layers and the substrate, i.e., a common crystallographic lattice for CuPc and PTCDA films as well as for the Ag(111) surface, indicates that the growth of the upper layer is dominated by the structure of the lower. Photoemission spectroscopy c...

  16. Cyclists' injury epidemiology based on a road trauma registry

    OpenAIRE

    Amoros, E.; Chiron, M; Thelot, B; Ndiaye, A.; Laumon, B.

    2010-01-01

    Cycling is increasing in some cities. Bicycle injuries are often overlooked, partly because police crash data largely under-report them. Method: A road trauma registry in a French area (Rhône county, population=1.6 Million) includes both in- and out-patients, with injuries coded with the Abbreviated Injury Scale (AIS). Over 1996- 2006, 14437 people were recorded as injured (or killed) while cycling. Type of cyclists is approximately defined by crash location and age: in or out of town, or chi...

  17. The Medical Birth Registry of Norway – An international perspective

    OpenAIRE

    Wilcox, Allen J.

    2007-01-01

    Some of the most practical questions of perinatal medicine are regarding couples who have had pregnancy problems in the past, and their risk of having such problems in future pregnancies. For example, if a couple has a child with a birth defect, what are their chances that their next child will have a defect? The key to answering such questions is the availability of linked data such as those provided by the Medical Birth Registry of Norway. Such linked data provide a unique resource for addr...

  18. Establishing a Twin Registry in Guinea-Bissau

    DEFF Research Database (Denmark)

    Bjerregaard-Andersen, Morten; Gomes, Margarida A; Joaquím, Luis C;

    2013-01-01

    recently established one of the first twin registries in Sub-Saharan Africa. Our short-term aim is to describe twin mortality and morbidity in order to design appropriate health interventions. Our long-term goal is a large-scale database to explore the pathogenesis of prevalent diseases; for example......, diabetes mellitus, metabolic syndrome, and infectious diseases such as HIV, tuberculosis, and malaria. A major focus area is also the etiology of low birth weight and how epigenetic processes might modulate the consequences of low birth weight in Sub-Saharan Africa. For this, monozygotic twin studies...

  19. Managing burn victims of suicide bombing attacks: outcomes, lessons learnt, and changes made from three attacks in Indonesia

    OpenAIRE

    Chim, Harvey; Yew, Woon Si; Song, Colin

    2007-01-01

    Introduction Terror attacks in Southeast Asia were almost nonexistent until the 2002 Bali bomb blast, considered the deadliest attack in Indonesian history. Further attacks in 2003 (Jakarta), 2004 (Jakarta), and 2005 (Bali) have turned terrorist attacks into an ever-present reality. Methods The authors reviewed medical charts of victims evacuated to the Singapore General Hospital (SGH) Burns Centre during three suicide attacks involving Bali (2002 and 2005) and the Jakarta Marriott hotel (200...

  20. Supporting awareness in creative group work by exposing design rationale

    Directory of Open Access Journals (Sweden)

    Umer Farooq

    2011-01-01

    Full Text Available When creativity is taken as a long-term, complex, and collaborative activity, support for awareness is required for group members to monitor the development of ideas, track how these ideas became narrowed, and understand how alternatives are being implemented and integrated by colleagues. In this paper, we investigate the effects of exposing design rationale to convey awareness, specifically activity awareness, in group creativity. Through evaluating a prototype, we investigate status updates that convey design rationale, and to what consequences, in small groups in fully distributed collaboration. We found that status updates are used for a variety of purposes and that participants’ comments on their collaborators’ status updates provided feedback. Overall, results suggest that participants’ awareness about their collaborators’ future plans increased over time. Majority of participants found the status updates useful, particularly those with higher metacognitive knowledge. Based on our results, two design strategies for activity awareness are proposed.

  1. Mineralized Collagen: Rationale, Current Status, and Clinical Applications

    Directory of Open Access Journals (Sweden)

    Zhi-Ye Qiu

    2015-07-01

    Full Text Available This paper presents a review of the rationale for the in vitro mineralization process, preparation methods, and clinical applications of mineralized collagen. The rationale for natural mineralized collagen and the related mineralization process has been investigated for decades. Based on the understanding of natural mineralized collagen and its formation process, many attempts have been made to prepare biomimetic materials that resemble natural mineralized collagen in both composition and structure. To date, a number of bone substitute materials have been developed based on the principles of mineralized collagen, and some of them have been commercialized and approved by regulatory agencies. The clinical outcomes of mineralized collagen are of significance to advance the evaluation and improvement of related medical device products. Some representative clinical cases have been reported, and there are more clinical applications and long-term follow-ups that currently being performed by many research groups.

  2. Hereditary cancer registries improve the care of patients with a genetic predisposition to cancer: contributions from the Dutch Lynch syndrome registry.

    Science.gov (United States)

    Vasen, Hans F A; Velthuizen, Mary E; Kleibeuker, Jan H; Menko, Fred H; Nagengast, Fokke M; Cats, Annemieke; van der Meulen-de Jong, Andrea E; Breuning, Martijn H; Roukema, Anne J; van Leeuwen-Cornelisse, Inge; de Vos Tot Nederveen Cappel, Wouter H; Wijnen, Juul T

    2016-07-01

    The Dutch Hereditary Cancer Registry was established in 1985 with the support of the Ministry of Health (VWS). The aims of the registry are: (1) to promote the identification of families with hereditary cancer, (2) to encourage the participation in surveillance programs of individuals at high risk, (3) to ensure the continuity of lifelong surveillance examinations, and (4) to promote research, in particular the improvement of surveillance protocols. During its early days the registry provided assistance with family investigations and the collection of medical data, and recommended surveillance when a family fulfilled specific diagnostic criteria. Since 2000 the registry has focused on family follow-up, and ensuring the quality of surveillance programs and appropriate clinical management. Since its founding, the registry has identified over 10,000 high-risk individuals with a diverse array of hereditary cancer syndromes. All were encouraged to participate in prevention programmes. The registry has published a number of studies that evaluated the outcome of surveillance protocols for colorectal cancer (CRC) in Lynch syndrome, as well as in familial colorectal cancer. In 2006, evaluation of the effect of registration and colonoscopic surveillance on the mortality rate associated with colorectal cancer (CRC) showed that the policy led to a substantial decrease in the mortality rate associated with CRC. Following discovery of MMR gene defects, the first predictive model that could select families for genetic testing was published by the Leiden group. In addition, over the years the registry has produced many cancer risk studies that have helped to develop appropriate surveillance protocols. Hereditary cancer registries in general, and the Lynch syndrome registry in particular, play an important role in improving the clinical management of affected families. PMID:26973060

  3. Rationales for corporate risk management from stakeholders’ perspective

    OpenAIRE

    Klimczak, Karol Marek

    2005-01-01

    The rationales for corporate risk management are examined from the point of view of the theory of finance and of key stakeholder groups’ interests. A study of the use of hedging instruments in 161 Polish non-financial listed companies is then presented. The study is based on keyword analysis of financial statements; parametric tests and logit regression are used to determine relationships between the hedging decision and financial standing of companies. However, company size is proved to be t...

  4. [Microbiological rationale for using whey on salting salmon caviar].

    Science.gov (United States)

    Kim, I N; Shtan'ko, T I

    2011-01-01

    The paper provides a rationale for the use of whey to salt salmon fishes instead of traditional preservatives, including those exported from low industrial potential countries, which do not undergo comprehensive sanitary and hygienic tests. On the basis of the performed studies, the authors recommend to use whey to salt salmon caviar, which ensures the ecological purity of the product containing the minimum amount of preservatives and other substances that fail to affect its organoleptic properties. PMID:21598650

  5. Hermeneutics framework: integration of design rationale and optimizing software modules

    OpenAIRE

    Aksit, Mehmet; Malakuti, Somayeh

    2015-01-01

    To tackle the evolution challenges of adaptive systems, this paper argues on the necessity of hermeneutic approaches that help to avoid too early elimination of design alternatives. This visionary paper proposes the Hermeneutics Framework, which computationally integrates a design rationale management system, an auto-adaptive control system and a reflective and modular event-driven language runtime together. The Hermeneutics Framework is, among others, suitable for implementing dynamic adapti...

  6. Familial orientations and the rationales for childbearing behaviour

    OpenAIRE

    Beaujot, Roderic; Erfani, Amir

    2006-01-01

    EnglishUsing a local qualitative sample from Ontario, we explore the rationales forchildbearing behaviour across contrasting familial orientations. There are considerable similaritiesamong respondents with traditional and modernfamilial orientations in terms of the reasons for having children and the costsand values of children. Nonetheless, persons with modern orientations are morelikely to give individual related reasons for having children, and to see the valueof children in terms of perso...

  7. A theoretical rationale for flexicurity policies based on education

    OpenAIRE

    Davoine, Thomas

    2015-01-01

    The paper provides a theoretical rationale for flexicurity policies, which consist of low employment protection, generous unemployment insurance and active labor market programmes. It analyzes in which conditions flexicurity can be optimal. Low employment protection encourages costly education efforts to access high productivity and high innovation sectors, with firms more likely to survive and thus not exposing much their workers to unemployment risk. Activation programmes support the reallo...

  8. The rationale for South-South trade; An Alternative Approach

    OpenAIRE

    Shafaeddin, Mehdi

    2010-01-01

    Arguing that the theoretical literature on South-South trade is not satisfactory, the author provides an alternative framework and rationale for the South-South trade as a vehicle for industrialization and development of developing countries. He also applies this framework to developing countries in the Asia-Pacific region. In particular, showing that the low-income countries of the region are not benefiting much from the dynamism of the China market for their industrialization, he proposes, ...

  9. Frit valg i ældreplejen - rationaler og udfordringer

    OpenAIRE

    Svendsen, Peter Emil Juhl; Hagmann, Lotte Nygaard; Johansen, Michael Urban

    2004-01-01

    Projektet omhandler de rationaler der ligger bag indførelsen af frit valg i ældreplejen, primært fra Regeringens perspektiv. Den anden store del af projektet er en analyse af fritvalgsordningerne i forhold til om disse nu også er effektive, altså om det kan betale sig at indføre fritvalgsordninger i ældreplejen eller om effektivitet bedre opnås i rent offentligt regi.

  10. Exploring the rationale of the process behind corporate sponsorships

    OpenAIRE

    Ystad, Sunniva G. Marchioro; Nygaard, Kaja Gjersem

    2012-01-01

    The purpose of this thesis was to examine and identify the process behind the delegation of corporate sponsorships in a Norwegian context. Corporate sponsorships are presently the third largest corporate communication channel in Norway. However, there is limited research on sponsorship management. The thesis seeks to identify the process and investigate the rationale behind it. To be able to research this, an explorative study was conducted, by means of a grounded theory design. First, a m...

  11. Physics rationale for the engineering specifications for ZTH

    International Nuclear Information System (INIS)

    This report presents the physics rationale that established the engineering design of ZTH. The physics criteria are given and the implications regarding the engineering design are presented. Experimental and theoretical background evidence is given in support of the criteria but the justification is left to other reports and peer reviews. The physics criteria discussed here are limited to the ones deemed to be of highest engineering priority. 32 refs., 9 figs

  12. Who Should Benefit from REDD+? Rationales and Realities

    Directory of Open Access Journals (Sweden)

    Cecilia Luttrell

    2013-12-01

    Full Text Available Benefit-sharing mechanisms are a central design aspect of REDD+ because they help to create the necessary incentives to reduce carbon emissions. However, if stakeholders do not perceive the benefit sharing as fair, the legitimacy of REDD+, and support for the mechanism, will be weakened. In this paper, drawing on data from CIFOR's Global Comparative Study on REDD+, we analyze national policy processes in 6 countries and incipient benefit-sharing arrangements in 21 REDD+ project sites. Through our analysis of current practices and debates, we identify six rationales that have been put forward to justify how benefits should be distributed and to whom. These rationales encompass a range of perspectives. Some hold that benefit sharing should be related to actual carbon emission reductions or to costs incurred in achieving the reduction of emissions; others emphasize the importance of a legal right to benefit, the need to consider aspects such as poverty reduction or the appropriateness of rewarding those with a history of protecting the forest. Each rationale has implications for the design of benefit-sharing mechanisms and the equity of their outcomes. We point out that, given the wide range of rationales and interests at play, the objectives of REDD+ and benefit sharing must be clearly established and the term "benefit" defined before effective benefit-sharing mechanisms can be designed. For stakeholders to support REDD+, the legitimacy of decision-making institutions, consideration of context, and attention to process are critical. Building legitimacy requires attention not only to fair distributional outcomes but also to consensus on relevant institutions' authority to make decisions and to procedural equity.

  13. The rationale for early intervention in schizophrenia and related disorders

    DEFF Research Database (Denmark)

    Nordentoft, Merete; Jeppesen, Pia; Petersen, Lone;

    2009-01-01

    , adherence to treatment, comorbid drug abuse, relapse and readmission. Some benefits persist after cessation of the intervention. Conclusions: Early intervention in schizophrenia is justified to reduce the negative personal and social impact of prolonged periods of untreated symptoms. Furthermore, phase......Abstract Aim: To examine the rationale and evidence supporting an early intervention approach in schizophrenia. Methods: A selective literature review was conducted. Results: During the onset of schizophrenia, there is often a significant delay between the emergence of psychotic symptoms and the...

  14. Sampling in Qualitative Research: Rationale, Issues, and Methods

    OpenAIRE

    Luborsky, Mark R.; Rubinstein, Robert L.

    1995-01-01

    In gerontology the most recognized and elaborate discourse about sampling is generally thought to be in quantitative research associated with survey research and medical research. But sampling has long been a central concern in the social and humanistic inquiry, albeit in a different guise suited to the different goals. There is a need for more explicit discussion of qualitative sampling issues. This article will outline the guiding principles and rationales, features, and practices of sampli...

  15. Cryptographic Attacks and Countermeasures - A Mathematical View

    OpenAIRE

    Canright, David; Stanica, Pantelimon

    2009-01-01

    2009 CyberSecurity Summit, Naval Postgraduate School 1st NPS Cyber Summit was held at the Naval Postgraduate School in Monterey, California on October 29, 2009. Sessions were held on the following topics: security requirements, Kerchkoffs' principle, mathematics of cybersecurity, the data encryption standard, nonlinear equations, Cyber attacks on Bluetooth EQ, Crypto properties of S-boxes.

  16. Modified localized attack on complex network

    Science.gov (United States)

    Dong, Gaogao; Du, Ruijin; Hao, Huifang; Tian, Lixin

    2016-01-01

    Since a shell structure contains a wealth of information, it is not only very important for understanding the transport properties of the network, but also essential to identify influential spreaders in complex networks. Nodes within each shell can be classified into two categories: protected nodes and unprotected nodes. In this paper, we propose a generalization of the localized attack, modified localized attack, which means that when a randomly chosen node (root node) is under attack, protected nodes will not be removed, but unprotected nodes in the nearest shells will fail. We numerically and analytically study the system robustness under this attack by taking an Erdös-Rényi (ER) network, a regular random (RR) network and a scale-free (SF) network as examples. Moreover, a fraction of nodes belonging to giant component S and a critical threshold q c , where S approaches to zero, are given. The result implies that increasing connection density has been found to be useful to significantly improve network robustness.

  17. Chemical Attack of Malaysian Pozzolans Concrete

    Directory of Open Access Journals (Sweden)

    Mohd Hilton Ahmad

    2011-09-01

    Full Text Available Malaysia produces more than 10 million tonne of by-product from industrial sector per year. As the environmental impact concerns, more than half of the by-product can be recycled to be used as construction materials. One of them is pozzolan, a cement replacing material that can be used to enhance the properties of the concrete. This paper studies the chemical attack to local prozzolans concrete. The parameters studied include weight loss, length change, and residual strength of local pozzolans concrete after been exposed to severe environment. The specimen were tested under normal room temperature, exposed to magnesium sulfate, MgSO4. 2H2O where both sulfate attack and acid attack take place. Two series of pozzolans< which is Pulverized fly ash (PFA and Palm oil fuel ash (POFA were identified. Another series of admixture, Quarry Dust (QD from quarry waste that contain high amount of silica content also been carried out. Each series will study the effect of cement replacement percentage of 5%, 10% and 15%. The parameters were compared to conventional ordinary Portland cement (OPC concrete as control mix. Accelerated testing was conducted at 3, 7, 28, 56 and 90 days. The result shows that the local pozzolans concrete were found to be in good resistance against sulfate attack compared to conventional concrete. Compared to all series conducted, series of PFA replacement gave the best resistance followed by POFA and QD replacement series.

  18. Adversarial Feature Selection Against Evasion Attacks.

    Science.gov (United States)

    Zhang, Fei; Chan, Patrick P K; Biggio, Battista; Yeung, Daniel S; Roli, Fabio

    2016-03-01

    Pattern recognition and machine learning techniques have been increasingly adopted in adversarial settings such as spam, intrusion, and malware detection, although their security against well-crafted attacks that aim to evade detection by manipulating data at test time has not yet been thoroughly assessed. While previous work has been mainly focused on devising adversary-aware classification algorithms to counter evasion attempts, only few authors have considered the impact of using reduced feature sets on classifier security against the same attacks. An interesting, preliminary result is that classifier security to evasion may be even worsened by the application of feature selection. In this paper, we provide a more detailed investigation of this aspect, shedding some light on the security properties of feature selection against evasion attacks. Inspired by previous work on adversary-aware classifiers, we propose a novel adversary-aware feature selection model that can improve classifier security against evasion attacks, by incorporating specific assumptions on the adversary's data manipulation strategy. We focus on an efficient, wrapper-based implementation of our approach, and experimentally validate its soundness on different application examples, including spam and malware detection. PMID:25910268

  19. Why Does Asthma Attack Severely at Night?

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    @@ The rhythmic changes of human physiological activities by day and at night may cause regular change of the patient's condition within one day. The following is the explanation with the theory of Chinese medicine for the reason why asthma attacks severely at night.

  20. Rhode Island School Terrorist Attack Preparedness

    Science.gov (United States)

    Dube, Michael W. M.

    2012-01-01

    This study examined the state of safety and terrorist attack preparedness in Rhode Island Schools as determined by Rhode Island school leader perceptions. The study is descriptive in nature as it gathers data to describe a particular event or situation. Using a researcher generated survey based on terrorist preparedness guidelines and suggestions…

  1. Association between Terror Attacks and Suicide Attempts

    Science.gov (United States)

    Weizman, Tal; Yagil, Yaron; Schreiber, Shaul

    2009-01-01

    Based on Durkheim's "Control theory," we explored the association between frequency of terror attacks in Israel and the frequency of suicide attempts admitted to the Emergency Room of a major general hospital in Tel-Aviv (1999-2004). Analysis of the six-year study period as a whole revealed no significant correlation between the variables, with…

  2. After Heart Attack, New Threat: Heart Failure

    Science.gov (United States)

    ... nih.gov/medlineplus/news/fullstory_159007.html After Heart Attack, New Threat: Heart Failure 1 in 4 survivors develops this serious ... TUESDAY, May 24, 2016 (HealthDay News) -- Risk of heart failure appears high within a few years of ...

  3. Nonepileptic attack disorder among married women

    Directory of Open Access Journals (Sweden)

    Dhanaraj M

    2005-01-01

    Full Text Available Aim : To study the clinical features, precipitating stressful life events and prognosis of nonepileptic attack disorder (NEAD among married women. Design: Prospective cohort study with 1-year follow-up. Setting: A tertiary care teaching hospital. Subjects: Of the 1020 patients with epilepsy referred to the epilepsy clinic during 2002-2003, 30 were married women with NEAD. Materials and Methods: The diagnostic criteria for NEAD included normal EEG during ictal and post-ictal phase of the generalized ′attack.′ The data collected included clinical characteristics, semiology of the attacks, precipitating stressful events, and co-morbid psychiatric disorders. The control group included 30 age-matched married women with generalized tonic-clonic seizures. The long-term outcome and factors influencing the outcomes were analyzed. Results: The mean duration of illness was 18 months, and the pattern of the attack was ′fall and lying still′ in 53% and ′fall with generalized motor movements′ in 47%. The frequency was one or more per week in 57% and occasionally in 43%. The important stressful events were matrimonial discord following illegal relationship of the husband with another woman (c2 = 9.02, P = 0.003 and constant quarrel with other family members (c2 = 5.19, P = 0.02. The prevalence of sexual abuse was low (7%. Co-morbid psychiatric disorder was observed in 70%. At the end of 1 year, 39% were free from the attack. Resolution of the stressful life events (c2 = 4.52, P = 0.03 and lower frequency of attack at the time of reporting (c2 = 3.88, P = 0.05 correlated with good outcomes. Conclusion : Among patients with NEAD in India, the major precipitating factors were matrimonial discord following illegal relationship of the husband with another woman and constant quarrel with other family members and not sexual abuse. Women with low frequency of attack at the time of reporting and the remission of the stressful events had better outcomes.

  4. Assessing Terrorist Motivations for Attacking Critical Infrastructure

    Energy Technology Data Exchange (ETDEWEB)

    Ackerman, G; Abhayaratne, P; Bale, J; Bhattacharjee, A; Blair, C; Hansell, L; Jayne, A; Kosal, M; Lucas, S; Moran, K; Seroki, L; Vadlamudi, S

    2006-12-04

    Certain types of infrastructure--critical infrastructure (CI)--play vital roles in underpinning our economy, security and way of life. These complex and often interconnected systems have become so ubiquitous and essential to day-to-day life that they are easily taken for granted. Often it is only when the important services provided by such infrastructure are interrupted--when we lose easy access to electricity, health care, telecommunications, transportation or water, for example--that we are conscious of our great dependence on these networks and of the vulnerabilities that stem from such dependence. Unfortunately, it must be assumed that many terrorists are all too aware that CI facilities pose high-value targets that, if successfully attacked, have the potential to dramatically disrupt the normal rhythm of society, cause public fear and intimidation, and generate significant publicity. Indeed, revelations emerging at the time of this writing about Al Qaida's efforts to prepare for possible attacks on major financial facilities in New York, New Jersey, and the District of Columbia remind us just how real and immediate such threats to CI may be. Simply being aware that our nation's critical infrastructure presents terrorists with a plethora of targets, however, does little to mitigate the dangers of CI attacks. In order to prevent and preempt such terrorist acts, better understanding of the threats and vulnerabilities relating to critical infrastructure is required. The Center for Nonproliferation Studies (CNS) presents this document as both a contribution to the understanding of such threats and an initial effort at ''operationalizing'' its findings for use by analysts who work on issues of critical infrastructure protection. Specifically, this study focuses on a subsidiary aspect of CI threat assessment that has thus far remained largely unaddressed by contemporary terrorism research: the motivations and related factors that

  5. A graph based system for multi-stage attacks recognition

    Institute of Scientific and Technical Information of China (English)

    Safaa O. Al-Mamory; Zhai Jianhong; Zhang Hongli

    2008-01-01

    Building attack scenario is one of the most important aspects in network security. This paper proposed a system which collects intrusion alerts, clusters them as sub-attacks using alerts abstraction, aggregates the similar sub-attacks, and then correlates and generates correlation graphs. The scenarios were represented by alert classes instead of alerts themselves so as to reduce the required rules and have the ability of detecting new variations of attacks. The proposed system is capable of passing some of the missed attacks. To evaluate system effectiveness, it was tested with different datasets which contain multi-step attacks. Compressed and easily understandable correlation graphs which reflect attack scenarios were generated. The proposed system can correlate related alerts, uncover the attack strategies, and detect new variations of attacks.

  6. Recovery of human remains after shark attack.

    Science.gov (United States)

    Byard, Roger W; James, Ross A; Heath, Karen J

    2006-09-01

    Two cases of fatal shark attack are reported where the only tissues recovered were fragments of lung. Case 1: An 18-year-old male who was in the sea behind a boat was observed by friends to be taken by a great white shark (Carcharodon carcharias). The shark dragged him under the water and then, with a second shark, dismembered the body. Witnesses noted a large amount of blood and unrecognizable body parts coming to the surface. The only tissues recovered despite an intensive beach and sea search were 2 fragments of lung. Case 2: A 19-year-old male was attacked by a great white shark while diving. A witness saw the shark swim away with the victim's body in its mouth. Again, despite intensive beach and sea searches, the only tissue recovered was a single piece of lung, along with pieces of wetsuit and diving equipment. These cases indicate that the only tissue to escape being consumed or lost in fatal shark attacks, where there is a significant attack with dismemberment and disruption of the integrity of the body, may be lung. The buoyancy of aerated pulmonary tissue ensures that it rises quickly to the surface, where it may be recovered by searchers soon after the attack. Aeration of the lung would be in keeping with death from trauma rather than from drowning and may be a useful marker in unwitnessed deaths to separate ante- from postmortem injury, using only relatively small amounts of tissues. Early organ recovery enhances the identification of human tissues as the extent of morphologic alterations by putrefactive processes and sea scavengers will have been minimized. DNA testing is also possible on such recovered fragments, enabling confirmation of the identity of the victim. PMID:16936505

  7. Database structure for the Laser Accident and Incident Registry (LAIR)

    Science.gov (United States)

    Ness, James W.; Hoxie, Stephen W.; Zwick, Harry; Stuck, Bruce E.; Lund, David J.; Schmeisser, Elmar T.

    1997-05-01

    The ubiquity of laser radiation in military, medical, entertainment, telecommunications and research industries and the significant risk, of eye injury from this radiation are firmly established. While important advances have been made in understanding laser bioeffects using animal analogues and clinical data, the relationships among patient characteristics, exposure conditions, severity of the resulting injury, and visual function are fragmented, complex and varied. Although accident cases are minimized through laser safety regulations and control procedures, accumulated accident case information by the laser eye injury evaluation center warranted the development of a laser accident and incident registry. The registry includes clinical data for validating and refining hypotheses on injury and recovery mechanisms; a means for analyzing mechanisms unique to human injury; and a means for identifying future areas of investigation. The relational database supports three major sections: (1) the physics section defines exposure circumstances, (2) the clinical/ophthalmologic section includes fundus and scanning laser ophthalmoscope images, and (3) the visual functions section contains specialized visual function exam results. Tools are available for subject-matter experts to estimate parameters like total intraocular energy, ophthalmic lesion grade, and exposure probability. The database is research oriented to provide a means for generating empirical relationships to identify symptoms for definitive diagnosis and treatment of laser induced eye injuries.

  8. The role of cancer registries in cancer control.

    Science.gov (United States)

    Parkin, Donald Maxwell

    2008-04-01

    Cancer control aims to reduce the incidence, morbidity, and mortality of cancer and to improve the quality of life of cancer patients through the systematic implementation of evidence-based interventions in prevention, early diagnosis, treatment, and palliative care. In the context of a national cancer control program (NCCP), a cancer surveillance program (CSP), built around a population-based cancer registry, is an essential element. Data on the size and evolution of the cancer burden in the population are essential to evaluation of the current situation, to setting objectives for cancer control, and defining priorities. Cancer data are essential in monitoring the progress of the implementation of an NCCP, as well as providing an evaluation of the many individual cancer control activities. In the context of an NCCP, the CSP should provide a focus of epidemiological expertise, not only for providing statistical data on incidence, mortality, stage distribution, treatment patterns, and survival but also for conducting studies into the important causes of cancer in the local situation, and for providing information about the prevalence of exposure to these factors in the population. Cancer surveillance via the population-based registry therefore plays a crucial role in formulating cancer control plans, as well as in monitoring their success. PMID:18463952

  9. First annual report of the Austrian CML registry.

    Science.gov (United States)

    Schmidt, Stefan; Wolf, Dominik; Thaler, Josef; Burgstaller, Sonja; Linkesch, Wolfgang; Petzer, Andreas; Fridrik, Michael; Lang, Alois; Agis, Hermine; Valent, Peter; Krieger, Otto; Walder, Alois; Korger, Markus; Schlögl, Ernst; Sliwa, Tamer; Wöll, Ernst; Mitterer, Manfred; Eisterer, Wolfgang; Pober, Michael; Gastl, Günther

    2010-10-01

    The Austrian chronic myeloid leukemia (CML) registry monitors individual disease courses, treatments applied, clinical outcome, and side effects of CML patients on a nationwide basis to provide data on the "real-life" situation and to complement the information and interpretation gained from the selected patient population observed in clinical trials. This report summarizes the Austrian CML registry data as of March 2009. A total of 179 patients have been registered with a median number of 1012 follow-up visits and median observation duration of 20 months. At diagnosis most patients (n = 163) were in chronic phase (early, late, and secondary), whereas only 4 were in advanced phase. A total of 137 patients were treated with tyrosine kinase inhibitors (TKIs), of which 14 received first and second generation TKIs sequentially. Other treatment modalities included chemotherapy or interferon and stem cell transplantation (SCT). Cumulative incidence rates for complete hematological responses (CHR) were 91.6% and 94.4% at 12 and 24 months, respectively, compared to cumulative incidence rates of complete cytogenetical response rates of 64% and 80% at these timepoints. A total of 5 patients progressed from chronic phase to accelerated (n = 3) and blastic phase (n = 2) while receiving imatinib standard dose. Estimated overall survival (OS) rate at 60 months was 90% and progression free survival (PFS) according to European Leukemia Net (ELN) failure definition was 58%. PMID:20936366

  10. Report of Incidence and Mortality in China Cancer Registries, 2008

    Institute of Scientific and Technical Information of China (English)

    Wan-qing Chen; Rong-shou Zheng; Si-wei Zhang; Ni Li; Ping Zhao; Guang-lin Li; Liang-you Wu; Jie He

    2012-01-01

    Objective:Annual cancer incidence and mortality in 2008 were provided by National Central Cancer Registry in China,which data were collected from population-based cancer registries in 2011.Methods:There were 56 registries submitted their data in 2008.After checking and evaluating the data quality,total 41 registries' data were accepted and pooled for analysis.Incidence and mortality rates by area (urban or rural areas) were assessed,as well as the age-and sex-specific rates,age-standardized rates,proportions and cumulative rate.Results:The coverage population of the 41 registries was 66,138,784 with 52,158,495 in urban areas and 13,980,289 in rural areas.There were 197,833 new cancer cases and 122,136 deaths in cancer with mortality to incidence ratio of 0.62.The morphological verified rate was 69.33%,and 2.23% of cases were identified by death certificate only.The crude cancer incidence rate in all areas was 299.12/100,000 (330.16/100,000 in male and 267.56/100,000 in female) and the age-standardized incidence rates by Chinese standard population (ASIRC) and world standard population (ASIRW) were 148.75/100,000 and 194.99/100,000,respectively.The cumulative incidence rate (0-74 years old) was of 22.27%.The crude incidence rate in urban areas was higher than that in rural areas.However,after adjusted by age,the incidence rate in urban was lower than that in rural.The crude cancer mortality was 184.67/100,000 (228.14/100,000 in male and 140.48/100,000 in female),and the age-standardized mortality rates by Chinese standard population (ASMRC) and by world population were 84.36/100,000 and 114.32/100,000,respectively.The cumulative mortality rate (0-74 years old) was of 12.89%.Age-adjusted mortality rates in urban areas were lower than that in rural areas.The most common cancer sites were lung,stomach,colon-rectum,liver,esophagus,pancreas,brain,lymphoma,breast and cervix which accounted for 75% of all cancer incidence.Lung cancer was the leading cause of

  11. Analysis of the SYN Flood DoS Attack

    Directory of Open Access Journals (Sweden)

    Mitko Bogdanoski

    2013-06-01

    Full Text Available The paper analyzes systems vulnerability targeted by TCP (Transmission Control Protocol segments when SYN flag is ON, which gives space for a DoS (Denial of Service attack called SYN flooding attack or more often referred as a SYN flood attack. The effects of this type of attack are analyzed and presented in OPNET simulation environment. Furthermore, the paper presents two anomaly detection algorithms as an effective mechanism against this type of attack. Finally, practical approaches against SYN flood attack for Linux and Windows environment which are followed by are shown.

  12. A Survey of Mobile Ad Hoc Network Attacks

    Directory of Open Access Journals (Sweden)

    PRADIP M. JAWANDHIYA,

    2010-09-01

    Full Text Available Security is an essential requirement in mobile ad hoc network (MANETs. Compared to wired networks, MANETs are more vulnerable to security attacks due to the lack of a trusted centralized authority and limited resources. Attacks on ad hoc networks can be classified as passive and active attacks, depending on whether the normal operation of the network is disrupted or not. In this paper, we are describing the all prominent attacks described in literature in a consistent manner to provide a concise comparison on attack types. To the best of our knowledge, this is the first paper that studies all the existing attacks on MANETs.

  13. Defense and attack of complex and dependent systems

    International Nuclear Information System (INIS)

    A framework is constructed for how to analyze the strategic defense of an infrastructure subject to attack by a strategic attacker. Merging operations research, reliability theory, and game theory for optimal analytical impact, the optimization program for the defender and attacker is specified. Targets can be in parallel, series, combined series-parallel, complex, k-out-of-n redundancy, independent, interdependent, and dependent. The defender and attacker determine how much to invest in defending versus attacking each of multiple targets. A target can have economic, human, and symbolic values, subjectively assessed by the defender and attacker. A contest success function determines the probability of a successful attack on each target, dependent on the investments by the defender and attacker into each target, and on characteristics of the contest. The defender minimizes the expected damage plus the defense costs. The attacker maximizes the expected damage minus the attack costs. Each agent is concerned about how his investments vary across the targets, and the impact on his utilities. Interdependent systems are analyzed where the defense and attack on one target impacts all targets. Dependent systems are analyzed applying Markov analysis and repeated games where a successful attack on one target in the first period impacts the unit costs of defense and attack, and the contest intensity, for the other target in the second period.

  14. Protecting buildings from a biological or chemical attack: Actions to take before or during a release

    Energy Technology Data Exchange (ETDEWEB)

    Price, Phillip N.; Sohn, Michael D.; Gadgil, Ashok J.; Delp, William W.; Lorenzetti, David M.; Finlayson, Elizabeth U.; Thatcher, Tracy L.; Sextro, Richard G.; Derby, Elisabeth A.; Jarvis, Sondra A.

    2003-01-29

    This report presents advice on how to operate a building to reduce casualties from a biological or chemical attack, as well as potential changes to the building (e.g. the design of the ventilation system) that could make it more secure. It also documents the assumptions and reasoning behind the advice. The particular circumstances of any attack, such as the ventilation system design, building occupancy, agent type, source strength and location, and so on, may differ from the assumptions made here, in which case actions other than our recommendations may be required; we hope that by understanding the rationale behind the advice, building operators can modify it as required for their circumstances. The advice was prepared by members of the Airflow and Pollutant Transport Group, which is part of the Indoor Environment Department at the Lawrence Berkeley National Laboratory. The group's expertise in this area includes: tracer-gas measurements of airflows in buildings (Sextro, Thatcher); design and operation of commercial building ventilation systems (Delp); modeling and analysis of airflow and tracer gas transport in large indoor spaces (Finlayson, Gadgil, Price); modeling of gas releases in multi-zone buildings (Sohn, Lorenzetti, Finlayson, Sextro); and occupational health and safety experience related to building design and operation (Sextro, Delp). This report is concerned only with building design and operation; it is not a how-to manual for emergency response. Many important emergency response topics are not covered here, including crowd control, medical treatment, evidence gathering, decontamination methods, and rescue gear.

  15. 36 CFR 704.1 - Films selected for inclusion in the National Film Registry.

    Science.gov (United States)

    2010-07-01

    ... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false Films selected for inclusion in the National Film Registry. 704.1 Section 704.1 Parks, Forests, and Public Property LIBRARY OF CONGRESS NATIONAL FILM REGISTRY OF THE LIBRARY OF CONGRESS § 704.1 Films selected for inclusion in...

  16. Treatment of autoinflammatory diseases: results from the Eurofever Registry and a literature review

    NARCIS (Netherlands)

    Haar, N. Ter; Lachmann, H.; Ozen, S.; Woo, P.; Uziel, Y.; Modesto, C.; Kone-Paut, I.; Cantarini, L.; Insalaco, A.; Neven, B.; Hofer, M.; Rigante, D.; Al-Mayouf, S.; Touitou, I.; Gallizzi, R.; Papadopoulou-Alataki, E.; Martino, S.; Kuemmerle-Deschner, J.; Obici, L.; Iagaru, N.; Simon, A.; Nielsen, S.; Martini, A.; Ruperto, N.; Gattorno, M.; Frenkel, J.

    2013-01-01

    OBJECTIVE: To evaluate the response to treatment of autoinflammatory diseases from an international registry and an up-to-date literature review. METHODS: The response to treatment was studied in a web-based registry in which clinical information on anonymised patients with autoinflammatory diseases

  17. Safety of biologics in rheumatoid arthritis: data from randomized controlled trials and registries.

    Science.gov (United States)

    Codreanu, Catalin; Damjanov, Nemanja

    2015-01-01

    Over the past decade, the use of biologics has significantly changed the management of rheumatoid arthritis (RA). Biologics selectively target components of the immune system, resulting in better disease control. However, the growing use of biologics in RA has increased safety concerns among rheumatologists. Randomized controlled trials (RCTs) and registries are the most reliable sources of clinical safety data. Although safety data from RCTs provide certain insights into the clinical safety profile of an agent, strict constraints in study design (eg, exclusion criteria and restrictive treatment protocols) often do not accurately reflect possible safety issues in the use of the agent, either in the clinical setting or over long-term treatment. Registries, on the other hand, are not restrictive regarding patient enrollment, making them more reliable in evaluating long-term safety. A number of registries have been established globally: in Europe, the United States, and Asia. However, the availability of registry data from Eastern Europe is lacking. The notable exceptions so far are registries from the Czech Republic (ATTRA, a registry of patients treated with anti-tumor necrosis factor-alpha drugs) and Serbia (National registry of patients with rheumatoid arthritis in Serbia [NARRAS]). The current report provides an overview of safety data with biologics in RA from RCTs and registries. Availability of regional safety data from Eastern Europe is of great importance to its clinicians for making evidence-based treatment decisions in RA. PMID:25670881

  18. The Danish Registry on Regular Dialysis and Transplantation: completeness and validity of incident patient registration

    DEFF Research Database (Denmark)

    Hommel, Kristine; Rasmussen, Søren; Madsen, Mette;

    2010-01-01

    The Danish National Registry on Regular Dialysis and Transplantation (NRDT) provides systematic information on the epidemiology and treatment of end-stage chronic kidney disease in Denmark. It is therefore of major importance that the registry is valid and complete. The aim of the present study...

  19. Satellite Threat Warning and Attack Reporting

    Energy Technology Data Exchange (ETDEWEB)

    Hilland, D. [Kirkland AFB, NM (United States). Air Force Research Lab.; Phipps, G. [Sandia National Labs., Albuquerque, NM (United States). Optics & Technologies Dept.; Jingle, C.; Newton, G. [Schafer Corp., Albuquerque, NM (United States)

    1997-12-31

    The Air Force Research Laboratory`s Satellite Threat Warning and Attack Reporting (STW/AR) program will provide technologies for advanced threat warning and reporting of radio frequency (RF) and laser threats. The STW/AR program objectives are: (a) develop cost- effective technologies to detect, identify, locate, characterize, and report attacks or interference against U.S. and Allied satellites. (b) demonstrate innovative, light-weight, low-power, laser and RF sensors. The program focuses on the demonstration of RF and laser sensors. The RF sensor effort includes the investigation of interferometric antenna arrays, multi-arm spiral and butler matrix antennas, wideband receivers, adaptive processors, and improved processing algorithms. The laser sensor effort includes the investigation of alternative detectors, broadband grating and optical designs, active pixel sensing, and improved processing algorithms.

  20. GNSS-based positioning: Attacks and Countermeasures

    CERN Document Server

    Papadimitratos, P

    2010-01-01

    Increasing numbers of mobile computing devices, user-portable, or embedded in vehicles, cargo containers, or the physical space, need to be aware of their location in order to provide a wide range of commercial services. Most often, mobile devices obtain their own location with the help of Global Navigation Satellite Systems (GNSS), integrating, for example, a Global Positioning System (GPS) receiver. Nonetheless, an adversary can compromise location-aware applications by attacking the GNSS-based positioning: It can forge navigation messages and mislead the receiver into calculating a fake location. In this paper, we analyze this vulnerability and propose and evaluate the effectiveness of countermeasures. First, we consider replay attacks, which can be effective even in the presence of future cryptographic GNSS protection mechanisms. Then, we propose and analyze methods that allow GNSS receivers to detect the reception of signals generated by an adversary, and then reject fake locations calculated because of ...

  1. Two fatal tiger attacks in zoos.

    Science.gov (United States)

    Tantius, Britta; Wittschieber, Daniel; Schmidt, Sven; Rothschild, Markus A; Banaschak, Sibylle

    2016-01-01

    Two captive tiger attacks are presented that took place in Cologne and Münster zoos. Both attacks occurred when the handlers, intent on cleaning the enclosures, entered whilst the tigers accidently retained access to the location, and thus defended their territory against the perceived intruders. Both victims suffered fatal neck injuries from the bites. At Münster, colleagues managed to lure the tiger away from its victim to enable treatment, whilst the Cologne zoo tiger had to be shot in order to allow access to be gained. Whilst it was judged that human error led to the deaths of the experienced zookeepers, the investigation in Münster was closed as no third party was found to be at fault, whereas the Cologne zoo director was initially charged with being negligent. These charges were subsequently dismissed as safety regulations were found to be up to date. PMID:26115644

  2. Quantum Communication Attacks on Classical Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre

    , one can show that the protocol remains secure even under such an attack. However, there are also cases where the honest players are quantum as well, even if the protocol uses classical communication. For instance, this is the case when classical multiparty computation is used as a “subroutine......” in quantum multiparty computation. Furthermore, in the future, players in a protocol may employ quantum computing simply to improve efficiency of their local computation, even if the communication is supposed to be classical. In such cases, it no longer seems clear that a quantum adversary must be limited......In the literature on cryptographic protocols, it has been studied several times what happens if a classical protocol is attacked by a quantum adversary. Usually, this is taken to mean that the adversary runs a quantum algorithm, but communicates classically with the honest players. In several cases...

  3. Mitigation of Malicious Attacks on Networks

    CERN Document Server

    Schneider, Christian M; Andrade, Jose S; Havlin, Shlomo; Herrmann, Hans J; 10.1073/pnas.1009440108

    2011-01-01

    Terrorist attacks on transportation networks have traumatized modern societies. With a single blast, it has become possible to paralyze airline traffic, electric power supply, ground transportation or Internet communication. How and at which cost can one restructure the network such that it will become more robust against a malicious attack? We introduce a unique measure for robustness and use it to devise a method to mitigate economically and efficiently this risk. We demonstrate its efficiency on the European electricity system and on the Internet as well as on complex networks models. We show that with small changes in the network structure (low cost) the robustness of diverse networks can be improved dramatically while their functionality remains unchanged. Our results are useful not only for improving significantly with low cost the robustness of existing infrastructures but also for designing economically robust network systems.

  4. Modelling Social-Technical Attacks with Timed Automata

    DEFF Research Database (Denmark)

    David, Nicolas; David, Alexandre; Hansen, Rene Rydhof;

    2015-01-01

    Attacks on a system often exploit vulnerabilities that arise from human behaviour or other human activity. Attacks of this type, so-called socio-technical attacks, cover everything from social engineering to insider attacks, and they can have a devastating impact on an unprepared organisation. In...... this paper we develop an approach towards modelling socio-technical systems in general and socio-technical attacks in particular, using timed automata and illustrate its application by a complex case study. Thanks to automated model checking and automata theory, we can automatically generate possible...... attacks in our model and perform analysis and simulation of both model and attack, revealing details about the specific interaction between attacker and victim. Using timed automata also allows for intuitive modelling of systems, in which quantities like time and cost can be easily added and analysed....

  5. Heart Attack Before 50 Ups Early Death Risk

    Science.gov (United States)

    ... 160692.html Heart Attack Before 50 Ups Early Death Risk But healthy living can improve those odds, ... 30, 2016 (HealthDay News) -- The risk of early death after a heart attack has lessened over the ...

  6. Nonlinear optical cryptosystem resistant to standard and hybrid attacks

    Science.gov (United States)

    Sinha, Aloka

    2016-06-01

    We propose a nonlinear optical cryptosystem that is resistant to amplitude-phase retrieval attacks, known-plaintext attack and chosen-plaintext attack. A squaring operation is introduced in the encryption path, which thwarts the iterative attacks. This nonlinear operation tends to amplify the error in the estimation during an iterative attack. The decryption process requires the use of a square-root operation. Thus, in the reverse path also, the attacks encounter the nonlinear square-root operation. These two nonlinearities make the iterative attacks unstable, thereby leading to non-convergence of the mean square error (MSE). Our technique is also resistant to hybrid attacks. The technique is general and is shown to work on a variety of images of the type grayscale and binary. Numerical simulation results corroborate the effectiveness of the proposed cryptosystem.

  7. Concrete Deterioration under Alternate Action of Carbonation and Sulfate Attack

    Directory of Open Access Journals (Sweden)

    Fenglan Li

    2013-11-01

    Full Text Available By micro- and macro-observations, the study reveals the deterioration mechanisms of concrete under alternate action of carbonation and sodium sulfate solution attack (C-SA comparied with the single sodium sulfate solution attack (SA. The studies indicate that in both cases, the main attack product is ettringite, some gypsum is checked only in the first layer of case SA, the thaumasite form of sulfate attack is not initiated in case C-SA. Compared with the single sodium sulfate solution attack, although the carbonation layer mitigates the extent of sulfate attack in limited exposure period, the alternate action of carbonation and sulfate attack still leads to strength degradation to some extent. The effect of carbonation on sulfate attack for longer exposure period deserves further research.

  8. Sex Suffers for Younger Adults After Heart Attack

    Science.gov (United States)

    ... gov/news/fullstory_160722.html Sex Suffers for Younger Adults After Heart Attack Lack of interest a ... 2016 (HealthDay News) -- After a heart attack, many younger adults experience sexual difficulties -- and women more so ...

  9. Heart Attack Help? There's an App for That

    Science.gov (United States)

    ... page: https://medlineplus.gov/news/fullstory_159504.html Heart Attack Help? There's an App for That Emergency medicine ... American Heart Association. When someone is suffering a heart attack, stroke or cardiac arrest, quick action can be ...

  10. Extensions of the Cube Attack Based on Low Degree Annihilators

    Science.gov (United States)

    Zhang, Aileen; Lim, Chu-Wee; Khoo, Khoongming; Wei, Lei; Pieprzyk, Josef

    At Crypto 2008, Shamir introduced a new algebraic attack called the cube attack, which allows us to solve black-box polynomials if we are able to tweak the inputs by varying an initialization vector. In a stream cipher setting where the filter function is known, we can extend it to the cube attack with annihilators: By applying the cube attack to Boolean functions for which we can find low-degree multiples (equivalently annihilators), the attack complexity can be improved. When the size of the filter function is smaller than the LFSR, we can improve the attack complexity further by considering a sliding window version of the cube attack with annihilators. Finally, we extend the cube attack to vectorial Boolean functions by finding implicit relations with low-degree polynomials.

  11. Heart Attack: Tips for Recovering and Staying Well

    Science.gov (United States)

    ... version Heart Attack | Tips for Recovering and Staying Well If you have had a heart attack, you ... healthy diet. The food you eat affects how well your blood flows through your heart and arteries. ...

  12. Robustness of Complex Networks against Attacks Guided by Damage

    CERN Document Server

    Wang, Hui; Xu, Xiaomin; Xiao, Yanghua; Wang, Wei

    2011-01-01

    Extensive researches have been dedicated to investigating the performance of real networks and synthetic networks against random failures or intentional attack guided by degree (degree attack). Degree is one of straightforward measures to characterize the vitality of a vertex in maintaining the integrity of the network but not the only one. Damage, the decrease of the largest component size that was caused by the removal of a vertex, intuitively is a more destructive guide for intentional attack on networks since the network functionality is usually measured by the largest component size. However, it is surprising to find that little is known about behaviors of real networks or synthetic networks against intentional attack guided by damage (damage attack), in which adversaries always choose the vertex with the largest damage to attack. In this article, we dedicate our efforts to understanding damage attack and behaviors of real networks as well as synthetic networks against this attack. To this end, existing ...

  13. Securing iris recognition systems against masquerade attacks

    OpenAIRE

    Galbally Herrero, Javier; Gómez-Barrero, Marta; Ross, Arun A.; Fiérrez, Julián; Ortega-García, Javier

    2013-01-01

    Javier Galbally ; Marta Gomez-Barrero ; Arun Ross ; Julian Fierrez ; Javier Ortega-Garcia; "Securing iris recognition systems against masquerade attacks", Biometric and Surveillance Technology for Human and Activity Identification X, Proc. SPIE 8712 (May 31, 2013); doi:10.1117/12.2015690. Copyright 2013 Society of Photo‑Optical Instrumentation Engineers. One print or electronic copy may be made for personal use only. Systematic reproduction and distribution, duplication of any material in...

  14. Incidence of Fungal attack on Aircraft Fuselage

    Directory of Open Access Journals (Sweden)

    H. M. Dayal

    1968-10-01

    Full Text Available Incidence of fungal attack on the fuselage of a few Vampire aircraft has been observed. The fungus isolated from the infected regions has been tentatively indentified as TorulaSp. Laboratory experiments have revealed that within four weeks this fungus causes about 44 percent loss in the tensile strength of the brich plywood used in the manufacture of the fuselage of the aircraft.

  15. Transient ischemic attack after Mesobuthus gibbosus envenomation

    OpenAIRE

    Golcuk, Yalcin; Ozsarac, Murat; Bilge, Adnan; Golcuk, Burcu; Cinar, Bilge Piri; Hayran, Mustafa

    2014-01-01

    Endometriosis Mesobuthus gibbosus is a medically important venomous scorpion in western of Turkey which causes significant morbidity. Envenoming of this species scorpion results with varying degrees of local symptoms and clinically important systemic effects. This case describes an authenticated first case of transient ischemic attack in a 68 year-old-woman following envenoming by M. gibbosus in Turkey.Keywords: Scorpion, Envenomation, Emergency department

  16. Visualizing Endpoint Security Technologies using Attack Trees

    OpenAIRE

    Pettersson , Stefan

    2008-01-01

    Software vulnerabilities in programs and malware deployments have been increasing almost every year since we started measuring them. Information about how to program securely, how malware shall be avoided and technological countermeasures for this are more available than ever. Still, the trend seems to favor the attacker. This thesis tries to visualize the effects of a selection of technological countermeasures that have been proposed by researchers. These countermeasures: non-executable memo...

  17. Towards a translational model of panic attacks

    OpenAIRE

    Luiz Carlos Schenberg

    2010-01-01

    About 20 years ago, Deakin and Graeff proposed that whereas generalized anxiety disorder is produced by the overactivity of 5-HT excitatory projections from dorsal raphe nucleus to the areas of prefrontal cortex and amygdala which process distal threat, panic attacks are a dysfunction of 5-HT inhibitory projections from dorsal raphe nucleus to the dorsal periaqueductal gray matter, thereby releasing the responses to proximal threat, innate fear or anoxia. Besides, they suggested that the decr...

  18. Sharkonomics How to attack market leaders

    CERN Document Server

    Engeseth, Stefan

    2012-01-01

    Sharks are nature's most revered and feared killing machines. But if you study the behaviour of sharks, you will learn they are also highly strategic and efficient in the way they survive and thrive in nature's competitive environment. Inspired by the shark's evolved (over 420 million years) instincts and strategic moves, this book provides businesses with 10 ways on how to attack the market leaders, and take market share, in your sector.

  19. An Analysis of Various Attacks in MANET

    OpenAIRE

    M.Udhayamoorthi; C. Senthilkumar; Dr S. Karthik; Dr. T.Kalaikumaran

    2014-01-01

    An Ad-hoc network is a self-organized network, without a central coordinator, and which frequently changes its topology. According to the perspective of our paper, we try to connect the current status of computers era to adhoc networking. As adhoc networks has been unleashing several updated technologies, it is the most growing area in the field of networks in information and communication Engineering has ever seen .we start with area introduction, deeply reviewed about the various attacks es...

  20. Attacks and Counterattacks on Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Nusrat Fatema

    2013-12-01

    Full Text Available WSN is formed by autonomous nodes with partial memo ry, communication range, power, and bandwidth. Their occupation depends on inspecting corporal and environmental conditions and communing through a system and performing data processing. The applicat ion field is vast, comprising military, ecology, healthcare, home or commercial and require a highly secured communication. The paper analyses different types of attacks and counterattacks and provides so lutions for the WSN threats.

  1. Quantum Key Distribution against Trojan Horse Attacks

    Institute of Scientific and Technical Information of China (English)

    CAI Qing-Yu; LV Hua

    2007-01-01

    Realistic experimental apparatus of quantum cryptography are imperfect, which may be utilized by a potential eavesdropper to eavesdrop on the communication. We show that quantum communication may be improved with quantum teleportation and entanglement swapping, which is robustly secure against the most general Trojan horse attacks. Our scheme is not an improvement of the communication apparatus, but the improvement of quantum communication protocol itself. We show that our modified schemes may be implemented with current technology.

  2. Nonepileptic attack disorder among married women

    OpenAIRE

    Dhanaraj M; Rangaraj R; Arulmozhi T; Vengatesan A

    2005-01-01

    Aim : To study the clinical features, precipitating stressful life events and prognosis of nonepileptic attack disorder (NEAD) among married women. Design: Prospective cohort study with 1-year follow-up. Setting: A tertiary care teaching hospital. Subjects: Of the 1020 patients with epilepsy referred to the epilepsy clinic during 2002-2003, 30 were married women with NEAD. Materials and Methods: The diagnostic criteria for NEAD included normal EEG during ictal and post-ictal phase of the...

  3. Securing iris recognition systems against masquerade attacks

    Science.gov (United States)

    Galbally, Javier; Gomez-Barrero, Marta; Ross, Arun; Fierrez, Julian; Ortega-Garcia, Javier

    2013-05-01

    A novel two-stage protection scheme for automatic iris recognition systems against masquerade attacks carried out with synthetically reconstructed iris images is presented. The method uses different characteristics of real iris images to differentiate them from the synthetic ones, thereby addressing important security flaws detected in state-of-the-art commercial systems. Experiments are carried out on the publicly available Biosecure Database and demonstrate the efficacy of the proposed security enhancing approach.

  4. NETWORK SECURITY: ATTACKS, TOOLS AND TECHNIQUES

    OpenAIRE

    Mhatre Suvidnya Shashikant; Potadar Devangi; Salvi Bhageshree

    2015-01-01

    Network security is main issue of this generation of computing because many types of attacks are increasing day by day. Establishing a network is not a big issue for network admini st rators but protecting the entire network is a big issue. There are various methods and tools are available today for destroying the existing network. In this paper we mainly emphasize on the network security also we present some major issues that can affect our network.

  5. Establishing a National Medical Device Registry in Saudi Arabia: Lessons Learned and Future Work.

    Science.gov (United States)

    Al-Surimi, Khaled; Househ, Mowafa; Almohandis, Essam; Alshagathrh, Fahd

    2015-01-01

    Medical device evaluation presents several unique challenges due to the great diversity and complexity of medical devices and their rapid technological evolution. There has been a variety of work conducted on the development of disease based registries and health surveillance systems in Saudi Arabia. However, the progress of medical device registry systems and post-market medical device surveillance systems remains in its infancy in Saudi Arabia and within the region. In 2007, a royal decree assigned the responsibility for regulating medical devices to the Saudi Food and Drug Authority (SFDA). Soon afterwards, the SFDA established the Medical Devices National Registry (MDNR) to house medical device information relating to manufacturers, agents, suppliers and end-users. The aim of this paper is to provide an overview on the Medical Device National Registry (MDNR) in Saudi Arabia and describe the current experience and future work of establishing a comprehensive medical device registry and post-market surveillance system in Saudi Arabia. PMID:26152943

  6. Attack Detection By Clustering And Classification Approach

    Directory of Open Access Journals (Sweden)

    Priyanka J. Pathak, Prof. Snehlata Dongre

    2012-04-01

    Full Text Available Intrusion detection is a software application that monitors network and/or system activities for malicious activities or policy violations and produces reports to a Management Station. Security is becoming big issue for all networks. Hackers and intruders have made many successful attempts to bring down high profile company networks and web services. Intrusion Detection System (IDS is an important detection that is used as a countermeasure to preserve data integrity and system availability from attacks. The work is implemented in two phases, in first phase clustering by K-means is done and in next step of classification is done with k-nearest neighbours and decision trees. The objects are clustered or grouped based on the principle of maximizing the intra-class similarity and minimizing the interclass similarity. This paper proposes an approach which make the clusters of similar attacks and in next step of classification with K nearest neighbours and Decision trees it detect the attack types. This method is advantageous over single classifier as it detect better class than single classifier system.

  7. A Secure Localization Approach against Wormhole Attacks Using Distance Consistency

    OpenAIRE

    Honglong Chen; Wei Lou; Xice Sun; Zhi Wang

    2010-01-01

    Wormhole attacks can negatively affect the localization in wireless sensor networks. A typical wormhole attack can be launched by two colluding attackers, one of which sniffs packets at one point in the network and tunnels them through a wired or wireless link to another point, and the other relays them within its vicinity. In this paper, we investigate the impact of the wormhole attack on the localization and propose a novel distance-consistency-based secure localization scheme against worm...

  8. A Structured Multi-signature Scheme Against Forgery Attack

    Directory of Open Access Journals (Sweden)

    Wenjun Luo

    2011-12-01

    Full Text Available There are some classic structured multi-signature programs, such as Burmester’s, Harn’s and Lin’s schemes that can not resist inside attack and outside attack. In this paper, we briefly review Burmester’s program and relate safety analysis, Burmester’s scheme vulnerable to forgery attack. Then we propose a structured multi-signature scheme against forgery attack. In the new scheme, we increase the signature parameter verification to improve security.

  9. Migraineurs with exercise-triggered attacks have a distinct migraine

    OpenAIRE

    Koppen, Hille; van Veldhoven, Peter LJ

    2013-01-01

    Background Sport as a migraine trigger has been reported, but extensive information on these triggered attacks and the patients experiencing these attacks is lacking. Goal of this study was to investigate the lifetime prevalence of exercise triggered migraine attacks in migraine patients and if patients with exercise triggered attacks experience specific prodromal or ictal migraine symptoms. Methods 103 consecutive migraine patients seen during their first visit at a Dutch headache clinic wer...

  10. Machine Learning Methods for Attack Detection in the Smart Grid

    OpenAIRE

    Ozay, Mete; Esnaola, Inaki; Vural, Fatos T. Yarman; Kulkarni, Sanjeev R.; Poor, H. Vincent

    2015-01-01

    Attack detection problems in the smart grid are posed as statistical learning problems for different attack scenarios in which the measurements are observed in batch or online settings. In this approach, machine learning algorithms are used to classify measurements as being either secure or attacked. An attack detection framework is provided to exploit any available prior knowledge about the system and surmount constraints arising from the sparse structure of the problem in the proposed appro...

  11. Detecting man-in-the-middle attacks by precise timing

    OpenAIRE

    Aziz, Benjamin; Hamilton, G.

    2009-01-01

    Man-in-the-middle attacks are one of the most popular and fundamental attacks on distributed systems that have evolved with advances in distributed computing technologies and have assumed several shapes ranging from simple IP spoofing to complicated attacks on wireless communications, which have safety-critical applications such as remote wireless passport verification. This paper proposes a static analysis algorithm for the detection of man-in-the-middle attacks in mobile processes using a s...

  12. Getting inside acupuncture trials - Exploring intervention theory and rationale

    Directory of Open Access Journals (Sweden)

    Godfrey Mary

    2011-03-01

    Full Text Available Abstract Background Acupuncture can be described as a complex intervention. In reports of clinical trials the mechanism of acupuncture (that is, the process by which change is effected is often left unstated or not known. This is problematic in assisting understanding of how acupuncture might work and in drawing together evidence on the potential benefits of acupuncture. Our aim was to aid the identification of the assumed mechanisms underlying the acupuncture interventions in clinical trials by developing an analytical framework to differentiate two contrasting approaches to acupuncture (traditional acupuncture and Western medical acupuncture. Methods Based on the principles of realist review, an analytical framework to differentiate these two contrasting approaches was developed. In order to see how useful the framework was in uncovering the theoretical rationale, it was applied to a set of trials of acupuncture for fatigue and vasomotor symptoms, identified from a wider literature review of acupuncture and early stage breast cancer. Results When examined for the degree to which a study demonstrated adherence to a theoretical model, two of the fourteen selected studies could be considered TA, five MA, with the remaining seven not fitting into any recognisable model. When examined by symptom, five of the nine vasomotor studies, all from one group of researchers, are arguably in the MA category, and two a TA model; in contrast, none of the five fatigue studies could be classed as either MA or TA and all studies had a weak rationale for the chosen treatment for fatigue. Conclusion Our application of the framework to the selected studies suggests that it is a useful tool to help uncover the therapeutic rationale of acupuncture interventions in clinical trials, for distinguishing between TA and MA approaches and for exploring issues of model validity. English language acupuncture trials frequently fail to report enough detail relating to the

  13. The role of the hospital registry in achieving outcome benchmarks in cancer care.

    Science.gov (United States)

    Greene, Frederick L; Gilkerson, Sharon; Tedder, Paige; Smith, Kathy

    2009-06-15

    The hospital registry is a valuable tool for evaluating quality benchmarks in cancer care. As payment for performance standards are adopted, the registry will assume a more dynamic and economically important role in the hospital setting. At Carolinas Medical Center, the registry has been a key instrument in the comparison of state and national benchmarks and for program improvement in meeting standards in the care of breast and colon cancer. One of the significant successes of the American College of Surgeons Commission on Cancer (CoC) Hospital Approvals Program is the support of hospital registries, especially in small and midsized community hospitals throughout the United States. To become a member of the Hospital Approvals Program, a registry must be staffed appropriately and include analytic data for patients who have their primary diagnosis or treatment at the facility 1. The current challenge for most hospitals is to prove that the registry has specific worth when many facets of care are not compensated. Unfortunately a small number of hospitals have disbanded their registries because of the short-sighted decision that the registry and its personnel are a drain on the hospital system and do not generate revenue. In the present era of meeting benchmarks for care as a prelude to being paid by third party and governmental agencies 2,3, a primary argument is that the registry can be revenue-enhancing by quantifying specific outcomes in cancer care. Without having appropriate registry and abstract capability, the hospital leadership cannot measure the specific outcome benchmarks required in the era of "pay for performance" or "pay for participation". PMID:19466739

  14. Electronic immunization registries in Latin America: progress and lessons learned.

    Science.gov (United States)

    Danovaro-Holliday, M Carolina; Ortiz, Claudia; Cochi, Shea; Ruiz-Matus, Cuauhtémoc

    2014-01-01

    Most of the current vaccination coverage monitoring in Latin America relies on aggregated data. Improved monitoring has been shown to result in better coverage. Taking advantage of current information and communication technologies, the use of electronic immunization registries (EIRs) can facilitate coverage monitoring in terms of particularity (at the level of the individual), timeliness, and accuracy. Countries in Latin America are rapidly developing and implementing national EIRs to improve the monitoring of immunization coverage. These countries are using a variety of approaches toward system conception and development; integration with larger health information systems; different modalities for data collection, entry, and transmission; and other key features. Some countries are exploring linkages with mHealth (mobile health) for data collection and for automated recall/reminders. Evaluating EIRs and sharing experiences are important to streamlining and improving national EIR development, implementation, and use, and to ensuring its sustainability. PMID:25211576

  15. Some Considerations on the Adoption Registration in the Civil Registry

    Directory of Open Access Journals (Sweden)

    Gabriela LUPŞAN

    2014-12-01

    Full Text Available Filiation is, in a broad sense, an identity element, dependent or not on the biological relationships, that represents, in some situations, either a condition for the existence of a right (e.g. the right to inheritance or for example to conclude a legal act (e.g. marriage. The proof of filiation is the birth certificate drawn up in civil registry or on the material basis of birth, or on the basis of the adoption judgment. In this paper, we aimed at analyzing the final part of the adoption procedure, the subsequent stage for becoming final the adoption judgment, which sets face to face the adopting person or family and the administrative authority, obliged to execute the judge's decision, i.e. to create a filiation relation between the adopted on the one hand and the adoptive parent or parents.

  16. Critique of rationale for transmutation of nuclear waste

    International Nuclear Information System (INIS)

    It has been suggested that nuclear transmutation could be used in the elimination or reduction of hazards from radioactive wastes. The rationale for this suggestion is the subject of this paper. The objectives of partitioning-transmutation are described. The benefits are evaluated. The author concludes that transmutation would appear at best to offer the opportunity of reducing an already low risk. This would not seem to be justifiable considering the cost. If non-radiological risks are considered, there is a negative total benefit

  17. Scientific rationale for a lower radon daughter exposure

    International Nuclear Information System (INIS)

    On April 21, 1980 the Oil, Chemical and Atomic Workers Union (OCAW) submitted a petition urging the revision of the Mine Safety and Health Administration (MSHA) permissible exposure limit to radon daughters in underground mines. This petition asks for: annual worker exposure to be lowered from the current 4 WLM/year to 0.7 WLM/year; full economic protection for workers whose exposure exceeds the proposed 0.7 WLM/year; and the primary means of lowering workers' radiation exposures shall be environmental controls. The scientific rationale for the lower standard requested in the petition to the Department of Labor is presented

  18. Critique of rationale for transmutation of nuclear waste

    Energy Technology Data Exchange (ETDEWEB)

    Smith, C.F.; Cohen, J.J.

    1980-07-01

    It has been suggested that nuclear transmutation could be used in the elimination or reduction of hazards from radioactive wastes. The rationale for this suggestion is the subject of this paper. The objectives of partitioning-transmutation are described. The benefits are evaluated. The author concludes that transmutation would appear at best to offer the opportunity of reducing an already low risk. This would not seem to be justifiable considering the cost. If non-radiological risks are considered, there is a negative total benefit. (DC)

  19. Plato's Cosmic Theology: A Rationale for a Polytheistic Astrology?

    Science.gov (United States)

    Henriques, André

    2015-05-01

    Plato's cosmology influenced classical astronomy and religion, but was in turn influenced by the polytheistic context of its time. Throughout his texts, including the cosmological treatise Timaeus, and the discussions on the soul in the Phaedrus, Plato (c.428-c.348 BC) established what can be generalised as Platonic cosmological thought. An understanding of the philosophical and mythical levels of Platonic thought can provide a rationale for polytheistic and astrological worldviews, pointing to some cosmological continuity, alongside major shifts, from ancient Greek religion to the astrological thought of ancient astronomers such as Claudius Ptolemy.

  20. Optimizing the management of neuromyelitis optica and spectrum disorders in resource poor settings: Experience from the Mangalore demyelinating disease registry

    Directory of Open Access Journals (Sweden)

    Lekha Pandit

    2013-01-01

    Full Text Available Background: In resource-poor settings, the management of neuromyelitis optica (NMO and NMO spectrum (NMOS disorders is limited because of delayed diagnosis and financial constraints. Aim: To device a cost-effective strategy for the management of NMO and related disorders in India. Materials and Methods: A cost-effective and disease-specific protocol was used for evaluating the course and treatment outcome of 70 consecutive patients. Results: Forty-five patients (65% had a relapse from the onset and included NMO (n = 20, recurrent transverse myelitis (RTM; n = 10, and recurrent optic neuritis (ROPN; n = 15. In 38 (84.4% patients presenting after multiple attacks, the diagnosis was made clinically. Only 7 patients with a relapsing course were seen at the onset and included ROPN (n = 5, NMO (n = 1, and RTM (n = 1. They had a second attack after a median interval of 1 ± 0.9 years, which was captured through our dedicated review process. Twenty-five patients had isolated longitudinally extensive transverse myelitis (LETM, of which 20 (80% remained ambulant at follow-up of 3 ± 1.9 years. Twelve patients (17% with median expanded disability status scale (EDSS of 8.5 at entry had a fatal outcome. Serum NMO-IgG testing was done in selected patients, and it was positive in 7 of 18 patients (39%. Irrespective of the NMO-IgG status, the treatment compliant patients (44.4% showed significant improvement in EDSS (P ≤ 0.001. Conclusions : Early clinical diagnosis and treatment compliance were important for good outcome. Isolated LETM was most likely a post-infectious demyelinating disorder in our set-up. NMO and NMOS disorders contributed to 14.9% (45/303 of all demyelinating disorders in our registry.